Expert Hacker:-Bishal obory

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, August 8, 2014

RockYou Hacked – 32 Million Account Passwords Latest News

               RockYou Hacked – 32 Million Account Passwords Latest News RockYou has suffered a serious hacker attack that has exposed 32 million of its customer usernames and passwords to possible identity theft. And it has apparently taken RockYou more than 10 days to inform its users of the breach. The security firm Imperva informed RockYou that its site had a serious SQL injection flaw, according to reports. Imperva said that some userse passwords had already been compromised as a result of the vulnerability...

Thursday, August 7, 2014

What is Trojan horse

What is Trojan Horse  Working of Trojan Horse  Types of Trojan Horse  How They Introduced  Tini Trojan Classic Netbus Beast RAT 2.07 *What is Trojan horse     Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. *Working of Trojan Attacker...

How To Reset Your Lost Bios Password

How To Reset Your Lost Bios Password Bios password are used to secure your desktop and latop computer by preventing user from changing your bios setting or acessing to your computer while u are away.there is too type of password protection the first one is bios setup protection:to prevent user from changing bios setting thesecond one system proetction:to make the system unbootable intel entring the password. but sometime user can forget...

World‟s First iPhone Worm Hits iPhone Owners In Australia

World‟s First iPhone Worm Hits iPhone Owners In Australia Apple iPhone owners in Australia have reported that their smartphones have been infected by a worm that has changed their wallpaper to an image of 1980s pop crooner Rick Astley. Tricking victims in to inadvertently playing the song has become a popular prank known as Rickrolling. The attacks, which researchers say are the world‘s first iPhone worm in the wild, target jailbroken iPhones that...

Latest Hacking News Articles

Latest Hacking News Articles Obama's and Fox News Twitter accounts Hacked By 18 year old. n 18-year-old hacker with a history of celebrity pranks has admitted to Monday’s hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama’s, and the official feed for Fox News. The hacker, who goes by the handle GMZ, told Threat Level on Tuesday he gained entry to Twitter’s administrative control panel by pointing...

How To Download Youtube Videos

How To Download Youtube Videos Free Web services for downloading videos from video-sharing sites ClipNabber allows you to download videos from YouTube, Metacafe, etc. by simply copying and pasting the URL. You'll then get a link whereby you can download the file to your computer, iPod, iPhone, or any other media player. You'll need to have an FLV player for the YouTube videos. Quick and very easy to use! Zamzar is a free online file conversion...

Recover Lost Data from The Sim Card

                 Recover Lost Data from The Sim Card 1. Free to download Data Doctor Recovery - Sim Card and install it . Connect your sim card reader on port and insert sim card in it. 2. Click the Data Doctor Recovery - Sim Card desktop icon (or select from the Windows programs list) to launch the product. The initial screen (below) is displayed.  3. Click on the Read Sim Card Icon....

How To Remove New Folder Virus

How To Remove New Folder Virus What is Newfolder.exe? The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono. This virus is very difficult to eliminate manually, but you can find several possible methods of removal below. How to fix Newfolder.exe? Quick Solution: True Sword will find and eliminate this problem and more...

All SQL Injection Strings

All SQL Injection Strings(Education Purpose Only) These strings can be used to hack any vulnerable website having SQL at backhand. Admin-- ' or 0=0 -- " or 0=0 --  or 0=0 --  ' or 0=0 #  " or 0=0 # or 0=0 # ' or 'x'='x " or "x"="x  ') or('x'='x ' or 1=1-- " or 1=1--  or 1=1-- ' or a=a--  ' or 'a'='a  " or "a"="a ') or ('a'='a ") or ("a"="a hi" or "a"="a  hi" or 1=1 --  hi' or 1=1 -- hi' or 'a'='a hi') or ('a'='a  hi") or ("a"="a  Here are the strings through...

Get Orkut Scraps Through SMS

Get Orkut Scraps Through SMS If you are thinking about, who written what in your Orkut Scrap Book and if you don‘t have access of Internet, this problem can be solved by getting all new Orkut Scraps in your mobile directly. To get Orkut Scraps in your mobile through SMS you need to do following things Step 1. Join mobee.in , and submit your mobile number. By joining mobee.in you will get an email ID something like this <your mobile number>@mobee.in. Any email received at this email ID will be forwarded to you mobile number through...

