Blog is under Construction!

Hacking 4 fun is back this time ,Coming soon with the new ,ultimate and great hacking style!This time we gonna enjoy and love this much more than before.until then like this page on facebook

Info-Tech

Thanks 4 your co-operation.

You are the back-bone of Hacking 4 fun.

your's sincerly

Asad Raza


Like Us

U there


Sunday, October 18, 2009

How to view hidden passwords without using any software.

First of all open up the webpage on which you wanna show the hidden passwords and then Just copy and paste the following JavaScript into the address bar of the browser and you are done.


Just Put This Script IN Address Bar...


javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;

%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)

%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)

%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)

%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if

%20(s)%20alert(%22Passwords%20in%20forms%20on%20this

%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are

%20no%20passwords%20in%20forms%20on%20this

%20page.%22);})();


After copying and pasting the JavaScript given above press the enter key and hidden passwords will be shown to you.

Following is the screenshot of hidden password that is shown the JavaScript given above.


Note:-I have tested this javascript in IE,Firefox and Opera and it is working perfectly.

Asad Raza

Friday, September 25, 2009

How to quickly open the ClipBook Viewer

When you use the Cut or Copy command on the Edit menu, the material you cut or copy is automatically copied to the Clipboard. The Clipboard is a temporary holding area for the items you've cut or copied. You can use the ClipBook Viewer to see the information that you've copied to the Clipboard.

You can also store information permanently in your local ClipBook and share it with other users. The local ClipBook opens when you start ClipBook Viewer.

The ClipBook Viewer isn't listed in the Start menu in Microsoft Windows XP, so if you want quick access to it, just create a shortcut on your desktop.

To open the ClipBook View
1.

Right-click your desktop, point to New, and then click Shortcut.

2.
In the location field, type %windir%\system32\clipbrd.exe

3.
Click Next.

4.
Click Finish.

5.
Now you can double-click the clipbrd shortcut on your desktop to launch the ClipBook Viewer.

Creating a Shutdown Shortcut

Right click on the Desktop.

Left click on New > Shortcut.


 In the Type the location of the item: textbox enter
%windir%\System32\shutdown.exe -s

The -s parameter is used to shut down the computer.

The following two parameters can be used with -s:
-f Forces running applications to close without warning.
-t xx Set timeout for shutdown to xx seconds.

The following command would shut down instantly.
%windir%\System32\shutdown.exe -s -f -t 00

Click the Next > button.

 In the Type a name for this shortcut: textbox enter
Shutdown My Computer (or some other name of your choice)

Click the Finish button.
 


For more information on shutdown.exe's options launch a command prompt and type shutdown




Wednesday, August 26, 2009

CursorFX


Create and use mouse cursors that look and feel far superior to anything you've ever seen before!

Saturday, August 15, 2009

Hacking Level

Hacking 4 fun™ followers(Hacking Level):-


Other's followers (Hacking Level):-




Sunday, August 9, 2009

Hacker's Types

Hackers can be divided into three groups: white hats, black hats, and grey hats. Ethical hackers
usually fall into the white-hat category, but sometimes they’re former grey hats who have become
security professionals and who use their skills in an ethical manner.

White Hat:-


White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers ar
e usually security professionals with knowledge of
hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement
countermeasures.

Black Hat:-


Black hats are the bad guys: the malicious hackers or
crackers
who use their skills
for illegal or malicious purposes. They break into or otherwise violate the system integrity of
remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious.

Grey Hat:-


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.



Wednesday, July 29, 2009

Making a real virus



By:- Asad Raza


Hidden password can be finded through this software. SandBoy's Reveleation.
By :- Asad Raza

Hacking @ VVebsite vvith SQL INJECTION



By:-Asad Raza

Hacking @ Website



By :- Asad Raza
 
Copyright © 2009 Hacking 4 fun™.All right reserved.