Labels

Sunday, 26 August 2012

Scan your Stuff In facebook With Norton App

Norton one of the most finest anti-virus
you have a habit of scaning virus in pc but now its time to scan the feed in social network
mainly facebook with its new application see this link Click Here To Scan

Lost your Friends numbers then use this app

Getting all of those phone numbers is just part of the equation though — they need to wind up on the phone itself, which more often than not means scrolling down a huge list of names and numbers and punching them all in by hand. I’m not sure that’s anyone’s example of a good time, but a newly-minted service called NeedNUMBERS click here

Wednesday, 22 August 2012

upgrade of backtrack

just as you change trend of ur lifestyle......
so..its tyme to change your device trend...
upgrade backtrack linux R-2 to R-3

Click here to instructions and steps for upgrade

send 50 sms by gmail :)


You can send SMS messages to your contacts’ mobile phones using Gmail Chat. To do so from Gmail:
  1. Enter your contact’s name in the ‘Search or invite friends’ box in Chat, and select Send SMS from the box of options that appears to the right of your contact’s name. Or, if you already have a Chat window open for this contact, just click Options, and select Send SMS.
  2. In the dialog box, enter a phone number in the ‘Send SMS messages to this number’ field. This feature is only launched in selected countries. Click here for the list of supported countries and operators. If you are not located in one of these countries you can still use it, but you won't see the SMS option in Chat until you enable it manually in the Chat settings page.
  3. Click Save.
  4. A Chat window appears. Just type your message as you would normally. When you hit Enter, the message will be sent to the phone number you entered.
If your contact replies, the text message response will appear as a reply in Chat. These conversations are stored in your Chat history just like regular chats (but keep in mind that you can’t go off the record while communicating via SMS).
SMS charges: Google does not charge for using this service. However, mobile providers' standard charges will apply to any SMS messages sent from a mobile device to Google Chat. Please check your mobile provider's price plan for details.
Note regarding mobile phone subscribers in North America: depending on which mobile plans your contacts in North America have, they may be charged by their mobile providers for receiving text messages.
Note regarding phone subscribers of Pelephone in Israel: your contacts on the Pelephone network will receive your SMS messages for free, and will be charged for replying according to Pelephone's pricelist for core service. Special rates and packages do not apply.
Note regarding mobile phone subscribers in Zambia: your contacts in Zambia will receive SMS messages for free, and will be charged for replying according to their operator's price for sending an international SMS to the USA.

Wednesday, 8 August 2012

Mobile Zeus Malware on BBM

A new form of the infamous Zeus banking Trojan has been uncovered targeting Research in Motion's (RIM) BlackBerry devices, according to Kaspersky Lab.

The Kaspersky researchers reported finding several new samples of the Zitmo (Zeus in the mobile), one of which was targeting the BlackBerry platform, on Tuesday.

The Zitmo variant has reportedly been operating for at least two years targeting Android phones by masquerading as banking security application or security add-on.

Previously the BlackBerry ecosystem has not been a common target for attackers, despite its ties to several high-profile government and financial institutions.

This is largely due to BlackBerry devices running on RIM's corporate servers with strong security, which includes a number of features like file encryption, password security and remote wipe powers.

The new Zeus variant shares its predecessor's goal and is mainly designed to steal online banking credentials from users. The new version targeting BlackBerry devices reportedly does this by forwarding incoming SMS messages to the command and control device operated by the criminals.

The tactic is designed to help the criminals circumvent the out-of-band authentication systems used by many European banks, by hijacking the one-time password authentication password sent via SMS.

The Zeus variants discovery comes amid widespread reports from security vendors that mobile malware levels are booming. The majority of the attacks are reported to be targeting the Android ecosystem, a pattern that will likely continue in the near future, according to security firm Trend Micro, which published its own threat report in July.

Thursday, 12 July 2012

Finding serial key Or Crack easily

* Go to Google.


* In the search field type : "Software name" 94FBR


* Where, "Software Name" is the name of the item you want to find the serial number for.


* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !!  :-)




WEBSITES FOR KEYS

   * www.serials.ws
    * www.keygen.in
    * www.smartserials.com
    * www.keygenguru.com - Popular site with hundreds of thousands of results.
    * www.serialkey.net
    * www.zcrack.com
    * www.subserials.net
    * www.serialportal.com
    * supercracks.net
    * www.serialcrackz.com
    * www.serials.be
    * www.cracktop.com
    * www.cracksfm.com
    * www.cracklib.net
    * www.crackdb.org
    * www.theserials.com

Tuesday, 10 July 2012

Chrome for mobile and tablet !!!

hey guys..are you a Chrome Lovers and fed up with UC and opera and thought of getting Chrome then your search is here !!!!! click on below link for google chrome 
Click here and Get Chrome For Mobile or tablet

Monday, 9 July 2012

Methods OF DDOS ATTACKS


Methods of attack

A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services.
A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:
  1. Consumption of computational resources, such as bandwidth, disk space, or processor time.
  2. Disruption of configuration information, such as routing information.
  3. Disruption of state information, such as unsolicited resetting of TCP sessions.
  4. Disruption of physical network components.
  5. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:
  • Max out the processor's usage, preventing any work from occurring.
  • Trigger errors in the microcode of the machine.
  • Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up.
  • Exploit errors in the operating system, causing resourceand/or thrashing, i.e. to use up all available facilities so no real work can be accomplished.

PEER--PEER ATTACK

  • Crash the operating system itself.Attackers have found a way to exploit a number of bugs in peer to peer servers to initiate DDoS attacks. The most aggressive of these peer-to-peer-DDoS attacks exploits DC++. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While a typical web server can handle a few hundred connections per second before performance begins to degrade, most web servers fail almost instantly under five or six thousand connections per second. With a moderately large peer-to-peer attack, a site could potentially be hit with up to 750,000 connections in short order. The targeted web server will be plugged up by the incoming connections.
    While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses, there are other problems to consider. For instance, there is a brief moment where the connection is opened on the server side before the signature itself comes through. Only once the connection is opened to the server can the identifying signature be sent and detected, and the connection torn down. Even tearing down connections takes server resources and can harm the server.
    This method of attack can be prevented by specifying in the peer-to-peer protocol which ports are allowed or not. If port 80 is not allowed, the possibilities for attack on websites can be very limited.

Friday, 6 July 2012

check is your pc safe from july 9th fbi quest

due to dns malware many systems are gonna hit with no internet
check whether your pc is in the list or not

CLICK HERE TO KNOW

hack vps

OPEN vnc_scanner_gui


























































# CHOSE THE STATE YOU WONT
# CLICK  Get diap list
# AFTER THAT CLICK  start scan
# AFTER SCAN CLICK  start Praser
# THE IP LIST WILL BE SAVED IN  IPs.txt



YOU NEED TO GENERATE IP USERS AND PASSWORD JUST CLICK GENERATE


























# CLICK  Ip YOU NEED TO UPLOAD THE IP SCAN FILE 
# YOU NEED TO UPLOAD USERS AND PASSWORD IN THE OTHER TABS
# CLICK Make
# AND  Exit

































click on config


























 chose the threads number 
 click  ok 


CLICK START
and wait !!!!! you will hack it after 4-5 hrs !!!!

jntu results

jntu 2-2 results batch r09 enjoy results......

Thursday, 5 July 2012

Create a Standard Ghost Boot Up



This trick shows you how create a standard Symantec Ghost bootup floppy set (i.e. without Network). The "Standard Ghost Boot Disk" option from Symantec Ghost allows you to create a set of 2 bootable floppy disks to use with Ghost tools for backup/restore hard drives and partitions.
The "Standard Ghost Boot Disk" does not allow you to access the network resources (i.e. GhostCast), but it does allow you to read and write from your CD-ROM and DVD drives as well as USB external drives.
Use this trick at your own risk.
 
1)Open the "SYMANTEC GHOST BOOT Wizard"








2) select "STANDARD GHOST BOOT DISK" and click "NEXT"


3)Leave the default options as is and click "Next".
Note that even though you are not selecting the "USB Support" option on this screen, you'll still be able to access your USB external devices. The "USB Support" option here is for "Peer-to-peer".




4)Click "Next" on the next screen to "Use PC-DOS"


5)On the next screen, you'll need to specify where the file "ghost.exe" is located. This file is normally installed to a path as example below, but you should double check. Then click "Next".

