Learn Something Technical


what is R.A.T ?
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.

RATs are usually downloaded invisibly with a user-requested program — such as a game — or sent as an email attachment.

Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

Because a RAT enables administrative control.RATs can be difficult to detect because they usually don’t show up in lists of running programs or tasks.

The actions they perform can be similar to those of legitimate programs.

Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn’t alert the user that something’s amiss.

what is metasploit ?
An open source attack framework first developed by H. D. Moore in 2003.

Metasploit is used for hacking into systems for testing purposes.

Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research.

With the latest Metasploit 3.0 release, the project has moved to an all Ruby programming base.
How To Send Anonymous SMS To Any Number:-
Till now you had only try sending SMS using your mobile number or using some of online website that first takes your personal information and then display it on the receiver of the message.

But if i give you a way by which you can send SMS without entering any details that is anonymously and receiver will not identify that who had actually send the SMS.

So we are here with the way for How To Send Anonymous SMS To Any Number.

The method is very simple and straight just follow the below method to proceed.

The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.

List of Websites To Send Anonymous SMS To Any Number :-


This is one of the best anonymous SMS sending portal that allow you to send any message all over the world that absolutely free.

How to Download Torrent Files Using IDM:-
Make your IDM (Internet Download Manager) is like a Torrent Downloader.

Its a big advantage of IDM is download torrent files with amazing and faster speed.

Everyone uses uTorrent to download torrent files.

In torrent one gets the latest software, movies, music and other stuff on internet for free.

As torrent’s downloading speed depend upon the number of SEEDER’s if your file has less no. of SEED’s then you will definitely get low speed.


* Fast downloading speed.

* No need of utorrent client.

* No need to worry about torrent health.

* Save files directly to you Drop box or Google drive.

List of the best cloud site which let you to download torrent file with IDM.

#1 ZbigZ
#2 PutDrive
#3 Boxopus
#5 Pcloud

Here is all about torrent downloader, downloading torrent files with IDM. I hope this helps you a lot.

How to Make Automatically Reply to Emails in Gmail:-
Today almost everyone is using email services in daily life. And that is why we are here with How To Reply Common Emails Automatically In Gmail.

In this article we will discuss about automated emails that you can send automatically through your account.

As sometime you are on a position in which you have to reply an email with same text everytime.

So in this method you will be setting a fix message for some certain queries and Gmail will work for you and will send the reply back as set by you earlier.

So have a look in this cool method that can reduce your boring work of sending same mails to common queries.

Steps To Make Your Gmail Automatic Replier To Common Emails You Receive :-

1. First of all login into your gmail account where you want to set up Gmail Automatic Reply.

2. Now click on the down arrow button near the Gmail search box there.

3. Now there you will see a form that instantly appears when you click on that arrow button.1

4. Now fill up the form completely and in the field Have the word and Doesn’t Have the word there you can set the words that you commonly received in you emails and you want to set them accordingly.

5. Now after completely filling the form click on Create filter with this search at thebottom right corner of the form.

6. Now on next box you will see option there mark on Send canned response and there you will specify the canned reply from previous conversations.

7. After completing these all just click on Create Filter there and the filter will get created.

8. Thats it you are done. Now gmail will send automatic response to the mails received with the matched details.

How to Send Free Text SMS from Gmail Account:-
Gmail is giant network that provides lots of services to its users and we here will be talking one of the cool service. And that is sending text SMS from gmail.

Yes you can easily send text messages using your gmail account and you will not get any charge of doing this.

As this service is totally free and can be used to send message to anyone for free.

So have a look on guide to use this SMS sending service in your gmail account.

Steps To Send Free SMS Using Gmail Account:-

1. First if all login into account from which you want to send free SMS.

2. Now in your account click on compose button and sending mail dialog pop up will appear.

3. Now in the field To you will write the mobile_number@carrieraddress according to your carrier addresses given below:-















4. Now type the message in message box below and just click on send button.

5. Thats it you are done, now your message will get send to the number for free of cost using your gmail account.

6. If your carrier address is not listed above then you can search out your specific carrier messaging address.

Google Maps is an awesome app developed by google to locate any destination on your android mobile.

This map helps you to navigate to all over the world.It have all views like street view, Traffic view and Satellite view in it.

This app works on internet and use your GPS to track your location. Now whenever we navigate through google maps it needs some fast internet connection to load all the direction and places.

But sometime due to some network problems we are unable to access Google Maps in our android device.

So in this post i will tell you the a method to Use Google Maps Offline.

Method To Save Google Maps For Offline Use :-

1. Open your Google Mapapp in your android with internet connection on.

2. Now Navigate to the loactionor area which you want to save for offline use.

3. Make sure only the selected areawill be saved.

4. Now selection optionfrom three dotted button at right top corner of your app Or by pressing left button of your android device.

5. Now a square boxwill be appear on map.

6. Now tapand select the are which you want to access offline.

7. Now wait a while to activatethe option done or save.

8. Now save the mapwith your desired name.

9. It will now downloadthe complete map of selected area.

10. Thats it now you can access Google Mapswithout your internet connection of a particular selected are.

11. By this your Google Map of selected area will get saved in your phone memory.


* Area to be selected must be not too large .

* The saved google maps data will get cleared after 30 Days.

* Accessing Locations will be slow as app is not connected to internet connection.

* Since no internet connection is there you will not be able to navigate through step by step navigation.

This awesome trick will work on all android phones. Although your google map data get saved in your internal memory and it can occupy your cache space.

In this post we provide you all major mobile operators code for transferring mobile balance from one phone to another phone.

With this technique you can recharge your phone from your friend phone.

How to Transfer Mobile Balance in All Networks :-

#1.Transfer Mobile Balance From Idea to Idea

Open Phone Dialer of your Android Mobile Phone or Any phone

Dial *151*idea-mobile-number*Amount you are transfering#

Example *151*9793828543*10#

Now You will get a message with notification that the amount has transferred you can only send to local idea number and you can send amounts like 5,10,20,50,100,150 and you can send 5 time/day and it has to send in a gap of 5 min.

#2. Transfer Mobile Balance From Airtel to Airtel

To Transfer amount from your mobile,open Phone Dialer
Then Dial *141#.You will get a menu like this

1. Share Talk Time
2. Happy Hours
3. Take Advance Talktime/Ask For Talk Time
4. Auto Credit
5. Gift Pack
6. Poke Call
7. Call me back SMS
8. Account
9. Help
Reply with 1 and Press OK.

Now You Have to enter the amount you want to share to another mobile and then enter the mobile number and balance is to be transferred. The Amount Will be transferred from One Airtel to another.You can make upto 5 balance transfer per day

#3. Transfer Mobile Balance From Vodafone to Vodafone:-

For Mobile Balance Transfer, You have to dial *131*Amount*Friend Number#
For Example:*131*10*9541545477#
And the the amount will be transferred shortly.

#4. Transfer Mobile Balance From Uninor to Uninor:-

Open Phone Dialer and dial *202*Mobile Number*Amount#
Your Mobile balance Will be transferred shortly.

#5. Transfer Mobile Balance From Reliance to Reliance:-

For transferring Balance dial *367*3# then dial *312*3#
Enter the mobile number and the balance is to be transferred and amount to be send
Your Balance will be transferred instantly.

#6. Transfer Mobile Balance From Tata Docomo To Tata Docomo:-

You have send a message for this
Send BT Mobile Number RechargeAmount to 54321
For example: BT 9793828543 50 send this message to 54321
Wait for few second and Your amount will transferred shortly

Now you know How to Transfer Mobile Balance in All Networks from one phone to another phone.
enjoy it.!

Today everyone of us is a part of any college,office or any organization.

Everywhere we find free open wifi’s , but the major problem with these are there are many websites which are blocked by the servers of college,ofiice or any organization.

There are different type of securities that are implemented in these server to block some sites like Facebook ,Twitter etc.

So In this post i’ll tell you easy and permanent method to access or bypass blocked sites

Steps To Bypass Blocked Sites-

1. Connect your pc or laptop with wifi or your broadband connection in which you want to access blocked websites.

2. Open command prompt by clicking start and the typing “cmd” and then pressing enter.

4. 3. Now a command prompt window will appear.

5. Type ping Websitename (for exp: ping and press enter.

6. Now open your browser and enter the site which you had recently ping.

7.You will see the site will get opens

this is very simple method to easily access blocked sites.

What do WEP and WPA mean?
WEP and WPA (along with WPA2) are names for different encryption tools used to secure your wireless connection.

Encryption scrambles the network connection so that no one can listen in to it and look at which web pages you are viewing, for example. WEP stands for Wired Equivalent Privacy, and WPA stands for Wireless Protected Access.

WPA2 is the second version of the WPA standard.

Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it.

WPA2 is the most secure of the three.

If your wireless card and router support WPA2, that is what you should use when setting up your wireless network.

What does IP address stand for?
let’s look at what does IP address stand for; IP address stands for Inter­net Pro­to­col address.

An IP address is an address used to iden­tify any device con­nected to the net­work and the inter­net using TCP/IP, these devices can be com­put­ers, smart­phones, tablets, routers, etc.

For instance, the num­ber “″ is an exam­ple of an IP address.

These addresses allow data to reach to the pre­ferred des­ti­na­tion on a net­work and the Internet.

What is IPv4 and IPv6 — Internet Protocol Version 4 and 6 ?
WEP and WPA (along with WPA2) are names for different encryption tools used to secure your wireless connection.

Encryption scrambles the network connection so that no one can listen in to it and look at which web pages you are viewing, for example. WEP stands for Wired Equivalent Privacy, and WPA stands for Wireless Protected Access.

WPA2 is the second version of the WPA standard.

Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it.

WPA2 is the most secure of the three.

If your wireless card and router support WPA2, that is what you should use when setting up your wireless network.

What do WEP and WPA mean?
WEP and WPA (along with WPA2) are names for different encryption tools used to secure your wireless connection.

Encryption scrambles the network connection so that no one can listen in to it and look at which web pages you are viewing, for example. WEP stands for Wired Equivalent Privacy, and WPA stands for Wireless Protected Access.

WPA2 is the second version of the WPA standard.

Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it.

WPA2 is the most secure of the three.

If your wireless card and router support WPA2, that is what you should use when setting up your wireless network.

What is a Proxy Server ?
A proxy server, also known as a proxy or application-level gateway, is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet.

Proxy servers provide increased performance and security.

In some cases, they monitor employees’ use of outside resources.

A proxy server works by intercepting connections between sender and receiver.

All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.

Some proxy servers are a group of applications or servers that block common Internet services.

For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email.

A proxy server uses a network addressing scheme to present one organization-wide IP address to the Internet.

The server funnels all user requests to the Internet and returns responses to the appropriate users. In addition to restricting access from outside, this mechanism can prevent inside users from reaching specific Internet resources (e.g., certain websites).

A proxy server can also be one of the components of a firewall.

What is VPN ?
A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.

Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.

A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN).

VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Educational institutions use VPNs to connect campuses that can be distributed across the country or around the world.

In order to gain access to the private network, a user must be authenticated using a unique identification and a password. An authentication token is often used to gain access to a private network through a personal identification number (PIN) that a user must enter. The PIN is a unique authentication code that changes according to a specific frequency, usually every 30 seconds or so.

what is Web crawler
A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner.

This process is called Web crawling or spidering.

Many legitimate sites, in particular search engines, use spidering as a means of providing up-to-date data.

Web crawlers are mainly used to create a copy of all the visited pages for later processing by a search engine, that will index the downloaded pages to provide fast searches.

Crawlers can also be used for automating maintenance tasks on a Web site, such as checking links or validating HTML code.

Also, crawlers can be used to gather specific types of information from Web pages, such as harvesting e-mail addresses (usually for spam).

What is Spidering ?
Spiders are programs (or automated scripts) that ‘crawl’ through the Web looking for data.

Spiders travel through website URLs and can pull data from web pages like email addresses.

Spiders also are used to feed information found on websites to search engines.

Spiders, which are also referred to as ‘web crawlers’ search the Web and not all are friendly in their intent.

Spiders and other automated tools are used by spammers to find email addresses (on the internet this practice is often referred to as ‘harvesting’) on websites and then use them to create spam lists.

Spiders are also a tool used by search engines to find out more information about your website, but left unchecked, a website without instructions (or, ‘permissions’) on how to crawl your site can present major information security risks. Spiders travel by following links and they are very adept at finding links to databases, program files, and other information that you may not want them to have access to.

What does Vulnerability mean ?
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack.

A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.

Vulnerabilities are what information security and information assurance professionals seek to reduce.

Cutting down vulnerabilities provides fewer options for malicious users to gain access to secure information.

Computer users and network personnel can protect computer systems from vulnerabilities by keeping software security patches up to date. These patches can remedy flaws or security holes that were found in the initial release. Computer and network personnel should also stay informed about current vulnerabilities in the software they use and seek out ways to protect against them.

Send Self Destructive Messages
Step 1. First of all open

in your browser and type your secret message in the box below the line Write your note below.

There is no word limit and you can type whatever you want. Click on Show option which is located on the right-hand side down corner.

Step 2. Now check the option Notify me when this note gets read there and then enter your valid email address and also a note preference there and then click on the create note button there. You can also set the self-destruct mode, you can set it to auto-self-destruct within 1 to 30 days.

Step 3. A link will get generated for your corresponding note copy the link and send it to your friends. You can directly email this created link through Gmail, but manually sending it would be more fun.

Step 4. Now when your friends read the message, you will get notified in your respective email and the message will get deleted from the receiver’s device. Isn’t it’s interesting ?

how to make a email in seconds !!
use these coolest website,if u need a fake email,for any purpose !!! you can go on that and u will get your fake email there .!!!

here is a link :-

just use these link ;)…and u will get your email…but some of them is only for 10mins…so don’t use this email fo admistrative purpose like in schools,collage,office etc.

Step by Step: Connecting to a VPN (Outgoing)
Step 1 Click the Start button. In the search bar, type VPN and then select Set up a virtual private network (VPN) connection.

Step 2 Enter the IP address or domain name of the server to which you want to connect. If you’re connecting to a work network, your IT administrator can provide the best address.

Step 3 If you want to set up the connection, but not connnect, select Don’t connect now; otherwise, leave it blank and click Next.

Step 4 On this next screen, you can either put in your username and password, or leave it blank. You’ll be prompted for it again on the actual connection. Click Connect.

Step 5 To connect, click on the Windows network logo on the lower-right part of your screen; then select Connect under VPN Connection.

Step 6 In the Connect VPN Connection box, enter the appropriate domain and your log-in credentials; then click Connect.

Step 7 If you can’t connect, the problem could be due to the server configuration. (There are different types of VPN.) Check with your network administrator to see what kind is in use–such as PPTP–then, on the Connect VPN Connection screen, select Properties.

Step 8 Navigate to the Security tab and select the specific Type of VPN from the drop-down list. You may also have to unselect Include Windows logon domainunder the Options tab. Then click OK andConnect.

Step by Step: Building a VPN (Incoming)
Step 1 Click the Start button, and, in the search bar, type Network and Sharing.

Step 2 Click Change Adapter Settings in the left-hand menu.

Step 3 Click File, and then New Incoming Connection.

Step 4 Select the users you’d like to give access to and click Next.

Step 5 Click Through the Internet and select Next.

Step 6 Select the Internet Protocol you’d like to use. (The default TCP/IPv4–the line highlighted in the screenshot below–will work fine.)

Step 7 Finally, click Allow access; you’ve now set up an incoming VPN connection.

Free Unlimited Calling WorldWide | How to make Prank Calls Trick: Flipcall
Follow the Instructions to use Flipcall:-

1). First of all download Flipcall app from playstore or Click Here

2). Now Signup using your mobile number and you will get $1(Rs 61) for trial purposes..

Note: It will not ask for verification :D. So you can prank your friends also 😀 at the end of this tutorial how to Prank your friends..

