Tuesday, November 24, 2015

Removing Shortcut virus from any storage media


OOOhhhh!! most common problem now a days faced by every computer user.
Now a day’s Pen drives and Memory cards are the most used devices to transfer data such as movies , songs , documents etc but often  storage devices are infected by shortcut virus. If you connect your infected Pen drive to your system it will show files and folders having shortcuts. And in case you open the shortcut fie or folder it would infect your whole system badly.
This post will help you to remove shortcut virus from pendrive/USB and Memory card and recover the files.  To remove the shortcut virus use the following steps.
Do not open the shortcut file or folder otherwise the virus could infect your system.

Tuesday, November 17, 2015

#ParisAttacks — Anonymous declares War against ISIS: 'We will Hunt you Down!'

ParisAttacks-anonymous-isis
Where every one is expressing his views and giving their negative feedback against ISIS ,  Following the bloody terror attacks in Paris where over 130 people were killed, the hacktivist collective Anonymous has declared total war against the Islamic State (IS, formerly ISIS/ISIL).

Anonymous released a video message, posted in French, on YouTube Sunday announcing the beginning of#OpParis, a coordinated campaign to hunt down ISIS's social media channels and every single supporter of the jihadist group online.
The combat mission #OpParis was announced as revenge for the recent ISIS terror attacks that took place in Paris on Friday, November 13, 2015.

Anonymous to ISIS: 'We will Hunt you Down!'


Behind its signature Guy Fawkes mask, the group’s spokesperson speaking in French said, "Anonymous from all over the world will hunt you down. Expect massive cyber attacks. War is declared. Get prepared."
"You should know that we will find you, and we will not let you go. We will launch the biggest operation ever against you," the Anonymous spokesperson added. "The French people are stronger than you and will come out of this atrocity even stronger."
Under the #OpISIS online campaign, Anonymous members have been defending French cyber-borders following the Charlie Hebdo massacre in January. In #OpISIS, the group hacked, defaced, unmasked, and reported thousands of ISIS Twitter accounts.

Now, expect the same thing to happen again. In a separate tweet, the group posted a video message saying:
"We are upping our game, you will now be hit by major cyber attacks, I will be speaking to all the most prominent #OpIceISIS teams and supporters such as @TheBinarySec, @CtrlSec, @OpIceISIS and we will work together to take down all ISIS cyber communications and your accounts, haha good luck with keeping them."

More than 1000 ISIS Twitter Accounts Leaked


More interestingly, the group has allegedly leaked a list of almost 1000 ISIS Twitter accounts in #OpParis.
The social network giant Facebook on Friday the 13th deleted an Anonymous group page, which has been exposing and reporting social media accounts linked to pro-ISIS, as well as banned all its administrators, without giving any prior warning.

The company said that the existence of the group was a "violation of Facebook Terms of Service and Community Standards."

Friday, November 13, 2015

How to Regrow Hair on Bald Head – Powerful Natural Solutions

Excessive hair loss causes bald patches on your head, receding hairline and sometimes complete baldness.It can be deeply distressing and can make your feel awkward.It can negatively impact one’s self-esteem, appearance, youth, and vitality.
Hectic work life, poor lifestyle, use of hair styling methods and gels, hair colors, lack of nutrition, hormonal imbalance and improper care and attention towards the hair are some of the major factors contribute to baldness.However, there are a few natural cures and treatments to tackle all sorts of hair problems and help regrow hair on bald head or on a bald patch naturally.Each of these remedies that have been shared below are personally tested by me.In the below image, if you look at my front hairline, you can see a big difference.

Who Viewed your FB profile



Everyone likes to know who has visited their Facebook profile.Whether the person maybe a boy or a girl, they tend to have a desire to find out who has visited their Facebook profile as they are filled with these common questions- “Whether my crush checks my profile?” , “Which girl/Boy always views my profile?” and so on… But i have seen many people trying to use 3rd party software which produce appropriate results are just spams.  You can’t determine who exactly is looking at your profile on a regular basis, you can determine who you interact with the most and who Facebook thinks your closest friends are. If you find someone in the listthat you don’t interact with them often, they may be expressing interest in your status updates (with likes, comments, or views). Follow these simple steps and you are done.

How to hack WhatsApp account???

WhatsApp is currently one of the most secure messaging services purely because it works with a particular phone number and requires a certain code. In my today’s article I am going to describe a few methods to hack WhatsApp account. Yes guys, it’s no more a myth. You can actually get access to someone else’s WhatsApp account. If you always wanted to know what your boyfriend/husband or girlfriend/wife or friend talks to on WhatsApp then you are at the right place. There are loads of other websites that claim they can hack WhatsApp account, all of them are false. None of those tricks work and actually it is nothing but just a waste of time. The methods that I am going to depict will surely help you in getting access of someone else’s whatsApp account. So people, lets get started now.

hack-whatsapp-account

Compress 1 GB File into 10 MB Using KGB Archiver


Imagine that situation when your PC’s hard disk is full and want to store more files but don’t want to delete a single file from your hard disk , then what to do? In this situation all you have to do just compress all big files. Not only this reason there are several reasons when we need to compress the big files. Actually, compressing a file means decrease the size of a file without losing a single system file from it. So if you faced problem with your big sized files and want to compress it in small size but don;’t know how then read this article because today in this article we are going to show you how to compress 1 GB files into 10 MB using KGB archiver.
There are hundreds of software’s are on internet, through which you can compress the files and decrease their size but majorities are fake or had a virus on it. One of them is WinRAR, this tool can compress our file by 10% and it will decrease the size of our files by 10% (Maximum). So in this case KGB archiver is the best option to compress any big file because this tool can compress any file up to 90%.

8 Common Programming Mistakes

Here is a List of some common programming mistakes which are mainly faced by the beginners.

1. Undeclared Variables: Before compiling the program or even writing the program we should carefully monitor that the variables we're using are already declared or not. The Compiler didn't understand the variables itself. we have to declare them before compiling
.

Sunday, October 25, 2015

Top Five Best Operating Systems

1.Microsoft Windows 7
Windows 7 is the best OS from Microsoft I have ever experienced... 
Easy to install... Crash free... Fabulous Graphics Support for HQ Games.. And more...
 
Windows Vista is the worst OS from Microsoft...
Very simple to install and better UI also best security.
Very good themes.
Less virus detector... And fabulous display... Maximum features And many more
Super and fast loading

Sunday, October 4, 2015

HACK FACEBOOK BY COOKIE STEALING


ENJOy..
Three days ago I finished the series on Gmail Session Hijacking and Cookie Stealing , due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post Facebook Hacking Made Easy With Firesheep
In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to hack your facebook account, Before reading this tutorial I would recommend you to part1, part2 and part 3 of my Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here.
Gmail Cookie Stealing And Session Hijacking Part 1
Gmail Cookie Stealing And Session Hijacking Part 2
Gmail Cookie Stealing And Session Hijacking Part 3
Facebook Authentication Cookies
The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
How To Steal Facebook Session Cookies And Hijack An Account?
An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.
If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.
In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.
Step 1 - First of all download wireshark from the official website and install it.
Step 2 - Next open up wireshark click on analyze and then click on interfaces.
Step 3 - Next choose the appropriate interface and click on start.
Step 4 - Continue sniffing for around 10 minutes.
Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
Step 6 - Next set the filter to http.cookie contains “datr” at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.
Step 7 - Next right click on it and goto Copy - Bytes - Printable Text only.
Step 7 - Next right click on it and goto Copy - Bytes - Printable Text only.
Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.
Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.
Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.
Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.
remember me in prayers!!!
Usman Nadeem Rai

Monday, March 24, 2014

پی ٹی سی ایل نے تمام ڈی ایس ایل کنیکشن 4ایم بی پر اپ گریڈ کر دئیے


پی ٹی سی ایل نے تمام ڈی ایس ایل کنیکشن 4ایم بی پر اپ گریڈ کر دئیے
پی ٹی سی ایل کے اعلامیہ کے مطابق تمام 1اور 2ایم بی کنیکنشز کو 4ایم بی پر فوری طور پر اپ گریڈ کر دیا گیا ہے

پی ٹی سی ایل نے اپنے صارفین کو بہترین اور تیز ترین انٹرنیٹ سروسز فراہم کرنے کیلئے احسن اقدام اٹھاتے ہوئے تمام 1ایم بی (جس میں سٹوڈنٹ پیکج بھی شامل ہے) اور 2ایم بی کے تمام ڈی ایس ایل کنیکشنز کو4ایم بی پر بغیر کسی اضافی چارجز کے اپ گریڈ کر دیا ہے۔ اور یہ اطلاق فوری طور پر ہو چکا ہے۔
یہ اپ گریڈ ایک خاص مدت کیلئے کیا گیا ہے ، لیکن حتمی تاریخ کا اعلان پی ٹی سی ایل کرنا بھول گیاہے ۔۔۔ جس سے صارفین یہ جاننے سے قاصر ہیں کہ آخر یہ خصوصی آفر کب تک لاگو ہوگی، اور کب انکے بل میں خود بخود 4ایم بی پیکج کے چارجز شامل کر دئیے جائیں گے۔
جیسے جیسے تھری جی اور فور جی کی نیلامی قریب آرہی ہے پی ٹی سی ایل کی پریشانی اور بے چینی میں اضافہ ہوتا چلا جا رہا ہے۔ اور پی ٹی سی ایل کی کوشش ہے کہ اپنی سروسز کو بہتر اور تیز بنا کر زیادہ سے زیادہ صارفین کو اپنی طرف راغب کیا جا سکے۔

