Sabtu, 25 Juni 2011

Make a free call any where in the world


Things that you will need

1. adobe flash player 9 or higher
2. Head phone with mic.

Note : you can make only one call using an ip in a Day. But it can be exceeded if you have dynamic IP like BSNL broadband then disconnect your internet connection and call again you will able to make another call.

now,
 open your browser and visit the following link :
www.evaphone.com
 then the screen is like as follow.





now enter the country code and phone number which you want to call.
then click on green button and then click on the under advertise then your call will be connected.





Jumat, 24 Juni 2011

How to get google adsense account

What is google adsense ?


Adsense is a web-based advertising program offered by google. It places ads directly on others websites , enabling them to earn money from the traffic of their sites. Many of ads offered are adsense pay per click ads. The Adsense pay per click ads work by giving site publishers money for each person who visits their site and clicks through on ad.

Google adsense is a grate way to make money online and provide you with a very good monthly income but there are of course many things that you need to know in order to be able to build a successful adsense site which continues to make you money even as you sleep by using the power of internet. Reading through the information on google's adsense website will help you to avoid mistakes that may get you rejected.


Google Adsense Account Approval Tricks


1) Use top level domain (TLD) i.e. www.example.com , not www.example.com/folder/ for applying an adsense account. If you have blog the apply using blogger or apply using flixya.

2)Your domain must have been registered and website should be up and running live for at least 2 months before you apply for adsense.


3) Google loves content-rich websites. so , try to write as much original and good quality content as you can.


4) Do not use fake name during adsense account application submission. Always use your real name.


5) You have to specify a real address in the application. so, write your actual physical address correctly and in proper format.


6) Use same personal information which you have used during domain registration as google team may verify it. so, you must provide accurate personal information with your application that matches the information on your domain registration.


7) Have good content both on quality and quantity.


8) Make sure you have good traffic at list 50 visits per day.


9) Make your site look professional.


10) Use google webmaster and analytics to optimize your website content to get most out of the search engines.

follow the post then you can easily get Google Adsense account.

Selasa, 21 Juni 2011

how to hack facebook account

Hey friends now i am posting a post about hacking the facebook account in easy way.

There are many ways to hack the facebook account like keylogger , facebook freezer tool and facebook hacker tools are used for facebook hacking account. But the above all are very difficult now the easiest way to hack facebook account is as follow.


The easiest way to hack facebook account is phishing .

You need one facebook fake page if you haven't facebook page click here to download
Now go to www.my3gb.com  and make your id by sign up.
after making the id login into the my3gb and go to my3gb's file manager and upload the facebook fake page.
now right click on the facebook fake page(where you have uploaded it) and copy that link.
and send to your victim.
when your victim logins using the link which you have sent then into the my3gb's file manager one file will created named facebook password which includes the facebook ID and PASSWORD of your victim.
i have hacked two facebook account using this trick.

Senin, 20 Juni 2011

how to enable registry disabled by administrator


Open the Notepad

and copy the bellow code and paste into the notepad.

 Windows Registry Editor Version 5.00
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    "DisableRegistryTools"=dword:00000000

now save it as "anything.reg" and dont forget to to select file type as all files while saving otherwise you will not been able to execute it
now close the file and double click on file then press ok
then you can access the registry.



Minggu, 19 Juni 2011

facebook hack to display your message

Now using this hack you can display a custom message on facebook and prank your friends that you have hacked this facebook page.
You can change the message and title whatever you want.
How to display your custom message and title on facebook:

1) open your browser
2) copy the bellow URL and paste in the address bar of web brower

https://www.facebook.com/connect/connect_to_node_error.php?title=MY TITLE&body=MY MESSAGE
3) Now change 'MY TITLE' with your title you want to display and 'MY MESSAGE' with your message and press enter



NOWlet my  title is cyber security and message is hacked by cyber security  then the URL will become something like this:

https://www.facebook.com/connect/connect_to_node_error.php?title=cyber security&body=hacked by cyber security
see this


enjoy and make your friends fool. 

Jumat, 17 Juni 2011

how to enable right click on sites/blog ?

Lots of web sites have disabled the right click function of the mouse button...
it disables ALL right-click functionality: copy, paste, open in new window.


