Archive for the ‘hacks’ Category

Today I am going to show you how you can bypass software trial period manually and use that again and again.

hide-ip tool

Posted: December 29, 2012 in hacks
Tags: , , , ,
Hey friends, today i am going to share a hack tool that will help you to hide you identity online so that you can surf online anonymously without getting monitored. Do you actually know what your IP address means? Are you aware that your IP address is exposed every time you visit a website?  How you will feel when you come to know that some neighbour is monitoring your home every time? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Now as hacker you will never wish that somebody monitor you. So i got a tool called Super Hide IP that will not only hide your identity online but also help you  computer tracing cookies.

How To Change Manually Windows Boot Screen

Posted: December 29, 2012 in hacks
this tutorial I will tell you how you can change Windows Boot Screen manually using Resource Hacker.
So lets start :
First Download Resource Hacker
Open Resource Hacker and press Ctrl +o now go to your Windows directory and then open System32 folder,and search for NToskrnl.exe file ,click on open.
See this screenshot for help :

click on the image to enlarge
After opening expand Bitmap and you can change the boot-screen by replacing the default bitmaps to your own created bitmaps.
Press Ctrl +s and you are done.Now reboot your PC and see now you will see your own boot screen and not the default one.

Download Resource Hacker

This content is password protected. To view it please enter your password below:















Posted: July 29, 2012 in hacks
Tags: , ,

The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.



CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.


Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So, in this post you will find a detailed information on how CAPTCHA works and why they are used.


It is written in PHP and is nice tool to test and identify security holes in web applications. It is good for remote and local security vulnerabilities. When scanning is in process, details of the scan are dynamically updated to the user. These details include the status of the scan, the number of URLs found on the web application, the number of vulnerabilities found and details of the vulnerabilities found.

In this post, i will explain how to use the proxy server.

What is the Use of The Proxy?
Hide your IP.  Browse the Internet anonymously.

Get the List of Proxy from here:

How to Use?
Mozilla is the famous browser. So i will explain how to use the proxy servers in Mozilla.

in mozilla 12.0


select MANUAL PROXY CONFIGURATION and simply put in the IP ADDRESS you got from this site ( along with the port number. after that you’re done. Ok and close it

check your ip address location on any site… enjoy!


For complete tutorial Published on Jul 1, 2012 by ViruSxNoIr