Top 5 Hackers of the computer world


1. Kevin Mitnick

Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as “the most wanted computer criminal in United States history.” His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.

Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation’s computer network and stealing software.

Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura’s home computer.

Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.

2. Adrian Lamo

Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko’s and libraries to achieve his feats earning him the nickname “The Homeless Hacker”. Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.

Lamo’s hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.

Lamo’s intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.

3. Jonathan James

At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.

James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.

High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: “The software stolen by James supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.

4. Robert Tappan Morris

Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years’ probation, 400 hours of community service and assessed a $10,500 fine.

Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.

5. Kevin Poulsen

Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio’s KIIS-FM phone lines. These actions earned him a Porsche among many other items.

The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen’s specialty was hacking into phone lines and he frequently took over all of a station’s phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.

Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles.

Watch STAR WARS Movie On Command Prompt


Hi,you know very well 'STAR WARS' is a big blocbuster movie series of 'HOLLYWOOD'.Here,I am tell , how you can watch this movie on Command Prompt.For watching movie internet connection must.

1. Firstly,Open the CMD .
2. Type ...
3. Click the ENTER key.


How to Turn Off AutoPlay Feature in Windows 7


Autoplay is the feature in Windows operating systems which lets you decide what application to use when you insert a media or device (USB or CD, CD, DVD etc.) to your computer. It also lets you set a default action for certain devices or medias.

It is good feature of Win7 but some time it come with problem.A virus with 'autorun' in the pen drive is too harmfull ,WHY?,when you insert a pen drive (also contain virus) then autoplay come with it when you insert the pen drive, autorun file of virus also start doing work and virus come on your system before you doing scan on the pen drive.For stop it,it is necessary to turn off the autoplay option for security purpose.For turn off the autoplay follow step given below...

  1. Click Start.
  2. In the Search field, type gpedit.msc and press Enter.
  3. The Local Policy Group Editor should appear on your screen.
  4. On the left pane go to Computer ConfigurationAdministrative TemplatesWindows Components and click AutoPlay Policies.
  5. On the right pane, click Turn Off Autoplay.
  6. Select Enabled and under Options, select where you want to turn off AutoPlay. (All drives or CD-ROM and removable media drives.)
  7. Click OK for the changes to take effect.

Proxy- Hide your ip address


After a great proxy post today i am introduse you with Invisible Browsing,It is a tool by which you can change your real ip address with fake ip address.No any person trace your right location and do not done any hacking activity with you.

For Downloading click here.

Trace Mobile number and IP address


A few days ago i got a website which are very helpfull in trace the mobile number ,landline number,vehicle number,bulk sms sender and ip address.

This site also helpfull in found STD code.

For go to website click here

Make all images revolve in facebook,orkut and any one


This is a really cool trick by using simple Javascipt.You do it with any website pages in which picture include with it.

paste below code in your address bar of your browser(Means on the top address bar of the browser also called URL address bar)

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length
; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+
"px";*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

And then Hit the ENTER Key and see.

Make Google Chrome faster!


However, such a feature seems not to work properly for a lot of users with the result that your Google Chrome will hang while downloading a website, returning you with this message: “Resolving Host”. Other times instead you may get a error message like this:
“The webpage at might be temporarily down or it may have moved permanently to a new web address. Here are some suggestions: Reload this web page later.” Here is a simple Google Chrome Trick to solve this issue and get an ever faster surfing experience!
  1. Open Google Chrome.
  2. Click the Spanner icon located on the right side of the browser.

3.Click Options.
4.Click the Under the Hood tab.
5.In the Privacy section, untick Use DNS pre-fetching to improve page load performance.
6.Click the Close Button.
7.Restart Google Chrome

How to change language in Windows 7


Some version of Windows 7, such as Windows 7 Ultimate and Windows 7 Enterprise, allows users to change the support language to display text in wizards, menus, help and supports and dialog boxes. Here is the manual procedure to change language in Windows 7.

1.Click the Start button.
2.Click Control Panel.
3.Under the Category view, click the Clock, Language, and Region link and right after that click Change Display Language link located under the “Region and Language” section.

4.Under Icon view, click Region and Language icon, and click the Keyboards and Languages tab.
5.Under the “Display Language” section, choose and change language from the drop-down menu.

6.Click Apply.
7.Restart your computer for the change to take effect.

If you want to change the language of the welcome screen, network services, local system. If you also wish to change the language of new user accounts, follow this other procedure:

1.Click the Administrative tab in the “Region and Language” window.
2.Under the “Welcome screen and new user accounts” section, the Copy settings button.
Now, in the “Welcome screen and new user accounts” dialog box, tick the Welcome screen and system accounts and New user accounts checkbox.

Enable Win’s User Account Control


User Account Control (UAC) notifies you before changes are made to your computer that require administrator-level permission. The default UAC setting notifies you when programs try to make changes to your computer, but you can control how often you are notified by UAC by adjusting the settings.Like

Windows needs your permission to continue

A Windows function or program that can affect other users of this computer needs your permission to start. Make sure to ensure that it's a function or program you want to run.

A program needs your permission to continue

This will happen when a program that's not part of Windows needs your permission to start. It has a valid digital signature indicating its name and its publisher, which helps to ensure that the program is what it claims to be. Make sure that this is a program that you intended to run.

An unidentified program wants access to your computer

This is caused by a program that your administrator has specifically blocked from running on your computer is trying to run. To run this program, you must have an administrator unblock it.

The main reason to use UAC is to prevent malware and spyware from installing or making changes to your computer without your permission.

Here is how you turn the User Account Control feature off:

  • Open User Accounts from Control Panel.
  • Click on turn User Account Control on or off.
  • If You use Win7 then set the level of UAC else
  • Uncheck the box that says Use User Account Control (UAC) to help protect your computer.
  • Click Ok. You may have to enter administrator credentials depending on who you are logged in as.
  • Restart your computer for the changes to take effect.

Change the size of virtual memory


If you receive warnings that your virtual memory is low, you'll need to increase the
minimum size of your paging file. Windows sets the initial minimum size of the paging
file equal to the amount of random access memory (RAM) installed on your computer plus
300 megabytes (MB), and the maximum size equal to three times the amount of RAM installed
on your computer. If you see warnings at these recommended levels, then increase the
minimum and maximum sizes.

1.Right Click to MyComputer>>properties.

2.In the left pane, click Advanced system settings. If you are prompted for an
administrator password or confirmation, type the password or provide confirmation.

3.On the Advanced tab, under Performance, click Settings.

4.Click the Advanced tab, and then, under Virtual memory, click Change.

5.Clear the Automatically manage paging file size for all drives check box.

6.Under Drive [Volume Label], click the drive that contains the paging file you want to



Some time when you search some matter or website then a error message come with code like above picture,What do all those error code mean ?
Means of error code given below...

400 – Bad Request – You probably typed in a URL wrong, the server has no clue what you’re looking for, or you aren’t allowed to have access. Usually, it’s a matter of the URL being typing in wrong. Maybe you mixed upper and lowercase letters or something.

401 – Unauthorized Request – you tried to get to something on the web server you’re not allowed to play with. In other words, you ain’t on the party list.

403 – Forbidden – You can’t access the page. You may not have access (it may require a password), or it may be blocked from your domain.

404 – Not Found – The page you were trying to look at was not found on the server. This is probably the most common error you’ll come across. What has probably happened is that the web page you were going to has been removed or re-named.

500 – Internal error – Usually caused by a CGI error. You fill out a form, but the script used to process it is not working properly.

503 – Service Unavailable – The server may be overloaded, down, or have other similar problems. Try later.

Set the manual proxy settings on your browser


Here i am tell you how to set manual settings of proxy for your Mozila Firefox browser.First open your Mozila Browser and look in the upper left corner given a object Tool...

Click on the Tool,you see a list in which given many function click on the 'option'.After that you see a new window like given below...

Go to 'Advance' and after than 'Settings'.Than open a new window like given below..

Set Manually and Enter the proxy site name which you like for use.

Web Surfing Proxy


What is a proxy?
A proxy is an address of a proxy server that is placed between your computer and the internet :
Normal :
Computer --------> Internet

With proxy :
Computer ---------> Proxy server -----------> Internet

The advantage of a proxy is that if you hack the would get your ip address but the address of the proxy server. Same if ur a normal internet user the hacker won't get ur ip but the ip of the proxy server.

Kind of Proxies:
Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's

Proxy software:
Use the proxy software,for download click below..

For free proxy use the proxy website like, etc.

Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

HACKARDE © 2011 | Designed by HrDe