Related Posts Plugin for WordPress, Blogger...

Sunday, November 25, 2012

Hackers Wallpaper HD By Pcbots - Part-II

Salam! Yeah i am back on my Blog. And it defiantly feels good. Today i was in mood So make some Hackers Wallpapers  If you are hacker then i hope you defiantly will like it. 

"To err is human, but to really foul things up you need a computer"

- I hope many of you already saw this :) so there is no need to describe any more. One and only my big brother H4x0rL1f3.

- DDOS and Botnets . . .It feels like hell and this some seems like that hacker who is BOSS of botnets lol

- It is just so so but still Hacker Detected!

- This is cool and Me also like it. Bring it ON! 

- Linux user use this to admin that Linux is lot lot better that Windows hehe..

- The Quieter you become the more You Hear!

- I left hacking but still when i am sad it. Hack make me feels good!

- A fool with a tool is still a fool, And i Call them Noob! haha.. I like this one

- Window users common keys combination :P

- BackTack the Heaven of Hackers. If you have it then you got some cool toys to play with it.

- Laptop battery! 

- Brain! hacker really know how to use it!

- It is safe to turn off your PC.

- My Cat . . . ^_^

- THis is last one for Today. Always follow it!

Ok it took about 2 hours to make this post ^_^
Its time for rest. Tell me if you like or hate in comments. 

you can also check out part 1 of Hacker Wallpapers

That's all for Today! See ya!

Tuesday, November 13, 2012

Hackers Wallpaper HD By Pcbots - Part-I

  • Bot is updating your PC :) Pcbots Wallpaper

  • Yeah that True that there is no place Like Localhost or

  • Shhhhhhh... it is Hacking time.

  • Dammm.. it seem i am hacker 

  • It seems any hacker is cracking any code.

  • Backtrack 5 is what hackers want.

  • Save you Security From Hackers.

  • Hacker wait for download then Game Over!

  • Game is Over you Hacker.

  • Hell low space.

  • Don't make Hackers Wild.

  • No Girl Friend For Hackers.

  • 0 or 1. ON or OFF

That's how Hackers Spend their Life!
  • Tip that every hacker should remember.

  • This one be last one for today. :) and i hope all you you will like it

That's all. :) Enjoy!

Follow me on FB

If you like then also Check my For More Hackers Wallpapers -Click Here


About Author:

Muhammad Usman - Designer, Security Expert and Programmer.
Muhammad Usman is a Professional Geek. Follow him on Facebook, Twitter, Google+, Linkedin, YouTubePinterest, Behance and Soundcloud.

Tuesday, November 6, 2012

Different Types of Hacker and their Thinking ~ PCbots

The different kinds of types of hackers there are, so people don't misunderstand what they are

White Hat: A hacker who is motivated to explore systems for intellectual curiosity, rather than for malicious or criminal intent. White hat hackers oppose doing damage to systems, stealing data, or interrupting service to a Web site. But their activities may be illegal if they explore systems they aren't authorized to enter. White hats can also unintentionally damage or delete data. Many white hat hackers work as well-paid security consultants, programmers, and network administrators. Refers to ethical hackers as well, as they (usually) only break into systems and pentest IF they have permission, thus they don't have a reason to do anything malicious except if it has been requested by f.ex. a contracting corporation (which is quite unlikely). These are also refered to as the good guys, as most of them makes proof of concept, consulting, etc. Which helps the internet to become more secure (even though their proof of concept are usually abused by f.ex. script kiddies). It should be said though, that occasionally black hats has been seen claiming they're white hats, and also (of course) that script kiddies were white hats. 

Black Hat: If you think of www as the wild, wild west, then you can guess on which side of the law the black hat hacker operates. Black hat hackers (aka "crackers") steal data or damage systems. The most dangerous black hats are able to remain undetected for years, secretly monitoring a victim's PC for whatever nefarious purpose they have in mind. This is the type of hacker that hacks for usually personal gain, weather it is economical, political or just fun doesn't matter. There's no such thing as respect for authorities, loyalty or morale (if there were, then they would be more near the gray hat area). In this case there's often found script kiddies claiming that they are pure black hat, because it sounds cool, destroying and might work with non-hackers to induce a state of "awesomeness", even though the real hackers would have no problem seeing that the person is just a script kiddo.

