Saturday 7 December 2013

0

SEND FRIEND REQUESTS EVEN WHEN U are BLOCKED..!!

Posted in
This is an working legal trick to send friend request to your mutual friends and unknown people even
you are BLOCKED !!
1.Get the person's email address first .
2.Visit Add Personal Contacts as Friends.
3.Here you can send friend request even if your are blocked by using their email address.
4.If you want to send friend request to lot's of friends here is an quick and easy way to do this.
5.Open up a new notepad file, paste all your friends email separated by comma(,).
6.Save the notepad file with the extension .vcf.
7.This is your list of your contact files containing your friends email address.
8.Go to Add Personal Contacts as Friends click on the last option other tools there you can find upload contact file.
9.Browse your .vcf file and upload to the facebook.
10.It will send friend request to your friend's by email and facebook.

0 comments:

Saturday 30 November 2013

0

How to catch a person who is harrassing on web

Posted in
Leo Traynor, an Internet user inIreland, had a problem. More specifically, he had a troll, a very nasty troll. At first, the troll just sent him nasty messages on Twitter, telling him that he was a “dirty f*cking Jewish scumbag,” for example. Every time Traynor blocked the troll, it would reappear with a new account. (Note to Twitter: perhaps you should let users block the IP addresses associated with harassing accounts, along with the accounts themselves to prevent this from happening.)

Then the troll moved to other forums, spamming Traynor’s blog, sending himFacebook messages, and flooding his email account with “foulmouthed and disgusting comments & images… of corpses and concentration camps and dismembered bodies.” And you thought your email backlog was bad.



Traynor made his accounts as private as possible, so the troll moved on to Traynor’s wife, again targeting her via Twitter. Then the troll switched to real world harassment, sending a package to Traynor’s house containing a plastic box full of ashes and a note, “Say hello to your relatives from Auschwitz.” Traynor details the abuse in a post on his blog. He also describes how he was able to find out who the anonymous harasser was — without legal intervention — and his eventual confrontation with the troll, who wound up being the 17-year-old son of one of his friends. It’s a great and twisted read.



So how did he do it? How did he figure out the identity of his troll without going to court and getting a subpoena to get various tech companies to reveal the identity behind the faceless accounts that besieged him? (And how can you do it too?)


Traynor says he was approached by “a friend, who’s basically an IT genius” who helped him bait and catch his troll. That friend wishes to remain anonymous, but another IT professional, Evert Bopp, outlines the techniques involved on his blog. Here are the steps:

1. Your troll-trap is a blog. If you don’t have one already, you’ll need to set one up.

2. You’ll want to be able to keep track of the IP addresses of visitors to your blog. Programs like AWStats or Webalizer will keep visitor logs for you that will reveal where your readers are coming from. Alternatively, you can hope your troll comments on your blog. If they do, their IP address will be captured and sent to you along with the comment. Yes, readers of the Not-So Private Parts, I see your IP addresses when you leave your (usually delightful) remarks here.


How comments on this blog look to me

3. Lure your troll to your blog. Traynor did so by including links to the blog on Facebook and on Twitter. If you’re very audacious, you could email your troll directly with the link. (Keep your fingers crossed that your troll is not using an IP masker.)

4. Once you’ve captured the IP address, whether from a blog comment or from visitor logs, it’s time to see where it originates from. You can do that onIPTracker. ”It will show you the user’s Internet Provider, a fairly exact location, the map coordinates and a satellite view of their location,” writesBopp. The Google stock advice comment spam above, for example,  appears to originate from an office building in Islamabad, Pakistan, a block away, coincidentally, from Kashmir Highway.

5. Now you may know where your troll lives, and if it’s someone you know in real life, you may already know who it is. Alternately, you can try searching the address online and see if it turns up anyone who seems likely to be the culprit. “Plug the location into Google Streetview and it will give you the actual address,” writes Bopp. “You can then put the address into Google to find out more details.”



