CMD COMMANDS

The complete list of possible commands is quite large. Collected here is a selection of those that I believe are likely to be the most applicable to home PC use. CMD COMMANDS   COMMANDS                       THEIR FUNCTIONS ADDUSERS                        Add or list users to/from a CSV file ADmodcmd                      Active Directory Bulk Modify ARP                                    Address Resolution Protocol ASSOC                               Read More …

HOW TO SAVE A VIDEO WITHOUT DOWNLOADING

This software helps you to identify the video files out of the temporary files stored in the cache,  as the file names will not always be stored in their actual extensions and rather will be in the .tmp or some other file extension.The software helps you to identify the video by a preview by playing Read More …

HACK REMOTE COMPUTERS ON YOUR NETWORK

Firstly I Will Tell You What Is Internet Protocol (IP) :HACK REMOTE COMPUTERS  The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.HACK REMOTE COMPUTERS Warning The information in this guide is provided Read More …

HOW TO ENABLE REGISTRY EDITING (regedit) DISABLED BY ADMINISTRATOR

This is the common problem faced every PC user and many of you do you do not know how to re-enable it so now I am going to tell you how to do it please just follow the steps given below :- ENABLE REGISTRY EDITING ENABLE REGISTRY EDITING Using Group Policy Editor. ENABLE REGISTRY EDITING 1. Read More …

Sim card cloning:make a duplicate mobile number

The Ultimate Guide to Spy on somebody is in every everybody’s pocket ! The Modern Engineering marvel aka Mobile Phone’s are everybody’s need. People often (mostly) do their confidential talks over cell phone’s, But only some know how easy it is to eavesdrop them. There are some tricks and hacks to do that, but the Read More …

How to disable your victim’s Mouse whenever he insert pen drive

Hi friends ,  Hacking is one of the fun .  You can attract your friends by simply doing some hacks before them.  You can also make your victims or enemies in confusion.  This article will help you to make the small fun with hack to disable your victim’s Mouse whenever he insert pen drive. Let’s Read More …

How to steal files from a computer to a pendrive

hello guys,have u ever want something from your friend pc,that he is not giving you like games,movies,important files etc.here i come with cool tricks just plug your USB Flash drive into his PC to automatically copy his files to your pen drive, secretly and silently. Copy the files you brought to his PC to complete Read More …