It's easy to change, assuming your using IE:




Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.


You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

How to Boot Window Xp Fast ?

Follow the following steps

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Kamis, 16 Juni 2011

free download 1000 hacking tutorials 2011

Now free download 1000 hacking tutorials which includes all the stuffs of hacking , cracking and tips
its most useful.

its includes the most of hacking tricks and tips , e books of hacking , Phreaking and many more tutorials are available to download.
And security , remote shutdown , cmd tricks , windows tricks . networks tricks , dos tricks and many more things are available to download.
lots of other tutorials are available.
you can download it here

Sabtu, 11 Juni 2011

ANGRY BIRDS game for windows free download.

Free download angry birds for windows
Apple's popular game
enjoy and play the angry birds.


download link

http://www.ziddu.com/download/15327122/AngryBirds.rar.html

leave a comment.
thnx for the visit.

Transform XP To Mac OS X Leopard free download

Everyone wants that their OS should be look like MAC OS.

i have found one transformation pack for windows xp

that converts the windows xp into mac leopard os.

After installing this pack your windows xp is look like as given in the snapshot.

(1)

 (2)

 

Download link

http://www.ziddu.com/download/15325708/LeopardXP.exe.html 


watch a movie in paint

1 Start a movie in any player.

2 Then open Paint.

3 Now, in the player when the movie is being played, press "Print screen" button on your key board.

4 Now, Press Paste(ctrl+v) in Paint.

5 Leave the movie player open and don't minimize it.

6 Open Paint now and see the movie in the Paint..

Enjoy and Leave a comment...

Rabu, 08 Juni 2011

windows 7 activator free download.

Windows 7 is the awesome operating system of the Microsoft. But the thing is that they are just allowing this OS for 30 days only. So we need to install windows 7 activator. windows 7 activator will active your windows in 5 min. In the windows 7 there are many moe applications like games , snipping tool and much more ..Before installing the activator your windows 7 is as shown in the bellow figure which is in just trial version ! You can see in the bellow snapshot there are 23 days left for activation.


Now for converting your trial version of windows 7 in to genuine you need to download windows 7 activator ( download link provided at the end of the post). After downloading activator Open that rar file and just double click on windows 7 loader then press yes and wait for 2 min after that it will say you to restart the pc after restarting your PC your windows 7 will be genuine as shown in bellow figure. Now your windows 7 is fully activated.


you can download windows 7 activator Here

Senin, 06 Juni 2011

who is hacker?

 A hacker is someone who thinks differently than the rest. A hacker is a problem solver who creates a solution no one else has thought of before. Nothing is impossible to a hacker. There is always a solution, other people just haven’t thought of it yet.
Hackers don’t play by the rules. The rules exist to tell us what we can and can’t do, but nothing is impossible for a hacker. I guess no one ever told the Wright brothers it was impossible to fly. I guess no one ever told Thomas Edison it was impossible to create a light bulb. These people were all hackers in their own way, solving problems by thinking differently.
I’m going to be redefining hacking. Lets forget about Hacker vs. Cracker. Most websites you will find believe that Hackers are programmers and Crackers break through security systems.  Those who have copied that definition are obviously couldn’t think for themselves. As I said before being a hacker is a state of mind, how you use that intelligence another story. There are good and bad hackers just like there are good and bad doctors.
So where did the term hacker come from? The term hacker was originally given to furniture makers, back then they didn’t have nails. So they used an Axe to hack the wood together in a way that created furniture.

Create your own fake Page.

Now let’s learn how to create your very own fake login page.
{1} Open www.jotform.com and Sign Up.
{2} then Login there with your newly registered account.
{3} now click on ‘ Create your first form’.
{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
{6} Now Click on ‘Power Tool’ Option (In right hand side…)
{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)
{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.
{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.
I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
Now you can access you file on the net by just typing the url ofthe file.
And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.

How to disable”Turn Off Computer”button in XP?

Image Hosted by ImageShack.us
 You can disable the “Turn off Computer” button on the start menu and a common user will not “Turn Off, Restart and Stand By” a computer. Using registry editor, you can implement this task in all windows XP versions with minimum effort.
Follow the given steps to disable Turn off Computer” button on the start menu:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.
Image Hosted by ImageShack.us
Here locate the location to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Here in right side panel, right click to create a new DWORD value with the name NoClose.

