Saturday, June 14, 2014

How to tag all the friends in Facebook comments in one go!

Hi all,

Here's a script that you can run in your browser console, and it will automatically tag(mention) all your friends in Facebook comments under a particular post.

This will send them notifications and help you grab instant 'Likes', 'Comments' and 'Shares' on your Facebook posts.

Navigate to that Facebook post.

The URL should look something like this: 

Open the browser console by pressing F12.


Copy paste the code (I have uploaded it on my Google Drive) into the browser console.
You can find the code HERE.

Press Enter.

Voila! Just sit back and see your friends get mentioned in comments!

Saturday, March 01, 2014

Disable Autoplay Facebook Videos in News-Feed

Facebook has lately implemented Adobe Flash Player to directly play the videos in the news-feed. But sometimes it is really annoying especially if you have a limited internet plan or connected to an access point that is powered by mobile data(usually limited and costs dearly).

So, I have figured out a way to disable the 'Autoplay' feature of the videos in the news feed. Ultimately, it should be my call to play them or not. Right?

Assuming that you are using Google Chrome, just follow the simple steps:

Sunday, December 08, 2013

Yes! You are HACKED! (PART-5)

The FINAL post of the 'Yes! You are HACKED' series.

Sure sign of system compromise No. 9: Your antimalware software, Task Manager, or Registry Editor is disabled and can't be restarted
This is a huge sign of malicious compromise. If you notice that your antimalware software is disabled and you didn't do it, you're probably exploited -- especially if you try to start Task Manager or Registry Editor and they won't start, start and disappear, or start in a reduced state. This is very common for malware to do.

Saturday, December 07, 2013

Yes! You are HACKED! (PART-4)

Part 4 of Yes!You are HACKED series!

Sure sign of system compromise No. 7: Unexpected software installs
Unwanted and unexpected software installs are a big sign that your computer system has likely been hacked.
In the early days of malware, most programs were computer viruses, which work by modifying other legitimate programs. They did this to better hide themselves. For whatever reason, most malware programs these days are Trojans and worms, and they typically install themselves like legitimate programs. This may be because their creators are trying to walk a very thin line when the courts catch up to them. They can attempt to say something like, "But we are a legitimate software company." Often times the unwanted software is legally installed by other programs, so read your license agreements. Frequently, I'll read license agreements that plainly state that they will be installing one or more other programs. Sometimes you can opt out of these other installed programs; other times you can't.

Tuesday, November 26, 2013

Yes! You are HACKED! (PART-3)

Yes! We are back with the PART 3 of the series 'Yes! You are Hacked!'
In case you missed the earlier posts. you reach both PART-1 and PART-2 here.

So after having posted the 4 signs of your system being compromised, here comes the fifth and the sixth!

Sure sign of system compromise No. 5: Your friends receive fake emails from your email account
This is the one scenario where you might be OK. It's fairly common for our email friends to receive malicious emails from us. A decade ago, when email attachment viruses were all the rage, it was very common for malware programs to survey your email address book and send malicious emails to everyone in it.

Sunday, November 17, 2013

Yes! you are HACKED! (PART-2)

Missed PART-1? Read it HERE!
So, here comes PART-2 of 'Yes! You are HACKED!' series. Read on, it may be possible that you may be a victim and you don't know!

Sure sign of system compromise No. 3: Redirected Internet searches
Many hackers make their living by redirecting your browser somewhere other than where you want to go. A hacker gets paid by getting your clicks to appear on someone else's website, often those who don't know that the clicks to their site are from a malicious redirection.

You can often spot this type of malware by typing a few related, very common words (for example, "puppy" or "goldfish") into Internet search engines and checking to see whether the same websites appear in the results -- almost always with no actual relevance to your terms. Unfortunately, many of today's redirected Internet searches are well hidden from the user through use of additional proxies, so the bogus results are never returned to alert the user. In general, if you have bogus toolbar programs, you're also being redirected. Technical users who really want to confirm can sniff their own browser or network traffic. The traffic sent and returned will always be distinctly different on a compromised computer vs. an uncompromised computer.

