Best Blogger Tips

HOW-TO GUIDES

Share


Articles in the HOW-TO GUIDES Category

How to Download YouTube Videos: Easiest Way
Wednesday, 3 Aug, 2011 – 22:04 | 12 Comments
How to Download YouTube Videos: Easiest Way
YouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me, would like to download them so that, they can be saved and retained. Well, if you …
How to Hack Symbian S60 Phones to Install Unsigned Applications
Saturday, 28 May, 2011 – 13:03 | 24 Comments
How to Hack Symbian S60 Phones to Install Unsigned Applications
If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. …
How to Identify and Avoid Phishing Scams
Sunday, 1 May, 2011 – 17:52 | 6 Comments
How to Identify and Avoid Phishing Scams
Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the …
How to Create Your Own Customized Run Commands
Tuesday, 19 Apr, 2011 – 21:37 | 33 Comments
How to Create Your Own Customized Run Commands
The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it …
How to Trace Mobile Numbers
Monday, 22 Nov, 2010 – 14:36 | 40 Comments
How to Trace Mobile Numbers
With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number …
How to Protect Your Computer from Keyloggers
Tuesday, 26 Oct, 2010 – 21:21 | 21 Comments
How to Protect Your Computer from Keyloggers
Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential …
How to Enable or Disable Hibernation in Windows 7
Thursday, 16 Sep, 2010 – 14:16 | 10 Comments
How to Enable or Disable Hibernation in Windows 7
Enabling or Disabling the “Hibernate” option in Windows 7 or Vista is not as simple as it used to be in Windows XP. For Windows 7 a different approach has to be followed to accomplish …
Cell Phone Lookup: How to Do a Reverse Cell Phone Lookup
Wednesday, 4 Aug, 2010 – 18:15 | 21 Comments
Cell Phone Lookup: How to Do a Reverse Cell Phone Lookup
A Reverse Cell Phone Lookup is simply a process of finding someone’s personal details such as name, age, address and related information by using their cell phone number. At times it becomes necessary for us to start investigating …
How to Detect Anonymous IP Addresses
Monday, 19 Jul, 2010 – 22:48 | 28 Comments
How to Detect Anonymous IP Addresses
As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means …
How to Hack an Ethernet ADSL Router
Sunday, 27 Jun, 2010 – 20:41 | 69 Comments
How to Hack an Ethernet ADSL Router
Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a …
How to Alter Windows Product ID
Saturday, 8 May, 2010 – 15:06 | 29 Comments
How to Alter Windows Product ID
If you are running a Microsoft Windows operating system on your computer, then you are most likely aware of the fact that your PC will have a Product ID. This Product ID is a system specific …
How to Test the Working of your Antivirus – EICAR Test
Saturday, 17 Apr, 2010 – 23:58 | 57 Comments
How to Test the Working of your Antivirus – EICAR Test
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will …


How to Spoof Caller ID – Caller ID Spoofing
Saturday, 3 Apr, 2010 – 0:34 | 17 Comments
How to Spoof Caller ID – Caller ID Spoofing
Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a …
How to Recover Deleted Files from Windows and Mac
Sunday, 28 Mar, 2010 – 23:01 | 29 Comments
How to Recover Deleted Files from Windows and Mac
How to Recover Deleted Files
 
Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the …
How to Block Unwanted Emails
Friday, 12 Mar, 2010 – 12:29 | 21 Comments
How to Block Unwanted Emails
Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and …
How to Hack Windows Administrator Password
Thursday, 18 Feb, 2010 – 13:45 | 53 Comments
How to Hack Windows Administrator Password
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer …
How to use Google for Hacking
Tuesday, 29 Dec, 2009 – 22:35 | 78 Comments
How to use Google for Hacking
Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also …
How to Make Invisible Password Protected Folder
Thursday, 10 Dec, 2009 – 13:36 | 52 Comments
How to Make Invisible Password Protected Folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I …
How to use Keyloggers – Detailed Tutorial and FAQs
Sunday, 1 Nov, 2009 – 10:40 | 51 Comments
How to use Keyloggers – Detailed Tutorial and FAQs
Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc.
 
