Featured post

Free Online Money Earning, no investment required

If you are trying to earn money online & need only small extra income less than $200 (Rs.12,000) then PTC sites are the best way to st...

Showing posts with label Tips and Tricks. Show all posts
Showing posts with label Tips and Tricks. Show all posts

Latest Blackmart Alpha apk for android

Blackmart Alpha latest – with using this app “BlackMart Alpha” you can download thousand applications for free. Yup, like an Android Market But, all applications in AndroidMarket is the official from the developer.
Whereas, in the BlackMart Aplha just a black market. You could try a paid application for freehere. And if it was really helpful for you, you can buy it through the Android Market or buy directly from the developer.


Features of BlackMart alpha:

  • » Download thousands applications.
  • » New market look, similar like appbrain, applanet and more.
  • » Easy install on your device.
  • » Almost support all version Android OS.
  • » User Friendly


Download the latest version : Blackmart Alpha

[How to][Guide] Take Screenshot using stock rom | without any application

Hello everybody !!
Though few people know about this trick but many people dont know about it and search for application to take screenshot. Many are fed up of trial version of apps and complicated setting of different apps.

Here I thought to share with you the simple steps to take screenshot using stock Rom or Custom Rom.

Steps :

1) Go to you desire app, or anywhere you want to take screenshot.

2) Press the Home Button downward or press it little bit its down.Then quickly press the Power Button to take the screenshots. (do not remove your finger before clicking the power button i.e home button + power button)

3) Note: Dont be very quick or slow otherwise the screenshot will not be taken.

It took a lot of hard work to type all these using small keyboard (Galaxy Y) so please appretiate my work.

Comment and share if I helped you :)

Source : androite@xda http://forum.xda-developers.com/showthread.php?t=2273451

[How to] Hack Whatsapp

Whatsapp Messenger is a cross platform instant  messaging application.Whatsapp is certain really the foremost fashionable instant electronic messaging for smartphones.WhatsApp Messenger is available for iPhone, BlackBerry, Android, Windows Phone and Nokia and yes, those phones can all message each other!.I am sure you all have heard of it  if you are not using it .These are the some whatsapp hack or tricks you should know if you are using it .

1.Whatsapp Hack to spy on some other  account 

So if you people have observed you can’t have  your whatsapp account logged in two devices. Means session is given to only 1 mac address. If the MAC [ Media Access Control ] address of the device requesting access changes then whatsapp asks you to re-verify your account!
And common, “whatsapp people” you think Mac address can’t be spoofed.
Here is how to do it 
-You need to get access to victim phone to get the victims phone “MAC address + the verifying massage” which is received to verify your device.
Get mac address on your android phone
-ANDROID –>
Finding MAC address on a Android Phones
1. On your HOME screen, click on MENU, goto SETTINGS.
2. click on  About Phone.
3. Click on Status. 
And VIEW your Wi-Fi MAC address!

Finding MAC address on an Android Tablet
1. On your HOME screen, click on MENU, goto SETTINGS.
2. click on  About Tablet.
3. Click on Status. 
And VIEW your Wi-Fi MAC address!

iOS [ iPad, i pod or iPhone Touch]

Finding MAC address on in iPad, iPhone or iPod Touch-.
1.  Click on Settings.
2.  Select General -> About.
MAC address can be seen in Wi-Fi Address. Windows Phones
Finding  MAC address  on a windows phone.1. On Start,  flick left to App  list.
2. Tap Setting, then About, then More info.
3. MAC Address  can be seen.
- As soon the message s received Push the “MAC address” + “Verifying code” to your server or mail it your ID. That depends on your convince.
-Spoof your phone’s MAC address to your Victims address using this tutorial 
and install whatsapp and type the “verify code”.
And done guys. You get complete access to the victims whatsapp ID.. where as you can keep spying/watching your victims movements :D
i.e 2 people – U + ur victim are using the same ID from different devices.

2.Whatsapp hack to use it without using your number  !!

This hack works by tricking the WhatsApp Verification Servers by sending a spoofed request for an authorisation code intended for an alternative phone.
1.Install WhatsApp on your device WhatsApp now starts a counter where it sends a verification message to its servers.
2.Block the messeage service  it can be blocked by changing the message center number or pushing the phone into Airplane mode.
3.WhatsApp now offers an alternative method of verification Choose verify through SMS and fill in your email address. Once you click to send the SMS click cancel to terminate the call for authorisation to the WhatsApp server.
4.Now You have to do sms Spoofing
You can do it using this link For  android
Check your outbox and copy the message details into the spoofer application and send the spoofed verification.
-Iphone users can use this :To: +447900347295 From: +(Country code)(mobile number) —-victims Message: (your email address)
5. You will now receive messages intended for the spoofed number on your mobile device and you can communicate with people under the spoofed number and You have successfully hacked your whatsapp account !!

3. Whatsapp hack to see someother number deleted whatsapp messages !!!

This is not whatsapp hack actually this is a trick and this trick is especially for those who want to know about  some person specific chats which has been deleted from that number
Whatsapp store all his messages i.e it makes a backup of messages on your phone in sd card and keep it for 7 days so You can see someone messages through that backup using this whatsapp hack

Here is how to do it

-You need to get access to victim phone first and then open  /sdcard/WhatsApp/Databases/
-then copy msgstore.db.crypt into your phone either by bluetooth or other sharing technique
-then first make backup of your whatsapp database by coping it in another folder then replace it with the file you just copied from your victim phone
-then use this tutorial to recover these deleted messeges
And you are done now you can see every chat of that person for which backup was made for last 7 days

3.Whatsapp Hack for Images Transfer

 whatsapp hacksThis is one the most popular trick.. Users can Hide image inside another image using android Application name “Magiapp” or iphone application ”FhumbApp”
Using this app you can send Picture in another picture in whatsapp only.Images tell you the story how to do it with      Magiapp. There is no alternative available for Windows (If you know let us know by below comment section).
whatsapp hacks
magiapp


4.Access to Profile Pics Of your Contacts On Whatsapp

For security and privacy reason whatsapp doesn’t allow us to download the profile pics of our contacts on whatsapp messenger.But the truth is that it automatically downloads the pictures when you click on somebodys picture to view it!!!
These images are stored in a private folder named profile pictures which can be found here /sdcard/WhatsApp/Profile Pictures  and the image name of picture is contact number of your WhatsApp Contact. So if you want to keep that picture  just copy that picture in someother folder in your sdcard.very simple  na ;) .
whatsapp hacks
So if you wanna hide your profile pic you can use this modified version of whatsapp

5.Whatsapp Hack to Change Friends Profile Picture.(to troll them )

Ya its possible!!.but only on your own phone so you can troll them by using it.
This is how you do it
-Step 1. Choose a picture for your friend which you want to replace with your friend profile pic and download it.
-Step2. Now Rename the Image with your Friends Mobile Number. For example , i will change it to 9785****** of my friend .
-Step3.Resize the image to 561 * 561 using paint by following these steps:
- Right Click the image and "Open With">Paint
- Press Ctrl + W and check "by Pixels"
- Set the values to 561 Height and 561 Width
- Ctrl + S to Save it.
-Step 4. now just save the image into your device on the path “/sdcard/WhatsApp/Profile Pictures”.
-Step 5. Turn of Wifi or Deactivate data network for a while.(till you prank your friend). as his real profile picture will not Download then
.SC20121226-201909
Step 6: Show and Appreciate him for his new profile picture by showing him or say you have his whatsapp hack
and he is trolled:D
There are other small hacks also such as free whatsapp for over a year or hide last online time if you want them just mention it in the comments or any other  hack you want some mention it in comments i will try and provide it to you :)

[Download] Microsoft Windows 8 all version Activator Loader


This program is still in it's beta stages and I will keep it updated once a week.

-- Instructions:
1. Extract the content of the ZIP archive.
2. Run the program as administrator.
3. Click "Windows 8 Install".

4. After the re-boot you'll have your Windows 8 activated.

Download link : DropBox

Whos On My WiFi v2.0.6 + keygen



Who Is On My Wifi - a tool to scan Wifi networks in the presence of unidentified intruders and a PC with your internal network. The utility will show you each computer on the network, and warns you if it detects that the computer does not priznaet.Programma allows you to protectyour network from the drop speed Internet, hackers and computer to which you are not allowed to use your connection.
Are People On Your Network Right Now? If you've stumbled across this site, chances are that you're concerned about how secure your wireless network really is. You might even be concerned that someone you don't know is connected to your network this very minute.

