Tuesday 24 December 2013

// // Leave a Comment

Apple has 'big plans' for 2014, says CEO Tim Cook

NEW YORK: Apple enthusiasts across the globe are in for a treat as the iconic creator of iPhone smartphone and iPad tablet has "big plans" lined up for the next year.

"We have a lot to look forward to in 2014, including some big plans that we think customers are going to love," Apple CEO Tim Cook said in a letter to its employees.

Extending greetings for the Christmas and the New Year, Cook said, "This holiday season, tens of millions of people around the world, from all walks of life, are experiencing Apple products for the first time."

He expressed "pride" on the stellar performance by the California-headquartered firm in 2013.

"We introduced industry-leading products in each of our major categories in 2013, showing the breadth and depth of innovation at Apple," he said.

See More
Read More

Thursday 19 December 2013

// // Leave a Comment

If your Pen Drive is infected with any of the following viruses:

* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after
you enable show hidden folders.
Following simple dos command will change the attributes of
these files ,there after you can remove it by pressing delete
key.
Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected
(like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter
(don't forget spaces).
Now you can see hidden virus files and you can delete them.
Done NjOy.....!!!
Read More
// // Leave a Comment

Facebook launches 'dislike' button for Messenger

WASHINGTON: Facebook has updated its Messenger app that includes a 'dislike' button.

However, the 'dislike' option is only available on the desktop and mobile versions of Facebook Messenger, Fox News reports. The dislike button is not available for the newsfeed and cannot be used in statuses and other posts.

In order to access the new sticker pack, users will have to download it from the Sticker Store inside the Messenger app.
Read More

Wednesday 18 December 2013

// // Leave a Comment

See, what was most searched on Google in 2013

SAN FRANCISCO: Death, devices and celebrity drove the quest for more information on Google's search engine this year.

Three of the world's four fastest-rising search requests on Google were triggered by the deaths of famous men.

Former South African President Nelson Mandela, who died earlier this month, occupied the top spot, followed by "Fast & Furious" movie star Paul Walker, who died in a November 30 car crash. "Glee" TV series cast member Cory Monteith, who died of a drug overdose in July, ranked fourth in an annual retrospective
 See More                
 
                                          
 
Read More

Monday 16 December 2013

// // Leave a Comment

Komli Media: The Digital Ad-tech firm that wants to take on Google and Facebook

In just under a month, Amar Goel experienced the thrills and spills of being an entrepreneur. This October, the co-founder and chairman of Komli Media, a digital advertising solutions provider, closed the latest round of funding for his sevenyear-old firm—nearly $100 million (about RS 600 crore) in total—only to discover a few weeks later that Prashant Mehta, the company's chief executive of five years, had resigned.

For a company tracking to be a $100 million entity by December 2014 and turn profitable this month, this was an unexpected and unpleasant surprise. And, for Goel, a former Microsoft employee in New York, it meant taking on extra executive responsibilities—by retaking the reins of Komli, to go with another startup he was focusing on. And pressure: to grow faster and turn profitable, to take on the likes of Google and InMobi, to justify the $100 million bet that private capital has taken on it and to make its six overseas acquisitions sweat.

Big Technology Break

Goel, along with Akshay Garg, started Komli in 2006, when digital advertising was in its infancy—a $25-50 million opportunity in India—with just the slightest hint of interest from marketers.

See More
Read More

Saturday 14 December 2013

// // Leave a Comment

Balance Transfer Trick for All Indian Mobile Operators 100% Working-

This trick working on almost all the networks like – BSNL, Airtel, Idea, Tata Docomo, Vodafone, Aircel, Reliance, Uninor. If you are already using this service provider well and good, if not, to enjoy this you may have to port to these networks.

1) Balance Transfer for BSNL
If you are using BSNL , then balance transfer is most simple for you .All you have to need is send a message. Follow these following steps –
BSNL also utilises SMS to provide balance transfer service. To use this service, you need to type SMS in this format: Gift < SPACE > < Receiver’s Number > < SPACE >< Amount > and send it to either 53733 or 53738. For example, Gift 9876543210 50. 9876543210 is receiver’s number and 50 is transfer amount.e done with it.
Limitations -You can transfer amount from Rs.5 to Rs.50 only. The receiver should be active from atleast for 30 days and sender should be active for atleast 3 months .

2) Balance Transfer for Airtel
To transfer balance for your Airtel operator, follow the steps –
Just Dial USSD code *141#
A window will appear where you can see many option.
Select first option i.e Share Talk Time .
Just type mobile number ( receiver’s no ).
Limitations - You can transfer Rs. 5 to Rs. 30 only. And after you have done with the transfer , you should have at least Rs. 10 balance . You can do this 5 times a day. 


See More
Read More
// // Leave a Comment

Smartphones’ future: Bendable screens, Iron Man tech

   SAN FRANCISCO: This may be remembered as the year smartphones became boring.    Although high-definition displays on smartphones have gotten bigger and their cameras have gotten better, the pace of gee-whiz innovation has dawdled.    

Smartphone and software makers are working on ways to snap out of this technological lull, although it probably will be at least another year or two before breakthroughs revolutionize the design and function of mobile computing devices.

In a foreshadowing of things to come, LG Electronics is boasting about the G Flex, a new phone with a curved display. Previously available in Korea and Singapore, the concave device arrived in Hong Kong on Friday.

"We want to claim this as the future of smart devices," Ramchan Woo, the head of LG's mobile product planning division, said during a recent demonstration in San Francisco.

If such visions are realized, smartphones and tablets will be equipped with display screens that can be rolled up like a scroll or folded like a wallet.

The G Flex provides a peek at the shape of things to come. Despite its name, the G Flex isn't pliable. The device is slightly bowed from top to bottom, allowing it to curve toward a person's mouth when used for phone calls. It also has a curved battery, something LG says is a first for smartphones. LG applied a "self-healing" protective coat on the G Flex to automatically repair any minor scratches.

More than anything, the G Flex is meant to begin the smartphone's evolution from the primitive state of flat screens. In theory, the curved-screen technology will lead to bendable screens, which will then pave the way to foldable screens. If that progression plays out, it would be possible to fold a larger smartphone so it can easily fit into a pocket.
See More    
Read More

Tuesday 10 December 2013

// // Leave a Comment

Aim In Hackers:

Aim In Life:

1. Learn Hacking(✔)
2. Start Hacking (✔)
3. Stop Hacking (✔)
4. Teach Hacking (✔)
5. Help People (✔)
6. Write E-Books (✔)
7. Finish Education (✘)
8. Graduate From College (✘)
9. Get a Job (✔)
10. Find a Girlfriend (✔ / ✘ )
Read More

Saturday 7 December 2013

// // Leave a Comment

How to Protect Your Facebook Account from Rogue Applications

A rogue application is a Facebook application developed by someone with fraudulent or deceitful intentions. The application often doesn’t perform its stated objectives. They are designed to obtain account information of the user, and they can be used to spread spam, scams or other malware to friends of the infected account. Typical examples are:
  • Profile Viewer Apps
  • Apps that redirect to phishing links and forms
  • Apps that lead to malicious downloads
  • Apps that lead to survey scams
The best way to guard against rogue applications is to avoid any third-party Facebook applications entirely. If this approach is too extreme for you, there are some steps you can take to help protect your account.
1. Be very selective in the applications you install. Stick with applications from well known developers and software companies. If you are tempted to install a more obscure application, then research it thoroughly before doing so.
2. Double check the permissions you have granted to Facebook applications currently installed. You can access this list either by the privacy settings or account settings. Click the padlock or the gears icon located in the top right corner of your Facebook page, or use this link to be taken straight there. If you navigate  to the page manually, you’ll want to look for the Apps icon in the left column.
app_settingsHere, you can click the Edit link to review the permissions of any apps you have installed or simply click the ‘x’ to remove them.
edit_app
Here you can see what Facebook data the application has access to, the last time it accessed your data, and you can set privacy settings for the application in question. Notice there is also a “Remove app” link on this screen as well. If you find an app is too intrusive, then you can click this link to easily remove it from your account.
It is a good idea to check these settings from time to time. Application developers have been known to change required application permissions. Always be mindful of what data access a third party developer requests. Be especially suspicious of applications requesting the following:
  • Complete and total access to your Facebook account – An app requesting too many permissions is a big warning sign.
  • Access to Facebook Chat – You don’t want the app spamming malicious links via chat messages to your friends.
  • The right to manage your Pages or Events – It is a common ploy for scammers to create bogus pages and events to spread their messages virally across Facebook.
Keep this information in mind the next time you think about installing a Facebook application! One rogue application can impact a large number of innocent users, and you don’t want the infection traced back to you!
Read More

Friday 6 December 2013

// // Leave a Comment

Must Read If You Truly want to become a true hacker :-


1) Never trust sites that ask
you for money in return of
Hacking Softwares or who
claim to Hack Email Id’s in
return of money. All such
things are Scam . Nothing Works.

"2) There is NO DIRECT
SOFTWARE to Hack Facebook ,
Google , Yahoo or any other
big website. All the softwares
that claim to do so are scam.
They are just meant to take your money and in worse
cases, those softwares have
trojans or keyloggers in them.
As a result your account gets
hacked trying to hack others.

3) NEVER EVER use the
keyloggers or trojans you find
as freeware on internet.
Hackers are not fools. They
compile keyloggers and
trojans almost with any such software and when you install
them , you are already hacked
before even trying to hack
others.

4) You are never going to be a
good hacker without the
knowledge of programming
and scripting languages. When
you are going to use only
ready made softwares and would depend on them for
hacking anything then your
functionality would be limited
upto the functionality of the
software. When you are not
going to use your brain , just doing the copy paste thing,
then how can you even think
of being a good hacker.

5) If you are a good Hacker,
you already become a good
programmer , a good script
writer , a good web developer
and an excellent security
expert. Well any good Hacker will/should have good
knowledge of various aspects
and programming languages.
to do XSS (Cross Site
Scripting ) , PHP INJECTION , SQL
INJECTION , PHISHING , FOOTPRINTING etc… you will
have to be good at
programing and scripting. And
when you know the Various
loop holes , vulnerabilities and
security tips, you already become a Computer Security
Expert. So Never Ever Under estimate
the term Hacker. A Hacker Is
Not a person who just hacks
email id’s or servers but a True
Hacker is a Computer Genius
who the knowledge of computers more than anyone.
Read More
// // Leave a Comment

Top 10 Computer Mouse Tips & TricksCOMPUTER, TIPS AND TRICKS

Top 10 Computer Mouse Tips & TricksCOMPUTER, TIPS AND TRICKS

Computer Mouse
We all use Mouse while sitting on Computer but most of us don't take Full Advantage of the Computer Mouse. But don't worry now there are some Computer Mouse Tips and Secrets given below that will help you Get the Full Potential of your Computer Mouse and Increase your Overall Productivity while on the Computer.


So here are those Top 10 Computer Mouse Tips :

1) Shift Key and Mouse Click.
Computer Mouse - Left Click
Many Text Editors and Programs allow us to Highlight All or Portions of Text using the Shift Key and the Mouse.
For an example and giving it a try, place the Cursor at the Beginning of a Paragraph, Hold down the Shift Key and Click at the End of the Paragraph to Highlight the Full Paragraph.

2) Take Full Advantage of the Scroll Wheel.
Computer Mouse - Scroll Click
We all know that the Mouse Wheel ( Scroll ) is used to Scroll Up and Down on a Page. However, this Wheel can also do Much more like :

&gt;&gt; The Mouse Wheel can also be used as a Button. Pressing down on the Wheel will act like a Third Mouse ButtonThis can be used to Open a Web Page in a New Tab. Simply Click the Wheel on any Link and the Web Page will be Opened in New Tab.
Computer Mouse - Ctrl plus Scroll
&gt;&gt; We can quickly Zoom In and Out on a Web Page, Word Document, Excel Spreadsheet, etc. by Holding down the Ctrl Key and Scrolling Up to Zoom In and Scrolling down to Zoom Out.

&gt;&gt; We can move Forward and Backwards while Browsing the Internet by simply Holding down the Shift Key and Scrolling Up and Down. Scrolling down goes Back and Scrolling Up goes Forward.

3) Select with Double and Triple Click.
Computer Mouse - Double Click
We can Select any Word by Double Clicking on that Word and if you want to Highlight the Whole Paragraph, click the Mouse Button Three times on any Text in the Paragraph.

4) Take Full Advantage of Right Click.
Computer Mouse - Right Click
If you Right Click on any File Drag it while holding the Right Button of Mouse, when you let go you will be given the Option to Move or Copy that File. This saves you the Extra Step of having to Right Click where you want to Paste the Item ( File ).

5) Ctrl Key and Mouse Click.

&gt;&gt; We can also Open a Web Page in New Tab, while in a Browser by Pressing and Holding Ctrl Key while Clicking on any Link.. 
Computer Mouse - Ctrl plus Click
&gt;&gt; While holding down the Ctrl key we can Left Click to Select Multiple Objects or Highlight Multiple Sections of Text.

6) Use Mouse Side Buttons.
Computer Mouse - Side Buttons
Many New Computer Mice have Buttons on the Side of the Mouse. These Buttons can be Programmed to do Anything ( all possible Navigation ), however by default the Left Thumb Button can be used to go Back in a Web Browser or Windows Explorer. This makes Browsing the Internet more Enjoyable since you do not need to move the Mouse Cursor to the Browser Back Arrow Icon in order to go back a Page.

7) Use the Windows " Snap To " Feature.
Computer Mouse - Snap To Feature
This Feature if enabled will Automatically move your Mouse to Buttons that appear in a Dialog Box.
For example, if you Delete a File or Close a Window you may get a Prompt asking you if you are sure you want to perform the Task. With the Snap To Feature Enabled, the Mouse Cursor Automatically moves to the Ok buttonso all you will have to do is Click the Mouse Button if you Agree. This saves you the time of having to move the Mouse Cursor over to the Ok Button and then Click Ok.

To Enable the " Snap To " Feature follow these simple Steps :
&gt;&gt; Open Control Panel  &gt;&gt;  Mouse Properties  &gt;&gt;  Pointer Options  &gt;&gt;  Check the " Snap To " Check Box.

For more Productivity, we would suggest you to Modify some more Options available in Mouse Settings Like :
&gt;&gt;  Increasing the Motion Speed of Mouse Pointer can also help Increase your Productivity while using the Mouse.

8) Manage the Open Window with the Mouse.
Computer Mouse - Maximize or Minimize Window
Double Click the Top of Title Bar of any Window to Maximize or Minimize a Window. You can also Double Click at the Top Left Corner of the Window to Close that Window instead of Clicking on Red Cross Button i.e. for Closing Window.

9) Move the Mouse with your Keyboard.
Computer Mouse - Use via Keyboard Number Pad
Instead of using the Mouse, we can also Enable Windows to use the Number Pad as a Mouse.

10) Customize the Mouse.
Computer Mouse - Customized
If you have New Mouse with more than Two Buttons, then Installing the Included Mouse Software will allow you to Customize the Mouse even more.
For Example, if you don't use the Side Buttons to Move Back and Forth in a Web Browser then you can Change it to something you do more often, such as Switching between Open Windows or Opening any of your Folder or File
Read More
// // Leave a Comment

To open blocked sites at your School, Office,

Open blocked websites: http://bit.ly/IRjwuM

100% working tricks and hacks to open blocked sites at your School, Office, College and at your work places.
Access Facebook, Twitter, G+, Torrent and almost all the blocked sites http://bit.ly/IRjwuM
Read More
// // Leave a Comment

Cyber experts uncover 2 million stolen passwords to websites including Facebook, Google, Twitter and Yahoo

BOSTON: Security experts have uncovered a trove of some 2 million stolen passwords to websites including Facebook, Google, Twitter and Yahoo from Internet users across the globe.

Researchers with Trustwave's SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet."

The company told Reuters on Wednesday that it has reported its findings to the largest of more than 90,000 websites and Internet service providers whose customers' credentials it had found on the server.

The data includes more than 326,000 Facebook Inc accounts, some 60,000 Google Inc accounts, more than 59,000 Yahoo Inc accounts and nearly 22,000 Twitter Inc

accounts, according to SpiderLabs. Victims' were from the United States, Germany, Singapore and Thailand, among other countries.

Representatives for Facebook and Twitter said the companies have reset the passwords of affected users. A Google spokeswoman declined comment. Yahoo representatives could not be reached.

SpiderLabs said it has contacted authorities in the Netherlands and asked them to take down the Pony botnet server.

See more
Read More

Wednesday 4 December 2013

// // Leave a Comment

**Hack To Change Your IP Address**

**Hack To Change Your IP Address**
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "cmd" and hit ok You should now be at an
MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places"
on your desktop.
7. Click on "properties You should now be on a screen
with something titled "Local Area Connection", or
something close to that, and, if you have a network
hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click
"properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from
the list under the "General" tab
10. Click on "Use the following IP address" under the
"General" tab 11. Create an IP address (It doesn't matter
what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the
"Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection"
screen.
15. Right-click back on "Local Area Connection" and go to
properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address With a little practice,
you can easily get this process down to 15 seconds.



www.ipprotocol.in
Read More
// // Leave a Comment

How to Get Back the Start button in Windows 8

How to Get Back the Start button in Windows 8

Have you used Windows xp or Windows 7 and now you are Using Windows 8? if yes then very first thing you will miss in windows 8 is the Start button. for some good reason may be microsoft Decided to drop the idea of Start button in windows 8 like we had in earlier version. Many people kind of didn’t liked this change because they were addiced to the habbit of start button,
Get Back the Start button in Windows 8
Meanwhile there was a Recent upgrade to windows 8, ie windows 8.1 and the Start button is back. this article is  for windows 8 users who have not upgraded or can’t upgrade and wish to Get Back the Start button in Windows 8. So I have Come up with interesting Solution which I wish to share with you all which will help you to Get Back the Start button in Windows 8.

Steps to Get Back the Start button in Windows 8


I will Show you two Easy methods to Get Back the Start button in Windows 8.

1.Have a Windows Start Menu Toolbar:

Yes , you can have or create a start Menu on the toolbar, and this can be done by following below mentioned easy steps.
  • Firstly enable the Show hidden files option.
  • Now Create a New Folder, Now Copyand paste all Files, Docs, Setups or Programs that you Use Daily and Wish to have it within seconds in this new Folder.
  • Now  a right click on the Taskbar , Hover your mouse on Toolbar then select a new Toolbar from the Toolbar option.
And finally browse to the New Folder you Created and click select folder. With these above mentioned steps you will see a new start menu folder on the Right hand side of the task bar. this is not your start button like we had in windows 7 and xp but this is very close to it.

 2. Get Back the Start button in Windows 8 Using Softwares.

You can also have few more softwares or options by which start button or start menu can be installed with more features to be enjoyed, and without any defects/problems that you can face after the installation.
1.Classic shell : This is an outstanding free software that you can have to add up a start menu button to the Taskbar, and not only this but you are lucky enough to get a few more features that come with it.
2.ViStart 8 : This is another outstanding software which I personally recommend as I have personally tried it out in my Windows 8 PC and got a positive result from this with an amazing Start button on my taskbar which made it easy for me, and along with this I also got additional features which are cool like the ability to change the skin and much more.
3.Pokki : Up to now we have seen Couple softwares to Get Back the Start button in Windows 8 and trust me the best by far is Pokki, I can say that because many of my Friends are Using Pokki, they Never had any problem with it.
With this it Concludes my list of Softwares to Get Back the Start button in Windows 8, If you Know any other good quality Software then feel free to share with us in Comments.
Read More

Monday 2 December 2013

// // Leave a Comment

Amazon unveils futuristic mini-drone delivery plan

WASHINGTON: Amazon CEO Jeff Bezos revealed Sunday that his company is looking to the future with plans to use "octocopter" mini-drones to fly small packages to consumers in just 30 minutes.

The US retail giant's ambitious project still requires additional safety testing and federal approval, but Bezos estimated that Amazon "Prime Air" would be up and running within four to five years.

A demo video posted on the company's website showed the tiny robotic devices picking up packages in small yellow buckets from Amazon's fulfillment centers and then whizzing through the air to deliver the items to customers just 30 minutes after they made their purchase on Amazon.com.

"I know this looks like science fiction. It's not," Bezos told CBS television's "60 Minutes" program.



CEO Jeff Bezos revealed that Amazon plans to use "octocopter" mini-drones to fly small packages to consumers in just 30 minutes.
Read More

Saturday 30 November 2013

// // 1 comment

iPhone 6 Release Date,Full Specifications-whats new


                                     Apple has been busy this year as it has introduces two new Smartphones recently iPhone 5S and iPhone 5C. They also made available iOS 7 on Wednesday 18th. When iOS 7 was released to the public on Wednesday many users has faced issues with downloading and many had problems getting the new upgrade onto their iPhone 5 smartphones, they waited still thinking that Apple server would has been very busy indeed.
iphone 6 release date
As now IPhone 5s and 5c are available to public now where Apple can go with IPhone 6 iOs 8. The iPhone 6 has added more color than 5S and 5C with change in its design.

iPhone 6 Release Date

According to rumor It’s clear, given that the iPhone 5S was only released in September, that we’re not going to see the iPhone 6 until 2014 now. Apple usually has introduced its model every year with newly added features, Tim Cook has hinted at new products coming soon autumn launch, call from investors says that “Our teams are hard at work on some amazing new hardware, software, and services that we can’t wait to introduce this fall and throughout 2014,” Cook said.
As we know now, the products, Cook was talking about are being released on the 22nd October and include the iPad 5 and iPad Mini 2. But it seems to be just a rumor as we don`t know what`s the actual date.

iPhone 6 Screen

It is safe to assume that iPhone 6 will be having bigger screen, Most of the rumors are that the iPhone 6 will have a 4.8inch screen, which will make the phone`s screen to the size of Samsung S4 and HTC One. So to beat that old tradition of screen Apple would go to full HD or may go beyond that. It’s no wonder that Apple may also be considering the screen technology that uses Sharp IGZO (Indium Gallium Zinc Oxide) screen top of the list.
This new technology allows for screens that use less power and are considerably thinner. Rumors certainly picked up when the Sharp IGZO technology was demonstrated at CES 2013.

iPhone 6 Camera

For the iPhone 5S Apple used the physical size of 8-megapixel sensor means that each pixel gets lighter. In addition to it, they upgraded the lens from the f/2.4 model to the f/2.2 model, increasing low-light performance again. The camera is going to have couple of neat modes, even including a 10fps burst mode that goes on until the phone’s memory is full, and a 120fps slow-motion mode.

iPhone 6 Battery

As the size of screen increases compared to other older versions, the uses of battery increases, so it is hard to safe the battery life., So Apple has to plan further to increase the battery life of the device which can consume less power and give better performance which can pave a path to many buyers compared to ancestors of iPhone 6.

See More
Read More
// // Leave a Comment
Tutorial on How to Resize Images without Loosing its Quality.

Best Online and Desktop Tools Shared.

Do not miss it >
http://bt.ly/Jwt3f

Read More
// // Leave a Comment

Tutorial to FIND LOST SMARTPHONE using Google's Android Device Manager.

Tutorial to FIND LOST SMARTPHONE using Google's Android Device Manager.

You loose your phone at home and its on Silent? Make it Ring on Full Volume to Find it.

Helpfull to all, Check the Tutorial Here >
 http://mobogenie.com/android-manager/gdn.html?gclid=CNXB5-nGjLsCFYEl4godXnAAqA
 
Read More

Thursday 28 November 2013

// // Leave a Comment

Tutorial On How to CREATE WIN 7/8 BOOTABLE PENDRIVE.

Tutorial On How to CREATE WIN 7/8 BOOTABLE PENDRIVE.

Easy Step by Step Method (Noob Friendly)

Check Here > http://bit.ly/18r3IW5
Read More
// // Leave a Comment

Simple Hack/Script to Tag/Invite All your Friends to a Facebook Status in a single click :

Simple Hack/Script to Tag/Invite All your Friends to a Facebook Status in a single click :
1.Login to your Facebook Account on Google Chrome Browser
2.Post A Status.
3.Then click on the time stamp of the status, so that your status will open in a separate window.
4.Now press Ctrl + Shit + J
5.Now a windows will pop out below.
6.Switch to the Console Tab and paste the below code over there and hit Enter.Get code from here http://bit.ly/17WUKo1


7.Ignore if you get any error and just wait for a while.
8.Within few seconds all your friends must be tagged in the status.
9.That's all friends you are done.
10.Hope you enjoyed the trick.Get more likes for your status and expose your brand to more people with this simple trick.
Get the full tutorial here http://bit.ly/17WUKo1
Read More

Monday 25 November 2013

// // Leave a Comment

Hack and optimize your internet Speed

Hack and optimize your internet Speed


1.If you are windows xp tweak the unreserved bandwith
2.Use internet download manager to boost the download speed.

3.Optimizing TCP/IP settings with SG TCP Optimizer:

Download SG TCP Optimizer.This application doesn't require any installation ,you just have to double click it to run the application.
Now we wont touch any settings under General Settings Tab.Just choose optimal Settings Tab and click apply changes.
As soon as you click Apply Changes a windows will pop up....
More info here--> http://smarturl.it/boostmyinternet
Read More

Sunday 24 November 2013

// // Leave a Comment

Types of Errors.

Types of Errors.
INTERNET ERROR CODES...!!!
Error 400 - Bad request.
Error 401 - unauthorized request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/ DNS Lookup Fail/unknown host
Error 500-599 - Server Errors


See More
Read More
// // Leave a Comment

Facts about computers and IT Field.

Facts about computers and IT Field.
1.A byte means 8 bits and a nibblemeans 4 bits.
2.First harddisk available was of 5MB
3.Ethernet is the registered trademark 0f Xerox.
4.google uses over 10000 network computers to
crawl the web.
5.Google can be queried in 26 languages
6.The floopy disk was patented byallen shugart in
1946.
7.More than 80% of web pages are in english.
8. 88% percent web pages have very low traffic rate.
9. An average american is dependent on 250
computers.
10.Internet is most fastest growing platform for
advertisement.
11.About one third of CDs are pirated
12.About 76% softwares used in india are pirated.
13.Only 10% of the webpages are used by the
search engines
14."I am feeling Lucky" This button is used by
negligible no of people on net.
15.Bill gates & Paul Allen started a company called
Traf-O-Data to
monitor traffic flow.
16.The four largest software makers in the world are:
(a) Microsoft
(b) Adobe
(c) Sap
(d) Computer Associates.
17.Top Ten Supercomputers of Today's Generation
Arranged according to the speed:
1. Bluegene/ L DD2 Beta-system (IBM).
2. Columbia (NASA).
3. Earth Simulator (NEC).
4. MareNostrum(Bar celona Supercomputer Center).
5. Thunder (Lawrence Livermore National
Laboratory).
6. ASCI Q(Los Alamos National Laboratory).
7. System X(Virgina Tech).
8. Blugene/L DD1 Prototype(IBM).
9. eServer pSeries 655 cluster (Naval Oceanographic
Office).
10. Tungsten(National Center ForSupercomputing
Applications).
Read More
// // Leave a Comment

Key Logger is a tool to hack the face book account

Key Logger is a tool to hack the face book account..Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
www.softtrick.com 
Read More
// // Leave a Comment

How To Easily Make Money From Yovia :

How To Easily Make Money From Yovia :
www.yovia.com
Read More

Friday 22 November 2013

// // Leave a Comment

Whatsapp Tricks and hacks

Whatsapp Tricks and hacks: http://bit.ly/IieRkh
 

1.Lock whatsapp With Password
2.Disable last seen in Whatsapp
3.what if not Whatsapp?
4.Whatsapp on PC without Bluestacks and many more tricks and Hacks for whatsapp pc and mobile: http://bit.ly/19KCGHV
 

‪#‎ATB‬
Read More
// // Leave a Comment

Watch youtube videos without buffering

Watch youtube videos without buffering: http://smarturl.it/youtubebuffering


Go to Control Panel from the Start menu.
Click on Network Connections from the Control Panel choices.
Choose your connection from the Network Connections window.
Click Properties button.
Select Internet Protocol (TCP/IP) and click Properties.
Click the radio button Use the following DNS server addresses and type in OpenDNS addresses in the Preferred DNS server and Alternate DNS server fields.
208.67.222.222
208.67.220.220
For more info you can check http://smarturl.it/youtubebuffering





See More
Read More

Thursday 21 November 2013

// // Leave a Comment
Window 8 transformation pack available...
it help to change window 7 to window 8 with all features .....
Try it
Download by clicking on this image
 


Read More
// // Leave a Comment
The Best windows Activator ,Which Activates The Window 8 Operating System For Permanently...

If You have windows 8 as operating system and if it was not Activated.... This is the Right Choice to activate your operating system..Then this is the best choice to Activate your windows 8 operating system...

How To Do;-
  1. Extract The Downloaded File 


  • Open  The Folder  And Click the Run Setup ......                                                                     
     
                                                             
  •    Then Restart your computer ,your os will be activeted..                                                                        
                                                                     








For Download This File Click Below the image:-
Read More

Wednesday 20 November 2013

// // Leave a Comment
Wechat Hacked !
Must  read
www.wechat.co.in


Read More

Tuesday 19 November 2013

// // 2 comments

How to Hack facebook Account

How to Hack facebook Account

     









Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.

Here is a tutorial about phishing.>>
Step 1
First you must sign for a free webhosting service like www.byethost.com or www.t35.com  or www.000webhost.com  And register your subdomain.
after signing you will have a subdomain like www.yourname.byethost.com
Step 2
Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".
Step 3
Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.
Step 4
Now replace the index.php file in the "htdocs" of the "online file manager" with the file index.php of the phisher folder in your computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.
Step 5
Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim.
Step 6)
Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !

Personal Note:- The attacker must have a very good convincing power to hack the facebook password with this method. Please try this method carefully as now it is widely known and the target may soon guess the attacker's intentions. The target may report the fake site and you may get in trouble.

The facebook not allow to share your fake facebooksite on facebook. You can use Domain hiding system to share your fake facebook site. (Eg: http://www.dot.tk/)





  => Top 5 Ways to Protect Your Privacy Before Facebook Gets Hacked

Nowadays the only social networking site that has become popular among the younger generations is FACEBOOK. Almost 7% of the world’s population is on facebook. Along with numerous benefits it has it’s disadvantages too. The most common threat that an facebook user gets is his facebook account getting hacked by someone. We often get certain messages while we login to our facebook account that your account was being opened by an unauthorised person from an unknown place but we don’t take it seriously. Due to this small mistake you will pay a larger cost later in the future. it is very clear that this happens because due to our mistake that our privacy has been leaked to someone. So in order to protect your privacy of the facebook account here are some steps you should properly follow.

1. Change your name:

Don’t provide your real name while creating your Facebook account for the instance just use your nickname because if unfortunately your Facebook account gets hacked in future you would be in a situation to create a new account. Don’t be of the opinion that making a number of account is a crime because according to John Sileo the privacy expert of Facebook 80% of the people on Facebook have multiple Facebook accounts.

2. Stop geo-tagging your photos.

First let me tell you what is geo-tagging, it provides the information like the latitudes and longitudes of the photo taken and uploaded on the Facebook i.e. home ,school etc. if you are an iPhone user then just glance over for a second to your “settings”, go to “privacy” and turn off the location services for all the applications in the phone or just for an individual application like camera.

3. Lie about your age.

Girls might be pretty aware of this cause they never tell their exact age anywhere in this world. But seriously always steal your birth identity if not just try to change the year. I know it feels very happy to get birthday posts on your wall but believe me it’s for your safer side only.

4. Don’t store your credit card information on the site.

In the advanced versions of Facebook there are many games, applications etc, that require your credit information about your credit card number, it’s validity etc. But for your well being try not to provide them with certain information because they can use these things in other wrong processes.

5. Have some boundaries.

Have certain limits in life and in everything that you do in your life. Anything in excess is very dangerous. Have fun with Facebook but enjoy responsibly. Try to say “no” to the things that are wrong. When Facebook asks you questions about the photo that you have uploaded like who is in this photo, where the photo was taken ? Skip these questions. Do not upload address of your new house because for a thief it would just be a welcome invitation letter
Read More
// // Leave a Comment

Download and Install Android OS on PC :

Download and Install Android OS on PC :  
 www.pctoandroid.com
Read More
// // Leave a Comment

How Li-Ion charging works:

How Li-Ion charging works:
1. If you plug in the phone charger when the
phone's charge is a low percentage value, the phone
commences Fast charge. Fast charge means the
phone will quickly charge to 80% of battery.
2. Once the phone has charged till 80%, trickle
charge begins. Trickle charge provides very less
current. You may have noticed that charging slows
down post 80%, and charging from 90 to 100 seems
like forever. It is because the battery enters trickle
charge. This avoids overcharging and degradation of
battery life.
3. Every battery has a number of charge cycles after
which it will never hold 100% of capacity. This
usually happens after 300 to 500 charge cycles.
Some people may notice their phone never charges
above 80%. If that's the case, replace the battery
soon.
4. We usually leave the battery to charge overnight,
but that's a really bad habit and literally destroys the
battery in long run.
Consider a human, if you feed him with more food
than he can take, he'll surely get sick. The same
way, batteries get damaged when you provide more
charge than they can accommodate.
Read More

Monday 18 November 2013

// // Leave a Comment

Free E-book downloadable sites:-

Free E-book downloadable sites:-

1)Wowebook
2)ebooks-It
3)Free Computer Books
4)Many Books
5)Free Books Spot

If you want to learn something about hacking, cracking, programming, viruses etc. and not only, you search on Google or on Bing that eBook name. But its difficult maybe you forget name of that eBook or you don't know but you want to find C++ programming language eBook. For that make your search easy, in this post i share for you best websites for eBooks. Its more comfortable and easy to find any eBook you want. You can choose category or search on that website, and you will find a lot of eBooks you want.


See More 
Read More
// // Leave a Comment

Did you know???

Did you know???
Connecting your phone to a Pc through a USB
cable charges your phone's battery about 20
times faster than an ordinary charger
Read More
// // 1 comment

World's first 5G internet service

The world's first 5G internet service was rumoured to launch in 2020 at London. But recently, report leaks show that 5G will launch way before 2020. In fact, it may even launch in 2015!!!
Samsung is testing 5G internet in some of its smartphones!
5G is rumoured to provide a speed of 12GBps!!




See More

Read More

Sunday 17 November 2013

// // 1 comment

Top 10 Ethical Hackers in India

Top 10 Ethical Hackers in India
1. Ankit Fadia
2. Koushik Dutta
3. Vivek Ramchandran
4. Trishneet Arora
5. Sunny Vaghela
6. Rahul Tyagi
7. Falgun Rathod
8. Benild Joseph
9. Sai Satish
10. AseemJakhar


See More
Read More
// // Leave a Comment

Google Facts

According Google Today-
Around 1.6 million Sachin's Pic
Was
Downloaded From Google!!
.
&
.
.
.
According To Facebook India
Today-
Around 85 million Pics Of Sachin's
Were Being Uploaded On FB..

See More

Read More

Saturday 16 November 2013

// // Leave a Comment

10 sites to send free unlimted sms online

10 sites to send free unlimted sms online
: http://bit.ly/17XaJ5H
 
and control pc with your mobile: http://bit.ly/1j93PcZ
See More
Read More

Friday 15 November 2013

// // Leave a Comment

Do you know that 90% of the facebook accounts get hijacked either by answering question or by compromising the primary email address?
More info here http://smarturl.it/protectfacebook
 


How to Hide your Primary Email ID from Other:

1.Go to your Account Info.
2.In Contact Info Section click on Edit button.
3.Now if you are asked to enter your password enter your password and submit.
4.Then you can set the preference as you like to your primary email address.
5.Choose only me if you want to hide it from others.
Check more Facebook Security tips here http://smarturl.it/protectfacebook
 

Read More

Wednesday 13 November 2013

// // Leave a Comment

How to hack windows password without knowing the older passwrd..!!:)


It is possible to change Adminstrator password both in Win XP and Vista without knowing it. If you somehow manage to login as an Administrator then you can change the password without knowing it.

Here’s the Step-By-Step instructions

1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.

2. Select the option “Manage”.

3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded)

4. Double click “Local Users and Groups” option From “System Tools” tree.

5. Click the “Users” option.

6. Now you will see the list of users on the right side pane, such as Administrator, Guest etc.

7. Right click the “Administrator” and select the option “Set Password” option.

8. Now you will see a warning message, Click on proceed.

9. Now the system asks you for “New Password” and “Confirm Password” .

10. After entering the password click on “OK”. The password is changed. That’s It!..

 

 See More

Read More
// // Leave a Comment

Make ur Windows Genuine using notepad!!!!


1. Copy and Paste the following code in the Notepad.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi crosoft\WindowsNT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33, 93,f d
"LastWPAEventLogged"=hex:d5,07,05,00,06,00,07, 00,0 f,00,38,00,24,00,fd,02
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi crosoft\WindowsNT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"InstallDate"=dword:427cdd 95
"ProductId"="69831-640-1780577-45389"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00 ,36, 39,38,33,31,2d,36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00 ,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4 ,ee,62,4f,e6,64,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00 ,00,00,00,00,00,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00 ,94,a2,b3,ac
"LicenseInfo"=hex:9e,bf,09,d0,3a,76,a5,27,bb,f 2,da ,88,58,ce,58,e9,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42 ,0d,60,c0,1a,70,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3,17
2. Save the file with the .reg extension.
3. If you run the file means it will ask you the confirmation to add the value to your Registry.
4. Press Yes.
5. Reboot your System.
6. Start Downloading from Microsoft Site

Read More
// // Leave a Comment

HERE ARE BEST WEBSITES FOR DRIVERS.


1- www.driverzone. com
2- www.opendrivers .com
3- www.notebook-dr iver.com
4- www.notebookera .com
Note- First 2 websites are best for your laptop drivers
Read More
// // Leave a Comment

Check If Your computer was used in your absence?


Do you want to know whether your PC was used in your absence?
Just follow these simple steps:
=> Goto Run and type eventvwr.msc in the Run dialog box.
=> Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
=> For our purposes we want the System log. Click on “System” in the left-hand column for a list of events.
=> Look for a date and time when you weren’t home and your computer should have been off.
=> You can also use this log to see how long someone was on the computer.
=> Just look at the time the computer was turned on and off for that day.
You Are done
Read More
// // Leave a Comment

Someone has made your fake account….Don’t Worry…..Tracingfacebook user..


First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
When command prompt opens Type the following command and hit Enter.
netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.
The Next Step is to Trace that user using his IP address.
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
http:// www.ip-adress.co
 
m/ip_tracer/
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p option may be used to specify a subset of the default.
Read More