Technology

ASR World provides you with many guides,methods for performing different tasks. Even HACKING and making simple .bat viruses(Batch file viruses) as well as harmful TROJANS.Making R.A.T.s , Zip Bombs and Password stealers and much more to explore.

Hacking:hacking-password

ASR Technologies provide you methods to Hack following:

  • Facebook
  • WhatsApp
  • Gmail
  • Hotmail
  • Yahoo
  • Other Social Accounts
  • WiFi( WEP & WPA/WPA2 )
  • Web Sites
  • Games

Viruses:virus

Very simple and easy to create viruses(Batch file viruses) are enlisted bellow:

  • Overloading Memory
  • Wiping Out Memory
  • Fork Bomb
  • Application Flooder/Blaster
  • Folder Blaster/Bomber
  • User Account Flooder
  • Shutdown Virus
  • Deleting Boot Files
  • Extension Changer
  • DNS Poisoning
More on Viruses :
  • Limitations in Batch Viruses and Overcoming The
  • Hiding from Anti-Viruse.
  • Spreading the Viruses.

Trojans:trojan

A Trojan horse, or Trojan, in computing is generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm or taking control over PC.

  • Trojan Horse (Introduction)
  • Trojan Horse (Using)

Zip Bomb:zip-bomb

A zip bomb, also known as a zip of death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional viruses.

  • Zip Bomb

Password Stealer:password-stealer

Password stealer is way to set up USB pendrive so that whenever Password  insert it in a victim’s computer it captures all the PASSWORDS , USER NAMES of the victim present on the PC.

  • Password stealer

Phishing:phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

  • Phishing

Cheat Engine:cheat-engine

Cheat Engine is an open source tool designed to help you to modify (mostly) single player games so the user can make them harder or easier depending on their preference. (Example: If you find that 100 HP is too easy on a particular game, you can try playing a game with a maximum 10 HP as a challenge). Cheat Engine(CE) also contains several other useful tools to help debugging and really just messing around with games and pretty much any applications.

ASR Technologies Provide you the information and using of CE:

  • Cheat Engine

Google Dorks:google-dorks

Do you know how to use Google? Sounds a silly question because even children can easily use Google search engine. But the thing is that how efficiently we can make use of Google. Google dorks are nothing but simple search operators that are used to refine our search.

We will teach you some ways to use them:

  • Using Google Dorks
  • Accessing unprotected camera through Google.

Hacking Lockscreen:hacked-thieves-bypass-lock-screen-your-samsung-galaxy-note-2-galaxy-s3-more-android-phones-1280x600

Here are some methods on hacking or bypassing lock screens on many device of android or others, I have posted some and will post others soon.

  • Bypassing/Hacking android devices
  • Bypassing/hacking Samsung Galaxy Note 2 & S3
  • Bypassing/Hacking Apple Devices IOS 6.1.2
  • Bypassing/Hacking Android Devices (Factory reset)

Exploring Google:google-search-leverageit

Google can be used for doing many things like calculating…..converting……comparing foods……getting important informations……even playing. Lets EXPLORE some of google tricks.

  • Exploring Google

VPN:

VPN

A Virtual Private Network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or public networks. Here are some tricks for that:

  • VPN Formation

IP Address:IP

The Internet Protocol (IP) is the principal Communication Protocol in the Internet Protocol Suite for relaying datagram across network boundaries. Its routing function enables Internet working, and essentially establishes the Internet.

  • Getting IP of a PC

Remote Sharing of Personal Computer:

Remote Sharing of PC

 

Remote sharing is now a days on its peak, people use remote sharing to provide live support or for sharing screens. Most of us always use third-party software’s for sharing or controlling remote systems using software’s like Team Viewer or Radmin etc.

ASR Technologies teaches you how to connect any two or as many as windows PC through remote without using any third-party tool like team viewer etc. and share screens without any third-party tool.

  • Remote Sharing PCs

Mobile Tricks:Mobile Tricks

Secret Hack Codes are those codes which are usually hidden from users for any misuse and exploit. As we all know android is very new platform and thus very few hack codes of androids are there on Internet. Here are some tricks for mobile
phones (Running Android):

  • Mobile Tricks/Hacks (Using Codes)
Advertisements

We appreciate your opinion:

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: