Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label Tips and tricks. Show all posts
Showing posts with label Tips and tricks. Show all posts

Sunday, 14 September 2014


Every computer connected to internet has its own IP address allotted to it, this IP address is unique and can be easily traced back to that computer.
Privacy is a big concern among internet users. If you are concerned about your privacy or dont want to reveal your original identity and are searching for ways to hide your ip then you are at the right place.
In this post we are going to discuss some of the best ways to hide your ip address and keep your identity safe online.

The safest and most popular ways to hide your ip is by using a proxy server. A proxy server is a server that act as an intermediate between your computer and the network to which it is connected. So, when you are using a proxy server you are not directly communicating with the network you are sending the requests to Proxy server which in turn sends them to network and then it receive the response and show it back to you. Thus your IP is kept hidden from your network. 

Lets now discuss about type of Proxy servers:

Website based Proxy server

This is the simplest method. There are tons of website on internet that provide free and padi proxy services for users. These website doesn't require you to install any additional software on you computer. Here are the list of some of the most famous proxies.
Most of these websites provides a field to enter the URL of the website you want to open. Once you enter the URL they will establish a connection with the target site and will show the result to you. The only downside of these sites are that some of them doesn't offer SSL connection and you are often presented with annoying adds during your browsing session.

Browser Configured Proxy Servers:

There are many free open proxies that are available in internet. You can obtain the the IP address of one of these free proxy servers and can configure your browser to start using them directly. The only downside is slow connection and few bottlenecks.

VPN Services:

VPN services are one of the most trusted services to hide your IP and safeguard your data and identity over internet. Here is the list of few VPN services that you can try yourself.
For any queries and questions please feel free to comment.

Tuesday, 1 November 2011



You can install windows on any system through USB also. It has several advantages, like you would be able to install windows7 on devices that don't have dvd drives like netbooks and overall speed of the installation is also increased significantly. 
In this post I will discuss on the ways to make a bootable windows installer in an USB.

Friday, 14 October 2011

I came up with embeepay with some of my friends. They were using it for weeks and most important thing they were getting paid. One of my friend got a Rs. 200 recharge in just one day. So, how embeepay works?

Wednesday, 5 October 2011

In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.


1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas into the folder.

2. You will got a window something like this.
3. Now click on create button.
4. click on the "Create ProRAT server 342kbayt"
5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address here

Now in "Mail notification" put your own email ID hope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that its keylogger will record.

6. Now click on the "Create server" a pop up window would appear stating
           "The server has been created" the server will be created in the default directory i.e. in the folder were proRAT is kept.


7. Not everyone would be willing to click on anything with .exe extension so, what we need to do  is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind.



8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection.

Now, you need to send this file to your victim, here you need some social engineering. First off all make a RAR archive for server as you can not send .exe file via email due to policies of service providers. Bind the file with any favorite song or picture of victim or to anything that victim will be compiled to click on and once he clicked he is all yours. 

PROs and CONS
  • ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
  • ProRAT has been around for quite a long time.
  • As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.

Tuesday, 27 September 2011

Are you guys fed up of looking at the same old blue default facebook layout and theme. In my previous post I wrote about changing the default blue colour layout of the facebook. In this post I will be discussing about the simple step to change the theme in facebook.So, fed up of the blue need some change you can have one with some easy steps. First off all this hack works only with Mozilla Firefox. So, if still you are using that sucking internet explorer please come over guys.

Wednesday, 14 September 2011

Are you bored looking at the same old default blue colour of your facebook profile? At least orkut provides you with different colours to suit your personality, but with facebook you have to compromise for blue only. So, then is there any method to make it look different? as a matter of fact yes.

Monday, 12 September 2011

This app allows a user to create a question with any amount of choices, so his friends or fans can choose one or multiple options. The great thing about the question is that it can be passed down to friends of friends once the user answers the question or follows it. So, sometimes it all gets messy our news feed got spamed with the questions and we could do nothing. But now here is a solution.

Saturday, 10 September 2011

Surf web anonymously and securely. 
Its really an insecure world out there, when ever you are surfing net you leaves all your foot prints behind yourself, just like as if walking on a mud. Its really easy for an attacker to trace you.
How to surf anonymously without exposing yourself:

Now thats a question most of people never wanted to give a thought. When ever you surf internet you leave trace of yourself everywhere. Its like a leaving a trail all around. But first as we proceed. For beigners here is something you should know first.