High Level:
Whos On My Wifi will show you every computer on your network. No matter if the computer is trying to hide from you or not, Whos On My Wifi will find it.

Technical Level:
Whos On My Wifi creates a hardware level digital signature based on criterion such as the MAC addressIP address, Netbios name, etc. to create a Subnet specific White List for your network


installation
unpack with winrar
install apps.frm.setup.x
use keygen to register.

[Custom Rom] Apple iPhone for Samsung Galaxy Y [GT-S5360]


Hi friends as we all all know that Samsung galaxy y is one of the popular low ended android device and its development regarding apps and custom Rom's is very fast and for that thanks to all the developers who made this possible every day we have some new taste for our galaxy y . So this time here is a new custom Rom known as [Apple iPhone Rom] Apple iPhone Custom ROM for Galaxy y GT-S5360.
Rom information:
  • base LE1
  • kernel white XP v0.7.0
  • deox
  • swipe to remove
  • 8 lockscreen

Device Name: Samsung Galaxy y GT-S5360
ROM Name:Apple iPhone Rom.zip [Download from Here]
Size: 152.08 MB

Warning:

This custom Rom is only meant for Samsung Galaxy y GT-S5360 and not for other devices. Use it at your own risk we will not be held responsible if you brick or damage or whatever happens to your device while following our instructional guide.


Installation Instruction:

  • Backup your system and charge battery full
  • Download rom and place it in root directory of sdcard and turn your phone off.
  • Now Boot in Stock Recovery mode by pressing(Vol Up + Home + Power button) together
  • Select "Wipe data/factory reset" - Yes
  • Select "Wipe cache partition" - Yes
  • Select "Apply update from sdcard"
  • Install "Apple iPhone Rom" rom
  • Reboot your phone.

Congratulation! you have successfully installed Apple iPhone ROM on your Samsung Galaxy y GT-S5360 if you find any bug post on thread page so dev. can fix on next update.

ScreenShots :

 
 
 

Google Hacking-Use Google for hacking password

Google now a days is the most popular search engine there is on the internet. This is because it is so good at what it is doing. Because of that you can use it to find sensitive information. Google hacking is therefore nothing else than using complex Google queries to find information related to computer security.

Use Google to find what you are looking for There are several tricks you have to know to use Google to find sensitive information. There are the several operators described which you can use to form complex queries.

Important operators

filetype —is used to specify what kind of file the acessed file should be, e.g. filetype:php returns only php files.

inurl —defines what should be included in the url of the accessed site, e.g. inurl:edu returns all pages that have edu in their url.

Intitle —defines what should be included in the title of the accessed site, e.g. intitle:”index of” returns all sites that have “index of” in their title.

These are the operators you will often use, so get familiar with them. Play around a little bit, e.g. try: icq filetype:log and see what Google returns.

Google Hacking Database Johnny Long, the person who made Google hacking famous, has a database on its website. There are hundreds of queries which you can use to find relevant information.

Please do not abuse this and cause harm in any way, this article was written to make you understand what kind of security breaches are out there and therefore be able to fix them.

I hope this was helpful.

Tutorial On How To Detect Virus In Your Computer Without Antivirus Software

Do nothing and watch your Network Connection. Virus, Spyware and Worm always do their activity in silent by themselves or perfect crime as much as possible. But their activities can be detected with simple way, if you connect to the internet or in a network that connected to the internet, just do nothing with your computer and watch the network connection. If network connection show sending and receiving data all the time, it could be your computer have some of them. But makesure do not do any activity on your computer. If you cannot see the network connection, click Start -> Setting -> Control Panel -> Network Connection, there are icon with two monitors and keep blinking whenever there’s sending and receiving data. So what’s next?,

Check the Speed and Compare. Maybe on number 1 you still cannot makesure your pc has been infected but you know your PC’s speed. Is it much slower or a bit slower? If your PC’s speed much slower than before, you can add more possibility that your PC has been infected.

Check your Anti Virus Status. Most of smart Viruses, they able to shut down the Anti virus’s process and freely take over your pc, installing and duplicate themselves or calling their buddy on it. No wonder if they will make your PC suffer loaded by virus and spyware also their buddy. So if your anti virus is not active, be aware of their visit. Shutting down anti virus, usually done by virus, not worm or spyware.

Check your MSCONFIG When virus, worm and spyware was infected, they will put themselves to be run automatically when windows start. You can check what kind of application that run in your PC. Clik start> on run type “msconfig” then enter. New window come up and open Startup Tab, check all applications one by one, usually their name is similar with name of application example, quick time with qt.exe,etc. If you suspect one of them as a virus, Uncheck the file and reboot. If your computer fell better, that file maybe the virus or spyware and rename the file become *.bak. But virus is smart, after you restart the computer, that file has been checked again. That’s mean you have to think over against them and war haven’t not over yet.

Remember the history. “Please help, my computer go wild since two days ago”, for me that helpful statement to find virus. That statement could be refer to date when virus was infected. That means on that day, a new file contain virus was created. So let’s search and destroy, click start -> search -> for files or folder. On Search area, you will find unchecked Date and do check it. Choose file created on below and fill in the date your computer start not good. This way quite good enough to detect a virus, you will find lists of file that created on that day, not much on the list,that’s why it is easy. And next is to classified the executable file which have *.exe, *.bat, *.pif. Usually the same file is appear in startup tab (no.5). Suspect a file with above condition and makesure that’s not belong to your application such as MS WORD,EXCEL, etc. you can rename it into *.bak and restart.

Ask to Mr. Google what file is this. If you are not sure with that, open the internet, type name of file in google.com or yahoo.com on keyword and added “virus” on the back. If on the result said that file is a virus, you can delete or rename it.

Plz comment below to know that how my work had helped you... Thank you.
Share this post so that every one can know this advantage those how cannot afford to buy Antivirus. :-D

Tips for maximizing your battery charge in Mac Notebook

Summary
Learn how to get the most from your Mac notebook's battery life.Products Affected
Portable Computers

Your notebook battery life depends on your computer's configuration and how you are using the computer. Here are some settings and steps you can take to get the most from of your MacBook, MacBook Pro, or MacBook Air battery.
About the battery status menu
The battery status menu shows you how much charge your battery has and whether it is currently charging. This menu is at the right side of the menu bar:
Battery menu

The battery status menu updates frequently and changes depending on your screen brightness and system work load.
For example, if you are using a MacBook Pro (13-inch, Mid 2010) to edit a text document and the menu bar reports 8 hours of battery life, then you close the text document and begin playing a DVD movie, the time left in the menu bar will decrease. If you immediately quit DVD player and resume editing a text document, the time left in the menu bar display should return to a higher number due to the reduced power usage by the computer.
 If your Mac notebook computer is running Mac OS X v10.6.x or later, you can hold the Option key and click the battery status menu to display your battery’s condition.

Your battery's condition may help you determine if the battery needs a replacement:
  *  If the condition is “Normal”, the battery is functioning normally.
  *  If the condition is “Replace Soon”, it is still working but may be starting to lose its ability to hold a charge.
  *  If the condition is “Replace Now” or “Service Battery”, the battery likely needs to be replaced
.  If you plan to visit an Apple Retail store, you should make a reservation at the Genius Bar using http://www.apple.com/retail/geniusbar/
(available in some countries only).

Your one-year warranty includes replacement coverage for a defective battery. You can extend your replacement coverage for a defective battery to three years from the date of your notebook purchase with the AppleCare Protection Plan. However, the AppleCare Protection Plan for notebook computers does not cover batteries that have stopped working or are exhibiting diminished capacity except when it is the result of a manufacturing defect.
Set your screen brightness to the lowest comfortable level

Compared to any other setting on your computer, your screen brightness can have the greatest impact on battery life.   Press the F1 key to dim the screen until the brightness is as low as possible and the screen is still comfortable to view.  For example, on a MacBook Pro (15-inch, Mid 2010) computer, you can increase your battery life up to three hours by changing your screen brightness from 100% to the middle setting.

Optimize your battery settings in Energy Saver preferences
  * From the Apple () menu, choose System Preferences.
  * From the View menu, choose Energy Saver.
Options in the Energy Saver preference pane will vary depending on your Mac notebook and operating system version. Some examples of items that can be enabled to save power include:
  * Putting the hard disk to sleep when possible.
  * Slightly dim the display when using this power source. (Choose "Battery" or "Power Adapter".)
  * Automatically reduce brightness before display goes to sleep.
  * Setting the computer and display sleep sliders to induce sleep of the display or computer more quickly.
  * Choosing the Better Battery Life option if available.
  * Choosing Automatic Graphic Switching if available.
Some of these settings will put the hard disk to sleep whenever possible and reduce the computer's microprocessor or graphics performance to maximize its battery life. If you are using processor-intensive applications or graphic-intensive applications, you may wish to change these settings so that performance is maximized at the expense of battery life.
Graphics performance
Starting with the MacBook Pro (15-inch, Late 2008), MacBook Pro systems included two separate graphic processing units or GPUs that you could switch between to achieve better battery life or better performance. For more information on this feature, see MacBook Pro (15-inch, Late 2008), (17-inch, Early 2009), (15-inch and 17-inch, Mid 2009): How to set graphics performance
.  Additionally, the MacBook Pro (15-inch, mid 2010) and MacBook Pro (17-inch, Mid 2010) models enabled automatic switching between the two GPUs in the system for optimal performance based on the task. For more information on models that support automatic graphic switching, see MacBook Pro (15-inch, Mid 2010 and later), MacBook Pro (17-inch, Mid 2010 and later), and MacBook Pro (Retina, Mid 2012): How to set graphics performance
.

Tip: Running graphics-intensive applications such as 3D games, Aperture, iMovie, iPhoto, and others consumes more power. Quitting these applications will allow your computer to switch to the energy efficient graphics processor, which can give you better battery life.
Turn off unused features and technologies
Just as you would turn off the lights in an unoccupied room, turning off unused features and technologies can help maximize your battery life, too. Here are a few suggestions:
  * Eject CDs and DVDs you're no longer using. Sometimes the optical drive spins to read CDs or DVDs that are in the drive. This consumes a small amount of power.
  * Disconnect peripherals when you're not using them. Connected peripherals—such as printers and digital cameras—can draw power from your battery even when you're not using them.
  * Shut down any runaway applications
.
  * Quit any applications that are running but not in use.
If you're not in a location where you need to use AirPort or Bluetooth, you can turn them off to save power.Optimize your battery settings in Energy Saver preferences
  * From the Apple () menu, choose System Preferences.
  * From the View menu, choose Energy Saver.
Options in the Energy Saver preference pane will vary depending on your Mac notebook and operating system version. Some examples of items that can be enabled to save power include:
  * Putting the hard disk to sleep when possible.
  * Slightly dim the display when using this power source. (Choose "Battery" or "Power Adapter".)
  * Automatically reduce brightness before display goes to sleep.
  * Setting the computer and display sleep sliders to induce sleep of the display or computer more quickly.
  * Choosing the Better Battery Life option if available.
  * Choosing Automatic Graphic Switching if available.
Some of these settings will put the hard disk to sleep whenever possible and reduce the computer's microprocessor or graphics performance to maximize its battery life. If you are using processor-intensive applications or graphic-intensive applications, you may wish to change these settings so that performance is maximized at the expense of battery life.
Graphics performance
Starting with the MacBook Pro (15-inch, Late 2008), MacBook Pro systems included two separate graphic processing units or GPUs that you could switch between to achieve better battery life or better performance. For more information on this feature, see MacBook Pro (15-inch, Late 2008), (17-inch, Early 2009), (15-inch and 17-inch, Mid 2009): How to set graphics performance
.  Additionally, the MacBook Pro (15-inch, mid 2010) and MacBook Pro (17-inch, Mid 2010) models enabled automatic switching between the two GPUs in the system for optimal performance based on the task. For more information on models that support automatic graphic switching, see MacBook Pro (15-inch, Mid 2010 and later), MacBook Pro (17-inch, Mid 2010 and later), and MacBook Pro (Retina, Mid 2012): How to set graphics performance
.

Tip: Running graphics-intensive applications such as 3D games, Aperture, iMovie, iPhoto, and others consumes more power. Quitting these applications will allow your computer to switch to the energy efficient graphics processor, which can give you better battery life.
Turn off unused features and technologies
Just as you would turn off the lights in an unoccupied room, turning off unused features and technologies can help maximize your battery life, too. Here are a few suggestions:
  * Eject CDs and DVDs you're no longer using. Sometimes the optical drive spins to read CDs or DVDs that are in the drive. This consumes a small amount of power.
  * Disconnect peripherals when you're not using them. Connected peripherals—such as printers and digital cameras—can draw power from your battery even when you're not using them.
  * Shut down any runaway applications
.
  * Quit any applications that are running but not in use.
If you're not in a location where you need to use AirPort or Bluetooth, you can turn them off to save power.

How to increase internet speed in any android phone

<p>&lt;p&gt;Hello guys&lt;br&gt;</p>
<p>I m not responsible if any happens. </p>
<p>This is the trick to increase your Internet Speed on any android phone.... &lt;br&gt;<br>
1. The phone should be rooted. <br>
2.You should have root explorer. </p>
<p>Now open root explorer and click to R/W. So that it becomes writable. Go to system --&gt; build.prop. <br>
Long press it and open with text editor.&#160; <br>
Paste these codes at the last and save and exit. Reboot your phone and enjoy the speed. <br>
Be careful to copy these codes fully otherwise your phone may brick and then don't blame me. </p>

#signal tweak
ro.ril.hsxpa=1
ro.ril.gprsclass=10
ro.ril.hep=1
ro.ril.enable.dtm=0
ro.ril.hsdpa.category=8
ro.ril.enable.a53=1
ro.ril.enable.3g.prefix=1
ro.ril.htcmaskw1.bitmask=4294967295
ro.ril.htcmaskw1=14449
ro.ril.hsupa.category=6

#network tweak
net.tcp.buffersize.default=4096,87380,256960,4096, 16384,256960
net.tcp.buffersize.wifi=4096,87380,256960,4096,163 84,256960
net.tcp.buffersize.umts=4096,87380,256960,4096,163 84,256960
net.tcp.buffersize.gprs=4096,87380,256960,4096,163 84,256960
net.tcp.buffersize.edge=4096,87380,256960,4096,163 84,256960

Please do not copy < br >

<p>Do not forget to comment so that i can know that my work had helped you.&#160; Thank you.&#160; Come again. </p>

Fast Track Hacking-Backtrack 5 Tutorial


Backtrack 5 contains different tools for exploitation, as discussed before about metasploit and armitage for this article i will discuss about fast track, however I have received different request to write more tutorial forarmitage, i will write for armitage too later. Fast Track is a compilation of custom developed tools that allowpenetration testers the ease of advanced penetration techniques in a relatively easy manner.

Some of these tools utilize the Metasploit framework in order to successfully create payloads, exploit systems, or interface within compromised systems.

If you are beginner and dont have any idea about vulnerability, payload and shell code than first read the article " Introduction to metasploit". 

For this tutorial i will use backtrack 5, however you can use some other version(s). 

How To Use Fast-Track For Payload Generation

There are three interface available for fast track on backtrack 5, i will show you how to generate payload by using fast track, you can use fast track web interface too for different purposes like auto-pwn. Follow the procedure.

·           Click on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive

·           You will get the first window that is menu windows, enter number 8 that is payload generator number.

·           On the next window will ask you about payload enter number 2 that is "Reverse_TCP Meterpreter".

·           Now we need to encode our payload so that it can easily bypass antivirus software's and IDS. I enter number 2 you can enter of your choice.

·           On the next we have to enter IP address of the victim than port number, I have scanned my local network using nmap. Then select the type of payload either EXE or shell code.

·           Now a file name payload.exe has been created, you can get the file by going on filesystem-->pentest>exploit-->fasttrack-->payload.exe.

·           Use some social engineering technique to run this payload on the victim box than on the fast-track window start listing your payload to get the hack done. When everything is fine you will get the command window of the victim.





How Most of the SMS Bombers Work | SMS Bombing


A lot of people are getting annoyed by the amount of rubbish messages they are getting just because of this SMS bombing fact. In fact I have also edited some SMS bombers and have come to know certain facts about them. Mostly, researches may vary from them but you must be aware also from what I got to you today. Many internet users just pay for theseSMS bombers just to annoy someone since they have some bad intentions. Lets, see how these SMS bombers work:

Top Reasons on how these SMS bombers Work:

  1. Mostly Mobile Sites offer some subscription service from their websites and user just has to input his mobile number there, After that an automated confirmation message is sent to user’s cell phone. Any bad minded guy can easily exploit this easily by just tempering the page requests to the server and by understanding the mechanism on how it works to process the entered number.
  2. A paid SMS bomber can also use some online SMS sending service, there are a lot paid services available which can be used to send as many texts as you want. But such SMS bombers are never free ones, Such SMS bombers can also have spoofing feature.
Thus, An SMS bomber takes the mobile number of the victim as the input and then forwards that to specific website which then send automated message to the victim’s number.
SMS bomber makes this process to repeat at a rate of thousands of time. And victim mind just blows off and he turns off his mobile.

How to prevent such SMS bombers to be fully functional:

  • This part is for websites admin who offer sms services, It would be better to use somecaptcha as per security reasons. I know captcha can also be bypassed but still its better than nothing.
  • Not more than 10 messages should be sent by the website again and again to same number. Within 24 hours, Some filtering techniques should be implemented.

Upgrade From BackTrack 5 R2 to BackTrack 5 R3


Recently, we released the long-awaited BackTrack 5 R3 but for those of you who don’t want to start fresh with a new installation, have no fear because you can easily upgrade your existing installation of R2 to R3.

Our primary focus with this release was on the implementation of various bug fixes, numerous tools upgrades and well over 60 new additions to the BackTrack suite. Because of this, the upgrade path to BackTrack 5 R3 is relatively quick and painless.

First, you will want to make sure that your existing system is fully updated:

apt-get update && apt-get dist-upgrade
With the dist-upgrade finished, all that remains is the install the new tools that have been added for R3. An important point to keep in mind is that there are slight differences between the 32-bit and 64-bit tools so make sure you choose the right one.

32-Bit Tools


apt-get install libcrafter blueranger dbd inundator intersect mercury cutycapt trixd00r artemisa rifiuti2 netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney apache-users phrasendrescher kautilya manglefizz rainbowcrack rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack uberharvest acccheck statsprocessor iphoneanalyzer jad javasnoop mitmproxy ewizard multimac netsniff-ng smbexec websploit dnmap johnny unix-privesc-check sslcaudit dhcpig intercepter-ng u3-pwn binwalk laudanum wifite tnscmd10g bluepot dotdotpwn subterfuge jigsaw urlcrazy creddump android-sdk apktool ded dex2jar droidbox smali termineter bbqsql htexploit smartphone-pentest-framework fern-wifi-cracker powersploit webhandler

64-Bit Tools


apt-get install libcrafter blueranger dbd inundator intersect mercury cutycapt trixd00r rifiuti2 netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney apache-users phrasendrescher kautilya manglefizz rainbowcrack rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack acccheck statsprocessor iphoneanalyzer jad javasnoop mitmproxy ewizard multimac netsniff-ng smbexec websploit dnmap johnny unix-privesc-check sslcaudit dhcpig intercepter-ng u3-pwn binwalk laudanum wifite tnscmd10g bluepot dotdotpwn subterfuge jigsaw urlcrazy creddump android-sdk apktool ded dex2jar droidbox smali termineter multiforcer bbqsql htexploit smartphone-pentest-framework fern-wifi-cracker powersploit webhandler
That’s all there is to it! Once the new tools have been installed, you are up and running with BackTrack 5 R3.

HOW TO SECURE YOUR GMAIL ACCOUNT FROM HACKERS





Hi folks...
In this post i'm going to tell you how to secure gmailaccount from hackers. As we know, all of us have their accounts on Gmail. Phising and hacking are on the rise and many of us have already faced the situtaions when our email Id has been compromised.It is very difficult to estimate the loss which one undergoes once his email ID has been hacked.


Now you can add an extra layer of security in your Gmail Account.After enabling this feature you have to enter an addtional verification code (sent to your mobile) to login into your account.So,if somebody hacked your password even then he won’t be able to access your email account.
How to Secure Gmail Account:-
  • Choose a verification method.By selecting Text message (SMS) or voice call you will recieve the verification code on you phone either as text message or as a call.
  • Enter the appropriate information about your country and Mobile Number.

  • Choose SMS text message or Voice call option according to your need. (I prefer SMS text message).
  • After giving your mobile number test your phone by clicking on the Send Code button.

  • If you lost your mobile or your number is not available when you need it. 
  • Click on Next button again.
  • Here give your working alternative number. And click on Next button.
  • Now again click on the Next button again and then click on the Turn on 2-step verification button.



  • Click OK.

That’s it ! Now you have been added 2-step verification security to your Gmail account. Now whenever you will enter your password it will ask you to enter verification code without it you won’t be able to login to your Gmail Account.

