• Backdoors : An Introduction

    by  • June 6, 2008 • 0 Comments

    Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this paper, it will be focused on many of the common backdoors and possible ways to check for them. Most of focus will be on Unix backdoors with […]

    Read more →

    How To Create Windows XP/Vista Bootable Disk

    by  • June 6, 2008 • 1 Comment

    How to create a bootable Windows XP SP1 CD (Nero): Tip :You can replace XP SP1 with SP2 and 3 as mentioned in disk files. Step 1 Create 3 folders – C:\WINXPSP1, C:\SP1106 and C:\XPBOOT Step 2 Copy the entire Windows XP CD into folder C:\WINXPSP1 Step 3 You will have to download the SP1 […]

    Read more →

    Remove Banner Ads From Yahoo Messenger

    by  • June 6, 2008 • 0 Comments

    Here you go with one more Tutorial From Hackers Enigma. Open Run and type regedit Then new window will open. Goto HKEY_CURRENT_USER -> Software -> Yahoo -> Pager -> View Inside the ‘View’ key there are a several other keys… go through each one and edit the ‘banner url’ string to your liking. It even […]

    Read more →

    Translating Binary Into Text

    by  • June 1, 2008 • 0 Comments

    With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way. This tutorial I used in initial stage of hacking and not completely […]

    Read more →

    NetBios Hacking For Windows 98/ME/NT/XP Tutorial

    by  • June 1, 2008 • 3 Comments

    Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows. Disclaimer: We don’t take any responsibility for Illegal use of this tutorial. Step 1 Get a IP (range) scanner. (superscanner is a fast one, get it here). Scan the victim’s ip on […]

    Read more →

    How To Manage Your CD Image Files

    by  • June 1, 2008 • 0 Comments

    All right guys ,Get ready to play with your CD image files like Nero Image and all that stuff. How to use it , what it is exactly ? Explaination of terms all the stuff get here on Hackers Enigma. Here we Go: 1. What’s a image file? A image file is a CD/DVD, but […]

    Read more →

    mIRC Commands : Mastering The Relay Chat

    by  • May 30, 2008 • 3 Comments

    In this tutorial I am explaining every command you can use in mIRC which is a very famous IRC client. With this commands you can use the relay chat and master the commands of it. All mIRC Commands / Recalls the previous command entered in the current window. /! Recalls the last command typed in […]

    Read more →

    Learn Basics of Internet

    by  • April 27, 2008

    All of you welcome again to a basic tutorial on Hackers Enigma. Becoming a hacker is later part of knowledge but first you need to have some concepts clear about internet. Here I am explaining best I can. The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly […]

    Read more →

    Hackers Enigma- Introduction

    by  • March 23, 2008 • 0 Comments

    Hello World, This is introduction of Hackers Enigma. First of all let me clear one thing that this is an ethical hacking blog , not hackers blog . Here you can expect the articles on how hackers work , their technolgies , recent tricks , and news about recent internet threats . With using such […]

    Read more →