What is an IP?
IP is known as INTERNET PROTOCOL .The Internet Protocol (IP) is the principal communication protocol used for relaying datagrams (packets) across an internetwork using the Internet protocol suit. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their address.
A IP address is like a telephone number. It can revel everything about you, your location, your address, everything about you.
So, then how to mask up your IP so that no one could trace you. there are a no. of methods which could be used. PROXY is the most significant one.
Proxy provides a different mode of path for data encryption. The proxy server act as a medium of communication between your system and network. All the data you send is manipulated by proxy server
Following few methods could be used to change your proxy.
Method 1:
By using online proxy sites. There are a no. of online proxy sites which provide free proxy. These sites are very useful if you want to access a site which is banned by by you network administrator.

proxy buddy
hide my ass
proxy site
access blocked site

Method 2:
By using VPN software it changes your proxy directly. The softwares such as 
Ultrasurf
TOR, 
Real hide IP, 
Hide my IP etc are quite usefull.

Friday, 9 September 2011

 
Have you ever got suspecious that someone else might be using your facebook account. Have you ever find out if there is any unknown activity going on in your wall, or you see some post or comments that you have not written then this post is for you.
Nearly everyone has encountered an attack on their facebook account, even I did. So, here toutorial that will guide you to setup your facebook account to prevent any unknown or unwanted activity.

Wednesday, 7 September 2011

Do your friends sometimes prefers to remain invisible and you wonder why they have not appeared for a long time or you want to know if your girlfriend/boyfriend is online or not. Its quite easy to find if someone is invisible on gtalk. These are the simple steps you need to follow to know if your friends are invisible or offline.

Friday, 2 September 2011

Asterisks contains the password hidden under itself. Sometimes, when you open a site you might find your friend or anyone's user name and password written in the respective boxes(if they have saved their password). But the main question is how to find the password hidden behind the asterisks.

Monday, 29 August 2011

I recently found a website called my likes. It allows user to earn money by showing their's sponser's link on your facebook or twitter profile page. You could easily make $0.10 to $0.80 per click you recieve on your profile. More click on your post means more money.

Wednesday, 24 August 2011


If you are found of bookmarking and misses your computer or laptop where ever you go. Here is a solution for you. Mozilla has also released a portable verdion of its most popular browser, firefox. 
You can carry this browser in your USB flash drive or pendrive and can use it in any system you want. Cool isn't it.

Monday, 22 August 2011


Its like the most difficult question ever, nah! it just another gig. I was actually wondering to change the primary email address of my blog and shift it to a new one and I don't know what to do. Then I came up with one interesting solution. If you are wanting to change the primary email address of your blog then this might be of use.

Sunday, 21 August 2011

Have it ever happened to you that you accidently deleted a important file, spreadsheet, picture etc even from the recycle bin. But you think its over then stop once there is still a hope to recover those files. In this post I wll show you how you could recover the deleted files.

Tuesday, 16 August 2011

Here what I am going to teach you is the method to hide your entire hard drive, like you hide your folders. Only difference you will not get the content even in a search. By using this method you can hide all of your entire secret data, just keep them together in a drive and hide it. 
Now here's how to do this:

Friday, 29 July 2011

 Being a firefox lover its really is cumbersome to use ultrasurf as it doesn't supports firefox. But here is a method by which you can use firefox also with ultrasurf, so, surf freely, hidden, anonymously, and safe with firefox also.

In school colleges or at public place wifi systems, as I talked through a lot of guys talking about their college banning most of the stuffs. So, here I got you a way by which you can access all the banned sites on the ( wi-fi network) including your favorite one.

Wednesday, 27 July 2011

Gmail has became one of the most popular email service provider and thus one of the favorite targets of hackers. A lot of complain have been found about spamming, email bombing and phishing. Most of us have witnessed the spams flooding our inbox. Have you ever wondered were the hell that all mail came from. 
You must have heard about phishing. You got some link you click on it and fill up the form and your account gets hacked. Ya that is phishing. So, when a email is send by a hacker to you most probably it feels like, it came from the genuine source. There are a lot of method of email spoofing, that I will discuss in my upcoming post. Now, coming to the main topic.
Imagine you got a mail, now you want to know where did it came from. So, what to do:

  • login to your gmail account.
  • Open the email you want to track down
  • Click on reply button and then on show original button.



 A new tab will get opened showing you the source code, look on for recieved: from it actually appears in 7th line.


the IP address in the blue box is of the IP address through which this mail was sent to you. Just copy the address. It will give the detailed information about the IP.


Saturday, 9 July 2011

This feature provides you with the information about your system like the availibility of current updates or installlation status of some program. But sometimes this becomes a mess and an unwanted thing. If you want to get reed of this, this post is for you.