HackNsLash is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our site to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks. Know Hacking but No Hacking!
The most common and trusted search engine around the globe is Google, which began as research project in January, 1996 by Larry Page and Sergey Brin, two Ph.D. students at Stanford University, California.
If you think that Notepad is useless then
you are wrong because you can now do a lot of things with
the Notepad
which you could have never imagined. In this hack I will
show you
how to format a HDD using Notepad. This is really cool.
Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organized and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers.
A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one.But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive.Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
In this post I am going to show you how to use your Gmail account tosend and receive emails from multiple addresses. Most of us own morethan one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.
Some times it becomes necessary to block a website on our Computersfor one or other reason.You can easily and effectivily block access toa website by adding it to your Windows HOSTS file.Once the website isblocked in the HOSTS file,it will not appear in any of thebrowsers.That is,the website becomes completely unavailable.
Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.
In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.
In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source.
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.
Is your computer infected with virus? Do you often get mysteriouserror messages? Well this is a common problem faced by almost all thecomputer users across the globe. There are many viruses and worms outthere that could infect your computer. Some are harmless, but, they dohave the capacity to do any number of nasty things, up to andincluding, erasing all data from your computer. However there are waysto keep viruses away from your PC. Here are the 12 tips to maintain avirus free computer.
Most of the people ask me to teach the easiest way of email password hacking.In fact the most widely asked question on hacking is some or the otherway related to email password hacking. Even if you have the similarquestion in your mind here’s the answer. First of all don’t get fooledby the so called the “easiest way to hack an email password” given onmany scam sites. Here’s the scam procedure. This method is of hackingpassword never works.