Showing posts with label Tricks. Show all posts
Showing posts with label Tricks. Show all posts

Wednesday, 19 November 2014

Free call from internet to mobile in Urdu Language

Free call from internet to mobile in Urdu Language

Ab aap internet say mobile
 پر call kr saktay hain
bilkul free main in all world 

 Aap k pass 

مندرجہ ذيل چيزوں کا 
ھونا ضرورى ھے 

Personal Computer

Internet Connection

Yahoo messenger

Head Phones

Step-1


Start yahoo messenger
Step-2

login in yahoo messenger

Step-3

باکس ميں يہ نمبر لکھيں اور انٹر بٹن دباديں
123456789

نيچے تصوير
main ظاھر kia gia hay 


















ab aik choti window ظاھر 

ho ge جيسے نيچے


















Head phone ko چيک krain k

ٹھيک طرح say work kr raha hay

اب آواز کو غور سے سنيں اورجب وہ کہے فرى کالز
توآپ بھى کہديں فرى کالز

Ab aap k pass 5 minute hain

free call krnay k liay دنيا main

khain b call from internet

to mobile
جيسے نيچے picture main wazay kia

hay















Free call may or may not be
from internet to mobile
kion k baz dafa kisi problem
ke waja say be call nhi ho pati ha.

                                        More information call me

Thursday, 2 January 2014

Internet speed test 3D mater Script [php] free download

   Internet speed test 3D mater Script [php] free download

                                        

Internet Speed Test 3D Meter Script [PHP] |FREE DOWNLOAD
DOWNLOAD AND ENJOY!!



How to creat a facebook status

                       How  to creat a facebook status



I am posting one more Amazing facebook Status Trick by which you can shock your Facebook Friends .
This Trick Let’s You to Create Fake Facebook Status By using Facebook Application
Step 1 – First Go to The Facebook Application   Wall machine and Click on Connect.
Step 2 – Now you can edit Name,Status,Comments,Like and Pictures as you want.
Step 3 – Click on the Name To Edit Name and Click on Status For Editing Status.
Step 4 – For Adding Picture Click on Left Side of the Name.

Step 5 – Click on Like and Rename it and For Editing Comments click on it and  Edit the Comments.
Done ! Now Your Fake Status will Be Created . 
Step 6 – Now Save your Status By Using Save Button .
Enjoy   

How to send fake sms with any name and number free

     How to send fake sms with any name and number free


                                        10 Tricks To Send Fake SMS With Any Sender Name Or Identity,SMS Spoofing

To Send Fake SMS With Any Sender Name Or Number Is Also CalledSMS Spoofing.SMS Spoofing Is A Trick/Technique By Which A PersonSends Fake SMS With Any Sender Identity Or Sender Number To Any Number.Now I Am Going To Tell You How Can You Send Fake SMS With Any Sender Name Or Number.
It Is As Simple As Dumbing Your Girl Friend.All You Have To Do Is To Follow The Given Steps.
How To Send Fake SMS From Any Sender Name Or Any Number:-

Just Creat An Account On That Website.
The Account Verification Code Will Be Sent To Your Mobile Number.(You Have To Provide Your Phone Number To Create An Account)
Now Click On Login Button On That Website.
Give Your User Name And Password
Now You Can Send Fake SMS With Any Number Or Sender Identity (SMS Spoofing)
Hope It Was Help Full For You And You People Enjoyed It

Why Your Business Needs A Blog

                        Why Your Business Needs A Blog

                  
Have you ever wondered why almost all business owners have blogs? The truth is that if you have planned to start your own business or simply want to develop your current one, you should know that blogs are considered as invaluable and very important marketing tool. Running a business website without a blog means that you are ready to miss a lot of big opportunities and potential customers. This is one of the most efficient ways to set apart from you competitors and give your visitors a wealth of information about you, your business and the products you offer. Here are some other essential reasons why your business needs a blog.

The world of search engines

Google really loves original and fresh content, since it makes the web a more interesting place. A business blog will definitely boost your SEO and you will make it easier for people to find you.

Building business partnerships

With business, everything is about building relationships.A good business blog will give you the opportunity to strengthen these relationships and attract some new partners and customers. If, for example, you sell hand-made accessories, you can share a picture or a short article about your last products. You can include some interesting personal stories and give your customers freedom to add comments and share their personal opinions. This would be a great opportunity for them to cast a glance 'in the kitchen' of your business and help you improve it in the future.

