Add clips from websites to Dashboard Unknown 8:16 AM 0 Add clips from websites to Dashboard Remember Dashboard? Introduced with 10.4, this overlay holds 'widgets' that can perform hand...
Run Windows Unknown 8:10 AM 1 Run Windows We know, we know - who wants to run Windows? But sometimes it's handy, whether to play the latest games or run some niche...
Talk to and listen to your mac! Unknown 8:05 AM 0 Talk to and listen to your mac! In OS X 10.8, the ability to listen to you as well as talk is really impressive. Although these are somet...
Control a mac remotely Unknown 7:58 AM 0 Control a mac remotely There are dozens of ways of controlling a cross the internet, which you might want to do to schedule a recording, ...
Copy Command Prompt Output Unknown 7:50 AM 0 Copy Command Prompt Output Windows Version tells the exact Build of OS and service Pack you are using. You can simply check it by using W...
Check Windows Version Unknown 7:46 AM 0 Check Windows Version Whenever an external device is plugged in Windows it showed an Autorun options for choosing what happens when you i...
Application based volume Mixer Unknown 7:40 AM 0 Application based volume Mixer Volume Mixer in Windows 7, not just show device volume but also lists all applications that are currently ...
Access Jump Lists With The Left Mouse Button Unknown 7:36 AM 0 Access Jump Lists With The Left Mouse Button Jump Lists are a new feature in Windows 7 that shows recently used files for a particular app...
How to stay Anonynomus online Unknown 3:17 AM 1 How to stay Anonynomus online 1.SECURE WEBMAIL WITH EXTENSIONS If youre using a popular webmail service, such as Gmail or Yahoo Mail,...
How to boost and secure home WIFI Unknown 2:34 AM 1 How to boost and secure home WIFI A wireless network lets you get online from your laptop, tablet or smartphone anywhere within your home...
How to increase android phone performance Unknown 2:18 AM 1 How to increase android phone performance Android smartphones are found almost everywhere, and they range from low to high end smartphone...
How to send data from mobile to laptop Unknown 2:04 AM 1 How to send data from mobile to laptop Many times we need to transfer data from our phone to PC/ Laptop or vice verse because of to save ...
How to recover facebook account after hack Unknown 1:56 AM 36 How to recover facebook account after hack For most people, having their Facebook account hacked is a nightmare. Imagine if someone had a...
How to secure facebook account Unknown 1:32 AM 1 How to secure facebook account For many people, Facebook is part of their everyday life. It’s where they interact with Friends and collea...
How to download all facebook account content Unknown 1:16 AM 1 How to download all facebook account content Facebook recently introduced a new option to download all your information of your Faceboo...
How to hack facebook account using phishing Unknown 1:08 AM 18 How to hack facebook account using phishing Phishing. What is phishing and how is it done? Phishing is the process of directing users to ...
How to change your friends profile picture on whatsapp Unknown 12:56 AM 1 How to change your friends profile picture on whatsapp Step 1: The profile pictures are generally there in your smartphone in the WhatsA...
How to create fake conversation on facebook and whatsapp Unknown 12:51 AM 1 How to create fake conversation on facebook and whatsapp Step 1: Most probably there are three popular apps to generate fake Whatsapp c...
How to disable blue ticks on whatsapp Unknown 12:43 AM 2 How to disable blue ticks on whatsapp What the WhatsApp Check Marks Mean Singe Gray check mean message send successfully, Double gray che...
How to secure whatsapp account Unknown 12:35 AM 2 How to secure whatsapp account Is it really possible to hack whatsapp Well theoretically Yes, There is nothing like 100% security. Almost...
How to recover whatsapp chat Unknown 12:24 AM 2 How to recover whatsapp chat Recover Recent WhatsApp Chats(less than 7days) WhatsApp automatically backs up chat history every day at 4...
How to hack whatsapp account Unknown 12:15 AM 22 How to hack whatsapp account WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided ...
How to spy on someones whatsapp Unknown 12:05 AM 1 How to spy on someones whatsapp Yeah you read it right, you can now spy on your friend’s/lover’s WhatsApp account, You can spy on your fr...
How to download torrent files from IDM Unknown 11:46 PM 1 How to download torrent files from IDM Below are the list of websites which provides torrent download with IDM :
How to disable WIFI for others Unknown 11:39 PM 1 How to disable WIFI for others If you find yourself in a situation where you want to deny online access to your leeching neighbor, ungrate...
How to hack WIFI Unknown 11:32 PM 1 How to hack WIFI You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is...
How to recover data from android phone Unknown 11:25 PM 2 How to recover data from android phone Weve all done it: accidentally deleted photos, videos or files by accident. Dont panic, though. The...
How to hack website using html Unknown 11:17 PM 1 How to hack website using html If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. Th...
How to hack website using sql injection Unknown 2:43 AM 5 How to hack website using sql injection What is SQL Injection? SQL injection attack is a code injection technique or method, which is u...
How to root android phone with pc Unknown 2:20 AM 1 How to root android phone with pc Before jumping into the rooting process, please make sure you get everything right beforehand. - De...
How to access your pc from another pc Unknown 2:11 AM 1 How to access your pc from another pc Ever wish you could access some files on your work computer when you’re sitting in your home office...
How to access your pc on android Unknown 1:59 AM 1 How to access your pc on android Want to Email a forgotten file from your home to your office? Want to Gain full remote access to your PC f...
How to hack wifi on android devices Unknown 6:50 AM 33 How to hack wifi on android devices Do you want to test your network security? Or you want to use the wifi of your neighbour and you do no...
How to erase data so no one can recover Unknown 6:23 AM 1 how to erase data so no one can recover When you a delete a file, it isn’t really erased — it continues existing on your hard drive, even ...
How to recover deleted files from hard drive Unknown 6:12 AM 1 How to recover deleted files from hard drive Have you ever been troubled by losing important data? Do you know it is possible to recover ...
How to track android phone Unknown 5:09 AM 1 how to track android phone " How to track my lost or stolen Android phone or mobile ?" is one of the questions that 80% of th...
How to download paid apps for free Unknown 9:47 PM 1 How to download paid apps for free Method 1 In this method you have to download an apps name Blackmart Alpha which helps you to downlo...
How to disable applock in android Unknown 9:34 PM 1 How to disable applock in android Wondering how to unlock app lock without password in android phones? Is it possible to bypass the Applo...
How to combine two WIFI connection to get faster internet Unknown 9:15 PM 1 How to combine two WIFI connection to get faster internet You have more than one active internet connections and you are using only one a...
How to hack a website from hacking Unknown 7:48 PM 1 How to hack a website from hacking What is Cross Site Scripting? Cross Site Scripting also known as XSS , is one of the most common web a...
How to root your phone Unknown 4:42 AM 1 How to root your phone Rooting is allows users to dive deeper into a phone’s system. Essentially, it’ll allow you to access the entire op...
How to hide your ip address Unknown 4:12 AM 1 How to hide your ip address When you connect to the Internet, your I SP assigns you an IP address. When you surf the web, your activity ...
How t0 hack wireless networks Unknown 2:02 AM 1 HOW t0 hack wireless networks Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulner...
WiFi eavesdropping Unknown 12:56 AM 0 WiFi eavesdropping WiFi eavesdropping is another method used by cyber criminals to capture personal information. What it is: Virtual ...
Targeted Attack Unknown 12:53 AM 1 Targeted Attack Emails can be sent using any "from” email address so it’s possible for someone to send me an email that appears to ...
Snooping Unknown 12:42 AM 1 Snooping This is when someone looks through your files in the hopes of finding something interestingwhether it is electronic or on paper. I...
Ransomware Unknown 12:32 AM 1 Ransomware What it is: Ransomware is a type of malware that restricts access to your computer or your files and displays a message that de...
Password attack Unknown 12:28 AM 1 Password attack Password attack An attacker tries to crack the passwords stored in a network account database or a password—protected fil...
Junk Mail Unknown 12:24 AM 1 Junk Mail You get an email from someone you don’t know, or an impersonal one from your bank —that includes an attachment, a link or a for...
Insider attack Unknown 12:19 AM 0 Insider attack An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks ...
Close In Attack Unknown 12:15 AM 0 Close In Attack A close-in attack involves someone attempting to get physically close to network components, data, and syste...
Backdoor Attack Unknown 12:08 AM 0 Backdoor Attack This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into sy...
Zero Day Exploits Unknown 11:53 PM 0 Zero Day Exploits For some hackers, news of a new software patch being released is like Christmas coming early. If they look hard enough,...
SQL Injection Unknown 11:49 PM 0 SQL Injection SQLI uses parameters to run SQL statements via your webpages. The SQL statements could be used to dump the contents of a da...
Remote File Inclusion Unknown 11:48 PM 0 Remote File Inclusion RFI tricks existing software on your webpage to access malicious code elsewhere on the internet and to execute it wi...
Distributed attack Unknown 11:43 PM 0 Distributed attack A distributed attack requires that the adversary introduce code, such as a Trojan horse or back- door program, to a ...
Directory Traversal Loca Unknown 11:40 PM 0 Directory Traversal Loca Directory traversal is one of the most common attacks occurring today. It causes your web application to access ...
Defacing Unknown 11:38 PM 0 Defacing Defacement is a substitution of a web page (or part of a page) by hackers. Defacement is the online equivalent of grafiti.
Cross Site Scripting Unknown 11:29 PM 0 Cross Site Scripting Cross Site Scripting targets the scripts embedded in a webpage that are executed client-side on your browser such as...
Botnets Unknown 11:26 PM 0 Botnets Botnets are not commonly used for hacking Facebook accounts, because of its high setup costs. They are used to carry more advanced...
Social Engineering Unknown 11:06 PM 3 Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into perfor...
Session Hijackinng Unknown 10:47 PM 1 Session Hijackinng In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid comput...
Malware Unknown 10:32 PM 1 Malware What is malware and how can we prevent it? Malware is an abbreviated term meaning malicious software. This is software that is s...
keystroking Unknown 10:20 PM 1 keystroking K eystroke logging, often referred to as keyloggingor keyboard capturing, is the action of recording (logging) the keys struc...
Brute Force Attack Unknown 10:07 PM 0 Brute Force Attack I n cryptography, a brute—force attack consists of an attacker trying many passwords or passphrases with the hope of ev...
Worms Unknown 9:53 PM 1 Worms A computer worm is a standalone malware computer program that replicates itself in orderto spread to other computers. Often, it uses...
Trojan Unknown 7:23 AM 1 Trojan In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. The term comes from Greek mythology a...
viruses Unknown 11:15 PM 1 virus A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishe...