RSS

Introduction To Leet : The Language Of Hackers

Image

Leet, the language of the Geeks and Hackers.

To speak leet, you more or less need to un-learn proper english. The history of leet goes back to the early days of online message boards, or forums, where users can post messages to carry on a threaded conversation. In an attempt to “Clean-Up” the language that users would sometimes post, admins added a filtering system to the message board which would replace restricted words with some type of alternative.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , ,

Create Free Website and Free Hosting With uCoz

Image

You may have been always in problem creating websites, hosting blog and choosing content management system. But the developed web software like uCoz won’t let you be remain in problem anymore. By using uCoz you can create free website without any headache. uCoz have many awesome features that helps you to blog and create your own website easily.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , , , ,

Unlock Password Protected Ebook and PDF files easily

Image

Portable Document Format files, PDF files can be locked and password protected by several ways. And they carries several meanings as well. Some password protected PDF file can be viewed and read easily but we’ll need to input password to copy the text and images from it. Besides copy paste, the PDF file can be password protected to publish it in print media by disabling or password protecting the Printing ability of the document. Unless you read eBooks in printed form, it’s not necessary to unlock these PDF as most of the time you read it in your favorite eBook reader.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , , , , , ,

Search High Quality Images In Google

Image

Whenever you search in Google Image search, you’ll have large list of thumbnails. To get the realhigh quality source of that image, you’ll have to browse to inner core location of the source file. These sometimes become hectic job, especially when your search ends up with very low quality or low resolution images.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , , , ,

How to add Disqus Comment system to your WordPress Blog

Image

Literally pronounced ‘discuss’ is what many people are talking about. Disqus comment system allows more socialization with your comments and traffics. As a blog owner, you might be little more interested add this dynamic commenting system which is accessible from anywhere.

Adding Disqus comment system will increase your blog’s popularilty among the internet society. This is because Disqus easily supports large number of social networking sites and OpenID. As many of us have wordpress blog, I will guide you from very basic step to add a Disqus comment system with no coding required.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , , , , , ,

How to Fix Blue Screen of Death

Blue Screen of Death is a very common error that occurs in all the versions of the Windows OS, be it Win XP, or Win Vista or Windows 7. A lot of major as well as minor hardware and software related issues can lead to Blue Screen of Death (BSOD). Sometimes you can resolve the issue by simply solving it by restarting your PC. However, many times the BSOD screen won’t allow you to reach the desktop or even if you have reached the desktop, the BSOD screen can appear all of a sudden while you are doing something important on your PC.

Read the rest of this entry »

 
Leave a comment

Posted by on April 30, 2012 in Uncategorized

 

Tags: , , , , , , ,

How to hack remote computer using IP Address

Image

Literally, hacking is accessing something or somebody in internetwithout their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, http://www.website.com is hosted in separate web server rather than personal computer

Read the rest of this entry »

 
Leave a comment

Posted by on April 27, 2012 in Uncategorized

 

Tags: , , , , , , ,

 
Follow

Get every new post delivered to your Inbox.