Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, I have written a couple of post related to facebook hacking here at RHA, In my previous post which I wrote in 2010 related to facebook hacking and security 4 ways on...

Get Paid to Hack Your TouchPad to Run Android

৮/২৮/২০১১ ০৫:৫১:০০ PM | , , | 0 comments »

After HP announced it would discontinue production of its TouchPad tablet last week, it looked like early HP tablet adopters spent $500 on a dud. If you’re an enterprising software hacker, however, there could be an opportunity to make your money back — and then some. A hardware-modification web site is offering a $1,500 cash bounty for...

Format A HDD With Notepad

৮/২৮/২০১১ ০৫:৪৮:০০ PM | , , | 0 comments »

If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool. Step 1 :- Copy The Following In Notepad Exactly as it is. says01001011000111110010010101010101010000011111100000 Step 2 :- Save...

Chat with Friends through ms dos Command Prompt

৮/২৮/২০১১ ০৫:৪৬:০০ PM | | 0 comments »

1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and...

Find Who is invisible or blocked you on Google Talk

৮/২৮/২০১১ ০৫:৪৫:০০ PM | | 0 comments »

Steps to find who is invisible or blocked you on gtalk : 1) Download & Install Pidgin Click here to download Pidgin chat client. If you already have Pidgin installed, you may skip this step. 2) Configure Pidgin for Gtalk You’ll probably start with the below screen. Click the Add button. “Accounts -> Manage Account” will also bring...

Password Hacking

৮/২৮/২০১১ ০৫:৪৪:০০ PM | | 0 comments »

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will...

Network Hacking

৮/২৮/২০১১ ০৫:৪৩:০০ PM | , | 0 comments »

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to...

Denial Of Service (DoS) Attacks

৮/২৮/২০১১ ০৫:৪১:০০ PM | | 0 comments »

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:- 1)...

Creating IM Bot

৮/২৮/২০১১ ০৫:৩৮:০০ PM | | 0 comments »

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients. To get started, all you need to know are some very basic programming skills (any language would do) and...

Running Multiple Instances of Google Talk

৮/২৮/২০১১ ০৫:৩২:০০ PM | | 0 comments »

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that’s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut. Ability to polygamy running multiple Google Talk is useful if users have multiple...

Rapidshare Hack

৮/২৮/২০১১ ০৫:৩১:০০ PM | | 0 comments »

There are two hacks to beat Rapidshare download limits and waiting time. 1) Rapidshare Hack (For Firefox Users) :- The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing...

Sitemeter Hack – Hide Visual Tracker (Counter)

৮/২৮/২০১১ ০৫:২৯:০০ PM | | 0 comments »

Sitemeter, one of the best traffic counter for websites/blogs, it shows online users, Referrals (From where people coming to your site), country locations, browser etc etc.. all in detail. This counter is visible to all visitors. Invisible Counters (Tracker) is available for Premium Accounts Only…! But you can easily hack to hide it. Its...

Vodafone Hack For Free GPRS

৮/২৮/২০১১ ০৫:২৮:০০ PM | , | 0 comments »

This method has been tested on different mobiles and has been confirmed to be working. Followng are the Settings you require to configure on your Mobile: Account Name: Vodafone_gprs Homepage: http://live.vodafone.in User Name: (no need) Pass: (no need) Access Point Settings :- Proxy: Enabled Proxy Address: 10.10.1.100 Proxy Port: 9401 Data Bearer: Packet Data Bearer Settings :- Packet Data Access Point: portalnmms Network type:...

Latest Airtel Hack

৮/২৮/২০১১ ০৫:২৭:০০ PM | , | 0 comments »

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly. Only 24 hours and the cost is Rs.25.00 Oh GOD!! But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good. Just follow the Trick- 1) Your account balance should be above 25.00 for the first time. 2) Activate your mobile office by dialing *444*1#. You...

Facebook Hack – View photo albums of non-friends

৮/২৮/২০১১ ০৫:২৩:০০ PM | , | 0 comments »

A new facebook exploit allows anyone to access any photo album of non-friends as long as you have the link. By following the simple steps shown in above image, you can bypass the security of Facebook and view photos of others onli...

How to Identify and Avoid Phishing Scams

৮/২৫/২০১১ ০৪:৪৭:০০ AM | | 0 comments »

  Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying...

Cell Phone Spy: Software to Spy on Cell Phones

৮/২৫/২০১১ ০৪:৪২:০০ AM | , , | 0 comments »

How to Spy on Cell Phones  Is Someone Holding Secrets from You? Reveal them All with the World’s Best Cell Phone Spy Software!  Today, there exists hundreds of cell phone spy softwares on the market, where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each...

How to Write-Protect Your USB Flash Drive

৮/২৫/২০১১ ০৪:৩৮:০০ AM | | 0 comments »

   Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread...

How to Trace Mobile Numbers (india only)

৮/২৫/২০১১ ০৪:৩৭:০০ AM | , | 0 comments »

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes...

  If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but...

How to Install Windows 7 From a USB Drive

৮/২৫/২০১১ ০৪:২৩:০০ AM | | 0 comments »

  Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD...