Rss Feed Facebook Twitter Google Plus

post: _

_

1234567


Friday, November 30, 2012

someone else



If you see me walking with someone else, It's not because I want to.. 
It's because you weren't brave enough to walk by me. 

If you see me smile, It's not because i forgot you... 
It's because i got tired of crying for you. 

If you see me living again, It's not because i've moved on... 
It's because i hate the fact you can live without me 

So if I fall in love with someone else, It's not because i want to... 
It's because you weren't there to catch me



It’s Your Turn
What do you think?
Read more

because I fell in love with you.



Did you ever love someone and know they didn't care? 
Did you ever feel like crying knowing it would get you no where? 
Did you ever look into someone's eyes and say a lil prayer? 
Did you ever look into someone heart wishing you were there? 
Did you ever watch someone walk away, not wanting them to go? 
Did you whisper, 
"God I love you"  but never letting them know? 


You cry at night in misery and almost go insane. 

Nothing in this world causes so much pain. 
If I could choose between love and death, 
I think I'd rather die. 
Love hurts and the price 
U pay is high. So I say, 


"don't fall in love" 

it'll hurt before its through, 
you see my friend, 


I ought to know......

because I fell in love with you.
Read more

Wednesday, November 28, 2012

Touching love Story :/


A very poor man lived with his wife. One day, his wife, who had very long hair asked him tobuy her a comb for her hair to grow well and to be well-groomed. The man felt ver
y sorry and said no. He explained that he did not even have enough money to fix the strap of his watch he had just broken. She did not insist on her request. The man went to work and passed by a watch shop, sold
his damaged watch at a low price and went to buy a comb for his wife. He came home in the evening with the comb in his hand ready to give to hiswife. He was surprised when he saw his wife with a very short hair cut. She had sold her hair and was holding a new watch band. Tears flowed simultaneously from their eyes, not for the futility of their actions, but for the reciprocity of their love.

-----------------
MORAL: To love is nothing, tobe loved is something but to love and to be loved by the one you love, that is EVERYTHING. Never take love for granted.:)
Read more

Tuesday, November 27, 2012

Use any Sim in any Modem without unlocking it


Use any Sim in any Modem without unlocking it




We all know that, we cannot use any sim in any modem without unlocking the modem. But its now possible by using Nokia PC suite.

Follow the Steps :

1) Insert the sim inside the modem and connect it to the PC.
2) It will display the message as invalid sim, ignore that message and Open the Nokia PC suite.
3) Click on Connect to Internet option in PC suite. 
4) Goto Configure. Select your data card modem,and make all operator apn setting as like when we use nokia mobile connection. 

5) Finish the set up and connect to internet through PC suite.

6) Now your net is connected without any unlocking.
Read more

How To Hack Facebook Account using TabNapping


How To Hack Facebook Account using TabNapping

 

Hai guys Today i will tell u How To Hack Facebook Account using TabNapping . TabNapping is an advanced way of Phising Read More about tabnabbing from HERE.



Follow these steps to Hack Facebook Account Using Tabnapping :-




1. First Download Script from HERE(password:doyouknow1247.blogspot.in) and then Extract it!!!




2. Now choose any hosting website like http://www.host1free.com/ etc.




3. Now Create your account. You will get all server details.




4. Then click on File Manager and then click on Public_Html




5. Now Upload Three Files (Facebook.html , Login.php , google.html)




6. After uploading them You will get the your files like this www.yourhosting.com/filename.html




7. Now open the tabnabb.js in note pad. Put your facebook.html your there where you will find the text like this :- window.location = ‘ Enter your Link here ‘ and then upload it




8. Now you are done when some one will open your google.html after few seconds he will be redirected to the facebook.html




9. Enjoy!!!
Read more

uTorrent Ultra Accelerator


uTorrent Ultra Accelerator





How about getting that uTorrent download speedrocket high? uTorrent Ultra Accelerator is an valuable add-on module for one of the most in demand p2p clients worldwide. This plug-in fits flawlessly into uTorrent native client to ensure extra augmentation to its central features. Though very small, its architecture allows it to upgrade your searching and squeeze the maximum of speed from your file-sharing program. Another reason for uTorrent Ultra Accelerator being requisitory is the bandwidth of your Internet connection which gets a proper management. So – better Internet connection, faster downloads and more sources to download from in a single package! And let’s be honest – who doesn’t want their download speed even faster than it already is?




uTorrent Ultra Accelerator is the perfect tool for downloading your favourite movies, music, games and other files at an incredible speed. You can check the info about the status of your downloads in the main window. The app will quickly find its deserved place on your PC and you won’t even have to bother with it – it’s efficient, discreet and takes extremely small space on your computer. Even its interface is neat, compact and practical for both novices and advanced users.

You can download and use Torrent Ultra Accelerator for FREE and save your worries – the app is 100% CLEAN! NO ads, adware, spyware, Trojans or any other malware hidden!



Download Link : http://bit.ly/XRY37y
Read more

The Difference Between Intel’s i3, i5, and i7 Core Processors


The Difference Between Intel’s i3, i5, and i7 Core Processors



With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best?

This is something that I have been pondering upon and I found out that I wasn’t the only one wondering what on earth Intel has done by releasing these new processors.

Well, the time is here for you to discover the difference between Intel’s i3, i5, and i7 processors. You can thank the coffee on a late night for this post. :)


Intel Core i3 Processor

This particular Intel processor is the enter level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.

  • Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.
  • Uses 4 threads. Yes, it uses hyperthreading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.
  • This processor consists of 2-4 cores, depending on which one you get your hands on.
  • Contains A 3-4 MB Cache
  • Uses less heat and energy than earlier processors, which is always a good thing in this day and age.
Intel Core i5 Processor
  • This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.
  • As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.
  • This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.
  • The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyperthreading technology for a boost in performance.
  • The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.
  • The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.
Intel Core i7 Processor
  • This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. 
  • The cache on this one is 4-8 MB.
  • This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky.  And yes it also utilizes hyperthreading technology.
  • You will have four cores to take advantage of with this particular series.
  • And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.
Read more

Always love you




There was once a guy who was very much in love with a girl. He folded 1,000 pieces of paper cranes as a gift to her. Although at that time he was just a small fry in his company and his
future didn't seem too bright he was contented with what he had.. for he was in love.. and they were both happy together..

Until one day, this girl told him she was going to leave the country for Paris and try to live a new life there with no intention of returning back. She also told him that she cannot visualize any future for both of them because he was poor and he had no dreams. He couldn't believe what he just heard and couldn't help but cry. She was his dream, his love, his friend.. she was his everything..

Just when he thought he had it all he gets to experience the true side of the world.. with all it's misery in it..

But love is being able to accept the truth no matter how it hurts.. She broke his heart and yet he still loves her..

Days have passed, months have gone by and yet his feelings for her has always stayed the same..

He worked hard night and day to put his mind off the past..
He wanted to prove her wrong about the fact that he has no dreams.. he can be somebody someday..

Finally with all the hard work and help from his friends, he was able to build his own company..

One rainy day, while he was driving along the highway, he saw an old couple sharing an umbrella in the rain while heading to some destination. It didn't take him a while to recognise them for they seemed familiar to him.. they were his girl's parents..

He drove back to them.. slowly.. to show them how his life has changed. how successful he has become.. he's got his own car, house, company.. he's got it all..

But what he saw next confused him. The couple were heading to a cemetery  Out of impulse he went out of the car and followed them.

She was there.. his heart pounded so fast for he couldn't believe what he was seeing.. He felt the warmth of his tears trickling down his cheeks.. He was crying in the rain..

He saw his girl's photograph smiling sweetly at him.. from her tombstone.. next to the paper cranes he once gave her.

Her parents felt his presence and looked back at him. Out of confusion he asked them why.. and how did all this happened.

She did not leave for Paris for she was ill with cancer, it was her cliché. She believed that he will make it someday and she didn't want to be his obstacle. All she ever wanted was to be with him.. but she chose to leave him to spare him from her suffering and frustrations..

Just because someone doesn't love you the way you want them to,
doesn't mean they don't love you at all.

She wanted her parents to put his paper
cranes beside her, because, if the day comes when fate brings him near to her again... 
he will remember how much she loved him and how much he meant to her...

Once you have loved someone, you will always love her.. forever. For what's in your mind and heart will remain forever.

He cried in silence and whispered... 
"I thought I almost had it all.. now I know what was missing.. you.."



It’s Your Turn
What do you think?
Read more

Wednesday, November 21, 2012

Syla R.A.T. 0.8 Beta


Syla R.A.T. 0.8 Beta





Code:
Syla R.A.T. 0.8 Beta
==========================================

ServerSize:
------------------

- 144 KB (59.5 KB UPX)

BugFixes:
------------------

- fixed disconnection bug.

- fixed LiveKeylogger crash bug.

- fixed a bug that caused an empty clipboard after it got received.

- fixed a ServerBuilder bug.

- fixed a freeze bug on the server.

- fixed restart Server.


NEW in 0.8 Beta:
------------------

- added Skin.

- added UNICODE RemoteShell.

- added ServiceManager (Beta - not quite finished yet).

- added PING/PONG System.

- added Several PING settings and options.

- added ISADMIN Icon in the SinList.

- Client ListView is now more stable and smoother.

- ProcessManager loads faster now.

- WindowManager loads faster now.
Read more

A BEGINNERS GUIDE TO KEY-LOGGING

A BEGINNERS GUIDE TO KEY-LOGGING Welcome to a Beginner's Guide to Keyloggers! In this guide I will go through all the common topics that you may need to know. When you finish reading this topic you will know everything you will ever need to get started keylogging. I cover every topic related to keyloggers as well as cover terminology and definitions. I'll explain how a keylogger works and how to even get started making...
Read more

RAT(Remote Administration Tool) Guide For Beginners

RAT(Remote Administration Tool) Guide For Beginners- Q&A. Explained Remote Administrator Tools Q & A.Q – Whats RAT?A – A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it.Q – How they work?A - Some...
Read more

PHISHING TUTORIAL FOR BEGINNERS


PHISHING TUTORIAL FOR BEGINNERS


PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. where you will be told to provide your information and bingo! you are hacked and the best part is after that you will be redirected to the original website and some common reason like network or server problem will be shown, so you wont even come to know that you were hacked.

here is a tutorial about how you can try phishing and have some fun.

STEP 1) First you must sign for a free webhosting service like www.byethost.com
And register your subdomain. After registration you will have a subdomain like www.yourname.byethost.com (Please select the name of the website wisely and please don't add the name of the website whose phishing page you are making eg. if you are making phishing page of Facebook then pls don't add the word Facebook in the name of the phishing as this website are easily detected and block.)

STEP 2) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs"

STEP 3) Now DOWNLOAD THIS FILEhttp://www.ziddu.com/download/16807575/PHISHERFILE.rar.html
to your computer and extract the files inside it, you will see folders named facebook, orkut etc. choose which account you want to hack and open the folder, inside the folder you will find two files index.htm and write.php

STEP 4) Now login to to your Byethost's cpanel (all the details of the byethost account will be there in the confirmation email send by byethost) choose "online file manager" in the cpanel.

STEP 5) (There were many suggestions to make this point more clear so i have divided this 5th step itself into some substeps. hope this will help the readers to understand this step more easily)

There are two files in the phisher file downloaded by you, "index.htm" and "write.php. Now right click on "index.htm" and select "edit", the file will open in notepad, press "ctrl + a" to select the whole text and copy it.
Now in the cpanel of your byethost account click on "online file manager". In it there is a folder "htdocs" click on it. In it there is a file also called "index.htm", there is a option to edit it, choose the edit option. Now a new window will open, delete all the text in it and paste what you had copied earlier from the "index.htm" in your phisher file. Click on the on the save icon and you are done!.




STEP 6) Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file passes.txt in your "htdocs" folder of your byethost account which contains the username and password of your victim.

ENJOY!

Note:- Please use this phishing only on some close friends or relative who will take this sportingly and get aware of the online threats. Using this on somebody whom you don't know will qualify as a crime.
Read more

Tuesday, November 20, 2012

Love of Silent

From the very beginning, girl’s family objected strongly on her dating this guy, saying that it has got to do with family background, & that the girl will have to suffer for the rest of her life if she were to be with him. Due to family’s pressure, the couple quarrelled very often. Though the girl loved the guy deeply, she always asked him: “How deep is your love for me?” As the guy is not good with his words,...
Read more

Monday, November 19, 2012

Broken Heart

I know how you feel. Empty, betrayed, and no happiness whatsoever. You don't want to laugh, because you know it's not going to help, but youdon't want to cry, because it will just make you feel worse.You feel like your heart is falling apart, but not only that, but you know soon your life is going to feel like it's falling apart too. You don't think it will ever end, and no matter what this person has done to you, it feels impossible...
Read more

Tuesday, November 13, 2012

Hack FB and Gmail Account in an easy way


So just follow the simple steps.  
 Open your backtrack 5’s terminal and type cd /pentest/exploits/set



 
Backtrack5 1
 
Now Open social Engineering Tool kit (SET) ./set 

backtrack5 2

Just hit ENTER and SET will Open , Now just select 1st option (1 Social-Engineering Attacks) and hit enter after that 2nd number (just type 2 as shown in snapshot) 

backtrack5 3

Now Just select 4th Option “Tabnabbing Attack Method” and Hit ENTER
 
backtrack5 4

Then select 2nd option “Site Cloner” and Hit ENTER 

backtrack5 5

Now here you need to add the URL of Facebook (if you want to hack gmail then just add the gmail’s URL) 
 
backtrtack5 6

Now just hit the enter. 

backtrack5 6

Open new terminal and just type ifconfig and hit ENTER 
 

backtrack5 9

Now just copy this IP address and open it in Browser. 
 

backtrack5 7


Now here I am just typing test email and password to see whether it works or not. 

backtrack5 8


Now just hit enter and switch back to our terminal and we found the Email and password !

backtrack5 10

Read more

DDOS ATTACK HOW TO:


DDOS ATTACK

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.[1]
One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.
When the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack.



DOWNLOAD: contact me for download link. (cant post here)

VIDEO TUTORIAL:

Step 1. Port Forwarding.
The Very First thing you need to do is setup Port Forwarding on your router so Everything can communicate properly.
You Need to open port 81, 1994, and 3174
You can also visit this site http://portforward.com/english/routers/p...rindex.htm if you need further help setting up your router.
http://www.youtube.com/watch?v=IuCez...layer_embedded

Step 2. Building your Bot.
You have to get a no-ip.info address for this part. They are free just go to http://no-ip.com and setup a free dns domain. Make the first part of it only 3 characters for example (gnm.no-ip.info) also download there Dynamic Updater client so your ip stays updated with the domain.
http://www.youtube.com/watch?v=AyuJ7...layer_embedded

Now You are ready to try out your Booter. You can test the bot on your self to see if it works just by opening it. You should see yourself appear in the client. Now You can right-click on your ip and uninstall it.
http://www.youtube.com/watch?v=BTiYZ...layer_embedded


VIRUS SCAN
http://vscan.novirusthanks.org/analy...kb3Nlci1leGU=/


USE CRYPTER PARA DI MADETECT NG AV YUNG BOT NA GINAWA MU SEARCH LANG KAYO DITO MARAMI NAGKALAT NA FREE PUBLIC CRYPTER

CREDITS: anonymous :P
Read more

Thursday, November 8, 2012

Gettting to know!

“Every time that your eyes meet mine, I light up like a neon sign… Yes we’re getting to know each other a little too well..” says a popular OPM song. Getting to know someone whom you’re interested with is one of the most terrifying yet the most exciting stage. You stay until late at night just to talk to that person. The conversation often never runs dry because you never run out of things to talk about. It is where you...
Read more

The Underrated Sense

I think that one of the most interesting things about getting to know someone you’ve started to spend more and more time with is getting to know their smell. It still wows me that certain people and families and houses can have certain smells, and it always makes me sad that I don’t know what my “smell” is. When I was little, I was on a plane with my family and I had my trustworthy blankie, of course. And my mom hugged it to her...
Read more
 

Blogger news

About