ஐฬєlς๏๓є t๏ คђ๓є๔ร ђคςкเภﻮ lเ๒гคгאஐ

●๋•нσмє●๋•

°ღ•ⓛⓘⓑⓡⓐⓡ㋡ ⓞⓕ ⓣⓗⓔ ⓔⓣⓗⓘ©ⓐⓛ ⓗⓐ©ⓚⓘⓝⓖ°ღ•

●๋•нι єνєяソσηє●๋• I am Ahmed. I live in Kashmir, ミ★тнє ραяα∂ιѕє ση єαятн★彡 .i started programming in C while i was in my fourth standard. I am currently doing my MCA from the Manipal University. Besides it, i take time to work collecting the latest ethical hacking techniques and secrets. I collected all what i am adding to this site. Hope it is enough and upto date.

●๋•∂ιѕ¢ℓαιмєя●๋•

The author of this website will like to express his concerns about the misuse of the information contained in this website. By opening this website you agree to the following stipulations:

Any actions and or activities related to them aterial contained within this manual is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question.

The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this manual to break the law.


(Note This website was created for Information purposes only.)

●๋•ℓαтєѕт α∂ναη¢ємєηтѕ●๋•

Hackers use some particular tools of trade to carry out their tasks of intruding and compromising a security-fail-proof system. however these tools are so simple to use, but they require a witty and moment-responsive person. Believe it or not, A hacker can turn your home computer in to a BOMB!

check out some of the tools that the so called anarchist hackers use: -

●๋•тнє ℓєgєη∂αяソ SUB7●๋•

The popular tool among hackers is the SUB7 software. It is basically a trojan. It works on the basis of server client software,

Know more in the:

●๋•тяσנαη ѕє¢яєтѕ●๋•

 

●๋•ѕσмє σℓ∂єя вυт ιηναѕινє ѕソѕтєм тняєαтѕ●๋•

Your system can be intruded in just 15 seconds.

know more in the

●๋•ηєтвισѕ αттα¢кѕ●๋•

(C) ●๋•αнмє∂ мιя●๋• april 2009. response@ahmedshackinglibrary.gqnu.net