Blog Archives

How to Configure your Web Browser to use TOR

Normally when we start Tor Browser, it opens a new window in Mozilla Firefox and you will be anonymous to sites, you open in that window. But sometimes we want that a particular browser whether it is Mozilla Firefox, Internet Explorer or Google Chrome to be permanently attached with Tor Browser. So that surfing in that browser will help us … Read more

BSNL Website hacked by Anonymous

Bsnl Main website www.bsnl.co.in was hacked by Anonymous India for protest against section 66A of IT Act. BSNL is an Indian state-owned telecommunications company, the largest provider of fixed telephony and fourth largest mobile telephony provider in India, and is also a provider of broadband services.Hack was performed by Anonymous India hacking group and claiming to hack whole server, with 250 Databases. … Read more

Producing Beeps Of Different Frequency in C++

Can you suppose that beeps of different frequency and duration be produced by C++ Program…Ya its possible to create beeps of different frequency through a c++ function and you would be amazed to hear that. Program to Echo Beep of frequency 500Hz…. Syntax: #include<windows.h> //A Header File used for windows programming main() { Beep(500,1000); //Beep(frequency_in _hertz,Duration_in_ms) } Note:Take care of … Read more

How to Hack Gmail, Facebook and Yahoo Ids (Phishing)

Many people ask me that they want to hack Gmail, Facebook or yahoo id’s of their friends. Today I am sharing with you the concept of Phishing. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the hook inside it takes the complete fish out … Read more

Hacking Websites Through Sql Injection

The Most Common Question People often ask from me related to hacking is How Hackers Hack our Websites. Today I am Telling You a Very Important Technique to Hack Websites With a Demo.The Technique i will use is Sql Injection. SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application … Read more

Most Famous and Disastrous Programming Bug (Y2K Bug)

The Year 2000 problem (also known as the Y2K problem, the Millennium bug, the Y2K bug, or simply Y2K) was a problem for both digital (computer-related) and non-digital documentation and data storage situations which resulted from the practice of abbreviating a four-digit(2000) year to two digits(00). Y2K was the common abbreviation for the year 2000 software problem. The abbreviation combines … Read more