Hacking Ebook$

Hacking Ubuntu Linux Free Ebook

  AMIT KUMAR DAS

           Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels.








---------------------------------------------------------------------------------------------




Hacking Gps Free Ebook

AMIT KUMAR DAS 

  • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!
  • Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS
  • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS
  • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
  •  Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector








---------------------------------------------------------------------------------------------



Hacking Google Maps And Google Earth

AMIT KUMAR DAS

           This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe, display real timetraffic, and much more.


NOTE : Password For the links is xSeLLizE







---------------------------------------------------------------------------------------------



Hacking Gmail Ebook

AMIT KUMAR DAS

  • The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans
  • This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts
  • Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks
  • Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog










---------------------------------------------------------------------------------------------




Hacking Blackberry Mobile Phone Ebook

AMIT KUMAR DAS


Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or drawing tool; even control yourcomputer over a network with it. And we haven't even gotten to theway-out stuff.  Tweaks, tricks, and add-on apps to customize your BlackBerry--plus Java code for even cooler hacks.

  • Pick a few of these hacks
  • Play games with BlackBerry
  • Search the Web
  • Connect to your PC wirelessly
  • Use BlackBerry as a USB thumb drive
  • Install custom ringtones
  • Supersize security
  • Draw sketches on your screen
  • Play your BlackBerry like a piano









---------------------------------------------------------------------------------------------



Hacking Windows Xp

AMIT KUMAR DAS

  • Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTech no-holds-barred style
  • Sinchak doesn't waste time tweaking Movie Maker or Instant Messenger-these hacks are heavy-duty, detailed instructions for squeezing every drop of power from Windows XP and maximizing speed, appearance, and security
  • Not for the faint of heart! This book is written for users who aren't afraid to rollup their sleeves, risk voiding their warranties, take total control of the task bar, uninstall programs that are supposedly permanent, and beef up boot speed
  • Mines gems like unlocking hidden settings, customizing boot screens, supercharging online and program launch speed, maximizing the file system and RAM, and dumping hated features for good
  • Written by the creator of TweakXP.com, a site considered Mecca for Windowshackers and trusted by more than ten million Windows XP users worldwide
  • Includes a hacker's dream CD-ROM with a set of ready-to-install hacks, theme creation tools, custom boot screens, "undo" files that help the reader tinker with Windows XP's registry, and a whole lot more




Hacking BSNL Broadband Internet speed




Hacking BSNL Broadband Internet speed

BSNL Internet is most famous Internet Broadband connection service in India. Its not only due to its ready availability but mainly because of it's somewhat cost-effectiveness. But, even though, many BSNL Broadband and BSNL Cellone Dataone users are frustrated with BSNL Internet speed as they never get speed that BSNL has promised to them and BSNL broadband connection breaks after every minutes because of line errors.  So today i am going to share with you the latest hacks that you can use to increase BSNL broadband connection speed and avoid regular disconnection and line losses.


Increase BSNL Broadband connection speed:


To increase BSNL broadband speed, just follow these 4 BSNL hacks  mentioned below:

1. Change BSNL DNS servers:

The main reason for slow BSNL Broadband connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband connection speed by changing default BSNL DNS servers to fast BSNL DNS servers, which can help us to increase BSNL broadband connection speed. Using public DNS servers improves speed, as BSNL has lot of users and all using the same DNS servers. So during peak time the DNS reacts very slow and takes a lot of time to translate the host address to numerical value, called IP address that your network used to connect to website.
Use these DNS servers for best speed:
208.67.222.222
208.67.220.220 

2. Use Adblock Plus:

The best way to increase BSNL Broadband connection speed is to block flash and other unwanted ad material on webpage, so that page loads faster, thus make BSNL Broadband apparently fast. AdBlockPlus is a firefox addon used to block flash content of page, thus helping you to increase BSNL Broadband connection speed. This has a lot of effect as it blocks unwanted advertisements and popups thus making your internet browsing experience even better.
     

3. Using TCPOptimizer:

This is another software used to optimize your TCP/IP connection settings. TCP/IP determines the maximum transfer Unit(MTU) for your device. The maximum data that your connection can send or receive per packet. Best MTU setting for BSNL broadband is 1492 ( by default its 1500 that causes an extra load on your broadband connection that why disconnections occur as you are forcing your device for doing something that it is not capable off, so optimise your TCP/IP settings). You can use TCP Optimizer your BSNL network settings. Install TCPOptimizer.
     

4. Reducing cache space:

Reduced Cache space can be used to increase BSNL Broadband speed. You can do this as:
For Internet Explorer : Tools - Internet Options - Browsing History - Settings - Disk space to use and reduce disk space value to "50".
For Firefox: Tools - Options - Advanced - Network and look for cache space. Change value to 50.






----------------------------------------------------------------------------------------------------------------------------------








How To Get Maximum Internet Speed




        How To Get Maximum Internet Speed:-




 In the previous article, which you can see here, we learned about how to speed up the internet connection using Google public DNS. In this article we will discover how to speed up the internet connection even more with several methods.
Method 1: system.ini document
Here we will use the system.ini document to speed up our connection, simply
follow these steps:
1) Go to run and type system.ini. Something like this should show:

You should know that it will probably look different on your computer,what’s important when you opened the file is that you follow the next step
2) Delete everything from the system.ini and paste the following:
page buffer=100000kbps load=100000kbps
Download=100000kbps save=100000kbps
back=100000kb

Method 2: TCP OPTIMIZER
If you are using Wi-Fi then TCP optimizer will help you out and you can download it from this link. Once you have downloaded the software you will have a window like this one:

From here on you can play with the settings to speed up your connection.
Method 3: Autobahn Accelerator
This is another program that will help improve your internet connection, it’s a small program that runs in the background and it doesn’t only help for you internet connection, it also reduces time to buffer a video. You can download it from here. After you install it, it should be already running.
Method 4: RAMRush
This is a pretty nice software which will optimize your RAM and again, improve your internet connection. You can download it from here. Once you have installed it it should look something like this:

That’s it! Using all of these will give you maximum internet speed.



----------------------------------------------------------------------------------------------------------------------------------







Become Secure Online



Become Secure Online

Privacy has become something very important to people using Internet these days. The more we do online, the more trails we leave behind. There are lots of private companies tracking every movement, keystrokes, websites you visit and the people you communicate with online. These companies often sell this information to law enforcement agencies or the government for legal affairs. Day by day more sophisticated tools and methods are being discovered to track your activities and the entire scenario has become very sophisticated. So it is very important for one to keep his privacy and stop third-parties from intruding into their activities. In this article, we will learn about various methods by which you can become secure online and mask your activities that you do not want the world to know.
The three types of methods we will use to make ourselves secure online are:
  • TOR
  • Proxies
  • VPN

TOR
Tor, short form of The Onion Router is a system that offers you anonymity online. TOR clients  redirects all your internet traffic through a network of computers concealing your actual location and preventing any tracking. The TOR bundle comes with a firefox that’s integrated to the TOR network and a GUI named Vidalia is used to use the TOR network. Here is how Vidalia looks like:
So before we start, let’s see how the TOR network works. Here are some pictures from the official website which will help you get started.

So whenever you try to contact to Dave, instead of directly contacting him, TOR first sends your transaction through a number of networks so no single point can track back to your location. So packets from your network take a random route through the network and reach the destination.

So once a route has been established, all kinds of data can be sent and received over the TOR network. And after a fixed amount of time, TOR changes the route through which you connect randomly which makes it very hard to trace back to you.



 or is good, but it can’t completely secure you and your activity. While it protects the transported data, experts can use statistical analysis and get your circuit route and find out your location.             Official Websitehttp://www.torproject.org
Download TOR Bundlehttp://www.torproject.org.in/download/download-easy.html.en

PROXIES
A proxy or a proxy server is a computer system or application that acts as an intermediary between you and your client server or application. So you want to access a target, you connect to the proxy, the proxy connects to the target, then it gets back the relevant information to you.


So a proxy can be used to keep you anonymous, or to bypass IP restrictions, security/parental controls, or to get around regional restrictions. A proxy server appears as an IP address which you have to configure on your web browser to use it. When you do that, your original IP will be masked by the proxy and you will be anonymous.
190.96.64.234 – This is how a proxy looks like. All proxies are from a particular location or country so using a proxy near to your target server might help faster browsing too! If you’re on Firefox, you can set a proxy by going to Firefox Options > Advanced > Network > Connection Settings > Manual Proxy Settings.

VPN (Virtual Private Network)
A VPN or Virtual Private Network is a remote server in an offsite location that tunnels all your data and information through their secured servers by encrypting them thereby making your connection secure. Most of the VPN’s use 128 bit SSL encryption or 256 bit SSL encryption. More the bit count, better the encryption. VPN helps you hide your real IP and spoofs your location to any programs or clients trying to track you. So suppose you’re from USA and needs to access a website that’s for Russia only, I could use a VPN located in Russia that masks my IP as a Russian one and thereby access the website.


Another matter of concern while using a VPN is logs. Almost all of the VPN providers keep logs as a security measure. This is done so that if they ever want to check up a user’s activity, they could refer to the logs. So federal agents or the government could contact the VPN providers and get your activity. Hence if you are really concerned about your security, you should purchase a VPN that do not keep logs. When you purchase a VPN, make sure you choose one which is closer to you since it will make your Internet experience smooth and won’t cause any lag or slowness.
There are lots of free VPN’s available but they’re not recommended since most of them come with lots of ads, adwares and slow connection. Most of them keep logs which mean you’re not really secure and the connection won’t be having a good encryption rate. So it is always recommended you get a paid VPN. But I’ll include some good free and paid VPN’s to help you out.

Free VPN

Paid VPN

CONCLUSION
So that’s it. I’ve discussed some main methods by which you can be secure online. But always remember, you’re never 100% safe. If the federals or others want to track you, they can still do it no matter what measures you’re using to prevent it. These methods will work, but only up to a limit. The rest is up to you to use your intuition to keep yourself safe.




----------------------------------------------------------------------------------------------------------------------------------







How To Convert YouTube Videos Into Mp3 Audio

There may be instances in your life, while you search for a song in the internet (mp3) and fail to get it and at last found its video in YouTube or any similar sites.. so what will you do if you need only the mp3(audio) instead of video. Most of them download the song(video) using some YouTube downloaders and use some applications to convert it into mp3. These all need some time and consume your internet usage a lot. And it’s a tedious job. You may fail to get the output iff there is any error in your internet connection. But today I am with a simple trick with which you can convert your YouTube videos into mp3 online,without any software. Only you need is the url of the YouTube video. That’s all. Scroll down and enjoy the trick…..
Go to video2mp3.net


In this field insert the url of the video


In this field insert the url of the video

 Click on ‘convert’
Then you will be taken to this page. When popup appear allow java applet

Then your download will start within no time
Browser addons for firefox,chrome and safari are also available so that you can do this conversion at a click

Clcik HERE to get addons of video2mp3 for firefox, chrome and safari 





How To Download Subtitle With VLC Player

Hello Itshackeddad Readers, If you want to download subtitles with VLC as BS Player which automatically search subtitles for movies on start of the movie, then you should use VLC’s extension VLSub 0.9.10. It works on Windows ,Linux and Mac OS X. I tested it on Kali Linux. 
Download VLSub 0.9.10 from this LINK. and install it on your PC .
If you’re Linux user then copy vlsub.lua to ~/.local/share/vlc/lua/extensions

cp vlsub.lua ~/.local/share/vlc/lua/extensions/vlsub.lua

Restart your VLC media player and click on View -> VLsub 0.9.10



then click on Search by name , select subtitle and click Download selection  






----------------------------------------------------------------------------------------------------------------------------------




How To Secure Your Facebook Account




99% Facebook Account Hack Through Email Account


Hello Itshackeddad Readers Today i will tell you how to secure your Facebook Account.

If you make your Facebook account with Gmail Account then secure your gmail account in my previous post check how to secure your gmail account.. if your Gmail account secure it means your facebook account 70% already secured.. In this post i will show you in pics how to secure your Facebook account...

1st step:-

Go to Security setting
BestHacking.in

Then Change your login notifications setting

BestHacking.In

Now Set Ur Privacy Settings

BestHacking.In

Do not show Your Email Address to Anyone ....

Do not Use Your Password In common Words..
Like LoveYou-Jaimatadi-Bf Name-Gf Name....
Use Password Like
my143@my143_my143
Love@143_love@143
Vry Strong Passwords Like

MY_143@#&MY(M)
MY@143(143)MY_143 



------------------------------------------------------------------------------------------------------------




3 Basic Tips to Prevent A DDoS Attack




Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack

 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.
Wrapping Up!


Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.




------------------------------------------------------------------------------------------------------------




How To Use Mobile Camera As A WebCam



Dear Itshackeddad  readers today I am going to tell you How To Use Mobile Camera As A WebCam





Step1:-     Install Windows [EXE] (SmartCam.exe on your PC and Install)

Step2:-     Install Smartcam on your Mobile (Symbian S60 2nd Edition [SIS], S60 2nd Edition, JME [JAR], Windows Mobile [CAB], Android [APK]

Step3:-     Start up SmartCam on your PC and go to >>> File >>> Settings and check your connection and proceed >>> next step.

Step4:-     Start SmartCam on your phone and go to >>> Options >>> Connect and it will ask you for server name and you need to type your PC IP address or your system name




f YOU don't know your IP address then,


>>> go to RUN >>> type CMD >>> type ipconfig
 "OR"
>>> go to Google >>> type "my ip address"

Subscribe Via Email  and get Itshackeddad Trick




--------------------------------------------------------------------------------------------------------------------------------


Downloading Torrent Using Internet Download Manager


    AMIT KUMAR DAS

Downloading Torrent Using Internet Download Manager


Hello Ishackeddad Readers, Thanks For Visit http://itshackeddad.blogspot.in today i will show you the way to download torrents with Internet Download Manager. Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll be able to download torrent file with IDM. This tool can be really helpfull when you want to download file that has very low seeds. IDM is the quickest file transfer manager on the internet market. So lets begin!

How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB 



--------------------------------------------------------------------------------------------------------------------------------



How to stop someone's internet access



How to stop someone's internet access::::


@Echo off
Ipconfig /release

Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew