Search This Blog

This is where I belong.

I was never intrested in the crap they teach us in college, because it bores me.

Naive Security – Free internet security suite.

Are you sure you are safe online?

About 2 Lakh Facebook accounts were hacked on 15-NOV-12, 250000 Twitter accounts were hacked on 1-FEB-13 at the same time New York Times was hacked.

Protect yourself and people around you from such threats by using our free internet security solution Naive Security. It will help protect your information and your different accounts while you access them through internet.

Download For free

  • Features:
  • Information Security.
  • Password Security
  • Prevention from scams.
  • Wireless security.
  • Data Encryption.
  • Online banking security.
  • Mobile banking security.
  • Online shopping security.
  • Online privacy.
  • Social account security.
  • Kids security
  • Protection against latest security threats.

Codesortie

Wednesday, 23 November 2011

Create a USB password stealer

hey friends, today i will show you how u can hack your friends passwords by just connecting your pen drive to his/her computer. As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As...

Monday, 21 November 2011

How to Login Any facebook Account without Password- Facebook Hack

hey friends today i m going to share a intresting technique by which you can access accounts of people within your network without knowing the passoword.The tool is called Firesheep, it is a firefox addon. http://codebutler.com/firesheep Firesheep When logging into a website you usually start by submitting your username and password. The server then checks to see if an account...

Thursday, 17 November 2011

keep your facebook account safe from hackers

hey friends, today many of us have read about fb accounts from banglore and mumbai got hacked. Many of my friends and may be you are also worried about your accounts. You can follow these steps to make your facebook account safe. 1. First and the most important step use FireFox Browser(i recommend updated version) goto menu and select "Private browsing" every time you login...

Wednesday, 16 November 2011

Complete Run Commands

More than 100 commands used in run window Press (Windows key)+R to start Run window and use the following commands.     Accessibility Options : access.cpl     Add Hardware : hdwwiz.cpl     Add / Remove Programs : appwiz.cpl     Administrative Tools : control admintools     Automatic Updates : wuaucpl.cpl    ...

See unprotected live cameras using google

This trick allows us to see unprotected cameras available in the google index. 1. Go to Google and search for "inurl:view/view.shtml" (without quote).  2. Now open any of the link from the search result and enjoy.  3. Below is the list of google dork you can use to see more cams.  GOOGLE DORKS inurl:/view.shtml intitle:”Live View / - AXIS” | inurl:view/view.shtml^ inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg...

Saturday, 12 November 2011

Mantra – Browser For Hackers

Mantra is a collection of free and open source tools integrated into a web browser(Firefox), which can become great tool for  Penetration Testers.Mantra is a powerful set of tools to make the attacker’s task easier. The beta version of Mantra Security Toolkit contains following tools built onto it. Moreover Mantra follows the guidelines...

Thursday, 10 November 2011

Using NetBus Trojan to Control a Remote Computer.

Hey friends, today I m Talking about the NetBus Trojan which can be used to control a remote computer. This is not a Complete NetBus Trojan Horse Tutorial but i will try to give you sufficient information about it. If you want some theory knowledge about the NetBus Trojan then you can visit the following link:  NetBus Trojan Horse Lets start,  1. First you need...

Tuesday, 8 November 2011

Access Blocked Sites.

This summary is not available. Please click here to view the po...

How to make Folders Inaccessible by everyone ?

Freinds here is one more trick which you can use to protect your data from others. In this article i will tell you how you can protect your folders by using command prompt. Just follow these steps: 1. Open cmd. 2. Change to the directory where your folder is located.       cd <dir_name> 3. cacls <directory name> /e /p everyone:n for...

Monday, 7 November 2011

Developing a Hacker’s Behaviour

Hey friends, many people want to be hackers, because of passion, for mischif, for revenge, etc everyone has their own reasons. To obtain the status of a Hacker, You Have To Want It, and You Have To Earn It. It is not something that can really be taught, it is only something you can learn for yourself, although I can attempt to help guide you. Although hackers are substantially...

Talk less Be Safe.

Friends you may find this part a bit boring or a bit theory type (not intresting), but if you want to be a ELITE hacker or any other computer professional then you must read this cause this is very important part. You may have got some idea from the title that you have to protect your information safe by talking less about your job profile. Human being is the most weakest...

Sunday, 6 November 2011

Protect yourself and family from Internet Scams and Frauds

hey friends there has been a lot of increase in the internet scams and frauds these days. You may think it will not happen to you, but what about your father, mother or brother or sister who are unknown to these frauds. This article is dedicated to prevent yourself and your family from different types of internet scams and frauds. The term Internet Scam or Internet Fraud...

How to Protect your Email Account from Being Hacked

Today one more friend of mine came to me and said that his email account has been hacked. Regaining access to such an account if a bit difficult thing even if the email sites are trying to prevent account takeover. Friends protecting your account from getting hacked if better than crying later, so today i m gonna tell you how you can protect your account from getting...

Using LTOOLS (Only for advance users - try it on your own risk)

 Hey friends, i got one request form one of my friend about how to access a linux partition from a windows on a Dual-bootable system(one having multiple operating systems). This article gives information about the LTOOL used for this. WARNING: Following tutorial is for people who have some deep knowledge of computers. New users please dont try this because you may end...

Lock a folder without any Third Party Software

Hey friends many times it happens that we want to hide or protect our files and folders from anybody else. Then you try to download some softwares from internet for this, many of these softwares are trial version, and if its crack is available it contains a virus or trojan. So I thought Why not create our own Folder locking Software?  I m here to help you, Just...

How Anti-Virus Do programs Detect Virus?

Hey friends, have you ever wonder how our Antivirus software scans for Virus, Worm, Trojan or what exactly happens in this process. We scan a Folder Or Local Drive for Virus at this time, the antivirus software which you use follow some techniques, today we gonna see some overview of these techniques. 5 Techniques used by Anti Virus Program to Detect Malware: 1.Signature...

Saturday, 5 November 2011

Creating Folders in Windows with name CON, PRN, AUX, NUL, etc.

     Hey friends, you must have created many new folders with different names but have you tried some names like CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more. It not allowed in windows.  So if you are thinking that why we are not allowed to do so,  here is the reason:-             con, prn, lpt1..lpt9, etc are underlying devices from the time dos was written. so if u r...

Friday, 4 November 2011

Commands for Windows

Hey friends if you want to develop your expertise as a HACKER then you must have a hand on most of the windows commands. So if you wanna be a real hacker and not just another script kiddie then you must make a habit of using the following Commands. First of all you need to folow some step, Go to Start Menu – Run and type in the command to run the specific application. Command are in front of the Program, while program names are first in the list. So, It comes in handy if you have the list of all programs with you. Run Commands Listed below...