Saturday, November 09, 2013

Yes! you are HACKED! (PART-1)

Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a full restore -- but again, a full restore is always a better option, risk-wise.

Monday, August 05, 2013

IOS Jailbreak

What is JailBreak?

Often hear the word JailBreak?What does it actually mean?

iOS is Linux based. Which means that it has to be open-source. But to protect the amature users, it comes with different security levels. Also this prevents the hackers from intruding into the devices. Now how does Apple do that?

Tuesday, July 23, 2013

Fake the Email Id

How to send an email with any email ID !

We can also use this fake mail technique for phishing to make mailer appear as genuine.
It is easy to do..

2. Now enter the name you want to display to the recipient...
3. Enter the email id.

Wednesday, July 10, 2013

Creating a "CON" Folder in Windows !!!

Ever tried making a folder with a name "con" or any folder with names such as “prn”, “nul” “com1″, “com2″, “lpt1″...  and sadly failed --- "the specified  device name is invalid". Now the question arises Is it impossible to create folders with such names in windows? "

Well the answer is NO and YES !!! 

NO because, when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try to renaming it any number of times. Where as in case of Windows Vista and Windows 7, when you try to rename the file you get an error message saying “The specified device name is invalid”.

What is the reason behind this? Simple, these names represent the internal devices of the operating system and hence we cannot create folders with the above names.
YES because it is still possible to create these folders using some simple methods as explained below:

Tuesday, July 02, 2013

Repair Your Computer

Some Common PC Errors and Their Solutions

Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection

Problem in BIOS or RAM (Basic Input Output System)

Key Board Problem (i.e.: Some Key is pressed for Longer time)

Sunday, June 16, 2013

Command Prompt in Different colors

How to Use Command Promt In different Colors (Other Than Black) !!

Generally Ms Dos is in black color but if you want to use it in Different Colors just for a change then follow the Below Simple Steps:

Step 1: Click on Start > Run and then Type Cmd, Press enter.
 Command Prompt will open up.

Step 2: Now type "Color z " and click enter.

Saturday, June 15, 2013

ERROR: Missing .dll file

4 best website that will help to find missing dll files**

There Have been a lots of situations that You get a missing DLL Files Error When Trying To install A software or maybe a game, and one of the most famous of the missing DLL files error you receive is :

* (Msvcr71.dll is Missing)
* (D3dx9_41.dll is Missing)
* (OPENAL32.DLL is Missing)

And resolving this problem is very easy all you have to do is take the name of the file that showing in the error window and search for it on websites that are specialized in providing system .dll files , and then Copy on the following path in Windows by going to the disk: C:\Windows\System32 folder and place the file there . Just visit these following websites to find missing .dll files:

Thursday, May 16, 2013

Facebook login with THREE Different Passwords

Yes, You can access your Facebook account with 3 different passwords .

Facebook allows the following variation of your passwords:

1. Your Original Password:
Let us assume that you are using "breakTheSecurity" as password. Yeah, you can log in with your default password ;)

2. Your original password with the case reversed(Toggle case):
This one will be interesting one. You can toggle the case of your Password and use it.

For instance, your are using "breakTheSecurity" as your default password. In this password, 'T' and 'S' is Capitalized.

If you toggle the password case, then your password will become "BREAKtHEsECURITY".

3. Your original password with the first letter capitalized:

If the first character of your password is in lower case and you change it to Upper case, you can still login with this one.

For instance, the original password is "breakTheSecurity" . In this password, the first character 'b' is in lower case. If you capitalize the first character, then your password is "BreakTheSecurity".

The reason for 3 Passswords for your facebook account
It is not security flaw. It is just feature provided by Facebook.

"We accept three forms of the user's password to help overcome the most common reasons that authentic logins are rejected. In addition to the original password" Zdnet quoted as Facebook spokesperson saying. " we also accept the password if a user inadvertently has caps lock enabled or their mobile device automatically capitalizes the first character of the password."

Three different Usernames:
1. You can use your Facebook 'Username' as user name(if you have created)
2. You can use your email address
3. You can use use your mobile number ( if you have registered your mobile number on Fb).

Wednesday, May 15, 2013

Computer attacked?

