Just follow simple few steps to remove , delete Skype Account Login History in Windows Xp, Windows 7, Windows 8 , Windows 8.1 and Windows 10: … Read more »
Shutdown Your Computer or Remote PC using CMD
Required: A computer running Windows (XP, Vista, 7, 8 or 8.1) with the command prompt working perfectly, i.e. not disabled by a virus. Initial Steps: 1) Press Windows Key + R. 2) Enter CMD and press Enter. This will start the command prompt. Follo… Read more »
Create Undeleteable and Unrenameable Folders using cmd..
Basic Concept: The basic concept behind this trick is the use of Keywords. Keywords are reserved words in any programming language that cannot be used as names of variables. Windows also uses certain keywords in its programming. Some of them are … Read more »
KeyBoard Shortkeys...
Windows key+D: This shortcut is the keyboard equivalent of “Show the Desktop”. It is useful for quickly minimizing every open window when someone walks in and you are doing some private work. Ctrl+Shift+Esc: This shortcut directly starts the task … Read more »
Watch ASCII Star Wars in Windows XP, Vista, 7 and 8
Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII (American Standard Co… Read more »
Notepad Tricks..
Matrix Falling Code Effect - Notepad CMD (.BAT) Tricks: Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or … Read more »
12 Simple Steps To Become A Hacker..!!
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating system… Read more »
The SSL Certificate and Your Website’s Security
When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online t… Read more »
Wifi Hacking eBook
Download Now Note.: It is only for educational purpose only..!!!… Read more »