PROTECT UR ATM CARD
I just feel like to share this and i believe u must have heard it before.Why i am posting this, is for those who dont know it yet,
When a thief forced you to
take money from the ATM, do not argue or
resist, you might not know what he or she
might do to you. What you should do is to
punch your PIN in the reverse...
Eg: If your PIN is 1234, you punch 4321.
The moment you punch in the reverse, the
money will come out, but will be stuck into
the machine half way out and it will alert the
police without the notice of the thief.
Every ATM has it; It is specially made to signify
danger and help. Not everyone is aware of
this. SHARE THIS TO ALL YOUR FRIE...
Ways to Open / Edit .PSD files without having Photoshop Installed.
PSD extension file stands for Photoshop Document and is related to the Adobe Photoshop application. The .PSD file works only in the Adobe Photoshop as it stores many imaging options available in Photoshop. Now you may don’t have a good computer to run Photoshop or you don’t have sufficient disc space. So if you like editing the images but do not want to spend lots of bucks on the software then this tip is surely for you and also because the following tools do not occupy huge memory as compared to...
10 Simple Ways To Speed Up Windows XP
I’ve just finished setting my PC and I think some of you will be interested in some of the tweaks I make to all of my PCs to make them quicker.
I’ve focused here on the ones which are simple to do and won’t cause problems if you get it wrong, rather than listing registry tweaks etc.
1. Disable Indexing Services
Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy.
This system process indexes and updates lists of all the files that are on your computer.
It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists.
If you don’t search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:
Go...
How to play Counter Strike 1.6 online for free

Counter strike is the #1 online action game in the world, and CS 1.6 its most popular version, I was mad at counter strike few years back , but for now it has been more than one year since I haven't played it for last 1 year as I have no time for it.
Counter strike 1.6 can be played online for free, the only requirement is that you should have a fast Internet connection or else you will not enjoy playing it will hang every few seconds, There are tons of methods to play Counter strike 1.6 online...
Disable The New Facebook Chat Sidebar & Recover Old FB Chat
Sometimes changes in the layout of Facebook often gets a thumbs down by the users. Just like how much people hated the new Facebook layout with photo streams above, similarly do people found the new social chat window appearing on the right sidebar as equal irritation. In order to disable this chat sidebar that shows photo thumbnails of friends available for chat and recover the older chat view then lets play with some workarounds.
Disable New and Recover Old Facebook Chat
There are two apps for Mozilla Firefox, Opera and for Google Chrome that does the magic. I will recommend that you try both of them and see which one you like the most.
Recover Old FaceBook Chat:
This add-on will replace the new social chat window with the older one. You can download the Chrome extension by clicking here
Facebook...
lock your computer with your Face
1. Download smile in
2.install & then add your face recognition
Smile-in is a face logon tool for Windows utilizing face recognition technology with live detection. Look in your webcam. smile-in will recognize your living face and your secured Windows account will open. Normal changes ( hairstyle, beard, glasses) will be no problem. No passwords needed. Adjustable live detection makes logon to your Windows account with photos impossible. Flexible user administration of smile-in lets your...
Folder Lock® - Lock your Folders and Files

What is Folder Lock?
Folder Lock is a fast file locking and file encryption software that can password protect folders, encrypt or lock files, protect USB Drives and lock CDs/DVDs. The program supports all flavors of Windows 7.0, Vista, XP and 2000 including their 64-bit variants.
Folder Lock creates encrypted storages called 'Lockers'. You can keep as many of your private files & folders in Locker and password protect it with a single click. Lockers are portable, so you can transfer, secure...
How to: Detecting And Destroying Keyloggers installed in Computer
There is another post as concerned with security, keeping your online presence secure, fighting with keyloggers, spam and much more. So, I am going to share some security tools and tips for my readers so that they may not fall prey of such criminals and fraudulent activities. Since, With the help of keylogger any hacker can hack into bank acounts of victim.
Types of Keyloggers:
Hardware keylogger - We can detect is easily, As it may be attached to a keyboard or also at the back of the cpu. Your...
Trojan horse Generator (Easiest Way)
Note: All the content on this blog site is for educational purposes.Haxorslodge will not be responsible for any harm caused by it.
Today, i am going to teach you how to create your own trojan virus with a software,it's too much easy,like a plain sailing and everyone can understand it.Read my short guide and enjoy having fun with your own trojan
THING WHICH YOU NEED IS:
>:Getbatch trojan generator .
Downlod here
METHOD:
1: Download trojan generator and open it .
2: A window will pop out...
Adobe Photoshop CS5 Extended Crack And Serial Keys

