Translate

Join Our Website Become Member

Tuesday, 10 March 2015

How to hack facebook+Email account through Indirect phishing [Tut] | 100% Working



                                                




Hey guyzz as you know many newbies are finding difficulties to hack facebook accounts through facebook phishing.because facebook scam filters are very secured now they block phishing just after u send the url to victim & phisher gets detected.
this post is for those who think that facebook cant be hacked through phishing now,but no one can save facebook from phishing.
you can visit my previous post of facebook phishing which worked for almost every one:

How Can I Hack A Facebook Account With Smart Facebook Phishing.....100%working by devendr@..!!!


Here i will share a tut how to hack facebook through indirect phishing. that means i wil tel you there is no need to phish facebook of victim you can phish Email id of the victim .then through email id we will hack facebook account its very easy just follow these simple instructions:


1.)First step we will find the email Id[it can be yahoo,gmaill,hotmail,AOl..etc] of victim which may be available at the info tab of his/her facebook profile.
2.)make phisher[fake login page according to the mail id]

you goto this link & see how to make your own fake login page:



How to setup your own phisher/fake login page?[noobs friendly]




3.) now u have to become a good social engineer  to trap your victim to enter username & passwrd into the fake login pgae without getting caught:D it depends upon you.


4.)after compromising Email ID through phishing first change the victim passwrd & security question so that he cannot recompromise it again.

 5.)Now here Our trick lies that goto www.facebook.com enter victims gmail id & any random password. here i will take Email id as victim@gmail.com


6.) Now facebook will respond wrong username password. now you will see a button request a new one ,see in the screen shots. click on it.


7. then you will be redirected ta verification page which says enter your email id , enter victims email id on it.


8.then click on search,enter captcha.


9.) check there the profile of victim  there may be 2-3 profiles click on the one which is our victim "this is my account".


10.)then click on send verification links & code to gmail id.

11.)TADAA!!! goto gmail ibox u will find a facebook password recover link now recover your passwrd ..



12)thats it you have hacked your victim without actually phishing the facebook.

Monday, 9 March 2015

Subway Suffers Pairis Armv6

change your password if lost or forgotten!


 
How to change your computer password with command prompt

 Download
4 Steps
 Collection  I Made it!  Favorite
 Share 


This will help you change your password if lost or forgotten! Or hacking! I don't suggest that!



Step 1: Go to start

Go to start, Run then type, CMD!


Step 2: What you typeIn CMD (Command Prompt) type net user and it will bring up all the user accounts.


Step 3: What to do next.Once you find the account that you want type net user then account name then space *


Step 4: Then you are almost done.then hit enter and it will say enter new password. Do that hit enter and enter the desired password again. hit enter and the password is saved. You can also start you windows PC with CMD and do this. You can also do this on a guest account

how to shutdown any computer using cmd(IF NETWORED OR CONNECTED TO WIFI


 
Shutting down a server or other remote computer is possible from the convenience of your own PC. It's not hard to learn to shutdown a remote Windows computer from your own desktop on a LAN. You'll just have to learn the proper computer command shorthands




Steps

  1. 1
    Open the command prompt. This may be done by clicking on the "Start" button, and selecting "Run".


  2. 2
    Type in cmd and press Enter.

  3. 3
    Type in shutdown -m \\computername, replacing "computername" with the name of the computer you wish to shutdown or the computer's IP address.

  4. 4
    Experiment with the shutdown commands switches.
    • -r will force a restart, disabling any services or user interaction from interrupting it.
    • -c "comment" will force a comment to appear on the system being shutdown.
    • -t xx will force a timeout for "xx" seconds. For example, -t 60 would perform a shutdown after a 60-second timeout.
    • -a will abort the shutdown.
    • A full command example: shutdown -m \\myserver -r -c "This system will shutdown in 60 seconds" -t 60

  5. 5
    Try another method:
    • Type shutdown -i in the run window.
    • Click the "Add" box and type the name of the computer you want to shutdown or its IP address. You can select what you want the computer to do.
    • In this mode, it's necessary to add a comment. Do so.
    • Press OK

HOW TO BLOCK CHANNELS ON DISH TV,TATA SKY,AIRTEL,VIDEOCON,ETC(any)


12/12/2014
 
How to block channel on dish tv* Dish TV : Menu – Press Right Key – My Dish TV – Parental Control – Block Channels – PIN – 1234 – Select the Channel – Press right key to Block channel – Select channel one by one – Menu

*Tata Sky : Organiser – Parental control – PIN – 0000 – Channel Lockout – Select the Channel – Guide

*Airtel / BIG TV (Reliance) : Home– Setting – Parental Control – Pin – 0000 – Parental Lock – Select Channel – apply changes – home

*Videocon : Menu – Setup – Installation – Pin -1234 – user setting – Channel Locking – Lock/Hide/Unlock/Unhide channels – Green button for hide – Ok – Exit –Yes

*IN/DEN/PNL Cable : Menu – Favourite List – Channel List – All TV Channel – Lock – Red करने के लिए)

*Sky Net Digital Services (Set Up Box) : Menu – Set up – Channel Management – Channel edit –Input 0000 pwd – Select Channelsto lock (Lock by Yellow Button) – Done

warning :- this all USSD codes are change with TIME-TO-TIME and PLACE-To-PLACE so be aware.

notice :- if you have more code or updated code then comment her

Unlimited Tata Docomo Free Internet Proxy Trick for Android 2015

Tata Docomo unlimited 2015 Gprs Free Proxy Working Trick Hey friends we are again back with something amazing. We all loves Free Recharge and Internet. As you know that so many times we posted about Free Recharge apps and tricks. But you love Free working Internet tricks more that's why I'm here to fulfill you need. After Airtel Docomo comes at second if we talk about popularity so Docomo trick is here which i am go to post. We will post two different ways to get free Docomo Internet and if one will not work fine then try your hands on others. I hope our tricks will surely help you.

Note: These tricks are tested by Recharge BOX Team and they are working fine but we won't assure you for the same because in few States they may don't work but yes there's nothing wrong in trying. Try and Try but don't Cry that's the quote that suddenly came to my mind.
TATA DOCOMO FREE INTERNET PROXY TRICK 2015 
Main work in this trick is that you have to enter the proxy in between ISP server and you Android Mobile. This Proxy will work and all your Internet charges will be free which means there's no need to pay even a single penny.
Steps for Free Docomo Internet on Android
FIRST METHOD:
Remember first you must have to install opera mini in your Mobile if it's already Installed then well n good and if you don't have then go to Google play store and search for opera mini to Download it. After successful installation now open your Mobile Settings. Create new apn setting and Fill these details in the blank field. (SEE IMAGE)
Name :Tata Docomo
APN :TATA.DOCOMO.INTERNET
PROXY :010.124.094.007
PORT :80
All Done. Now save this new setting and make it default. Now open your Web browser and start enjoying with free Internet.
SECOND DOCOMO FREE INTERNET PROXY TRICK 2015
Features of this Trick
You will get Unlimited amount of Internet gprs to surf.
High speed download and upload speed
This will work for PC and mobile both.
Your balance won't be deducted though we suggest you to keep you balance low and Play Safe.
Steps to Follow:
First you have to Create new profile in your Mobile. Go to settings and create it.
Name = Recharge BOX 
apn tata.docomo.internet
proxy 128.20.210.02
port 80
homepage google.co.in
NOW save these settings and make them default. Restart your device and start Free Web browsing right now.
I hope now you are browsing Free Internet on your Android Mobile. Though we have wrote each and everything very clearly but still if you are facing any problem then drop a comment below, we are happy to help you out. Support us by sharing this article in social media websites like Facebook, Twitter etc. Keep Visiting for more awesomeness.
Search queries
Working Free Tata Docomo 3g  unlimited internet Gprs trick 2015 Proxy Airtel Sim Android. 

Saturday, 7 March 2015

Warning(must read)

This all is for education pourpous only 
i am not responsible for any kind you use or how you use my imformation

Repairing Windows XP in Eight Commands


 0 
Windows could not start because the following file is missing or corrupt:

\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEM

You can attempt to repair this file by starting Windows Setup
using the original Setup CD-ROM.

Select ‘R’ at the first screen to start repair.

Which renders your PC inaccessible from the standard boot procedures of Windows XP. You try safe mode, to no avail. You’re particularly savvy and try issuing the FIXBOOT and FIXMBR commands in the Windows recovery console, but after each reboot, you’re merely greeted with the same obnoxious and terrifying blue screen of death that’s preventing you from accessing your precious data.

Perhaps you’ve also seen these error screens:

Windows NT could not start because the below file is missing or corrupt:

X:\\WINNT\\System32\\Ntoskrnl.exe
_________________

Windows NT could not start because the below file is missing or corrupt:

X:\\WINNT\\System32\\HAL.dll
_________________

NTLDR is Missing
Press any key to restart
_________________

Invalid boot.ini
Press any key to restart



Allow me to build tension by prefacing the end-all/be-all solution with my background: Having worked for the now-incorporated Geek Squad branch of Best Buy Corporation for the better part of eight months, I have seen dozens upon dozens of systems come through our department with any one of these errors, brought in by customers who are afraid they did something, have a virus, or are in jeopardy of losing their data. Prior to my discovery of an invaluable sequence of commands, our standard procedure was to hook the afflicted drive to an external enclosure, back up a customer’s data and then restore the PC with the customer’s restore discs or an identical copy of Windows with the customer’s OEM license key. If the customer wasn’t keen on the applicable charges for the data backup, we informed them of the potential risks for a Windows repair installation (Let’s face it, they don’t always work right), had them sign a waiver, and we did our best.

Neither of these procedures are cheap in the realm of commercial PC repair, nor do they inspire a tremendous level of confidence in the technician or the hopeful client.

In an effort to expedite our repair time and retain the sanity of myself and other technicians, I received permission to undertake a case study on a variety of PCs currently in service that exhibited any of the aforementioned symptoms, and I took it upon myself to find a better solution. After crawling through the MSKB, Experts Exchange, MSDN and sundry websites all extolling the virtues of a solution to these problems, I only found one that worked, and it has been reliably serving me for the better part of two weeks on seventeen PCs to date. The process is simple: Get to the Windows Recovery Console for your particular Windows installation, navigate to the root letter of your installation (C: in most cases), issue eight commands, and reboot. The cornerstone of this process is a command called “BOOTCFG /Rebuild” which is a complete diagnostic of the operating system loaded into the recovery console; the purpose of the command is to remove/replace/repair any system files that were preventing the operating system from loading correctly. Amongst the files it fixes are:

Windows Hardware Abstraction Layer (HAL)
Corrupt registry hives (\\WINDOWS\\SYSTEM32\\CONFIG\\xxxxxx)
Invalid BOOT.INI files
A corrupt NTOSKRNL.EXE
A missing NT Loader (NTLDR)
The command process may apply to other types of blue screens or Hive/HAL/INI/EXE/DLL-related stop errors, but I have not had the luxury of computers in this type of disrepair. The process I am about to outline is virtually harmless, and if you feel you may be able to correct your PC’s boot-time blue screens and stop errors with the sequence, feel free to try. Let us now begin with a step-by-step instruction for correcting these issues.

GETTING TO THE WINDOWS RECOVERY CONSOLE
Insert your Windows XP CD into your CD and assure that your CD-ROM drive is capable of booting the CD. Configuring your computer to boot from CD is outside of the scope of this document, but if you are having trouble, consult Google for assistance.
Once you have booted from CD, do not select the option that states: “Press F2 to initiate the Automated System Recovery (ASR) tool.” You’re going to proceed until you see the following screen, at which point you will press the “R” key to enter the recovery console:

After you have selected the appropriate option from step two, you will be prompted to select a valid Windows installation (Typically number “1″). Select the installation number, (As mentioned, “1″ in most cases), and hit enter. If there is an administrator password for the administrator account, enter it and hit enter. You will be greeted with this screen, which indicates a recovery console at the ready:

PROCEEDING WITH THE REPAIR FUNCTIONS
There are eight commands you must enter in sequence to repair any of the issues I noted in the opening of this guide. I will introduce them here, and then show the results graphically in the next six steps. These commands are as follows:
C: CD ..
C: ATTRIB -H C:\\boot.ini
C:ATTRIB -S C:\\boot.ini
C:ATRIB -R C:\\boot.ini
C: del boot.ini
C: BOOTCFG /Rebuild
C: CHKDSK /R /F
C: FIXBOOT
To “Go up a directory” in computing is to revert back to the directory above the current folder you’re operating in. If, for example, I’m in the C:WINDOWSSYSTEM32 directory, and I want to get at a file in the WINDOWS directory, I would merely type CD .. and I would be taken out of the SYSTEM32 folder and up one level to WINDOWS. We’re going to do the same thing here from the WINDOWS folder to get to the basic root of C:

Now that we are at C: we can begin the process of repairing the operating system
and that begins with modifying the attributes of the BOOT.INI file. Briefly, BOOT.INI controls what operating systems the Windows boot process can see, how to load them, and where they’re located on your disk. We’re going to make sure the file is no longer hidden from our prying eyes, remove the flag that sets it as an undeletable system file, and remove the flag that sets it as a file we can only read, but not write to. To do this, we will issue three commands in this step:

C:ATTRIB -H C:\\BOOT.INI
C:ATTRIB -R C:\\BOOT.INI
C:ATTRIB -S C:\\BOOT.INI
to remove the Hidden, System and Read Only flags.

Now that we’ve modified the attributes for the BOOT.INI file, it’s up for deletion. The syntax for it is simple: { DEL | FILE NAME }, e.g., C:DEL BOOT.INI deletes the BOOT.INI file.

Now for the most important step of our process, the BOOTCFG /REBUILD command which searches for pre-existing installations of Windows XP and rebuilds sundry essential components of the Windows operating system, recompiles the BOOT.INI file and corrects a litany of common Windows errors. It is very important that you do one or both of the following two things: First, every Windows XP owner must use /FASTDETECT as an OS Load Option when the rebuild process is finalizing. Secondly, if you are the owner of a CPU featuring Intel’s XD or AMD’s NX buffer overflow protection, you must also use /NOEXECUTE=OPTIN as an OS Load Option. I will demonstrate both commands for the purpose of this guide, but do not set NOEXECUTE as a load option if you do not own one of these CPUs. For the “Enter Load Identifier” portion of this command, you should enter the name of the operating system you have installed. If, for example, you are using Windows XP Home, you could type “Microsoft Windows XP Home Edition” for the identifier. This gives the process some authenticity, if you’re keen on being a perfectionist.

This step verifies the integrity of the hard drive containing the Windows XP installation. While this step is not an essential function in our process, it’s still good to be sure that the drive is physically capable of running windows, in that it contains no bad sectors or other corruptions that might be the culprit. No screenshot necessary here! Just type CHKDSK /R /F at the C:> prompt. Let it proceed; it could take in excess of 30 minutes on slower computers, when this is finished move on to the seventh and final step.

This last step also requires no screenshot. When you are at the C:> prompt,
simply type FIXBOOT. This writes a new boot sector to the hard drive and cleans up all the loose ends we created by rebuilding the BOOT.INI file and the system files. When the Windows Recovery Console asks you if you are “Sure you want to write a new bootsector to the partition C: ?” just hit “Y,” then enter to confirm your decision.

RESULTS AND WRAP-UP
It’s time to reboot your PC by typing EXIT in the Windows Recovery Console and confirming the command with a stroke of the enter key. With any luck, your PC will boot successfully into Windows XP as if your various DLL, Hive, EXE and NTLDR errors never existed. You’ve just saved yourself from many hours of work, frustration, potential data loss and shelling out your hard-earned greenbacks at a brick’n'mortar operation.

Decrease The Shutdown Time In Windows


 0 
Whenever you give the shutdown command in your Windows PC, it forwards the request to all the running services. It waits before it tells you if any of the service did not respond to the shutdown request (waits for 12 seconds in Windows 7 and 6 seconds in Windows 8). You can then force stop them or wait for them to respond. But if you have many services running, then 12 seconds for each service is much time to wait for.




So to decrease that time we have a simple trick that can decrease this time and hence decrease the shutdown time. The trick is simple, you just need to edit a registry entry that is responsible for the waiting time.
CAUTION You need to edit the registry, do this only if you have the knowledge of editing the Windows Registry.





How To Decrease the Shutdown Time in Windows :
1. Open the “Run” dialog box either from the “Start” menu, or by pressing the “Windows Key + R”, and then type “regedit” in the window that pops-up.


2. Now you need to navigate to “HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Control”. Now when you click on “Control”, look in the right pane and find the key named “WaitToKillServiceTimeout“. Double click on it and change its value to 2000

How to Hide files inside a picture using Command Prompt


 0 
How to Hide files inside a picture using Command Prompt in windows easy way to hide files inside an image file (without any software) 

First create a new folder in C:\ drive and name it anything i'm gonna name it "Hide"

Now move the files you want to hide and the picture in which you want to hide to the folder.

Select the files you want to hide and right click select "Add to archive..." and give the compressed file a name for example: Compressed.rar

Now open command prompt.
type cd\ to go to your root directory


Then type
copy /b yourimage.jpg+Compressed Files.rar xyz.jpg

your files will be hidden inside the image. To get your files back right click
on the image(xyz.jpg) and open it with Winrar you will see your files
you can extract the files anywhere you want on your computer

How to See if Your Hard Drive is Dying


 0 
Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing.  You can view your hard drive’s S.M.A.R.T. data and see if it has started to develop problems.
Unfortunately, Windows doesn’t have an easy-to-use built-in tool that shows your hard disk’s S.M.A.R.T. data.  We will need a third-party tool to view this information, though there is a way to check your S.M.A.R.T. status from the command prompt.
Mehtod 1 :- use HDDScan freeware utility, it will give you full report of your hard-disk status.

Method 2 :- In the Command prompt (Run > cmd) type the following command
Wmic
"Diskdrive get status"

Types of Attacks on Web Servers


 0 

Types of Attacks on Web Servers

Some of the more popular attack methods are described below.

FTP Bounce Attack

FTP (File Transfer Protocol) is used to transfer documents and data anonymously from local machine to the server and vice versa. All administrators of FTP servers should understand how this attack works. The FTP bounce attack is used to slip past application-based firewalls.

In a bounce attack, the hacker uploads a file to the FTP server and then requests this file be sent to an internal server. The file can contain malicious software or a simple script that occupies the internal server and uses up all the memory and CPU resources.

To avoid these attacks, the FTP daemon on the Web servers should be updated regularly. The site FTP should me monitored regularly to check whether any unknown file is transferred to the Web server. Firewalls also help by filtering content and commands. Some firewalls block certain file extensions, a technique that can help block the upload of malicious software.

Port Scanning Attack

A port scan is when someone is using software tosystematically scan the entry points on other person’s machine. There arelegitimate uses for this software in managing a network.

Mosthackers enter another’s computer to leave unidentifiable harassing messages,capture passwords or change the set-up configuration. The defense for this isthrough, consistent network monitoring. There are free tools that monitor forport scans and related activity.

Ping Flooding Attack

Pinging involves one computer sending a signal to anothercomputer expecting a response back. Responsible use of pinging providesinformation on the availability of a particular service. Ping Flooding is theextreme of sending thousands or millions of pings per second. Ping Flooding cancripple a system or even shut down an entire site.

APing Flooding Attack floods the victim’s network or machine with IP Pingpackets. At least 18 operating systems are vulnerable to this attack, but themajority can be patched. There are also numerous routers and printers that arevulnerable. Patches cannot currently be applied throughout a global networkeasily.

Smurf Attack

A Smurf Attack is modification of the "ping attack"and instead of sending pings directly to the attacked system, they are sent to abroadcast address with the victim’s return address. A range of IP addressesfrom the intermediate system will send pings to the victim, bombarding thevictim machine or system with hundreds or thousands of pings.

One solution is to prevent the Web server from being usedas a broadcast. Routers must be configured to deny IP-Directed broadcasts fromother networks into the network. Another helpful measure is to configure therouter to block IP spoofing from the network to be saved. Routers configured assuch will block any packets that donor originate in the Network.To be effective this must be done to all routers on the network.

SYN Flooding Attack

This attack exploits vulnerability in the TCP/IPcommunications protocol. This attack keeps the victim machine responding back toa non-existent system. The victim is sent packets and asked to response to asystem or machine with an incorrect IP address. As it responds, it is floodedwith the requests. The requests wait for a response until the packets begin totime out and are dropped. During the waiting period, the victim system isconsumed by the request and cannot respond to legitimate requests.

When a normal TCP connection starts, a destination hostreceives a SYN (synchronize/start) packet from a source host and sends back aSYN ACK (synchronize acknowledge) response. The destination host must the hearan acknowledgement, or ACK packet, of the SYN ACK before the connection isestablished. This is referred as the "TCP three-way handshake”.

Decreasingthe time-out waiting period for the three way handshake can help to reduce therisk of SYN flooding attacks, as will increasing the size of the connectionqueue (the SYN ACK queue). Applying service packs to upgrade older operatingsystems is also a good countermeasure. More recent operating systems areresistant to these attacks.

IPFragmentation/Overlapping Fragment Attack

To facilitate IP transmission over comparatively congestednetworks. IP packets can be reduced in size or broken into smaller packets. Bymaking the packets very small, routers and intrusion detection systems cannotidentify the packets contents and will let them pass through without anyexamination. When a packet is reassembled at the other end, it overflows thebuffer. The machine will hang, reboot or may exhibit no effect at all.

Inan Overlapping Fragment Attack, the reassembled packet starts in the middle ofanother packet. As the operating system receives these invalid packets, itallocates memory to hold them. This eventually uses all the memory resources andcauses the machine to reboot or hang.

IPSequence Prediction Attack

Usingthe SYN Flood method, a hacker can establish connection with a victim machineand obtain the IP packet sequence number in an IP Sequence Prediction Attack.With this number, the hacker can control the victim machine and fool it intobelieving it’s communicating with another network machines. The victim machinewill provide requested services. Most operating systems now randomize theirsequence numbers to reduce the possibility of prediction.

DNSCache Poisoning

DNS provides distributed host information used for mappingdomain names and IP addresses. To improve productivity, the DNS server cachesthe most recent data for quick retrieval. This cache can be attacked and theinformation spoofed to redirect a network connection or block access to the Web sites),a devious tactic called DNS cache poisoning.

The best defense against problems such as DNS cachepoisoning is to run the latest version of the DNS software for the operatingsystem in use. New versions track pending and serialize them to help preventspoofing.

SNMP Attack

Most network devices support SNMP because it is active bydefault. An SNMP Attack can result in the network being mapped, and traffic canbe monitored and redirected.

The best defense against this attack is upgrading toSNMP3, which encrypts passwords and messages. SinceSNMP resides on almost all network devices, routers, hubs, switches, Servers andprinters, the task of upgrading is huge. Some vendors now offer an SNMP Managementtool that includes upgrade distribution for global networks.

UDP Flood Attack

AUDP Flood Attacks links two unsuspecting systems. By Spoofing, the UDP floodhooks up one system’s UDP service (which for testing purposes generates aseries of characters for each packet it receives) with another system’s UDPecho service (which echoes any character it receives in an attempt to testnetwork programs). As a result a non-stop flood of useless data passes betweentwo systems.

Send Mail Attack

In this attack, hundreds of thousands ofmessages are sent in a short period of time; a normal load might only be 100 or1000 messages per hour. Attacks against Send Mail might not make the front page,but downtime on major websites will.

For companies whose reputation dependson the reliability and accuracy of their Web-Based transactions, a DoS attackcan be a major embarrassment and a serious threat to business.

Conclusion

Frequent denial-of-service attacks and achange in strategy by "Black-Hat Hackers" are prompting enterprises todemand technology that proactively blocks malicious traffic.

Tools and services that reflectapproaches to combat such DoS attacks have been introduced with time. These arenormally upgrades to what was produced before. No solution is ever said to be anultimate solution to defend DoS attacks. Despite the new technology coming everyday, the attacks are likely to continue

Website Hacking Tools Collection


 7 
Includes:
- Easy SQL Injection Tool
 
- MySQLi Dumper v1.4 Alpha
 
- Server Attack
 
- Shell upload video
- SQLi Helper v2.5
 
- Super Scan 4
 
- Link to web-page that finds the admin log-in page of any site
- c100 shell (php file)
- Cain and Abel
 
- SQL Injection detailed tutorial. Watch it together with Mathias's SQL Injection tutorial, and you'll master it in no time!
- Nessus
 
- Nmap
 
- WhoIs
 
- Ethereal v0.99

 FileFactory Mirror:
Code:
http://www.filefactory.com/file/agh3488/n/_Website_hacking_7z

TurboUpload Mirror:

Code:
http://www.turboupload.com/yf1fukydnu3r/^^_Website_hacking.7z.html

Password:

Code:
"gamefreak" or maybe its "Gamefreak
for educational pourpos only

How to transfer balance from mobiles? For All Networks


 0 
We often see that our friends have lots of balance in their mobiles and we wish to have a little from it. You can do it now by following the below steps :D
Choose the network below and follow the steps :) 

For Aircel Users :
To Transfer the Balance you just need to Dial *122*666# and Follow the Instructions...
You Can Transfer Rs, 5,10,15,25,50,75,100!!


