Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label miscellaneous. Show all posts
Showing posts with label miscellaneous. Show all posts

Monday, 21 November 2011


Facebook is one of the most used social networking website in the world and is also has one of the most attacked site. So, what we can do to prevent our account from getting hacked? Here are some tips that could help you to secure your facebook accounts from hackers.
Just login to your facebook account and follow these simple steps:

1. Control your privacy settings: make sure you are sharing only the informations that are needed to be shared, because sometimes a hacker may need only a little chunk of information about you to infiltarate your account.

Block the people and apps that seems suspicious, manage all your friends and configure how they access your data. Make sure that all the informations you share should not give a hint about your password.

2. Don't accept too much friend requests: Many hackers uses fake accounts to add themselves to the people and gain some bits of informations to tackel their accounts. 

3. Don't use much apps: many apps are on the facebook that compramises the user informations so you should not use any app if you are not sure.

4. Your password: Don't ever share your password, I know thats a old tale but is very important. Keep your password complex and don't share it with people.

Friday, 28 October 2011

This can be quite an odd feeling but now a days I am finding quite lot of guys switching from windows to linux based operating systems. In a world that is ruled by windows, Linux is getting itself a lot of looks from allover most of guys are now switching over to Linux based systems.

I myself started using Linux, I felt kind of weird for sometime then, I found it more interesting then windows. I used dual boot to boot Linux along with windows 7 and I found myself that I was booting to linux most of the time instead of going for windows. The faster performance and the overwhelming gorgeous looks was the key. Many guys would found it difficult to to migrate some may say Linux in not friendly but its not the fact.

So, what are the POPS and CONS of linux.

  1. Linux doesn't allows .exe files to execute, so no tension of viruses and keyloggers.
  2. Linux is open source so lot of people are working on making it more secure.
  3. Linux provide greater flexibility.
  4. Almost all linux based comes for free so, no need to spend money on some damn crap.
  5. Cool desktop effects
  6. Linux comes with live CD so you can use linux on any environment just keep your live CD with you.
  7. Non execution of .exe files makes some users dislike linux.

Friday, 7 October 2011

Networks are generally mapped with almost no knowledge, from far much away from the actual network we gather information and interpret the network topology is known as Black Box. In this case, cracker initiate with IP address of server or URL of the website of victim organization.

Monday, 3 October 2011

Hardware keyloggers are the hardware spying tool. It records all the typed key words of the users in its in built memory.
Hardware keyloggers are used by many cyber cafe owners to get into your accounts, not that silly email accounts or social sites, they have much more sinister plans, they want your bank account details. Yes most of the keyloggers are installed in order to get access to your banking details, that they can use to exploit your bank account.

Monday, 12 September 2011

Have you ever been told by your friend that he has hacked many gmail accounts with simple tricks by fooling the gmail server. He could have told you about the simple way by which he fooled the Gmail password recovery server and requested a password for a account, he want to hack.
This technique was used by one of my friends to plant as attack on me. This is really a good example of social engineering.

Friday, 9 September 2011

 
Have you ever got suspecious that someone else might be using your facebook account. Have you ever find out if there is any unknown activity going on in your wall, or you see some post or comments that you have not written then this post is for you.
Nearly everyone has encountered an attack on their facebook account, even I did. So, here toutorial that will guide you to setup your facebook account to prevent any unknown or unwanted activity.

Sunday, 21 August 2011

Have it ever happened to you that you accidently deleted a important file, spreadsheet, picture etc even from the recycle bin. But you think its over then stop once there is still a hope to recover those files. In this post I wll show you how you could recover the deleted files.

Tuesday, 16 August 2011

Here what I am going to teach you is the method to hide your entire hard drive, like you hide your folders. Only difference you will not get the content even in a search. By using this method you can hide all of your entire secret data, just keep them together in a drive and hide it. 
Now here's how to do this:

Wednesday, 27 July 2011

Gmail has became one of the most popular email service provider and thus one of the favorite targets of hackers. A lot of complain have been found about spamming, email bombing and phishing. Most of us have witnessed the spams flooding our inbox. Have you ever wondered were the hell that all mail came from. 
You must have heard about phishing. You got some link you click on it and fill up the form and your account gets hacked. Ya that is phishing. So, when a email is send by a hacker to you most probably it feels like, it came from the genuine source. There are a lot of method of email spoofing, that I will discuss in my upcoming post. Now, coming to the main topic.
Imagine you got a mail, now you want to know where did it came from. So, what to do:

  • login to your gmail account.
  • Open the email you want to track down
  • Click on reply button and then on show original button.



 A new tab will get opened showing you the source code, look on for recieved: from it actually appears in 7th line.


the IP address in the blue box is of the IP address through which this mail was sent to you. Just copy the address. It will give the detailed information about the IP.


Sunday, 17 July 2011

Malwares are actually a program ( code, active script, software etc) that is used to infect any computer and carry on their pre determined objective without even letting the user getting slightest hint. Malwares are a menace from a long time. In this post I will discuss about some of the malware around us.
Is you computer running slow, or you are getting trouble in starting your programs, it may be possible that your computer is infected by malwares.

Saturday, 2 July 2011

Whenever you insert your pendrive into a computer there is a risk of getting it infected by the viruses in that system. Most of the guys fear this most. In this post I will tell you a method to protect your pendrive from the virus attack

Friday, 10 June 2011

Downloading videos from youtube has always been a problem as youtube doesnot allow direct download, so you have to use some third party resource. I used several softwares but just got fed up as they sluggish and provide no control over the quality of the video you are downloading. In this post I will tell you about a method to download videos from the youtube without need of installing any software.