HOW GOOGLE ADSENSE DETECTS INVALID CLICKS


Hi folks...
We always hear that Google has a sophisticated system to detect the invalid clicks, and result in termination of the cheaters’ account. But, how can Google do that? In this post, I summarize those ways that Google depends on to detect whether the clicks on your site are invalid or not. Google will not first ban your account immediately. Rather, they will first flag your account and Google will keep a closer eye to your account. In some occasion, they may send you a warning letter to notify your situation; but sometimes not.

1. IP Address
It is the easiest and must be recognized by everyone. If those clicks on your ads are originated from the same IP Address as the one used for accessing your AdSense account, your account is flagged.

2. Click Through Rate (CTR)
Normally, Click through Rate should not exceed 10%. Otherwise, Google will flag your account. For your information, normal CTR should ranges from 0.5% – 10%.

3. Physical Location
Google has good tracing software and technology.They can trace traffics origin down to the small town. So, using different computers with different IP address does not secure anything. So, don’t try to click your ads in various internet cafes. That will kill you.

4. Cookies
Most home users do not use static IP Address for Internet connection. In most cases just disconnect and reconnect will give you a new IP Address. But don’t forget, Google has set cookies on your computer. They can trace these cookies and see whether they originate from the same computer.

5. Click Pattern 1
It is also suspicious when people click on their clicks and then run away immediately (hit-and-run). But normally, people will surf for a while inside your pages and then click on the ads they want.

6. Click Pattern 2
why this computer / IP address / person is so trigger-click-happy on this particular website but never click on the ads on other sites?

7. Click Pattern 3
And why is it that people accessing these sites direct (type-in URL or from bookmark) tend to be very active ad-clickers compared with those referred from search engine or other sites?

8.Other Google Services
Apart from Google Adsense, Google also provide a series of services to us. Don’t just think that it is safe if you do not log in your adsense account and click on your ads. What other Google services do they provide to us? Here are some: Gmail (most people are using it), Google Earth, Google Calendar, Google Search, Google Toolbar, Google Talk, Google Sitemap, Google Desktop, Blogger, or even Youtube (because Google has just recently acquired it).

9. Search Engine Ranking
Your website is not indexed on any search engine, not linked by any prominent website, but get consistently high traffic? How come people can access your website and click your ads? That will make Google to smell a rat.

10. Design Of Webpage
How about the “Please click a link below” or “donate us by clicking the ads”? These kinds of encouragement is not in line with Google’s TOS. Google can use their winning search engine, or even human eyes to check your sites from time to time.

11. Advertisers conversion rate
Ad click is one thing. But does it bring value to the advertisers? If none of the clicks on your site translate to conversion to the advertiser, you are in trouble. First the Smart-Pricing hits, then your AdSense account disabled.

Send Fake E-Mail to Anyone


Hi folks...
Today im going to post how to send fake email.ok so fake email is a online free email sender and you can change sender, reciever, forward, subject and title anything you want. The most reason to send fake email is a that you can use fake email for hacking password by using phishing site. In this article i will show you website that you can use to send fake email.  1. Go to Fake Mailer website to send anonymous email.
    
2. Now, enter the information as shown: From Name: The Sender name which will appear on Email From Email: The sender Email address To: Victim email address Subject: Subject of the Email Content-type: Select text/html Text: The content of your mail. Put something which will make your victim to click on your phisher link.

3. Now, enter captcha and hit on Send. 

4. Your victim will receive mail like this:
 
So friends, I guess this Fake Mailer is pretty easy to use and also very handy to send anonymous email to your friend or victim. If you find any problem in using this Fake Mailer to send anonymous email, please mention it in comments.

 Enjoy Fake Mailer to send anonymous email to your victim...
If you have Any Queries Ask me in form Of Comments and don't forget to share and join this blog and like us on Facebook......

HOW TO DETECT THAT A KEYLOGGER IS INSTALLED ON A COMPUTER OR NOT


Hi folks...
key loggers are software that traces the key strokes on  your computer. It is done in such a way that a person  using the computer is unaware of the fact that a key  logger is installed on a particular PC.

How does  keyloggers enters your computer ?
There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.

So how to get rid of  keyloggers that is installed on a computer

1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.
2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even  Kasperky does a good job in this area too. Also check anti-spy.info. More examples:
3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark  etc.
4. Use special tools
KL-Detector
Freeware on demand keylogger scanner.
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
Androite XDA. Powered by Blogger.