Browsing All Posts filed under »Coding«

Exclusive Anarcrypt Articles

April 9, 2012 by


If this is your first time at Anarcrypt then you should definitely check out these popular articles: Computer Security:                                      See all the links here Advertisements

IE7 Exploit

March 13, 2010 by


Here is a video demonstrating the new exploit for IE6 and IE7 This video has originally been posted at my new site: please view the video here if the link is not working for you, copy-paste this URL in your address bar: thanks Ezzk

Batch Virus to shutdown computer at startup

February 21, 2010 by


This article has originally been written at our new site: please read the article here if the link is not working for you, copy-paste this URL in your address bar: thanks Ezzk 

The hacking blog: has been SHIFTED!!!!

February 19, 2010 by


I am guilty for a lot of things folks .. the most critical one of them being not posting on this blog for 2 months now Those of you who have been following me on facebook and twitter will know that I was trying to make a forum where hackers can share their knowledge and […]

Hacking the “HAMA” Device.

January 5, 2010 by


This post is about interfacing a strange device. It has two connectors. 1. An European power plug and 2. A DB-25 Connector. And I guess you have to connect it to the serial to interface it!…and while plugging it in you have to convert the DB25 to DB9 and put it into the COM2 of […]

Chaining Proxies and Wingates!!!

December 29, 2009 by


Hello!… All you wonderful people out there. 🙂 …Yes!…I’m back in action and it’s been long..very long! since I’ve posted on anarchia..actually to be honest I felt very Handycap and so empty….Well… you all must be wondering where have I disappeared??…LoL!…don’t worry I’ve been around but just been busy with University work and just completing […]

JavaScript Security – Advanced

November 30, 2009 by


“In your evolution as a web developer, you’ll run into some security problems eventually. The makers of JavaScript have identified and solved most of the really glaring security holes; the browser vendors have plugged up some the holes themselves, along with adding a certain measure of guaranteed security through browser operations. There are several different […]