Tricks To Clean All Temporary Files,Cookies,Temperary Internet Files

Just use notepad....

Step 1:
Start with making a new txt file.

Step 2:
Paste this code in the txt file:
Code: Select all

@echo off
echo Webhog Cleaner
echo waiting
del /f /s /q %systemdrive%\*.tmp
del /f /s /q %systemdrive%\*._mp
del /f /s /q %systemdrive%\*.log
del /f /s /q %systemdrive%\*.gid
del /f /s /q %systemdrive%\*.chk
del /f /s /q %systemdrive%\*.old
del /f /s /q %systemdrive%\recycled\*.*
del /f /s /q %windir%\*.bak
del /f /s /q %windir%\prefetch\*.*
rd /s /q %windir%\temp & md %windir%\temp
del /f /q %userprofile%\cookies\*.*
del /f /q %userprofile%\recent\*.*
del /f /s /q ?%userprofile%\Local Settings\Temporary Internet Files\*.*?
del /f /s /q ?%userprofile%\Local Settings\Temp\*.*?
del /f /s /q ?%userprofile%\recent\*.*?
echo complete!
echo. & pause

Step 3:
Now save the file as "Cleaner.bat"

After saving this file, Just open it and see for your self.













The Hacking Truths Manual

Now that you know how to control the working of the Windows operating system lets go on to the basics of using Internet tools which are really useful for hacking.
Well to tell you the truth, Hacking would be much more easy if you were running some sort of Unix on your machine or if you had a shell account. I am writing this guide keeping in mind the Newbies who are probably stuck with Windows and I am pretty much sure that all those of you who are Linux Geeks will have no problem in figuring out doing the same thing in Linux.
There is a common belief amongst people that Windoze is very insecure and it sucks but then on the other hand Red Hat too is not so great in the security sphere. There are nearly 50 known exploits to get root on a Linux box. The reason why hackers have found so many holes or bugs in Windows is due to the fact the Windows is the most widely used OS in the world and the largest number of Hackers have access to Windows and the largest number of people have a go at Windoze's Security. The only thing that is in support of Linux is the fact that it is free and the concept of Open Source and well, performance. What I want to say is that Linux's performance may be better but I do not agree to what all people say about the low Windoze security. So what I think is that there is nothing wrong in Using a Windoze box for Hacking. Yes Linux does provide you access to some kewl hacking tools from the various shells but for Windows there are many third party freebies that allow you to do the same thing. Linux does make hacking easier but there is nothing wrong in using Windows for Hacking. But for all those of you who think other wise you can and if your ISP does not give shell account you can use your Dial Up PPP account to login into a third party shell account's get a free shell account go to or
Their service is pretty good.
TelnetTelnet is the ultimate hacking tool which every hacker must know how to use before he can even think about Hacking into servers. Telnet is better described as a protocol which requires or runs on TCP\IP.
It can be used to connect to remote computers and to run command line programs by simply typing commands into it’s GUI window. Telnet does not use the resources of the client’s computer but uses the resources of the server to which the client has connected. Basically it is a terminal emulation program that allows us to connect to remote computers. It is found at c:\windows\telnet.exe in Win9x systems and c:\winnt\system32\telnet.exe in NT machines.
If the Path statement in your machine is set correctly then if you just type Telnet at the DOS prompt then it will bring a GUI Windows which actually is the Telnet program.
How do I connect to remote computers using telnet?Well it is really simple to connect to remote computers using telnet. Well first launch the telnet application by typing telnet at the DOS prompt. Once the Telnet windows pops up click on
Connect>Remote System then in the host name type the host i.e. the remote computer you want to connect to. Then in the Port select the port you want to connect to in this case leave it to Telnet. Almost always leave the TermType to vt100.
Hacking Tip: You may be wondering what the Term Type stands for. Well actually it represents various kinds of display units. We use vt100 as it is compatible with most monitors.
Then click connect and you will be connected to the remote machine.
Now if you are a newbie you would be using the above method of telnetting to a remote computer and you would not be port surfing. Well if you really want to learn to hack, port surfing is a must as without learning to port surf you will not be able to find out
The basic syntax of the telnet command is
Now let’s go through this syntax, the word telnet is followed by the host name or the IP address of the host you want to connect to which is then followed by the port on the remote computer you want to connect to. If you are confused by the new terms read on and things will become clearer.
What exactly is an IP Address?Like in the real world, everyone has got an individual Home Address or telephone number so that, that particular individual can be contacted on that number or address, similarly all computers connected to the Internet are given a unique Internet Protocol or IP address which can be used to contact that particular computer. In geek language an IP address would be a decimal notation that divides the 32 bit Internet addresses (IP) into four 8 bit fields.
Does the IP address give me some information or do the numbers stand for anything?
Let take the example of the following IP address:
Now the first part , the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is.
The second part i.e. 144 is the Host Number, that is it identifies the number of the host within the Network.
This means that in the same Network, the network number is same.
In order to provide flexibility in the size of the Network ,there are different classes of IP addresses:

Address Class               Dotted Decimal Notation Ranges 

Class A ( /8 Prefixes) through

Class B ( /16 Prefixes) through

Class C ( /24 Prefixes) through
The various classes will be more clear after reading the next few lines. Each Class A Network Address contains a 8 bit Network Prefix followed by a 24 bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have a 8 bit Network prefix.
In a Class B Network Address there is a 16 bit Network Prefix followed by a 16 bit Host number. It is referred to as "16's".
A class C Network address contains a 24 bit Network Prefix and a 8 bit Host number. It is referred to as "24's" and is commonly used by most ISP's.
Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. 
This is where subnetting caame in. Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when subnetting comes in then the IP Addresses structure becomes: 
where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. 
As a result the first 3 parts will remain same and only the last part i.e. yyy is variable. 
You may be wondering, what happeded to 127 as after there is straightaway
Well is reserved for the loopback function, this means that it refers to the localhost, this means that if you try to telnet to , then the Telnet client will try to connect to your own computer.
IP addresses can be of to types Dynamic and Static.
Now most of us connect to the Internet by dialing into our ISP through Dial up Networking and using PPP( Point to Point Protocol). Now when you connect to your ISP’s server you are assigned a unique IP number which is then used to transfer data to and from your computer. That becomes your address. Now the IP address that you are assigned changes everytime your connect to your ISP i.e. you are assigned a new different IP every time you dial into your ISP, that is how it becomes Dynamic.This means that if you have obtained the IP address of a person once, then if he disconnects and reconnects then you will have to get his IP address again.
While other ISP’s provide you with a permanent IP address as soon as you register with them. In that case your IP remains the same every time you connect to their server and is thus known as a permanent Ip address.
Hacking Tip: You can find out if an IP address is a Dynamic or Static by issuing the ultimate mapping tool on the net: nslookup. Give the following command : nslookup hostname where hostname is substituted by an IP address and if the result is Non-Existant Host/ Domain then the IP is a Dynamic one. If it return the hostname which is human understandable then you can be pretty sure that the IP address is a static one.
For more information on DNS lookup and nslookup read on.
Now IP addresses are very difficult to remember, who can memorize IP addresses of all the computers he wants to connect to or the sites he wants to visit.Say for example I am sure you would find more easier to remember than something like Here comes in DNS or Domain Name Systems.Read on for more info on DNS.
DNSA DNS is basically a resource for converting friendly Hostnames (like, humans can easily understand, into IP addresses which machines need to communicate to the host i.e.
Now what basically happens in that when you type in the location bar of your browser, the browser needs to perform a lookup to find the machine readable IP address so that it can communicate with the host.This means that the browser cannot communicate with a host if it has the friendly hostname only. Without the IP address, no communication can take place. So for the lookup, the browser contacts the DNS server setup by normally by your ISP and through the resolver tries to look for the IP conversion of the hostname the user wants to contact. A DNS server is basically a server running DNS software.The server that the browser first looks for a translation is the Primary DNS server, if this primary server doesn't show any match then this server contacts another DNS server somewhere on the Internet (This becomes the Secondry DNS Server.)and looks for a match. If a match is found in the secondry server then the Primary server updates it's database so that it doesn't have to contact the Secondry server again for the same match. Each DNS server stores the hosts it has recently looked for in it's cache. Now if the Server has recently looked for a particular hostname, then it does not search for it again but just provides the browser with that information from it's cache. If the cache does not contain a particular entry, then the resolver looks for the desired entry by searching through the entire database.
New techologies are being introduced in the DNS sphere. Now take the case of It is a famous and large E-company with over a million users per day.(My rough estimate.) Such large organizations have multiple IP addresses for the same domain name. Today what happens is that the DNS server returns all IP Addresses and the browser chooses a random IP from it. But this new technolofy will allow the DNS server to return the IP of the server which has the least trafiic, so as to enhanse surfing. So you can see DNS does make sense.
You can see how time consuming the above process can be and it can really slow down your surfing process, a lot of time is being wasted when the browser contacts the DNS server and performs a lookup, so how do you fasten this process? How do you eliminate the fact that the browser will contact the DNS server each time you want to visit a site? Well the answer lies in the HOSTS file hidden in the c:\windows directory.
You can map a machine's IP to any hostname by editing the c:\windows\hosts file(It has no extension.)on win 9.x systems, On NT the hosts file is c:\WinNT\system32\drivers\etc\hosts and on Linux it is /etc/hosts.
A hosts file looks something like the below:
# Copyright (c) 1998 Microsoft Corp.
# This is a sample HOSTS file used by Microsoft TCP/IP stack for Windows98
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
# For example:
# # source server
# # x client host

    1. localhost
For example, if you know that the IP address of say is, then if you add the following in the Hosts file then the browser will not perform a lookup and will starighaway have the IP to communicate with the host. So add the line:
Now your browser will connect faster to This technique can increase your surfing speed tremendously.So now that you know what a DNS is…let get on to the subject of DNS lookup and Reverse DNS lookup.
Now Linux or any other form of Unix come with a very interesting utility known as nslookup. This can be used to gather some very valueable information about a host. For details as to how to use this tool to gather information read the man pages. Windows users can download SamSpade to perform a nslookup.
Just as DNS lookup converts the hostname into IP address, a Reverse DNS Lookup converts the IP address of a host to the hostname thus we can conclude that a DNS lookup return machine readable IP addresses and a reverse DNS Lookup returns the human friendly hostname.
INFO: The DNS software normally runs on Port 53 of a host. So the browser connects to port 53 to perfom a DNS lookup.
NslookUpSo how can you use nslookup to gain some valuable information about a host? Well the best way to learn about a particular Unix command is to read the man pages.They are the ultimate source of all Unix commands and their parameters.
Now the first thing to do is, either get SamSpade from or if you are using a shell account or are running any form of Unix then locate where the nslookup command is hidden by issuing the following command: ' whereis nslookup '.
I am just giving you a general introduction to nslookup, to meanr about all Resource records or query types do read through the Man pages.
You can use nslookup in two modes, either in the interactive mode or in the non interactive mode.First I will explain the Interactive mode. If you type nslookup at the shell prompt then it launches say, the nslookup utility or the nslookup command.
Default Server:
Now when you type just nslookup, the machine will return the IP address and the name of the server which is running the nslookup command for you,in this case it would be my shell account provider.
Now once launching nslookup you need to specify the query type, which is the type of Resource Record
(RR) by typing:
set type: RR
where RR can be any of the following:
A : Address
MX : Mail Exchanger
PTR : Pointer
CNAME: Canonical Name
HINFO: Host Info.
ANY : In this case a zone transfer takes place and all information of the host is returned, as a result
additional burden is put on the host and hence may cause the host to hang or restart.
NOTE: To get full list of RR's read the man pages.
Now once the RR or the type has been set, you need to type in the host name or the IP of the server you want to gather info of.
This might not be that clear, so let me take you through an example.
Firstly for this example I am using my Linux box and am not logged on to any shell account so my IP would be and am doing a A type nslookup on the host
Server: localhost
>set type=A
Server: localhost
Note: I have typed whatever is after > and other lines are written by the computer.
This will return the address info of the host Do try it out and see what you get.
Now if we want to run nslookup in Non Interactive Mode, then we have to write the command in the following format:
$>nslookup Hostname
Now in all the above examples, we did a normal DNS lookup on the host. We can also use nslookup to perform a reverse DNS lookup by instead of mentioning the Hostname, by mentioning the IP of the host.
$>nslookup IP address
Now that you have understood the whole concept of DNS you know what happens when we issue the /dns command in IRC.
There is yet another Unix utility or command called DIG or Domain Information Groper which too like nslookup gives info on the host. It too is a part of SamSpade.
PortsNow that you no what an IP is and what DNS or the hostname is, lets move on to Ports.
There are basically two kinds of ports--Physical(HardWare) and Virtual (Software) You may be knowing ports to be the slots behind your CPU to which you connect your Mouse or Keyboard or your monitor. Well they are physical Hardware real ports.The ports we Hackers are interested with are virtual software ports.A port is a virtual pipe through which information goes in and out. A particular computer can have a large number of ports. All ports are numbered.
Now at each port a particular service is running. A software which runs on a port is called a service. So how do you know which service is running on which port. Well all ports are numbered and there is a general rule which almost everyone follows which decides which service usually runs at which port.
Some popular ports and services running are:
Ping 7
Systat 11
Time 13
NetStat 15
SSH 22 (This is same as Secure Shell Login)
Telnet 23
Whois 43
Finger 79
POP 110
NNTP 119
rlogin 513 (IP Spoofing can be used here.)

To get an entire list of port numbers and the corressponding service running at that particular port, read RFC 1700 .
Ports under 1024 usually have popular well known services running on them. The higher port numbers are used say, when your browser needs to connect to a remote server maybe when the browser connects to port 80 of the remote server and requests for the default webpage. So in these cases the browser chooses a random port above 1024.
Newbie Note: What the hell is a RFC? Well RFC stands for Request For Comment. They are texts which cover each and every aspect of Networking and the Internet. They are written by geeks and if you want to become an uberhacker then you will have to by hear all RFC’s. All these new terms and the whole TCP\IP protocol may sound weird and difficult to grasp but if you want to be a good hacker then you will have to stay with them the rest of your lives.To locate a RFC just go to your fav search engine and type the RFC number.
NewBie Note:
What is a Daemon?
Well a daemon is a program that runs in the background at many Unix ports. If you find a service or a daemon running at a port, I am sure that computer is hackable.
Port Scanning & Port SurfingNow that you know everything about Telnet and have some basic Networking knowledge lets have some fun by learning to Port Surf. It is the first basic step in finding a hackable server running a daemon with a hole or a vulnerability.
Say you want to hack into your ISP’s server, what do you do? You firstly find out the hostnames of the servers runned by your ISP. Now each server can have a large umber of open ports and it would take days to manually go to each port and then find out that no service is running at that port. So here come in the Port Scanning Utilities which give a list of open ports on a server. Some port scanners alongwith the list of open ports also gives the services running on each port and it’s vulnerabilties, if any.
Now port scanning takes advantage the 3-stage TCP handshake to determine what ports are open on the remote computer. To learn more about the TCP\IP protocol read the networking manuals that I distribute on my mailing list.
Tools like SATAN and lots of them more allow you to find out the list of open ports, the daemon or the service running at each open port and also the service’s vulnerability at the click of a button. You can’t call yourself a hacker if you need some Software which first of all is not written by you to do something as lame as a port scan. Well yes I do agree that looking for open ports on a server would take a long time. But what I am suggesting is that you use a Port scanning tool which just gives you a list of open ports without the list of services and the vulnerabilities.
I assure you, if you try and explore an open port of a remote server manually, you will be able to learn more about the remote system and also it will give you a taste of what hacking actually is.
If you use a port scanner which gives you all details at the click of a button to impres your friends, let me assure you none of them will be impressed as I am sure anyone can use SATAN and other such scanners.
Another thing you need to be careful about before port scanning your ISP is that most port scanners are very easily detected and can easily be traced and you have no excuse if you are caught doing a port scan on a host., it a sure sign of Hacker Activity.There are many stealth scanners like Nmap which claim to be untraceable. But the truth is that they are very much traceable and they are quite inaccurate as they send only a single packet to check if a port is open or not. And if the host is running the right kind of Sniffer software maybe Etherpeek then the Port scan can be easily detected and the IP of the user logged. Anyway some ISP’s are really afraid of Hacking activites and even at the slightest hint of some suspicious hacking activity something like Port scannng, they can remove your account.So just be careful.
Evil Hacking Trick: Well try to keep an eye on TCP port 12345, and UDP port 31337 these are the default ports for the popular trojans NetBus and BO, respectively
Some ISP’s are quite aware of Hacking Activites and are one step ahead. They may be running some excellent software which will keep hackers away. EtherPeek is an excellent example of a sniffing software which can easily trace users who are port scanning. Nuke Nabber a Windows freeware claims to be able to block Port Scans. I have not tested it so I can't say for sure. Then there is another fun program known as Port Dumper which can fake daemon( services) like Telnet, Finger etc.
How can I find out my own IP address and what ports are open on my machine?All this talk about IP's and ports may have made you quite interested in this subect and you may be dying to find out a method of finding out open ports on your machine and your own IP address.
Well just type the following at the DOS prompt (Windows users) or the bash prompt (Unix users):
netstat -a
This will return something like the following:

C:\WINDOWS>netstat -a Active Connections Proto Local Address Foreign Address State TCP ankit-s-hax-box:1030 LISTENING TCP ankit-s-hax-box:1033 LISTENING TCP ankit-s-hax-box:1027 LISTENING TCP ankit-s-hax-box:1030 ESTABLISHED TCP ankit-s-hax-box:1033 CLOSE_WAIT TCP ankit-s-hax-box:137 LISTENING TCP ankit-s-hax-box:138 LISTENING TCP ankit-s-hax-box:nbsession LISTENING UDP ankit-s-hax-box:1027 *:* UDP ankit-s-hax-box:nbname *:* UDP ankit-s-hax-box:nbdatagram *:* Sockets and Ports Explained
Note: I am assuming that you have at least some knowledge about TCP\IP.
What is all the hype about socket programming? What exactly are sockets? TCP\IP or Transmission Control Protocol\ Internet Protocol is the language or the protocol used by computers to communicate with each other over the Internet. Say a computer whose IP address is wants to communicate with another machine whose IP address is then would will happen?
The machine whose IP is sends a packet addressed to another machine whose IP is When receives the packet then it verifies that it got the message by sending a signal back to
But say the person who is using wants to have simunateously more than one connections to…..then what will happen? Say wants to connect to the FTP daemon and download a file by FTP and at the same time it wants to conect to's website i.e. connect to HTTP daemon. Then will have 2 connects with simountaneously.Now how can distinguish between the two connections…how does know which is for the FTP daemon and which for the HTTP daemon? If there was no way to distinguish between the two connections then they would both get mixed up and there would be a lot of chaos with the message meant for thr HTTP daemon going to the FTP daemon. To avoid such confusion there are ports. At each port a particular service or daemon is runningby default. So now that the computers knows which port to connect to, to download a FTP file and which port to connect to, to download the web page, it will communciate with the machine using what is known as the socket pair which is a combination of an IP address and a Port. So in the above case the message which is meant for the FTP daemon will be addressed to : 21 (Notice the colon and the default FTP port suceeding it.). So that the receiving machine i.e. will know for which service this message is meant for and to which port it should be directed to.
In TCP\IP or over the Internet all communication is done using the Socket pair i.e. the combination of the IP address and the port.
DOS Hacking utilities shipping with Windows and Linux Utilities tooMost Hacker Friendly utilities that ship with Windoze are hidden and a normal user will not be able to find them.All of them are either in the c:\windows directory or are in the Windows Installation CD.
PINGNow lets start with what exactly Ping is. Now Ping is a part of the ICMP protocol i.e the Internet Control Message Protocol. ICMP is a protocol used to troubleshoot TCP\IP networks. Ping is a command which sends out a datagram to the specified host. This specified host if alive i.e. turned on sends out a reply or echos off the same Datagram. If the datagram that reaches back to your computer has the same datagram that was sent then it means that the host is alive. So Ping is basically a command which allows you to check if a host is alive or not. It can also be used to calculate the amount of time taken for a datagram to reach the host. It is so deadly that it can be used to ping a hostname perpetually which may even cause the host to crash. Now what happens is that when a host receives a Ping signal, it allocates some of it's resources to attend to or to echo back the datagram. Now if you Ping a host perpetually, then a time will come when all resources of the host are used and the host either hangs or restarts.
Due to Ping's deadly nature, most shell account ISP's hide the Ping utility. To find it issue the folowing command:
wheris ping
It is usually hidden in /usr/etc
Ping has many parameters and a list of parameters can be found by reading the man pages or if you are running Windows you can get help by simply typing ping at the DOS prompt.
The flood ping which pings a host perpetually is:
ping -f hostname
ping -a hostname can be used to resolve addresses to hostnames.
When I typed ping at the dos prompt I go the following help:
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list
-t Ping the specifed host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.
You can even Ping yourself. Earlier I had told you guys that the IP is the local host, this means that when you connect to then you actually connect to your own machine.
So to ping yourself perpetually , issue the following command:
ping -f
Well actually the Flood ping no longer works on most OS's as they have be updated.
The following Ping command creates a giant datagram of the size 65510 for Ping. It might hang the victim's computer.
C:\windows>ping -l 65510
TracertWhen you type in your browser, then your request passes through a large number of Computers before reaching Or when you login to your Shell account and type the password then this password passes through a large number of computers before reaching the shell account server.
To find out the list of servers your password of the request passes through, you can use the tracert command. In Unix you can use the traceroute command. Again I got help by simply typing tracert at the DOS prompt.
Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.
Lets take an example of tracing the path taken by a datagram to reach from your machine.
To do this simply type the following command:

Instead of you can also write the IP address of which you can get by doing an nslookup. Try tracert with different parameters and see what the result is. That is the best way to learn how this command works.
Netstat This is by far the most interesting hacking tool which gives some important information about your ISP.
Netstat soesn't display any help information unless you type netstat /?. I got the following info:
C:\WINDOWS>netstat /?
Displays protocol statistics and current TCP/IP network connections.
NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.
The -a parameter can be used to list the open ports on your computer and your IP address. I have explained it in the IP address section. For example,
C:\windows>netstat -a
Will display the Kernal Routing Information, ports open on your machine, your IP, the IP of the host you are connected to and also the port of the host to which you are connected to.
If you are logged into your shell account and give the netstat command then it may give the IP addresses of all people who are logged into that server at that moment. All these IP's are Dynamic of course.
Another intersting command is the nbtstat command which too is a great tool to get excellent valuable info on a host your are connected to. For more info type nbtstat at the prompt.
C:\windows>nbtstat -A
The above-mentioned command will allow the hacker to obtain a list of usernames, system names, and domains.I will mention maore about this command in the Hacking Truths Manual on File Sharing.
Arp and Route are extra elite comamnds which I do not think should be mentioned in a newbies manual. But all of you who want more info on any of these commands can either try simply typing the name of the command or the command name followed by /?
Command /?
Will display help on the command.
Hacking Tip: ARP (Address Resolution Protocol) is used to translate IP addresses
to Ethernet addresses. The translation is done only for outgoing IP
packets, because this is when the IP header and the Ethernet header
are created.
IP address Ethernet address
    1. 08-00-39-00-2F-C3
Route is used to display info on the routing tables.
WHOIS: Getting Info about a DomainHow do you get a .com registration? Well you register with Network Solutions give them some money and you have your own domain name i.e. your very own .com registration. Now all people who register with Network Solutions have to fill a form in which they have to enter information like Name, Contact Information , Email Address, IP address and much more. Now all this data or info is stored in a DataBase mentained by Network Solutions. You can perfom a query which is known as a Whois query and gather information on a particular domain or host. Say you want to find out the IP or the name of the person who owns the domain,what do you do?
Well either you could go to Network Solutions site or and enter in the input box or you can directly enter the following in the location bar of your Browser and make a whois enquiry.
Enter the following in the location bar of your browser:
Note: Replace with the domain name of which you want to perfom a WHOIS query.
Manual Port SurfingYou have obtained the list of open ports by using some canned hacking tool. Now what do you do? Connect to each port of the remote server i.e. your ISP.
Now earlier I taught you a lame method of telnetting to a remote server. Now lets get to an cool method of connecting to a remote computer.You are not a Hacker if you do not telnet like this:
C:\windows> telnet ###
Well this command is pretty much self explanatory. Telnet calls the telnet program, Hostname is the hostname or the IP of the remote server and ### is the open port of the remote server you want to connect to.
It is not necessary that as port 25 is normaly the SMTP port, each and every server would be running SMTP at port 25. It all varies from Server to server. If you learn Port surfing then you can connect to the FTP (21) daemon and download or upload files, connect to SMTP daemon and send mail even forged mail, POP (110) to receive mail and HTTP (80) to download web pages.
OK get ready to explore the most common ports which are likely to be open on your ISP’s servers.
Port 23 is the default port to which Telnet connects to if the port number is not given. Generally when we are connected to Port 23 of the remote server then we are greeted by a Welcome Banner and then we are given the Login Prompt. Generally connecting to Port 23 also gives the Name of the OS running at the remote server which is invaluable in finding exploits as a particular exploit may work only if the remote computer is running the same combination of service and Operating System.
Basically connecting to Port 23 gives us the OS of the remote computer.
WIN 95/98/NT don't ship with telnet servers so unless the telnet server is installed Port 23 would no be open. So if Port 23 of your ISP is not open then it should be safe to think that the server is not runnign Win 95/98/NT. But you can never be sure just maybe your ISP has installed a telnet server and is running Windows.
Nowdays almost none of the ISP’s keep Port 23 open as the number of Hackers has really increased. Now lets move on to Port 21 or the FTP Port.
Do you use Cute FTP or some other FTP client? Ever wondered how it works?
FTP or Port 21 ExplainedFirst of all FTP stands for File Transfer Protocol.To read geek stuff on the FTP protocol read RFC 114 and RFC 959.
FTP or File Transfer Protocol is a Protocol used to transfer files from a server to a client. Now a server would be the computer you are connected to and the client would be you yourself. To connect to a FTP server we need to have a FTP software known as the FTP client.This basically is protocol popular for tranfering files from the server to the client or vis-a-versa.So we can say that FTP servers will allow you to download and also upload files.
Win9x WFTPD, Microsoft Frontpage
Well it is really a simple process of FTP’ing to your favourite site. Infact Windows itself ships with a FTP client which is quite lame and I do not at all recommand it, but still what the heck. How FTP is actually quite self explanatory, now the FTP Client i.e the program that you run at your computer first contacts the FTP daemon (Service running at Port 21) on the server specified, if the Server has a FTP daemon running then you might get a welcome screen which is also known as the Daemon Banner. A daemon Banner would be something that either displays a welcom emessage and info on the OS or service running on the host you have FTP'ed to.A daemon banner gives us valuable info on the host we connect to.Just remmember that if we want to get root or break into a FTP server then we need to search for a hole we can exploit, tand to search for a hole which we can exploit, we need to know the OS, the OS version and also the version on the FTP server running by the host. This means that say there is a FTP server which has 2 versions, one that runs in Windows and the other that runs in Unix. If say the Unix version has a hole, then it is not necessary that the Windows version too would have the same hole. A hole exists due to the combination of the Server running at the OS running at the host. This means even if the OS is different but the FTP server is the same, the hole would not work.So before you start to look for holes in the FTP server running at your ISP, just note down the OS version and the FTp server version running at your ISP.The daemon banner is followed by the Password Prompt. Something like the Following:

Connected to
220-# Welcome to MTNL's ftp site
220-# You can upload your own homepages at this site!!!
220-# Just login with your username and upload the HTML pages.
220-# (You can use your favourite HTML editor as well)
220-# World will see it at
220-# So get going......UNLEASH YOUR CREATIVITY !!!!
220 FTP server ready.
User ( ankit
331 Password required for ankit.
Now most FTP daemons are badly configured, well actually I should say the system administrators allow Guest or anonymous Logins. What I mean by that is the FTP Daemon allows you to enter Guest or Anonymous as the Username. If you login through the Guest account, then it asks you for your email address, so that it can add to the server logs that you visited that site and used the FTP Daemon.
Here instead of your true email address, you can make one up in your mind, just remember to put the @ sign in between and of course no spaces.

So How Do I use the Windows FTP Client?
Well first of all I think the FTP client which ships with Windows is not a GUI application.I personally do not like it and think you should either use your Favourite FTP Client or use the Telnet Application that ships with Windows to connect to Port 21.
Anyway for those of who are die hard Microsoft fans or want to learn each and every thing in Windows, I will explain how this FTP Client is used. Actually this FTP program is quite powerful and it makes Hacking cool.
If you use a GUI FTP program for hacking to impress your friends then they would probably say that anyone can use a GUI. This Windows FTP program may seem formidable to some at first sight.
Now first of all goto MS DOS to run this program as it runs in DOS.Now type FTP to launch it.
Your prompt will change to
This is the FTP prompt and signifies that the FTP Client has been launched and is running.
Now to transfer files or to do some FTP Hacking you need to know the FTP commands. To get a list of FTP commands type Help at the FTP prompt.
ftp> help
Commands may be abbreviated. Commands are:
! delete literal prompt send
? debug ls put status
append dir mdelete pwd trace
ascii disconnect mdir quit type
bell get mget quote user
binary glob mkdir recv verbose
bye hash mls remotehelp
cd help mput rename
close lcd open rmdir
You may get something like the above on your screen.Instead of typing Help you could also type ? that too would give the same result. Now to get Help on individual Commands type the following:
ftp>help [command]

Like say for example, I want to learn how to use the cd command what it does then I type the following:
ftp>help cd
The FTP program will return this:
cd Change remote working directory
Note: Instead of the Above I could also have typed: ftp>? Cd
Different Commands:
Now the Get command is used to get files from the server you are connected to.
ftp>get file.txt
This will get or download the text file with the name file.
To download multiple files one cannot use the get command. The mget or the multiple gets command is used instead.(the m in mget stands for multiple)
For example the following gets all text files from the host,
ftp>mget *.txt
Say you want to upload a single file then you use the put command and to upload multiple files use the mput command.
Say you are working in the Windows Directory and want to change to the c:\windows\temp directory while you are in the process of uploading files, so change the local directory use the lcd command.
For example,
ftp>lcd temp
This will make temp the current local working directory.
The Bye or Close commands are basically terminating commands
The ! commad allows you to escape to the shell at any moment.
Another interesting command is the SYST command which gives us information on the server's OS and FTP server's version etc.This is excellent to get info on the host's OS cersion and FTP daemon's version, so that you can seacrh for it on the net.
For a single line description of each command use the help or the ? command followed by the command you want info on.
Now that you know some of the Basic FTP commands let me take you through the process of uploading your site to your ISP’s server. I am assuming that your ISP’s hostname is and all the files that have to uploaded to the ISP’s server are in the directory c:\Site
First lets start my connecting or FTP’ing to your ISP. There are 2 ways to start a FTP session.First way is to pass an argument alognwith the Ftp Command i.e. you can directly connect to a host by typing ftp followed by the hostname. The second method involves firstly the launching of the FTP client and then using the Open command to connect to the host. Fot more info on the open command type help open
For Example,
In most cases after you have connected to the host i.e your ISP you will see the Welcome Banner or your ISP and then it will ask for a username and a password. Enter them. If you do not have them then try the Anonymous or the Guest Login or read on to learn to Hack into a FTP server.Anyway getting back to the uploading of the website. Now remember that the files you want to upload are in the c:\site directory but the current local working directory is Windows( It is normally the Default Directory in which MS DOS would open,) So before starting to upload files you need to change the Local working directory fromc:\windows to c:\site. So to this use the lcd command.
For Example,
ftp>lcd c:\site
Now you are set to upload the files, I am assuming that all files in the directory need to be uploaded, if that is not the case then use the WildCard " * " symbol and make the necessary selections.
ftp>mput *.*
Voila you have just uploaded your own website by using a command line FTP program you have finally learnt to do without the GUI clients.
You may say that all this stuff is stupid and you do not give a damn about uploading your site and want to learn how to break into FTP servers and steal passwords….well if you are reading this manual then I am sure you have no knowledge about how to hide your identity while connecting to a FTP server.You see whenevr you connect to a FTP server, any server for that matter, your IP is recorded in the Server log and when the system administartor finds that someone is downloading the passwords file, then I am pretty much sure that he would not be too pleased and you will find that the feds are fighting with the SS outside your house as to who gets to arrest you. It is illegal to download password file which is not available to the normal public.Now don't get the wrong idea that I am against hacking or something, but what I want you guys to understand is that I do not want you guys to get caught, and like I said before, if U reading this manual then you do not know how to edit the server logs and how to hide your identity, how to erase all your tracks from the victim's server and how to create a backdoor to the server so that you can access it whenever you want.
Common FTP HacksThere are various FTP servers with various versions. No FTP server is fully clean of bugs. There are so many bugs that even if I write a line of each it would become too loooooooong. But you can seacrh for FTP bugs by finding out the FTP version number and the OS running at the host and searching for the hole at the following sites: (Get Security Bulletins and Fixes to common holes on Windows systems)

Some common FTP Bugs would be the FTP bounce Attack and Local FTP bugs(Get Exploit files at is also a DOS (Denial of Services, not MSDOS) attack which can be used to crash Win NT servers and also a OOB(Out of Band Attack). (Read all about it at: )
SMTP [Port 25] & POP [Port 110]
Most of you would be using email clients like MS Outlook, Netscape Messenger, Eudore or even Opera to send and receive mail. Have you ever wondered what exactly your favourite email client does? I will just give you an overview of what actually happens.
Now when you compose and mail and click on Send, then your email client locates the mail server that you specified during Configuration time or suring Setup. Once the mail server is located, your email client by default connects to port 25(SMTP or the Simple Mail Transfer Protocol) to send mail. Now at Port 25 a daemon is running which listens for connections.Now your email client connects to this daemon and sends mail. Most mail servers have Sendmail which is also known as the buggiest daemon on earth installed on the SMTP port.Qmail is also another popular SMTP daemon running on most Web based email services' mail servers (eg. Hotmail is running qmail)
Now in the other case i.e when you receive mail, your email client by default connects to port 110 i.e the POP3 or the Post Office Protocol (version 3) port.Once connected the POP3 daemon authenticates you i.e. asks for a user name and password which is automatically sent by your email client to the server.Once authenticated, you can receive mail.
This means that to send mail you need no user name and password but to receive mail you need a username and password. Recently Yahoo, once it started providing POP based mail, had developed this problem that the user could not send mail unless he had received mail i.e he had authenticated.
Now in the case of free Web Based services too the same thing happens. In this case you compose your email in a form whose action tag points to a CGI (or Common Gateway InterFace) script which sends the content of the form (that would be what you composed or typed out.) to the Sendmail deamon which uis running on Port 25 of the mail server of the company whose mail services you are using.Here you are authenticated once you enter your user name and password at the login page.Sendmail daemons of web based mail servers too can be used to send mail without authentication.
UberHacker Note: Above I have assumed that you have some knowledge of Web development i.e. HTML or HyperText MarkUp Language and CGI.
To Learn HTML goto:
Search the MSDN Library, which I think simply the most amazing and the most comprehensive library containing all types of Tech Text. URL:
Learn CGI programming with Perl 5 by reading my Perl Tutorials.
What is my mail server or which is the server I connect to send email.
Now if you use the email service provided by your ISP then it is pretty simple to find out the mail server you connect to, to send and receive mail. Now say your ISP's name is xyz and their domain is
Then your mail server would most probably be (Port 25) to send mail and (Port 110) to receive mail.Instead of (Port 25) for sendmail mail, you can also try (Port 25).
Email Headers The Sendmail daemon is a really interesting one which allows you to get root on a badly configured system and also allows you to send fake mail!!!
Well to understand the concept of Fake Mail you need to be more through with Email Headers, So let me start by explaining what email Headers actually are.
This brings me back to the subject of what exactly happens when you send a mail, now let me resume from what happens after the Sendmail Daemon has sent your mail. Now say you live in Los Angeles and have sent an email to a friend in New York, so how does your email reach New York? Now once the Sendmail Daemon has composed your mail then it will send the mail to the Server whose Domain name is the same as the domain name that you entered, (In an email the Domain Name is the text after the @ sign.) So your email may be first sent to the server of the company that provides Internet Backbone is your Country and from there it would be sent to the server is which your friend has an account, so your email travels through a number of Routers and Servers before reaching your friend’s Inbox.
Now whatever Server an email has travelled through is recorded in the Headers of the Email, the entire path taken by the email and other valuable info is provided by Email Headers.
So How do I see Headers?Now to look at the complete Headers in Outlook Right click on the message and Select Properties, this will bring up a Window Showing only Partial Headers, Now to see the Full Headers clik on the Message Source Button. In Netscape you can look at Headers by clicking on View>Headers>Full.To learn about how to see full headers in your fav email client browse the Help of your client. So you did the above and now know that Headers contain some IP addresses and some Host Names. Now I will explain what exactly Headers Tell you.
Received: from by
(8.9.1/ id CAA0000022766; Tue, Feb 2000 02:47:11 +0530 (IST) Received: from s443026 ( []) by (8.8.8/8.8.8) with SMTP id WAA04589 for
<>; Mon, 28 Feb 2000 22:12:56 +0100 (MET)
From: "[Noname]" <>
To: "Ankit Fadia" <>
Subject: More questions :)
Date:Mon, 28 Feb 2000 22:13:12 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
X-UIDL: c6189dbefa930101b3b63dd114d7e876
Now lets look at the First line, It tells us that this message was sent by someone who has an account with the ISP whose hostname is and his UserName is name and is mail address is
Now let’s look at the next few lines, it tell us what path the mail has taken or which servers has it gone through.

Easy Hacking Tutorials and Tools (Must have for any Hacker)

well i am gonna make you all learn the hacking stuff for beginers to masters so download the below hacking tools and tutorials kit.

download all of them packed in one from here

it contains below mentioned tutorials

How to rip Dynamic Flash Template
10 reasons why PCs crash U must Know
10 Security Enhancements
16x Dvd+-rw Dl Dvd Writer Comparison Guide
20 Great Google Secrets
10 reasons why PCs crash U must Know
10 Security Enhancements
20 Great Google Secrets
250+ Tech books online
36 Graphics & Design Ebooks
A Basic Guide to the Internet
A Basic UNIX Overview.rtf
A List Of Government BBS Numbers
A Novice's Guide to Hacking 2004
A Novice's Guide To Hacking
A Short HACKER SPEAK Glossary
A simple TCP spoofing attack
A Small Guide to Hacking HOTMAIL
A UNIX Hacking Tutorial
A very small tut for RealMedia
Accessing the bindery files directly
Advanced Shellcoding Techniques
All about ftp must read
ALL About Spyware
All mIRC Commands
An Introduction into TeleScan
An Introduction to Denial of Service

Anonymity complete GUIDE.rtf
Anonymous FTP FAQ
ANSIBombs II Tips And Techniques
anti leech hacking tutorial
Area Codes and Time Zones
attacks on networks how to stop
B.A. regedit
Backtracking EMAIL Messages
Bandwidth Explained!
Basic Networking
Beep Code Manual
Beep Codes Error Codes
Bell Hell Volume #1
Bell Hell Volume #2
Best Keyboard Shortcuts
Bin & Cue Simple Tut
BIOS Update Procedure
Bit Torrent Tutorials
Block Adservers
Boot Block Recovery For Free
Boot Winxp Fast
Breaker B0X
Broken Ie, How to fix it
Bulk Editing Of .xxx to .zip or .mp3
BulletProof FTP Server Tutorial
Burn .bin file Without A .cue file
Burn a BIN without a CUE using NERO
Burning Bin & Cue Using Nero
Bust Avoidance For Dipshits
Bypass Internet Censorship
Calculating Offsets
Cant See Secure Sites
Caught A Virus
Cellular Listening with a TV
Change Text on XP Start Button.rtf
Change Text on XP Start Button
Change Your Ip In Less Then 1 Minute
Closing the Net
Compression and Cracks for Dummies
Computer Acronyms
Computer Bulliten Boards and the Law
Computer eMail and Privacy
Computer Hackers News Articles
Computer Matinence
Computer Security
Computer Security_2
Computer Viruii
Convert Stubborn Webpage To pdf
Converting Movies To Psp Format
Converting to NTFS
Copyright Guides for Photographers
Cracking Zip Password Files
Crash Course in X Windows Security
Create A Huge File
Create Bootable Win XP SP1 CD(nero)
Create Bootable XP SP integrated CD
Crime and Puzzlement
Data Capacity of CDs [Tutorial]
Debug, Learn how crack windows
Delete An undeletable File
Dept of Treasury Letter
Digital Camera Guide
Digital Photo Id Cards, Greate Info
Directx Explained
Disable Windows Logo Key
Download Timeframes
Downloading Windows Media Streams
Drake's Phreaking Tutorial
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Ebay Hackcracktip
Eliminate Ie's Autocomplete Reminder
Email Forge, sends email from anyone
Ethload User's Guide
Find Stuff
Finding Missing Files From A Release
Firefox Speed Tweaks
Firefox Tweaks
Firewall Protection how to.rtf
Flashget Broadband Tweak
Formatting An Hdd, when fdisk won't
FREE Hosting For WAREZ
Free Speech in Cyberspace
Free World Dialup
Free X-box Live !
Freebsd Install Guide
Get In Windows 2000 As Administrator
Get The Music You Want To Hear
Getting A 1gb Yahoo China Account
Go to Windows updates anonymously
Google Crack Search
Google secrets
Guide For Getting Free Stuff
Guide to Hacking with sub7
Guide to IIS Exploitation
Hacker Test
Hackers A-Z
hacking and phreaking
Hacking Faq
Hacking for Dummies Volume 2
Hacking For Newbies
Hacking GTE Telemail
hacking in telnet ftp.rtf
Hacking IRC - The Definitive Guide
hacking on Telnet explained
hacking on XP part 1
hacking on XP part 2
hacking on XP part 3
hacking on XP part 4
hacking on XP part 5
hacking password protected site
Hacking Password Protected Website's
hacking passwords
Hacking PC-Pursuit Codes
Hacking Techniques
Hacking TRW
Hacking TYMNET
Hacking Unix System V's
Hacking VoiceMail Systems
Hacking Wal-Mart Computers
Hacking Webpages
Hard drive Gone Bad
Hardware Firewall
Have Notepad In Send To
Hide Drives and Partitions
How BT phone cards works
How do I overburn a CD with Nero
How Linux boots
How Phone Phreaks are Caught
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
How To Change A Cmos Battery
How to clear Bios info 2
How to clear Bios info
How to crash AOL
How To Customise Your start Button
How to dial out of a UNIX System
How to do a high Quality DivX rip
How To Download Bittorrent Files
How To Download Movies, From IRC
how to edit right click menu.rtf
how to execute chm files in linux
How to find a remote IP
How To Find Ftp's The Easy Way'
How to find MP3's real quickly
How to find Security Holes
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How to get a Shell in 24 hours
How to Hack UNIX System V
How to learn to hack in easy steps
How to login to a C.B.I. System
How to make a Free Phone Call
How To Make A Kvcd
how to make a new web site
how to make a VCD from a DivX
How To Make An Animted Logo
How To Make Free Phone Calls
How to make key generators
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How To Make Your Own Radiostation
How to modify exe files
How to Rename File Extensions
How To Restrict Login Hours Allowed
How to save Windows xp updates
How To See Hidden Files, Using Dos
How to send ICQ Bombs
How To Set Up Direct Connect
How To Speed Up A Slow Computer
How To Stop Spam
How to swear in all languages
How To Use Newsgroups
Important Faqs For Sp2
Increase XP Folder Settings
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Introduction to Denail of Service
IP addressing, and gaining IP's
IP Addressing
IP how to.rtf
ISSN Numbers- An Introduction
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT.....
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster
Make Your Pc Faster, Guaranteed
making a .cue file, in notepad
Making A  Executable Server
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
Misc Linux Tips & Tricks
Missing Administrator Account
Mobile Secret Codes
Moving and Removing the Start Button
Msn Messenger & Gmail
NetBios explained
New Pc Or New Motherboard
New Way To Relive Some Zinio File
news groups the how to do
NFS Tracing
Nice list of windows shortcuts
No Text Icons
Optimize Broadband & Dsl Connections
Optimize Emule Connection
23 Ways To Speed WinXP, Not only Defrag
250+ Tech books online
36 Graphics & Design Ebooks
8 People Can Use The Same Msn Dial Up Account
A Basic Guide to the Internet
A very small tut for RealMedia
A Web Standards Checklist, How to make a proper website
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc.
Advanced Shellcoding Techniques
All about ftp must read
All About Movie Tags (what Is A Dvdrip, Cam Etc.)
ALL About Spyware
All mIRC Commands
Anonymity of Proxy, Anonymity Of Proxy learn it insideout
anti leech hacking tutorial
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak
Automatic Windows Installation, No keypress required!
B.A. regedit
Backtracking EMAIL Messages
Bandwidth Explained!
Beep Code Manual
Beep Codes Error Codes
Best Keyboard Shortcuts
Big Brother And Ndisuio.sys, A new Internet phenomenon
Bin & Cue Simple Tut
BIOS Update Procedure
Bit Torrent Tutorials
Block Adservers
Boot Block Recovery For Free
Boot Winxp Fast
Border And Text Effects In Psp8, For use with PSP8
Broken Ie, How to fix it
Bulk Editing Of .xxx to .zip or .mp3
BulletProof FTP Server Tutorial
Burn .bin file Without A .cue file
Burn a BIN without a CUE using NERO
Burning Bin & Cue Using Nero
Bypass Internet Censorship
Calculating Offsets
cannot use my password to get back into Windows XP
Cant See Secure Sites
Caught A Virus
Change Music In The Malibu And The Pole Position, GTA Vice Modders
Change Text on XP Start Button.rtf
Change Text on XP Start Button
Change The Default Location For Installing Apps
Change Your Ip In Less Then 1 Minute
Changing Default Location For Installing Apps
Check For Dos, Check to see if you are infected.
Choosing A Good Domain Name, ya..good name is important!
Clear Unwanted Items From Add And Remove
Closing Open Holes, System Security How to close open holes
CMD Prompt here, add to folder context menu windows xp
Computer Acronyms
Computer Matinence
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial
connect A Psx Pad To Pc, Warning soldering is involved..
Convert Stubborn Webpage To pdf
Convert To Basic And Dynamic Disks In Windows Xp
Converting Movies To Psp Format
Converting to NTFS
Cracking Bios, use the followin' code
Cracking Zip Password Files
Crap Software Config Settings, How to set-up the firewall
Create A Huge File
Create A Personal Screen Saver In Win Xp!
Create An Ftp Server On Your Pc With Serv-u
Create Bootable Win XP SP1 CD(nero)
Create Bootable XP SP integrated CD
Create One-click Shutdown And Reboot Shortcuts
Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how crack windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In Hotmail
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Do You Want To Learn Maya 6, look, some tutorials
Doom 3 Speed Up, Guaranteed 40% better
Doom3 Simple Tweeks, how to run doom with tweeks
Dos User - No Boot Dos Disk, No,How to create Imp Files
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!
Download Timeframes
Downloading Files, Using Archives And Images
Downloading Windows Media Streams
Dreamweaver Tut That Teaches U, to search a database with phpmysql
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies
Easily Disconnect-reconnect From Broadband
Easily Find Serial Numbers On Google.., easy to do and works like a charm.
Ebay Hackcracktip
Eliminate Ie's Autocomplete Reminder
Email Forge, sends email from anyone
Enable Folder and Icon Refresh, Win XP Tweak
Evolution Of Computer Viruses History Of Viruses
Excellent tricks and techniques of Google Hacks
Exploseek, a simple tool to find music on the net
Find Stuff
Finding Missing Files From A Release
Firefox Speed Tweaks
Firefox Tweaks
Flashget Broadband Tweak
FlashGet v1.4 - More Download Simultaneously
Formatting An Hdd, when fdisk won't
Free Access To Websites Without Registering
FREE Hosting For WAREZ
FREE Hosting List php, mysql and more
Free World Dialup
Free X-box Live !
Freebsd Install Guide
General Keyboard Shortcuts, General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb Yahoo China Account
Getting Counter-strike Source To Work
getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs!
Go to Windows updates anonymously
Google Crack Search
Google secrets
Google Tips & Tricks, (utilizing search engine)
Graffiti On Walls 4 Adobe Photoshop Cs 8.0
Guide For Getting Free Stuff
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
Hard drive Gone Bad
Hardware Firewall
Have Notepad In Send To
have satallite tv for almost free IF not free!!!
Hex, How to turn binary or decimal to hex
Hide Drives and Partitions
How 2 Find EVERYTHING uploaded on Rapidshare
How do I overburn a CD with Nero
How do I remove an extra operating system from by
How do I Test My VirusScan Installation
How Do U See Hidden Files, Using DOS..
How Download MP3s from or other Streaming Audio-Video
How Linux boots
How Long Has Your XP System Been Running
How To Access Your Folders From Your Taskbar
How To Add A Url Address Bar To The Taskbar
How To Add An Option To Print, the Contents of a Folder!
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
How To Block Websties Without Software, block websites
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
How To Change A Cmos Battery
How to change the serial number used in Windows XP, Valid for XP Corporate
How To Change Thumbnail Size And Quality
How to clear Bios info 2
How to clear Bios info
How To Convert File System, fat - fat32 to ntfs
How To Copy A Dvd Which Will Play On A X Box
How to copy songs from your iPod to your PC
How To Customise Your start Button
How To Delete Those Persistent Nasty Files
How To Disable Picture And Fax Viewer
How to do a high Quality DivX rip
How To Download Bittorrent Files
How To Download Directly From
How To Download Movies, From IRC
How to Download-Upload Files from email
how to edit right click menu.rtf
how to execute chm files in linux
How to Extend the life of the yousendit download links
How to find a remote IP
How To Find Ftp's The Easy Way'
How to find MP3's real quickly
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How To Get A Free I-pod Or Flat Screen Tv, check it out
How to Get someones ISP password, Get free internet
How To Get Top Ranking, Search Engines
How To Hack Windows Xp Admin Passwords
How to hack-change your Windows XP Boot Screen
How To Increase Download Speeds By 100-200 Kbsec
How to Install and run Windows CE on your USB Stick
How To Make A Kvcd
how to make a new web site
How To Make A Transparent Background, .fla .swf
how to make a VCD from a DivX
How To Make An Animted Logo
How To Make Free Phone Calls
How to make key generators
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How To Make Your Own Radiostation
How to modify exe files
How To Move Xp Harddrive To New Motherboard
How To optimize DSL-CABLE connection speed
How To Play Movies (divx Etc) With Subs
How to recover MOST of scratched CD data discs
How to Remove DRM Protection for Video Files
How To Remove Ms Java Vm And Install Sun Java
How To Remove Signin Details Of Msn Passport
How To Remove The Default Admin$ Shares
How to remove the Links folder in IE Favorites
How to Remove WinXP Splash and See Operations
How To Rename Extensions With Ease, with a Renamer.bat file!
How to Rename File Extensions
How To Rename Multiple Files In Winxp
How To Restrict Login Hours Allowed
How to safeguard your files when computer crashes
How to save Windows xp updates
how to search google for RAPIDSHARE links
How To See Hidden Files, Using Dos
How To Set search For All Files In Winxp
How to set up a http server running from you computer
How To Set Up A Proxy In Flashget, As Requested
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
How To Set Up Direct Connect
How To Set Up Proxies In Your Browser
How To Set Zone Alarm Settings!, Fix for ZA ports
How To Setup Your Own Dns (Domain Name Server)
How To Speed Up A Slow Computer
How To Speed Up Http Requests On Internet Explorer, as above
How To Stop Spam
How to swear in all languages
How To Unload Cached Dll Files To Free Memory
How to Use and How to Chain Multiple Proxies!
How To Use File Compression In Windows Xp
How To Use Google To Download Mp3's, and applications....
How To Use Newsgroups
How To Use You Gmail With Msn Messenger
HOWTO Change Windows XP Home to Windows XP Pro
Important Faqs For Sp2
Improve Doom 3's Performances!!, simple but efficient trick for every1
Improve your dialup modem preformance
Increase XP Folder Settings
Insert Your Serial For Office 2k, auto install office
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing Gentoo Linux, Amazing step by step tutoria
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Instructions For Removal Of Advertising In Msn Messenger
Ip Address Structure, Expilinatin OF IP Address {A short way}
Irc How To Downlaod From, How to downlaod from IRC
Irc Servers On nix, For people who want to start own IRC net
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts Result in Excel 2000 - Movement
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT.....
Leet Way To Get Your Ip In Windows Xp
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lots Of Windows Xp Tips, Take A Look !
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Batch File To Clean UR PC!!, All In One!!
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster
Make Mp3 Files Smaller Without Losing Quality
Make Your Own Ringtones For Mobile Phone,  also logos, wallpaper, etc
Make Your Pc Faster, Guaranteed
making a .cue file, in notepad
Making A  Executable Server
Making Bootable Floppy Disk to Boot into Windows
Making Cd Version Of Doom3 Into Dvd Version
Making Web Page Fonts Consistent and Uniform
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
Microsoft's Really Hidden Files, Reveled Hidden files
mIRC Not Just Another Chat Client, Download Anything You Want Almost
Misc Linux Tips & Tricks
Missing Administrator Account
Mobile Secret Codes
Modify .exe Files And Crack A Program
A beginners guide to Hacking UNIX