6)Click "Next" on the next screen to use default options for external storage devices


7)Click "Next" on the next screen:


8)click "NEXT" on review screen


9)A message will display telling you that you will need two floppy disks. Click "OK".


10)The Boot Disk Wizard will start to erase your floppy and create the boot data. Once it's done with the first disk, it will prompt for a second one.




Wednesday, 4 July 2012

Oracle 10g Mysql plus Login Problems


Login Problem to Oracle 10G (SQL Plus)

How to do it?

1. Logon to the database using SYSTEM or SYS account 
2. Unlock the account alter user <username> account unlock; 

Example: 
SQL> conn scott/tiger@oradb13 
ERROR:
ORA-28000: the account is locked 

Warning: You are no longer connected to ORACLE. 
SQL> conn system@oradb13 
Enter password: ****** 
Connected. 

SQL> select username, account_status from dba_users 2 where username = 'SCOTT'; 


USERNAME                 ACCOUNT_STATUS 
-------------------------------------------------------------- 
SCOTT                          EXPIRED & LOCKED 


SQL> alter user scott account unlock; 
User altered. 
SQL> select username, account_status from dba_users
2 where username = 'SCOTT'; 


USERNAME                 ACCOUNT_STATUS 
-------------------------------------------------------------- 
SCOTT                          EXPIRED 


SQL> conn scott/tiger@oradb13 
ERROR: 
ORA-28001: the password has expired

Finally
  1. Close Sql Application
  2. Reopen The application
  3. A screen will appear to change password 

Changing password for scott 
New password: ***** 
Retype new password: ***** 
Password changed 
Connected. 
SQL>

How to know your own number or else sim number which you have

FOR AIRTEL
send a blank message to 59103 you will get message from your number
FOR Reliance
just dial *1# number will be displayed on screen
BSNL
*888#
VODAFONE
*131*0#
and also
IDEA
*1#
VODAFONE in some circles
*777*0#
TATA DOCOMO
*580#
AIRTEL
*140*1600#
AIRCEL
*#1#888#

Tuesday, 3 July 2012

Avoid Game Requests in facebook !!!

i am here to explain how you can stop game requests for the game you have played in past
now a days many are sending game requests even if you are not intrested in playing that game
here is the simple trick
just in your wall u can see the tag called "APPS"
below that there are game's listed which you have been played
go to left side of "Game name" which you want to stop















CLICK ON REMOVE APP
now successfully you have done your task !!!! njoy

How To remove suspicious applications in Facebook

many applications like video apps...are posting **** or above 18 videos without informing you..so that your friends will notice about this
inorder to remove those applications
first step is " ENABLE SECURE BROWSING "
second step is "Go To Account Settings > Click On APPs > check for your APP which you want to DELETE > Click on EDIT (or) X button on the desired APP
now it is done...!!!!!

Saturday, 30 June 2012

VLC player Streaming TV channel Links

V_L_C PLAYER TV
Here is the List of many other channels which you will love to watch
Channel Name
Link
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp
ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp

Friday, 29 June 2012

Avast Anti virus licence key for 6.0 version

Version of AVAST 6 : Activate your Avast Antivirys [HOME EDITION] till 2038 Using Serial key I got the license key from internet to activate licence of avast antivirus upto 2038.When i have tested this key its works for me and I am also able to update antivirus daily.That means avast is not blocking this key. And apparently, the license key can also be used to Avast 4.8, Avast 5 andAvast 6.Just Download the avast antivirus from below and activate it using following key..:D Here is the Avast License Key: 
"W6754380R9978A0910-4TZ59467 "
download here

click here to download



Thursday, 28 June 2012

Auto Shutdown For your PC

How To Auto Shut Down Your PC At A Fixed Time or how to set a alarm for shut down you PC, suppose you are downloading a file may be movie or game via torrent and for a reason you have to go outside but you want to keep you downloading alive for next 1 or 3 hour then what to do ? For this case i have special software , in which you can set a time to shut down you PC as like setting alarm.
download the software from 
CLICK HERE


Wednesday, 27 June 2012

Recover Bluetooth Tray icon

1. Back up the Registry by creating a restore point. 
2. Go to Start > Run (or Windows-key + R), type in regedit and hit OK. 
3. Navigate to the key HKEY_CURRENT_USER\Software\Cla sses\Local Settings\Software\Microsoft\Wi ndows\CurrentVersion \TrayNotify. 
4. Delete the values IconStreams and PastIconsStream. 
5. Open up the Task Manager (Ctrl + Shift + Esc), go to the Processes tab, select explorer.exe and click End Process. 
6. Open the Applications tab and click New Task at the bottom-right of the window. 
7. In the message box that pops up type in explorer.exe and hit OK. 
8. Explorer.exe will reload, and the missing icons should now be back in the system-tray where they belong. 
9. Then if the volume bar isnt there, go to taskbar properties (where the volume was gray) and simply tick the box.

Free 4GB of 3G Airtel Data bundle in airtel nigeria


How to Get Free 4GB of 3G Airtel Data Bundle
1. If you have not already, you need to get 3G activated on your phone. To activate it, SMS 3G to 121.
2. Wait till you receive a message from Airtel Nigeria
3. You will receive different options for the 3G and you need to choose just one of them
4. Choose 1 for 3G data plans
5. Again, choose 12 for 2.5GB or 13 for 4GB
6. That is all.

Get Back Your email id in facebook


 Luckily, it's easy to get your old email address back on your profile:
  1. Click "About" on your profile and scroll down to your email address. Click "Edit" to change them.
  2. Click on the circle next to your Facebook email address and change its setting to "Hidden From Timeline".
  3. Click on the circle next to your other email addresses and change their settings to "Shown On Timeline".
  4. Click the Save button at the bottom of the Edit popup (Don't forget this step).

Find Friends who are Nearby using facebook


The app, which is available online as well as on Facebook’s Android and iOS versions, is opt-in. That's something of a rarity for new Facebook products, but given how sensitive the information being shared is, it makes sense that Facebook would avoid the usual privacy backlash it faces whenever it launches a product that automatically shares your data.
While logged into Facebook, you also log into the Find Friends Nearby app. After a few seconds, anyone in your vicinity who also has the FFN page open should appear on the list.
We haven’t been able to test it thoroughly yet, for the simple reason that the app is so new (and apparently still in development) that no one came up in the list when we took it for a test run. It’s also not clear what range Facebook uses to define “nearby.”

new version of android

New version of ANDROID evolved....its 4.1 JELLY BEAN

CLICK HERE TO C

Facebook Color Changer

If you are Quiet hectic with the FACEBOOK background color
then change it to your own color 
CLICK HERE

Tuesday, 26 June 2012

Customize your facebook Login page

To customize Facebook Login page you have to download and install this extension for Google chrome from here named FB Refresh .Now just set the background image URL and Customize Your Facebook Login Page.https://chrome.google.com/webstore/detail/bdlfdaajmclngiomogmleihllaejcnni

check whether ur facebook account is hacked or not

many hackers trying to block your account in the name of phishing....
to know whether your account is hacked or not just go to
1.account settings
2.select security 
3.enable the secure browsing
4.enable the login notifications
5.when u c down you will notice ACTIVE session
6.clik on edit then it will show the I.P ADDRESS of the system from where you have logged in...
7.If you notice other systems..then clik on remove :)

To find Hidden folders or files in ur pc

follow this Steps:

Go to start->run
Type as cmd and hit enter
Now command prompt will be opened.
Navigate to any folder using cd command
and type this command "dir/ah"(without quotes)
Now hit enter.
You can see list of directories and files.

You can arrange in tabbed view.
for that type as "dir/ah/p/w" and hit enter

get airtime.....in airtel nigeria


Step 1: First, you need to be on the Airtel 2Good Plan. To migrate to this plan (if you are not on this plan already), dial *446# on your phone and send.
Step 2: Next, buy just N100 airtime and load it. If you already have airtime on your phone, you can also use it. But make sure it is up to N50.
Step 3: Then call any other number (airtel/zain line is better) for about 1 minute.
Step 4: While calling the number, dial *447#. Doing this will migrate you to another plan called Airtel Big Family while the call is still on.
Step 5: End the call after about 1 minute.
Step 6: Dial *123*9# to check your bonus and you should be credited with N3,860:60k worth of credit.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Blogger Templates