Subscribe:

Ads 468x60px

Thursday, January 30, 2014

FB Checker finds fake Facebook friends



FB Checker helps you identify fake Facebook profiles, but your common sense should work just as well.


================
http://adf.ly/cpVIH
Not everyone on Facebook is who they claim to be. And while some of the fake info posted on the world's biggest social network is nothing more than a bit of harmless bragging, some of the fakers can be downright dangerous. Enter FB Checker, a free application that is designed to help you identify fake Facebook accounts.

Add up to five photos to FB Checker for analysis.
FB Checker is free. All you have to do to get started is download it and give it permission toaccess your Facebook account. Then, when you come across a Facebook profile you'd like to verify, you launch the app from your system tray. FB Checker works by analyzing photos, so you have to click on a few photos from the account in question to add them to FB Checker. This can be tricky if you haven't accepted a friend request from the account in question and have limited access to their photos, or if the account simply doesn't have that many photos posted.

FB Checker works by analyzing the photos you select, and then searches for duplicates on the Internet. If the photo isn't found on another site, FB Checker believes it is legitimate, but if it is found elsewhere, FB Checker then analyzes that site to see if the photo has the same name attached to it. (This prevents it from identifying photos of celebrities and other public figures as fake simply because they're widely used.) FB Checker labels accounts as fake when a photo is found on several different Web sites, without the name associated with

Wednesday, January 29, 2014

Wireshark download


Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.
Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets; it runs on various Unix-like operating systems including Linux, Mac OS X, BSD, and Solaris, and on Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.

For more details about wireshark ...http://en.wikipedia.org/wiki/Wireshark 
HomePage for Wireshark ... http://www.wireshark.org 

Download Wireshark ... http://www.wireshark.org/download.html 
Thank you,

Kevin Mitnick - Most wanted computer criminal in U.S. history


Kevin Mitnick’s journey as a computer hacker has been so interesting and compelling that the U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.
What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for 3 years of supervised release. Near the end of that period, however, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.
Mitnick was eventually caught and convicted, ending with a 5-year prison sentence. After serving those years fully, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.

Kevin Mitnick does not like being called a hacker. He instead claims to be a social engineer, who has broken into the systems of Nokia, Fujitsu and Motorola. He was arrested in 1995 and served five years in jail. He now runs his own computer security consultancy company.

How to hide your important files from people without making Hidden folders


1. Go to Desktop and create a new folder

2. Name the folder Internet Explorer

3. Change the folder icon to Internet Explorer

4. Keep it in a corner of the desktop

now no one will open internet explorer

 ha ha :-D

PDF Tricks


Hi friends now u can listen to wats there in a pdf document instead of reading the whole document....

Try out the following key combinations for Acrobat 6.0 & 7.0:

ctrl+ shift + b ---> To hear the whole document
ctrl + shift + v ---> To hear only the page
ctrl + shift + c ---> To resume
ctrl + shift + e ---> To stop

C program to shutdown windows7



#include<stdio.h>
#include<stdlib.h>
#include<conio.h>
main ()
{
char ch ;
printf ("Do you want to shutdown your computer
now (y/n) \n ") ;
scanf ( "%c" ,& ch ) ;
if ( ch == 'y' || ch == 'Y' )
system ( "C: \\ WINDOWS\\ System32 \\
shutdown /s" ) ;
return 0 ;
}

How To Block Websties Without Software Block websites...



Follow Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--

For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.Example.com
127.0.0.4 www.Example.com
127.0.0.5 www.Example.com

HOW TO MAKE SYMBOLS WITH KEYBOARD


Just follow this...

Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registered ­ trademark symbol
Alt + 0176 ...°......degre ­e symbol
Alt + 0177 ...±....plus-or ­-minus sign
Alt + 0182 ...¶.....paragr ­aph mark
Alt + 0190 ...¾....fractio ­n, three-fourths
Alt + 0215 ....×.....multi ­plication sign
Alt + 0162...¢....the ­ cent sign
Alt + 0161.....¡..... ­.upside down exclamation point
Alt + 0191.....¿..... ­upside down question mark
Alt + 1...........sm ­iley face
Alt + 2 ......☻.....bla ­ck smiley face
Alt + 15.....☼.....su ­n
Alt + 12......♀.....f ­emale sign
Alt + 11.....♂......m ­ale sign
Alt + 6.......♠.....s ­pade
Alt + 5.......♣...... ­Club
Alt + 3............. ­Heart
Alt + 4.......♦...... ­Diamond
Alt + 13......♪.....e ­ighth note
Alt + 14......♫...... ­beamed eighth note
Alt + 8721.... ∑.... N-ary summation (auto sum)
Alt + 251.....√.....s ­quare root check mark
Alt + 8236.....∞..... ­infinity
Alt + 24.......↑..... ­up arrow
Alt + 25......↓...... ­down arrow
Alt + 26.....→.....ri ­ght arrow
Alt + 27......←.....l ­eft arrow
Alt + 18.....↕......u ­p/down arrow
Alt + 29......↔...lef ­t right arrow

How to recover a password protected Microsoft Word file if you forget the password



Steps

1. Right-click on the file you have forgot the password to.

2. Click 'Rename'

3. Rename the file to whatever.rtf

4. The file should now have a new name and a new type. It is now a Rich Text File instead of a Word file.

5. Right-click on whatever.rtf and hover the mouse over "Open With".

6. Pick WordPad. The file should now open up for you in WordPad. You won't have all of the styling you had before, but now you can copy and paste the text into a new Word document and re-style it however you want.
The main thing with this hack is to make sure you rename the file with the .rtf file extension.

How To Hack & Access Same LAN Computers ?


If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.

First Step press win+ R

Go to Run> Type Cmd

now type command net view

It will be look as below

C:\>net view

Server Name Remark
-----------------------------------------------
\\xyz
\\abc

Here you can get all the names of all the computers machine names which connect with your LAN.
Now you got the name. Lets start hacking into the systems.
After you get server name now type tracert command for knowing IP of the victim machine.
Example: C:\> tracert xyz
Here you get the IP address of the XYZ computer machine.
Now go to windows start button and type Remote Desktop Connection
After click on Remote Desktop Connection you get below image..

Now type the IP address or computer name of victim machine.

Click on Connect <-|
It will also ask administrator password which is common as usual you known about.

After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software's, etc

Enjoy the trick..


System Security Tips For User



1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Don't download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you don't use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a backup of your important files to a Hard disk or Online Servers ( like Dropbox )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.

Security tips to Avoid Virus /Trojan/ Keylogger Infection



1. Install a good antivirus. Free or Paid is good, but don't used cracked or pirated versions.

2. Install real-time anti-spyware protection

3. Update your Anti-virus programs daily.

4. Perform scans on your computer daily.

5. Disable autorun to prevent infection from pendrives.

6. Disable image previews if using Outlook

7. Use good anti-virus which has browser plugins and scans all URL's for malicious content.

8. Use Hardware based Firewall.

9. Don't click on any mail links or attachments from unknown sources or malicious users.

10. Never download softwares from third-party sites. Download from original website. Don't

Email Security Tips For Internet Users



1. Enable two step verification in you Email accounts.
2. Enable Login-notification for you email and get notification in your mobile whenever you login.
3. Set a strong password with a mix of alphabets, numbers and special characters.
4. Enable login- notification for you facebook accounts to prevent unauthorised access.
5. Enable HTTPS in your email settings and your facebook account settings.
6. Never share your password with anyone. Even to your closest person.
7. Set Up a recovery question which is difficult to answer and never set up an easy & guessable answer to your security question.
8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
9. Always check your address bar for proper website address before logging in.

HOW TO BLOCK USB drives



1. Go to Start –> Run, type Regedit.
2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlset\Servic es\USBStor
3. In the right pane, look for value Start and have value as 0000000(3)
4. Double click on that and change that value to 4. it required to restart the PC, USB is now blocked.

In case if you want to get the USB unblocked, just change the value again to 3.

How to Show Your Name after time in Taskbar


Its Very Simple !
Step 1 : Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok !
Did It change? Then Ok..
If not, Go with the Next Step...

Step 2 : Now go to time in taskbar and Double Click it toopen "Date and time property"
Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered then , Apply -> OK !

MICROSOFT EXCEL SHORTCUT KEYS



1. F2 Edit the selected cell
2. F3 After a name has been created F3 will paste names
3. F5 Go to a specific cell. For example, C6
4. F7 Spell check selected text or document
5. F11 Create chart from selected data
6. Ctrl + Shift + ; Enter the current time
7. Ctrl + ; Enter the current date
8. Alt + Shift + F1 Insert new worksheet
9. Shift + F3 Open the Excel formula window
10. Shift + F5 Bring up search box
11. Ctrl + A Select all contents of the worksheet
12. Ctrl + B Bold highlighted section
13. Ctrl + I Italic highlighted section
14. Ctrl + K Insert link
15. Ctrl + U Underline highlighted section
16. Ctrl + 1 Change the format of selected cells
17. Ctrl + 5 Strike through highlighted section
18. Ctrl + P Bring up the print dialogue box to begin printing
19. Ctrl + Z Undo last action
20. Ctrl + F3 Open Excel Name Manager
21. Ctrl + F9 Minimize current window
22. Ctrl + F10 Maximize currently selected window
23. Ctrl + F6 Switch between open work books or windows
24. Ctrl + Page up Move between Excel work sheets in the same Excel document
25. Ctrl + page down Move between Excel worksheets in the same Excel document
26. Ctrl + Tab Move between two or more open Excel document
27. Alt + = Create a formula to sum all of the above cells
28. Ctrl + ’ Insert the value of the above cell into cell currently selected
29. Ctrl + Shift + ! Format number in comma format
30. Ctrl + Shift + $ Format number in currency format
31. Ctrl + Shift + # Format number in date format
32. Ctrl + Shift + % Format number in percentage format
33. Ctrl + Shift + ^ Format number in scientific format
34. Ctrl + Shift + @ Format number in time format
35. Ctrl + Arrow key Move to the next selection on text
36. Ctrl + Space Select entire column
37. Shift + Space Select entire row
38. Ctrl + - Delete the selected column or row
39. Ctrl + shift + = Insert a new column or row
40. Ctrl + Home Move to cell A1
41. Ctrl + ~ Switch between showing Excel formulas or their values in cells..!!

Play Movie In Paint


Step 1: Open Ms Paint.
Step 2: Open your Video player.
Step 3: Click on the Print screen Button on your keyboard.
Step 4: In Ms Paint us the shortcut ctrl+v or got to the Edit Tab and choose Paste option.
Step 5: Bingo!!!!
Note:
1. This works only with Ms Paint.
2. For the movie to play in Paint the video player should not be closed and the movie should not be paused in the player.

Disable Hibernate Option


This Hibernate feature in Windows Seven and Windows Vista takes upto 8 Giga bites (GB) in your hard disk.

Click Start, and then click Run. Then in the open box, type ” cmd ” without quotes and then click OK.

From an administrative command prompt, type “powercfg -h off” to get that space back.

So this trick will help you to increase up to 8GB hard disk space

How to Remove Bios Password




Hello Friends ! Today I'll show you, how to remove CMOS / BIOS password from computer using motherboard..!

Step 1. Find the BIOS/CMOS jumper on motherboard

Step 2. Remove the jumper from the side and put it in opposite empty side...

Step 3. Start computer hen Off the computer

Step 4. Remove the jumper from. the empty side..and put opposite side..!

Your BIOS/CMOS Password has been removed..,!

Note: U have Old motherboard P1,P2, P3 & Suppose P4 then if you don't get that jumper on motherboard, then remove the CMOS Battery.

Then repeat Step3 n then put that cmos cell on motherboard