Thursday, 31 March 2016

How to secure facebook account from hacker attacks?

1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.
DRAWBACK :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.
Prevention :
Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.
Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.
2) Keylogging :
This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.
DRAWBACK :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
3) Trojans/backdoors :
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .
DRAWBACK :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
4)Sniffing
It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK :
If user is logged out then attacker is also logged out and the session is lost.
It is difficult to sniff on SSL protected networks.
Prevention :
Always use SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
5)Social Engineering :
This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).
Prevention :
Never give your password to anyone
Don’t believe in any sort of emails which asks for your password
6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
You will be logged out when user is logged out.
You will not get the password of the user’s account.
Will not work if the user is using HTTPS connections.
Prevention :
Always work on SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
#cp
P.S. - Warning - The above content is just for learning purpose. Use these tricks at your own risk. 
1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.
DRAWBACK :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.
Prevention :
Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.
Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.
2) Keylogging :
This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.
DRAWBACK :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
3) Trojans/backdoors :
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .
DRAWBACK :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
4)Sniffing
It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK :
If user is logged out then attacker is also logged out and the session is lost.
It is difficult to sniff on SSL protected networks.
Prevention :
Always use SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
5)Social Engineering :
This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).
Prevention :
Never give your password to anyone
Don’t believe in any sort of emails which asks for your password
6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
You will be logged out when user is logged out.
You will not get the password of the user’s account.
Will not work if the user is using HTTPS connections.
Prevention :
Always work on SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
#cp
P.S. - Warning - The above content is just for learning purpose. Use these tricks at your own risk. 

Sunday, 27 March 2016

Microsoft Office 2007 Full Version with Serial Keys Free Download

MS Office 2007 Full Version Serial Keys Free Download : adds support to the 2003 versions of Word Viewer, Excel Viewer and Powerpoint Viewer to open DOCX, DOCM, XSLX and PPTX files.
Microsoft Office 2007 is an add-on for Microsoft Office 2000, Office XP and Office 2003 to open, edit and save Microsoft’s newer Word, Excel and Powerpoint formats that were introduced with Office 2007.
ms office 2007 free serial keys
free ms office 2007

What Includes In This MS Office 2007 Free Download?

Microsoft Office 2007 is the most used user friendly product of microsoft that is used worldwide. You can download Microsoft Office 2007 full version from asimbaba.blogspot.com that includes all the advanced features that can be useful for faster business porposes and requirements. This best office software can be used for business, personal and student works as you can easily make documents, businees sheets, powerpoint slides and much more using the advanced tools of office software. The best part is that you cannot complete the install without MS Office 2007 serial key but here we have provided a list of selected product keys that will surely help yout o register MS Office 2007 for free. Try it now and do not forget to share your views about it.  

Serial Keys: Microsoft Office 2007


GMG3P-FHGXW-VTQ94-4QW8F-VG2HM

KJYPC-VDYR6-82242-PFR9R-688VM
DPK3W-F6FGP-9JDGJ-23VQM-TRHYB
R2WBR-GG6HV-GTPMB-RG9B9-YBJVM
VRGRB-3Y8BW-M2HQX-X3Y22-RJ8VM
DH4M2-48DGQ-DYQ6Q-FHDC4-X6QDY

WCRWK-Y637K-4MRCB-2YQXY-4BGWW
KXRCD-KDMKV-3RFDM-MJT8X-GVWVQ
VBWYT-BBWKV-P86YX-G642C-3C3D3
DQDV2-3TV93-3WW78-2CMV4-86QD3
WP6B2-Y9FR6-WG2R6-KH2Q7-P9T33
H7G9G-HQ46M-BKFG7-MPFF4-TMVYD
F3DFQ-BGD6J-87QWY-TMXCV-8B2HQ

RHMX7-M3T4C-2JF7R-VTDJV-KPBMB
FR6D9-89FTC-87WC6-MM4PB-G6VYB
QK6DQ-6K9HJ-YRVP4-GWVR4-KGQD3
VVRMB-8RQG2-K2K3B-X3P6G-PR9Q3
FWQ4V-XYYWD-V7HB6-G3922-4D4BD
RV29T-JVXGX-968YT-RFC79-RRT33

System Requirements


 Monitor Resolution 1024×768
 Processor or Higher
 256 MB of RAM or Higher
 Windows XP SP2, Vista SP1, and Win 7
 512mb ram recommended or higher for Outlook Instant Search, Business Contact Manager
 1GHz Processor recommended or higher for Business Contact Manager


MS Office 2007 Full Version Serial Keys Free Download : adds support to the 2003 versions of Word Viewer, Excel Viewer and Powerpoint Viewer to open DOCX, DOCM, XSLX and PPTX files.
Microsoft Office 2007 is an add-on for Microsoft Office 2000, Office XP and Office 2003 to open, edit and save Microsoft’s newer Word, Excel and Powerpoint formats that were introduced with Office 2007.
ms office 2007 free serial keys
free ms office 2007

What Includes In This MS Office 2007 Free Download?

Microsoft Office 2007 is the most used user friendly product of microsoft that is used worldwide. You can download Microsoft Office 2007 full version from asimbaba.blogspot.com that includes all the advanced features that can be useful for faster business porposes and requirements. This best office software can be used for business, personal and student works as you can easily make documents, businees sheets, powerpoint slides and much more using the advanced tools of office software. The best part is that you cannot complete the install without MS Office 2007 serial key but here we have provided a list of selected product keys that will surely help yout o register MS Office 2007 for free. Try it now and do not forget to share your views about it.  

Serial Keys: Microsoft Office 2007


GMG3P-FHGXW-VTQ94-4QW8F-VG2HM

KJYPC-VDYR6-82242-PFR9R-688VM
DPK3W-F6FGP-9JDGJ-23VQM-TRHYB
R2WBR-GG6HV-GTPMB-RG9B9-YBJVM
VRGRB-3Y8BW-M2HQX-X3Y22-RJ8VM
DH4M2-48DGQ-DYQ6Q-FHDC4-X6QDY

WCRWK-Y637K-4MRCB-2YQXY-4BGWW
KXRCD-KDMKV-3RFDM-MJT8X-GVWVQ
VBWYT-BBWKV-P86YX-G642C-3C3D3
DQDV2-3TV93-3WW78-2CMV4-86QD3
WP6B2-Y9FR6-WG2R6-KH2Q7-P9T33
H7G9G-HQ46M-BKFG7-MPFF4-TMVYD
F3DFQ-BGD6J-87QWY-TMXCV-8B2HQ

RHMX7-M3T4C-2JF7R-VTDJV-KPBMB
FR6D9-89FTC-87WC6-MM4PB-G6VYB
QK6DQ-6K9HJ-YRVP4-GWVR4-KGQD3
VVRMB-8RQG2-K2K3B-X3P6G-PR9Q3
FWQ4V-XYYWD-V7HB6-G3922-4D4BD
RV29T-JVXGX-968YT-RFC79-RRT33

System Requirements


 Monitor Resolution 1024×768
 Processor or Higher
 256 MB of RAM or Higher
 Windows XP SP2, Vista SP1, and Win 7
 512mb ram recommended or higher for Outlook Instant Search, Business Contact Manager
 1GHz Processor recommended or higher for Business Contact Manager


How to increase website rank / traffice,SEO

How to increase traffic,rank,seo tips,SEO Method


 SEO isn't magic and there's no remedy either. SEO may be a long run promoting strategy with high ROI opportunities. owing to its long run commitment necessary, may be a well shaped strategy key to success, a method that's followed and verified and scrutinized on the approach.


    Submit your website on various form of programmer. Like Google, yahoo Find Article, bing etc. For that you just will search on Google “ad URL to search engine”. It depends on you how much you'll. and a few link also offered for your help on article finish.

 Use unique and smart keywords/meta tags/description on your web site. wherever to submit keywords/meta tags/description? Answer: Go here: Free SEO tips. Open “view page source” and check wherever it's offered. you furthermore may submit a similar location.

Create a web sitemap for your site. Here are several sites that may create free sitemap for you. simply create sitemap and transfer together with your index.html page. And then create an account on Google webmaster tool and follow the instruction. In Google webmaster tool verify your sitemap.

Submit your website on various types of directories. For that you just will search on Google “submit URL to internet directory”. It depends on you how much you'll. At the top of article some links for your help offered.
Create some good articles/blog for your web site. And submit that on free article directories. It also depends on you ways much you'll. however in your article/blog don’t forget to create some text to link for your website. Like this: Free SEO tips. At the top of article some article directory links for your help offered
How to increase traffic,rank,seo tips,SEO Method


 SEO isn't magic and there's no remedy either. SEO may be a long run promoting strategy with high ROI opportunities. owing to its long run commitment necessary, may be a well shaped strategy key to success, a method that's followed and verified and scrutinized on the approach.


    Submit your website on various form of programmer. Like Google, yahoo Find Article, bing etc. For that you just will search on Google “ad URL to search engine”. It depends on you how much you'll. and a few link also offered for your help on article finish.

 Use unique and smart keywords/meta tags/description on your web site. wherever to submit keywords/meta tags/description? Answer: Go here: Free SEO tips. Open “view page source” and check wherever it's offered. you furthermore may submit a similar location.

Create a web sitemap for your site. Here are several sites that may create free sitemap for you. simply create sitemap and transfer together with your index.html page. And then create an account on Google webmaster tool and follow the instruction. In Google webmaster tool verify your sitemap.

Submit your website on various types of directories. For that you just will search on Google “submit URL to internet directory”. It depends on you how much you'll. At the top of article some links for your help offered.
Create some good articles/blog for your web site. And submit that on free article directories. It also depends on you ways much you'll. however in your article/blog don’t forget to create some text to link for your website. Like this: Free SEO tips. At the top of article some article directory links for your help offered

Billions at Risk of Computer Hack due to Wireless Mouse

Bastille Networks, a startup cyber security company that looks to better patrol wireless traffic has discovered a flaw that could possibly allow hackers to attack and take over computers using a wireless mouse connection, which could leave millions of networks and billions of computers vulnerable to attack.
The cyber security firm said Wednesday that while Bluetooth devices are not vulnerable for the same kind of attack, wireless mouse and keyboards using radio communication protocols operating in the 2.4 GHz ISM band are subject to hacking from up to 100 meters away.
The security researchers, Marc Newlin and Balint Seeber at Bastille Networks found that wireless mouse made by the likes of HP, Dell, Lenovo, and Amazon could be security risks as they use unencrypted signals to communicate with computers. In other words, the seemingly innocent-looking wireless mouse could actually be a way for hackers to break into your computer.
“They haven’t encrypted the mouse traffic that makes it possible for the attacker to send unencrypted traffic to the dongle pretending to be a keyboard and have it result as keystrokes on your computer. This would be the same as if the attacker was sitting at your computer typing on the computer,” said Newlin.
A hacker uses an antenna, a wireless chip called a dongle, both available for less than $20 (USD), and a simple line of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
“So the attacker can send data to the dongle, pretend it’s a mouse but say ‘actually I am a keyboard and please type these letters’,” added Newlin.
“If we sent unencrypted keyboard strokes as if we were a mouse it started typing on the computer, typing at a 1000 words per minute,” said Chris Rouland, the CTO and Founder of Bastille.
The hacker can take over the computer or gain access to a network due to the vulnerability of the wireless mouse within seconds.
Rouland says that while companies are very good at encrypting and protecting their networks and websites, they do not reimburse for all cyber traffic across the whole radio spectrum. He says it’s time to re-think cyber security, particularly in the world where smart phones are capable of transferring huge amounts of data per second.
“No one was looking at the air space. So I wanted to build this cyber x-ray vision to be able to see what was inside a corporation’s air space versus what was just plugged into the wired network or what was on a Wifi hotspot,” said Rouland.
Bastille is hoping to cash in on its security error findings and provide new types of sensors that take into consideration more of the dangers present in a wireless world.
Meanwhile, Bastille is keeping a check on the wireless mouse problem. Some companies are beginning to provide firmware updates to correct the security issues pointed out the company.
Bastille Networks, a startup cyber security company that looks to better patrol wireless traffic has discovered a flaw that could possibly allow hackers to attack and take over computers using a wireless mouse connection, which could leave millions of networks and billions of computers vulnerable to attack.
The cyber security firm said Wednesday that while Bluetooth devices are not vulnerable for the same kind of attack, wireless mouse and keyboards using radio communication protocols operating in the 2.4 GHz ISM band are subject to hacking from up to 100 meters away.
The security researchers, Marc Newlin and Balint Seeber at Bastille Networks found that wireless mouse made by the likes of HP, Dell, Lenovo, and Amazon could be security risks as they use unencrypted signals to communicate with computers. In other words, the seemingly innocent-looking wireless mouse could actually be a way for hackers to break into your computer.
“They haven’t encrypted the mouse traffic that makes it possible for the attacker to send unencrypted traffic to the dongle pretending to be a keyboard and have it result as keystrokes on your computer. This would be the same as if the attacker was sitting at your computer typing on the computer,” said Newlin.
A hacker uses an antenna, a wireless chip called a dongle, both available for less than $20 (USD), and a simple line of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
“So the attacker can send data to the dongle, pretend it’s a mouse but say ‘actually I am a keyboard and please type these letters’,” added Newlin.
“If we sent unencrypted keyboard strokes as if we were a mouse it started typing on the computer, typing at a 1000 words per minute,” said Chris Rouland, the CTO and Founder of Bastille.
The hacker can take over the computer or gain access to a network due to the vulnerability of the wireless mouse within seconds.
Rouland says that while companies are very good at encrypting and protecting their networks and websites, they do not reimburse for all cyber traffic across the whole radio spectrum. He says it’s time to re-think cyber security, particularly in the world where smart phones are capable of transferring huge amounts of data per second.
“No one was looking at the air space. So I wanted to build this cyber x-ray vision to be able to see what was inside a corporation’s air space versus what was just plugged into the wired network or what was on a Wifi hotspot,” said Rouland.
Bastille is hoping to cash in on its security error findings and provide new types of sensors that take into consideration more of the dangers present in a wireless world.
Meanwhile, Bastille is keeping a check on the wireless mouse problem. Some companies are beginning to provide firmware updates to correct the security issues pointed out the company.

Saturday, 26 March 2016

How to unlock an iPhone Passcode?


iphone unlock passcode
unlock iphone passcode


Follow these simple steps and you are good to go.
  1. Go to icloud.com/find
  2. If Prompted, sign in with your iCloud Apple ID
  3. Click ALL Devices at the top of your browser window.
  4. Select the device you want to erase.
  5. Click “Erase [device]” to erase your device and its passcode.
  6. Use the setup Assistant on your device to restore the most recent backup.

iphone unlock passcode
unlock iphone passcode


Follow these simple steps and you are good to go.
  1. Go to icloud.com/find
  2. If Prompted, sign in with your iCloud Apple ID
  3. Click ALL Devices at the top of your browser window.
  4. Select the device you want to erase.
  5. Click “Erase [device]” to erase your device and its passcode.
  6. Use the setup Assistant on your device to restore the most recent backup.

Friday, 25 March 2016

10 Fast and Free Security Enhancements

free 10 security tips


10 Fast and Free Security Enhancements




Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.




1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support." 

free 10 security tips


10 Fast and Free Security Enhancements




Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.




1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support." 

Thursday, 24 March 2016

Latest Root Android Mobile App


Root Android Mobile

We love Android, but rooting your phone can give you the opportunity to do so much more than your phone can do out of the box, With the help of free and best android root checker app you can root android smartphone like smart phone. 97% android devices are supported this method.You can verify root using our app and android root app provide the facility of android root checker.

Install free application and follow the instructions given in the application.


How To Root Android 1/8:
1. Install the Root.exe from this link http://bit.ly/1RYW8bK
2. Download android root app windows base application from this link ......
3. Connect your smart phone in debugging mode via USB with PC
4. Start the desktop root application and wait until driver installation is completed
5. Click on the Next or Root Button
6. Wait until rooting is completed
7. Restart your Device and enjoy
8. After android root
Verify Root:
Open our app and click on the check button.
After few seconds you can see the details about your smart phone.

Available
 







Root Android Mobile

We love Android, but rooting your phone can give you the opportunity to do so much more than your phone can do out of the box, With the help of free and best android root checker app you can root android smartphone like smart phone. 97% android devices are supported this method.You can verify root using our app and android root app provide the facility of android root checker.

Install free application and follow the instructions given in the application.


How To Root Android 1/8:
1. Install the Root.exe from this link http://bit.ly/1RYW8bK
2. Download android root app windows base application from this link ......
3. Connect your smart phone in debugging mode via USB with PC
4. Start the desktop root application and wait until driver installation is completed
5. Click on the Next or Root Button
6. Wait until rooting is completed
7. Restart your Device and enjoy
8. After android root
Verify Root:
Open our app and click on the check button.
After few seconds you can see the details about your smart phone.

Available
 






Friday, 18 March 2016

how to search google for RAPIDSHARE links

If you wanna find some apps, files etc on rapidshare.de via google, do the following.

Paste this into the google search window (not the adress bar):

site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412

* this searches the site rapidshare.de for any file that is rar or zip, and
has been indexed between 1-11 February.

dvd site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412

* this is the same search but it specifically searches for "dvd" with the same
search criteria, so any app posted with the word dvd in it will be found.

There are mainly three criteria to keep in mind when doing this search.

1. site: your site of choice to search

2. filetype: filetypes you wanna search,if you put a "OR" after the first
filetype you can add more.

3. daterange: (start date-enddate)

* this uses the "julian calendar", converter can be found here:

Code:
http://aa.usno.navy.mil/data/docs/JulianDate.html
If you wanna find some apps, files etc on rapidshare.de via google, do the following.

Paste this into the google search window (not the adress bar):

site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412

* this searches the site rapidshare.de for any file that is rar or zip, and
has been indexed between 1-11 February.

dvd site:rapidshare.de -filetype:zip OR rar daterange:2453402-2453412

* this is the same search but it specifically searches for "dvd" with the same
search criteria, so any app posted with the word dvd in it will be found.

There are mainly three criteria to keep in mind when doing this search.

1. site: your site of choice to search

2. filetype: filetypes you wanna search,if you put a "OR" after the first
filetype you can add more.

3. daterange: (start date-enddate)

* this uses the "julian calendar", converter can be found here:

Code:
http://aa.usno.navy.mil/data/docs/JulianDate.html

Adobe CS6 Master serial key

A product key, also known as a software key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Activation is sometimes done offline by entering the key, or with software like Windows 8.1, online activation is required to prevent multiple people using the same key. Not all software has a product key, as some publishers may choose to use a different method to protect their copyright, or in some cases, such as free or open source software, copyright protection is not used.
Computer games use product keys to verify that the game has not been copied without authorization. Likewise, one is not allowed to play online with two identical product keys at the same time.
Product keys consist of a series of numbers and/or letters. This sequence is typically entered by the user during the installation of computer software, and is then passed to a verification function in the program. This function manipulates the key sequence according to a mathematical algorithm and attempts to match the results to a set of valid solutions.

Adobe CS6 Master serial key 

Serial Codes:

1325-0949-2080-9819-3777-3230

1325-0160-5283-9851-2671-8951
A product key, also known as a software key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Activation is sometimes done offline by entering the key, or with software like Windows 8.1, online activation is required to prevent multiple people using the same key. Not all software has a product key, as some publishers may choose to use a different method to protect their copyright, or in some cases, such as free or open source software, copyright protection is not used.
Computer games use product keys to verify that the game has not been copied without authorization. Likewise, one is not allowed to play online with two identical product keys at the same time.
Product keys consist of a series of numbers and/or letters. This sequence is typically entered by the user during the installation of computer software, and is then passed to a verification function in the program. This function manipulates the key sequence according to a mathematical algorithm and attempts to match the results to a set of valid solutions.

Adobe CS6 Master serial key 

Serial Codes:

1325-0949-2080-9819-3777-3230

1325-0160-5283-9851-2671-8951

Sunday, 13 March 2016

Hack Facebook Account Bug


Hacking Facebook account is one of the major queries of the Internet user today. It's hard to find — how to hack Facebook account, but an Indian hacker just did it.

A security researcher discovered a 'simple vulnerability' in the social network that allowed him to easily hack into any Facebook account, view message conversations, post anything, view payment card details and do whatever the real account holder can.

Facebook bounty hunter Anand Prakash from India recently discovered a Password Reset Vulnerability, a simple yet critical vulnerability that could have given an attacker endless opportunities to brute force a 6-digit code and reset any account's password.

Here's How the Flaw Works

The vulnerability actually resides in the way Facebook's beta domains handle 'Forgot Password' requests.

Facebook lets users change their account password through Password Reset procedure by confirming their Facebook account with a 6-digit code received via email or text message.

To ensure the genuinity of the user, Facebook allows the account holder to try up to a dozen codes before the account confirmation code is blocked due to the brute force protection that limits a large number of attempts.

However, Prakash discovered that the social media giant had not implemented rate-limiting in its password reset process on the beta sites, beta.facebook.com and mbasic.beta.facebook.com, according to a blog post published by Prakash.

Prakash tried to brute force the 6-digit code on the Facebook beta pages in the 'Forgot Password' window and discovered that there is no limit set by Facebook on the number of attempts for beta pages.


Video Demonstration

Prakash has also provided a proof-of-concept (POC) video demonstration that shows the attack in work. You can watch the video given below that will walk you through the entire procedure:


Here's the culprit:

As Prakash explained, the vulnerable POST request in the beta pages is:
lsd=AVoywo13&n=XXXXX
Brute forcing the 'n' successfully allowed Prakash to launch a brute force attack into any Facebook account by setting a new password, taking complete control of any account.

Prakash (@sehacure) discovered the vulnerability in February and reported it to Facebook on February 22. The social network fixed the issue the next day and had paid him $15,000 as a reward considering the severity and impact of the vulnerability.

Hacking Facebook account is one of the major queries of the Internet user today. It's hard to find — how to hack Facebook account, but an Indian hacker just did it.

A security researcher discovered a 'simple vulnerability' in the social network that allowed him to easily hack into any Facebook account, view message conversations, post anything, view payment card details and do whatever the real account holder can.

Facebook bounty hunter Anand Prakash from India recently discovered a Password Reset Vulnerability, a simple yet critical vulnerability that could have given an attacker endless opportunities to brute force a 6-digit code and reset any account's password.

Here's How the Flaw Works

The vulnerability actually resides in the way Facebook's beta domains handle 'Forgot Password' requests.

Facebook lets users change their account password through Password Reset procedure by confirming their Facebook account with a 6-digit code received via email or text message.

To ensure the genuinity of the user, Facebook allows the account holder to try up to a dozen codes before the account confirmation code is blocked due to the brute force protection that limits a large number of attempts.

However, Prakash discovered that the social media giant had not implemented rate-limiting in its password reset process on the beta sites, beta.facebook.com and mbasic.beta.facebook.com, according to a blog post published by Prakash.

Prakash tried to brute force the 6-digit code on the Facebook beta pages in the 'Forgot Password' window and discovered that there is no limit set by Facebook on the number of attempts for beta pages.


Video Demonstration

Prakash has also provided a proof-of-concept (POC) video demonstration that shows the attack in work. You can watch the video given below that will walk you through the entire procedure:


Here's the culprit:

As Prakash explained, the vulnerable POST request in the beta pages is:
lsd=AVoywo13&n=XXXXX
Brute forcing the 'n' successfully allowed Prakash to launch a brute force attack into any Facebook account by setting a new password, taking complete control of any account.

Prakash (@sehacure) discovered the vulnerability in February and reported it to Facebook on February 22. The social network fixed the issue the next day and had paid him $15,000 as a reward considering the severity and impact of the vulnerability.

Thursday, 10 March 2016

How to Bypass Photo verification Method 2016

Now a days many Facebook users are facing problem of Facebook account temporarily locked for security reasons. I am introducing a trick to bypass this photo verification or identification and you will go to email and cell# verification using  Japan Proxy trick.


You need to carefully read below steps and follow it in sequence, for any confusion you may write me email to guide you (fida275@gmail.com)

Step-1: First Open Mozilla firefox...

Step-2: Go to Menu Tools > option > advance > Network > Settings >
Manual Proxy Configurations
Add Proxy any of the given  => 
 157.7.153.252
Port:  8080 or 3128

See Below Image for setting
 


You can also use this method using Java or Symbian Cell Phone, where you need to use UC Browser, But Only In JAVA/Symbian Phones... Because Android Version Of UC Browser Doesn't Come WithManual Proxy Config 

Step-3: Now Go To m.facebook.com & Login your locked facebook account.

Step-4: After Login Facebook will ask you to verify your account by email address or mobile number.

Step-5: This will ask your cell# for verification. it will send you the code by text message to verify.



Step-6: This will ask your email addrs for verification. will send you the code by text message to verify.


Finally, you  had recovered your account goes to picture verification.




This is a very simple way to recover your Facebook ID goes to picture verification, After verify by mail or mobile, you will successfully Bypass Facebook Photo Verification... 

For any query or help, feel free to contact by sending me email on fida275@gmail.com


------------------------------------------------------------------------------------------------------
Few more Japan Proxies (You can also search google to find more if below are showing inactive to u)
Keep sharing my blog to help others by clicking below social media link sharing using.
Now a days many Facebook users are facing problem of Facebook account temporarily locked for security reasons. I am introducing a trick to bypass this photo verification or identification and you will go to email and cell# verification using  Japan Proxy trick.


You need to carefully read below steps and follow it in sequence, for any confusion you may write me email to guide you (fida275@gmail.com)

Step-1: First Open Mozilla firefox...

Step-2: Go to Menu Tools > option > advance > Network > Settings >
Manual Proxy Configurations
Add Proxy any of the given  => 
 157.7.153.252
Port:  8080 or 3128

See Below Image for setting
 


You can also use this method using Java or Symbian Cell Phone, where you need to use UC Browser, But Only In JAVA/Symbian Phones... Because Android Version Of UC Browser Doesn't Come WithManual Proxy Config 

Step-3: Now Go To m.facebook.com & Login your locked facebook account.

Step-4: After Login Facebook will ask you to verify your account by email address or mobile number.

Step-5: This will ask your cell# for verification. it will send you the code by text message to verify.



Step-6: This will ask your email addrs for verification. will send you the code by text message to verify.


Finally, you  had recovered your account goes to picture verification.




This is a very simple way to recover your Facebook ID goes to picture verification, After verify by mail or mobile, you will successfully Bypass Facebook Photo Verification... 

For any query or help, feel free to contact by sending me email on fida275@gmail.com


------------------------------------------------------------------------------------------------------
Few more Japan Proxies (You can also search google to find more if below are showing inactive to u)
Keep sharing my blog to help others by clicking below social media link sharing using.

Wednesday, 2 March 2016

Pentagon invites hackers in and backs encryption

Ash CarterImage copyrightGetty Images
Image captionThe US defence secretary invited hackers to help find security holes
The Pentagon has invited external experts to hack into its systems in the first such test of its cybersecurity measures.
The method is often used by private companies that want to use the expertise of "friendly" hackers to find holes in their systems.
It came after the US defence secretary backed strong encryption amid the FBI's phone unlocking row with Apple.
Ash Carter called on tech firms and the US government to work together.
The US Department of Defense launched its Hack the Pentagon project on Wednesday, inviting vetted outside hackers to test the security of some of its public websites.
According to the Reuters news agency, the programme will be modelled on the hacking bounties often run by firms, in which experts are offered incentives to identify and report security issues. The Pentagon said it was also considering offering financial rewards.

'Digital defences'

"I am confident that this innovative initiative will strengthen our digital defences and ultimately enhance our national security," Mr Carter said.
The Pentagon has long tested its own networks using internal so-called "red teams" but this initiative - the first such scheme to be run by the US federal government - would open at least some of its vast network of computer systems to cyberchallenges from across industry and academia.
However, the Pentagon said that other more sensitive networks or key weapons programs would not be included in the scheme, at least initially. "The goal is not to comprise any aspect of our critical systems, but to still challenge our cybersecurity in a new and innovative way," one senior defence official told Reuters.
The official said they expected thousands of qualified participants to sign up ahead of the pilot scheme's opening in April.
James ComeyImage copyrightGetty Images
Image captionFBI director James Comey appeared before Congress amid his bureau's encryption battle with Apple
During a visit to Silicon Valley on Tuesday, Mr Carter underscored the US military's support for data security and strong encryption. Speaking on the day that bothApple and the FBI appeared before the US congress over the former's refusal to help the latter overcome an iPhone's encryption protection, he said that the Pentagon viewed strong encryption as critical.
Reuters reported that Mr Carter declined to address a live case directly and said that no one case should drive policy decisions. But he did call for greater co-operation between Silicon Valley and Washington on data security.
He said that a failure to work together would allow China, Russia and others who he said did not favour a free internet to set new global standards, according to the news agency.
"We shouldn't let the solutions to this larger issue of how to handle data security as a society be driven by any one particular case," Mr Carter told reporters after a speech to the Commonwealth Club of San Francisco. "It would be unreasonable."
In his speech, Mr Carter said: "It is easy to see wrong ways to do this. One would be a law hastily written in anger or grief. Another would be to have the rules be written by Russia or China."
EncryptionImage copyrightGetty Images
Image captionEncryption has become a battleground between tech firms and governments
On the same day, it was announced that the Turing Award had been given to a pair of cryptographers whose ideas helped make the internet possible.
According to the Associated Press, the recipients - Whitfield Diffie, a former chief security officer of Sun Microsystems, and Martin Hellman, a professor emeritus of electrical engineering at Stanford University - said that giving governments control over encrypted communications would put everyone at risk.
The pair were chosen for the $1m (£700,000) award for contributions to computing for the ideas of public-key cryptography and digital signatures, which they introduced in 1976.
The concepts now secure all kinds of data, from online communications and financial transactions to internet-connected infrastructure like power plants, the AP agency reported.
Ash CarterImage copyrightGetty Images
Image captionThe US defence secretary invited hackers to help find security holes
The Pentagon has invited external experts to hack into its systems in the first such test of its cybersecurity measures.
The method is often used by private companies that want to use the expertise of "friendly" hackers to find holes in their systems.
It came after the US defence secretary backed strong encryption amid the FBI's phone unlocking row with Apple.
Ash Carter called on tech firms and the US government to work together.
The US Department of Defense launched its Hack the Pentagon project on Wednesday, inviting vetted outside hackers to test the security of some of its public websites.
According to the Reuters news agency, the programme will be modelled on the hacking bounties often run by firms, in which experts are offered incentives to identify and report security issues. The Pentagon said it was also considering offering financial rewards.

'Digital defences'

"I am confident that this innovative initiative will strengthen our digital defences and ultimately enhance our national security," Mr Carter said.
The Pentagon has long tested its own networks using internal so-called "red teams" but this initiative - the first such scheme to be run by the US federal government - would open at least some of its vast network of computer systems to cyberchallenges from across industry and academia.
However, the Pentagon said that other more sensitive networks or key weapons programs would not be included in the scheme, at least initially. "The goal is not to comprise any aspect of our critical systems, but to still challenge our cybersecurity in a new and innovative way," one senior defence official told Reuters.
The official said they expected thousands of qualified participants to sign up ahead of the pilot scheme's opening in April.
James ComeyImage copyrightGetty Images
Image captionFBI director James Comey appeared before Congress amid his bureau's encryption battle with Apple
During a visit to Silicon Valley on Tuesday, Mr Carter underscored the US military's support for data security and strong encryption. Speaking on the day that bothApple and the FBI appeared before the US congress over the former's refusal to help the latter overcome an iPhone's encryption protection, he said that the Pentagon viewed strong encryption as critical.
Reuters reported that Mr Carter declined to address a live case directly and said that no one case should drive policy decisions. But he did call for greater co-operation between Silicon Valley and Washington on data security.
He said that a failure to work together would allow China, Russia and others who he said did not favour a free internet to set new global standards, according to the news agency.
"We shouldn't let the solutions to this larger issue of how to handle data security as a society be driven by any one particular case," Mr Carter told reporters after a speech to the Commonwealth Club of San Francisco. "It would be unreasonable."
In his speech, Mr Carter said: "It is easy to see wrong ways to do this. One would be a law hastily written in anger or grief. Another would be to have the rules be written by Russia or China."
EncryptionImage copyrightGetty Images
Image captionEncryption has become a battleground between tech firms and governments
On the same day, it was announced that the Turing Award had been given to a pair of cryptographers whose ideas helped make the internet possible.
According to the Associated Press, the recipients - Whitfield Diffie, a former chief security officer of Sun Microsystems, and Martin Hellman, a professor emeritus of electrical engineering at Stanford University - said that giving governments control over encrypted communications would put everyone at risk.
The pair were chosen for the $1m (£700,000) award for contributions to computing for the ideas of public-key cryptography and digital signatures, which they introduced in 1976.
The concepts now secure all kinds of data, from online communications and financial transactions to internet-connected infrastructure like power plants, the AP agency reported.

 

Security Learner's Blog

This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!