“The IP address alone will not lead you to the troll’s address in all cases,” says Bopp in an email. “But it will narrow the location down and using cross-referencing and further research, it is very much feasible to create a profile, extract a name and a location.”

This technique is far easier than the other option: suing your John Doe and going to court to get Internet companies to help you identify him or her. Back in 2010, model-turned-business consultant Carla Franklin was upset by nasty comments about her on YouTube that came, she said, from someone stalking her. A judge ordered Google to hand over the IP addresses behind the nasty comments. Now, two years later, she is finally unmasking the tormenter, who she is suing for stalking, harassment, invasion of privacy, defamation, and identity theft, among other claims.

These were the steps she had to pursue to go after her online harasser. Franklin described by email the two-year-long process involved in outing (and suing) her troll:

Obtain the IP and e-mail account information (which cannot be faked) through court order:
Google (like any only service, i.e. Yahoo, Reddit, etc) only has access to IP addresses, e-mail accounts (for confirmation), and user name (which can be faked).  There were 2 distinct IP addresses
After I won my order against Google, I received the IP and e-mail account information from the company in October 2010.
I did some investigative work and discovered that the internet service providers (ISPs) were 1) Earthlink-home ISP and 2) Wholesale internet – a reseller to the financial services community. So, I knew that my stalker committed the crimes from home and work.
Obtain the home and office address from the ISPs that own the IP addresses:
Through another court order (that I brought by myself), in February of 2012, I subpoenaed Earthlink and Wholesale Internet for the physical street addresses the and client names that were associated with the IP addresses in question (see Exhibit C).  My subpoenas and court order did not contain the name of the person that I suspected of stalking me, only the IP addresses associated with each ISP.
I had each company served by process.  They had roughly 20 days to respond, I believe.
Wholesale Internet contacted the business associated with the IP address and told them that they received a court order regarding a John Doe who was stalking and harassing me, and the IP address linked back to their offices.  The company’s IT team investigated further and found that the IP address for the date in question linked back to the a specific employee’s computer.
Earthlink owned the other IP address, and sent notice to the home address of the account holder associated with that IP address that I had a court order to obtain his true name and address because the IP address had been used to commit a cybercrime.  The account belonged to the same person.
As you can see, the court route is more arduous. Of course, if you have plans to press charges against your troll — or sue him or her — you may need to take the more laborious route to get the evidence to stand up in court.

0 comments:

Friday 29 November 2013

0

9 Reasons to Root Your Android Device

Posted in

To root or not to root? That is the question. Rooting your Android device definitely pushes you up a level or two in your geekdom. It requires a certain level of commitment, at least a little savvy, and even a modicum of risk. So, why would you want to bother?


We've got nine good reasons for you.
What Is Rooting?
We talk about rooting plenty around here, but here's the high-level look for the few remaining uninitiated. Rooting means gaining root access to your device. When you take your phone out of the box, while there are plenty of settings you can tweak, you can only alter what the manufacturer allows you to. By gaining root access you can modify the device's software on the very deepest level. It takes a bit of hacking (some devices more than others), it voids your warranty, and there's a small chance that you could completely break your phone forever. But you know what? It's still totally worth it for all the goodies you get access to.
1. Apps Aplenty
If you've spent much time in Google Play, you know you're not exactly hard-up for good apps. But why settle for good when you can have great. Once you're rooted not only can you get more apps, but the apps you have access to can get way down deeper into your phone's brains. In some cases you'll be able to do things that carriers, manufacturers, and/or Google may not want you to do. Some will allow you to do things of questionable legality. For example,Network Spoofer uses your device to set up a fake wireless network. When your houseguests sign in, you can make ever image they see inverted, or all of the text fuzzy. It's a harmless prank, but of course it could (but shouldn't!) also be used for stealing passwords and other nefarious things.



Where do you find all these root-only gems? Amazingly enough, many of them are still in the Google Play app store. Google's much more relaxed about rooting than Apple is about jailbreaking. Some apps, like Tasker, work for factory-shipped devices as well, but get expanded superpowers when you root.
2. The Latest OS Updates
Dammit, why am I always three updates behind. This may be the most common complaint among Android users, less than half of whom have made it as far as Ice Cream Sandwich. Between the Google, the carriers, and the hardware manufacturers, there are a whole lot of shenanigans behind closed doors that determines when (or if) your phone gets an upgrade. Who has the patience?
Android's developer community, on the other hand, is a hardcore bunch. They're often able to get the new OS onto a phone months before the carrier releases the update, often along with a few bonus features. Once you're rooted, you just have to find the OS version you want (optimized for your specific device), and it's generally extremely easy to install the latest and greatest.
3. Ditching the Skin
Android enthusiasts rightly hate the software skins that hardware manufacturers use to brand their devices. They're often bulky, ugly, unwieldy, or just downright not as clean and functional as stock Android. They're also a big reason those OS updates take so long. You're almost always better off without.



So root! Once you do, you can download and install any number of custom-built ROMs (different versions of the Android firmware). Some of them are highly customized and tweaked to add features, and others are basically just stock Android. Cleaning off an ugly skin can be like a breath of fresh air.
4. Bloat Banishment

Android phones are plagued not only with OEM skins, but with a fistful of superflous apps that you don't want and will never use. Generally, they're just things to get you more entrenched in the carrier's ecosystem. The best part? You can't remove them. In Android 4.1 (Jelly Bean) devices, you candisable those apps so you don't see them, but they're still there, taking up space. Once you've rooted your phone, you can useTitanium Backup to delete them once and forever. Just be careful you don't accidentally delete something that your phone actually needs, or you'll be sorry.
5. Speed/Battery Life Boosts

Phone starting to get laggy? Or maybe you're having trouble making it through the day on a single charge? Rooting allows you to install customized kernels (the software that enables the OS to talk to the hardware, basically) that are optimized differently. Some are made for low-power consumption, and some are built for speed. You can also use an app like Set CPU, which enables you to overclock or underclock your phone's processor, and set rules for usage.For example, you can set your processors to go into overdrive when you're playing a graphically intensive game, but have them draw the bare minimum power when the screen is off.
6. Extreme CustomizationAndroid is already the most customizable mobile OS out there, which is one of its big draws, but if you root your phone you can really go nuts. If you want a total change, you can download custom ROMs that look nothing like Android at all. Want your device to navigable entirely by gestures? No problem, just install GMD Gesture Control (see video). Prefer a sliding keyboard when you're in portait mode, but a tapping, predictive keyboard when you're in landscape.Keyboard Manager will automatically switch between your keyboards of choice whenever you rotate your phone. You can also add features like widgets in your notification bar, or can change the way certain features look or behave, like the lock screen, or notification bar. The sky's the limit.
7. Infinite Features
Beyond just customizing your phone's existing features, rooting helps you pile on all kinds of wonderful new weirdness. You'll love it.
Want to hook up your PlayStation controller to your phone for better gaming? You can. Want to set rules for callers to decide who can and can't call you when? Why not. Maybe your carrier has blocked certain apps, or an app isn't available for the country you live in? There are Market Enabler apps that trick your phone (and Google) into thinking it's on another carrier or in a far off land. Nervous about connecting to the public Wi-Fi? Wifi Protector will keep you safe from all kinds of ARP, DOS, and MITM attacks. Or, you could put the new Android 4.2 camera on your non-Jellybean phone. Accidentally deleted something you wish you hadn't? Undeletemight just save your bacon. The possibilities are virtually limitless.
8. A Free Wi-Fi Hotspot
9 Reasons to Root Your Android DeviceYou probably know that your phone can function as a Wi-Fi hotspot, allowing you to get your laptop (or tablet, or whatever) online wherever your phone has a data connection The catch? Most wireless carriers charge you $10 a month or more for that privilege, on top of your regular data plan. With a rooted Android device, however, you can simply download Wireless Tether (yep, right from the Android Market), create your own mobile, encrypted Wi-Fi network, and your carrier will be none the wiser.
If you do tether multiple devices to your liberated phone, just make sure you don't go over your monthly cap. Data goes down a lot faster on a laptop.
9. Better Backup
There are apps out there that kiiiiinnnnda back up your phone, but generally it's pretty surface level stuff (contacts, pictures, music, etc.). Once rooted you can go way, way deeper. Grab an app called Titanium Backup. Not only can it back up all of your apps, but it can back up all of the information stored in those apps. So if you've been doing great in Temple Run but you want to wipe your phone and start fresh, you can use Titanium to back up and then restore the game, and you'll be right where you left off. It's a nice security blanket if you're going to be messing around deep in your phone's brain.               In spite of all these benefits, only you know whether rooting is right for you. For some people it's just not worth the time and effort. For others, it's a godsend that allows them to use their phones in a better way and for a longer time. If you decide to take the plunge, read up and make sure you follow instructions carefully. After that, go hog wild. It's your phone, after all.

0 comments:

Thursday 28 November 2013

0

How to send .exe files via g-mail

Posted in , ,
We know that Gmail doesn't allow many of the .exe files to send via E-mail because they know many people will spam with that files. Here is the trick to send .exe files via G-mail.

As we all know that Gmail don't allow to send executable files. When user will try to send it, everything will work fine until sending it, but when user will click on send button it will display message as "hack.exe is an executable file. For security reasons, Gmail does not allow you to send this type of file." So
that means user can't send .exe files. I'm sharing one trick by which user can easily send any type of attachment through gmail. Follow these steps:

    Select file which you wanna to send. Suppose I selected hack.exe
    Now Go to Folder Option( Type control in run, then look for folder option).
    Go to view tab
    Uncheck, hide extensions for unknown file types. Apply & then Ok.
    Now rename the file hackerlov.exe with hackerlov.ex
    To receiver inform about changing extension & ask them to renamed it with .exe extension.
    That's all.

You can also send it via winzip or winrar, but some time Gmail scans internally in these files too.
If it scans internally too....then you can't  send them.

0 comments:

Wednesday 27 November 2013

0

How to Root Your Android Device?

Posted in

Root rights are superuser rights, in other words, you get full access to all functions and settings of your phone.



In order to get root rights, you need to do the following:

1. Download and extract the archive with drivers for your device to your PC.
Also you can download them from the manufacturer’s official website. Download drivers for ADB and your device (125 MB).
2. Install and run the “Unlock Root” application on your PC.
3. Select the USB connection mode on your phone  (“USB debugging mode”). You can do this from the “Settings” menu -> Applications -> Development (or Developers functions) -> USB debugging.
4. Connect your phone to PC via USB cable.
5. Run the “Unlock Root” application that you have already installed. When the application finds your device, hit the “Root” button,
6. When the unlocking process is complete, restart your phone.


0 comments:

Tuesday 26 November 2013

1

Nokia mobile Unlock Code Generator v3.10

Posted in

Nokia Mobile Unlock code generator unlocks the Nokia cell phones and help us to use any service provider we want. This application will generate network unlock codes for your mobile phone which you simply enter into the phone keypad to unlock your phone to all networks.


Nokia Free unlock codes calculator  allow users to use their mobile phone with any service provider around the world.


It helps in Repairing, removing  SIM restrictions and unlocking Nokia, Samsung, Siemens, Maxon, NEC, Sony, Panasonic, Vitel, AEG / Telital, Alcatel cellphones.


How to use Nokia mobile Unlock code generator:
1. Remove your sim card and switch on the phone.
2. Type *#06# to get phone serial number and enter this into the program along with your phone model number and current network.
3. Extract and Install the Nokia Phone manager. The click on Nokia Free Unlock.exe(by default C:\Program Files\NokiaFREE Unlock Codes Calculatorto start it.
4.  Now select your Mobile model(If not found select DCT2 or DCT3 or DCT4 accordingly).
5. Now Enter your IMEI number in the IMEI box.
6. Click on calculate button and you will receive a list of unlock codes
    (I usually find that either the first or last code works fine)

7. Now you have the list of codes, enter the code into your phone (use the * key for the pw+ characters) 


8. Your phone will say something like 'sim restrictions lifted' and then reboot itself 


That's it you can now use any sim card in your phone.

