Sometimes there is some private information that you might be sending to your friend.If you fear that your friend may forward (leak) it to others you can send him a self destructive email.Its content will automatically get deleted once it is read.Another great feature of this trick that you will also get notifications once your email is read.
Trick to Automatically Delete Mail Once it Got Read:-
1). First of all go to website www.privnote.com
2). In the text field type your message that you want to send to your friend.
3). After writing your message, do check mark on “Notify me when this note gets read“ box. Give your Email address and Reference Name where you want to get notify. The notifications email will be delivered in your Inbox folder or Spamfolder.
4). Click on Create Note...
How to Extend Windows Desktop in 3D
T3Desk lets you manage your applications more easily in a 3D desktop adding the third dimension to your Windows screen. 3D minimized windows will appear in three dimensions and transparent on your screen and have the ability to be flipped, zoomed, moved, swiveled in almost anyway you want.
T3Desk is lightweight on your resources, unlike most applications of its kind.
T3Desk lets you set the options regarding display, zooming, hot keys and sounds. You can configure your 3D window animation, transparency effect, the 3D initial angle and distance, the transition effects and more.
With T3Desk you can quickly navigate, based on your input text, to the most visited and useful Web sites on the Internet, and also find up-to-the-minute news and articles...
Computer CD-ROM Hacking for Pranking
Hey all of you how are you wanna prank with your friends and check out their dramatic facial expression. This below post will help you in creating a virus file which when activated will open and close your computers CD-Rom in a loop mode, means again and again making your friend think that his or her computer is hacked.
But this is just for FUN and this does not deal with any kind of Hacking Activity, seriously just for FUN.
Procedure to Create Opening and Closing Script .:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count...
Increase DSL speed by 50%

Well Speedy internet is one main thing which everyone can get @ easy cheap costs well with this simple trick you will be able to boost your DSL Modem Speed upto 50%, DSL Speed is an amazing small software which boosts your DSL Modem speed @ a simple click., they have a premium licensed version which boosts double the normal one but if you don’t wanna buy this software than free version can work too.
You can download DSL Speed software from creators official website, and you can also check their video tutorials pagewhich contains flash video describing how to use their amazing small windows DSL boosting utility, or you can check the below steps to see how it works.
Follow the below steps to boost your DSL Modem .:
1. First make sure to check your internet current speed @ Speedtest.net.
2....
Create Bootable USB Drive from ISO
What if your computer requires formatting as it is affected with virus and you don’t have a DVD writer or CD writer installed on your windows?
Then purchasing a new DVD writer would be the only available option to you. But some motherboards (old versions) require drivers in order to make the DVD writer work. So the only option we have here is boot from a USB Flash drive or pen drive.
Now, how do you make a Bootable Flash drive?
For this task to be done, you need a Pen drive of minimum 4GB capacity or more for windows 7 and 2GB for windows XP. Also you need a CD/DVD copy of your required OS.
1.Format your Pen Drive in FAT format.
2.Download WintoFlash (free) and install it.
3.Open the installed “WintoFlash” program and enter the windows file path of where the ISO of Windows is located...
How to Test the Working of your Antivirus
Have you ever wondered how to test your Antivirus software to ensure it’s proper working?
Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer.
Here is a step-by-step procedure to test your antivirus.
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
EICAR Test code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from...
Send password Protected Email

Many of you may wonder why do we need to password protect our E-mails ? Well There are many reasons. One of them being that if you send a very confidential or personal e-mail to someone and if his E-mail Id gets hacked then all your valuable data or emotions will be on the hackers hand.
So here today i'm gonna post how to password protect your E-mails While sending them.
Steps are:
1). Visit the Lockbin website. Lockbin is a web application for sending Private Email Messages and Files in A password Protected Environment and The best thing about this is Its Free.
2). Fill in the below form with the password you wanna set...
Watch free internet TV with VLC player
Hello friends, many of you want to see free online TV. But you don't know how to play internet TV. Though there are some websites where you can see free TV.
But today I shall tell you how to play online TV with VLC media player.
1). You have to install VLC media player on your computer and you need some links of online free TV.
Here some online tv links.
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK...
How to disable Taskbar Thumbnail Preview in Windows 7
A feature of Windows 7 is that it will show you a preview, or small
thumbnail image, of the open windows for a particular program when you
hover over it. For example, if you have 3 Internet Explorer windows open
and hover your mouse cursor over the Internet Explorer icon on your
taskbar, it will pop-up 3 small images of each of your Internet Explorer
windows and allow you to select the one you want to make active. An
example of this feature can be seen in the image below.
Though,
in theory this feature is a good one, for many other people it is
really annoying and can actually get in the way of productivity when
these thumbnails pop-up over work you are trying to do.
Unfortunately, Microsoft decided to not provide a method that can be used to disable this feature in Windows...
Kill Windows with the Blue Screen of Death
Have you ever wanted to show off your keyboard ninja skills by taking down Windows with just 3 keystrokes? All you have to do is add one registry key, and then you can impress your friends… or use it to convince people to switch to Linux.
This isn’t a bug, it’s a “feature” in Windows that is designed to let users trigger a crash dump for testing purposes.
To enable this feature,
1). Open up regedit and then browse down to one of these keys, depending on your keyboard type:
USB Keyboard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid\ParametersPS/2 Keyboard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters
2). Now right-click on the right-hand pane and add a new DWORD key named CrashOnCtrlScroll, giving it a value of 1.
3). Reboot your computer, and...
Prevent Windows Update from Forcibly Rebooting
We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer. I’ve become convinced that this dialog has been designed to detect when we are most busy and only prompt us at that moment.
The real problem comes into play when Windows gets tired of reminding us and says that the computer is going to reboot in 5 minutes, and the only way you can prevent the inevitable is to temporarily disable Windows Update.
There’s a couple of ways that we can disable this behavior, however. You’ll still get the prompt, but it won’t force you to shut down.
This trick should work for all versions of Windows as far as we know. You can always resort to the temporary disabling measures instead.
Open up regedit.exe through the start menu search box or run dialog,...
Open Command Prompt From Anywhere
Have you ever roamed around your computer, wishing to open a command line program from a location, but were too lazy to type its path into the prompt itself? One of the beautiful things about some Linux distributions is the ability to open the terminal from any file location within the GUI. Windows can do this also, but doesn’t do it by default. Instead, you’re going to have to get in the system’s innards and actually improvise.
The registry contains an “Extended” property to every shell command key, so what we’re going to do here is rename the property to nullify it. First, go to
HKEY_CLASSES_ROOT\Drive\shell\cmd
in the registry and have a look at the right-side of the editor. Rename “Extended” to anything you want, like “Extended-BAK.” Do the same at “HKEY_CLASSES_ROOT\Directory\shell\cmd”....
Change The Registered Owner of The Windows
If you get a computer from someone, you might notice that the person’s name is there in “winver.exe.” Here’s what we’re talking about:
This might not bother you, but if it does, there’s a way to change it. Just navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
in your registry and change the “RegisteredOwner” value to anything you’d like. Restart your computer, open the Start menu, and type “winver”. Once you press “Enter,” you should see the new name in the window that shows u...
How to enable Taskbar Thumbnail Preview in Windows 7
Warning: Improperly modifying the Windows Registry can cause Windows to not operate correctly. Therefore if you do not feel comfortable editing the Windows Registry then you can download a registry file to perform these steps for you. Otherwise, please continue with these steps:
Close all open windows so you are at your desktop.
Click on the start button and enter Regedit in the search field.
When User Account Control asks if you would like to allow this program to make changes, click on the Yes button.
Navigate to the following Registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
On the right hand portion of the Registry Editor screen, scroll through the list of values till you see the ExtendedUIHoverTime value. Then right-click on the ExtendedUIHoverTime...
How to Use Windows 7 Without Activation?
Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once...
Chatting Through Command Prompt?

For chatting through command prompt type this code in notepad and save as Messenger.Bat
CODE:@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGoto A
Now drag this file in cmd you can show user and message in user type ip address of your friend and type message.enjoy!!!!!!!...
How To Clean Your RAM Using Notepad?
Many friends of me ask where can I download a software which can keep my RAM free? And I found these software are nothing but using some lines of code which can be implemented by using notepad or any editor tool. So if any one does not have any software, you can use it by doing the following things which I am going to mention.
Steps to Clean Your RAM Using Notepad:
Open Notepad
Type FreeMem=Space (10240000000). (Note:This code is only for those who have 1GB(1024 MB) RAM, if you have 2GB(1024*2 = 2048 MB) RAM than replace 1024 from above code to 2048 and if you have 512 MB RAM in your Computer than replace 1024 from above code to 512).
Save it as “CLEANER.VBS” in any location you like.
Run it !
After this final step your RAM will be free...
All Start Menu Tweaks
You can also set them directly via the registry using the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
The registry entries are DWORD values. A value of 1 is enabled, and a value of 0 is disabled:
* Policy: Disable the new simple Start Menu
Description:Disables the new simple Start menu and forces the classic Start menu.
Registry Value: NoSimpleStartMenu
* Policy: Remove pinned programs list from the Start menu
Description:Removes the pinned programs list from the Start menu. Also removes the Internet and E-mail checkboxes from the Start menu customization CPL.
Registry Value: NoStartMenuPinnedList
* Policy:Remove...
Remove Unwanted applications from 'Open With' list

In windows, we open some files with other supported applications too.. like mp3 files we can open with winamp, media player, itune, or many other mp3 players...
Now here ill tell you hack for how to remove unwanted applications from this open with list..
This is very simple n useful trick
Settings:-
Run > regedit > hit Enter
Registry > My Computer > HKEY_CLASSES_ROOT > Applications
When you expand 'Applications' key then you will see a long sub keys list of program names like accwiz.exe, BitTorrent.exe, n something like more list..
Then select a application key which you want to remove from 'Open with' list..(e.g.- i selected 'flash.exe' to remove from list)
Right click in right side pane in blank area or go to Edit> New
Add New> 'String Value' (REG_SZ)
Change name...
Blocking specific files in Autoplay Drives
When AutoPlay is activated n our Data CD/DVD or flash drives inserted, Windows will execute an Applications which is configured in autorun.inf.
Mostly all viruses travels from autorun to system directory or drive
Here i will tell you how to block specific files from autoplay instead of Disabling Autoplay system.
Settings:
Run > regedit
Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Add New String value and name it with application name which you want to block. E.g.- Some bad coders use shell32.exe (system contains shell32.dll, see the difference between .exe n .dll) to execute virus from autorun.inf
(Note:- shell32.exe, run32.exe, ntdetect1.exe these used to run virus cause system contains this named dll) so to...
How To Prevent Programs From Stealing Focus in Windows
When programs start stealing focus, they "pop up" in front of the window that you're currently viewing. A default setting in Windows prevents this from happening. If programs are stealing focus from your current window then this setting has been changed.
Note: Changes to the Windows Registry are made in these steps. Take great care in making only the changes described below. I recommend that you backup the registry keys you're modifying in these steps as an extra precaution.
Here's How:
Click on Start and then Run.
In the text box in the Run window, type regedit and click OK. This will open the Registry Editor program.
Locate the HKEY_CURRENT_USER folder under My Computer and click on the (+) sign next the folder name to expand the folder.
Continue to expand folders until you reach the...
How To Change the Windows XP Product Key
Changing the Windows XP product key may be necessary if you discover your current key is pirated or illegal but you don't want to reinstall Windows XP to activate your new legal key.
Note: Changes to the registry are made in these steps. Take great care in making only the changes described below. I recommend that you backup the registry keys you're modifying in these steps as an extra precaution.
Here's How:
Click on Start and then Run.
In the text box in the Run window, type regedit and click OK. This will open the Registry Editor program.
Locate the HKEY_LOCAL_MACHINE folder under My Computer and click on the (+) sign next the folder name to expand the folder.
Continue to expand folders until you reach the HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Current Version\WPAEvents registry...
What is MAC Address?
A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware...
What is IP Address?
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."
The designers of the Internet Protocol defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed...
How do you make your own file extension n file type?

This registry setting allows you to add a new file extension and file type that is currently not not available in your windows system, and adds inside your right click 'New' context menu .
Many time we needs a file to store our personal data, notes, reminders, appointments etc.. n which wants to identify easily in our system files..
By using this setting you can make your own file type n extension for your daily use :)
Settings:
(Dont use single or double quotes in complete setting)
1] Start > Run > regedit> hit Enter
2] Select HKEY_CLASSES_ROOT key..
3] Right Click> New > Key (add New key at HKEY_CLASSES_ROOT)
4] Write your file extension like '.note'...
Add custom folder in 'SendTo'

Everybody has own custom folder in his computer to save, collect, work, music and for anything else, we use one or few more folder always for whatever we save or work...
So i wanna tell you one trick for 'How to add our favorite folder in SendTo menu'
There is no any trick in registry to add this context menu.. :-)
We just need to add shortcut of our folder in users SendTo shell folder..
Lets Start,
Settings:
1] go to Start> Run
2] Enter '%USERPROFILE%\SendTo' and hit Enter...
3] Then right click in anywhere in blank space in this folder...
4] Add new shortcut from New menu
5] It brings 'create shortcut' window...
6] browse in select your folder which you want in SendTo.. n Next
7] Name it what u want and press finish
8] Now select your shortcut folder >...
How to Remove 'sendto' option from right click menu
This setting allows you to Remove 'sendto' option from right-click menu (context menu).
Run > Regedit > hit Enter
Registry > My Computer > HKEY_CLASSES_ROOT > selectAllFilesystemObjects
AllFilesystemObjects > shellex > ContextMenuHandlers
ContextMenuHandlers > select Send To
now right side pane double click on '(Default)'
Add '-' (minus sign) in front of {7BA4C740-9E81-11CF-99D3-00AA004AE837} like this ' -{7BA4C740-9E81-11CF-99D3-00AA004AE837}'
Now refresh your Desktop n check right click menu.. :)...
Disable Autorun
In the left pane, navigate to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
With Explorer highlighted, in the right-pane right click the value NoDriveTypeAutoRun and select Modify from the drop down menu. The base value will be set to Hexadecimal. If not, select Hexadecimal.
Type 95 and click OK.
Note that this will stop Autorun on removable/USB drives, but still allow it on CD ROM drives. If you want to disable autorun on both, substitute b5 for the 95.
95 : Disable For CD Nd PD
b5 : Disable All
91 : Enable Al...
Disable Folder Options
Steps to disable folder options are:-
1. Open the Start Menu.
2. In the white line (Start Search) area, type regedit and press Enter.
3. In regedit, go to:
User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
System Key: [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Value Name: NoFolderOptions
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = show options, 1 = hide option...
Disable Task Manager
NOTE: This method will work for all Vista versions.
1. Open the Start Menu.
2. In the white line (Start Search) area, type regedit and press Enter.
3. Click on the Continue button in the UAC prompt.
4. In regedit, go to:
NOTE: If you do not have System, then right click on Polices and click on New and Key. Type System and press Enter.
Code:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
5. To Disable Task Manager -
A) In the right pane, right click on a empty area and click on New and DWORD (32-bit) Value and type DisableTaskMgr and press Enter.
B) Right click on DisableTaskMgr and click on Modify.
C) Type 1 and click on OK.
6. To Enable Task Manager -
A) In the right pane, right click on DisableTaskMgr and click on Delete.
B) Click on Yes to confirm delete.
7....
Disable CMD

Disable cmd prompt:
(HKLM or HKCU)\\Software\\Policies\\Microsoft\\Windows\\System
DisableCMD=DWORD
Set to 1 to disable the cmd prompt but allow batch files.
Set to 2 to disable cmd and batch fil...
Disable Registry Editor
Disable:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Change the following value: DisableRegistryTools
Set it to 0 to allow regedit
Set it to 1 to disable regedit
Enable:
1. Click Start>Run
2. Cut and paste on Run “field” the line below to Unlock Registry Editor.
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
...
Disable Writing To USB
Start | Run | Type: regedit | Click OK |
Navigate to >>>
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
“WriteProtect”=dword:0000000...
Disable Writing To CD

If XP Pro or Home, edit the registry...
Start | Run | Type: regedit | Click OK |
Navigate to >>>
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\
Policies\Explorer
Value Name: NoCDBurning
Data Type: REG_DWORD (DWORD Value)
Value Data: 0 or 1
0 = Allow CDR
1 = Disable CDR
Create a new DWORD value, or modify the existing value, called 'NoCDBurning' and edit the value according to the settings above.
...
Drive icon And Label Works

To change the icon displayed within explorer for a drive requires changes to the windows registry.
Create (if it does not already exist) the registry key:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ DriveIcons\ X\ DefaultIcon
where 'X' is the drive letter of the drive for which you wish to change the drive icon.
Change the key's default value to hold the fully qualified name of the icon file (e.g. 'c:\myicons\cdrive.ico').
If the file contains more than one icon then follow it with a comma and the zero-based index of the icon (e.g. 'c:\myicons\mylib.dll,2').
To see the affect restart windows - although, depending on the version of windows simply refreshing the window might be sufficient.
--------------------------------------------------------------------------------
From...
Hide Drives
Open your registry and find or create the key below.
Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
System Key: [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Value Name: NoDrives
Data Type: REG_DWORD (DWORD Value)
The "NoDrives" value uses a 32-bit word to define local and network drive visibility for each logical drive in the computer. The lower 26 bits of the 32-bit word correspond to drive letters A through Z. Drives are visible when set to 0 and hidden when set to 1.
If your not happy working in Hex, add these decimal numbers to hide the drive(s):
A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072,...
Write Name Instead of Start

1. First, you'll need a tool called Resource Hack for the job. You can find it here. Download the file and save it in permanent folder.
2. Open Resource Hack tool and locate the file explorer.exe in C:\Windows. But make sure to back up the file before modify it.(just in case)
3. Click on String Table folder, go to sub-folder number 37 and click the 1033 entry.Highlight the start text (Don't include the quotes) and name it at your own choice. For example, we name it as User1. Click at compile script button and save it as explorerUser1.exe.
4. Go to regedit and locate this entry;
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows NT>Current Version>Winlogon > Search for entry named "shell", the default value data is explorer.exe. Rename the entry as explorerUser1.exe or whatever...
Communities of Hackers
Communities of Hacking are:-
1. Hackers
Hackers are Intelligent Computer Professionals.
•Motive/Intent –
To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
To find possible security vulnerabilities in a system.
They create security awareness by sharing knowledge. It’s a team work.
2. Crackers
An Individuals who break into computers with malicious intent.
•Motive/Intent –
To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.
To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.
•Effects- Can cause financial losses & image/reputation damages,
defamation in the society for individuals or organizations
3. Phreaks
These are persons...
Types of Hackers?
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. They probably work an organization for providing security.
They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.
E.g.- LIKE ME.. As I’m Doing It Right Now ( I Hope So!!!)
Black Hat Hacker
Black hat hackers are bad guys(the malicious hackers or crackers). They usually steal the other bank information and steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.
E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security...
What is Hacking?

The Art of exploring various security breaches is termed as Hacking.It is an anti-society activity and it says, there always exists more than one way to solve the problem.
Hacking is the process of taking advantage of weakness in a computer or computer network to accomplish his goal. The person who is engaging in hacking activities called as 'Hacker'. Hackers may be motivated by a multiple reasons, such as profit, protest, challenge or just for fun.
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now...