Friday, November 28, 2014
Facebook's Latest Prank : Suggest Your Friends To Themselves
Have you ever got a friend request from yourself to yourself? Sounds weird and quite amazing, right? lemme explain this to you.Suggest your friends to yourself Chrome extension will suggest your friends to their own account. You can send friend request to yourself !
Your friends will start to think that someone may have created their fake account or someone may have succeeded to hack their account but that wrong ! You haven't been hacked or someone hasn't created your face profile, instead its a kind of bug of Facebook found out by a geek boy Dinesh Bhosale.. Your friends will go crazy when they will see that you suggested them to their own account.
This extension is developed by Dinesh Bhosale.
This Prank Is Made For Fun, But Don't Take It Seriously, Enjoy It And Share With Your Friends And Make The Extension Popular :D
- It is just a prank and doesn't produce any harm.
- No Facebook bans and no data is saved by the extension.
- You can suggest your friends to themselves for any number of times without getting blocked or reported.
- Extension is 100% free and it works with all Facebook accounts.
- You can use this extension on infinite number of accounts.
Steps To Suggest Your Friends To Themselves
- Install Facebook social toolkit chrome extension from chrome web store.
- Start Facebook Social Toolkit chrome extension.
- Click on suggest friends to themselves button (as shown in the screenshot)
- Enjoy!
How Does It Work?
Extension sends a confusing request to Facebook servers and that's how it works.
Wednesday, November 26, 2014
HOW TO USE A PENDRIVE AS A KEY TO START YOUR COMPUTER!!
Hello friends,i am back with a another cool trick to hide and securr your some importand and private file/picture.
Follow step :-
STEP 1: GOTO START AND TYPE "DISK MANAGEMENT"
STEP 2: PRESS ENTER
STEP 3: WATCH OUT FOR YOUR PENDRIVE NAME
STEP 4: RIGHT CLICK ON IT AND CLICK ON "CHANGE DRIVE LETTERS OR PATHS"
STEP 5: ASSIGN IT "A" ALPHABET
STEP 6: NOW GO TO RUN PROMPT (WIN+R) AND TYPE "syskey"
STEP 7: CLICK "UPDATE"
STEP 8: NOW CLICK ON "STORE STARTUP KEY ON FLOPPY DISK"
STEP 9: CLICK OK
STEP 10: TO UNDO IT DO SAME PROCEDURE AND CLICK ON "SAVE STARTUP KEY LOCALLY"
Any que. Or dout then write in comment
& if u want any trick then also you can ask me…
Feel free to write comment :)
Follow step :-
STEP 1: GOTO START AND TYPE "DISK MANAGEMENT"
STEP 2: PRESS ENTER
STEP 3: WATCH OUT FOR YOUR PENDRIVE NAME
STEP 4: RIGHT CLICK ON IT AND CLICK ON "CHANGE DRIVE LETTERS OR PATHS"
STEP 5: ASSIGN IT "A" ALPHABET
STEP 6: NOW GO TO RUN PROMPT (WIN+R) AND TYPE "syskey"
STEP 7: CLICK "UPDATE"
STEP 8: NOW CLICK ON "STORE STARTUP KEY ON FLOPPY DISK"
STEP 9: CLICK OK
STEP 10: TO UNDO IT DO SAME PROCEDURE AND CLICK ON "SAVE STARTUP KEY LOCALLY"
Any que. Or dout then write in comment
& if u want any trick then also you can ask me…
Feel free to write comment :)
Monday, November 17, 2014
How To Recover Deleted Files From Hard Drive
When you delete any file in windows it goes to Recycle bin where you can easily restores it as it has restore option. But how you can recover your files when you delete it permanently (In windows by pressingShift+DEL) ?. Sometimes we accidently deletes photos, videos or important document files from your computer, USB drive, SD card or anything else then how can you recover it ? Well don’t worry about it there are many powerful file recovery software available on the internet which let you to recover permanently deleted files from your system. As I told you that there are a lots of hard drive recovery services. But I searched around the internet and tested several recovery softwares so, now I’m going to tell you the top best disk/data recovery softwares.
How To Recover Deleted Files From Hard Drive
1. Recuva
Recuva is one of the most popular and powerful file recovery tool for Windows. You will find it very easy to navigate because of it’s clean interface user-friendly options. It has following features :
- Undelete files on your computer
- Recover deleted emails
- Securely delete files you want to erase forever
- Restore unsaved Word documents
Recovering files vis Recuva is very easy you have to simply download and install the Recuva then after opening it now select what you want to restore. You can search for deleted Pictures, music, documents, videos, compressed files or emails. If you’re not sure about file name, just select ‘All Files’ option. Now select the file, either right-click on it press Recover button to recover it.
2. Panda Recovery
Panda recovery is the another best hard drive recovery service/tool for recovering files. It helps to recover deleted files from hard drive, USB, Network drives etc. It is best because of following features :
- Browse, Search, Preview and Recover deleted files.
- Recover Archived, Hidden, Encrypted, Compressed files.
- Recover Images, Documents, Movies, or any other type of files.
- Recover to Local Hard Drive, Network Drive, or Flash Drive.
The process of recovering files from Panda recovery is very simply you have to just follows wizard and its instructions.
Check Out : How To Increase RAM Using USB/Pendrive
3. Test Disk
This is also the one of best hard drive recovery service providing software. It is a powerful free data recovery software which helps to recover lost partitions andor make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and Mac OS, and supports lots of file systems. It has following features :
- Fix partition table, recover deleted partition.
- Rebuild NTFS boot sector.
- Undelete files from FAT, exFAT, NTFS and ext2 file system.
- Recover NTFS boot sector.
You need to be careful for using this and better to use on screen instructions while using it.
4. Reclai Me
This is another data recovering software. It is simple tom use because if it’s user friendly interface more ever it can recover files under Windows (FAT16, FAT32, exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems), Mac(HFS, HFS+ and UFS file systems). It has following features :
- Undelete a single file or multiple files.
- Unformat a hard drive (desktop and laptop).
- Recover RAW file system drive.
- Recover data in case of boot failure.
Just simply follow on screen instruction to recover data using ReclaiMe.
5. Restoration
Last but not least, this one very simple to use. Restoration works with FAT and NTFS as well as digital cameras cards. It is also powerful tool for recovering lost/deleted data. It has following features :
- Recover deleted files.
- Undelete files.
- Unformat a hard drive.
- Photo recovery.
Just as others to use it simply follows the on screen instructions.
So, this is all about hard drive recovery service/tools. I hope this helped you a lot. If you are facing any problem just comment it below. Feel free to share Thanks !!
Saturday, November 15, 2014
How to Block Candy Crush Requests on Facebook
If you’re on Facebook ,chances are you have at least one friend that incessantly sends you invitations to play “Candy Crush Saga,” the smartphone puzzle game that has become the most popular game on the social networking site. The invites may come from ex-girlfriends (or ex-boyfriends), distant family members or childhood friends you haven’t spoken to in a decade — Candy Crush’s addictive allure knows no bounds.
Candy Crush makes money for its developer, King.com, by forcing users to pay for new levels, though users can get around this by inviting their Facebook friends to the game. Given the reward for sending invites, it’s unlikely you’ll ever get the Candy Crush addict in your social network to stop, but it turns out that there is a way to turn off Candy Crush announcements.
It’s hard to avoid the masses of people playing Candy Crush Saga, the addictive hit game by King.com. But you can avoid them and the annoying notifications they send you on Facebook.
The process of blocking Candy Crush Saga notifications from friends takes all of two seconds. Here’s how to do it.
- Log on to Facebook and pull down the notifications tab on the top right of your home screen.
- Hover over the X next to one of your Candy Crush notifications, which will prompt you to “turn off.”
- Click the X, and it will give you the option to turn off all notifications from Candy Crush Saga.
- Click “Turn Off” and voila! Candy Crush Saga is banned from sending you alerts. You can also alert Facebook if you feel it or another app is spamming you.
- To make sure you did this correctly, go into your notifications settings and make sure the Candy Crush Saga app box is unchecked and enjoy a more quiet Facebook.
Whenever you feel the need of unblocking any specific apps you can come back to the same page, and click on unblock specific app.Hope you like this way of Blocking the Candy Crush Requests form Friends.
Thursday, November 13, 2014
How To Open Number Of Sites With A Single Click ?
Today i will show you how to make a batch filewhich will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.
How To Do ?
@echo off
start www.db9virus.blogspot.in
start www.google.com
start www.facebook.com
3. Now open your save file and it will open three websites with just one click.
4. You can also add more sites by writingStart followed by websites URL.
Wednesday, November 12, 2014
What is RAT Or Remote Access Trojan ?
RAT stands for Remote Access Trojan orRemote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using RAThacker can install keylogger and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.
What is RAT ?
As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect. So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you over the mail or in chat room.
What You Can do With RAT ?
Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:- Infecting Files
- Installing Keyloggers
- Controlling Computer
- Remotely start webcam, sounds, movies etc
- Using your PC to attack Website (DDOS)
- View Screen
Harmless RAT or Good RAT
As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.
Some Commonly Used RAT
- ProRAT
- CyberGate RAT
- DarkComet RAT
Monday, November 10, 2014
6 Most Common Password Cracking Methods And Their Countermeasures
There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.
1. BruteForce Attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password"can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"
2. Social Engineering
Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.
3. Rats And Keyloggers
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.
4. Phishing
Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. Check out below article to know more about phishing.
5. Rainbow Table
A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.
Example: ‘hello’ in md5 is5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e
Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources
6. Guessing
This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.
Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.
Subscribe to:
Posts (Atom)