• Archive for December, 2008

    Get Top Rankings in Google

    by  • December 21, 2008 • Tutorials • 0 Comments

    The tutorial is all about getting your site listed on top in Search Engines i.e Search Engine Optimization First thing you need to do is find the keywords you want to optimize for. There is great tool by Overture (/http://inventory.overture.com/d/sea…ory/suggestion/) But I would suggest using this free tool called GoodKeywords (/http://www.goodkeywords.com/products/gkw/) This one does the […]

    Read more →

    Get unlimited bandwidth from your host for free

    by  • December 21, 2008 • Tutorials • 1 Comment

    NOTE: This applies only to specific hosting companies, due to the specific setup needed and does have its drawbacks. While setting up hosting space with a specific company I often deal with, I noticed that they used a shared IP. (IP shared by two or more websites/domains.) Well, the rates for unlimited bandwidth were around […]

    Read more →

    How To Crack Zip Paswords

    by  • December 21, 2008 • Tutorials • 5 Comments

    What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it). You can get it anywhere – just use a search engine […]

    Read more →

    How To Delete an Undeletable File

    by  • December 21, 2008 • Tutorials • 0 Comments

    Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the Processes tab and End Process on Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in. At […]

    Read more →

    Reverse Connection for Bypassing The Firewall

    by  • December 3, 2008 • Ethical hacking, Vulnerabilities • 0 Comments

    If you use reverse connection you can also bypass Hardware Firewalls. The reverse connection is nothing more than the target server connect to the client instead of the client connect to the target server: Client:20 <——- Target Server:30 Target Server:30 ——–> Client:20 A bi-directional connection between 2 sides has been established. Normally Hardware firewalls only […]

    Read more →