Powered by Tech-Attacks
Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

How to Hack Facebook Account ?

How to Hack Facebook Account ?

How To Crack BIOS Password in Windows - Tutorial

Here is the best way to crack the bios password in Windows.
This one pc trick, is so small & easy to perform.

Follow the steps below to perform this pc trick:

How to Easily install & Dual-Boot Windows 8 on Apple Mac - Tutorial

how to install windows 8 on a mac How to Easily install and Dual Boot Windows 8 on Apple MacsInstalling and dual-booting Windows 8 on Mac OS X mountain Lion are really easy now. Thanks to Apple’s latest update to the OS X mountain lion.  Apple has released Boot Camp 5 in the latest OS X Mountain Lion v10.8.3 which now supports installing Windows 8 on your Macs. Using  Boot Camp 5, Mac users can now easily switch  between OS X and Windows 8.
Also Chek -> Install Windows8 / Windows7 or Linux Using USB Drive.

Installing BackTrack Linux using VirtualBox


Hello Readers, Today Tech-Attacks is going show you “ How to install Backtrack on VirtualBox
(I am using here BackTrack 5 r3)

Necessary things:
1. BackTrack
(It must be “.iso” file).
2. Oracle VM Virtual box
.
(Both Download Links listed at the End of Post)

Before reading further article Please take a second to Bookmark TechAttacks for your later use or For more Updates Follow us on our BLOG or get tuned by simply Liking Tech-Attacks on Facebook.

How to Install Android on iPhone - Complete Step by Step Guide

Are you bored with Apple iOS firmware? Would you like to get Android on iPhone! Wouldn’t it be fun to be unlike other iOS users and use a different operating system?
If you don’t update your iPhone to iOS 6.1.3 Apple software you can jailbreak your device using Evasi0n or Sn0wbreeze for Windows users.
It’s very easy to do. A few simple steps, and your Android on iPhone install process is complete with you getting the new features and unusual options. Here is how to install Android on iOS guide that will help you to achieve your goal.
Also Check -> Android vs iOS.
For more related stuff simply Like Tech-Attacks on Facebook or Follow us on our Blog .

Make your own Fud Crypter / The Crypter BluePrint Ebook - Free Download

Hello Readers today Tech-Attacks is going to share one of Best Book on Cryptography.
By reading this book you will learn how to make your own Fud Crypter.

The FREE Download link & Table of contents which is included in this E-Book is listed below :

Easy WiFi Hacking Using Pineapple - Tutorial

Pineapple - The WiFi Hacking Tool.
Hello Readers, before I began, I must clear one thing, that this is not the common-ordinary pineapple. It is actually a whole Set of Devastating hardware tools used for cracking WiFi networks. Though It is quite less popular, it is one of the greatest WiFi Hacking Tool Available In the Market. Though It can be used for hacking Wifi Networks, it can also be used to penetrate and check the security of the network.

Anti Hacker Toolkit (E-Book) - FREE Download

Hacking Tool Tutorials, There is one E-book that should be used as a reference. This E-book titled "Anti-Hacker Toolkit [Third Edition]". In this book are described in detail how to use more than 100 "hacking tools". The explanation is technically quite easy to be understood and followed. Explains how to attack, survival, and detect the attack and overcome them (Attack & Defense).
Anti-Hacker Toolkit provides complete tutorials on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. Completely revised to include the latest security tools, including wireless tools , New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New case studies in each chapter.

Hide any local Drive using Command Prompt

There are 3 methods available to hide a local drive without using any software
1. Hide a drive through gpedit
2. Hide a drive through regedit
3. Hide a drive using command prompt


Today we are covering command prompt way of doing it. So lets see how to do.
How to Hide any Local Drive using Command prompt

How to Hide a Local Drive using command prompt?

Check wether your Pendrive is Original or Fake

Nowadays we can buy Flash drive at low price. We can buy 32GB flash drive for only 10 $. Mostly these are fake drives. Now flash drives also manufactured as fake and its it's look like original one.  These type flash drives are mostly imported from China. They are using some small programs to show 4GB pen drive as 32GB.

How to check your Pen-Drive is Original or Fake
So let's check your Pen-drive is original or fake

Get Access to all Blocked Sites

Hello Readers, Tech-Attacks is back with a new topic to open banned or blocked websites.
You can also check some other Articles on same topic(links mentioned below)
http://techattacks4u.blogspot.in/2012/09/open-banned-websites-without-any-proxy.html
http://techattacks4u.blogspot.in/2012/11/get-access-to-blocked-websites-by.html

Several Simple Steps to unblock websites are described below:
Note: Below mentioned steps can be done only on Windows Operating System.

1) Click Start and open Control Panel
2) Find Network and Internet and then Click on Network and Sharing Center


Transfer iPhone Messages to PC without Trouble

iphone messages transfer boxshotIs your iPhone not receiving new messages as your inbox is full? Are you looking for an easy solution to transfer iPhone messages to PC or computer? If yes, then you are in the right place. We would like to introduce you to the iPhone messages transfer tool which will allow you to transfer iPhone messages to PC in just a few easy steps. This tool will enable you to transfer specific messages (SMS), all SMS of a specific contact, or all messages on your iPhone to PC in just few seconds. 

transfer iphone sms to pc 
All thanks to this tool, you can now easily transfer iPhone messages to PC in Txt file format and access them any time. This iPhone SMS transfer utility can also sync your iPhone library to iTunes directly. It is an easy to use utility and you don't have to be a computer expert to use this tool to transfer iPhone SMS/Messages to PC.

Backup iPhone SMS to Your Computer (Tutorial)

Unlike emails which are stored on the cloud, SMS are saved on your phone and if anything happens to your iPhone, You'ill never see your precious SMS ever again. Because the iOS is such a closed system, you won’t be able to find an app that can backup and restore deleted SMS for you.
iPhone SMS
Today, Tech-Attacks is going to show you how to safely backup your iPhone data and then find the special file where all your iPhone SMS data is kept. With this file you can keep a copy in a safer place or view the SMS within the file through a website.

Install Windows8 / Windows7 or Linux Using USB Drive

Windows 7 USB Stick1 How to Install Windows8 & Windows7 From USB Drive Install windows or Linux usin USB stick. Just Follow several step by step instruction.
Note: All screenshots also listed below steps so see that and do your steps. So, Follow it Care fully because some unfollowed steps can probably make some harmful thing.

You can also refer my old post regarding same topic from here -> http://techattacks4u.blogspot.in/2012/12/make-your-usb-bootable-windows-os.html
For more related stuff Like Tech-Attacks or Follow us on our Blog 
So lets continue to our post & make our USB drive bootable to install Operating System (Windows / Linux Both)

Remove MALWARE from PC : Step by Step Tutorial

Malware , short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that when run, spread the virus to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits itself over a network to infect other computers. It too may carry a payload.

These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads itself automatically. Using this distinction, infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses rather than worms.

In my experience, malware is one of the most common and annoying issues a PC owner has to combat. Fortunately with a handful of free tools it’s easy to keep malware in check. Here’s how I do it with free tools.

Get anyone's IP address - Tutorial


With an IP address you can hotmail revert them or try to IP hack them using a program
Basically this tutorial is to grab the IP of a user it may also be done by simply asking the user lol he/she surely wont tell you!
However, After extensive research Tech-Attacks found out the solution and would like to share with you all.

For more Updates Follow us on our BLOG or get tuned by simply Liking Tech-Attacks on Facebook.

Make Free Proxy - Tutorial

How to make free proxy?

A simple Google search and you’ll find dozens of really good PHP scripts on the Internet to help you create proxy servers in minutes for free. The only limitation with PHP based proxies is that you require a web server to host the proxy scripts and second, you also need a domain name to act as an address for your proxy site.

If you don’t own a domain or server space, you can still create a personal proxy server for free and that too without requiring any technical knowledge.

Create a Free Proxy Server with Google App Engine

Use Proxy / Anonymous surfing in BackTrack 5 - Tutorial

Hello readers, There are a lot of ways to Hide your identity.

But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple proxies also.
Well its called Proxychains.
What it does

Well proxychains is a inbuilt tool in backtrack to let u use proxy very easily. It uses proxy according to the configuration file , which we gonna config and it takes u to any address or url via multiple proxies.

For more Updates Follow us on our BLOG or get tuned by simply Liking Tech-Attacks on Facebook.

Proxychains Intro
well actually there is a configuration (.conf) file in etc folder . its named proxychains.conf. This is the file where u will do all ur stuffs and u’ll hide your identity just by typing a single command once you configure.
Go to terminal and type following command then hit enter

Ankit Fadia's all hacking E-Books - Free Download

Hello readers Tech-Attacks going to gift you Ankit Fadia's all hacking E-books pdf file Download for FREE.
About Author: Ankit Fadia is Computer Security Expert and Ethical Hacker and you can get more info regarding him on wikipedia.org by clicking here -> AnkitFadia on Wikipedia
 
This is a full collection of Ankit Fadia's E-books which includes almost all his E-books, If u like it then download it from below link. Some of E-books includes contents like DOS attack, hacking into linux, Defacing websites etc.
Below are several screen shots.
For searching more E-books on Blog Click here -> Tech-Attacks E-book Collection