Category: Hacking Tutorials

Today, I will show you how to crack WinRAR using a disassembler. You can crack any version of WinRAR using this method and need not to pay for the registration fee and you can do this all by your self, easily. Furthermore, major software are cracked using the same way,but just get a bit complex in the methodology. This tutorial is intended for those who are new to cracking and disassembling. This cracking exercise can be performed on Linux or Windows operating system. Here I have demonstrated it with the use of windows operating system. If you use linux, then you have to get the corresponding tools for the linux operating system.


By Reading this tutorial You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other,creative application of this tutorial.

In any case you disagree with the above statement,stop here.


To perform this hack you will be needing

  1. Any De-assembler (Hackers Disassembler and Hview used here)
  2. Resource Hacker
  3. A patch Creator ( Use Universal Patch Creator or Code fusion)

You will be able to get them by googling . . . .

It’s been known for a while that WEP is easily cracked. Today I will show you just how easy it is and how to test your network’s security yourself. Since I usually find that there’s generally too much explanation involved in these tutorials, I will try to keep it simple.

You Will Require :

A Wireless Router with WEP encryption
A Wireless Card Capable of Injection ( Atheros Cards are Preferred)
A Copy of BackTrack Linux
A USB Drive (2GB or larger)

Steps To Follow :

First, you need BackTrack on a USB drive. Plug your USB drive into your computer and format it with FAT32.

Fatal error : The system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer.” If you do this you will lose any unsaved information in all open applications.

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1. Hardware Conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route :

The Term Hacker has several definitions. Habitually Hacker is a person who are enthusiasts in digital computing, they have more knowledge than that of the normal user. It doesn’t matter that a hacker should master only in computers, they may master any thing like mobile phones, PDA’s, Digi- Cam’s, Signals, Hand held devices and so on.

In Computing hackers are clever programmers. In Security Terminology Hackers are the person who really enjoys computing, Programming and the one who deals more with any electronic devices, most often computers by exploring new techniques and tweaking them.

Hackers are skilled person who are good programmers with a good attitude but, Nowadays the term hacker is used with negative connotation because of media’s. Lemme make it clear why the term ‘Hacker’ Such a bad impression among public or its vague.

In security terminology hackers are further classified into three main types based upon how they use their skills in the real world.