
Howto Compile Source Code on Ubuntu
./configure make sudo make install The above 3 comands work for most of the softwares. If doesn't, go for read me file. Related articles How to Hack webisites using IIS exploit (globalsoftbay.tk) Hang Someone...
Tech tips and explorations
./configure make sudo make install The above 3 comands work for most of the softwares. If doesn't, go for read me file. Related articles How to Hack webisites using IIS exploit (globalsoftbay.tk) Hang Someone...
Download Update kb2581464 from official website. Select the Windows version (32 or 64 Bit) and enter email address to request download link on email. Click Start, type regedit in the Start Search box, and...
In this tutorial I will show you the attackers approach of simply hacking a software with just basic understanding of Assembly. All you need is Olly dbg(v 1.10) and Winrar(any version). Our target is...
How to resolve this error:Make sure your fields datatype match.They both should have exactly the same datatype and length.Eg. INT(4) Unsigned isn’t the same as INT(11) Also make sure if you have data in...
Generally we use sudo apt-get install PackageName for installation. But in this way, all the recommended dependencies will be installed thereby increasing the size of installation. So, in order to download and install only required dependencies, use...
In my older post, I have posted how to Download Torrents via HTTP Direct Links without Seedbox Here is similar but an extension which is currently working. 1. Go to the website www.torcache.net and upload...
Install using the below command. sudo apt-get install pysdm After installation, open Storage Device Manager. Once running, from the left hand side panel choose the partition you want to be mounted on startup (expand the hard...
Well, this "SEGMENTATION FAULT" error encountered me and my friends while doing network programming in C on a Linux platform. Cause for this error : A segmentation fault occurs mainly when our code tries to...
Main() is actually defined in the libraries as int main() but not as void main() . This is the main reason we should use it with return type int. Even the ANSI standards suggests...
Problem : code : #include <stdio.h> #include <string.h> int main() { int n; char buff[100]; memset(buff,0,sizeof(buff)); printf("Enter a number:"); scanf("%d",&n); printf("You entered %d \n",n); printf("\n Enter a name:"); fgets(buff,sizeof(buff),stdin); printf("\n The name entered is...
document.onkeydown = function() { switch (event.keyCode) { case 116 : //F5 button event.returnValue = false; event.keyCode = 0; ...
To day I just came across a situation in which I have to search for a file/ folder but i don't know the path and full name. So, in these situations geenrally we go...
IMAGE TO DOCUMENT CONVERTER : If you have software installed Microsoft One Note is bundled with Microsoft Office 2007, then you can copy text in the image file. Because this software has the facility Copy Text...
Mobile broadband providers have seen a spike in Internet access since smart phones started taking the world by storm. There was tough competition amongst smart phone providers. But three main smart phones made it...
What is Defragmentation ? Defragmenting hard drive is nothing but a group of files to rearrange each file that is out of place in consolidated and organize files again. Then when you need a certain...
Now a days,people are linking some text directly to a profile page or a webpage etc etc,. I wondered how..? This is like href in html. At last i found it somewhere and posting here. :P...
An Android developer recently discovered a clandestine application called Carrier IQ built into most smart-phones that doesn't just track your location; it secretly records your keystrokes, and there's nothing you can do about it. What is...
Yes, Now you can actually hack some websites using IIS. Open My computer and right click any where and select add network location. Press NEXT Click on "Choose a custom network location" and hit...
WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses within WordPress installations. Its intended use it to be for security professionals or WordPress administrators to...
Make Artistic Sketch Tools > Effects and Filters > Video Effects > Image Modification > check on Gradient Add Logo / Watermark on Video This is temporary. Tools > Effects and Filters > Video Effects...
If you have physical access to the PC you wanna hang, then this method is possible. Or else if you even mail the file with the following code, Shit happens :D Open Notepad(Start >...
If you're using BitTorrent without taking special measures to hide your activity, it's just a matter of time before your ISP throttles your connection, sends you an ominous letter, or worst case, your ISP...
Go to Your Page which have URL like this Facebook.com/<username> But here we need code. So open your Page if you are admin click on Edit Page in the URL box it will show id Paste your Code replacing red...
Here is a list of some antiviruses and their procedures to update off line. Avast Download http://files.avast.com/iavs5x/vpsupd.exe Run this .exe file to update the antivirus Avast. This off-line update will work only if a...
First of all , Install Package through terminal . sudo apt-get install --no-install-recommends gnome-panel If done , Create your first desktop icon through following command. gnome-desktop-item-edit --create-new ~/Desktop To create one more, type above...
The following article will teach you how to build a firewall with Intrusion Detection Prevention Capabilities built in. For more details check out this link. Building a better firewall ...
Check out this link for complete guide. http://lifehacker.com/5857721/how-to-build-a-chrome-extension?utm_source=Lifehacker+Newsletter&utm_campaign=c02bdaca9d-UA-142218-1&utm_medium=email If you enjoyed this post, make sure you subscribe to my RSS feed! Comments are encouraged...
We can actually change the keys functionality of each and every key in either Windows or Linux. This is called Remapping. In this post I will discuss about the Windows Remapping. There are 3...
1) Open the Windows Registry 2) Navigate to the following Registry key in the folder browser on the left. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout 3) Right-click on Keyboard Layout and select New > Binary from the context menu....
Applications to join Facebook Fellowship Program are open now and this year Ph.D. students studying at international universities can also apply in addition to applications from Ph.D. students studying in the United States. Facebook accepts...
I've been Googling and searching everywhere on the internet for the ways to hide my mac address. Finally I got many solutions. but here is the most optimum one. First point to keep in...
Specialty : average laptop computer with windows Or any LINUX operating system and a standard DSL connection. are enough. ! :D How it works : Open command prompt.Change the prompt directory to the drive in which you have...