Posts

Showing posts from July, 2015

DISCLAIMER

Image
Your usage of this website constitutes your agreement to the following terms. 1. All the information provided on this site are for educational purposes only.The site is no way responsible for any misuse of the information. 2. The words "Hack" and "Hacking" should be taken or considered as "Ethical Hack" or "Ethical Hacking". 3. The posts intended or titled "password cracking" are actually added to allow readers recover their lost or forgotten passwords and not for cracking any other email account password. 4. Implementation of hacks explained by us is sole responsibility of user and " anonymoushackingbytravis.blogspot.com " is not responsible for any damages caused by the hacks explained in this site .

FAQs

Image
Before doing hacking lets know something about it. * What is Hacking? * Who is a Hacker? * Who is a Cracker? * Who is a Script Kiddy? * What skills do I need to become a Hacker? * What is the best way to learn Hacking? * How do I secure my computer from being Hacked? What is Hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.Hacking is the art of exploiting the flaws/loopholes in a software/module.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Who is a Hacker? A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who specialise in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. Such people are employed by companies wh

The begining

Image
Identify a target:  To fight an enemy must be known.  The same goes for a hack, we'll have to get a certain amount of information (as much as possible for that matter) on the machine that the hacker wants to have, we will call the machine "target".  For that it has a lot of tools. All will not apply to all machines because their security level differs, and some will be ineffective. I talked to a lot of these tools in different sections of this website so I did not speak again of ones, I would cite the fair and a link to the article. But do not worry I give enough information for you to understand and you can start to experiment a bit. There is not talking about crappy hack to the BO (Back Orifice) or some other moles and Trojans. Here is the hack servers it comes more from pc grandmother under Win9x. The risks are truly starting for you here but as I imagine you are aware, we will start. In this article I do not give precise address server like I did for the hack ftp