For Idea Users :
To Transfer the Balance just Send SMS as GIVE MobileNumber Amount And Send It To 55567.
E.g. GIVE 9676555212 30 To Transfer 30 Rupees. 


For Vodafone Users :
To Transfer the Balance you just need to Dial *131*Amount*Mobile No#
E.g
. *131*50*9975426210# To Transfer 50 Rupees Of Balance.

For Uninor Users :
To Transfer the Balance you just need to Dial *202*MobileNumber*Amount#
E.g. *202*97755210*30# To Transfer 30 Rupees. 


For BSNL Users :
To Transfer the Balance Just Send SMS GIFT MobileNumber Amount To 53733.
E.g. GIFT 9487677710 50 To Transfer 50 Rupees Of Balance.

enjoy :)

Airtel 3G Unlimited GPRS Trick And Hack With Fastest Proxy 2013


 10 
Follow the Instructions Below :-
  1. Create A New Airtel Manual Settings
  2. Apn : airtelgprs.com
  3. Proxy : 208.77.23.4
  4. Port : 80
  5. Home Page : fb.me
  6. If Its Not Working Try live.airtelworld.com

vodafone 2G & 3G Hack 2013 With Super Fast Speed by saini

 4 
Hi Friends Today i will share the vodafone internet trick for 2013 .By this Trick you will get 6 GB Free Internet Data for 6 Months .This Latest Trick Already Tested before published in Rajasthan,Punjab,Haryana,West Bengol and other places .So hurryup



Process :-
Proxy Settings for Vodafone unlimited 3g Hack:-
Make these Settings as Below :-
Account Name:- HackingHomeMobileTrick
home page : live.vodafone.in
proxy:- 10.10.1.100
apn:- portalnmms
port:- 9401 or 8799

 just type ACT FB and then send the message to 144
after you will get conformation  msg and free internet for 6 month

if you want increase your internet data then try this again after 6 month

so enjoy and yeha keep your bal low \m/ comment if not working :

Free BSNL 3G Hack & Trick 2015 ( 100% Working )


 1 
Hello Friends !! here is in 2013 latest fast proxy trick for BSNL  Network Users. This trick is working with Resume support with downloads and with YouTube, Facebook too. You can download by very fast speed also.This trick is working with 2G and 3G both.So just use it and enjoy super fast 3G speed for free.

it is also tested by me your admin jixxi :P so i guess its working

Trick 1
Use the Following New Connection For Free :-

  1. Name :3G free(any) 
  2. Service Type 1
  3.  WAP Gateway IP : 1 10.100.3.2 
  4. Port no : 1 : 9209. 
  5. Timeout: Never 
  6. CSD No.1 
  7. User Name1: ppp 
  8. Password1: ppp123 
  9. APN setting: wapwest.cellone.in 
  10. User Name : ppp 
  11. Password : ppp123
Now save the following settings and  leave the other settings as default and using this activated settings hack bsnl 3G for free new 2012 trick in bsnl mobile free for 3mbps speed browsing and downloading in bsnl 3G.

OR

Trick 2 :

Requirements:-

 1) You Must Have the 3G Supported Device . 2) 3G Activated SIM ( if you are not using 3G sim it is easy to change the plan to 3G)

 Knowledge about the changing of your internet settings. Change your Internet Settings with the Following Details :-

Name :- BSNL 3G Service
Type 1 WAP
Gateway IP : -1 10.100.3.2
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting: wapwest.cellone.in
User Name : ppp
Password : ppp123
By Using this Settings , you have the free internet service at 3 MBPS Speed. 

INCREASE SPEED OF HARD DISK


 0 
I am surfing internet and finding cool stuff then i found that a post which says increase speed of hard disk  well it is obvious that hard disk is a physical things with fix RPM but windows are able to control the buffer size 

so i would like to share this tut with all of you  
Note:- if u are using laptop then dont try this due to over heating your HDD u  may loss your HDD 


It is common observation that some times our computer slows down due to low performance of hard drive. 

This problem happens due to the slow performance or poor speed of hard drive. When we say about poor performance, actually we mean, poor speed of reading/writing of hard drive. 

This problem can be solved by increasing the hard drive speed. Follow these steps to solve your problem.


click on windows and type system.ini


This window contains a line (386enh)
Now after this line type (irq14=4096)
Now close this window and save it.
Reboot your computer now.
You will surely feel better performance of your computer.
Enjoy.