Top 10 Computer Viruses of all Time

The Internet has been a revolutionary technology that changed the world and the hackers have been trying to crack the vulnerabilities that they can use for their own gains. They also pose a threat to the internet.Here are the top 10 viruses and worms that impacted the...
Share:

Hack Cellphones With Super Bluetooth Hack

Super Bluetooth Hack is the best and also well known Mobile Bluetooth hacking software available. Many of you might be aware of this or even already be using this  free tool. So the post is mainly for the noobs out there who didn’t come across this tool until now. Super ...
Share:

Top 5 alternatives for Dropbox to Share files Online

Dropbox is the best file file sharing site online which offers simplicity of use on its cloud based sharing. But if you wanted to know some of the other alternatives like dropbox then read on to find the top 5 best dropbox alternatives. Windows Live Mesh This is far...
Share:

How to hide the Facebook Questions

Facebook launched the new questions feature which seems  to be great way  for people to interact and share their views and opinions and makes Facebook much more fun. But the questions  takes up too much space in the update wall and makes it look all messed...
Share:

5 Best Free tools to Compress Images online

Compressing the image is the basic needs of any blogger who would want to optimize the images on his site to save space space and bandwidth for faster loading time. But what if you suddenly experience a problem with your compression tool or either you dont have the tool or...
Share:

How to Hack In To School Servers

Introduction Ok guys, this can get you into a lot of shit, I did a bit of this a few days ago so try not to get caught, I got caught because all the computer have remote administration on them, so remember to read the notes at the end of this tutorial. This will only work with Windows 98, 2000, Me, and XP for definite. If you read this entire tutorial...
Share:

IPv6 test day Just Around the Corner

World IPv6 day is scheduled to be held on June 8th,2011 and is sponsored by the Internet  Society (ISOC). The event mainly is a global scale test flight for the IPv6 and will start at midnight (GMT) of 8th  June for a period of around 24 hours. Several Big...
Share:

3 Best WordPress plugins to hide your Affiliate Links

Affiliate links don’t make the link look nice with all the question marks or sometimes even have a long string in them.So visitors don’t usually click on such links when they see a affiliate link.So the Best option is to hide the links behind a clean link that doesn’t look...
Share:

Find out Flight Timings with a click with Google Search

Google recently rolled out a new search feature that allows you to search and find for any particular flight from a source to the destination location, all listed out in order with all the details of the carrier and the expected travel period. This new feature works...
Share:

30+ Facebook Tips/Tricks and Hacks that you Should Know

Facebook is undoubtedly the king of social networking and with the majority of its users logging in multiple times in a day, to either check out their friends updates or post their own status. With these usage factors in mind, its important to make use of some of the tricks...
Share:

How people try to Cheat Google Adsense

Google adsense is the most profitable  revenue stream for publishers and also a reliable advertiser for its advertisers, but some people may try to earn more money by fraud clicks or many other ways that are mentioned here to finally get their  accounts banned....
Share:

How to Hide any file inside a Photo or any Image File

Hiding files inside an image file was never easy with all the nuisance encrypting and password protection by a software just to hide a file.But here is a simple trick to demonstrate how to hide any kind of file like .Exe or .flv or .txt inside a image file. The art of hiding...
Share:

Use Multiple Passwords for different Websites using a Single Master Password

Its a fact that majority of the web users tend to sign up and register in various websites and use the same passwords on them because its easier to remember.Well recent attacks on popular websites proved that this idea might be dangerous as hackers who gain data of any weak...
Share:

How to hack websites by Remote File Inclusion

Hello friends,  Today i am going to explain and advanced method of hacking websites that is How to hack websites using Remote File Inclusion. As the name suggests Remote File Inclusion is technique where we inserts the file (in hacking terminology called Shell) in to...
Share:

How to identify and stay safe from phishing scams

Phishing is a type of social engineering form of hacking a persons private data like passwords or credit card details or any other private data by faking the identity of any legitimate trustworthy company or individual.Phishing is a basic form of hacking,to steal any sensitive...
Share:

Change IP address instantly for free While Browsing

You may need to change your IP address while surfing the internet for anonymity from search engines storing your data or to access any specific location based service.  Of course you have a lot of tools offering these features like this, as the most popular anonymizer...
Share:

Get Yourself a Diaspora invite for Free – Limited Giveaway

Diaspora unlike Facebook or Google+ is a decentralized Social Network run by distributed Web servers maintained by some of their own users in “pods”. The Project is still under Development stage and is a invite only signup. Diaspora is gaining popularity because of the...
Share:

How to Get your Own Google+ (Plus) Short Vanity Url

Sharing your Google Plus profile link is difficult as  Google plus doesn’t yet support short url’s for the Google+ profiles yet. So Instead you will need to use the long unique number assigned  to each Google Plus profile, which is difficult to remember and also...
Share:

How to install Linux KeyLogger in Ubuntu

A keylogger is hardware/software based, that works on the background and maps every key stroke onto a log file without the users awareness. For linux x86 architecture, LKL is the common keylogger ,also known as Linux KeyLogger.Linux Key Logger is a open source and a free...
Share:

How to Change Your MAC Address in Windows

Every Network interface card(NIC) is assigned a unique address called a Media Access Control (MAC) Address which is assigned by the card manufacturer, different from any other NIC. This MAC address is use during the packet transmission when connected to any wired/wireless...
Share:

How to Browse and get Linux Partition files in Windows

What if you wanted to get some files from the linux partition while in windows and you don not find a way to get it.Or what if your linux boot failed and you need to get some important files from the linux partition.Well here is a solution.Many of the linux distributions...
Share:

How to Login to Any Website Without Registration

Some of the websites force you to register your details and create your account first , to be able to get access to their downloads or any other features that they require an account. But this can be dangerous when a lot of websites are being hacked these days and your private...
Share:

How to Hack and change the Start Menu Button in Windows 7

Have you ever wanted to customize your operating system just to suit your style or even to show off in front of  your buddies. Well here is a small trick that lets you change and customize the windows 7 Orb start button to the icon you want it to be. This trick...
Share:

Hack Cellphones With Super Bluetooth Hack

Super Bluetooth Hack is the best and also well known Mobile Bluetooth hacking software available. Many of you might be aware of this or even already be using this  free tool. So the post is mainly for the noobs out there who didn’t come across this tool until now. Super ...
Share:

11 Most Useful Keyboard Shortcuts For Facebook

Facebook provides some useful keyboard shortcuts that could save you some extra time from reaching out to your mouse for all the clicks. Facebook shortcuts not only help you save some time of your regular facebook usage but can also help you navigate your favorite social network easily :D. So is a list of useful keyboard shortcuts that...
Share:

How to make Ubuntu Look like Mac OS X

If you love the Mac interface and you want to get this look onto your ubuntu operating system then here is a simple package that will install the Mac theme ,apps and resources onto your Ubuntu OS.And if you are a  Mac fan and you dont like to leave your linux OS...
Share:

How to Download Any Video By Just Playing it Once

Playing any Online videos takes a lot of time to download on some of your slower connections and so loading a video once, may take up few minutes and when you realize that you liked the video and want to download it, you will need to start the hectic Download process...
Share:

DISCLAIMER

The information provided on hottechtips.blogspot.com is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” on hottechtips.blogspot.com should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk.