Rss Feed Facebook Twitter Google Plus

post:


Friday, November 30, 2012

someone else



If you see me walking with someone else, It's not because I want to.. 
It's because you weren't brave enough to walk by me. 

If you see me smile, It's not because i forgot you... 
It's because i got tired of crying for you. 

If you see me living again, It's not because i've moved on... 
It's because i hate the fact you can live without me 

So if I fall in love with someone else, It's not because i want to... 
It's because you weren't there to catch me



It’s Your Turn
What do you think?
Read more

because I fell in love with you.



Did you ever love someone and know they didn't care? 
Did you ever feel like crying knowing it would get you no where? 
Did you ever look into someone's eyes and say a lil prayer? 
Did you ever look into someone heart wishing you were there? 
Did you ever watch someone walk away, not wanting them to go? 
Did you whisper, 
"God I love you"  but never letting them know? 


You cry at night in misery and almost go insane. 

Nothing in this world causes so much pain. 
If I could choose between love and death, 
I think I'd rather die. 
Love hurts and the price 
U pay is high. So I say, 


"don't fall in love" 

it'll hurt before its through, 
you see my friend, 


I ought to know......

because I fell in love with you.
Read more

Wednesday, November 28, 2012

Touching love Story :/


A very poor man lived with his wife. One day, his wife, who had very long hair asked him tobuy her a comb for her hair to grow well and to be well-groomed. The man felt ver
y sorry and said no. He explained that he did not even have enough money to fix the strap of his watch he had just broken. She did not insist on her request. The man went to work and passed by a watch shop, sold
his damaged watch at a low price and went to buy a comb for his wife. He came home in the evening with the comb in his hand ready to give to hiswife. He was surprised when he saw his wife with a very short hair cut. She had sold her hair and was holding a new watch band. Tears flowed simultaneously from their eyes, not for the futility of their actions, but for the reciprocity of their love.

-----------------
MORAL: To love is nothing, tobe loved is something but to love and to be loved by the one you love, that is EVERYTHING. Never take love for granted.:)
Read more

Tuesday, November 27, 2012

Use any Sim in any Modem without unlocking it


Use any Sim in any Modem without unlocking it




We all know that, we cannot use any sim in any modem without unlocking the modem. But its now possible by using Nokia PC suite.

Follow the Steps :

1) Insert the sim inside the modem and connect it to the PC.
2) It will display the message as invalid sim, ignore that message and Open the Nokia PC suite.
3) Click on Connect to Internet option in PC suite. 
4) Goto Configure. Select your data card modem,and make all operator apn setting as like when we use nokia mobile connection. 

5) Finish the set up and connect to internet through PC suite.

6) Now your net is connected without any unlocking.
Read more

How To Hack Facebook Account using TabNapping


How To Hack Facebook Account using TabNapping

 

Hai guys Today i will tell u How To Hack Facebook Account using TabNapping . TabNapping is an advanced way of Phising Read More about tabnabbing from HERE.



Follow these steps to Hack Facebook Account Using Tabnapping :-




1. First Download Script from HERE(password:doyouknow1247.blogspot.in) and then Extract it!!!




2. Now choose any hosting website like http://www.host1free.com/ etc.




3. Now Create your account. You will get all server details.




4. Then click on File Manager and then click on Public_Html




5. Now Upload Three Files (Facebook.html , Login.php , google.html)




6. After uploading them You will get the your files like this www.yourhosting.com/filename.html




7. Now open the tabnabb.js in note pad. Put your facebook.html your there where you will find the text like this :- window.location = ‘ Enter your Link here ‘ and then upload it




8. Now you are done when some one will open your google.html after few seconds he will be redirected to the facebook.html




