This page has been robot translated, sorry for typos if any. Original content here.

Hacking, protection, useful advice

WEB Hacking

  • Xss for beginners
  • SQL Full FAQ
  • SQL Injection Tool 4
  • XSS for beginners
  • PHP-include
  • PHP-Session
  • DDOS
  • Phishing
  • How to create a fake site
  • SQL injection
  • Hacking EMAIL
  • Hacking Teapots
  • How to become a hacker
  • Regular javascript
  • Find in WEB Hack
  • Net attacks
  • Hacking mail.ru
  • mail2sms
  • Kill Ads on Site
  • We break the soap (BrutusAET2)
  • NTP amplification attack
  • Description of the hosts file
  • Coding and decoding of MD5 / SHA-1
  • base64_decode
  • All methods of hacking MD5
  • MD5 decoders
  • Deobfuscation of scripts
  • Decrypt HTML and JS online

Scripts, Programs

  • Everything for Pinch
  • Brute Forcer
  • Activate vkontakte
  • Treatment of Win32.Sector
  • How to treat viruses
  • Virus Piggy.zip
  • Send SMS (treat)
  • Check Online
  • Protection against viruses
  • Software for hacking
  • The IPB IPB Payment Scheme
  • Virus in RFID hacking
  • Admin scripts
  • Email Spam Script
  • Utilities for shadowing
  • Hacker Spies
  • Script-pingovalka for GPRS
  • Setting WEB Cameras
  • Broadcast over IP Camera
  • Hacking archives
  • Raise VPN + billing
  • Cracking a Forgotten Password
  • Bonding .exe
  • Kill the computer
  • On-Screen Keyboards
  • Software for data recovery
  • Launch Android on Windows
  • Overclocking SanDisk 64 GB for mp3

Windows & Shell

  • Activating Windows 7
  • Windows XP Services
  • Windows with flash drives
  • HDMI and sound
  • RegEdit (tricks)
  • Mail migration
  • Installing Windows
  • Doing a Patch Chord
  • BIOS audio signals
  • BOOTCD WIN XP
  • Speed ​​up the download
  • License windows
  • Register xp home
  • We make from XP Home XP Pro
  • Laptop Keyboard Shortcuts
  • Shortcuts for Windows Commands
  • Master Boot Record (MBR)
  • Hot keys in the shell
  • Bluetooth (FAQ and hacking)
  • Recovery guide
  • Java is not ... [FIX]
  • How to Unzip a WIM Image File
  • SMART HDD
  • Hot keys for Ctrl +
  • Hot keys for Excel
  • Crib of all connectors on the computer
  • SSL Certificate Formats
  • Keys F1 to F12
  • Secret combinations

Miscellaneous

  • Mail anonymity
  • Learn IP company
  • We learn IP through ICQ
  • Privacy
  • Protection against intrusion
  • Site Security
  • Criminal Code
  • Protection & Hacking
  • Hijacking and protection icq
  • ICQ Security
  • In the networks of special services
  • Locating by mobile phone
  • How can they harm
  • Antivirus statistics
  • How to check md5
  • Encode information
  • Check email for hacking
  • Anonymous surfing
  • Anonymous Email Sending
  • Access to blocked sites
  • Plugins-protection for browsers
  • Anonymous Operating Systems
  • Data protection on the Internet
  • What does the Internet know about you?

Miscellaneous

  • Steal an Email
  • Hacking FIREWALL
  • Cross Domain Scripting
  • ICQ IPDBrute Relay Server.
  • SQL injection in Oracle
  • Hacking webmoney
  • Hacking Hangouts
  • IRC Hack
  • How to search in google
  • Tune Firefox
  • What is an exploit?
  • Writing Trainers
  • Fraud in spam
  • Shail of the Site
  • Search Resources
  • useful links
  • XDSL Handbook
  • Free calls
  • Tweaking gmail
  • How to steal card money
  • Hard Drive Screenshot
  • Hybrid SIM card and memory card
  • About the DUCK in authorization

Miscellaneous

  • Online Anti-Virus
  • PlayStation 3 FAQ
  • HACKING PlayStation 3
  • PlayStation Jailbreak
  • PSGroove - FAQ
  • Hacking 3G Modems
  • Hacking Adsl Modems ]>
  • ARTICLES FOR HACKER
  • Helpful Tips
  • Faq by Icq terms
  • Filestorage
  • create a DVDRIP
  • Irc commands
  • Easter eggs
  • StarForce Removal
  • Chat rooms. Codes. Flood.
  • Hacking E-MAIL
  • Barcode Generator
  • BitCoin what is it?
  • Activating PhotoShop CS5
  • Hacking icloud celebrities
  • Safe use of ATM

Useful articles

Hacking chats:

  • Chat list
  • Chat FAQ
  • Hacking HTML chats. Theory also Practice part 1
  • Hacking HTML chats. Theory also Practice part 2
  • Basics of Java chat.

IP tools:

  • Anonymity of email
  • How to find out the IP of your computer, computers on the network
  • We learn IP through ICQ

IRC tools:

  • We hang a bot on Windows
  • A couple of ways of capturing lammer channels on IRC

Privacy in Inet:

  • Addresses on the Internet
  • Why do I need a cookie?
  • Pursue a spy or "Where does the computer mail send ..."
  • Network Pathfinder
  • What tells your browser

Protection & Hacking:

  • Soft
  • Security and Firewall
  • Selecting passwords with WWWHACK

EMAIL tools:

  • WWW-E-MAIL INTERFACES
  • Anonymity of email
  • How can you steal soap, or the saga of human stupidity
  • OVERVIEW OF VULNERABILITY OF FREE POSTAL SERVICES

Helpful Tips

  • We collect information about installed codecs in the system
  • Install also configure the FTP server. Share 1
  • Install also configure the FTP server. Share 2
  • How to protect a folder with a password?
  • Secrets of Windows. Three lines of protection from spam
  • Secrets of Excel. Input validation
  • Windows XP Remote Control
  • How to manage services also with drivers in Windows 2000 / XP?
  • How to manage services also with drivers in Windows 2000 / XP?
  • How to make your site fascinating for Google, MSN also other search engines
  • Secrets of ICQ. How can I remove myself from another user's contact list?
  • Extend the Windows interface
  • Pool in mobile phone
  • Excel for mobile phone
  • Use the camera phone as a scanner
  • How to convert text to image when a web browser is used
  • Normalize the volume of MP3 files
  • The first aid to the student
  • Online WAP-translators
  • Tricks with Windows registry. Share 1
  • The weather from the satellite in the mobile phone
  • The file for setting access to the .htaccess server.
  • How to register a domain
  • How to protect an EXE file with a password
  • Cell phone navigator
  • Robots.txt file
  • How to display the system time near the mouse cursor
  • Windows: traces
  • Free hosting services: pluses and minuses
  • Installing an HTTP server for file sharing
  • Buying a used phone: recommendations also tips
  • Personal server
  • Website Hosting
  • Upload files to your mobile phone via WAP
  • Manage your WebMoney purse from your phone
  • Hasty file renaming
  • We follow the exchange rate
  • Talking with computer
  • Cellular English tutorial
  • Cellular weather forecaster
  • Mobile webcam
  • How to create a WAP site
  • We use the camera phone as a motion detector
  • Defragment the Windows registry
  • How to automatically reduce the priority of "gluttonous" programs?
  • Compass in the mobile phone
  • Online translator for mobile phone
  • Tweaking Windows
  • Control of cookies
  • How to convert a text file to MP3?
  • Spell check: always the same everywhere
  • Newly-made MP3 order
  • How to replace one also with the same text fragment in many documents
  • DNS caching. Questions and answers
  • How to make a simple video security system?
  • Antivirus programs
  • Alternate Data Streams in NTFS
  • Anti-chat or "Nick Flooding"
  • HTTP protocol
  • www.try2hack.nl
  • A basic header () under a microscope
  • Hacking Odigo + Crack
  • How it was ... or root on the hosting provider
  • Some vulnerabilities of web resources using SQL
  • Smileys description
  • Constructing AntiMONON v.1.0
  • "Watching ..." or Vs Admin (LAN version)
  • Walkthrough for Quest For Hack.
  • Features of HTML Syntax
  • RFC
The practical application of some of the materials posted on this site may be illegal. All information of this kind is intended solely for informational purposes; authors and distributors are not responsible for its illegal use.

The materials are taken from books, magazines, other sources, bought in e-shops, received by exchange. Provided are "AS IS" ("AS IS"); check the performance of each is not possible. The site www.shram.kiev.ua works, rather, as a paid search engine for interesting materials.

On the sale there are no materials containing warnings about the prohibition of its distribution (paid or free of charge). If you notice copyright infringement (the sale of the material, for free distribution and sale of which its author did not give permission) - report, the material will be removed.