I hope you all liked it... If you have any issues with tool usage or about its working ask me in form of comments.

1 comments:

1

Use your Phone as a Keyboard and Mouse

Posted in

Wi-Fi Mouse, is an Android app which transforms your phone/tablet into a wireless mouse, and keyboard using this app. Wi-Fi Mouse supports speech-to-text as well as multi-finger track pad gestures. It enables you to control your PC, MAC or HTPC effortlessly through a local network connection.

Compatible with XP/Windows/Mac OSX.                          How to use Wi-Fi Mouse
1) Install Wi-Fi Mouse app from Google Play and install in your Android Phone/Tablet.
2) Then Download Mouse Server and install in your PC/Laptop
3) Run Mouse Server as Administrator.
4) Open Wi-Fi Mouse app in your Android phone and connect to the PC IP Address. It will take few seconds to connect, now enjoy your new touchpad, Mouse, Keyboard.

Note: Make sure your phone and PC/Laptop are in the same network and check Mouse Server is not blocked by Firewall.

1 comments:

1

How to access torrent sites like piratebay, kickass torrents if you’re on Virgin Media, Sky, BT, TalkTalk, Plusnet,

Posted in ,


On the 30th April 2012 the high court ruled that UK internet service providers Sky, Everything Everywhere, TalkTalk, Telefonica O2 and Virgin Media must all prevent their users from accessing The Pirate Bay. BT, the sixth internet service provider, requested more time to consider their position on blocking the site.
Unfortunately the chief executive of the British Phonographic Industry, Geoff Taylor, said “The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale.” however as everyone knows there is no illegal content stored on The Pirate Bay’s servers, or indeed our server, as it is all stored on the peer-to-peer network.
1329925452pirate-bay-wallpaper11
Censorship is not the way forward. Circumvention is inevitable due to the nature of the internet. Why should you let corporate interests decide what you can and can’t see?
On Wednesday 2nd May Virgin Media implemented their block. On Wednesday 9th May the ISP Everything Everywhere that owns Orange UK implemented their block.
This site was set up to ensure continual access to The Pirate Bay without interruption that the ISP blocks will put in place. The site is exactly the same as The Pirate Bay, we are not mirroring their content, instead we are relaying your requests through our server to The Pirate Bay’s real servers in Sweden. We are interested to see whether ISPs will stop routing traffic to The Pirate Bay’s IP addresses, or whether they’ll transparently proxy traffic to an error page, or perhaps if they haven’t even thought it through, poison their DNS servers.
We’re currently managed by Torrenticity, an organisation that manages a number of the world’s biggest torrent proxy sites. Our proxies serve millions of people each month, and we’re proud to be leading the way against censorship of these torrent sites by providing easy access.
As you may have noticed, Virgin Media, Sky, TalkTalk, Virgin Media, O2, Be, Plusnet, Post Office broadband, Orange and T-Mobile and others, just started blocking The Pirate Bay.
If you (like me) are in the UK, and if you (like me), find that your ISP is complying with the court order to censor access to The Pirate Bay, here are two new IP addresses added by TPB, which are not blocked. Now that IPv6 is a reality, there are likely several billion more at their disposal. There’s also a Pirate Party UK proxy (and the UK Pirates are getting lots of new members from this action). Information may not want to be free, but people surely do
Unfortunately, now the proxies are being threatened – this may be a time to take a look at http://www.pirateparty.org.uk/help and see whether you are able assist.
There are various ways to bypass the block, but let’s start with the easiest way to get around your ISPs blocking – here are some links to some very simple proxies and mirrors you can use to get on the site:
More mirrors and ways to access it here:
Kickass Torrents Link:

1 comments:

1

Hack Administrator from Guest

Posted in
Guys,
Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure.


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...


-----------------------------------------

ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.



EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

1 comments:

0

Be ANONYMOUS Online

Posted in
This is a simple tutorial on how to become anonymous online and add a proxy to your chosen browser.
To get a proxy list use google or these sites http://spys.ru or http://proxy-list.org.
WINDOWS:
This guide shows you how set up your browser to work with an (anonymous) HTTP proxy server.
The proxy address along with the port number should look like this:
124.37.94.216:1789
The address is “124.37.94.216″. The port is the part behind the colon, “1789″.
Caution: Please do not attempt to use the above example as it is only numbers pulled from the air and not intended to be used).
Please note: Sooner or later your proxy will stop working or it may not work from the start … even if you properly tested it first. Regardless, when it doesn’t work, simply repeat the process with another proxy.
Firefox 2.x and 3.x
Setting up Mozilla Firefox to use a proxy is a simple and straight forward task. It only differs a bit on each operating system.
  1. Run Firefox.
  2. Click Tools from the menu bar.
  3. Click the Options menu item.
  4. Now click the Advanced icon at the right side.
  5. Click the Network tab.
  6. In the Connection field, click Settings
  7. Click Manual proxy configuration:
  8. Enter your selected proxy it in the correct field. The first field is the address, the second field is the port. If you are using a HTTP proxy then click the box for, “Use this proxy server for all protocols“.
  9. Click OK.
  10. Click Close.
It should not be necessary to restart Firefox.
* * * * * * * * * *
Internet Explorer 5.x, 6.x, 7.x with a LAN, DSL or Cable connection:
This method will only work when you are not connected over a dial-up modem. If you are using a dial-up modem, look at the instructions below.
  1. Open Internet Explorer.
  2. Click the Tools item in the menu bar, in Internet Explorer 7 it is a button at the right side.
  3. Now click the Internet Options menu item.
  4. Click the Connections tab.
  5. In the “LAN-Settings” field, click Settings
  6. In the Proxy server field, make sure the Use a proxy server for your LAN box is checked.
  7. Enter the the proxy’s IP in the Address box, and the Port in the Port box.
  8. Click OK.
  9. Click OK again.
It should not be necessary to restart Internet Explorer.
Internet Explorer 5.x, 6.x, 7.x with a Dial-up modem:
  1. Open Internet Explorer.
  2. Click the Tools item in the menu bar, in Internet Explorer 7 it is a button at the right side.
  3. Now click the Internet Options menu item.
  4. Click the Connections tab.
  5. In the “Dial-up and Virtual Private Network settings” field select the connection which you are using by clicking at it.
  6. Now click Settings in the “Dial-up and Virtual Private Network settings” field.
  7. In the Proxy server field, make sure the Use a proxy server for this connection box is checked.
  8. Enter the the proxy’s IP in the Address box and the Port in the Port box.
  9. Click OK.
  10. Click OK again.
It should not be necessary to restart Internet Explorer.
MAC OSX:
Firefox 2.x and 3.x
  1. Click Firefox in the menu bar.
  2. Click the Preferences menu item.
  3. Now click the Advanced icon at the right side.
  4. Click the Network tab.
  5. In the Connection field click Settings
  6. Click at Manual proxy configuration.
  7. Now, according to the proxy type you use, enter it in the correct field. The first field is the address, the second field is the port.
  8. Click OK.
  9. Click Close.
It should not be necessary to restart Firefox.
* * * * * * *
ADDITIONAL NOTES:
If you have cookies left in your browser, sites may identify you by using them. Therefore, if your goal is to be anonymous, then delete all cookies before using an anonymous proxy. You can also be identified as a specific user if you login to your existing accounts with your proxy connection, if you have previously logged in with your (real) IP. As a result, you always sign up for new separate account that you use only with your proxy or proxies.
ALERT: If anonymity is your goal, never use a proxy without first testing it. Proxies die quickly and/or their status can change momentarily from anonymous one minute to transparent the next.
source: numerous, gathered over time and experience

0 comments: