Subscribe to our RSS Feeds
HackNsLash is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our site to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks. Know Hacking but No Hacking!
Showing posts with label Cool Tips. Show all posts
Showing posts with label Cool Tips. Show all posts

Google Fun/Tips and Tricks/Hacking

0 Comments »
The most common and trusted search engine around the globe is Google, which began as research project in January, 1996 by Larry Page and Sergey Brin, two Ph.D. students at Stanford University, California.

9:20 AM

Increase Virtual RAM - To Make Your System Faster

0 Comments »
Follow the steps given below :-

9:10 AM

Increase Broadband Speed Using Simple Tweak

0 Comments »
A Simple Tweak (XP Pro only) which will increase your Broadband Speed.

Make sure you Log on as Administrator, not as a user with Administrator privileges.

9:06 AM

Format A HDD With Notepad

0 Comments »
If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.

9:02 AM

Chat with Friends through ms dos Command Prompt

0 Comments »
1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

, 8:56 AM

How to edit right click menu

0 Comments »
How To Remove and Add Right-Click Menu Items from Files and Folders
Removing Items


12:13 AM

How to Convert Drive to NTFS

0 Comments »
Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organized and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers.

, 10:57 PM

Complete list of Win XP/XP cmd

0 Comments »
This are the complete list of Win Xp cmd

10:54 PM

How to Completely Erase a Hard Disk Drive

0 Comments »
A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one.But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive.Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE

10:10 PM

How to Make Invisible Password Protected Folder

0 Comments »
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
, 10:02 PM

Use Gmail Account to Send Emails from Multiple Addresses

0 Comments »
In this post I am going to show you how to use your Gmail account tosend and receive emails from multiple addresses. Most of us own morethan one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.

How to Block a Website ?

0 Comments »
Some times it becomes necessary to block a website on our Computersfor one or other reason.You can easily and effectivily block access toa website by adding it to your Windows HOSTS file.Once the website isblocked in the HOSTS file,it will not appear in any of thebrowsers.That is,the website becomes completely unavailable.

7:03 PM

How to Change the ICON of an EXE file

0 Comments »
Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.

, 8:17 PM

How to Compile C Programs

0 Comments »
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.

8:14 PM

Hack Software and Run the Trial Program Forever

0 Comments »
In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?

, , 8:00 PM

Display Legal Notice on Startup of your Windows

0 Comments »
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

, 7:44 PM

How to Trace Any IP Address

0 Comments »
In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source.

, 7:30 PM

How to Find the IP Address of a Remote Computer

0 Comments »
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

, 7:13 PM

12 Tips to Maintain a Virus Free Computer

0 Comments »
Is your computer infected with virus? Do you often get mysteriouserror messages? Well this is a common problem faced by almost all thecomputer users across the globe. There are many viruses and worms outthere that could infect your computer. Some are harmless, but, they dohave the capacity to do any number of nasty things, up to andincluding, erasing all data from your computer. However there are waysto keep viruses away from your PC. Here are the 12 tips to maintain avirus free computer.

, 5:25 AM

How to protect Email Password Hacking

0 Comments »
Most of the people ask me to teach the easiest way of email password hacking.In fact the most widely asked question on hacking is some or the otherway related to email password hacking. Even if you have the similarquestion in your mind here’s the answer. First of all don’t get fooledby the so called the “easiest way to hack an email password” given onmany scam sites. Here’s the scam procedure. This method is of hackingpassword never works.