9. Enjoy!!!
Read more

uTorrent Ultra Accelerator


uTorrent Ultra Accelerator





How about getting that uTorrent download speedrocket high? uTorrent Ultra Accelerator is an valuable add-on module for one of the most in demand p2p clients worldwide. This plug-in fits flawlessly into uTorrent native client to ensure extra augmentation to its central features. Though very small, its architecture allows it to upgrade your searching and squeeze the maximum of speed from your file-sharing program. Another reason for uTorrent Ultra Accelerator being requisitory is the bandwidth of your Internet connection which gets a proper management. So – better Internet connection, faster downloads and more sources to download from in a single package! And let’s be honest – who doesn’t want their download speed even faster than it already is?




uTorrent Ultra Accelerator is the perfect tool for downloading your favourite movies, music, games and other files at an incredible speed. You can check the info about the status of your downloads in the main window. The app will quickly find its deserved place on your PC and you won’t even have to bother with it – it’s efficient, discreet and takes extremely small space on your computer. Even its interface is neat, compact and practical for both novices and advanced users.

You can download and use Torrent Ultra Accelerator for FREE and save your worries – the app is 100% CLEAN! NO ads, adware, spyware, Trojans or any other malware hidden!



Download Link : http://bit.ly/XRY37y
Read more

The Difference Between Intel’s i3, i5, and i7 Core Processors


The Difference Between Intel’s i3, i5, and i7 Core Processors



With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best?

This is something that I have been pondering upon and I found out that I wasn’t the only one wondering what on earth Intel has done by releasing these new processors.

Well, the time is here for you to discover the difference between Intel’s i3, i5, and i7 processors. You can thank the coffee on a late night for this post. :)


Intel Core i3 Processor

This particular Intel processor is the enter level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.

  • Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.
  • Uses 4 threads. Yes, it uses hyperthreading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.
  • This processor consists of 2-4 cores, depending on which one you get your hands on.
  • Contains A 3-4 MB Cache
  • Uses less heat and energy than earlier processors, which is always a good thing in this day and age.
Intel Core i5 Processor
  • This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.
  • As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.
  • This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.
  • The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyperthreading technology for a boost in performance.
  • The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.
  • The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.
Intel Core i7 Processor
  • This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. 
  • The cache on this one is 4-8 MB.
  • This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky.  And yes it also utilizes hyperthreading technology.
  • You will have four cores to take advantage of with this particular series.
  • And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.
Read more

Always love you




There was once a guy who was very much in love with a girl. He folded 1,000 pieces of paper cranes as a gift to her. Although at that time he was just a small fry in his company and his
future didn't seem too bright he was contented with what he had.. for he was in love.. and they were both happy together..

Until one day, this girl told him she was going to leave the country for Paris and try to live a new life there with no intention of returning back. She also told him that she cannot visualize any future for both of them because he was poor and he had no dreams. He couldn't believe what he just heard and couldn't help but cry. She was his dream, his love, his friend.. she was his everything..

Just when he thought he had it all he gets to experience the true side of the world.. with all it's misery in it..

But love is being able to accept the truth no matter how it hurts.. She broke his heart and yet he still loves her..

Days have passed, months have gone by and yet his feelings for her has always stayed the same..

He worked hard night and day to put his mind off the past..
He wanted to prove her wrong about the fact that he has no dreams.. he can be somebody someday..

Finally with all the hard work and help from his friends, he was able to build his own company..

One rainy day, while he was driving along the highway, he saw an old couple sharing an umbrella in the rain while heading to some destination. It didn't take him a while to recognise them for they seemed familiar to him.. they were his girl's parents..

He drove back to them.. slowly.. to show them how his life has changed. how successful he has become.. he's got his own car, house, company.. he's got it all..

But what he saw next confused him. The couple were heading to a cemetery  Out of impulse he went out of the car and followed them.

She was there.. his heart pounded so fast for he couldn't believe what he was seeing.. He felt the warmth of his tears trickling down his cheeks.. He was crying in the rain..

He saw his girl's photograph smiling sweetly at him.. from her tombstone.. next to the paper cranes he once gave her.

Her parents felt his presence and looked back at him. Out of confusion he asked them why.. and how did all this happened.

She did not leave for Paris for she was ill with cancer, it was her cliché. She believed that he will make it someday and she didn't want to be his obstacle. All she ever wanted was to be with him.. but she chose to leave him to spare him from her suffering and frustrations..

Just because someone doesn't love you the way you want them to,
doesn't mean they don't love you at all.

She wanted her parents to put his paper
cranes beside her, because, if the day comes when fate brings him near to her again... 
he will remember how much she loved him and how much he meant to her...

Once you have loved someone, you will always love her.. forever. For what's in your mind and heart will remain forever.

He cried in silence and whispered... 
"I thought I almost had it all.. now I know what was missing.. you.."



It’s Your Turn
What do you think?
Read more

Wednesday, November 21, 2012

Syla R.A.T. 0.8 Beta


Syla R.A.T. 0.8 Beta





Code:
Syla R.A.T. 0.8 Beta
==========================================

ServerSize:
------------------

- 144 KB (59.5 KB UPX)

BugFixes:
------------------

- fixed disconnection bug.

- fixed LiveKeylogger crash bug.

- fixed a bug that caused an empty clipboard after it got received.

- fixed a ServerBuilder bug.

- fixed a freeze bug on the server.

- fixed restart Server.


NEW in 0.8 Beta:
------------------

- added Skin.

- added UNICODE RemoteShell.

- added ServiceManager (Beta - not quite finished yet).

- added PING/PONG System.

- added Several PING settings and options.

- added ISADMIN Icon in the SinList.

- Client ListView is now more stable and smoother.

- ProcessManager loads faster now.

- WindowManager loads faster now.
Read more

A BEGINNERS GUIDE TO KEY-LOGGING


A BEGINNERS GUIDE TO KEY-LOGGING

Welcome to a Beginner's Guide to Keyloggers! In this guide I will go through all the common topics that you may need to know. When you finish reading this topic you will know everything you will ever need to get started keylogging. I cover every topic related to keyloggers as well as cover terminology and definitions. I'll explain how a keylogger works and how to even get started making your own! So let's get started!

TABLE OF CONTENTS

What is a keylogger?
Learning the lingo and definitions.
Common features keyloggers have.
How do I use a keylogger?
What is a "stub"?
What is the "server"?
What is crypting?
What is the difference between a stealer and a keylogger?
What is .net framework and why do I care?
What are some good keyloggers?
What are some upsides to keyloggers?
What are some downsides to keyloggers?
I want to make my own keylogger. Where do I start?
I think I've been infected with a keylogger! What do I do?
Conclusion
WHAT IS A KEYLOGGER?

A keylogger is a program that logs a keyboards keystrokes. It can be used for several purposes, both black hat and white hat. The most common use is black hat. A keylogger functions by grabbing a keystroke, triggered by when the slave presses a key on their keyboard, and saving it to a variable. This process is called "keyboard hooking". It then will take this long variable and send it via a SMTP or FTP server. You can then view these logs and use it for whatever your intention may be. Keyloggers have several different features that I will go into in a later section. The most basic ones only include keyboard hooking and a way to send the logs.

LEARNING THE LINGO
One of the most confusing things about starting something new is not understanding the lingo. If you don't understand the lingo, how will you know what people are talking about? In this section I'll be explaining the common terms people use concerning keyloggers. I'll be going over some other more general things as well.


Logger
Slang term for keylogger. See the "What is a keylogger" section.

Hooks
Slang term for keyboard hooks. These are also explained in the "What is a keylogger section"

Keystrokes
Section of code that is triggered when the slave types something on the keyboard.

Logs
Compiliation of all the keystrokes over a period of time.

FTP
A webhost that stores files that allows the user to connect and retrieve said files. Files in this case are logs.

SMTP
A way that logs are sent via email. Example, MSN, Gmail, Yahoo, etc.

FUD
Full Un-Detected. This means that antiviruses will not detect your file as a virus. This will be further explained in the "What is crypting section".

UD
Undetected. This means that some antiviruses will not detect your files as a virus, while others will.

Server
A server is the output of your keylogger. I will take this in-depth in the "What is a server?" section.

Crypter
A crypter crypts your file removing detections. I'll take this in-depth in the "What is crypting" section.

Detection
A detection is a term used when an antivirus detects, or thinks your file is a virus. You always want to have the least amount of detections possible to increase your success rate and to reduce errors.

Black hat
A black hat is someone who uses their knowledge of computers and security for malicious reasons.

White hat
A white hat is someone who uses their knowledge of computers and security for helpful reasons. They help disinfect and improve others security to combat black hat hackers.

Grey hat
A grey hat is a mixture between a black and white hat. They will infect innocent people and then help them get rid of it, for free or a price (the latter being more common).

Backdoored
When a file is backdoored it has a virus binded to it. This means that the file will act normally and the user will be infected without their knowledge. This has become extremely common in the keylogger section. Always be wary of new releases.

COMMON FEATURES

As I've said before, most keyloggers have two basic settings. Keyboard hooking and log sending (by FTP or SMTP). Most keylogger developers (myself included) like to include more settings to help ease the user experience. Below is a list of common settings you may find, and what they do:

Icon Changers
This will change your viruses icon without corrupting it like some third party programs can do.

MuteX
MuteX is a unique string that you generate. It helps prevent multiple logs from being sent.

Add to Startup
This will add a registry (or other ways) that will cause your virus to start when the computer is turned on.

Antis
Antis are a feature that help keep your virus on the slaves computer for as long as possible. They disable or stop certain white hat programs such as antiviruses, sandboxie, and keyscramblers from running or removing your file.
Disable CMD/Taskmanager/Registry
This feature will change the registry value for each of these system tools to disable them.

Logging interval
This allows the user to chose how often logs are sent.

Fake Error Message
This will cause a fake error message to pop up, making it seem less suspicious.

File pumper
This will add to the size of your virus. This helps making it seem less suspicious as a game won't be a few kilobytes.

Assembly Editing
This allows you to change things found in the properties menu when right clicking a file. This helps it seem more like a real file rather than a virus.
Encrypted user information
This encrtyps your information so that others cannot steal it by decompiling your virus.

Test connection
This will test your credentials that you've entered to make sure they are correct.

HOW DO I USE IT?

Using a keylogger is a lot easier than it sounds. All you need to do is find one that you want to use, download it, and then chose your settings. Once you have entered all your information and chosen your settings, click the build button. The builder will create your server. This is what you give to people. Give them this file and when they run it they will be infected and you will start receiving logs. Pretty self explanitory. If you ever have a question contact the creator and they should be able to help you.

WHAT IS A "STUB"

A stub is a separate binary that contains special code that is required for the keylogger to function. There are usually two things in a keylogger. The builder and the stub. Some keyloggers will have a stub built in. A builder takes the information and settings you've chosen and merges it with a stub. The stub contains keyhooks and the workings of each feature. These two merge to create your virus, containing all of the information. I'll cover this file in the next section.

WHAT IS THE "SERVER"

A server is the ouptput of your keylogging builder. It takes your user information (the builder) and the actual malicious code (the stub) and merges the two (via either CodeDOM which I'll explain later in this section, or by filesplitting, which I will also cover) to make one bad ass file. There are several ways that this is accomplished, and both ways have their ups and downs. The server is also what you distribute to infect people. It is your "virus"

CodeDom is a type of building that generates the code during runtime. This allows the user to only have to download one file (just a builder). After inputting your information, the builder will take this and combine it with the malicious code (already inside the builder). This helps lower detection rates, but overall is harder to do, and is harder to reFUD (you have to re distribute the entire builder, instead of just providing another stub).

Filesplitting is the old school way to do things. It requries taking your information (the builder) and combining it with a separate file that contains the malicious code. While this makes it easier to detect, it's easier to update as you can simply give your users another file (same thing, just with less detections).