WARNING: I highly recommend that you read this post …
How to Trace Any IP Address
Saturday, 10 Oct, 2009 – 22:58 | 64 Comments
How to Trace Any IP Address
In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this …
How to Protect an Email Account from SPAM
Thursday, 6 Aug, 2009 – 17:07 | 13 Comments
How to Protect an Email Account from SPAM
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we …
How to Compile C Programs
Saturday, 18 Jul, 2009 – 20:41 | 31 Comments
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
How to Find the IP Address of a Remote Computer
Thursday, 7 May, 2009 – 22:27 | 72 Comments
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
How to Make a Trojan Horse
Sunday, 5 Apr, 2009 – 18:41 | 81 Comments
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …


How to Send Anonymous Emails
Tuesday, 10 Mar, 2009 – 12:46 | 80 Comments
How to Send Anonymous Emails
How To Send Anonymous Emails
Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of …
How to Sniff Passwords Using USB Drive
Saturday, 7 Feb, 2009 – 20:26 | 127 Comments
How to Sniff Passwords Using USB Drive
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords …
Use Gmail Account to Send Emails from Multiple Addresses
Monday, 2 Feb, 2009 – 17:37 | 25 Comments
Use Gmail Account to Send Emails from Multiple Addresses
In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, …
Hack Software and Run the Trial Program Forever
Tuesday, 13 Jan, 2009 – 23:18 | 83 Comments
Hack Software and Run the Trial Program Forever
In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in …
How to Completely Erase a Hard Disk Drive
Thursday, 8 Jan, 2009 – 22:15 | 13 Comments
How to Completely Erase a Hard Disk Drive
A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one. But before you sell or donate your old computer, it …
Chat without Yahoo Messenger or Gtalk
Saturday, 25 Oct, 2008 – 14:55 | 27 Comments
Chat without Yahoo Messenger or Gtalk
Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends. But here I’ll show how to …
How to Change the ICON of an EXE file
Friday, 17 Oct, 2008 – 5:44 | 47 Comments
How to Change the ICON of an EXE file
Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting …
How to Protect an Email Account from being Hacked
Tuesday, 14 Oct, 2008 – 6:11 | 56 Comments
How to Protect an Email Account from being Hacked
Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please …
Hack/Alter Windows Vista Base Score
Sunday, 5 Oct, 2008 – 12:22 | 16 Comments
Hack/Alter Windows Vista Base Score
If you are a Windows Vista user then you are very likely to be familiar with the Base Score. This score is calculated based on the computer’s hardware and software configuration. This score act’s as …
How to Copy Locked Photos from Orkut
Monday, 8 Sep, 2008 – 15:12 | 89 Comments
How to Copy Locked Photos from Orkut
Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people …
How to Change IE Title Bar Text
Wednesday, 27 Aug, 2008 – 12:32 | 9 Comments
How to Change IE Title Bar Text
This hack allows you to change the text on the Internet Explorer title bar. The default text or title is “Windows Internet Explorer”. You can change this title text to your own choice.
 
 
1. Goto Run …
How to Edit Start Menu ?
Monday, 25 Aug, 2008 – 13:38 | 10 Comments
How to Edit Start Menu ?
Windows has a nice new Start menu, which you can customize more thoroughly than you could with the Start menu in any earlier version of Windows. Open the Taskbar And Start Menu Properties dialog box …


How to Disable Windows Logo Key
Thursday, 14 Aug, 2008 – 7:19 | 3 Comments
How to Disable Windows Logo Key
At times it becomes necessary to disable the Windows Key on the keyboard. For example when playing games this nasty Windows Logo key keeps annoying, as we often accidently press it and this takes our …
Change IP Address
Tuesday, 12 Aug, 2008 – 7:24 | 34 Comments
Change IP Address
How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address. 
 
 
 
 
1. Click on “Start” in the bottom left hand corner of screen.
2. …
How to Change User Information in Windows
Thursday, 1 May, 2008 – 16:02 | 7 Comments
How to Change User Information in Windows
On a regular basis, people ask me questions about changing user information, the information you provided when you installed Windows. You can change it. Here is a step-by-step instruction.
 
 
 
1. Open the Registry Editor (Type regedit …
How to Create a CON folder in Windows?
Thursday, 21 Feb, 2008 – 6:13 | 23 Comments
How to Create a CON folder in Windows?
Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?
The answer is NO and YES!
NO because when create a new folder and try to rename it to any one …
How to Block a Website ?
Saturday, 5 Jan, 2008 – 15:13 | 39 Comments
How to Block a Website ?
Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. …
How to Create a Computer Virus?
Friday, 7 Dec, 2007 – 9:17 | 81 Comments
How to Create a Computer Virus?
This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it …

0 comments:

Post a Comment