To Unblock Your Any Block Action In Facebook
· When you click on “LET US KNOW” than a box will open in box write like given below:-
Finally Click On send Its Done.
Your blocked action will open in few minutes about 10-15. So enjoy this newly trick invent by me with your friends and also share this with your friends.
Step 4: Download a RAM Program
There are many programs available that allow you to free up RAM on your computer, you can get a lot of good, free ones at c net's download.com.
Step 5: Done
Now your computer should be running much faster
Removing the wallpaper can help increase start up times, and help programs load faster, especially on older PCs. To do this, right click on your desktop, go to properties, go to wallpaper, and click on none, then click apply.
How to delete Undeletable virus file ?
As we know that there is some virus files which are undeletable but today I will show you how to delete these kind of undeletable virus files
1] Open Notepad.exe
2] Click File>Save As..>
3] locate the folder where ur undeletable file is
4] Choose ‘All files’ from the file type box
5] click once on the file u wanna delete so its name appears in the ‘filename’ box
6] put a ” at the start and end of the filename (the filename should have the extension of the undeletable file so it will overwrite it)
7] Cick save,
It should ask u to overwrite the existing file,
choose yes and u can delete it as normal
Try it !!
2] Click File>Save As..>
3] locate the folder where ur undeletable file is
4] Choose ‘All files’ from the file type box
5] click once on the file u wanna delete so its name appears in the ‘filename’ box
6] put a ” at the start and end of the filename (the filename should have the extension of the undeletable file so it will overwrite it)
7] Cick save,
It should ask u to overwrite the existing file,
choose yes and u can delete it as normal
Try it !!
Trick To Lock Anyone’s Facebook ID or Account:
· First of all you need to do is to Copy the following URL/Text and send to Victim (your Facebook friend) whom you wanna lock their ID.
http:// 34255353309
Important: Before sending it to anyone, make sure that there is a space between “http://” and “34255353309“, else you facebook account will get temporary locked.
· After adding space, send it to victim through chat box or using any best way and tell him/her to copy that link, remove space and paste in comments or tell them to add it in any status in Facebook.
· That’s it. Once they post mentioned link anywhere on Facbook, their account will be locked within seconds.
· Enjoy this Facebook Funny/Locking Tricks.
Important: Before sending it to anyone, make sure that there is a space between “http://” and “34255353309“, else you facebook account will get temporary locked.
Send Email Without Internet
Steps:-
* Goto menu > message > Create message
In Message Type
* em(space)email address(space)message
EX:- hacksandtricks4u@gmail.com hey Narendra Dagar
*And send it to 55444
*Your email will be delivered within 20 Seconds
Additional details:-
The message will be received with the following subject
“Email from 99xxxxxxxx”
Your number will be written in the subject and the sender’s address will be
mails@txtbrowser.com
Steps:-
* Goto menu > message > Create message
In Message Type
* em(space)email address(space)message
EX:- hacksandtricks4u@gmail.com hey Narendra Dagar
*And send it to 55444
*Your email will be delivered within 20 Seconds
Additional details:-
The message will be received with the following subject
“Email from 99xxxxxxxx”
Your number will be written in the subject and the sender’s address will be
mails@txtbrowser.com
* Goto menu > message > Create message
In Message Type
* em(space)email address(space)message
EX:- hacksandtricks4u@gmail.com hey Narendra Dagar
*And send it to 55444
*Your email will be delivered within 20 Seconds
Additional details:-
The message will be received with the following subject
“Email from 99xxxxxxxx”
Your number will be written in the subject and the sender’s address will be
mails@txtbrowser.com
Detect and Respond to Targeted Attacks
- Comprehensive Protection—A single appliance monitors traffic over more than eighty applications and protocols and across every network port
- Best-in-class Detection—Identifies known and unknown malware, zero-day exploits, command-and-control communications, lateral movement, and other attack activities
- Rapid Remediation—Enables visibility into compromise of endpoints by providing detailed forensic data to enable fast containment and remediation of affected endpoints
- Integration and Intelligence Sharing—Enhances existing security infrastructure by sharing local and global threat intelligence with SIEMs, gateways, and other security layers
The industry’s most comprehensive mail gateway security
quarterly since 2011.
