WELCOME Learn Hacking web site

With our help approve your genuine adsense account within 4 hours only. We will Help you to get maximum revenue from your website blog,wordpress .ect show contact me www.fb.com/mayur.khokhar1

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Wednesday 31 October 2012

eBooks for Ethical Hackers

eBooks for Ethical Hackers


We welcome all Security Researchers/Ethical Hackers for contributing in our ebook.   You can submit your article through our Contact Us form.

Benefit for Website owners:
Your link will placed in the Authors page of ebook. 


ebook First Edition:

Password to open the zip file:    eHackingNews

Download

Download youtube Video By using VLC Media player | by hackingtrick

Download youtube Video By using VLC Media player | by hackingtrick


friend 's Today i am share A unique trick youtube to download video By using VLC Media Player  and your browser.
first --> open your youtube on your browser then open your video And copy URL.
First-->Run your vlc then  click Media->open network stream..



Tuesday 30 October 2012

Facebook Blaster Pro

Facebook Blaster Pro


Facebook Blaster Pro working version v7.2.0

FaceBook Blaster Pro is the internets #1 Facebook friend adder
marketing software tool.


Facebook Blaster Pro can run your marketing efforts on autopilot
because automation is key to your success.

Benefits:
+ Internet marketers are experiencing a gold rush of web 3.0 FREE advertising to highly targeted leads on the fastest growing social network "Facebook".
+ More Time ~ Spend time doing what you want because your business runs on autopilot.
+ More Money ~ Because your business will be automated, you will be free to focus on marketing, and expansion.
+ Freedom ~ Because your business is driven by automated software, you can do what you want, when you want, when you get ready.

Features:
+ Auto Mass Friend Requests
+ Auto Mass Friend Messages
+ Auto Mass Friend Wall Poster
+ Auto Mass Friend Poker
+ Auto Mass Amber Alerts
+ Auto Mass Captcha Bypass

Wirless Hacking

-: Wireless Hacking :-


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Wirless Hacking

-: Wireless Hacking :-


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Network hacking


-: Network Hacking :-


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in



Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Download Free Android Security Software Avast

Download Free Android Security Software Avast Antivirus

 by:mayur khokhar




There is absolutely no doubt that Avast is one of the most famous Antivirus vendor, well known for it's amazing features. Due to recent rise in malware attacks on Android, Lots of different Antivirus have moved their attention towards developing security mechanisms for Android. Same is the case with Avast. Avast has recently launched a Android Antivirus which you can easily use for free.

All About Keyloggers

All About Keyloggers - The Complete FAQ

 by:mayur khokhar softwere enginier


A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus you can see how dangerous a keylogger can be.
Types of Keylogger

There are two types of Keyloggers:

remote pc

Remote pc spyware and hacking softwares




1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10



SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!
SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall
For more information on this program and download details visit the following link
SniperSpy


remote pc

Remote pc spyware and hacking softwares




1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10



SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!
SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall
For more information on this program and download details visit the following link
SniperSpy


Monday 29 October 2012

DAnCiNG LItE

Keyboard Dancing Led Light Trick

BY:MAyur khOKHAR
?

                 Today i will be showing you an interesting trick which will let your keyboard led light to dance. Basicly we will be creating a vbscript to make caps lock, num lock and scroll lock to perform this trick. So lets get started.

     How to do that ?
       1. Open Notepad and copy below codes into it.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
       
       2. Then save this file as led.vbs (.vbs is must)
       3. Open your save file and see your keyboard led blinking like disco lights.


     How to disable blinking Led ?
       1. First open Task Manager [ctrl+alt+del ]
       2. Then Go to process tab.
       3. Select wscript.exe 
       4. Click on End process.

facebook magic any name profile

How To Update Facebook Status In Blue Text By Dailyhackingtips | Latest FaceBook Magic Tricks

Facebook Blue text status update is an extension of magic trick.It uses the same concept of Profile ID’s.However the only limitation of Blue colored status tips is that you status will be in the form of link and it will point to the the profile ID used in the status.
If you have changed your profile id into username then you can find it by clicking here.

Tips to Update Facebook Status in Blue Text

  • First Login to your Facebook Account
  • In the Status Update field copy/paste the following code
@@[0:[285787824769112:1: Your Text Here]]
@[285787824769112:]
Replace Your Text Here with your status update text.


  • Now just click on Post button your status will be updated as clickable blue text.

Note By Dailyhackingtips: Remember 285787824769112 is the ID number of our Fan Page you can also replace this ID number with your profile ID.

Alternative Method To Update Facebook Status in Blue Color

 Contributed by Kunal Meena

You can also use the following Code:
@[1: ]@@[1:[0:1: Type Here]]
This code is more efficient as it doesn’t require Profile Id instead it automatically points to your own Facebook profile

blank ststus facebook

Paste blank Status on Facebook


by :mayur khokhar softwere enginier


       Today i will show you how to publish single line or multiple line blank status on facebook. You can also use this method in facebook comments. So lets get started.

   For single line Blank Status

  • Copy below codes into your status
@[0:0: ]
  • Note:- the text is like @[0:0:space]
  • Dont write space where i have writen space rather press spacebar.

   For MultiLine Blank Status :

  • Paste as shown below in your staus.
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
  • Note there is space after 0:
  
  Another method

  • Paste below codes into facebook status
@[2:2: ]
  • Done ! subscribe below for such great posts.

ip hide

Real Hide Ip Free Crack Software 2011 Version By Dailyhackingtips | How To Hide Real Ip adress ?

  • Hello Friend Does anyone know how to hide Real IP address ? if you don't know then don't worry bcz today i learn you how can you hide ur real ip adress ..i hope  u really enjoy it so now  guys follow The below steps And do this easily...
  • Hide Your Real IP Address
    Be assigned fake IP addresses from different countries to conceal your real IP.
  • Anonymous Web Surfing
    Surf anonymously
    with fake IP, whenever you want to.
  • Protect Your Identity Against Hackers
    Protect you from hackers and identity thieves who will be tricked by your fake IP.
  • Un-ban Yourself from Forums or Restricted Websites
    Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
  • Prevent Websites from Tracking Your Online Activities
    Hide your real IP when you are surfing the Internet to prevent you from being tracked by website
  • Downlad link :- CLICK HERE

blank ststus facebook

Paste blank Status on Facebook


by :mayur khokhar softwere enginier


       Today i will show you how to publish single line or multiple line blank status on facebook. You can also use this method in facebook comments. So lets get started.

   For single line Blank Status

  • Copy below codes into your status
@[0:0: ]
  • Note:- the text is like @[0:0:space]
  • Dont write space where i have writen space rather press spacebar.

   For MultiLine Blank Status :

  • Paste as shown below in your staus.
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
  • Note there is space after 0:
  
  Another method

  • Paste below codes into facebook status
@[2:2: ]
  • Done ! subscribe below for such great posts.

How to block unblock websites ?

How to block unblock websites ?


by: khokhar mayur

  • Go to Start and then Run.
  • Type in this C:\WINDOWS\system32\drivers\etc
  • Now you will see file name Host open that in Notepad.
  • Below "127.0.0.1 localhost" add IP address of site to be blocked.
  • To unblock any site just reversed the process.
     
      EXAMPLE
     127.0.0.1 localhost
     69.171.224.14    (This will block Facebook)
     NOTE: For each site you block just add "1" to the IP (127.0.0.1)

Free Rs 100 Recharge Instantly

How To Get Free Rs 100 Recharge Instantly within Two Hours By Dailyhackingtips | Free Recharge Tricks 2012 | EmbeePay Application

I have been using facebook since past 4-5 years, and it involves my good as well as bad experiences. Good ones are about my friends & family and the bad ones are facebook’s spammy apps. yes there are many so called 21 questions, lucky day, mood app & craps.
even you might have been fed up with these apps.

I have also heard about EmbeePay App that it gives free recharge for completing offers. Initially i had ignored it as another spammed app. but today i just thought to try it and review it on my website & what i found was really amazing. I hardly spent 15-30 minutes over my slow bsnl connection to register and complete offers. and waited 1-2 hours to redeem points. And finally got rs 100 recharge.

Free Rs 100 Recharge Instantly

How To Get Free Rs 100 Recharge Instantly within Two Hours By Dailyhackingtips | Free Recharge Tricks 2012 | EmbeePay Application

I have been using facebook since past 4-5 years, and it involves my good as well as bad experiences. Good ones are about my friends & family and the bad ones are facebook’s spammy apps. yes there are many so called 21 questions, lucky day, mood app & craps.
even you might have been fed up with these apps.

I have also heard about EmbeePay App that it gives free recharge for completing offers. Initially i had ignored it as another spammed app. but today i just thought to try it and review it on my website & what i found was really amazing. I hardly spent 15-30 minutes over my slow bsnl connection to register and complete offers. and waited 1-2 hours to redeem points. And finally got rs 100 recharge.

Adding background images to windows drives

Adding background images to windows drives

by: mayur khokhar

Isn't it cool to have great wallpaper for your desktop but it might be more fun to have amazing background images for your drives. Drives Background Image is a Windows freeware application that allows you to set a wallpaper for each disk drive on your computer. This program is very easy to use you only need to select wallpaper for your background, it also provide option to change icons of your drives, changing text color and it provide instant preview of your selected settings. But  keep in mind that Windows 7 users need administrator privileges while running this program, as the application attempts to modify the configuration of the local hard drives. Its pretty nice program for window customization and every one  should try this tool. Follow below steps to download and learn to use this program.


   Features of the program:

  • Autodetect Available Drives
  • Set Background To Multiple Drives
  • Remove Background From Multiple Drives
  • Set Icons To Multiple Drives
  • Remove Icon From Multiple Drives
  • Auto Recover Default Icons
  •  Events Log
  • Drive Preview
  • Icon Preview
  • Easy Clean GUI

Trick to find facebook Profile ID


Trick to find facebook Profile ID

by:mayur khokhar softwere enginier



               In my previous post i have posted about Facebook status update trick in which we use profile id, but what if  person got username. So this is the trick which will let you get profile id of any person who got custom username. Check below image and see how URLof  facebook profile looks before and after custom username.

new facebook chat trick

New facebook chat trick

by:mayur khokhar



          Facebook has recently made changes to its chat features. Now we can use profile images in chat. You can even type anything in colour using a simple trick. You just need to know how to get facebook profile id which you will learn by reading this article Trick to find facebook profile id. Below are codes of A-Z and guide on how to use them in chat.


       1. How to use facebook profile images in chat ?
  • To use profile images in chat Enter this ==> [[username]]
  • In place of username enter username of person whose image you want to show in chat. 
  • If u will enter c00lhacks this will show image of my page. 

       2. Codes of A-Z for Facebook chat.

  • Below are codes of A-Z which you can use in facebook chat. You can create your on words with this codes. I will demonstrate how to do that .
[[107015582669715]]  = A
[[116067591741123]]  = B
[[115602405121532]]  = C
[[112542438763744]]  = D
[[115430438474268]]  = E
[[109225112442557]]  = F
[[111532845537326]]  = G
[[111356865552629]]  = H
[[109294689102123]]  = I
[[126362660720793]]  = J
[[116651741681944]]  = K
[[115807951764667]]  = L
[[106596672714242]]  = M
[[108634132504932]]  = N
[[116564658357124]]  = O
[[111669128857397]]  = P
[[107061805996548]]  = Q
[[106699962703083]]  = R
[[115927268419031]]  = S
[[112669162092780]]  = T
[[108983579135532]]  = U
[[107023745999320]]  = V
[[106678406038354]]  = W
[[116740548336581]]  = X
[[112416755444217]]  = Y
[[165724910215]]        = Z
       
      3. How to use this codes ?
  • First think wat word you want to create then pick up codes of that alphabate from above codes
  • Let us create hi . So pick up codes of H and I .
  • After that enter this in chat box  [[111356865552629]]  [[109294689102123]] 
  • Make sure there is space in between any two codes or else it will not work.
     
      4. Some Cool Facebook tricks.
  • Below are two codes to show Happy New year you can use any one of them
[[124641767652266]] [[124642810985495]] [[124643044318805]] [[124643044318805]] [[124643487652094]] [[124642300985546]] [[124644090985367]] [[124644404318669]] [[124644567651986]] [[124642300985546]] [[124643487652094]] [[124644404318669]] [[124642810985495]] [[124645367651906]] [[124642300985546]] [[124645977651845]] [[124646247651818]] [[124646574318452]] [[124645977651845]] [[124642300985546]]

OR

[[337992182896839]] [[225777904163650]] [[244015585667152]] [[244015585667152]] [[319152701438185]] [[188142511282558]] [[319977728035866]] [[316759491692170]] [[139287272851910]] [[188142511282558]] [[319152701438185]] [[316759491692170]] [[225777904163650]] [[337598512918963]] [[188142511282558]] [[141281852650929]] [[268263169900550]] [[191790684249921]] [[141281852650929]]

  • Enter below codes to show Cool Hacking Tricks
[[115602405121532]] [[116564658357124]] [[116564658357124]] [[115807951764667]]    [[111356865552629]] [[107015582669715]] [[115602405121532]] [[116651741681944]] [[109294689102123]] [[108634132504932]] [[111532845537326]]     [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]] [[115927268419031]]
  • This way you can create your own words your name .
  • Hope you like it subscribe below for such more tutorials and feel free to leave comments.

Monday 15 October 2012

how to open block site india

by mayur khokhar

How To Open And Access Blocked Sites In India

Airtel And Reliance Internet Service Providers Blocked Some Torrent And Other Sites In India Since 16th May. They Blocked Majority Of Popular Torrent Sites And Other Popular Sites Which Are Leading Sites And Has Many Visitors From India.
The Reason Behind This Sites Blocked Is A Court Ban, Following John Doe Order Taken By Copyright Labs, Chennai To Prevent Piracy Of Tamil Films : Dhammu (Tamil) and 3 (Telugu).
Upon Visiting Any Of Website Lister Below Airtel Or Reliance Costumers Get Any Of Following Message “Access to this site has been blocked as per Court Orders” Or ”This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications”. This Ban Seems To Region Specific As Some Users Are Able To Access This Blocked Sites In India From The Mentioned ISP’s.
Access Blocked Sites
List Of The Sites Blocked In India
Vimeo.com
Dailymotion.com
Xmarks.com
Pastebin.com
Torrent Sites :
Isohunt.com
Thepiratebay.org | Thepiratebay.se
Torrentz.eu
Kat.ph
Torlock.com
Kickasstorrents.com
Extratorrent.com
Torrentfunk.com
Fenopy.eu
And Many More…
How To Open And Access Blocked Sites :
Many People Uses Proxies And VPN’s To Access This Sites. But It’s Not The Easy Option Nor Suitable For Everyone.
So Here Are Simple Hack To Access This Sites Easily.
By Placing https Instead Of http You Can Access Any Of The Blocked Sites.
As Example :
Use https://vimeo.com Instead Of http://vimeo.com
https://xmarks.com
https://isohunt.com
https://kat.ph
https://torrentz.eu
https://thepiratebay.se

facebook sucurity user phone number

Security flaw in Facebook exposes user phone numbers

Suriya Prakash, an Indian Security Researcher has discovered a serious flaw in the facebook that allows scammers to get phone numbers of millions of Facebook's users.

If you are one of those person who say proudly i have made my number as private so i am safe, then you must read this news before shouting.

Usually, most of users change the privacy settings in the "Contact info" section in order to hide their mobile numbers from others but they are fail to realize that there is another option that expose their numbers.

In the "How You Connect" section , there is an option for "Who can look you up using the email address or phone number you provided?". By default, it is set to "Everyone".


This allows people to find the Facebook profile by entering phone numbers.  A legitimate users will use this feature to find their friends in the Facebook.  But Cyber Criminals can exploit this feature to get the phone number and corresponding username.

According to researcher, a simple brute-force script can exploit this feature and save phone numbers along with username.  But "Rate limiting on finding users" can prevent this brute-force attack.

Unfortunately, the mobile version of Faebook fails to do that. To demonstrate the bug, he run the script and extract number of phone numbers with username. He also published few extracted information.

He claimed that a large botnet with better script can get the full list of username and phone numbers.

The expert says that he has reached out to Facebook more than five times and provided them with all the details of the exploit in an attempt to get the flaw fixed, but since they haven't acknowledged the existence of the bug he decided to make everything public.

"So to protect yourself against this, change your settings to “My friends” and ask Facebook to provide an “Only me option” and make it such that it is the default setting for all users!." Researcher concluded in his post.

wifi hack

wifi 
Wireless Networks are those in which the interconnection between devices is established without using wires. The nodes communicate using radio waves. The wireless adapter in a computer translates data in radio signals and transmit it. The wireless router receives the radio signals, decode it and sends the data to internet. Of course this process also works in reverse manner.
A wireless network is usually called as Wifi or WLan. The main advantages of Wireless Networks are that users are not bound to areas to plug into a Wall jack to connect to network and also it reduces the cost of cable used in Wired Networks.

The main disadvantage apart from network performance is lack of security. The wireless networks can be
easily compromised if they are not properly configured.


Basic Terminology 






Service Set Identifier (SSID) :It is an alphanumeric string that differentiates the wireless networks .It can be
maximum of 32bit. There can be more than one network in a certain range or on a same channel, SSID 
differentiates one from another. Simply it is the name of a network. 

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****