3). Now, What you have to do is, Just make a call to any number.

4). Now you will receive a call in which you will get connected to the number you made the call.

5). Now just Enjoy the 120 minutes of free calling (for India). To get unlimited minutes follow the below steps.

SHODAN: A Search engine for hackers
Shodan is a search engine that lets the user find specific types of computers (web cams, routers, servers, etc.) connected to the internet using a variety of filters.

Shodan provides the simple and powerful searching and it provides it with ease.

If you have a basic account then it provides you only the limited number of results.

So, if you want to access it more then you have to upgrade it.

The premium features of Shodan includes plotting the host locations on maps, accessing the full search listings etc.

It also gives you a feature to search using filters. It makes your search even more easier.

List of best ethical hacking / penetration testing tools
Here is list of useful and Best Software tools that helpful in Ethical Hacking and Penetration Testing, Forensics :




Acunetix Web Security Scanner





What is WireShark ?
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

It is used for networking troubleshooting, Malware analysis and education.

Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows.
What is Doxing ?
Doxing simply refers to the process of gathering or deducing other people’s information such as name, age, email, address, telephone number, photographs etc.

using publicly available sources such as the Internet. In other words, doxing is the act of using the Internet to search for personal details about a person.

Doxing is done by initially taking a piece of information (such as “name” or “email address”) and keeping it as a base to find out other possible details about the person.

The term “doxing” is derived from the word “document tracing” which means to retrieve documents about a particular person or company in order to learn more about them.

How to Connect Two Computers Via Crossover Ethernet Cable
In this tutorial we are going to show you how to transfer data from one computer to another. We need to PC/Laptop and a crossover cable to transfer data.

PC 1

Step1: Go to “Open Networking and Sharing Center“.

Step2: Click on “Local Area Connection“.

Step3: Now click on “Properties“.

Step4: Double click on “Internet Protocol Version 4(TCP/IPv6)“.

Step5: Click on “Use the following IP address:” and enter the IP address: as and just give a click onSubnet mask. Once done click “Ok” and close it.

PC 2

Step1: Go to “Open Networking and Sharing Center“.

Step2: Click on “Local Area Connection“.

Step3: Now click on “Properties“.

Step4: Double click on “Internet Protocol Version 4(TCP/IPv6)“.

Step5: Click on “Use the following IP address:” and enter the IP address: as and just give a click onSubnet mask. Once done click “Ok” and close it.

Now two computers are connected. To share files we need to give access to our drives, so follow the commands given below to give access to your drivers.

Step1: Click on “Computer“.

Step2: Right click on driver and then Properties.

Step3: Click on “Sharing” tab and then Advance Sharing and then check out Share the folder

Step4: Click on Permissions to give control on the other PC and once done click “Ok” and close it

Step5: Click Security and then go onto Advance Settings > Change Permissions > Add > Advance > Find Nowat bottom click Everyone

Note: If you share your data via WiFi the data transfer will be 1-2MB and if you share the data via Lan cable the data transfer will be 10-12MB

What is Domain ?
When referring to an Internet address or name a domain or domain name is the location of a website.

For example, the domain name points to the IP address, but it is generally easier to remember a name rather than a long string of numbers.

A domain name can be a maximum of sixty-three characters with one character minimum, and is entered after the protocol in the URL

The first Internet domain name ‘” was registered by Symbolics, a Massachusetts computer company on March 15, 1985.

what is Cain and Abel ?
Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows.

It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks

Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel.

Cain and Abel is maintained by Massimiliano Montoro and Sean Babcock.

Download Cain & Abel from tools section.

What is a Phreaking ?
A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.

The term is now sometimes used to include anyone who breaks or tries to break the security of any network.

Recently, the phone companies have introduced new security safeguards, making phreaking more difficult.

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.

The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system.

Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking.

The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls.

By re-creating these tones, phreaks could switch calls from the phone handset, allowing free calls to be made around the world.

To ease the creation of these tones, electronic tone generators known as blue boxes became a staple of the phreaker community, including future Apple Inc.

cofounders Steve Jobs and Steve Wozniak.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: