Tuesday, 9 June 2015

In this tutorial we are going to show you how to transfer data from one computer to another. We need to PC/Laptop and a lan cable to transfer data. PC 1 Step1: Go to “Open Networking and Sharing Center“. Step2: Click on “Local Area Connection“. Step3: Now click on “Properties“. Step4: Double click on “Internet Protocol Version 4(TCP/IPv6)“. Step5: Click on “Use the following IP address:” and...

Friday, 20 February 2015

Need protection from Intruders?? Here’s a solution. Place your important files and folders in any drives and hide the entire drive!!! Steps to be followed : 1) Right click on My Computer and click on Manage. 2) A computer management tab opens and the left side options , you’ll see an option named Disk management under Storage. Click on it. 3) There you’ll...

Tuesday, 23 December 2014

                             Hey Guys, This Is Awesome Tutorial Written By Me And Note That This Is Not Any Type Of Fake Methods, This Is Real And Worked Method To Hack Facebook In Just Couple Of Minutes, In This Trick You Just Need Three Friends In Victim's Account. If You Have This Then You Can Easily Hake Your Victim's...

Monday, 3 November 2014

Hack the conversation Step 1 Go to the MicroSD card section, click on the WhatsApp and later on on the Database option. Here you will find two files namely, msgstore-yyyy..dd..db.crypt msgstore.db.crypt Step 2  Just send these files from your friend's mobile to your with Bluetooth or WiFi. Step 3 Place these files on directory where your WhatsApp has database files....

Sunday, 2 November 2014

Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone. To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish to shutdown. So, this is how you do this: 1. First, you need the batch files to perform...

Saturday, 1 November 2014

Today i m gonna teach you how to hack a facebook account with a phishing page. phishing: Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online...

Wednesday, 8 October 2014

Hi readers,Today i tell you how can you take a picture of someone,when he fails/tries to unlock your Android Smartphone.This trick is more important for you.This type of security make your android phone more secure.It happens,When you don't want to share your Personal data like photos or important documents with your Friends,Family members or any other.A picture of him/her will be captured and will...