Visit Our Official Website | Get: 120 Important Softwares all on DVD | Buy a VPN Or Proxy to get free internet | Contact Us


Ads 468x60px

Featured Posts

Saturday, 12 April 2014

HOW TO SEND COLORFULL TEXT IN FACEBOOK CHAT

This time friends, I won't wast your time trying to explain whats self explanatory.
This is the way to Send Colorful Text in Facebook Chat
Here is the list of codes with their alphabets.
USE SQUARE BRACKETS FOR EACH SET OF NUMBER
 
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]]  = Y
[[165724910215]] = Z
 
How to Use it: To create a word of colorful text copy the codes of alphabets and 
make sure to insert single space between the each alphabetic code. The way it works? First,
Below are the codes you need.
 
HACKING:[[111356865552629]][[107015582669715]][[115602405121532]][[116651741681944]]
[[109294689102123]][[108634132504932]][[111532845537326]]
TRICKS: [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]]
 [[115927268419031]]
 
 

Continue Reading...

Friday, 11 April 2014

YAHOO THRETENS TO BLOCK FACEBOOK & GOOGLE

It's True Yahoo is going to remove the option to sign into any of Yahoo’s services with a Facebook or Google account, both options which have been available for years.

The company will be starting with “Yahoo Sports Tourney Pick ‘Em,” a fantasy college basketball service, and it says it will eventually remove Facebook and Google sign-in buttons from all its products.
Yahoo believes that its services are now attractive enough that Facebook and Google account holders can be compelled to switch — or at least that those who might turn their back on Yahoo now aren’t as valuable as those who stay.
Genuine Yahoo IDs might make users more likely to use other Yahoo services, and their activity can be tracked and experience personalized more easily. Recently, Yahoo freed up a number of new Yahoo usernames.
“This new process, which now asks users to sign in with a Yahoo username, will allow us to offer the best personalized experience to everyone.” a yahoo representative said.

Hope fully it's for the best. Just sit tight and wait.
Continue Reading...

HOW TO CREATE A FOLDER WINDOWS CANNOT DELETE OR RENAME

Hello every one!
Sure you have some day tried to delete or at least tried to rename a file some time on your computer and windows just refused with funny massages like Windows cannot rename this file  or similar massages. well today i will tell you both a way to create and also a way to delete it when you need it no more.

With out wasting any time, Let's get started.

Steps:
1. Go to Start and then Click on Run and enter CMD. [ If you are using Windows 7, just search "CMD" and click on that black icon named CMD.]

3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C: 4. Type D: or E: and hit enter 

5. Type md con\ and hit enter (md - make directory) You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step. 

6. Open that directory, you will see the folder created of name con. Try to delete that folder or rename that folder windows will show the error message. 

That is it. you created a folder windows will not delete. at least not just like that. But how about if you need it no more, 

This is How you can delete this folder your self when you want it no more:

Now there is no way to delete that folder manually but you can delete this folder by another way mentioned below. 
1. Open Command Prompt
2. Type D: ( if u created this type of folder in D: drive) & hit enter 
3. Type rd con\ (rd - remove directory) 
4. Open that directory and the folder will not appear because it is removed.

Ok. so i hope this was of help to you let's see about next time.
Continue Reading...

Sunday, 6 April 2014

Make Invisible Facebook Profile name


Steps to Make nameless or Invisible Facebook Profile name:
 [its not realy nameless, actually its ﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞ symbol ID.. better than a Full name ID ] )
1.First of all open Mozilla Firefox/UC Browser
2. Click on Tools >> Options >> Advanced >> Settings….
3. Now click on Manual proxy Configuration >> HTTP Proxy
4. Paste 119.252.160.34 or 118.98.35.251 in HTTP Proxy
5 Paste 8080 in Port. and  then Click OK and OK
6. Now open your Facebook account >> Account Setting
7. Scroll down and change the language from English (US) to Bahasa Indonesia
8. Change your name to R ﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞ M you need to copy this code from here and paste it.
9. Now Remove the Letter R and M then enter your password and click to Save.

And that's it. congratulations, you did it.
Continue Reading...

Thursday, 3 April 2014

HACKING WINDOWS PASSWORDS [USER MODE]

Hello  every one !!

If you have read our earlier post on 10 ways to hack windows PC, The you realize we didn't go so much in details on each methode. In this tutorial i'll give a simple 3 step tutorial on Hacking windows Passwords with user mode.
With out any wast of time, Let's get started. You just have to follow through:




STEPS:

1. Open command prompt (Start->Run->cmd),Or press Windows  button + R then type CMD.   

3.Type compmgmt.msc then ENTER (This should open the computer management console)

4. Go to local users & groups->users. Right click on any user and select "set password".

Now  you can set you new password there!!!
Continue Reading...

Tuesday, 18 March 2014

ORANGE UGANDA IS OFFICIALY SELLING IT'S SELF

As we articipated before Warid Telecom soled out to Bharti Airtel Uganda.Now this time, it's Orange Uganda looking for a buyer for it's business in Uganda.Orange is also thought to be planning an exit from several markets in Africa where it does not already hold a number one or two spot. Aside from Uganda,The Fench operator Orange has mandated Lazard to find a buyer for its mobile telecoms business in Uganda,

Uganda’s mobile market is dominated by MTN and Bharti Airtel. The latter acquired the third largest operator Warid Telecom for around US$100m from the Abu Dhabi Group in May 2013. MTN has around 8.5 million subscribers in Uganda, while post-merger, Airtel has over 7.5 million. The next largest is Uganda Telecom’s UT Mobile unit, with Orange Uganda among the country's smaller operators.

According to sources, the most logical buyer of the Orange Uganda unit could be MTN. The South African operator has previously been vocal about consolidation in the country, and will be keen to firm up its number one position, with second place Airtel gaining valuable ground. While Airtel is also clearly in acquisition mode across Africa, sources said it was unlikely the Indian telcom would make a move for Orange Uganda so soon after its Warid buyout.

What are the advantages and dis advantages of the sell out?
We won't know till the sell out. Just like we couldn't know about The Internet candles hiking that airtel made after paying out Warid and a lot more instabilities. For now, Wait...

 Source: NewVision
Continue Reading...

Wednesday, 5 March 2014

MAN CHARGED WITH HACKING THE FEDS

A U.K. man with an alleged penchant for targeting the U.S. government has been charged with hacking into the Federal Reserve.
Prosecutors say the man, Lauri Love, snuck into servers used by the Federal Reserve Bank of New York, where he stole and posted publicly names and private contact information.


Love has previously been charged with hacking an alphabet soup of federal agencies. He's accused of going after NASA, the Army, Health and Human Services, the Energy Department and the Environmental Protection Agency, as well as the Missile Defense Agency, U.S. Sentencing Commission and Regional Computer Forensics Laboratory.
Last year, prosecutors in New Jersey said his attacks "resulted in millions of dollars in damages to the government victims."
The U.S. Attorney's Office for the Southern District of New York said Love's several screen names include "Smedley Butler." Butler was a highly decorated but controversial major general in the Marines who, after he retired, wrote the 1935 book "War Is a Racket," which criticizes war profiteering and the U.S. military.
Related: Why retailers aren't protecting you from hackers
Love hacked the Fed information by exploiting a database vulnerability, according to court documents filed by the U.S. Attorney's office.
The charges -- computer hacking and aggravated identity theft -- carry a maximum sentence of 12 years in prison, prosecutors said.
Love is not in custody on these charges. He was arrested in the U.K. in October on charges of hacking other government agencies, but the U.S. Attorney's office said it didn't know if he was held by British authorities. Efforts to reach British authorities to determine Love's status weren't immediately successful.

Source - www.cnn.com
Continue Reading...

Monday, 3 March 2014

AMAIZING WINDOWS TRICK TO SHOW OFF TO YOUR FRIEND

Hello Ethertekers! Today i'll share with you one of windows most amazing bat hack/trick (Call it whatever you want) but i call it "The friendnoy".

  Whether  you just want to annoy computer administrators at work, school or Internet cafes, or just for fun at your home PC.

Fist things first, We \need notepad and follow the three simple steps.







Step 1: Open notepad.

Step 2: Copy and paste the following in notepad:

@echo off
:netannoy
msg * Hi!
msg * How r u ?
msg * Ethertek, Do you like it?
msg * My name is Elit Peter.\
msg * My email: elitepeter@gmail.com.
msg *And I will tell you about Ethertek.
msg * www.ethertekug.com
msg * Hav anice day.
msg * Thank you!!
Goto netannoy

Step 3. Save it as ethertek.bat.

NOTE: Don’t forget to put “.bat” at the end of the name you are saving it as. ie: (ethertek.bat)
 
And u r done.
NOTE. Any words you use after  the “msg *” code, is w hat will come on screen in the annoying massages. So Replace the massage to your convenience if you may.
Continue Reading...

Saturday, 15 February 2014

HOW TO SPY ON ANY COMPUER [ HACK LOGIN PASSWORDS ]


Did you know that one can easily look at what you are doing on your computer no mater how far he is?
Well, to day we'll discus on a very easy easy way to monitor a computers activity using a keylogger called Emis.This tool takes screenshots of the victim computer and sends the information to your Email (gmail) along with the logs

With this simple trick, You will be able to see what your victim computer is doing, What time he is doing it, All Links he goes to, What websites they visit, Some times, Even what passwords they Use, What videos they watch, Music they listen to. ETC

So. Let's Roll:

Step 1

 Download Emis Key-logger 

Step 2

Open Emis Key-logger to enter your Gmail and password [Just to be clear, don't use your personal gmail unless you don't mind ]
I recommend you open a new gmail for testing this trick. after filling the info. click on test email. You should get an email in gmail.

Options

- Block AV Sites : Blocks Virus Scanning Websites on victim's computer
-TaskManager: Disable TaskManager on victim's PC
-Regedit: Disable Regedit on victim's PC




Step 4

Click on Build.
An extra file will be created called server or the name you typed in emiss. This is the file you send to your victims and when they click on it, Their computer starts sending you reports of what they have been using the computer for. The reports are all generated to your gmail. + every report sent will included at least one screen shot of the computer.
You may as well use soft wares like Crypter to bind this server file with say any. Mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.

Step 5

Upload it to Free File Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.

That's it.
Now all you need to do is start spreading it. just make sure you make your file has an attractive name that one would be curious to open it.

Once the victim runs the keylogger file on the computer, the tool starts right away collecting and sending reports on his computer to his email

Here some images:


Inbox:


In a mail:


Simple. right?

Like ethertek on facebook: www.facebook.com/ethertek

Continue Reading...
 

Alittle About Me

I am an open minded person with a great interest in computer networks, programming and cyber security. My love for computers started way back since elementary school where I din't have access to the internet nor did I have a computer at my disposal. In the long run at the right time, the love I had for so long was taken to the next level when I was granted internet access and mostly, A computer at my disposal. This allowed me to develop and enhance my skills more effectively. Currently on a cyber... Continue Reading

Do you like what you see?

Get our Daily email update (It's Free):


To all those that visit. We highly appreciate.
Thank You!