How to create Batch file viruses?

Posted Posted by hacking tips in Comments 0 comments





















What are Batch Files ?


According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,

What is Secure Sockets Layer (SSL)?

Posted Posted by hacking tips in Comments 0 comments















You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.

Hack Your Victim With ip address

Posted Posted by hacking tips in , Comments 0 comments

So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network. 

How to protect your computer from keyloggers?

Posted Posted by hacking tips in Comments 0 comments




Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have written couple of posts on keylogging and reviewed some of the best keyloggers available now a days
The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger.


Hack a computer remotely using Realtime spy

Posted Posted by hacking tips in Comments 0 comments

..............................................................................................................................................................

Photobucket

I get this question asked daily "How to hack a computer remotely" OR "How to install a keylogger in a remote machine".As we know that in order to install a keylogger we must have physical access to victims computer.There are lots of methods to gain physical access such as Netbios hacking ,Trojans, Rats etc.However these methods require alot of skill and its very difficuly for newbies to do it.Alternatively we use a keylogger(Remote installation supported).All we have to do is to make sure that the remote file gets installed into victims computer and your done.Below we will go through the necessary steps required to hack a computer remotely and install a keylogger.I will be using Realtime spy.