Some hackers conventional means - Qzone log
| Back to logs list
Reprinted from 973751360 at 20:49 on July 27, 2010 Reading (loading. ..) Comments (0) Category: cold material to share
Some hackers usual means of learning how to wrap packages will
reminded: Baidu is not black, do not try.
First, how black
step tutorial site:
open IE5.5 or later, or FireFox1.5 above, and enter the destination URL, open the need to be black forum.
Step:
take a certain concentration of black ink a little mouths, the mouth and align the center of your screen, spray! ! !
third step:
looked up to see: black! ! ! It is dark! ! !
(b)
first step:
open IE5.5 or later,
nike dunk, or FireFox1.5 above, and enter the destination URL, open forums need to be black.
Step:
find the display switches, index finger, index finger aimed at the monitor switch button, press! ! !
third step:
looked up to see: black! ! ! It is dark! ! !
(c)
first step:
open IE5.5 or later, or FireFox1.5 above, and enter the destination URL, open forums need to be dark.
Step:
find an electrical outlet box, his right hand, right hand aligned socket, pull! ! !
third step:
looked up to see: black! ! ! It is dark! ! !
(d)
first step:
open IE5.5 or later, or FireFox1.5 above, and enter the destination URL, open forums need to be black.
Step:
take a certain size of the bricks or metal and other hard objects, aimed at the middle of your screen, threw! ! !
third step:
looked up to see: black! ! ! It is dark! ! !
Tutorial: How to black someone else's computer
steps:
1. buy a bucket of black paint and a brush
2. to someone's home (walk or ride can be)
3. to his home computer on the black paint applied with a brush
good! So you succeeded in the dark someone else's computer! Congratulations!
Tutorial II: How to leave a back door in the other computer and Trojan
1. to the toy store to buy a horse, to the hardware store to buy a drilling machine
2. to someone's home (walk or ride to the can)
3. with the drilling machine in the back of his home computer chassis drill a hole into the wood Marseille.
Tutorial III: how to enhance their competence in the other site in the
steps:
1. made many, many posts
2. donate to this site some money
3. proposed as a moderator
good! You finally upgrade their permission it! Congratulations!
Tutorial IV: how to get people of various password
steps:
1. static tracing method:
go to a cafe, dressed as a tree, stand peek behind the Internet users.
2. dynamic tracking method:
to a friend's house guest, and stood behind their families peek.
(requirement: must be a good memory and eyesight, severe eye and idiot against bean learn the power law)
tutorial five: how to break someone exhaustive method mailbox password
Step:
1. casually enter a mailbox password
2. If not, then enter the second try
3. If not, then enter the third try
4. If this is not , and enter the fourth try ... ...
(more time consuming, it is strongly recommended not to practice this old friend Gong)
Tutorial VI: how to make each other's network paralysis
steps:
1. to other sites such as network management and owners all around to a dead end for dinner.
2. let your brother have all rushed to the dead end, do not forget to bring hammers, knives and sticks.
3. I guess after meeting each other's sites are not paralyzed, is semi-paralyzed. (There do not understand the details of the query can call 110)
Tutorial Seven: How to blow each other off the assembly line
Steps: If you can successfully complete the tutorial above six, then the specific steps and tools I need not say.