Introductory Video

Wednesday, 31 July 2013

, ,

Invite ALL Facebook Friends To A Group, Event or Page At Once.

Invite ALL Facebook Friends


Hi Guys.Today i tell you how to invite all friends on Facebook page, Group, Event, Where ever you want just in one click.If you owned a Facebook Page, Group or Event or if you have just created, you will surely want to invite all your Facebook friends to like that page and join the group or event. I am going to share a one click method to select all your Facebook friend in the Invitation Dialog box.Facebook invites are really helpful to invite people to like your page, group or event. But sometimes it becomes a hard job if you have large number of friends like me. I have more than 2000 friends on Facebook, So It is very difficult for me to invite my friends to like my page one by one. Thus it is not easy to selecting so many people. By the tutorial given in this page, you will be able invite your all Facebook friends to like your Facebook page, Join your Facebook group or event with a single click.By the help of Java script, we can easily select all check boxes in any dialog boxes on some major web browser. You can select all your check boxes in a dialog boxed by adding a small command line to your web browser like Google Chrome and Mozilla Firefox. 
Now follow my Below steps.

invite Friends With Mozilla Firefox 

1. Login into your Facebook account.

2. Open that page, Group, Event Where you want to invite all friends.

3. If you want to invite friends in a page then See below image




4. After this pop up A new box like shown below.



5.  Don’t forget to check on “Search all Friends” in dialog box and scroll down until all your Facebook appears. 

6. Then Press CTRL+SHIFT+K,or Right Click on Page and click on Inspect Elements Then Click On Console  A window will open at the bottom And paste below code in it And hIt enter and wait just a second as shown below.


7. Now click on submit as shown below


Add All Friends To A Group

1. Open that group where you want to add all friends.

2. Press CTRL+SHIFT+K,or Right Click on Page and click on Inspect Elements Then Click On Console  A window will open at the bottom And paste below code in it And hIt enter wait just a second as shown below.


 3. It can autometic add all friends to your group

Invite all Friends With Google Chrom

Follow above Steps just in 6 step Press CTRL+SHIFT+J,or Right Click on Page and click on Inspect Elements Then Click On Console  A window will open at the bottom And paste below code in it And  hIt enter wait just a second as shown below.

 Note 
Use Same Method Or Code For Event


Java Script Code

javascript:elms=document.getElementsByNameundefined"checkableitems[]");for undefinedi=0;i<elms.length;i++){if undefinedelms[i].type="checkbox" )elms[i].clickundefined)}; 
Need Help
If You Need Any Help About This Topic You Can Ask me with comment and on facebook
Message me on Facebook Hasaan Haxor
, ,

Invite ALL Facebook Friends To A Group, Event or Page At Once.

Invite ALL Facebook Friends


Hi Guys.Today i tell you how to invite all friends on Facebook page, Group, Event, Where ever you want just in one click.If you owned a Facebook Page, Group or Event or if you have just created, you will surely want to invite all your Facebook friends to like that page and join the group or event. I am going to share a one click method to select all your Facebook friend in the Invitation Dialog box.Facebook invites are really helpful to invite people to like your page, group or event. But sometimes it becomes a hard job if you have large number of friends like me. I have more than 2000 friends on Facebook, So It is very difficult for me to invite my friends to like my page one by one. Thus it is not easy to selecting so many people. By the tutorial given in this page, you will be able invite your all Facebook friends to like your Facebook page, Join your Facebook group or event with a single click.By the help of Java script, we can easily select all check boxes in any dialog boxes on some major web browser. You can select all your check boxes in a dialog boxed by adding a small command line to your web browser like Google Chrome and Mozilla Firefox. 
Now follow my Below steps.

Tuesday, 30 July 2013

, , , , ,

Trojan Horse Computer Virus And Types of Trojan Horse Viruses

Trojan Horse Virus


Hi Guys.Today i tell you what is Trojan horse and his types.A Trojan horse or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These back doors tend to be invisible to average users, but may cause the computer to run slow. Trojans do not attempt to inject themselves into other files like a computer virus.

 
Trojan horses may steal information, or harm their host computer systems.Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include:
  • Crashing the computer
  • Blue screen of death
  • Electronic money theft
  • Disabling all internet traffic on the host
  • Data theft
  • Keystroke logging
  • Watching the user's screen
  • Viewing the user's webcam
  • Controlling the computer system remotely
Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.
A recent innovation in Trojan horse code takes advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide internet usage.A hacker is able to view internet sites while the tracking cookies, internet history, and any IP logging are maintained on the host computer. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Newer generations of the Trojan horse tend to "cover" their tracks more efficiently. Several versions of Sub7 have been widely circulated in the US and Europe and are the most widely distributed examples of this type of Trojan horse.

Common Trojan horses

  • Netbus (by Carl-Fredrik Neikter)
  • Subseven or Sub7(by Mobman)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • The Blackhole exploit kit
  • Flashback Trojan (Trojan BackDoor.Flashback)
  • ProRat
  • ZeroAccess

Types of Trojan Horse Viruses

1. The Remote Administration Trojan Horse Virus

This type of Trojan horse virus gives hacker behind the malware the possibility to gain control over the infected system. Often the remote administration Trojan horse virus functions without being identified. It can help the hacker to perform different functions including altering the registry, uploading or downloading of files, interrupting different types of communications between the infected computer and other machines.

2. The File Serving Trojan Horse Virus

Trojan horse viruses from this category are able to create a file server on the infected machine. Usually this server is configured as an FTP server and with its help the intruder will be able to control network connections, upload and download various files. These Trojan horse viruses are rather small in size, sometimes not more than 10Kb, which makes it difficult to detect them. They are often attached to emails or hidden in other files that users may download from the Internet. Regularly these Trojan viruses spread with the help of funny forwarded messages that a user receives from friends. Trojan horse viruses may also be hidden in small downloadable games. 

3. Distributed Denial of Service Attack Trojan Horse Virus

A lot of computers can be tricked intro installing the Distributed Denial of Service Trojan so that the hacker can gain control over one, several or all computers through a client that is connected with a master server. Using the primary computer within one huge zombie network of machines, hackers are able to sent attacks at particular targets, including companies and websites. They simply flood the target server with traffic, thus making it impossible for simple users to access certain websites or systems. Often these attacks are used to stop the activity of famous brands that could handle different financial demands. 

4. Keylogging Trojan Horse Virus

These Trojan horse viruses make use of spyware with the goal of recording every step of user's activity on the computer. They are called keylogging because they transmit to the hacker via email the information about logged and recorded keystrokes. Hackers use this type of malware for their financial benefit (through card fraud or identity theft). Some individuals or companies can offer a great reward for valuable information. 

5. The Password Stealing Trojan Horse Virus

The name speaks for itself - Trojans from this category are used to steal passwords. The Trojan transmits information about passwords to the hacker through email. Just like keylogging Trojans, this malware is used mainly for hacker's financial benefit (a lot of people use passwords to access their bank accounts or credit cards). 

6. The System Killing Trojan Horse Virus

These Trojans are meant to destroy everything in the system starting with drive Z and ending with drive A. One of the recent Trojan horse viruses of this type is called Trojan.Killfiles.904. The reasons for creating such Trojans are unknown but the results could be catastrophic.

 

Warning
Use this post only for your security and education purpose otherwise i'm not responsible
, , , , ,

Trojan Horse Computer Virus And Types of Trojan Horse Viruses

Trojan Horse Virus


Hi Guys.Today i tell you what is Trojan horse and his types.A Trojan horse or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These back doors tend to be invisible to average users, but may cause the computer to run slow. Trojans do not attempt to inject themselves into other files like a computer virus.

, , ,

Introduction To Linux - A Beginners Guide Free Download

Introduction To Linux - A Beginners Guide



Hi guys. In my previous post i give you The ultimate Guide to computer repairing .Now today post is specilley for those people who want to intrusted in Linux/Unix operating System.Many people still believe that  Linux learning is difficult, or that only experts can understand how a Linux system works.Now This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration.To download This book click on below link
Password for the rar file is tricks4u


Download Here


Enjoy :)
, , ,

Introduction To Linux - A Beginners Guide Free Download

Introduction To Linux - A Beginners Guide



Hi guys. In my previous post i give you The ultimate Guide to computer repairing .Now today post is specilley for those people who want to intrusted in Linux/Unix operating System.Many people still believe that  Linux learning is difficult, or that only experts can understand how a Linux system works.Now This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration.To download This book click on below link

Sunday, 28 July 2013

, ,

The Ultimate Guide To Computer Repairing Ebook Free Download

The Ultimate Guide To Computer Repairing





Hi Guys.in my previous post i give you worlds No1 Hackers underground hacking Ebook.Now today i give you The ultimate computer repair guide.The Ultimate Guide to Computer Repairing is amazing book for everyone to read.You  Read in this book how to maintain and repair any desktop and laptop computer .As you know we are in the computer age and the knowledge of computers is very Important.This is where this ebook comes in.Have you ever wanted to be a computer engineer at least being able to repair and maintain your system,then this Ebook is truly for you.This.Ebook Has Articles with photos and videos that show detailed step by step Pc repairing maintenance procedures Ebook also have many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.Now you can download this book below link Free.


, ,

The Ultimate Guide To Computer Repairing Ebook Free Download

The Ultimate Guide To Computer Repairing





Hi Guys.in my previous post i give you worlds No1 Hackers underground hacking Ebook.Now today i give you The ultimate computer repair guide.The Ultimate Guide to Computer Repairing is amazing book for everyone to read.You  Read in this book how to maintain and repair any desktop and laptop computer .As you know we are in the computer age and the knowledge of computers is very Important.This is where this ebook comes in.Have you ever wanted to be a computer engineer at least being able to repair and maintain your system,then this Ebook is truly for you.This.Ebook Has Articles with photos and videos that show detailed step by step Pc repairing maintenance procedures Ebook also have many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.Now you can download this book below link Free.

, , ,

See Unprotected Cameras Using Google 100% Working Trick

See Unprotected Cameras using Google



Hi Guys:Today i tell you hacking and most intrusting thing.View or Hack Unprotected Live Cameras Using Google In this tutorial i will teach you to hack or view unprotected cam using a simple Google trick.Using this trick you can see live view of streets and roads etc.if you learn this trick you just follow my Below steps and see the megic.Below is the list of Google dork you can use to see cams.
1. Go to Google and search for inurl:view/view.shtml Like Shown Below.

 

2. Now open any of the link from the search result and enjoy.


3. Below is the list of Google dork you can use to see more cams.
  • inurl:/view.shtml
  • intitle:”Live View / - AXIS” | inurl:view/view.shtml^
  • inurl:ViewerFrame?Mode=
  • inurl:ViewerFrame?Mode=Refresh
  • inurl:axis-cgi/jpg
  • inurl:axis-cgi/mjpg (motion-JPEG)
  • inurl:view/indexFrame.shtml
  • inurl:view/index.shtml
  • inurl:view/view.shtml
  • intitle:start inurl:cgistart
  • intitle:”live view” intitle:axis
  • liveapplet
  • intitle:snc-z20 inurl:home/
  • intitle:liveapplet
  • intitle:”i-Catcher Console - Web Monitor”
  • intitle:axis intitle:”video server”
  • intitle:liveapplet inurl:LvAppl
  • intitle:”EvoCam” inurl:”webcam.html”
  • intitle:”Live NetSnap Cam-Server feed”
  • intitle:”Live View / - AXIS”
  • intitle:”Live View / - AXIS 206W”
  • intitle:”Live View / - AXIS 210″
  • inurl:indexFrame.shtml Axis
  • intitle:”Live View / - AXIS 206M”
  • inurl:”MultiCameraFrame?Mode=Motion”
  • allintitle:”Network Camera NetworkCamera”
  • intitle:”WJ-NT104 Main Page”
  • intext:”MOBOTIX M1″ intext:”Open Menu”
  • intext:”MOBOTIX M10″ intext:”Open Menu”
  • intext:”MOBOTIX D10″ intext:”Open Menu”
  • intitle:”netcam live image”
  • intitle:snc-cs3 inurl:home/
  • intitle:snc-rz30 inurl:home/
  • intitle:”sony network camera snc-p1″
  • intitle:”sony network camera snc-m1″
  • site:.viewnetcam.com -www.viewnetcam.com
  • intitle:”Toshiba Network Camera” user login

Warning
Use this post only for your security and education purpose otherwise i'm not responsible

Enjoy :)





, , ,

See Unprotected Cameras Using Google 100% Working Trick

See Unprotected Cameras using Google



Hi Guys:Today i tell you hacking and most intrusting thing.View or Hack Unprotected Live Cameras Using Google In this tutorial i will teach you to hack or view unprotected cam using a simple Google trick.Using this trick you can see live view of streets and roads etc.if you learn this trick you just follow my Below steps and see the megic.Below is the list of Google dork you can use to see cams.

Thursday, 25 July 2013

, , ,

Worlds No.1The Hacker's Underground Handbook Free Download

The Hacker's Underground Handbook



Hi Guys:In my previous post i give you Hacking For Beginners Ebook.Now to day i give you world No.1 most femaous Ebook.The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner.You can ask for any Ebooks by comment below i will provide you.

  • Concept of Hacking
  • Programming
  • Linux
  • Network Hacking 
  • Wireless Hacking
  • Windows Hacking
  • Web Hacking
  • Malware
Go This Website Click On Download Ebook.Now your Downloading Start :) 

Warning
Use this post only for your security and education purpose otherwise i'm not responsible

        Enjoy :)




, , ,

Worlds No.1The Hacker's Underground Handbook Free Download

The Hacker's Underground Handbook



Hi Guys:In my previous post i give you Hacking For Beginners Ebook.Now to day i give you world No.1 most femaous Ebook.The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner.You can ask for any Ebooks by comment below i will provide you.
, , , , ,

Block Or Unblock Any Websites On Your Computer.

Block Or Unblock Any Websites


Hi Guys.Today i tell you how to block Or Unblock any website into your Computer.If your network administrator or ISP have blocked some web sites you want to open it use this trick.How to stop a porn site from opening it into your School, Work, Home or Anywhere.The act of blocking particular websites can be useful if you want to restrict your employees' Internet behavior at work, or if you want to restrict family members from accessing certain offensive or inappropriate websites. The methods for blocking and unblocking websites include entering specific websites into the hosts file of your computer.
 
1. Go to Start and then Run.
 
2. Type in this C:\WINDOWS\system32\drivers\etc
 
3. Now you will see file name Host open that in Notepad.
 
 
4. Below "127.0.0.1 www.yoursite.com" add IP address of site to be blocked.
Eg:If you want to block facebook then write 127.0.0.1www.facebook.com as shown below
 


 
5. To unblock any site just Remove that line.
 
NOTE: 
For each site you block just add "1" to the IP (127.0.0.1)
 
Enjoy :) 
, , , , ,

Block Or Unblock Any Websites On Your Computer.

Block Or Unblock Any Websites


Hi Guys.Today i tell you how to block Or Unblock any website into your Computer.If your network administrator or ISP have blocked some web sites you want to open it use this trick.How to stop a porn site from opening it into your School, Work, Home or Anywhere.The act of blocking particular websites can be useful if you want to restrict your employees' Internet behavior at work, or if you want to restrict family members from accessing certain offensive or inappropriate websites. The methods for blocking and unblocking websites include entering specific websites into the hosts file of your computer.
, ,

Hacking For Beginners Free Ebook Download.

Hacking For Beginners


Hi Guys:In my previous post i give you a book How to Become worldNo.1 hacker. Now today post is mostly for those peoples who are new in hacking.Today i give him a beginners hacking book.Hacking for beginners,name defines it self that this book is completely for beginners.This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner.Hacking For Beginners is a reference book for beginners to learn ethical hacking for free and from basic level to clear all the fundamental concepts of ethical hacking.you can begin your hacking journey with this book.. More Ebooks and tutorials are own its way so subscribe below and don't miss them.This book is well written and you will enjoy reading it.

  • Concept of Ethical hacking
  • Email Hacking
  • Windows Hacking
  • Linux Hacking
  • Wireless Hacking
  • Mobile Hacking
  • Trojans
Note:
Password for the rar file is tricks4u

Download Here

Warning
Use this post only for your security and education purpose otherwise i'm not responsible
, ,

Hacking For Beginners Free Ebook Download.

Hacking For Beginners


Hi Guys:In my previous post i give you a book How to Become worldNo.1 hacker. Now today post is mostly for those peoples who are new in hacking.Today i give him a beginners hacking book.Hacking for beginners,name defines it self that this book is completely for beginners.This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner.Hacking For Beginners is a reference book for beginners to learn ethical hacking for free and from basic level to clear all the fundamental concepts of ethical hacking.you can begin your hacking journey with this book.. More Ebooks and tutorials are own its way so subscribe below and don't miss them.This book is well written and you will enjoy reading it.

Wednesday, 24 July 2013

, , , , , , ,

What Is Keylogger ? How To Use keylogger For Facebook, Email Hacking ? How To Be Safe From Keyloggers

keylogger


Hi Guys. Today i tell you most useful intrusting and most famous hacking tool.You might have heard about keyloggers but really don't know what they are reading this article will clear your mind.First i tell you what is keylogger. A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information.Some keylogger software is freely available on the Internet, while others are commercial or private applications.

Most keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Detecting the presence of a keylogger on a computer can be difficult. So-called anti-keylogging programs have been developed to thwart keylogging systems, and these are often effective when used properly.

How it can harm you ?



  • It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details etc.
  • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

Types of  keyloggers 

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

HARDWARE KEYLOGGER




 SOFTWARE KEYLOGGER

 

How to Protect yourself from keyloggers ?

Update your Windows Version. This is probably the most important of all. Windows is known to release new security updates every 1-2 days along with updates to windows defender. Never risk your safety and get the most up-to-date version of Windows.


Install an antivirus. Anti viruses are essential for all computers for safety and security. This will prevent your computer from getting viruses. Scan regularly with it. Some good antiviruses are Norton Antivirus, McAfee Antivirus, and Kaspersky antivirus. If you cannot afford them, download Avast! antivirus or AVG antivirus (both are free).




  • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your Facebook profile, yahoo or Gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

Warning
Use this post only for your security and education purpose otherwise i'm not responsible
, , , , , , ,

What Is Keylogger ? How To Use keylogger For Facebook, Email Hacking ? How To Be Safe From Keyloggers

keylogger


Hi Guys. Today i tell you most useful intrusting and most famous hacking tool.You might have heard about keyloggers but really don't know what they are reading this article will clear your mind.First i tell you what is keylogger. A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information.Some keylogger software is freely available on the Internet, while others are commercial or private applications.

,

Become Worlds No.1 Hacker Ebook Free Download.

Worlds No.1 Hacker



Hi Guys.In my previous post i give you a secret of a Super hacker ebook.
Now Today i give you a book his name is How to become world NO.1 Hacker.This book will give you information on different concepts of hacking.like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.


  • Attack Basics
  • Password Basics
  • Account Basics
  • Denial of Service Basics (DOS)
  • Logging Basics
  • Spyware
  • Port Scanning
  • Unix remote attack
  • SQL injection
  • Spoofing and Hijacking
  • Social Engineering
  • How to become hacker in 15 minutes
  • Making money as Hacker

Download Here

NOTE:

Password for the rar file is tricks4u
Warning
Use this post only for your security and education purpose otherwise i'm not responsible
Enjoy :)