THE NEXT GENERATION OF COMPUTING

The ComputerManiac is for those who are Craze about computers.

HACKERS ARE HERE

ComputerManiac is connected to the ChennaiHackers community.

FIND EVERYTHING HERE

Feel free,This the platform for computer experts.

JOIN US

CONNECT WITH EXPERTS TO BECOME AN EXPERT

ASK US

FEEL FREE TO REACH US

Sunday, 23 September 2012

Fake Access Point

Fake Access Point with Airsnarf More Sharing ServHelThis is a tutorial of How you can make a Fake access point by using airsnarf in Backtrack. As you know wireless hotspots are everywhere. A mobile user can obtain connectivity quickly and easily in a wide variety of public locations.  Some of these hotspots are free and some of them require a fee or subscription.  Either way, you will continue to see how being in a public Wi-Fi...

Execute virus on Start up

You must be familiar with viruses and probably you must be knowing how we can create them. Once the virus get executed it will show its impact but it will last till the system is turn on, If you will turn off the system all the process of the virus will also get killed. So our requirement is to run our virus again even if the system get rebooted. So for that we will have to send our virus on start up. But we don’t want to send it manually instead...

Website Hacking-IIS Exploit

1:- Click on START and click on RUN then enter the below code and then press ENTER%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F} 2:- A new window name "WEB FOLDER" gets open3:- Right click and click on New, Add Web Folder then enter your vulnerable website address as show below in the image 4:- Click on "Next >Next>Finish",Now you can insert your deface page on that...

Steganography | Ethical Hacking

Well today we are making the first post of “LEARN HACKING LEVEL 2″. The First topic we are going to discuss today is “STEGANOGRAPHY”. So what is Steganography? Before coming to the point let me tell you its history. You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them. This concept was developed further and it was implemented...

Methods To Grab Banners

I hope you enjoyed reading last post on banner grabbing. Here in this post we will discus some tools that can be used to grab banners and we will also have our look on some of the tools that can be used for preventing our banners from getting grabbed. Following are some tools that helps in banner grabbing. NetCat: Net-Cat is TCP/IP debugging tool that can be used for banner grabbing. Download Netcat from its official site, ...

Saturday, 22 September 2012

Restart Windows without Restarting your PC

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT"....

Transform your windows 7 to Mac os X

                    Ever wanted to experience the look of Mac Os X, If yes then here i brought you an amazing mac theme for your windows.This will give your computer a completely new look like mac. This is great theme to experience Mac Os X. Download the file from below link and enjoy mac os x theme. Extract the file and run it as administrator. Right click on file and click...