First Method to Crack your Adobe Photoshop CS5 and Use For Free:-
Step 1:- First you want to download and install the Adobe Photoshop CS5 Extended trial from the Adobe website. (You're going to need a free account.) CLICK:
Get Adobe Photoshop CS5
Step 2:- Then once the trial is installed, make sure Photoshop is closed and navigate to this directory:
C:\WINDOWS\system32\drivers\etc\
Step 3:- Download the zip archive given below . Inside the archive there's a file titled "hosts". Extract this...
10 Tips for Securing Yourself At Facebook - Most used Social Network
During last few years, Facebook has become very famous and they are also trying to make it more secure and safe with the passage of time, also user friendly. Facebook interface is totally changed now and it will keep changing since technology and progress doesn't stop. I received many emails asking me a question that :
"My Facebook profile has been hacked, please! help me to take it back!"
But personally its bit difficult to take a compromised profile back. All this is possible by some social engineering tricks. So, better is to be secure and more safe already rather than asking for help after after getting hacked. There are many drawbacks of getting hacked as your personal photos can be leaked and your private messaged too. Thats the reason i am posting here at haxorslodge on how to remain...
Facebook Applications fooling you? How your cookies can be stolen at Facebook ; Heading to Social Engineering
welcome, Today what I am going to share is highly related to yours account security present at Facebook. As all of us know that Facebook family is increasing day by day and thus hackers mainly target Facebook accounts, since, you are not aware of many things which may happen with you at internet so you get fooled quickly by just some social engineering tricks. So all this can be termed as less amount of awareness and knowledge can lead towards a bad conclusion that is “Your Facebook Gets Hacked” which can lead towards the misuse of your Facebook id and can lead towards many bad conclusions. So, today I’ll talk majorly about three things:-
Facebook Applications might fool you
Your cookies can be stolen leading towards account hacking
Many other such things can be done by just social engineering
Except...
TNOD For Eset Nod 32 (Hacks Lisence i-e Usernames and pass) - Free Antivirus Software
Eset Nod 32 is one of the industry leading security tool. I too use it and i have found it more light and faster than those of other security soft-wares. But for some people in other countries it is quite costly for them and they can't buy its license. So after reviewing its wide acceptance I decided to post a hack for Eset Nod 32 business security. In order to use it for life time for free. Hope you All may like it.
Download Free Eset Antivirus Hacker - TNOD (Use Antivirus For Free)
Download TNOD Old Version - For Old Smart Eset Security Free Usage (For Nod 32 4.0.437.0 or Old)
Download TNOD Latest Stable Release - For Latest Eset Smart Secuirty Free Usage (Recommended)
What to do after downloading License Hacker of Eset
Download the Eset Antivirus from the official website, or else...
Shortcut Autorun Virus On Flash Drive - How to Kill/Delete the Virus and Recover Hidden Data
Since you know that in previous post regarding autorun.inf viruses I have mentioned that very large number of computers get effected by USB malwares and viruses. And the reason of there propagation is the only autorun.inf file which executes these malwares and viruses just we plugin the USB in our computer. Today, I,ll discuss a virus which will convert all the data in the USB into shortcuts and also I,ll show you that how to terminate this kind of virus commonly spoken as shortcut virus or we may...
Protect Your Computer From autorun viruses and worms - Make USB Disk more secure
Now-a-days many computer users are facing problems regarding viruses and worms, These worms may be very harmful as well as computer speed consuming too. This is not in the case of internet users only many computers which are not connected to internet have also such viruses and malwares installed in them, Now what is the source of such viruses and woms? Many of you don't know that even the usb drive may have some virus in it which can replicate itself at its own. Yes, I am talking about autorun.inf viruses, Today i am going to discuss ways to make your pc secure from such viruses.
How these autorun.inf worms and viruses propagate?
By default, Windows system enables an Auto Play function. When you plug in a USB disk or CD, Windows loads and executes a file named AutoRun.ini, which is the list...
Truth About “Facebook Hacker’s” Software and all such software which claim to hack password | Totally Scam
Today post mainly aims for those newbies who want to learn hacking but don’t know actually what it means? so they tend to think that mainly software exist using them they can hack any thing. But that is a wrong concept you can’t hack anyone by merely some clicks and password of that person may be in front of you. Following I am going to reveal the realities behind such softwares.
Software May have a binded Trojan or Keylogger With it:-
Like mostly in case of Facebook, people try to find out a software and hackers make use of this weakness and often they design fake hacking software in VB (Like I can also designed one in Visual Basic Environment, By just designing some button and text fields and then debugging the software and after testing generating the required .exe, But all will be fake)...
Windows 8 Developers Preview Free Download

