Hacking stuff, cell phone stuff, computer stuff : - TopicsExpress



          

Hacking stuff, cell phone stuff, computer stuff : twitterpasswordrecoveyplease.wordpress/ . Everything you will need to help yourself & us **** ONLY to shut down myredbook, other ch*ld m*lester, and r*pe women sites ***** ******NOT***** to hack ANYTHING we use or ANYTHING that Karen Watson uses : Part 2 __________ Seriously add sound to jpgs with this ( have used this & it works ) SoundPix Plus bestshareware.net/download/soundpixplus.htm Use the free trial Leave a Comment Filed under Uncategorized · 10:59 am An android app that adds audio before & after the picture Audio Photos Free https://play.google/store/apps/details?id=com.edwardkim.android.audiophotosfree&hl=en Leave a Comment Filed under Uncategorized · 10:56 am How to add music to a photograph in Adobe Elements Organizer? (Audio Caption in a Photograph) photoshopelementsbyadobe.blogspot/2011/04/how-to-add-music-to-photograph-in-adobe.html Leave a Comment Filed under Uncategorized · 10:44 am Merge pictures together Picture Merge Genius download.cnet/Picture-Merge-Genius/3000-2192_4-10430962.html Leave a Comment Filed under Uncategorized · 10:42 am Remove exif or metadata from pictures. verexif/en makeuseof/tag/3-ways-to-remove-exif-metadata-from-photos-and-why-you-might-want-to Leave a Comment Filed under Uncategorized · 10:33 am Three sites to “improve” pictures & to make sure pictures are not identified as fake ( even though they are fake ) Befunky pixlr ribbet Leave a Comment Filed under Uncategorized · 10:02 am Find out what year picture taken, what kind of camera used, how many megapixels, where picture was taken , and if a picture is fake ……. Jeffreys exif viewer regex.info/exif.cgi Leave a Comment Filed under Uncategorized November 11, 2013 · 10:00 am Find out if pictures are fake or not by using google images , or Tineye . Just upload the picture tineye/faq , tineye/ google/imghp Leave a Comment Filed under Uncategorized · 9:32 am With a rooted android device / phone, some people may be able to get free internet using…..(100 MB per day limit ) Droidvpn play.google/store/apps/details?id=com.aed.droidvpn&hl=en droidvpn/ Leave a Comment Filed under Uncategorized · 9:19 am Another app for android , a store, where you can get everything for free Aptoide Leave a Comment Filed under Uncategorized · 9:18 am How to hack your neighbors wifi & get their password. Pretty easy youtube/watch?v=GylyLNT8pQE go to change adapter settings wireless internet connection version 4 use the following ip address properties 192.168.1.4 255.255.255.0 292.168.1.1 use the following dns server 0.0.0.0 0.0.4.4 ping 192.168.1.4 type in 192.168.1.4 into url admin admin interface setup wireless Leave a Comment Filed under Uncategorized · 6:39 am How to use Cydia appadvice/appnn/2008/07/how-to-use-cydia-a-walkthrough Leave a Comment Filed under Uncategorized · 6:36 am Cydia by Saurik, for ( apple ) & jailbreaking . Things you will need, even for second generation cydia.saurik/ evasi0n/ blog.iphone-dev.org/tagged/redsn0w jailbreakeye/jailbreak/jailbreak-ipod-touch-4g-3g-ios-4.2.1-greenpois0n wikihow/Jailbreak-a-2nd-Generation-iPod-Touch guidemyjailbreak/jailbreak-ipod-touch-2g-421-mb Leave a Comment Filed under Uncategorized · 6:27 am 1 click rooting of android and super user oneclickroot/ srsroot/ unlockroot/unlockroot.html redmondpie/kingo-android-root-is-a-true-one-click-root-solution-for-various-android-devices Leave a Comment Filed under Uncategorized November 11, 2013 · 6:13 am Where to read about female hackers computersciencedegreehub/10-notorious-female-hackers Leave a Comment Filed under Uncategorized · 6:12 am Veracode, in our opinion better explained hacking types etc veracode/security/man-in-the-middle-attack veracode/security/xss veracode/security/ldap-injection Leave a Comment Filed under Uncategorized · 6:09 am record my call, an android app Do *not* know of any laws that tell you the decibel level at which you must tell someone that you are recording the call Leave a Comment Filed under Uncategorized · 6:07 am About ting, a cell phone & data company that may be cheaper than virgin mobile, boost mobile, metro pcs etc Ting /ting/devices/buy https://ting/devices/bring Leave a Comment Filed under Uncategorized October 24, 2013 · 9:05 pm About ssh tunnels chamibuddhika.wordpress/2012/03/21/ssh-tunnelling-explained revsys/writings/quicktips/ssh-tunnel.html linuxjournal/content/ssh-tunneling-poor-techies-vpn engadget/2006/03/21/how-to-ssh-tunnels-for-secure-network-access howtogeek/118145 Leave a Comment Filed under Uncategorized · 8:27 pm What is the deep web, from wikipedia en.wikipedia.org/wiki/Deep_Web Leave a Comment Filed under Uncategorized September 25, 2013 · 11:55 pm Self destructing email , self destructing notes, and self destructing messages www dot self-destructing-email dot com, privnote dot com, www dot destructingmessage dot com Leave a Comment Filed under Uncategorized August 22, 2013 · 1:09 am Other ways of searching, other than using icare data recovery / c drive recovery , or something like recuva. Use your own computer, and the start function : windows 7 windows.microsoft/en-us/windows7/find-a-file-or-folder windows.microsoft/en-us/windows7/advanced-tips-for-searching-in-windows Leave a Comment Filed under Uncategorized August 20, 2013 · 7:59 pm Fireforce 2.2 , brute-force attacks on GET or POST forms https://addons.mozilla.org/en-us/firefox/addon/fireforce Leave a Comment Filed under Uncategorized · 7:52 pm Add greasemonkey to firefox, using add-ons. Customize way web pages look and function ” Greasemonkey is a Firefox extension that allows you to customize the way webpages look and function. “ greasespot.net/ Leave a Comment Filed under Uncategorized · 7:40 pm Changing the HTTPS setting in google chrome to http https://support.google/mail/answer/74765?hl=en Leave a Comment Filed under Uncategorized · 7:38 pm How do I make firefox use http instead of https? https://support.mozilla.org/en-US/questions/959914 Leave a Comment Filed under Uncategorized · 7:31 pm To get the page source of a website Right click on the page , scroll down to view page source Leave a Comment Filed under Uncategorized · 7:28 pm Protect yourself from cybersquatting and fake web addresses & How to recognize phishing email messages, links, or phone calls microsoft/security/online-privacy/cybersquatting.aspx microsoft/security/online-privacy/phishing-symptoms.aspx Leave a Comment Filed under Uncategorized August 18, 2013 · 10:56 am Https with wireshark ? For wireshark, supposedly for https, go to edit,scroll to preferences ,click on + protocols, scroll to ssl, click on edit. Type in 10.88.229.196,443,http,c:\privateKey.Pem 443 http . Use port 443 Leave a Comment Filed under Uncategorized August 15, 2013 · 12:22 pm To find the certificate for yahoo, google,facebook,twitter, type google/, or twitter/, or facebook/ etc…… and then look for the yellow or green lock on the left side of the url. The url is the rectangular box with facebook/, or http;//twitter, or google/. Right click the lock ” A public key certificate, usually just called a certificate, is a digitally signed statement that binds the value of a public key to the identity of the person, device, or service that holds the corresponding private key. One of the main benefits of certificates is that hosts no longer have to maintain a set of passwords for individual subjects who need to be authenticated as a prerequisite to access. Instead, the host merely establishes trust in a certificate issuer. Most certificates in common use are based on the X.509 v3 certificate standard. Typically, certificates contain the following information: The subject’s public key value. The subject’s identifier information, such as the name and e-mail address. The validity period (the length of time that the certificate is considered valid). Issuer identifier information. The digital signature of the issuer, which attests to the validity of the binding between the subject’s public key and the subject’s identifier information. A certificate is valid only for the period of time specified within it; every certificate contains Valid From and Valid To dates, which set the boundaries of the validity period. Once a certificate’s validity period has passed, a new certificate must be requested by the subject of the now-expired certificate. Using Certificates Public and Private Keys Certificate File Formats “ Leave a Comment Filed under Uncategorized · 11:15 am About metasploit, from wikipedia en.wikipedia.org/wiki/Metasploit_Project anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized · 11:10 am How to install backtrack 5 on a pc ? Have *not* attempted this yet answers.yahoo/question/index?qid=20130204213129AAQrW0q anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized · 10:59 am SSLStrip A tool for SSL based MITM attacks, from 2011 thoughtcrime.org/software/sslstrip anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized · 10:53 am Man in the middle attack ; from wikipedia en.wikipedia.org/wiki/Man-in-the-middle_attack anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized · 10:50 am Https is almost same as ssl (HyperText Transfer Protocol) plus SSL (Secure Socket Layer) stackoverflow/questions/856209/difference-between-https-protocol-and-ssl-certificate anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized August 15, 2013 · 10:48 am Wireshark, a packet sniffing program has its own wiki wiki.wireshark.org/ and just for kicks, en.wikipedia.org/wiki/Wireshark anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to ) Leave a Comment Filed under Uncategorized · 5:13 am Cross script hacking html-xhtml-css.wonderhowto/how-to/hack-websites-using-cross-site-scripting-xss-160706 Leave a Comment Filed under Uncategorized · 3:03 am Other password ” crackers ” . Not sure, if, or how, they work freeze master cracker John The Ripper Staph Leave a Comment Filed under Uncategorized · 2:57 am How to Hack a Website with Basic HTML Coding. From Wikihow. Not sure of the date on this. Remove java script as well ? wikihow/Hack-a-Website-with-Basic-HTML-Coding anything we ever write / say on the internet / world wide web, for legal purposes, is speculation. By having this blog, in **** no **** way am I / are we, attempting to take credit for others work, or attempting to lay claim to anyones website , or works of any sort. ****** Much like when you write an essay, I / we have made every effort to give credit where credit is due ( like a footnote or bibliography ) *********** Also, we do not advocate violence of any sort. That means we are not implying, suggesting, or inferring any violence should be done to anyone or anything at any point. Moreover, we are ***** not ***** implying, inferring, or suggesting that it is ever o.k. to be involved in any criminal acts. (We write this, not because we ant to, but because we have to )
Posted on: Sun, 24 Nov 2013 08:14:24 +0000

Trending Topics



Recently Viewed Topics




© 2015