Increase Productivity with Superior Email Protection
- Detect and block APTs and targeted attacks
- Thwart targeted phishing attacks and advanced malware
- Simplify data protection and encryption
- Block more spam—proven #1 in independent test
Malware is multiplying exponentially on the Web. Check out some of these statistics regarding the proliferation of malicious attacks:
Android malware in the Google Play store has increased by 388 percent, and an estimated 12.7 percent of Google Play apps could be malicious.
Java flaws make up 91 percent of Web-based attacks, and 76 percent of companies still run Java 6, which is unsupported and vulnerable.
The amount of new malware roughly doubles every year.
Browser attacks make up 45 percent of malware attacks.
To better you need to know how some of today’s most sinister exploits work. Malware uses eight primary vehicles to introduce itself and get unfriendly with your computer, mobile device or organizational network.
1. Drive-By Download
Web looking for vulnerable websites to hack. When they find issues with website code or the ways websites are maintained, they insert malicious code that targets visitors.
2. Social Networks
People who use social networks make a great pool of victims for cyber attackers, who launch social media malware in three main ways:
3. Email and Instant Messaging
Cyber criminals often use targeted at front-facing members of an organization, such as a marketing agent or customer service rep. They address the message directly to the person and make it look as though the message comes from an influential person in the organization.
4. USB Drives
A thumb drive can come into an organization from an external source. For example, in the case of Stuxnet, U.S. government operatives may have used to upload malware to Iranian uranium enrichment plant computers. In the workplace, thumb drives are often used to prey on curious employees.
5. Unpatched Vulnerabilities
Operating systems like Windows have multiple vulnerabilities that cyber criminals can exploit to introduce malware. Other vulnerable programs include widely used applications, which cyber criminals often use so they can introduce malware to a wide audience
Step 4 :-
Then window will open as Shown below then Click on login
Step 5 :-
After Clicking On Login A Browser Will Be Asked For Opening It You Can Select Any One U Want This Step May Differ On Diffrent Platforms This IS The ScreenShot Of Andorid
Well this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”. All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras. Just google these following strings and select any result. Whoa, you can see a live cam on your PC screen!! The strings are given below:
Hack Facebook Account
This is a very simple trick so just follow the steps
Step 1.
Download Binu For You Mobile
Step 2 :-
After Then Install It On Your Mobile
Step 3 :-
Open The Binu App You Downloaded Just Now And You Will Found A Facebook Icon On It Just Click On It
Step 1.
Download Binu For You Mobile
Step 2 :-
After Then Install It On Your Mobile
Step 3 :-
Open The Binu App You Downloaded Just Now And You Will Found A Facebook Icon On It Just Click On It
Step 4 :-
Then window will open as Shown below then Click on login
Step 5 :-
After Clicking On Login A Browser Will Be Asked For Opening It You Can Select Any One U Want This Step May Differ On Diffrent Platforms This IS The ScreenShot Of Andorid
Step 6 :-
Copy The Link From The Address Bar Of The Browser You Chossen In Previous Step....And Send It To You Victim Facebook Account As Message And Tell Them To Open By Making Them Fool .....Here You Need Yours Mind Soo Use Ur Mind To Make Them Fool......So When They Open The Link There Facebook Account Will Be Opened In You Binu Browser Just Check There....!!
Copy The Link From The Address Bar Of The Browser You Chossen In Previous Step....And Send It To You Victim Facebook Account As Message And Tell Them To Open By Making Them Fool .....Here You Need Yours Mind Soo Use Ur Mind To Make Them Fool......So When They Open The Link There Facebook Account Will Be Opened In You Binu Browser Just Check There....!!
How to Hack into a Live Security Camera
Well this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”. All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras. Just google these following strings and select any result. Whoa, you can see a live cam on your PC screen!! The strings are given below:
- inurl:”CgiStart?page=”
- inurl:/view.shtml
- intitle:”Live View / – AXIS
- inurl:view/view.shtml
- inurl:ViewerFrame?Mode=
- inurl:ViewerFrame?Mode=Refresh
- inurl:axis-cgi/jpg
- inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
- inurl:view/indexFrame.shtml
- inurl:view/index.shtml
- inurl:view/view.shtml
- liveapplet
- intitle:”live view” intitle:axis
- intitle:liveapplet
- allintitle:”Network Camera NetworkCamera” (disconnected)
- intitle:axis intitle:”video server”
- intitle:liveapplet inurl:LvAppl
- intitle:”EvoCam” inurl:”webcam.html”
- intitle:”Live NetSnap Cam-Server feed”
- intitle:”Live View / – AXIS”
- intitle:”Live View / – AXIS 206M”
- intitle:”Live View / – AXIS 206W”
- intitle:”Live View / – AXIS 210?
- inurl:indexFrame.shtml Axis
- inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
- intitle:start inurl:cgistart
- intitle:”WJ-NT104 Main Page”
- intitle:snc-z20 inurl:home/
- intitle:snc-cs3 inurl:home/
- intitle:snc-rz30 inurl:home/
- intitle:”sony network camera snc-p1?
- intitle:”sony network camera snc-m1?
- site:.viewnetcam.com -www.viewnetcam.com
- intitle:”Toshiba Network Camera” user login
- intitle:”netcam live image” (disconnected)
- intitle:”i-Catcher Console – Web Monitor”
How To Block Any Website On Your PC
If you want to block any website from any machine, you need to change the setting. Though it is not hard to configure and will work across browsers.
1. From your PC, open Windows Explorer and navigate to drive where Windows are installed, C:\Windows\System32\drivers\etc.
2. Under etc folder, go to hosts or you could even type C:\Winodws\System32\etc\hosts from Command prompt.
3. Double Click on hosts, it will ask you to choose a Program, choose notepad. Or of you don’t get the option of Notepad, do it manually. Click File and the right-click then open tat file to notepad.
4. On the you will see some lines of code, don’t play or edit them. Keep them as they are and just scroll down at the bottom of the last time
5. At the last time, you will get 127.0.01 localhost. You have to add few new lines that will resemble the blocked websites.
6. Type 127.0.0.1 and then tap for space and then type address of the website that you want to block.
Trend Micro Custom Defense: Proven Protection Against
Targeted Attacks and Advanced Persistent Threat
Detect, analyze, and respond to advanced malware and other attack technique Your enterprise may be under attack by sophisticated criminals and/or nation-states. They’re focused on stealing your data and intellectual property with advanced malware and attack techniques that are purpose-built to breach your defenses, networks, and devices.
make your Format a Drive for Mac & PC Compatibility
You can format a hard drive or USB flash disk specifically so that it will be compatible with both Mac OS X and Windows PC computers. Though this excellent cross-platform compatible ability is unknown to many users, it’s not a complex process, and if you frequently use both a Mac and Windows PC you will find this particularly useful because any data, media, or files stored on the the drive will always be accessible from any operating system. It only takes a few minutes to start and it’s extremely easy, and we’ll walk you through the entire process in a few simple steps.
- Launch Disk Utility, found within /Applications/Utilities/
- Connect the drive you wish to format for dual compatibility to the Mac
- Click the drive name on the left side list in Disk Utility, and then click the “Erase” tab
- Click the drive, then select “Partition” tab
- From the “Partition Layout” dropdown menu, select “1 Partition”
- Click “Options” and choose “Master Boot Record” as the partition type, then click “OK” and “Apply
Hacks & Tricks
Reviewed by samia khan
on
01:17
Rating:
No comments: