How to Configure your Web Browser to use TOR

Normally when we start Tor Browser, it opens a new window in Mozilla Firefox and you will be anonymous to sites, you open in that window. But sometimes we want that a particular browser whether it is Mozilla Firefox, Internet Explorer or Google Chrome to be permanently attached with Tor Browser. So that surfing in that browser will help us … Read more

BSNL Website hacked by Anonymous

Bsnl Main website www.bsnl.co.in was hacked by Anonymous India for protest against section 66A of IT Act. BSNL is an Indian state-owned telecommunications company, the largest provider of fixed telephony and fourth largest mobile telephony provider in India, and is also a provider of broadband services.Hack was performed by Anonymous India hacking group and claiming to hack whole server, with 250 Databases. … Read more

How to Hack Gmail, Facebook and Yahoo Ids (Phishing)

Many people ask me that they want to hack Gmail, Facebook or yahoo id’s of their friends. Today I am sharing with you the concept of Phishing. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the hook inside it takes the complete fish out … Read more

Hacking Websites Through Sql Injection

The Most Common Question People often ask from me related to hacking is How Hackers Hack our Websites. Today I am Telling You a Very Important Technique to Hack Websites With a Demo.The Technique i will use is Sql Injection. SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application … Read more

Restrict Access to any Folder or File Without using any software or password

You may have seen may software to lock the folder/files and you may also have seen batch programs to do the same. Today I am going to share with you a Basic Dos Command which will help you to Restrict Access to Folder/File. The only thing you need for this is the Administrator Access on Windows Machine. Follow the Below … Read more

How to Hide Your IP Address (IP Spoofing)

One of the Important point in Hacking is Hiding yourself from target, So that nobody can trace your Location or any other information. So the Most important task the Hackers perform while attacking a target is to hide their IP Address. By Hiding the IP Address it means that the IP Address detected by servers or other people will be … Read more