Jump to content

Hacking : An unofficial anonymous guide : Windows and Internet

Recommended Posts

Hidden Content

    Give reaction to this post to see the hidden content.


Hacking : An unofficial anonymous guide : Windows and Internet by Jonathan Jones

English | Jul. 10, 2015 | ASIN: B011ERQO70 | 222 Pages | PDF | 4.03 MB





1.1 Hacking

1.2 Hacker

1.3 Classifications of Hacker

1.4 Famous Hackers of All Time

1.5 Types of hacking attacks and techniques

1.6 Password



2.1 Introduction to Windows Hacking

2.2 Registry Editor Related Hacking

2.3 Local Group Policies Related Hacking

2.4 Shortcuts Related Hacking

2.5 Notepad Related Hacking

2.6 Miscellaneous Related Hacking



3.1 Introduction to Internet Hacking

3.2 Block and unblock any website

3.3 How to Increase Internet Speed

3.4 Search Internet from the Start Menu

3.5 Know any website IP address in Command Prompt

3.6 View Passwords hidden in asterisks

3.7 How to speedup online videos and performance of Firefox

3.8 Sign-out of all Gmail sessions

3.9 Sign-in to multiple Google accounts in the same browser

3.10 Log in to multiple web accounts simultaneously

3.11 Save any web article to PDF for free

3.12 Free online Resume builder

3.13 Unlock PDF and EXCEL files Online

3.14 Free online file converter

3.15 Online Edit Photos

3.16 Scan your files for malwares online for free

3.17 Online trace any mobile number anywhere

3.18 Search pictures of people in 3D layout

3.19 Disable websites from resizing your Firefox browser window

3.20 How to run Firefox inside Firefox inside Firefox

3.21 YouTube SECRETS

3.22 Add Firefox’s Spelling-Check feature to forms

3.23 Check username availability on multiple sites at once

3.24 You don't need the “http://” portion of a web page on Address bar/Location bar

3.25 Take advantage of tabbed browsing

3.26 Quickly move between the fields of a web page

3.27 Google “I’m Feeling Lucky” button Magic Tricks

3.28 Google Results page full overview

3.29 Google Calculator

3.30 Search with an exact phrase in Google

3.31 Search for specific file types in Google

3.32 Google Measurement Converter

3.33 Currency conversions

3.34 Exact time of any place

3.35 Check the weather of anywhere in Google

3.36 Get Sunset and Sunrise time of anywhere in Google

3.37 Get definitions of everything in Google

3.38 Trace My IP Address

3.39 Search by advanced image search in Google

3.40 Get movie times in Google

3.41 Get the list of all films of any Actor and Actress

3.42 Google URL shortener

3.43 Google Earth

3.44 Most useful Google Operators

3.45 Google help center

3.46 Backup all your facebook data like photos, videos, and text

3.47 Facebook shortcut keys

3.48 How to deactivate or permanently delete a Facebook account

3.49 Post blank status and comment on facebook

3.50 Insert symbols and characters in Facebook status and comments

3.51 How to block people/apps/events/pages on facebook

3.52 View Facebook Photos in Full Screen Mode

3.53 How to find if somebody hacked your facebook account

3.54 How to Block Facebook Applications Forever

3.55 Who can look me up? On Facebook

3.56 Facebook Emoji

3.57 Convert Facebook Profile into a Page

3.58 Verify Facebook Page or Profile

3.59 Accept/Reject all Facebook Requests at once

3.60 Delete all Facebook Messages at once

3.61 Hide last seen in Facebook chat

3.62 Wayback Machine

3.63 WEB proxy server or HTTP proxy server

3.64 Glype

3.65 Hide-My-IP.Com

3.66 JonDo – the IP changer

3.67 VPN (Virtual Private Network) Services

3.68 Useful Extensions and Add-ons



4.1 Password cracker software

4.2 Wireless hacking tools

4.3 Network scanning & hacking tools

4.4 Packet crafting to exploit firewall weaknesses

4.5 Traffic monitoring for network related hacking

4.6 Packet sniffers to analyze traffic

4.7 Rootkit detectors to hack file system

4.8 Fuzzers to search vulnerabilities

4.9 Forensics

4.10 Debuggers to hack running programs

4.11 Hacking operating systems

4.12 Encryption tools

4.13 Intrusion detection system and the ids tools

4.14 Hacking vulnerability exploitation tools

4.15 Vulnerability scanners

4.16 Web vulnerability scanners



Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 1

Share this post

Link to post
Share on other sites

exclude chapter 4(very basics) , looking at the content I seriously doubt why its name as hacking guide for windows

Hidden Content

    Give reaction to this post to see the hidden content.

Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...