Join This Channel To Get Latest Phone Tips,Tricks,News,Network Security Course,Hacks etc. For Free on Your Mobile!! ... Join our Facebook Discussion Group -Regards Ankit

30 November 2010

Earn 5$ easily

Well i am been noticing that people on this community and some other famous ones too been struggling to earn some $$$ online.So you also Want to Earn Some Real Money?
This is very easy also,,
Keep Reading:

I took some of my time and had written My eBook on "Make Money with Fiverr" to earn some good $$$ online working with very little efforts!! :)

This Course can be Used on any of the money making site like Fiverr,biverr,gigbucks,freelancer,elance,scriptlance etc.

The most Beautiful thing about this Guide is that it works in all countries.No more adsense and surveys..!!

So,What you have to do is help me in Sales of this revolutionary book...
and you get 5$ for every buyer you refer.

Just tell me the email address of the buyer and you will get 5$ instantly on your paypal..!!

Sales Page:

 *Exclusively For WOH Members* 
If you are interested in buying this course,just Comment here and i will give you 5$ Discount instantly..


28 November 2010

Difference Between FTP and Shells

Difference between FTP & Shells:

Many times I see that some of us know how to use the shell but once they have uploaded they get confused. So to start with, Let me give you some information about FTP:

File Transfer Protocol

Whenever you want to open your website, the first thing you will do is to get some web hosting for your self. That cud be either free or paid. When your get your hosting services, you create a website on your computer first and then upload it to your hosting server so it becomes a World Wide Web. This process of uploading the documents from your computer to your hosting server is done through FTP [File Transfer Protocol]. It basically looks like a program with 2 columns, one column shows your computer files and another shows your servers files. Just like when you copy the stuffs from some USB drive to your computer. So here, I will show you an example is how you would connect if you own go4expert. So when you want to connect your self to your web hosting server, following information is required in order to authenticate yourself:

Server :
Username: ankit_world
password: whatever

So, once you put in this information, server understands that you are shabbir and gives you access to all the files on the server so you can work on it.


Since you understand the FTP now, we know that none of us will get access to Go4expert's server because we don't have the username and password authenticate yourself. Somehow we can manage to get the access to G4E's FTP we can easily remove/edit/replace files. So we can destroy this entire forum and upload our own stuffs. That is when shells comes into the picture. Shells are a malicious PHP files which you will need to upload to any website, and once you execute it you will get access to its server directly WITHOUT authenticating your self.

Moral of the Story:

I wrote the difference between FTP and shells so that you guyz can understand it, because lots of people tends to get confused between them. So again to make it clear, you can following thing:

FTP is a protocol that lets you connect your computer to your hosting server so that you can upload/edit/delete/replace your files. Since we wouldn't have the username & password to connect to any website's ftp, thats why we will use the SHELL to get access. SO SHELL IS NOT FTP BUT IT GIVES YOU ACCESS TO THE HOSTING SERVER.
Funny Incidents:

Let me tell you guyz why i gave time to write this much about FTP in this article. In my forum, i reelased a couple of videos about "hacking with shells" etc .etc. So some guyz saw it and just copied what I was doing without understanding the logic.

I remember i saw couple of threads which said following thing:
" Hi guyz, i managed to hack my 1st website today! YAY, I am really happy! But theres only 1 problem, i uploaded the shell and ran it and it worked fine. The only problem is i dont have access to FTP."

Y0, i hacked a website today, uploaded a shell and it worked fine, now i am trying to get access to FTP 


24 November 2010

Double Password

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)

Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.

But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.

Strong Password

How does it work?
Our software, Double Password, installs onto your flash drive. When you type a password, the program intercepts it and converts it into a super-strong password string on-the-fly. You can use simple, easy-to-remember passwords without the risk of being cracked.

Another benefit of using Double Password is that nobody can steal your passwords. Spy programs are useless. Even if someone gets the "weak" password that you type on the keyboard, it means nothing. This password will only work when your USB flash is inserted.

While typical hardware locks will work only with software that supports secure tokens, Double Password works with any software. It simply substitutes your weak password with a strong one.

Double Password can be effectively used to securely lock your Windows account, to protect your laptop and to bring a new level of security to all software that uses password authentication.

22 November 2010

Trace Mobile numbers or Ip-Address

Recently I came accross a website in which we can easily trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile Service provider, Location, City along with area. Thats really awesome.

This tool will be really helpful specially for business persons to verify the location etc...

The site link is Here

Features of this site is

Trace Mobile Number

Trace Vehical Number

Trace Pin Code

Trace IP Address



18 November 2010

Control and Modify your Windows

Hack-It is a window manipulation program. It allows you to control any window on your system in several different ways not normally available to you through the standard Windows user interface. The major functions you can perform on windows are: making a window visible or hidden, causing a window to stay on top of others or not stay on top of others, adding an icon to the system tray for a window, and having that window minimize to the tray, adjusting the transparency of a window, manipulating process priorities to give a window's process more CPU time, standard window functions such as restoring, minimizing, maximizing, and closing, and forcibly terminating a process.


Tested Spy-ware Free.


16 November 2010

Some Tips To Secure Your Twitter Account

Twitter much like Facebook is popular social networking site and these sites users are targeted with phishing scams luring them to reveal their username and passwords.Here are some security tips for twitter users for safe tweeting.
Tips to secure twitter account..
1.Use strong and Unique password : Use the password for your twitter account as a combination of characters, symbols and numbers. Never use same PASSWORD for different websites and email accounts, use unique PASSWORD for every  website.

2. Be aware of fake twitter websites, try to type in your browser and enter your account credentials.
3. Always use extensions for browsers like Chrome and Firefox which shows preview for shortened links on twitter. Because you may be lured to click on a malicious link to steal your twitter username and password.
4.Keep your computer up to date with antivirus and anti-spyware. Looking for free anti-virus AVG offers antivirus and anti-spyware, and also protects from malicious links in social networks with it’s LinkScanner.
5.Twitter never asks you for password:Twitter will never asks you to download something and asks to sign into other twitter liked websites with your username and password.Twitter will never reply to you or email you asking for your password.
6.Want to update your account with third party applications make sure they connect to your account using Oauth protocol where you don’t need to share your password. Be careful of third party applications that lure you to give more followers by sharing your username and password.
7.Never use same password for any of your accounts including for twitter.
8. Twitter banned 370 weak passwords make sure you are not using any one of them for your account.
9.Hackers may lure users with malicious links to sign into twitter similar website to give your username and password. Once they take control of your account they post spam messages and other abusive stuff from your account.
10.Don’t retweet blindly without knowing whom tweets you are tweeting , also be aware of clicking DMs containing links from unknown users. A phishing scam may targeted at you through DMs.
11.Use encrypted twitter: Use  instead of and your twitter session with your tweets, retweets,DMs will be encrypted.


05 November 2010

Two Basic SEO Tricks

Get Over 2000 Backlinks Now..

Brilliant backlinker, put your website and your main website keyword and watch as your backlinks are created



Submit Your Website To 130 Search Engines
and Directories


Make Sure You Provide a Correct Email address.,You need To Confirm Some Submission after The Process

Views This Month


HaCk-O-PeDia - The Hacker's Encyclopedia. Copyright 2010 All Rights Reserved To Ankit