Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of "fishing" for passwords and other secret financial info.
So now i am starting to show you how to hack someone by phishing...
1). Go to Facebook.com
Right click on the white space of the front page. Select "View Page source".
Copy the code to Notepad.
2). Now find (Press ctrl +f) for "action=" in that code.
You have to change two things in that code..first of all you have to change method from POST to Get and secondly you have to change ACTION...
Hacking Tips and Tricks
Learn Ethical Hacking and protect yourself from various hacking attacks
Spamming
Spam can be defined as Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. Real spam is generally e-mail advertising for some product sent to a mailing list.In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
Now how a spammer can able to get Your email id. This can be done by following ways...
1)Social networking sites.
Many people on social networking sites leave thier privacy settings to very
low.Its very easy to get E-mail id or other contact information on this
kind of sites....
Footprinting
Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting is to learn a much you can about a system, its remote access capabilities, its ports and services,and the aspects of its security.
In order to perform a successful hack on a system,it is best to know as much as you can.
There are Mainly Two Types of Footprinting
1) DNS Footprinting
In this a hacker tries to gather information on Domain name registration on various things like,Registration details,Server Type,Ip address, Location, Contact numbers e.t.c.
There are various tools that can be used in DNS Footprinting like whois and samspade are popular tools in this category But i will recommend whois.
Let see how we can Footprint a Website by its domain.
STEP 1: GO TO http://www.domaintools.com/
STEP 2: Type website URL which you want to footprint. (i.e www.google.com , google.com or ip address of website) and...
Email Spoofing
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.
Senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Above all is just a Small explanation on what is E-mail spoofing. these are the websites which are used to send fake emails
www.hoaxmail.co.uk
anonymailer.net
emkei.cz
above all emkei.cz is my favourite because it provide some advance option like email-header, reply to,cc etc.
You can also send from your cmd, but for that purpose you need S.M.T.P server name of your I.S.P. so use above services only for...
How To Run Android Apps On Windows

Now you can run all of the famous Android Apps on your Windows PC. This is the easiest Tutorial to all those who wants to test the apps without wasting their time.
To run Android applications on windows xp,vista or windows 7,all you need is a small android emulator which you have to install on your pc.
There are lots of android emulator exists in market but we are using one of the well known "Blue stack BETA". the earlier version is "Blue Stack Alpha" which is only compatible with Windows 7 PC’s and Windows 8. Best part of new beta edition is basically converting the ARM compatible Android apps to run on x86 platform and that too with a great efficiency....
Increase Internet Speed Of your Netsetter

Idea,Airtel,Reliance,Tata Photon,Huawei And MTS Mblaze Netsetters are the most famous high-speed wireless internet service provider. All of them promise a High speed internet connection but we all know the real truth
Here today i will tried to bring out some of the tricks by which you can able to increase your net setter speed
So lets start.
1). Updating DNS Address:
Go to your Net setter connection Setting And Update your DNS address as following.
Some of the DNS servers you can use are
Google DNS : 8.8.8.8
Alternate Google DNS: 8.8.4.4.
2). Optimize TCP/IP Settings:
The TCP Optimizer is a free, easy Windows program that provides...
Trick To Create A Empty Huge File

"Is it possible that a empty file can be huge as 1 million bytes.."?Yes, off course its possible.You can create a file of any desired size by using the utilities provided by Windows. So here's the step by step guide to create a Empty Huge File.
First we have to convert the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. To use Windows calculator in scientific mode: Open calculator,click on view and select Scientific instead of Simple.
Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on...