tag:blogger.com,1999:blog-18229046054214060562024-03-19T01:30:35.912-07:00The Hackers GuideAll about Hacking,tools,Network Security Tools,Ethical Hacking, Penetration Testing & Computer SecurityYogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.comBlogger72125tag:blogger.com,1999:blog-1822904605421406056.post-82909538921805077232011-03-05T13:58:00.000-08:002011-03-05T14:18:02.041-08:00Call phones from Gmail- Calls from PC to Phone with Google Talk ~~~~ Now in India ~~~~Free International Calls from PC to Phone with Google Talk and Talkster (GTalk-to-VoIP)
Google has officially unveiled its new Google Mail or Gmail phone call service, with free phone call service applicable for calls to U.S. and Canada destination. With this new service, users could dial a phone just like a normal phone and able to call people to virtually anywhere in the world from the web Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-8683598009966451922011-03-05T12:48:00.000-08:002011-03-05T12:48:31.759-08:00Google To Shut Down Gizmo5 On April 3
Back in November 2009 Google acquired Gizmo5, a powerful VoIP telephony service that allows users to place and receive calls from their computer and mobile phone applications. Today, the company has started informing users that it will be shutting down Gizmo5 service on April 3, 2011.
Since acquiring the startup, Google has integrated Gizmo5 technology into Gmail/Gtalk, which has allowed users Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-24985137501412236852011-02-25T23:01:00.000-08:002011-02-25T23:01:18.596-08:00How to Recover Hacked Email Accounts?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-56728707386133154322011-02-19T10:11:00.000-08:002011-02-19T10:11:11.428-08:00How to Protect Your Computer from Keyloggers Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:Use a Good AntivirusThis is the first and basic step that you need to take in order to Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-48247827293476835222010-11-30T14:29:00.000-08:002010-11-30T14:29:02.089-08:00Google Earth 6: Better Street View and 3D TreesGoogle Earth 6 doesn't have too many new features. You can now use Street View just like in Google Maps by dragging the pegman icon. "To view street-level imagery for a specific location, zoom into an area at an altitude of approximately 500km. You will see a pegman icon appear at the top right below the navigation controls. Click and drag the icon across the 3D viewer. A blue border will appear Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-37757102029077327062010-11-28T11:08:00.000-08:002010-11-28T14:18:40.300-08:00How to hack facebook accounts or passwordsHello friends welcome again, Today i am going to show you the way "How to hack Facebook accounts or passwords". So guys read on..
Today I will tell you the latest approach of Hacking Facebook Passwords or Accounts i.e "Smart Phishing with Email trap". And guys you will be surprised to listen that what is the victim's trap ratio in Smart phishing trap is above 70% means , at least 70% Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-30737195569925080212010-11-27T04:56:00.000-08:002010-11-28T14:19:50.125-08:00File transfer in iGoogle and orkut chatHave you ever wanted to quickly send a file to a friend whom you're chatting with online? Starting today, you can share photos, documents, and other files while chatting in iGoogle and orkut. To give it a try, just click Send a file... in the Actions menu while chatting with a friend (no download required):
This feature is also compatible with the file transfer Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-35746823408679619442010-07-17T21:43:00.000-07:002010-11-28T14:20:36.102-08:00Rupee symbol font, Download nowPeople are excited and searching for the technique how they can use the Indian rupee font symbol in their writings now. Here is the method by which you can download the Indian rupee font just in seconds can start using the same.The blog Foradian has revealed a step t step process on how to download a Rupee .ttf font. The blog claims that “We have made the first font with support for Indian Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-6878136385513415252010-04-21T11:55:00.001-07:002010-11-28T14:21:11.041-08:00How to Hack Windows Administrator PasswordThis hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-83531961729544738982010-04-21T11:47:00.000-07:002011-02-19T10:59:57.026-08:00How to Block Unwanted EmailsDo you want to block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-stepYogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-91638625518137181412010-04-21T11:15:00.000-07:002010-11-28T14:24:12.425-08:00Google Focusing on Online Video FutureAs you should remember, Goggle has purchased On2, the video codec company, not so long ago. This made many open source proponents hope that Google is going to release On2’s technology to the public as patent-free and open source. That was determined by the fact that On2 had earlier donated the code from another codec to Ogg Theora, which is a video open source project, and possibly could do that Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-3566358901827449202009-09-22T09:09:00.000-07:002010-11-28T14:27:08.380-08:00Customize your Firefox with useful Add-ons!This post deals with a few useful Firefox Add-ons, which makes your Firefox more comfortable than before.Tiny Menu:If you are not using the menu bar frequently and you feel that the menu bar is occupying more space in your browser, then you can shrink it with this add-on. It will help to replace the standard menu bar in Firefox with a single popup icon in the menu bar. Customization on menu to beYogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-31588175179079172712009-09-22T09:00:00.000-07:002009-09-22T09:05:15.884-07:0012 Tips to Maintain a Virus Free ComputerIs your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-8623288128439299012009-09-05T10:33:00.000-07:002009-09-05T11:10:09.748-07:00How to Protect an Email Account from being Hacked Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-84202715132130883682009-09-05T10:24:00.000-07:002009-09-05T10:33:30.582-07:00How to Protect an Email Account from SPAMMost of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about howYogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-53656063726390753632009-08-26T09:26:00.000-07:002009-08-26T09:28:45.246-07:00Stoned Bootkit – Windows XP, 2003, Vista,What is Stoned Bootkit? A bootkit is a boot virus that is able to hook and patch Windows to get load into the Windows kernel, and thus getting unrestricted access to the entire computer. It is even able to bypass full volume encryption, because the master boot record (where Stoned is stored) is not encrypted. The master boot record contains the decryption software which asks for a password and Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-32002714279876499992009-08-12T12:13:00.000-07:002009-08-12T12:24:43.154-07:00About ISRO’s Bhuvan About BHUVAN Bhuvan gives you an easy way to experience, explore and visualize IRS images over Indian region ISRO is well known amongst space faring nations for its world-leading reputation in developing new, indigenous and innovative service oriented applications using remote sensing technology. Over the past 2 decades, ISRO has mastered the art ofYogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-64502312851122757082009-08-12T10:30:00.000-07:002009-08-12T10:34:01.067-07:00Bhuvan ISRO Website - bhuvan.nrsc.gov.in - Bhuvan 3D ToolThe Indian Space Research Organisation (ISRO) official website of Indian Earth Observation and Visualization is www.bhuvan.nrsc.gov.in, Today (12 August, 2009) the Beta web 3D tool announced. It is very useful to anybody see the full coverage of Indian Region. The web tool is discover and explore earth in 3D space with specific emphasis on Indian region.Minister of State in the PMO Prithviraj Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-37387290080353476172009-07-31T11:13:00.000-07:002009-07-31T11:15:57.671-07:00SQLMAP 0.7 Released – Automatic SQL Injection ToolWe’ve been following sqlmap since it first came out in Feburary 2007 and it’s been quite some time since the last update sqlmap 0.6.3 in December 2008. For those not familiar with the tool, sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. <!--adsense#New468--> Once it detects one or Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-79169602867746247872009-07-24T20:09:00.000-07:002009-07-24T20:12:46.525-07:00A Virus Program to Disable USB Ports In this post we will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). C programming language used create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program. Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-16325617988197847752009-07-12T08:53:00.000-07:002009-07-12T08:54:25.194-07:00Latest Proxies for Free Airtel GPRSI have got a lot of comments that the settings for free Airtel GPRS that I had posted earlier doesn’t work. So I have found out another hack to get free GPRS on Airtel. The following settings have been tested in different States and are found to be successfully working on most of them. I have got 2 settings which you can tryout to see if any of them works for you. First IP Address :: Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-87635536250873982242009-07-09T11:24:00.001-07:002009-07-09T11:24:43.256-07:00r6x9pzeyc5r6x9pzeyc5<!--Session data-->Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-35151445040612581242009-07-09T10:54:00.000-07:002009-07-09T11:18:37.306-07:00Domain Hijacking – How to Hijack Domain NamesIn this post We will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about. Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-62696575915337168362009-06-27T11:48:00.000-07:002009-06-27T11:53:03.394-07:00Create One-Click Shutdown and Reboot ShortcutsThis is really very easy one but very effective one. Enjoy it! First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC. But you can do much more with a Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0tag:blogger.com,1999:blog-1822904605421406056.post-18227766657224718842009-06-27T09:12:00.000-07:002009-06-27T09:14:43.030-07:00Super Bluetooth Hack 2008(Latest Version)This is a New Version of Super Bluetooth Hack for Conventional and Mobile-based Symbian. This program through MDM can be used to control other people’s mobile phone at a distance (10-15 metres, it’s Then) Super Bluetooth hack New 2008 More in New Version : 1) Connect via BT/Irda2) Reading SMS3) Changing time/alarms4) Pressing keys… What else can you do once connected to a another phone via Yogesh Guptahttp://www.blogger.com/profile/05949873434311975401noreply@blogger.com0