7
March

Tips to Maintain a Virus Free Computer......

Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep ...
6
March

Phishing The Art of Hacking....

What is phishing ?Phishing is a technique of obtaining sensitive data such username,password,credit card details etc by an attacker by claiming to be a trusted or genuine organisation/company. The most common type of phishing is Fake Login Pages. The basic methodology of this attack is written below1.Suppose an attacker wants to hack gmail/yahoo/facebook/bank account of the victim. Attacker creates ...
4
March

How To Setup Dark Comet RAT for....Hacking Computers......

Ok in this thread I will show to the people who don't know how to setup DarkComet RAT v3.0.I will show how setting up the client and how creating a server with the best settings for run under the most different configurations and ensure there are not compatibility issues with the systems. Also I provide a package with some extra tools needed in the tuto:- I coded a very simple runtime crypter to show people how DarkComet ...
4
March

How To Setup CyberGate Trojan...To Hack Your Friends Passwords,.....

This is my first TuT(Tutorial) tell me how i did and comment to tell me how it went. If you have any questions or need help setting this up send me a PM(private Message). Thanks and Good Luck! Sites we will useDownload CyberGate  Here..&http://www.no-ip.com/The first thing you will need to download is Cybergate. You may use any version you would like v1.07.5, v1.05.1, or v1.04.8. They all set up the same.To ...
4
March

How To get CyberGate Trojan....

What is CyberGate:CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed by our experienced team. What it can do :CyberGate was built to be a tool for various  possible applications, ranging from assisting Users with routine maintenance tasks, to remotely monitoring your Children, captures regular user activities and maintain ...
4
March

How to Change Start Button Text in Windows Using Resource Hacker?

Before:After:1. Open "%windir%\Explorer.exe" file in Resource Hacker.2. Go to:"String Table -> 37 -> 1033 -> 578" (If you are using Luna theme)"String Table -> 38 -> 1033 -> 595" (If you are using Windows Classic theme)3. You'll get a string "start". Just change it with whatever text you want to show. Make sure you put quotes.4. Compile the script and save the file. That's it. You have done.NOTE: To ...
2
March

Trojans And Backdoors.....a Detailed View.

 Trojans and Backdoors A Trojan horse is:o   An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.o   A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user.o   Any program that ...