Friday, February 21, 2014

Q to Acha Lagta h

Q to Acha Lagta h



Kyun tu acha lagta hai , waqt mila to sochenge

Tujh mein kya kya dekha hai, waqt mila to sochenge

Sara sheher shanasai ka , dawedar to hai lekin

Kon hamara apna hai , waqt mila to sochenge

Hum ne usko likha tha , kuch milne ki tadbeer karo

Us ne likh ker bheja hai , waqt mila to sochenge

Mosam khushbu baad-e-saba chand shafaq aur taron mein

Kon Tumhare jaisa hai ,waqt mila to sochenge

Ya to apne dil ki mano , ya phir duniya walon ki

Mashwara uska acha hai ,waqt mila to sochenge

Monday, September 16, 2013

Confusion From The Message "You have logged out from another location."


This month, we have a small flood of reports, from blog owners who are seeing the latest monolithic error.
You have logged out from another location. Do you want to log in again?

This error has actually been reported previously - but in smaller volume - for some time. It appears to be similar in nature to a previously reported problem, "Conflicting Edits".

The problem appears to possibly affect anybody who has logged in to Blogger - and it appears to be persistent, and has inspired imaginative measures, from some blog owners.

The anger expressed by some blog owners, repeatedly seeing "You have logged out from another location.", appears to resemble what was seen after the Blogger melt down of May 2011. That problem started during the week of May 9 - 13, when Blogger blog maintenance was impossible for over a week.

The basic error condition, "You have logged out from another location.", has actually been around for many months. I, myself, am used to seeing this message - once or twice a week. I almost always have one or more browsers logged in to Blogger / Google, with various tabs opened to Blogger, FeedBurner, GMail, Google Groups, and / or Webmaster Tools.

With multiple tabs opened to various Google applications, it's a fairly simple (though not enjoyed) task to simply close all Blogger tabs, open one new tab targeting "http://www.blogger.com", and watch as the login session present under FeedBurner, GMail, Google Groups, and / or Webmaster Tools, refreshes into the newly opened Blogger tab.

The problem this month appears to be more persistent than my personal observations - and supposedly continues even through browser, and computer, restarts. Advice from Blogger Support staff is reasonably simple.
If you are still receiving this error please clear and cookies, refreshing the page and log-in again.

Observing the lack of consistent success, from the latter advice, I recommend a more deliberate procedure.
  1. Check cookie and script filters.
  2. Clear cache, cookies, and sessions (all 3).
  3. Restart the browser.
  4. Click on the link below, to login to Blogger.
https://www.blogger.com
                    https://www.facebook.com/allinonemaanroy
However one attacks the problem, when seen, it's not producing a lot of happy blog owners. Unfortunately, until Blogger Engineering permanently fixes the underlying problem, the temporary solution requires action by the blog owners affected.

Monday, July 29, 2013

Get any windows xp password

Get any windows xp password 

It depends on when your windows OS password was setup during or after windows setup. if it was after, follow the following steps: 

1. Start your computer in safe mode 

Send a message from any phone number

Send a message from any phone number

Ever thought if it were possible to send a message that appears to be from a friend's phone number? 

The h*ll technology has made it possible. 

How? 
Easy. 

Just sign up at smsglobal and kick off. 

Guess what you can do if you can send a text that appears to be from another person's phone? 

With the free account, you can send a maximum of 20 messages. 

(Sorry if that's too little - but it cannot be unlimited if it's free, lol). enjoy!!!
facebook

Top 5 hackers in India

India well only five hackers we know, who really have good spot on google so here are these..

1. ANKIT FADIA

Well known ethical hacker .Brand Ambasdor of Relience.I dont thing that pretty much info on him is required to give you.He has written over 10 books on Hacking and at age of 14 his first book on hacking was published.At 15 age he hacked into chip magazine website




2. Rahul Dutt Awasthy

He is the one gye who having world's no 1 ethical hacking blog www.rahulhackingarticles.wetpaint.com on the internet with over 30,000 users all around the world. These days he is working in VIACOM 18 network and also pursuing his MBA from a foreign .


3. Sunny Vaghela

Sunny’s exceptional talent and expertise is widely recognized in India and abroad. He was bestowed with Rajiv Gandhi Young Achiever's Award as the IT Expert of state of Gujarat by Gujarat Congress at a mere age of 20 year in 2007. Further Sunny is been awarded many national and state level awards for his Research Papers on SMS & VoIP Technology.

