Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

how to hide Text Message in any image file.

Hi Guys. This is an awesome trick and very easy onetoo. IF you wishto send a text message to you friendsprivately or youyourself want to hide a text message in image file then thisarticle will help you a lot.After hiding the message in a image filethere will be nodamage to the file just the size of […]

Continue reading

Keystroke logging

Keystroke logging, often referred to askeylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.It also has very legitimate uses in studies of human-computer interaction. There are numerous […]

Continue reading


Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge.“Spyware” is mostly classified into four types: system monitors, trojans, adware, and tracking cookies. Spyware is […]

Continue reading

Network Spoofer

Anyone ever heard of Network Spoofer Android? Network Spoofer is an application or software for Android that lets you mess fiddling with network and internet access. For example, you want all of the images that appear in a wifi network that you connect your internet is that you upload an image or images that you […]

Continue reading

How to Hack Wifi network:-

—————————————–1) First we need to scan for available wireless networks.Theres this great tool for windows to do this.. called “NetStumbler” or Kismetfor Windows and Linux and KisMac for Mac.The two most common encryption types are:1) WEP2) WAPWEP i.e Wire Equivalent Privacy is not consideres as safe as WAPi.e Wireless Application Protocol.WEP have many flaws that […]

Continue reading
1 30 31 32 33 34 36