Now assign number 1 in value data box and close the registry editor.
Image Hosted by ImageShack.us
Now close the registry editor and restart your computer after any changes to go into effect.
But next time, if you want to enable “Turn Off Computer” button on start menu then simply change the value of data box to 0 or delete NoClose DWORD item.

Minggu, 05 Juni 2011

how to hack ip address?

Now follow these steps to hack ip address. 
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online (online is necessary)
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website
Now you got the IP address right? Is it online? To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address.

Rabu, 01 Juni 2011

Malware increases by 46% in only one year



There is a steady growth of threats to mobile platforms, according to a new McAfee report.

The number of pieces of new mobile malware in 2010 increased by 46 percent compared with 2009. The report also uncovered 20 million new pieces of malware in 2010, equating to nearly 55,000 new malware threats every day.

Of the almost 55 million total pieces of malware McAfee Labs has identified, 36 percent was created in 2010. Concurrently, spam accounted for 80 percent of total email traffic in Q4 2010, the lowest point since the first quarter of 2007.

Threats to mobile platforms are not new. However, as more consumers use mobile devices and tablets in their daily lives and at work, cybercriminals have taken note. During the last several years, McAfee Labs has seen a steady growth in the number of threats to mobile devices.

Some of the most interesting mobile threats of Q4 2010 were SymbOS/Zitmo.A and Android/Geinimi. SymbOS/Zitmo.A was a high-profile threat that struck early in the quarter. The creators of the Zeus botnet repurposed an old version of a commercial spyware package.

Android/Geinimi, a Trojan inserted into legitimate mobile applications and games for the Android platform, was one of the most important threats of the quarter.

With the adoption of so many new mobile platforms, combined with the lack of security awareness and mobile safeguards, McAfee Labs expects cybercriminals to use botnet infections to target mobile devices.

In Q4 2010, Cutwail was dethroned as the global leader in botnet activity, with Rustock the most prevalent in many parts of the world, and Bobax closely trailing behind the two.

The onslaught of malware seems to have no end, and the proliferation of both handled and IP-enabled devices’ affect on this growth remains to be seen. The top malware threats in Q4 2010 were very different in various geographies, due in part to the larger trend that threats now tend to match the types of users, habits and events that are specific to a region.

Favorites for cybercriminals worldwide this quarter consisted of AutoRun malware (Generic!atr), banking Trojans and downloaders (PWS or Generic.dx), as well as web-based exploits (StartPage and Exploit-MS04-028).

Spam hitting its lowest levels in years can be attributed to a “transition period,” with several botnets going dormant during a time of year when spam volumes are usually on an upward path.

In Q4, McAfee Labs learned the Bredolab botnet had been closed along with parts of the Zeus botnet. Around the Christmas holiday, spam from the Rustock, Lethic, and Xarvester botnets all disappeared, while the spam leaders this quarter were the Bobax and Grum botnets.

As more users access the Internet from an ever-expanding pool of devices—computer, tablet, smartphone or Internet TV—web-based threats will continue to grow in size and sophistication. In Q4, some of the most active threats included Zeus-Murofet, Conficker and Koobface, and the number of potentially malicious domains grew at a rapid pace.

Phishing URLs in the form of the IRS, gift cards, rewards accounts, and social networking accounts were also among the most popular. McAfee Labs found that within the top 100 results of the top daily search terms, 51 percent led to malicious sites, and on average each of these poisoned results pages contained more than five malicious links.

McAfee Labs expects attacks using the techniques of search-engine abuse and trend abuse to focus more specifically on new types of devices in 2011.

In 2009, McAfee Labs predicted that vulnerabilities in Adobe product would become the clear choice of malware authors and cybercriminals for distribution malware and compromising systems and networks. This prediction has come true. Throughout 2010 malware developers have heavily exploited weaknesses in both Flash and especially PDF technologies.

McAfee Labs databases reveal that malicious PDFs targeting Adobe Acrobat topped the number of unique samples by a wide margin, making them the favorite target of client-side exploitation. McAfee Labs is certain that the “Adobe” trend will continue this year, as more mobile devices and non-Microsoft operating systems support various Adobe technologies.