Red Hat- A Red Hat is an Aggressive Version of a White Mage in the employ of a Government Agency whose purpose is to hack into the Computer Mainframes of other Governments with the Goal of Disabling or Cripping them.

A Grey Hat-

A Grey Hat in the computer security community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.


One reason a grey hat might consider himself to be grey is to disambiguate from the other two extremes: black and white. It might be a little misleading to say that grey hat hackers do not hack for personal gain. While they do not necessarily hack for malicious purposes, grey hats do hack for a reason, a reason which more often than not remains undisclosed. A grey hat will not necessarily notify the system admin of a penetrated system of their penetration. Such a hacker will prefer anonymity at almost all cost, carrying out their penetration undetected and then exiting said system still undetected with minimal damages. Consequently, grey hat penetrations of systems tend to be for far more passive activities such as testing, monitoring, or less destructive forms of data transfer and retrieval.

The Ghost Hacker (Spammers)

This type of hacker, doesn't exist as the person behind has hidden that identity so well he should never get caught. The reason why it's unlikely he would get caught is due to he's extremely well skilled and also very focused on what he is doing. The ghost hacker lives though, a double-life in the real world and also virtually. He has a job, usually an anonymous IT-job in the middle-class, which he does without any problems. He has a normal route and routine on the internet just as the others of us, but this whole identity is just an identity to hide his real intentions. In his other life, which NO ONE knows about, he has probably a room with separate machines, which are quite stealthy. The last note about ghost hackers is they (usually) make big money on their things, and they might use a lot of time on doing the work with their contractors which are of course, hidden as well.

Blue Hat- A Blue Hat is a Rouge Hacker who hacks for fun or to get revenge on a certain person or company who may have angered them. You should avoid angering or offending Blue Hats, this should be very easy due to the fact that most Blue Hats are passive in nature and would rather practice on a person that they REALLY hate. Blue Hats are akin to "Noobs" due to the fact that they don't really care that much about hacking.

Green Hat- A Green Hat is a name for a New/Newb Hacker, who is just starting to practice hacking. Green Mages are akin to "Newbs" due to the fact that they show a desire to learn about hacking and listen to more experienced hackers, and also they don't suffer from the ADHD-like Noobdom of Blue Hats.

The Script Kiddie
A script kiddie is not a hacker. He doesn't have the required knowledge about computers, servers and networks, infact only very basical knowledge about protocols, if he even knows what a protocol is. He's usually not capable of programming anything, though he's usually found on forums where similar exchanges ignorance. These kind of guys usually claims they know a lot, even though they really don't thus they are also found striking very at very random targets, on todays internet usually google picks their targets for them by using googledorks which might have even been made by other more skilled hackers. Most script kiddies doesn't understand anything in depth, yet they think they know a lot cause they can do their advanced stuff on windows machines.

Now My own Point of view is that 

World Best Defacer or Web hackers are "Turkish"
They hack 1 million plus sites and really make hell in cyber space.

World Best Coders are "Russians

Russian hacker codes are really really dangerous and what they code in 2003 are now used in 2012. This shows the level of Russian coders.

Reference : Google Images

Monday, November 5, 2012

Find Out Who's Trying to Unlock Your Samsung Galaxy S III

Find Out Who's Trying to Unlock Your Samsung Galaxy S III with the Hidden Eye Android App

With the Samsung Galaxy S III being a hot commodity, it's no surprise that your friends might try unlocking your fancy password-protected phone. While some friends have good intentions when using your phone, there are those certain friends who get into the phone to do this...Hacked!

The worst scenario might be that you leave the phone around a group of friends, come back and find that all of your social media accounts have been hacked. When you yell out to your friends asking who did it, no one makes a sound.

Hidden Eye is an simple application that takes a photograph through the front-rear camera whenever anyone has a failed attempt at typing in the password on the lock screen.

Link for app:

In order for the application to work, the unlock password for the phone has to be longer than 3 letters or points. Once you unlock the phone correctly, the application will show you the dates along with the pictures taken of anyone who incorrectly typed in your password.

Check out the video below for a video walkthrough of Hidden Eye on the Samsung Galaxy S3 from XDA-Developers.

There is also a paid premium version called HiddenEye Plus, which removes ads and adds a few more features.

Reference : Link1