WHAT IS CRYPTING?

Crypting can be very complex, though it isn't necessary for you to know all of this information. So for this section I'll keep things to what you need to know. Crypting involves taking a stub (sometimes it's CodeDOM) and using that to FUD (or lower your detection rate) your file. The entire process can get a bit confusing, and I won't bother getting into it. What you do need to know is that crypting can easily corrupt your keylogging sever making it no longer work. A corrupt keylogger may not be detected (the crypter at least did it's job) but it will not send logs making it useless. Because of this you should chose your crypters carefully and it may take a while to find one that works (for free) with your keylogging server. If you are buying a crypter (which I recommend) then be sure to ask the seller to either test or verify your server. In short, crypting is used to lower detection rate, and raise execution rates. That's all you need to know.
Read more

RAT(Remote Administration Tool) Guide For Beginners


RAT(Remote Administration Tool) Guide For Beginners- Q&A. Explained

Remote Administrator Tools Q & A.

Q – Whats RAT?
A – A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it.
Q – How they work?
A - Some RATs can spread over P2P file sharing programs(uTorrent, Pirate Bay etc.), Messangers spams(MSN, Skype, AIM etc.).
Q – Download?
A – Well you can find any type of RAT here, on beginnershacking.wordpress.com. To download. and you will find some links. Also, you can buy FUD private version of RAT: Albertino RAT, Medusa Rat, jRAT etc. Also you will need DNS host for your RAT.
Q – How do I control server?
A - Once installed, RAT server can be controlled via RAT client. From IP list box you choose PC and connect.
Q – What do I need to setup RAT?
A - Well, you will need Windows OS, open port & RAT. To forward your port scroll for tutorial link or click this URL.

Q – How do I port forward?
A – Port forwarding is easy and important for RAT. Well, you need open port because RAT connects through open port and bypass firewall. Open your web browser and write your IP and connect to your rooter(write Username: Admin & Password: Admin), open port forward page and write port you want and your IP. Well that’s all you need to do and now you got open port

Q – How do I make my server FUD?
A - If you want to make your server FUD again, you will need crypter(you can find free FUD one here.). Also, you can hex edit your server, but be careful some servers can crash after hex editing, any way check out this cool tutorial How to make FUD with hex editing.
Q – How do I remove server if I infect myself?
A - When you infect yourself, first what you going to do is to connect to your PC. Some RATs have function to uninstall servers, well you click that and you uninstall it. Well there is another way, download MalwareBytes’ Anti-Malware and scan whole computer for Trojan.
Q – Legal or illegal?
A - Well some RATs are legal, and some are not. Legal are the one without backdoor left, and they have abillity to close connection anytime. Illegal are used for hacking and they can steal data(Credit Cards, Passwords, private data etc.).
Legal:
TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
UltraVNC – Remote support software for on demand remote computer support. VNC.Specializing in Remote Computer Support, goto my pc, goto assist, Remote Maintenance
Ammyy Admin – Ammyy Admin is a highly reliable and very friendly tool for remote computer access. You can provide remote assistance, remote administration or remote
Mikogo – Mikogo is an Online Meeting, Web Conferencing & Remote Support tool where you can share your screen with 10 participants in real-time over the Web.
Illegal:
Spy-Net
Cerberus Rat
CyberGate Rat
SubSeven
Turkojan
ProRat
To Download This RAT’s Click Here
Q – Where and how do I spread?
A – There are few different ways to spread your server. You can spread on warez websites, P2P file sharing websites(uTorrent, Pirate bay etc.), YouTube etc. Well some people use custom made Auto-Spreaders programs to spread their server. But best and most effective way to spread is when you FUD your server.

Q – Whats DNS host?
A - The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
Q – What can RAT do?
A – Here is list of basic features:
• Manage files • Control web browser(Change homepage, open site etc.) • Get system informations(OS Version, AV name, Ram Memory, Computer name etc.) • Get passwords, credit card numbers or private data etc. • View and remote control desktop • Record camera & sound • Control mouse • Delete, rename, download, upload or move files
Q – What’s reverse Connection?
A - A reverse connection is usually used to bypass firewall restrictions on open ports. The most common way a reverse connection is used is to bypass firewall and Router security restrictions.
Q – Whats direct connection?
A - A direct-connect RAT is a simple setup where the client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple clients to be connected, along with increased reliability.
Q – Can I get traced when I rat somebody?
A – Yes and no. Depends on victim, it is really hard to remove infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace, because PC usually got over 300 connections. So don’t worry.
Direct connection:
Code:
[Client]
| [Client]
| /
| /
| /
| /
[Server]-----[Client]
Read more

PHISHING TUTORIAL FOR BEGINNERS


PHISHING TUTORIAL FOR BEGINNERS


PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. where you will be told to provide your information and bingo! you are hacked and the best part is after that you will be redirected to the original website and some common reason like network or server problem will be shown, so you wont even come to know that you were hacked.

here is a tutorial about how you can try phishing and have some fun.

STEP 1) First you must sign for a free webhosting service like www.byethost.com
And register your subdomain. After registration you will have a subdomain like www.yourname.byethost.com (Please select the name of the website wisely and please don't add the name of the website whose phishing page you are making eg. if you are making phishing page of Facebook then pls don't add the word Facebook in the name of the phishing as this website are easily detected and block.)

STEP 2) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs"

STEP 3) Now DOWNLOAD THIS FILEhttp://www.ziddu.com/download/16807575/PHISHERFILE.rar.html
to your computer and extract the files inside it, you will see folders named facebook, orkut etc. choose which account you want to hack and open the folder, inside the folder you will find two files index.htm and write.php

STEP 4) Now login to to your Byethost's cpanel (all the details of the byethost account will be there in the confirmation email send by byethost) choose "online file manager" in the cpanel.

STEP 5) (There were many suggestions to make this point more clear so i have divided this 5th step itself into some substeps. hope this will help the readers to understand this step more easily)

There are two files in the phisher file downloaded by you, "index.htm" and "write.php. Now right click on "index.htm" and select "edit", the file will open in notepad, press "ctrl + a" to select the whole text and copy it.
Now in the cpanel of your byethost account click on "online file manager". In it there is a folder "htdocs" click on it. In it there is a file also called "index.htm", there is a option to edit it, choose the edit option. Now a new window will open, delete all the text in it and paste what you had copied earlier from the "index.htm" in your phisher file. Click on the on the save icon and you are done!.




STEP 6) Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file passes.txt in your "htdocs" folder of your byethost account which contains the username and password of your victim.

ENJOY!

Note:- Please use this phishing only on some close friends or relative who will take this sportingly and get aware of the online threats. Using this on somebody whom you don't know will qualify as a crime.
Read more

Tuesday, November 20, 2012

Love of Silent


From the very beginning, girl’s family objected strongly on her dating this guy, saying that it has got to do with family background, & that the girl will have to suffer for the rest of her life if she were to be with him. Due to family’s pressure, the couple quarrelled very often. Though the girl loved the guy deeply, she always asked him: “How deep is your love for me?” As the guy is not good with his words, this often caused the girl to be very upset. With that & the family’s pressure, the gal often vents her anger on him. As for him.. he only endured it in silence.
After a couple of years, the guy finally graduated & decided to further his studies overseas. Before leaving, he proposed to the gal: “I’m not very good with words. But all I know is that I love you. If you allow me, I will take care of you for the rest of my life. As for your family, I’ll try my best to talk them round. Will you marry me?” The girl agreed, & with the guy’s determination, the family finally gave in & agreed to let them get married. So before he left, they got engaged. The gal went out to the working society, whereas the guy was overseas, continuing his studies. They sent their love through emails & phone calls. Though it was hard, but both never thought of giving up.
One day, while the gal was on her way to work, she was knocked down by a car that lost control. When she woke up, she saw her parents beside her bed. She realized that she was badly injured. Seeing her mum cry, she wanted to comfort her. But she realized that all that could come out of her mouth was just a sigh. She had lost her voice…. The doctor says that the impact on her brain has caused her to lose her voice. Listening to her parents’ comfort, but with nothing coming out from her, she broke down. During the stay in hospital, besides silent cry. it’s still just silent cry that accompanied her.
Upon reaching home, everything seems to be the same. Except for the ringing tone of the phone which pierced into her heart every time it rang. She does not wish to let the guy know & not wanting to be a burden to him, she wrote a letter to him saying that she does not wish to wait any longer. With that, she sent the ring back to him. In return, the guy sent millions & millions of reply and countless phone calls. all the gal could do besides crying is still crying…. The parents decided to move away, hoping that she could eventually forget everything & be happy. With a new environment, the gal learnt sign language & started a new life. Telling herself everyday that she must forget the guy.
One day, her friend came & told her that he’s back. She asked her friend not to let him know what happened to her. Since then, there wasn’t anymore news of him. A year has passed & her friend came with an envelope, containing an invitation card for the guy’s wedding. The gal was shattered. When she opened the letter, she saw her name on it instead. When she was about to ask her friend what was going on, she saw the guy standing in front of her…. He used sign language to tell her, “I’ve spent a year to learn sign language. Just to let you know that I’ve not forgotten our promise.
Let me have the chance to be your voice. I Love You.” With that, he slipped the ring back into her finger. The gal finally smiled……

Read more

Monday, November 19, 2012

Broken Heart

I know how you feel. Empty, betrayed, and no happiness whatsoever. You don't want to laugh, because you know it's not going to help, but youdon't want to cry, because it will just make you feel worse.You feel like your heart is falling apart, but not only that, but you know soon your life is going to feel like it's falling apart too. You don't think it will ever end, and no matter what this person has done to you, it feels impossible to stop loving them. And everyone wonders why if they have hurt you so much, then why do you still love them. That's the confusing part, you don't know why, you just do, and the people who hurt you the most, and normally the ones you love the most. And then, after a few weeks, you finally feel a sense of relief, like you're getting happy again, but you know inside that you're just going into denial. And after a few more weeks, you're back to where you were an empty soul and teary ey
es. You thought you got over them, but really, you just stopped showing it. It leaves deep scars on yourheart that are there forever.And no one understands howyou feel, and how deep you are hurt, no matter who they are, because it hasn't happened to them. And even if it has, every broken heart is different. They don't know the true pain you feel and carry each and everyday now, so you learn that basically you are alone with all this... And the feeling starts to overwhelm you, andsuddenly you just break down, right there, because you know you've had enough, the tears just instantly start flowing, and you're to the point where youdon't care who see's. Because you've spent so many nights lying awake in bed, and so many days beinghaunted by the scars and fear of rejection. And in the midst of all these tears, you know that its not helping any,and it's not going to bring them back, if you ever even had them in the first place. After about a million tears have been cried, you finally pull yourself back together and keep going. Your throat starts to clench and your eyes burn with the tears youare trying to hold back. Everyone says, "It will be okay…” But you know it won't. And that’s the truth, it won’t. And you look back on all of the hurt you had from this, and you realize that people are horrible. You're still hurt, but you've learned to hide it so that everyone thinks you are okay. So now every time you see this person, you know you still love them, and you feel a slight tingle in your heart yearning for them to love you, screaming out, but for some reason they don't hear it. And then you sit back and wonder how one person could have caused all of this... I know how you feel, mate... I know...
Read more

Tuesday, November 13, 2012

Hack FB and Gmail Account in an easy way


So just follow the simple steps.  
 Open your backtrack 5’s terminal and type cd /pentest/exploits/set