Windows 8 Developer Preview
Yeah ...!! Finally The Day Arrive For Which Every Developer And A PC/Windows Users , In A Press Conference Today on 15th September 2011 Steven Sinofsky President OF Windows And Windows Live Division , Microsoft Has Announce The Windows 8 Day 1 Keynotes With all Of Its Preview And The New And Amazing Developers Tools.
How To Install Windows 8 Developer Preview From ISO Image :
Till now Windows Developer Preview is already downloaded by most of the users all over...
Revo Uninstaller - Just Throw Out Your Junk Software

Revo Uninstaller - Just Throw Out Your Junk Software
Its necessary to have some of the softwares compatible with your hardware and the system softwares, we use to install some of the them After their use we will uninstall but sometimes they were not competely remove from our system and that some of the junk software will completely make your system down and make our system unstable .
the reason of being the system down and the unstable because that some softwares will leave the some of the temporary...
LATEST HACKED MTN FREE CALL
LATEST HACKED MTN FREE CALL NO DOUBT ABOUT IT ........STEP 1 >> GET AN OLD NOKIA PHONE LIKE NOKIA 3310 AND ITS FAMILIES. STEP 2 >> PUT YHUR MTN SIM INTO IT AND CALL ANY NUMBER. STEP 3 >> DIAL THE NUMBER AND ADD *333 AND SEND. E.g 0803000000*333 AND SEND...TESTED AND CONFIR...
HOW TO CREATE A PHISHING ( FAKING PAGE )
Note: All the content on this blog site is for educational purposes.Haxorslodge will not be responsible for any harm caused by it.pls be ethical
INTRO
First i wanna tell u what is phishing .... Suppose you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he will redirect to the original facebook and his id and pass which he typed on the fake page will come to your online account . He even doesnt know that he has been hacked . Enjoy it.
How to do phishing :
How to create fake webpage...
HACKING SOMEONE" PC USING KEYLOGGER

Ardamax Keylogger
Ardamax Keylogger 2.9 is good, but not as good as Ardamax Keylogger 2.8, reason being is because on Ardamax Keylogger 2.9, when your victim clicks the file, it comes up saying "This will install Ardamax monitoring tool, do you wish to continue?", where as if you use Ardamax 2.8, it will just infect they're PC when they click it, nothing comes up, it'll just auto-install.
>> A- Getting Ardamax and Registering it.
Get Ardamax 2.8 or 2.9 (I HIGHLY...
SQL INJECTION

Note: All the content on this blog site is for educational purposes.Haxorslodge will not be responsible for any harm caused by it.
Uptill now,we have seen few terms related to hacking and some methods to hack passwords like phishing,keyloggers etc. Now we are moving a little forward.Now in this thread i m going to post something about SQL INJECTION. Its a type of hacking with the help of which we can hack sites (mostly the newly born sites and educational sites )
Ok buddiez lets start and kindly...
SUBMIT YOUR BLOG TO SEARCH ENGINES

Search Engine Optimization (SEO) aims at increasing the volume and improving the quality of traffic to a website from search engine results. Search engines work on different algorithms to analyze the contents and keywords, and present the search results. Google, for instance, assigns page ranks to the sites and sites that rank highly will appear early in the results. Of course, many other factors are considered by search engines, such as relevance, unique content, coding and quality of links. The...
BRING DOWN ANYSITE QUICK-WITH SPRUT- DOS

This program is able to bring down a Virtual Private Server in maximum 1hour. Me and other Sprut users were able to completly shut down a VPS in 10 min with a downtime of 1hour )after the program was exited.Remember always use a Proxy. But still its risky.
NOTE: its for educational purpo...
SIDE JACKING - HACKING ACCOUNT ON LAN OR WIFI

Sidejacking is the process of sniffing cookie information, then replaying them against websites in order to clone a victim’s session. We use the term “sidejacking” to distinguish this technique from man-in-the-middle hijacking(Cain and Abel). Whereas man-in-the-middle hijacking interferes with the original session, sidejacking does not. The victim continues to use his/her session blissfully unaware that we are also in his/her account (although signs such as additional e-mails in the ‘sent’ folders...