Delete an Undeletable File In Windows

Delete an Undeletable File In Windows In Windows XP, there are a couple ways to remove an undeletable file, a manual way, and a couple automated ways using some freeware programs. First, I'll show you the manual way. If you already know the path to the file, please skip to Step 7  1. Click on Start, Search, All Files and Folders 2. Type the name of the undeletable file in the box shown  3. Make sure the Look In box shows...

To install Windows Server 2003

To install Windows Server 2003 1. Insert the Microsoft Windows Server 2003, Enterprise Edition CD-ROM into the CD-ROM drive. 2. On the Welcome to Microsoft Windows Server 2003 screen, select Install Windows Server 2003, Enterprise Edition. 3. On the Welcome to Windows Setup page on the Windows Setup dialog box, select New Installation in the Installation Type list, and then click Next. 4. On the License Agreement page on the Windows Setup dialog box, read the license agreement. To proceed, you must select I Accept This Agreement. Click Next. 5....

Reasons Why Pc Crashes

                  Reasons Why Pc Crashes 1. Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.  2. Bad Ram Ram (random-access memory) problems...

GPRS Settings For All Mobile Networks

GPRS Settings For All Mobile Networks Get free GPRS settings for any operator/mobile in world on Your Mobile Phone: Free GPRS settings: Most of people have face problems regarding gprs settings on their mobile phones. I have been getting lots of mails about how to configure and where to get gprs setting, So here are most of gprs settings for most of mobile service operator (India). Here you have manual gprs settings for vodafone, hutch,idea, airtel, bsnl, airtel live, airtel mobile you can enter in your phone and configure. Reliance...

Online Banking Tips From Bishal obroy

Online Banking Tips From Bishal obroy Online banking is the latest or should say fastest way for banking these days. People go for online banking for money transfer and more other purposes. But as online banking provides us great features for banking in quite simple and fast way but along with that it made very gud chances for hackers to steal money in a many ways. From last 5 years there are enormous cases found of hacking of bank account...

How Hacker‘s Hide Files In Jpeg Pics

How Hacker‘s Hide Files In Jpeg Pics Storm allows you to hide your confidential files and compressed folders in regular JPEG picture files. Your information is encrypted and hidden inside the JPEG file without affecting the picture's appearance, quality or dimensions. Storm is very easy to use and it does not require a password. It is compatible with all modern Windows versions and it is distributed as freeware.  Requirements: Pentium...

Hack To Find Any Software Serial Key

Hack To Find Any Software Serial Key Ok, this is a little trick that i usually use to find cd keys with Google. If you‘re looking for a serial number for Nero (for example) go to google.com and type Nero 94FBR and it'll bring it up this works great in Google. HOW DOES THIS WORK?  Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By...

Tips From World‘s Top Most Antivirus Compay

Tips From World‘s Top Most Antivirus Compay Enjoy Nortan‘s Top 10 Computer Security Tips, the following are summaries those generally regarded as the most valuable: 1. Use plain old common sense. When in doubt, err of the side of safety. Delete email attachments from people you don‘t know (WITHOUT opening them!). Beware especially aware of tempting animations on unprofessional-looking sites. Keep an eye out for strange links or attachments in Instant Messaging (IM) programs—they just might contain malicious code. 2. Still use floppies? Scan...

Recover Gmail Accounts Through SMS

Recover Gmail Accounts Through SMS First of all..I would like to say that Gmail is out of Beta..yep..After a long time when they have integrated the best of world in their email system,it was the right time to rip off the tag,and they did it.Further,with the world going mobile,they took some of the steps to better enhance the security even a notch above than other email services. It helps to know that even the best of us forget our passwords...

How To Delete Your Recycle Bin

How To Delete Your Recycle Bin If you're like me, you appreciate the clean desktop that XP offers. Unfortunately, one item remains: the Recycle Bin. You can't get rid of it through any menus or anything like that. After much hacking around in the registry, I finally found the responsible key. Simply Go Registry by typing regedit in run and following path and delete this HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersio n\Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA00 2F954E} and restart. When you restart, the Recycle...

Hack Password Through USB Pendrive

Hack Password Through USB Pendrive Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools...

How To Convert Pdf to Ms Word

How To Convert Pdf to Ms Word Here is a software which can be help you to convert your PDF file to word.doc .The software is which do this for you and FREE is SolidConverter PDF. SolidConverter PDF is a flexible conversion tool for converting all or part of Adobe® Acrobat® PDF files to a Microsoft Word (DOC), rich text format (RTF) document, or plain text. You can also use SolidConverter PDF to extract images from a PDF file.  There are two primary methods for document conversion: Wizard Conversion. The wizard walks you through the...