on Monday, 25 February 2013
How to create ghost image of hard disk for free?

If you are the person who want to backup complete disk along with OS. So lets see how we can create hard disk image or ghost image or disk clone without using those highly priced ghost creating software.


Requirements:

Ubuntu Live CD/DVD, A hard disk with more capacity than the one you want to clone and some basic knowledge ofLinux.

on Friday, 22 February 2013
———————————————————————————————
How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely
———————————————————————————————

Welcome back ,

Like in my last article on remotely installing a keylogger onto somebody's computer, this guide will continue to display the abilities of Metasploit's powerful Meterpreter by hacking into the victim's webcam. This will allow us to control the webcam remotely, capturing snapshots from it.

Pic : http://bit.ly/Yrfb0G

Why exactly would you want to hack into somebody's webcam? Maybe you suspect your significant other of having a fling. Or, maybe you're into blackmailing. Or, maybe you're just a creep. But the real purpose is to show just how easy it is, so you're aware that it can be done—and so you can protect yourself against it.

Pic : http://bit.ly/XQsdF5

Hacking a Web-browser with beef

Browser Exploration Framework is mainly used to exploit a Web-browser.When i was trying it I play a varied types of pranks with victim browser like making open a pop-up window,playing a sound,stealing cookie etc. So lets start hacking.
Follow all the steps according to my post ======>


1. First install beef by clicking on Applications->Backtrack–>Exploitation Tools->Social Engineering Tools->BEEF XSS Framework->BeEF Installer.


2. Now when beef installs open beef by going to same directory like in 1st step then click on beef and beef will start connecting.

Hacking a Computer using fastrack and backtrack

Hey friends i found a latest hack or way to hack into a computer which has a windows operating system.
Ok then lets start.Here are some requirments:-------->
1. Backtrack 
2. Ip address of victim.
3. Brain.
Now follow all the steps according to this post:--------------->
1. Open Fastrack by clicking on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive.
on Thursday, 21 February 2013

How To Fix Error Reporting in XP


Friends, sometimes when u open ur browser or any thing in ur PC and it give a error like the following image, so u want to remove it, so here is a solution....


Awesome List of Google Tricks

 http://www.diamantefm.com.ec/upload/fotos/google_music_1.jpg
As Google is the best search engine its also one of the most hotspot for occasional tricks and tweaks which we are going to discuss right below. So these list of Google tricks will attract your attention and entertain you and your friends. You must check all tricks listed below maybe you know many of them as we have posted some in our earlier posts but some are totally new to us.
20 Awesome Google Tricks :

Windows 7 Loader eXtreme Edition v3.503


Windows 7 Loader eXtreme Edition v3.503 MediaFire Free Download,Windows 7 Loader eXtreme Edition,Windows 7 Loader eXtreme 
How to active Windows 7
Windows 7 Loader eXtreme Edition v3.503
Activates all Windows 7 versions:
Ultimate, Professional, Enterprise, Starter, Basic, Home, etc.
Activates Windows 7 / Vista / 2008 R2 / 2008 - RTM / preRTM / Office 2010
Supported editions: All
on Wednesday, 20 February 2013



1) Keep it clean – using proper cleaning products.  If you want it to last, your laptop needs to be a clean machine. But, don’t go overboard and use harsh cleaning products. Avoid using all-purpose household cleaners, or anything that contains acetone, ammonia, or alcohol.
2) Shut it down properly. If you just close your laptop, you’re not actually shutting it down properly.  All software programs, including your operating system need to be rebooted (restarted) from time to time. Doing this daily is a good practice to keep your computer running at peek performance.
3) Protect it with a case. Bumps and drops are inevitable. You can protect your computer from much (although certainly not all) of the damage caused by these accidents with a case. Cases also create personality, so be creative when you choose yours.
on Tuesday, 19 February 2013



Don't crack any wifi router without authorization; otherwise, you will be put into the jail.

Step 1 :

airmon-ng

The result will be something like :
Hello all my friends many people asking how to trace someone in Facebook , well some people think that the noob method with command prompt is the only method lol ^_^ closing all tabs and talking to the victim account then typing "netstat -n" no no i have found the method since 2011 and it's still working and private but i decided to share it.Anyway let me explain it !





This method work with Notification that you receive in your email for example if someone comment your status or send you a message on Facebook of course you will receive the notification in your email !


The non-persistent XSS are actually the most commons vulnerabilities that can be found on the Net.

It's commonly named as "non-persistent" because it works on an immediate HTTP response from the

 victim website: it show up when the webpage get the data provided by the attacker's client to

The persistent XSS vulnerabilities are similar to the second type (Non-persistent XSS), because both

works on a victim site and tries to hack users informations and the difference is that in websites

vulnerables to Persistent XSS the attacker doesn't need to




Don't crack any wifi router without authorization; otherwise, you will be put into the jail.

Step 1 :

airmon-ng

The result will be something like :

Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]

on Monday, 18 February 2013

What is Click jacking


Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links or buttons that are hidden from normal view (usually links color is same as page background). Clickjacking is possible because of a security weakness in web browsers that allows web pages to be layered and hidden from general view. In this situation what happens is that You think that you are clicking on a standard button or link, like the PLAY button or download button on an video or some stuff, but you are really clicking on a hidden link. Since you can’t see the clickjacker’s hidden link, you have no idea what you’re really doing. You could be downloading malware or making all your Facebook information public without realizing it. Some good hackers make ajax keyloggers and put them as javascripts over their fake websites and when you open them they retrieve all your passwords stored in web browser and records whatever you type while the web browser is open and stores this information on their servers.
This summary is not available. Please click here to view the post.
how to hack a website by using cmd?

hlo,frndz i'm going to show u how to hack a website by using cmd or using deniel service attack
frst of all what is deniel service attack it means when a website get more data from its capacity and it crashed this is called deniel service attack
for this attack u have a great internet speed bcoz if ur pc has slow speed u havebeen traced by host and u gone to jail
on Sunday, 17 February 2013

SQLSentinel:SQL Injection Vulnerability Scanner

Hey friends this is D@rk TruTH. Sorry for posting very late i was busy in my studies because my exams are coming.
Today I am bringing a new SQL injection hunter tool named SQLSentinel.

What is SQLSentinel -->

This tool is very good if u want to test a site vulnerable to SQL injection.
This tool use crawling function first found out links like index.php?id= and then check that these links are vulnerable or not.
It only found out vulnerabilities, but not hack it.

Usage of tool --->

Facebook friend request sent when blocked. Guyz, If ur frnd request is Blocked, then Dont Worry we are here...

Imagine that you are blocked from sending Friend Requests by Facebook for 2, 4, 7, 14 or even 30
days! That would be a serious problem if you actually wanted to add someone during that period.

Now, you can!

With this simple trick you can send 1000's of
friend requests when when you are
blocked . There's just one part which will be tough for you if you are going to add unknown people. You will need

on Friday, 15 February 2013
What if by chance you get a facebook user account who has not logged out from his/her email id.

You can take advantage of this golden opportunity and change his/her facebook email id password without even knowing his current password. This would help you to login in the id whenver you want.
Here are some simple steps to follow to change the password without even knowing the current passwords.

Leak How to bypass YouTube copyright

Most of people who upload videos to YouTube know about this problem.
I think we all put background music in the video, YouTube will see that as a copyright violation and it will delete audio and recommend you audioswap.

Just follow these steps:
(Many things changed on YouTube so this steps ain't that correct because this method was posted on 2009. on the forum I found it on, but I'm sure you guys will know how to do it.)

1) Go to "My Videos", after you uploaded a video and after they removed the audio.
2) Click on "Resolve Copyright" on the video that has audio disabled.
3) Scroll down and choose option "I want to learn more about this dispute process".

on Thursday, 14 February 2013

Hacking any Facebook Account using Wifi

Mozilla has added a supplement(addon) that is "Firesheep" has been used for thousands of hacking email accounts. As reported by techcrunch, Firesheep has been downloaded over 104,000 times in 24 hours.

What is the Firesheep special?

Using Firesheep add on you can check any account without knowing the username and password.
Famous social network Facebook is a victim of this Firesheep.

How?

Firesheep uses the HTTP session hijacking to obtain a username and password.

What is the HTTP session hijacking?

Attacker use HTTP session hijacking attack to steal the cookies of the victim. Cookies are files containing the user name and password.

Learn to Spoof IP Address With RafaleX and Engage Packet Builder

[Image: 1.JPG]
The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

How To ARP Poision a LAN

ARP poisoning is also known as ARP Spoofing, ARP Flooding and ARP Poisoning Routing. So what basically is ARP poisoning ? It is technique which allows an attacker sniffs traffic from Local Area Network (LAN), monitors it and even stop it. ARP poisoning is done by sending fake or spoofed messages to an Ethernet LAN card. By doing so an attacker manages to associate its MAC address with IP address of another node on network (which is basically default gateway IP). Then the traffic meant for gateway first goes to attacker and then to gateway thus allowing attacker to sniff traffic from network. To launch APR poisoning attack the attacker’s system must be connected in LAN if wired else it should be at least in range of wireless network. This is just a tutorial on ARP poisoning so we will discuss its anatomy someday later.


Now a days a very big question that arises among the twitter users are how to increasethe number of followers. In this situation we should have solution for increasing twitter followers and what can you do to increase your twitter followers fast?


There are several ways to get followers, many of them works on twitter exchange basis or you need to buy credits to get more twitter followers.




What is Twiends?
Hi guys, Recently Microsoft has released their new product worldwide. It's Windows 8 operating system. So today I'm gonna make your PC more colorful with some most beautiful and attractiveWindows 8 themes.

These free themes make your desktop computer or laptop to a unique look. And these themes are designed by Microsoft Windows developers. The Windows 8 themes are really looking cool and it will make your PC more and more colorful. All the themes are fully support with your Windows 7 Home Premium, Professional, Enterprise, Ultimate editions and Windows 8 PCs.

VLC is one of the popular software for play video files. How many of you know that we can convert video files with VLC player. We are using different video converters to convert video files. Hereafter you don't need to download or purchase a separate software for video converting. I'll show you an easiest way to convert videos with VLC Media player.


Use VLC as Video Converter
on Wednesday, 13 February 2013

Proxies








Pakistan, India, USA, Indonesia, China, Brazil, Japan, Germany, Iran, Iraq and more Alive Proxies

Facebook Chat is cool, at least it allows you to send instant messages to online Facebook contacts.If you are using Firefox, you can place the Facebook Chat at the sidebar.
  • Look for Bookmarks on the top navigation. Select Organize Bookmarks…

 
Assalam o Alaikum, today i am sharing a trick for Facebook.Facebook is the most famous Social Network Website, doesn't not allow multiple accounts with the same e-mail address, but it's possible to do that with a simple Gmail trick by using the same email address.
on Sunday, 10 February 2013

Microsoft has launched Window 8 recently. But some old computers doesn't contain minimum system requirement to install Windows 8. So today I'm going to give you a Free Windows 8 transformation pack. 

We can transform our Windows 7 , Vista or XP to Windows 8 by using Windows 8 transformation pack. This free transformation pack will change our Windows user interface to Windows 8. 



Windows 8 Transformation Pack latest Full
When you're using a pen drive to transfer data between PCs, the common problem is viruses. You might format your pen drive many times because of viruses. Some kind of viruses never get delete by normal formatting. Are you disappointed of the result that you get after formatting your pen drive and still find viruses in it?

Here I'll give you a solution to format your USB pen drive completely.

You can format pen drives using command prompt to remove all the virus files permanently. Most of the times these type of formats delete all the viruses from pen drive.



How to Format USB Pen Drives Using Command Prompt to Delete Viruses Permanently

So let's see how to format your pen drive using command prompt.


Insert pen drive into your PC
Hi Friends !!!
Today I'm going to give some valuable application for your smart Android phone.
In today's situation one of the biggest problem is "Wrong calls". Especially for girls !!!
Unknown persons can annoy you through wrong calls. if someone annoy you a lot through wrong calls , surely you will change your mobile number to escape from them.
Hereafter don't worry about annoying calls and you don't need to change your mobile number.

Free Apps to Block Unwanted Calls on your Phone
Gmail is one of the most popular mailing service today. It gives many facilities to it's users. such as
Use Gmail Without Internet Connection
Schedule your own time, and send emails in Gmail
Remove Spam emails automatically in Gmail


In this list now gmail gives one of the greatest facility to its users. Its called as grant access. This means you can give grant access to your gmail account to a friend, without sharing your password.

Most important thing is in this, other person can't change any setting or password of your gmail account. And also can't chat from your account. This feature 
only allows the other person to 
read inbox mails, 
can delete read mails, 
and can send mails from your account. 
More than this, particular person can't do any changes in your gmail account. 


How to Grant Access to Others to Your Gmail Account Without Sharing Password