 
Backtrack5 1
 
Now Open social Engineering Tool kit (SET) ./set 

backtrack5 2

Just hit ENTER and SET will Open , Now just select 1st option (1 Social-Engineering Attacks) and hit enter after that 2nd number (just type 2 as shown in snapshot) 

backtrack5 3

Now Just select 4th Option “Tabnabbing Attack Method” and Hit ENTER
 
backtrack5 4

Then select 2nd option “Site Cloner” and Hit ENTER 

backtrack5 5

Now here you need to add the URL of Facebook (if you want to hack gmail then just add the gmail’s URL) 
 
backtrtack5 6

Now just hit the enter. 

backtrack5 6

Open new terminal and just type ifconfig and hit ENTER 
 

backtrack5 9

Now just copy this IP address and open it in Browser. 
 

backtrack5 7


Now here I am just typing test email and password to see whether it works or not. 

backtrack5 8


Now just hit enter and switch back to our terminal and we found the Email and password !

backtrack5 10

Read more

DDOS ATTACK HOW TO:


DDOS ATTACK

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.[1]
One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.
When the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack.



DOWNLOAD: contact me for download link. (cant post here)

VIDEO TUTORIAL:

Step 1. Port Forwarding.
The Very First thing you need to do is setup Port Forwarding on your router so Everything can communicate properly.
You Need to open port 81, 1994, and 3174
You can also visit this site http://portforward.com/english/routers/p...rindex.htm if you need further help setting up your router.
http://www.youtube.com/watch?v=IuCez...layer_embedded

Step 2. Building your Bot.
You have to get a no-ip.info address for this part. They are free just go to http://no-ip.com and setup a free dns domain. Make the first part of it only 3 characters for example (gnm.no-ip.info) also download there Dynamic Updater client so your ip stays updated with the domain.
http://www.youtube.com/watch?v=AyuJ7...layer_embedded

Now You are ready to try out your Booter. You can test the bot on your self to see if it works just by opening it. You should see yourself appear in the client. Now You can right-click on your ip and uninstall it.
http://www.youtube.com/watch?v=BTiYZ...layer_embedded


VIRUS SCAN
http://vscan.novirusthanks.org/analy...kb3Nlci1leGU=/


USE CRYPTER PARA DI MADETECT NG AV YUNG BOT NA GINAWA MU SEARCH LANG KAYO DITO MARAMI NAGKALAT NA FREE PUBLIC CRYPTER

CREDITS: anonymous :P
Read more

Thursday, November 8, 2012

Gettting to know!


“Every time that your eyes meet mine, I light up like a neon sign… Yes we’re getting to know each other a little too well..” says a popular OPM song.
Getting to know someone whom you’re interested with is one of the most terrifying yet the most exciting stage. You stay until late at night just to talk to that person. The conversation often never runs dry because you never run out of things to talk about. It is where you completely open up to another person and you never realize that you’re slowly falling for that person. And once you do, you become restless and such because you’re never sure if he’s going to reciprocate.
The feeling is simply adorable yet scary at the same time.
Read more

The Underrated Sense

I think that one of the most interesting things about getting to know someone you’ve started to spend more and more time with is getting to know their smell. It still wows me that certain people and families and houses can have certain smells, and it always makes me sad that I don’t know what my “smell” is. When I was little, I was on a plane with my family and I had my trustworthy blankie, of course. And my mom hugged it to her face and said to my dad—“it smells like abby”—and smiled. Even at a young age, I loved that she said that. I loved that my mom knew me well enough to know what my smell was and to smile when she could smell it. This whole post could sound a lot creepier than it is supposed to, but my point is that I think our sense of smell is so powerful and so underrated. There are smells that instantly bring back certain memories—the beach smell makes us remember our last beach vacation, even when we are still an hour away from the shore, etc. Anyway, the short of it is—there is a new person’s scent in my life, and it is getting stronger. :) 
Read more
 

Blogger news

About