Subscribe: Hackers Protocol
http://hackersprotocol.blogspot.com/feeds/posts/default
Added By: sachin1bhargava Feedage Grade B rated
Language: English
Tags:
account  admin  android  fake  file  files  free  gmail  google  page  password  phishing  play  read  system  web  website 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Hackers Protocol

Hackers Protocol





Updated: 2017-07-23T17:15:11.968+05:30

 



Removing Country Restrictions In Android Google Play Store

2013-04-05T15:20:53.586+05:30

Google Play (Formerly Android Market)is the Largest Place for Android Apps,But one of the Biggest problem the users are facing is the Country Restriction in Google Play(Android Market).
Due to this Country restriction in Google Play(Android Market) Users couldn't download apps or games developed by the other country developers.
So here is the solution to Google Play Country Restriction.
Read more »(image)



Record All Incoming And Outgoing Calls Without A Beep

2013-04-05T15:21:17.029+05:30

Have u ever tried to record voice calls on ur Symbian phone??????But the main problem that we all faces is that during the recording of a call is that after every 15 sec the call recording software create a beep sound that can be audible to to user on the other end and thus he may came to know that the call is been recorded
Read more »(image)



Know The Creation Date Of A Gmail Account

2013-04-05T15:21:48.749+05:30

Sometime when u lost ur gmail account password then u need to use the recovery options given by google such as sms,voice message,alternate email etc....bt many user has not filled up these option and due to this laziness that have to lose there valueable account

Thinking of this fact google has provided u with an additional feature of google contact form but there also the basic problem is that it also ask for the account creation date otherwise you are not allowed to reset your password. So here is a tutorial by Hackers Protocol to know the creation date of ur gmail account
Read more »(image)



Important Announcement For All HackersProtocol.com Visitors

2012-06-19T00:32:31.751+05:30

Please take note if you want hackersprotocol.com in your news feed

Because Facebook wants page owners to pay for promotion, they made it where only about 10% of people that like a page actually see the status updates.To fix this, simply click on our page, click/hover over the "Liked" button at the top right of our page, and make sure you have the"show in news feed" option clicked on. This will allow you to see our posts.

Please Click "Like" to let us know that you read this Post.

Please don't bother if you have already checked it
Thank You
(image)



Change Blogger's Country specific URL back to .com

2012-06-19T00:23:14.521+05:30

Recently Blogger changed the it's user's , blog's url from .com to their specfic country URL .It gave a big loss to many Blogger blogs . So I'm with the solution . How to change it back again , to com URL .

Read more »(image)



How to make Trojan, Keylogger Undetectable from Antivirus

2012-03-11T19:10:25.604+05:30

In my previous post I wrote about trojan and how to crate a trojan server to hack but all famous trojan servers are detected by antivirus and thus useless. Here i am going to write the method to make your trojan, keylogger and RAT FUD (fully undetectable) by antivirus softwares.

1- Download PC Guard For Windows 
Read more »(image)



How to Hack Facebook Fan page

2012-02-24T23:50:41.749+05:30

Many times people asked me the tool to hack facebook fan page. I got many mails of those people whose facebook fan page has been hacked. And they need my help to recover that hacked page. Actually there is a small bug in facebook's page settings. In this post i will explain that bug and the way by which you can hack a facebook page.

Facebook page has a page owners and all the members who have liked the page. But admin has an option to make other page members as admin of the page. By using this feature, admin can add as many people as admin as he want.  And admin can also remove other admin. Now the bug exists in this feature. When the admin adds other persons as admin, the new admins will also have all the privileges as the original admin has.
Read more »(image)



How to detect a keylogger in a system

2012-01-26T01:31:43.597+05:30

Keylogger is the software program or a hardware which reads and store all the key stroke by a user in the system it is installed.

Having a keylogger in the system means you are going to loose some thing big. If your system is infected by a keylogger, your email id, facebook account, bank account and all other secure data is on the risk. Now a days hackers are active enough and many website offering free software download with keyloggers attached in it. So you need to know how to protect your system from keyloggers. If you want to know how to detect a keyloggers in a system, you can follow these points:
Read more »(image)



Increase your Hard Drive/Access Your Folders as Drives

2012-01-26T01:10:04.401+05:30

You can create Virtual Drives in your Computer. Now you can access your Favorite Folders as a drive in My Computer.
What you can do ?
Access your folders as a Drive !
Fool 'Computer Beginners' or your 'Friends' (Non-Expert) , as the drive will show Disk Space of the folder's drive so it seems that the disk space has increased !!
Read more »(image)



Convert your RAM into a Graphic card

2012-01-22T20:21:20.832+05:30

Play latest Games without Graphic Card
Many times we are stuck up with a system that just doesn’t provide enough juice to run the latest game…this results in->
you either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card
or you just read reviews of games like Crysis , Far Cry on gamespot and feel like a noob,fully knowing that your system just won’t be able to support it....
Read more »(image)



Call Free using Android Phones without WiFi or 3G

2012-01-12T00:28:11.064+05:30

Rebtel International Calling is an Android App that allows you to call Android Mobiles free without need of any 3G or Wi-Fi connectivity. You can call normally as you call any normal mobile number.
You need an Android mobile phone and should have this app installed on it. Your friend to whom you are calling should also have this app installed on its smartphone..
This is better than others as you can call anyone anytime, the person u r calling dont have to be online.
Read more »(image)



Search Any File on Any File Sharing Server

2012-01-08T02:17:43.127+05:30


Searching files on a particular File Sharing Server like Megaupload,Mediafire, or any other file hosting site can be a difficult task. Well, Now it's an easy job with an online tool known as Files Tube. Files Tube helps to search any file within a particular web hosting site. So, you just need to grab the name of the software,game,movie or anything and most probably you will get your file. The best part of this site is that it has an option with which you can search within a particular web hosting site like Mediafire, Megaupload,etc.
So, Here I will be showing tutorial to search tuneup utilities 2012 on filesonic
Read more »(image)



Use Google For Free Hosting Files

2012-01-07T01:42:34.552+05:30

Storage space in computers is a big problem, no matter how large space we have, it always feels less.  Although there are many free hosting sites on web, on which you can store your files and data, but this article will tell you how you can use your gmail account as a free file hosting site.

A single account on google/gmail can give you so much free, secure and well managed space. There are many sites which google owns provide you facility to upload/share files online for free, and the best thing is you can access all sites just by login through ur gmail account, and this is the main reason why I prefer to  use google for storing my files, i hate to do sign ups on many sites, moreover, to remember the user-names and passwords for every account is a very big deal for me. So if you are like me then you can find this article very useful for you.
Read more »(image)



What is Stub & its Working

2012-01-07T01:22:40.189+05:30

Now a days no new tutorials are coming out so i thought to write this

Now basically with most keyloggers, binders, crypters you find a Stub.exe

What is this Stub.exe?
- Well a stub is like the brain of the Keylogger. The builder is just the outer body. Like Imagine how you have a body but it won't function without a brain right? Similarly the Keylogger or a Crypter WON'T work without the stub.
Read more »(image)



Cookie Hack in Orkut

2011-11-20T03:54:17.515+05:30

Orkut Hacking With Cookie Stealing
Requirement:-
Read more »(image)



How to Install Android on Virtualbox

2011-10-22T01:14:52.373+05:30

Google Android has been termed as a revolutionary OS by many. Still, most people believe that there are further horizons which are yet to be explored for truly revealing the potential and the actual usage of the Android OS of Google. Many handheld gadgets which you find today in the markets and use daily have this software successfully installed and implemented in them Android provides for faster working on any mobile, PC or tablet. There are various applications for android smart-phones and net-books which are available free of cost in the Android market on internet. The Android OS is one of the most modern operating systems and is preferred by many people over other mobile OS like Symbian etc as it is faster and several applications can be run on it at a given time.
Read more »(image)



How To Send Large Files in Gmail,Yahoo

2011-10-20T04:21:30.328+05:30

Gmail,Yahoo etc and this becomes a big problem when we have to send large files then we have to use services like File Sharing sites .
Read more »(image)



Desktop Phishing - Tutorial

2011-10-19T02:04:59.941+05:30

It is an Advance form of Phishing. Kindly Read my Previous post on Normal Phishing Here before proceeding. Difference between Phishing and Desktop Phishing is as follows:-

In phishing :-
  1. Attacker convinces the victim to click on the link of fake login page which resembles a genuine login page.
Read more »(image)



How to Crash Small Websites using RDOS | DoS Tutorial

2011-10-13T01:57:37.099+05:30

Have you ever wanted to DoS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers.

NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial
Read more »(image)



Setting Webserver- Host Webpages on your Own Computer

2011-10-11T01:24:37.791+05:30

Have you ever wondered to setup a website without signing up at any web hosting site ? Learning web site designing and wanna keep testing how your web pages look? Free Web hosting sites removing you phishing     pages ?

So solution to such kinda things is in this post.  Basically we are going to turn our pc to a server.

Read more »(image)



Phishing Tutorial

2011-10-09T23:51:30.970+05:30

I could simply give you the fake page generators or already made fake web pages but I want you to manually create yourself.
First, I shoud tell you the basic methodology of making phishing page of any website. In a website where the users are supposed to enter/submit any data (data might be email,password or anything), there is a piece of code in html code called as action form. It looks like this
.
Read more »(image)



What is Phishing ?

2011-10-09T23:05:57.331+05:30

What is phishing ?
Phishing is a technique of obtaining sensitive data such username,password,credit card details etc by an attacker by claiming to be a trusted or genuine organisation/company.
The most common type of phishing is Fake Login Pages. The basic methodology of this attack is written below:-
Read more »(image)



Recover Windows Password Using “Cain & Abel”

2011-10-07T01:46:31.964+05:30

In Your Windows XP, 7, VISTA, NT or 2000 system there is a file which store your system password. this file is sam(system account manager) which store all your account information (i.e., user name, password and user setting) and because password can’t be saved as it is in a file because it can be hacked easily therefore Windows encrypt this password using a key(this key is stored in System file).
Both System and SAM file is stored at the same location i.e.,
C:\WINDOWS\system32\config
Read more »(image)



How To Find A Fake Website ?

2011-10-02T02:36:43.738+05:30

There are many fake websites around the web. Fake websites not only include some duplicate, unauthorized content. It also includes some malicious code which may harm the user at any point of time. It is always better to get warned before visiting such fake websites. We may not know when we will be attacked with such fake phishing websites, so it is always better to prevent ourselves before we get affected. Here are some ways that helps us to find out the fake website. Never ever fall into malicious website. Avoid doing it. How ? Go ahead and read on…

Read more »(image)



How to Play Latest Games without Graphic Cards

2011-10-02T02:29:11.589+05:30

Virtual Graphics Card-Play latest Games without Graphic Cards

This sounds almost too good to be true,doesn’t it?
Many times we are stuck up with a system that just doesn’t provide enough juice to run the latest game…the result being-
  • you either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card
  • or you just read reviews of games like Crysis , Far Cry on gamespot and feel like a noob,fully knowing that your system just won’t be able to support it.
Read more »(image)