A Cracking Tutorial
A Guide to Internet Security- Becoming an Uebercracker
A Guide to the Easiest Hacking there is
A List Of Some OF The Most Useful UNIX Hacking Commands
A Small Guide to Hacking HOTMAIL
A UNIX Hacking Tutorial
Almost Everything You Ever Wanted To Know About Security (but
An Indepth Guide in Hacking UNIX and the concept of Basic Net
An Introduction to Denial of Service
An Introduction to the Computer Underground
Basic Networking
BBS Crashing Techniques
BRUTE- A brute force approach to hacking Unix passwords
Closing the Net
Compression and Cracks for Dummies
Computer Bulliten Boards and the Law
Computer Chrime - Current Practices, Problems and Proposed So
Computer eMail and Privacy
Computer Hackers News Articles
Computer Rights vs First and Forth Amentment Right
Computer Security
Computer Security_2
Computer Viruii
Computerized Governmental Database Systems Containing Persona
COPS and Robbers-Unix System Security
Copyright Guides for Photographers
Crash Course in X Windows Security
Crime and Puzzlement
Cultural Formations in Text-Based Virtual Realties
Cyberspace and the Legal Matrix- Laws or Confusion
Dark Angel's Phunky Virus Writing Guide
Defamation Liability of Computerized Bulliten Board Operators
Dept of Treasury Letter
Electronic Bulliten Boards and 'Public Goods' Explainations o
Electropolos - Communication and Comunity on IRC
Ethload User's Guide
Formulating A Company Policy on Access to and Use and Disclos
Free Speech in Cyberspace
Gender Issues in Online Communications
Government Computer Security Techniques
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD
Sp2 Tweaks
Speed Up Internet
Speed up menu display
Speed up Mozilla FireFox
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth
Speeding up menus in XP
Speeding up your internet connection under Linux and Windows
Spoofing emails, via telenet
Standard ASCII Character Set
Steps to Clean Install XP
Stop A Restart Process In 3steps
Stop Annoying Pop-ups Without Pop-up Blockersoutli
System Changes To Foil Hackers And Browser Hijacke
System File Checker For Windows Xp
Tcpip A Mammoth Description, Short and easy-Everything U want to know
The Antivirus Defense-in-Depth Guide
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW
The Modern Phreakers Guide To Beige Boxing
The Modern Phreakers Guide To Payphones
The Port Guide, Port number and info
The Ultimate Guide To Installing Windows Xp Sp2
Three Ways Of Bypass Starforce Cd Protection
Tip for shutdown windows - virus
Tips And Tricks, Windows XP
Tired Of Reinstalling Windows
To Get And Show The Ip Via Javascript
Top 5 Myths About Safe Surfing, PC Magazine
Transferring Data
Translating Binary To Text
Translating Binary to Text2
Trojan Ports
Turn MSN Messenger Display Pix into User Pix on XP
Turn Off Unneeded Services, speed up pc
Tutorial  Get the serial number you need
Tutorial  How to create a bootable Windows XP SP1 CD (Nero)
Tutorials - coding\Base Number Systems
Tutorials - coding\Basics of am 3mp33j3w
Tutorials - coding\Batch File Programming
Tutorials - coding\BOOLEAN LOGIC GATES
Tutorials - coding\C++ Tutorial By Clayman
Tutorials - coding\Creating A Simple Hit Counter In PHP
Tutorials - coding\Creating A Simple Search Engine In PHP
Tutorials - coding\Creating Truly Skinnable Web Sites
Tutorials - coding\Escape Quotes In Perl Shell
Tutorials - coding\Flat databases in Perl
Tutorials - coding\Introduction to Buffer Overflow
Tutorials - coding\Introduction to
Tutorials - coding\IRC Bot In Perl
Tutorials - coding\pascal
Tutorials - coding\Python for Newbies
Tutorials - coding\Sk00l m3 ASM!!#@$!@#
Tutorials - coding\The Boot Sector
Tutorials - coding\The C Programming Language Torn Apart
Tutorials - coding\The Perl Weekly Journal 1st edition
Tutorials - coding\The Perl Weekly Journal 2nd edition
Tutorials - coding\The Perl Weekly Journal 3rd edition
Tutorials - coding\The Perl Weekly Journal 4th edition
Tutorials - coding\Using Databases In PHP
Tutorials - coding\ HTML tutorial\circbullet.gif
Tutorials - coding\ HTML tutorial\framesdemo
Tutorials - coding\ HTML tutorial\imagemap1.gif
Tutorials - coding\ HTML tutorial\jussmall.gif
Tutorials - coding\ HTML tutorial\leftframe
Tutorials - coding\ HTML tutorial\lesson1
Tutorials - coding\ HTML tutorial\lesson10
Tutorials - coding\ HTML tutorial\lesson11
Tutorials - coding\ HTML tutorial\lesson2
Tutorials - coding\ HTML tutorial\lesson3
Tutorials - coding\ HTML tutorial\lesson4
Tutorials - coding\ HTML tutorial\lesson5
Tutorials - coding\ HTML tutorial\lesson6
Tutorials - coding\ HTML tutorial\lesson7
Tutorials - coding\ HTML tutorial\lesson8
Tutorials - coding\ HTML tutorial\lesson9
Tutorials - coding\ HTML tutorial\main3
Tutorials - coding\ HTML tutorial\nextlesson.gif
Tutorials - coding\ HTML tutorial\rightframe
Tutorials - coding\ HTML tutorial\summary
Tutorials - coding\ HTML tutorial\tutorials
Tutorials - coding\Win32 Multithreading and Synchronization
Tutorials - coding\WINDOWS INTERNET PROGRAMMING {part 2}
Tutorials - coding\Windows Programming Tutorial\winprog
Tutorials - encrypt\algorithms
Tutorials - encrypt\base64
Tutorials - encrypt\
Tutorials - encrypt\encryption
Tutorials - encrypt\encryption_auth
Tutorials - encrypt\passwd
Tutorials - encrypt\passwd2
Tutorials - encrypt\pgp
Tutorials - encrypt\quantum\Axes.jpg
Tutorials - encrypt\quantum\CrptoProcess.jpg
Tutorials - encrypt\quantum\Electro.jpg
Tutorials - encrypt\quantum\NormalCrypto.jpg
Tutorials - encrypt\quantum\NormalCryptoS.jpg
Tutorials - encrypt\quantum\Phase.jpg
Tutorials - encrypt\quantum\QuantumCrypto.jpg
Tutorials - encrypt\quantum\QuantumCryptoS.jpg
Tutorials - encrypt\quantum\quantum_cryptography
Tutorials - encrypt\
Tutorials - encrypt\rsa
Tutorials - encrypt\ssl
Tutorials - encrypt\ssltun
Tutorials - hardware\buildcomp
Tutorials - hardware\cdrom
Tutorials - hardware\harddrive
Tutorials - hardware\hardware
Tutorials - hardware\memory
Tutorials - hardware\overclocking
Tutorials - hardware\PC_Hardware
Tutorials - history\hod
Tutorials - humor\flame
Tutorials - humor\hackattack
Tutorials - humor\jokerrap
Tutorials - irc\eggdrops
Tutorials - irc\fserv
Tutorials - irc\ircwar
Tutorials - cpplecture
Tutorials - hacker
Tutorials - informatic
Tutorials - irc2
Tutorials - linuxnetworking
Tutorials - LKMlecture
Tutorials - mirclecture
Tutorials - ntsec
Tutorials - perlfilterlecture
Tutorials - Perllecture
Tutorials - phpl
Tutorials - sqllecture
Tutorials - traceroute
Tutorials - vpnlecture
Tutorials - wardriving
Tutorials - local\recover
Tutorials - local\standsec
Tutorials - misc\beinghacker
Tutorials - misc\ezine
Tutorials - misc\kiddies
Tutorials - misc\search2
Tutorials - misc\social
Tutorials - net\adblock
Tutorials - net\advisory01
Tutorials - net\ankitgeo
Tutorials - net\ankit_smtp
Tutorials - net\cable
Tutorials - net\cable
Tutorials - net\caching
Tutorials - net\close
Tutorials - net\Default Passwords
Tutorials - net\Exploiting Cisco Systems
Tutorials - net\Exploiting File and Print Sharing
Tutorials - net\Exploits Explained II The #2,000 bug
Tutorials - net\firewalls_torn
Tutorials - net\ftp
Tutorials - net\Hacking CGI - Security and Exploitation
Tutorials - net\http
Tutorials - net\icq
Tutorials - net\info
Tutorials - net\inputval
Tutorials - net\Internetarch
Tutorials - net\IP and port Info using Netstat
Tutorials - net\ip
Tutorials - net\kerberos
Tutorials - net\lecture1
Tutorials - net\Mail Bombing and List Linking
Tutorials - net\MailMachine flaws
Tutorials - net\masquerading
Tutorials - net\mlist
Tutorials - net\net_toolz
Tutorials - net\osmod1.02
Tutorials - net\pop3
Tutorials - net\proxy
Tutorials - net\rmhacking
Tutorials - net\sendmail
Tutorials - net\sendmail2
Tutorials - net\sigscr101
Tutorials - net\tcpip
Tutorials - net\trojans
Tutorials - net\unixvirii
Tutorials - net\usenet
Tutorials - novell\Novell Hacking for Complete Newbies
Tutorials - novell\Novell Netware - Cracking Netware
Tutorials - tools\How to use the Fast Zip Cracker (FZC)
Tutorials - unix\2038-time-bug
Tutorials - unix\etc
Tutorials - unix\linux
Tutorials - unix\linuxgames
Tutorials - unix\linuxhdtweak
Tutorials - unix\linuxnet
Tutorials - unix\shell
Tutorials - unix\slackcs
Tutorials - unix\tcpwrappers
Tutorials - unix\unixsec
Tutorials - unix\winmodem
Tutorials - win\debug
Tutorials - win\foolproof
Tutorials - win\foolproof2
Tutorials - win\ipc
Tutorials - win\reg
Tutorials - win\registry
Tutorials - win\win2kinstall
Tutorials - win\
Tutorials - win\windows
Tutorials - win\winerror
Tutorials - win\winsecret
Tutorials - win\winsecurity2
Ultimate Google Way
Uninstall Windows Xp And Return To My Old Windows
Uninstalling Norton 2004 Products
Unlimited Rapidshare Downloads
Untold Window Tips
Untold Windows Secrets
Untold Windows Tips
Unused space on hard drives recovered
Use Hotkeys To Switch Programs
Useful Download Guide, Fix Down,  0daycn Ttdown, Links
User's Guide To Avoiding Virus Infections, Keeping an eye out for viruses
Using Google As A Calculator, A Tutorial
Using Google for searching ebooks
Using Rapid Share, How to use them and skip the BS
Video Avatars
Viewing Leftover Driver Entries
Virtual Memory Information
Virtual Memory Optimization Guide Rev. 4.0 - Final
Want To Download Torrent File By Using Google
Warez Definations
Way To Download From Brturbo, FireFox
We Don't Need No Education, Online classes made easy
 king's meaning's of how to kick some-one's ASS!
What is the Registry
What Should I Do With Image Files
What You Wanted To Know About Movie Jargon, But Were Afraid To Ask
When Good Discs Go Bad
Where Is Winipcfg In Winxp
Who's Seeding The Net With Spyware
Why wait 35 Seconds at eZshare
Win 2000 Dr. Watsson
Windows 2000 Tips & Tricks
Windows 2003 System Restore, How to activate system restore in W2K3
Windows Scan Count Down Time
Windows Shortcuts
Windows Tweak, Hack Your Start Button
Windows Xp - Speed Up Your Network and Internet Access
Windows XP Registry Tweaks
Windows XP Startup and Performance Tweaks
Windows Xp Tips 'n' Tricks
Windows Xp Tweaks, A work in progress
Windows XP Tweaks
WinRar Tutorial - Compression profiles, passwords and more
Winsock 2 Repair
WinXP 3 Tips
Winxp Application Defrag, faster access for used programs
Winxp Applications Startup Time, Decrease your Applications startup time
WinXP Bootable CD
Winxp System Response, reboot whitout rebooting
Winxp Tips And Tricks, Winsock 2 repair
Xp Auto Install
XP Tweaking
Yahoo + geocities Posts
Yahoo Messeger, no ad's
You Want Lots Of Music, Appz, Anything, Try Dex Hunting
Your Home Page Nevr Being Changed
Your Own Home Server - Introduction
[PHP] Navigations
Tutorials - coding\ HTML tutorial
Tutorials - coding\Windows Programming Tutorial
Tutorials - encrypt\quantum
Anarchist Cookbook 2004
Anarchist Cookbook 2004\Additions
A Cracking Tutorial
Hacking On XP 1-5
Tutorials - coding
Tutorials - encrypt
Tutorials - hardware
Tutorials - history
Tutorials - humor
Tutorials - irc
Tutorials - lecture
Tutorials - local
Tutorials - misc
Tutorials - net
Tutorials - novell
Tutorials - tools
Tutorials - unix
Tutorials - win
200 Hacking Tutorials
Anarchist Cookbook 2004
More Hacking
New Hacking Ebooks
Tutorials -
1000 Hacker Tutorials 2008

Anarchist Cookbook hacking tutorials
(which contains 225 ebooks)
And many more