CMD COMMANDS

The complete list of possible commands is quite large. Collected here is a selection of those that I believe are likely to be the most applicable to home PC use. CMD COMMANDS   COMMANDS                       THEIR FUNCTIONS ADDUSERS                        Add or list users to/from a CSV file ADmodcmd                      Active Directory Bulk Modify ARP                                    Address Resolution Protocol ASSOC                               Read More …

HOW TO SAVE A VIDEO WITHOUT DOWNLOADING

This software helps you to identify the video files out of the temporary files stored in the cache,  as the file names will not always be stored in their actual extensions and rather will be in the .tmp or some other file extension.The software helps you to identify the video by a preview by playing Read More …

HACK REMOTE COMPUTERS ON YOUR NETWORK

Firstly I Will Tell You What Is Internet Protocol (IP) :HACK REMOTE COMPUTERS  The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.HACK REMOTE COMPUTERS Warning The information in this guide is provided Read More …

Advanced Port Scanner

A multi-threaded port scanner that can analyze individual addresses or specific IP ranges in order to reveal closed and opened ports.Advanced Port Scanner Advanced Port Scanner is a freeware tool supposed to help users scan a configured port range on any Windows workstation. Realies on a multi-threaded engine The program impresses mostly thanks to its Read More …

PHISHING

About Phishing: The problem with phishing is that most of the people are unaware of the whole issue of phishing. Web users, who are already in threat from various elements like virus, spyware etc, are facing a larger threat than any of them, but what is Phishing? And how can it harm you? These are Read More …

HOW TO ENABLE REGISTRY EDITING (regedit) DISABLED BY ADMINISTRATOR

This is the common problem faced every PC user and many of you do you do not know how to re-enable it so now I am going to tell you how to do it please just follow the steps given below :- ENABLE REGISTRY EDITING ENABLE REGISTRY EDITING Using Group Policy Editor. ENABLE REGISTRY EDITING 1. Read More …

Sim card cloning:make a duplicate mobile number

The Ultimate Guide to Spy on somebody is in every everybody’s pocket ! The Modern Engineering marvel aka Mobile Phone’s are everybody’s need. People often (mostly) do their confidential talks over cell phone’s, But only some know how easy it is to eavesdrop them. There are some tricks and hacks to do that, but the Read More …