Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Saturday, June 14, 2014

How to tag all the friends in Facebook comments in one go!

Hi all,

Here's a script that you can run in your browser console, and it will automatically tag(mention) all your friends in Facebook comments under a particular post.

This will send them notifications and help you grab instant 'Likes', 'Comments' and 'Shares' on your Facebook posts.

STEP-1
Navigate to that Facebook post.



The URL should look something like this:
https://www.facebook.com/patikgujral/posts/256367601221269 

STEP-2
Open the browser console by pressing F12.




STEP-3

Copy paste the code (I have uploaded it on my Google Drive) into the browser console.
You can find the code HERE.

Press Enter.

Voila! Just sit back and see your friends get mentioned in comments!

Tuesday, July 23, 2013

Fake the Email Id

How to send an email with any email ID !


We can also use this fake mail technique for phishing to make mailer appear as genuine.
It is easy to do..

1.Visit http://emkei.cz/
2. Now enter the name you want to display to the recipient...
3. Enter the email id.


Wednesday, May 15, 2013

Computer attacked?

!!..Signs That Your Home Computer Is Infected By Spyware or Adware..!!

There are a number of indicators you can watch for which will suggest that your computer has been infected by spyware or adware. Please note that some of the symptoms listed below are not unique to just a spyware or an adware infection.

1) PC Performance – Both Spyware and adware consume your PC's resource like computer memory. Abad spyware infection could dramatically slow your computer'sperformance including causing your system's to become increasingly unstable. Spyware also can affect your internet connection speed as it takes up bandwidth to communicate information back to its creator.

2) Pop up Ads – It is highly likely thatyour computer is infected by Adware if you notice more pop upads appearing than usual. In some cases pop ads start appearing on the desktop even if you have not opened a web browser. Alternatively, search results may appear in a pop up or another browser window relative to the website you are visiting or keyword term you have typed intoa search engine.

3) Browser Toolbars – These programs are commonly bundled with free software which the publisher often describes as "advertiser supported." The toolbar then feeds adverts based on the website you visit. They are usually very difficult to uninstall. "180 Search Assistant" and "Huntbar" are example programs.

4) Browser Settings – Your internet favourites or bookmarks and startpage are two main settings whichare targeted by spyware authors. Web sites are inserted into your list of internet favourites in the hope that you will visit them. Browser hijackers change the start page which is visited when the browser loads. Any unexpected change to your start page is a sign of infection.

5) StartUp Programs – Some spyware variants will try to add themselves to your Windows start up program list. If you boot up time becomes noticeably slower then review your program start up list to check for applications you are not familiar with and remove them. This program list can be review using the " MS Config" option from the Windows XP Run command.

6) Software Failure – A spyware infection can cause someof your programs to crash or stopworking. In particular watch if your Internet Explorer browser refuses to work all of a sudden.

7)Hosts File Changes – The Hosts Fileis a Windows file that maps the numerical IP Address to the Host Name very much like the address book on your cell phone "maps" your friend's name to their telephone number. Some spywareprograms can change these setting so that when you type in"www. yahoo.com" for example you are re- directed the spyware author's website.

Sunday, May 12, 2013

HIDE DATA BEHIND IMAGES

Stegaography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

STEP 1: Select the Suitable image to hide your files and copy it to desktop.



STEP 2:
Now Zip the files which you are going to hide and Save in .RAR Format, using WinRAR and copy this compressed file to your desktop.

Friday, March 08, 2013

Boost your Internet Speed

1)   For Windows 7
       Navigate to C:\Windows\system32\drivers\etc\hosts

       On Windows NT it is:
       C:\WinNT\system32\drivers\etc\hosts

      For Unix/ Linux
      /etc/hosts

Thursday, March 07, 2013

What DNS does

A DNS(Domain Name System) converts the user friendly Hostnames(like hotmail.com) which users can understand, to IP Addresses- which the computer systems and networks can understand.

When you type www.hotmail.com in your browser, the browser performs a search (or lookup) to find the machine readable IP Address to communicate with the host(the hotmail server).
So the browser first contacts with the DNS Server set up by your ISP, and tries to look up for the IP conversion of the hostname it wants to contact.