Monday, 2 July 2012

Video Chat Apps to Make Your Smartphone Truly Smart


One of the main reasons that so many people are investing in a Smartphone nowadays is simply for the convenience of having the ability to do almost everything that you could do in your office at home all conveniently packaged in a nice light handheld device. While there are many reasons for why someone may choose to invest in a Smartphone one of the capabilities that has been growing in popularity the fastest is the video chat.

Video chatting has become perfect way to be able to communicate with your family and friends. It does not matter if you are miles apart or right down the street. It saves a step from photographing an image and then having to send it in a text or email and wait for the person to receive it. You can simply call them up on video chat and show the person what you would like for them to see, or simply enjoy seeing someone that you do not get to visit very often. There are dozens of video chat apps available to anyone that owns a Smartphone. Some of the apps are specific to the iPhone while other can only be used on the Android.


Skype is a program that everyone has heard about and most people have used at one point in their lives. Skype has been used for phone calls, instant messaging, and even video chatting. It is a great addition to any Smartphone or computer, and the price is right at free. Skype is one of the frontrunners for paving the way in video chatting, but has fallen a little bit behind due to the quality of the video. Skype has the benefit of being used on any system no matter what the operating system is, but the strength of your internet connection will have a direct effect on how the app operates. The Skype app is free and often come installed on many of the newer Smartphones. Instant messaging through Skype is often free, but video chatting and phone calls conducted through Skype may have charges attached to them when conducted through the Smartphone.

The people who are able to download FaceTime absolutely love it, but there is only one problem and that is that only Mac users are able to download the program. This means that the only Smartphone that can successfully download FaceTime is the iPhone. Since the iPhone is probably one of the most sought after Smartphones, FaceTime is great for a person that wants to communicate with another person that has access to a Mac, but otherwise you will need to find another option for communicating through video chat with a not Mac user.

Fring is a lot like Skype. It offers many of the same features that Skype does, but just at a portion of the charges. The Fring app is free to download, and the video chatting and instant messaging is offered with it along with the calling ability. The main difference between Fring and Skype is that Fring is built specifically for the Smartphone, so you will not be able to use in on your PC or Mac.

ooVoo is something that FaceTime will have to watch out for. ooVoo has high quality video chatting capabilities that will challenge those of FaceTime, but unlike FaceTime you will be able to communicate with people outside of your operating system. This means that if you own an Android, but would like to call your friend that has an iPhone it will not be a problem for the two of you to communicate via ooVoo.

There are several other apps for the Smartphone that may quickly grow in popularity, but for the time being the four apps listed above are the most used apps for video chatting on a Smartphone.

All credits for writing this post go to Jason Phillips; he is an entrepreneur and social media enthusiast. He loves to do webcam chat in his leisure time and he is living encyclopedia.

Read more

Saturday, 5 May 2012

Hack or crack IDM manually


Hello Friends, today i am going to explain how to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.


Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.
I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses.
This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Hack or crack IDM manually :
Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help—}} then to check for Updates.If you don’t wanna update your version, Just click on Registration.

Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:


And click on ok to register.
Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.
Step5: Now Go to START => Then go to RUN and type the following text and click enter:

notepad %windir%\system32\drivers\etc\hosts

Step6: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Detail Note about Granting Permission In Windows7:

For Windows 7 users, due to security reasons you will not be able to save hosts follow this steps :
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is “Permission for SYSTEM” by clicking all checkbox under “Allow” Name and press Ok.Dnt click on any Deny check box.

Note : if  you have login through admin then skip this step6 .Its just for granting permission for editing file.

Step7: Now a notepad file appears something like this as shown below:

add cod in the hosts file idm
Now copy the below lines of code and add to hosts file as shown above image box :
After adding these piece of code, save the notepad file. And exit from there.
Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.
That means it will remain full version for life time and you can update it without any problem in future.
proof of Successfully Hacking IDM:

Read more

Wednesday, 18 April 2012

Make USB storage devices totally useless without your permission.


Make USB storage devices totally useless without your permission.

I am going to show you how you can make USB storage devices totally useless without your permission.

To block all the storage device in your Windows, run registry editor by typing regedit in RUN command.
In the registry editor, at left side navigation pane, navigate to following location:

HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > USBSTOR

Now at the right side double click on START.

 To block USB storage Medias, change the value data to 4.

If you want to unblock USB storage Medias just navigate to the same location and change th value data to 3.

that's all....make ur PC safe....more tricks to come

Read more

Simple way to Hide and Password Protect your Folders in Windows


I guess people of this forum needs it a lot than anybody else. 
I've been using this process to hide my stuffs in my computer, its simple its easy and its FREE. no worries of any piracy etc... etc... Anyways who cares about piracy when you you are in India 

following is the script. copy and paste it in notepad and save it as *.bat (a batch file).
For layman... name the file as "run.bat" and save it where you want your folder to be.
E.g.: if you want your protected folder to be in C:\ then save the file in C:\.
If you want your protected folder to be in D:\New Folder\ then save the file in D:\new Folder\


title Folder My_Folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST My_Folder goto MDLOCKER
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
ren My_Folder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End

echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==pwd123 HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" My_Folder
echo Folder Unlocked successfully
goto End
echo Invalid password
goto end
md My_Folder
echo My_Folder created successfully
goto End
Note: paste the above code in notepad and go to Edit>>Replace... and replace "My_folder" with a folder name of your choice and "pwd123" with a password of your choice. If you use any new folder name which do not exist, it will create one.

How to use it...
To hide:
Run the .bat file, it will ask you for confirmation to hide the folder (Y/N), press 'Y' if you want to hide the folder and its done 

To Unhide:
Run the same file again, it will ask for the password. Put in the correct password and your folder again shows up.

1) easy to use
2) hides the content completely i.e., even Show Hidden Folders option enabled cannot show this hidden folder nor Windows search can search the contents of this folder when the content is hidden.
3) I never faced any data loss or anything.
4) even if you forget your password you can always recover it by reading the batch file you created.

1) no encryption. therefore not advised for offices where data security is critical. In that case I suggest you to go for professional software.
2) Password can be hacked by any geek by reading the batch file.
3) It hides only 1 folder, for another folder you need another batch file.

I've been using this on windows7 since a long time and didnt had any problem. Would like you guys to try it in Windows XP and vista and report. hopefully you wont face any problem there as well.

NOTE: Only good for hiding your personel stuffs  from your fren, parents. hehehehe

Read more

Friday, 10 February 2012

How to hack everything ( noob friendly)


Now,first free ur time before reading this tutorial.This is a big tutorial that u can learn and hack everything.

1. Introduction.
Most of the hackers who deface websites are script-kiddies, we're now going to take a look how hackers quickly detect vulnerable websites and deface other domains on the system.

2. SQL Injection.
Many people would take as a main the SQL Injection (SQLi) attack. SQLi is very popular and there are many dorks out there.

2.1 Searching for vulnerable websites.
The search is very easy. We just put the dork and try diffrent search results. For quicker results you may use the exploit scanner.

2.2 I want to attack a specific website which is on a shared hosting.
Again the search is very easy. Let's say we have the IP with no malicious thoughts on it, of course. We navigate to:

In the search field write:

ip: id=

You should get very interesting results which you might attack.

3. Attacking the web application itself.

A very good method to gain access is to attack the web application itself. Even if the websites' web application is up-to-update and you aren't able to exploit it, you can search for vulnerable web applications on the server itself. We'll be using the same method as in the 2.2 .

Let's say we have again the IP with no malicious thoughts on it, of course. We navigate to:

In the search field write:

ip: "wordpress"

You should get websites powered by wordpress or any other system you have a working exploit on.

4. I've got admin access, now what ?

After you've got admin access, upload a shell.

5. I've got a shell, now what ?

Now it's time to take down your target. You can either:
- Root the server.
- Get the victims' website configuration database.

5.1 Rooting the server.
First we need to disable the security. 

Second we need a back-connection OR we can bind a port. A back connection means that the server connects to you after you have opened the specific port and have launched netcat to listen ( nc -l -v -p PORT ) . Locus shell provides a great interface for begginers. Just upload locus, after which go to back-connection OR bind shell and follow the instructions.

5.1.1 Pwning the kernel.
One of the most popular ways to root a web server is by pwning the kernel if it's a Linux box. To find out the kernel version simply type "uname -a" on your back/bind connection to/from the server. After you've got the version try finding a local root exploit for it. If you can't find, don't give up ... try harder ...


5.1.2 Getting the victims' database configuration file.

Many of you have heard of "symlinking" . This is actually something like a shortcut on the Windows OS except this term is used in the Linux/Unix Distributions. Symlinking is a necessity in order to the Linux/Unix box to run about 10 times faster. Without it the server will be really slow even with high hardware configuration , which is just pointless.

To get the configuration file, first find out what system is the victim using ( e.g. Wordpress, Joomla, vBulletin etc ). Now go to your shell ( you will have to had disabled the security ) and type in "cat etc/passwd" .

Etc/passwd file contains all usernames on the Linux/Unix box which are created when you get hosting ( usually that's the cpanel username ). Now to get this file you will have to have disabled the security. In this file the usernames aren't long as the domain ones, for e.g.

You have victim website
In etc/passwd this can refer to the username:
hack1, hak1, hac1, hckrs1, hrs1 etc

So spend some time figuring out the username. After you've got it it's time to get the database config file. You can see the default configuration files list here:
vBulletin -- /includes/config.php
IPB -- /conf_global.php
MyBB -- /inc/config.php
Phpbb -- /config.php
Php Nuke -- /config.php
Php-Fusion -- config.php
SMF -- /Settings.php
Joomla  --  configuration.php , configuration.php-dist
WordPress -- /wp-config.php
Drupal -- /sites/default/settings.php
Oscommerce -- /includes/configure.php
e107 -- /e107_config.php
Seditio -- /datas/config.php

After you've got your path, it's time to extract the db information.

Let's assume you're in directory /home/attacker1/public_html/shell.php , where shell.php is your shell and attacker1 is the username of some domain we've just compromised. Doesn't this ring the bell ? The path to the victims' hosting should be /home/victim1/public_html/ where victim1 is your victims' username. Let's execute this command on our shell, assuming the victims' system is vBulletin :

ln -s /home/victim1/public_html/includes/config.php victim1.txt

This command uses symlink and it tells the server "hey, give me the file /config.php and save it as victim1.txt" (symlinking) . Now when you navigate to you should have their configuration file. Many administrators put some security on their forums/cmses so we're going to break them now ... Htaccess.

The admin of the website might have put this htaccess file in the /includes folder:

<Files config.php>
order allow, deny
deny from all

When we try to symlink this it will return in a 403 Forbidden Error. So how do we bypass this ? Easy. We create a folder e.g. "hack" . We navigate to "hack" by typing "cd /hack". Next we symlink like this:

ln -s /home/victim1/public_html/includes/config.php victim1.txt

and we get a 403 Forbidden error ... Now we put this htaccess file in a directory before "hack" for example we are in "/home/attacker1/public_html/hack" and we have to put this htaccess file (below) in "/home/victim1/public_html/" . The htaccess file you have to

HeaderName victim1.txt

Now we navigate to "/home/attacker1/public_html/hack" and click "victim1.txt" and it should load us the configuration file. If you have done a symlink but with a different .txt file, replace your custom name in the htaccess as well e.g. I have done symlink:

ln -s /home/victim1/public_html/includes/config.php 1.txt

so I have to put htaccess:

HeaderName 1.txt Browse Through Attack - Bypassing ALL Security.

Tired of bypassing everything step by step by step ? Now I'm going to show you a very cool method to bypass ALL security.

Take this scenario as example:

We have disabled all security. But still we can't symlink right. What do we do ?

First we create a folder with a custom named folder like "hack". We enter it via our shell and type in "ln -s / root" . Next we choose a victim domain like . We type in " ls -la /etc/valiases/ ". Now we navigate one folder back and put this htaccess file in the "hack" folder:

Options Indexes FollowSymLinks
DirectoryIndex test.htm
AddType txt .php
AddHandler txt .php

Now if we are in "/home/attacker1/public_html/" this equals to "" . So we want to navigate to the "hack" folder and we type in the URL "" and we see a "folder" which actually is a symlink called "root". Don't get too happy, we still have got restricted permissions to some folders. Now to "browse through" their hole hosting space we just navigate to "".

Fr34k1ng pwn3d . Now you can browse through his website without worrying about IP restrictions with htaccess file. Although if there is htaccess because of which you have to enter username and password, you have to find a way to bypass that yourself. OK so you're browsing through and you are in "/includes/" and you find "config.php". You click on it but it gives you a BLANK page. WTF ?! Not exactly. Right-click and select "view source" and the configuration file is there .

6. Is this is it ? Is it really this simple ?

Yes, this is it, nothing complicated. This is the way most hackers "deface", "root" or whatever they do to websites/forums.

Read more

Free Unlimited 3G Internet hack for BSNL


Free Unlimited 3G Internet hack for BSNL 

Today I came across a BSNL 3G internet hack , so i planned to post it here also. You can surf Free unlimited internet in 3g with this hack.


3G supported device
3G activated sim(it is easy to activate 3g in normal sim)
Knowledge to change internet settings

Just change the Internet settings with the following details .
BSNL 3G hack setting:

Name :BSNL 3G
Service Type 1 WAP
Gateway IP : 1
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting:
User Name : ppp
Password : ppp123

use this settings and enjoy the free Internet service at 3Mbps speed.

Read more

Friday, 13 January 2012

Handy Shortcuts for Navigating in Word


Handy Shortcuts for Navigating in Word

Here are a few tricks using the CTRL key that I find useful for quickly navigating through Word documents:

* Hold down the CTRL key and then press the RIGHT ARROW key to move from any point in a word to the beginning of the next word.

* Use CTRL+LEFT ARROW key to move from any point in a word to the beginning of that word.

* Use CTRL+UP ARROW key to move to the beginning of a paragraph.

* Use CTRL+DOWN ARROW key to move to the beginning of the following paragraph.

Read more

Customize Grammar and Writing Style in Word


Customize Grammar and Writing Style in Word

If you have specific rules of grammar and style that you want to apply to every Word document—for example, only one space between sentences or a comma before the last item in a list—you can customize Word so it automatically checks these rules for you.

To customize grammar and writing style:

1. On the Tools menu, click Options, and then click the Spelling & Grammar tab.

2. Click Settings.

3. In the Writing style box, select whether you want to customize settings for grammar and style, or grammar only.

4. In the Grammar and style options box, do one or both of following:

* Under Require, select the options you want for serial commas, punctuation within quotation marks, and number of spaces between sentences.

* Under Grammar and Style, select or clear the check boxes next to the rules you want the grammar checker to check or ignore.

Editor's Note: To restore the original rules of the selected grammar and writing style, click Reset All.

Read more

Design by ThemeShift | Bloggerized by Lasantha - Free Blogger Templates | Best Web Hosting