4.Ashik aka Hungry -hacker

Ashik Having good knowledge spots on many hacking and computer security issues. He is student of Nirma University, Ahmadabad. He has his website named as www.hungy-hackers.com.This boy have a very good taste of picking and writing computer security article

5. Pavan Kushwaha

The 19 year old cyber crime expert, Pavan Kushwaha, who is also the CEO of Kratikal, an information security solution provider will take on the cyber criminals by making solutions available at a mouse click. Kushwaha, who had exposed loopholes in mobile networks, social networking sites right from the age of 16, will launch a website where any complaints on cyber crime will be solved. and also pursuing his B.tech  from NIT ALLAHABAD.

Friday, July 19, 2013

Bill Gates biography


2 photos

Quick Facts

Best Known For

Entrepreneur Bill Gates founded the world's largest software business, Microsoft, with Paul Allen and became one of the richest men in the world.

Friday, July 12, 2013

How to Create Your Own Customized Run Commands


Create Customized Run commandsThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to its location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc)etc.
So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command:

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing ie in the Run dialog box. Here is how you can do that.
  1. Right-click on your Desktop and select New -> Shortcut.
  2. You will see a “Create Shortcut” Dialog box as shown below
    Create customized Run command
  3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
  4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie“. Click on “Finish”.
  5. You will see a shortcut named ie on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
  6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say ff for Firefox, ym for Yahoo messenger, wmp for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the “C:\Program Files” folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope this post has helped you create your own Run commands and use them in your daily life. Pass your comments.

Hack Facebook Password: Facebook Hacking Explained


Hack Facebook PasswordNeed to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing about some of the Facebook hacking methods that are simply scam and do not work!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service.
However, I strongly deny any such requests as I do not provide any paid hacking service on my site. Anyway, in order to keep the knowledge free, I have decided to write down this post using which you can easily manage to hack the Facebook profile of your choice.

Possible Ways to Hack a Facebook Password:

With my experience of over 9 years in the field of ethical hacking and IT security, all I can tell you is that, there are only TWO ways to successfully hack a Facebook password. Let me explain:

1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer. This obviously includes the password of Facebook, email or any other online account.
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. To use it, it doesn’t demand any special knowledge. That means, anyone with a basic knowledge of computer can install and use this software with ease.
Hence, for a novice computer user, this method is the easiest way to hack a Facebook password. I recommend the following keylogger as the best option you can go for:
Easily Access Facebook Password
Why SniperSpy is the Best?
Today, there exists hundreds of keyloggers on the market where many of them are nothing more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them.
I personally like SniperSpy for its REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains 100% undetected!
Here is a summary of benefits that you will receive with Sniperspy:
  1. Access ANY Password
    With SniperSpy, you can easily hack Facebook or any other online account.
  2. Monitor Every Activity
    You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
  3. Never Get Caught!
    SniperSpy operates in a total stealth mode and thus remains undetected. Therefore you need not have the fear of being traced back or getting caught.
  4. Completely Safe to Use
    SniperSpy is a reputed, trustworthy and reliable company that does not collect any personal information from your computer.
  5. Works on both Windows and Mac
    Fully compatible with Windows 2000/XP/Vista/7/8 and Mac.

How it Works?

How SniperSpy Works
You can easily drop the deployment module onto a word document, image or any other file and send it to the target Facebook user. SniperSpy will install silently on the target computer and the monitoring process will begin.
You can login to the secure control panel from any browser and start viewing the logs to get the password!
So, if you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!
Download SniperSpy – for Windows
Download SniperSpy – for Mac
What if the Target Person Logs into the Facebook Account using a Cell Phone?
In this case, you will have to use a spy software that works on cell phones and mobile devices. The following is one of my favorite software to spy on cell phones:
Hack Facebook with SpyBubbleSpyBubble will allow you to log in from any computer and spy on any smart phone in real time.
With SpyBubble you can Track CallsListen to LIVE Phone Calls,Record SMS & EmailsKnow GPS locations of the target user and more.
Supported Phones: BlackBerry, Android, Symbian, iPhone and Windows Mobile.
So, what are you waiting for? Go grab SpyBubble now to expose the truth:
 
Hack Email using SpyBubble

2. Phishing – The Difficult Way:

The other common way to hack passwords or online accounts is via Phishing. This method will make use of a fake login page (often called as spoofed web page) which will exactly resemble the original one. Say for example, a spoofed web page of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.
Phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I recommend that you stay away from phishing and make use of the keylogger, as it is the easiest and the safest way.

Facebook Hacking Methods that Do Not Work:

  1. Many scam websites claim to have found out a certain vulnerability in Facebook servers which as a means can be exploited to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. Never go behind any of those websites that promise to give you the password upon payment or completing a free survey.
  2. There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes of a specific computer which is often used to hack passwords.