Friday 15 June 2012

C  LANGUAGE VIRUS

  Open the Notepad and copy the below code into it:

HOW TO REGISTER IDM FOR LIFETIME WITHOUT ANY SOFTWARE

Hello Friends, today i am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.

NO MORE WARNING OF FAKE SERIAL KEY AT ALL….


internet download manager idm
Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.

CMD COMMANDS 

COMMANDS                       THEIR FUNCTIONS

 ADDUSERS       Add or list users to/from a CSV file
   ADmodcmd       Active Directory Bulk Modify
   ARP          Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT   One step file association
   ATTRIB        Change file attributes

How To Hack Content Advisor Password


Content Advisor is a feature in Internet Explorer that allows supervisors to restrict the web sites that the users can browse. The supervisor can set a password in order to prevent from other users from changing the Content Advisor properties.

Weel, for this, We need to edit the registry..So First of all Backup Your registry.
Right After That, u need to do d following.

Open regedit ( Press WINDOW Key + R, Type regedit.exe ), and browse to

 HOW TO SAVE A VIDEO WITHOUT DOWNLOADING

Download the software from here:- http://www.nirsoft.net
NAME OF SOFTWARE:- "VideoCacheView"
After watching a video in a Web site, you may want to save the video file
into your local disk for playing it offline in the future. If the video
file is stored in your browser's cache, this utility can help you.

NEW FUNCTION OF FUNCTION KEYS

 
Function Keys, F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, F12

Every one of us has seen these 12 function keys on the Keyboard. Does any1 use that daily? .. DO you all thought of why those keys are there. Aplications of them??... how many of us used these keys to have our jobs performed easier? These function keys perform different functions in different applications and programs. In combination with other keys these function keys perform different functions differently. For the benefit of all of us I have codified the ‘Function Keys’ performances.

What is a botnet?

A botnet is where you send a trojan to someone and when they open it a "bot" joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a "zombie".
Depending on the source you used, the bot can do several things.
I myself have helped write one of the most advanced and secure bot sources out there.
(Off topic)

What is SQL Injection? and how to find SQL vul Site and DOrks

SQL ( structure Query Language) is a technique to attack  database of the website which can contains usernames, Passwords, Credit card Info and other confidential data.It mainly occur in the web application. It occurs when there is a bug in the my SQL syntax. By this attacker enter into the database and cause damage to the site. The main reason for sql injection because the admins don't pay that much attention to the security of the site.
You can hack Site by the followings methods ( mostly used )
Manual SQL Injection