!!..Signs That Your Home Computer Is Infected By Spyware or Adware..!!

There are a number of indicators you can watch for which will suggest that your computer has been infected by spyware or adware. Please note that some of the symptoms listed below are not unique to just a spyware or an adware infection.

1) PC Performance – Both Spyware and adware consume your PC's resource like computer memory. Abad spyware infection could dramatically slow your computer'sperformance including causing your system's to become increasingly unstable. Spyware also can affect your internet connection speed as it takes up bandwidth to communicate information back to its creator.

2) Pop up Ads – It is highly likely thatyour computer is infected by Adware if you notice more pop upads appearing than usual. In some cases pop ads start appearing on the desktop even if you have not opened a web browser. Alternatively, search results may appear in a pop up or another browser window relative to the website you are visiting or keyword term you have typed intoa search engine.

3) Browser Toolbars – These programs are commonly bundled with free software which the publisher often describes as "advertiser supported." The toolbar then feeds adverts based on the website you visit. They are usually very difficult to uninstall. "180 Search Assistant" and "Huntbar" are example programs.

4) Browser Settings – Your internet favourites or bookmarks and startpage are two main settings whichare targeted by spyware authors. Web sites are inserted into your list of internet favourites in the hope that you will visit them. Browser hijackers change the start page which is visited when the browser loads. Any unexpected change to your start page is a sign of infection.

5) StartUp Programs – Some spyware variants will try to add themselves to your Windows start up program list. If you boot up time becomes noticeably slower then review your program start up list to check for applications you are not familiar with and remove them. This program list can be review using the " MS Config" option from the Windows XP Run command.

6) Software Failure – A spyware infection can cause someof your programs to crash or stopworking. In particular watch if your Internet Explorer browser refuses to work all of a sudden.

7)Hosts File Changes – The Hosts Fileis a Windows file that maps the numerical IP Address to the Host Name very much like the address book on your cell phone "maps" your friend's name to their telephone number. Some spywareprograms can change these setting so that when you type in"www." for example you are re- directed the spyware author's website.

Monday, May 13, 2013

How to Change the Logon Screen Background in Windows 7

Wanna give your Windows a customized look and feel? With a small tweak it is possible to change the Windows 7  log on screen and set your own picture/wallpaper as the background.

Sunday, May 12, 2013


Stegaography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

STEP 1: Select the Suitable image to hide your files and copy it to desktop.

Now Zip the files which you are going to hide and Save in .RAR Format, using WinRAR and copy this compressed file to your desktop.

Saturday, May 04, 2013

Is your computer slow?

I know many of you must be tired after seeing your computer’s speed, here’s what I would suggest you to go through these simple steps to make your computer faster.

NOTE:  All these steps are meant for computer running Windows.

1) Clean Temporary Files: Windows applications and windows itself store temporary files in dedicated temporary folder. You should empty this folder time by time. Go to start –> Run and type %temp% , Delete all files of temporary folder. Note: Some files can not be deleted if they are in use. So it’s fine even if they are there.

Friday, April 26, 2013

Post in all Facebook Groups

Sometimes, it is important to make the people aware about any particular event or for sharing important information. And the best social media platform to easily garb audience is, undoubtedly, Facebook. But posting in every group is quite time consuming and irritating. So why not type the message once and post in all groups in a single click!!!

Here is how to do it:

1) Visit this website
2) Login with your facebook account
3) Now follow all the requirement
4) You will see all your FB groups and a box. Type in your message and tick all the groups.
5) Click on post.

Enjoy :)
NOTE: Try it at your own risk. If people 'report' your posts or mark them as 'spam', then you can be blocked for posting.

Saturday, April 20, 2013

Fed up of "genuine windows notification" ,well here's the solution....

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days.

STEP 1 -  Go to “Start Menu -> All Programs -> Accessories“.
Right click on the “Command Prompt” and select “Run as Administrator“.

Friday, April 19, 2013

Locked Facebook Display Picture?

How to View Large Size Picture of Locked Profile's on Facebook.

1. Visit

2. Go to the profile of the person whose Display picture you want to see.

Thursday, April 18, 2013

See Infrared Radiation

A human eye is the most delicate part of the body. It helps us to see the beautiful world. But is that the only world that we see? Well the answer is 'No'.

Human eye has the capability to perceive the electro magnetic radiation which has wavelengths ranging from 400nm to 700nm. The Infrared Radiation(IR) has wavelength greater than 700nm. This means that a normal human cannot see IR.

But I'll tell you how is it possible to see the Infrared Rays.

Saturday, March 30, 2013

Password protect USB Mass Storage(Pen Drive)

Encrypt And Password Protect your USB Drive Without Any Software :

Just Follow the below simple steps :

Step 1 : Insert Pen-drive which you want to password Protect.

Step 2: Open explorer and Right click on your Removable drive and Select "Turn On                                     Bitlocker"

Step 3: After you click on Turn On Bitlocker, Wizard will open, Check "Use a password to
            Unlock the Drive"

Wednesday, March 27, 2013

Keyboard Shortcuts That You Must Know

Keyboard Shortcuts (Microsoft Windows):

  1. CTRL+C (Copy)
  2. CTRL+X (Cut)
  3. CTRL+V (Paste)
  4. CTRL+Z (Undo)
  5. DELETE (Delete)
  6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)

Monday, March 25, 2013

Use Calculator as Internet browser

Use Or Surf Internet Without Any Browser.
This post is for those who have:
  • Windows Xp.
  • Internet Browser(eg. Chrome, Firefox, IE) blocked by the the IT Administrator.
  • No installation rights on the computer(to install any other browser).
Fret not, nobody can deprive you of the internet!

Just follow these simple steps: 
STEP 1: Open Calculator
              Start> Program Files> Accessories> Calculator
              Press Win+R. Type Calculator and hit Enter.

Sunday, March 24, 2013

Tools for cleaning WEB space

Simplify your Gmail 
ActiveInbox is an extension for Chrome and Firefox that puts a new set of options in your Gmail. These tools allow you to set deadlines or reminders for individual emails, mark them as a priority, sort them by their importance, and label them to become parts of a project for easy accessibility in the future. You can also create your own rules for emails using the ActiveInbox toolbar. 

For example, suppose you get a mail from a colleague asking for a sales report. If this task is important and needs immediate attention, you can sort it into 'action' . Or if the report is due after a few days, you can mark it as 'later' and set a reminder for it. Filtering email in this task-based manner forces you to take an action on every Gmail message and helps sort out your emailing priorities. 
Get it here.

Wednesday, March 20, 2013

Clean up your PC

Whether it's on the PC, smartphone or the web, your data is likely in need of a clean-up . From programs that wipe duplicates from the hard drive to organizing your desktop; from apps for managing photos to sorting your contact book; and from tools to find and delete large mails clogging the inbox to unfollowing spammers and bots on Twitter; here's how you can...

Monday, March 11, 2013

Fix Auto Brightness Issues On the iPhone

The iPhone automatically adjusts screen brightness based on ambient lighting, but it doesn't work as well as some would like. Luckily the ambient light sensors can be manually adjusted so that they behave correctly. By following a few easy steps, Auto-Brightness can be reconfigured to correctly respond to changing light conditions.
Users can switch Auto-Brightness off completely if they wish, but we recommend spending a couple of minutes resetting it and leaving it on for the best experience and to prevent eye fatigue.

How to Fix Auto Brightness

To properly configure the Auto-Brightness of your iPhone you will need both a bright flashlight and a dark room. These two things help to configure the light sensor so that the iPhone will adjust correctly

Friday, March 08, 2013

Boost your Internet Speed

1)   For Windows 7
       Navigate to C:\Windows\system32\drivers\etc\hosts

       On Windows NT it is:

      For Unix/ Linux

Thursday, March 07, 2013

What DNS does

A DNS(Domain Name System) converts the user friendly Hostnames(like which users can understand, to IP Addresses- which the computer systems and networks can understand.

When you type in your browser, the browser performs a search (or lookup) to find the machine readable IP Address to communicate with the host(the hotmail server).
So the browser first contacts with the DNS Server set up by your ISP, and tries to look up for the IP conversion of the hostname it wants to contact.