World's top TEN hackers and what they have done

10. Loyd Blankenship


Loyd Blankenship does not have a hack that can be solely attributed to him. He was a member of the Legion of Doom, however, that rivaled the Masters of Deception, or MoD, during the late 80′s. Known as The Mentor, his claim to fame is authorship of The Hacker Manifesto, which he wrote after his 1986 arrest. It defended hackers, claiming that they only do it to satisfy their curiosity.

9. Stephen Wozniak


The co-founder of Apple started out as a hacker. While studying at the University of California, Berkeley, he bypassed the phone system by phreaking. This allowed him to make free long distance calls. He even used it to call world leaders like the Pope. Not long after, he started working with Steve Jobs to create Apple Computer.

Secure your Privacy From Hackers & Stealers

Reason of Hacking:

To hack your passwords the hackers mostly uses Stealer's and sometimes use phishing. Your antivirus not able to detect. ISR steals your all saved passwords in your web browsers. To become protected you have to change your web browser from Chrome to Mozilla Firefox. Because Mozilla Firefox provides best security plugins which protects you against Hackers.

List of top Hacking movies ever released


1.  Blade Runner (1982)

Blade Runner is a futuristic (for its time) film about a world where humans can create replicants of themselves.  When six replicants escape from an offworld colony to Earth, a special cop known as a Blade Runner must leave retirement to get them.

2. Tron (1982)

Tron is a true classic that you must see if you haven’t already (you’ve had 29 years, what’s your excuse?).  In Tron, a hacker is transported into the digital universe of “The Grid”, and must survive combat as a cyber gladiator in order to stop the villainous Master Control.  Make sure this is on your “to watch” list.


3. WarGames (1983)



WarGames is a movie about a young computer whiz kid who accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.  An original hacker film and one that invented hacker terminology still in use today.


Download anything in just one click try it yourself

Google Dorks:


1) Filetype: pdf "Topic Name"

diret download link of pdf files


2) "parent directory":/movies/hindi

diret download link of movies

Free SMS Sites without any registration

Friends enjoy free SMS sending without any regestration to any number in free


1) Foosms.com

2) afreesms.com

This will not work if DND service is activated

FBI Raids regarding a Hacking Tool ‘Blackshades’ took place all over the world Post by Anand Garg

Blackshades
Some posts on different hacking forums talk about a series of raids launched by the FBI and foreign police agencies that took place all around the world. These raids targeted individuals that were involved to a specific type of software, called Blackshades.

Gmail Security Post by Anand Garg

Gmail  is  the  world’s  most  secure  email 
provider  service as  compared  to  other.  When 
you send  an  email  to someone  the  mail  is 
fully encrypted. Only you and the sender can 
see  the  mail properly.  When  you  logins  to 
your  mail  id  it  doesn’t mean that  the  mail 
service is coming to you but actually you are 
going  to  the  server to  access your  mail  id. 
Gmail  is  the  only service  in  the  world  which 
provides  more  security  services   as  compared 
to  other  like  two  step  verification, don’t  ask 
on  this  system  again, brute  force or  captcha 
code, & security questions.

Windows 8 tips, tricks and secrets Post by Anand Garg

62 Windows 8 tips, tricks and secrets







Windows 8 tips, tricks and secrets


1. Open from the lock screen

It's all very straightforward, though. Just tap the space bar, spin the mouse wheel or swipe upwards on a touch screen to reveal a regular login screen with the user name you created during installation. Enter your password to begin.Windows 8 opens on its lock screen, which looks pretty but unfortunately displays no clues about what to do next.

BackTrack - Basic Usage Post by Anand Garg


Login to BackTrack

Once the BackTrack is Installed, the default username and password required to log in are root / toor.
NOTE: You will not be able to see the password as you type it.

GUI
·         After login give startx command.
·         Getting Networking to work
·         Setting your IP manually

We will first set up the networking manually. In the following example we will assume the following addresses and their purpose:

IP Address - 192.168.1.112/24
Default Gateway - 192.168.1.1
DNS server - 192.168.1.1.........more 



ALL PANETRATION TESTING TOOLS REQUIRED FOR ALL SECURITY PROFESSIONALS By Anand Garg

37 Powerful Penetration Testing Tools For Every Penetration Tester
Wouldn’t it be fun if a company hired you to hack its website/ network/ Server? Well, Yeah!!!
Penetration testing, commonly called as pen-testing is a on a roll in the testing circle these days. The reason is not hard to guess – with the change in the way computer systems are used and built, security takes the center stage. Even though companies realize they can’t make every system 100% secure, they are extremely interested to know exactly what kind of security issues they are dealing with. That’s where Pen-testing comes handy with its use of ethical hacking techniques....

Let us now quickly see:

Download and use Whattsapp on your computer post by Anand Garg

WhatsApp is the most popular and free mobile messaging application. You can easily send multimedia
files and text messages over the internet using WhatsApp. It supports almost every mobile device today.
 BlackBerry devices, Nokia Series 40, Symbian OS, Android, iPhone and Windows Phone are all the 
devices that can run WhatsApp. In addition to basic messaging you can create groups and can send
messages to these groups. You can send unlimited number of text messages, images, videos and audio
files. This article will teach you how you can easily download and run WhatsApp on your Windows or
Macintosh machine.

NOTE Scroll to the bottom of the article for full tutorial.

Top 10 Secret Features in Windows 8 Post by Anand Garg

Top 10 Secret Features in Windows 8SEXPANDWindows 8 is full of awesome features and handy shortcuts, but what you may not know is that it's got a lot of handy, lesser-known settings under the hood. Here are 10 of Windows 8's best kept secrets. PRELATED

BEWARE: List of websites making you fool in the name of Facebook Hacking post by Anand Garg

    facebook hacking tool
From many days, when I was exploring Google for any latest news related to hacks, i got a point that how many websites are there when you search for ‘how to hack a Facebook account, facebook hacking, fb hack, facebook online hack & many more…’ Really I was also shocked when I searched it and found many direct websites, blogs claiming to hack any of the Facebook account LIVE.

HOW TO PROTECT YOUR EMAIL ACCOUNTS FROM BEING SPAMMED - BY ANAND GARG

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of its creation. Many times we wonder where these spam come from and why? But this question remains unanswered within us. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.