Social media

Another great aspect of blogging is the fact that it gives you the opportunity to get into the big family of social networks. Every time you publish a new post, you can share it on the Internet, on Facebook or Twitter. If you post some interesting content, that people are interested in, you can be sure that they will subconsciously advertise your products and posts, by resharing them. When they get to know you from your blog, they will tell their friends about your products.

Blogging is a great way to get some feedback

Blogging gives you plenty of opportunities. One of the most essential reasons for which blogging is so important and beneficial for your business is the fact that it allows you to understand what your customers think of your business and products. You will be able to understand what do they want to see more or less about. Also, this is the best way to receive some constructive criticism.

Most business owners think it's either too hard, or requires too much work

Running a business blog is actually a very easy task. Today you can do it in minutes, even on a free platform. However, most business owners do not know that and think of it as something very hard and complicated. This, on the other hand, gives you the great opportunity to jump in and get your target clients. The best part is that today, audiences are more open to blogs than ever. They want to be entertained and informed, and blogging gives you the chance to give them all this.

Author Bio: Connie Jameson is passionate about everything related to business and technologies. She currently works as a manager at Call Cleaners Clapham and she loves her job because she learns new things every day.

Tuesday, 24 December 2013

5 Best Books to Learn Web Application Hacking and Penetration testing

5 Best Books to Learn Web Application Hacking and Penetration testing.......

 we have seen so many hacking incidents, data breach  password leaks and website deface that belongs to popular websites. All these happens because of web application vulnerabilities that could be patched but developer failed to notice vulnerabilities. This is the reason why Application security field is booming and creating jobs in bulk. If you also want to get into the security field, web application security and penetration testing can be a nice career option.

Now, you will start thinking how to learn all these things in easy way. There are so many institutes available which claim many big things. If you can not afford institution fee, you can learn everything by yourself. There are so many nice books available. Here I am listing 5 best books that can help you learn web application penetration testing and hacking in easy way.

The Tangled Web: A Guide to Securing Modern Web Applications


This is a nice book that covers web application hacking and penetration testing  It is written Michal Zalewski, one of the world's top browser security experts. This book is really nice and received much customer appreciation.

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws is a nice book released last year. It discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. This book covers all framework, HTML5, cross domain integration  UI redress and many other flaws, attacks. If you want to learn website hacking and penetration testing this book is worth to buy.



Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Are you worry about your website's security? Hacking Web Apps: Detecting and Preventing Web Application Security Problems is a nice book that covers all things about the web attacks, hacks and exploits. This book tells you how hackers hack web application and how you can protect from these malicious attackers.

Hacking Exposed Web Applications

Hacking Exposed Web Applications

This book is really popular among students who want to learn web application hacking and security. If you are interested in having career in web application security, you must buy this book. This book  is fully updated to cover new infiltration methods and countermeasures. Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques

Web Hacking: Attacks and Defense

Web Hacking: Attacks and Defense

Web Hacking: Attacks and Defense is another nice book that covers everything we need to know for web hacking. It covers complete methodologies, including techniques and attacks, countermeasures, tools, plus case studies and web attack scenarios showing how different attacks work and why they work. It also describes about firewalls, servers, and web vulnerabilities that helps in building hacking concepts.

Download Windows RT Jailbreak Tool To Run Unsigned Apps

Download Windows RT Jailbreak Tool To Run Unsigned Apps
                             
                                    
               
As we reported to you a few days ago, a group of software creators managed to bypass Windows RT’s restrictions and run unsigned desktop applications on the operating system, basically opening the door to a whole new world of jailbreaking tools.

Even though the whole process of jailbreaking Windows RT was pretty complicated, it was only a matter of time before someone came up with a dedicated solution supposed to perform this task all by itself.

Now XDA Developers user “netham45” has released a batch file that does the entire jailbreakingprocess automatically, so it modifies the Windows RT system kernel without user interaction.

Even though the software developer admits that some users might get a BSOD after launching the application, he says that everything should work just fine on all Windows RT tablets, including Microsoft’s Surface RT.

At this point, there are only a few software solutions available on a jailbroken Windows RT unit, including VNC Server and Client, Putty and Bochs, but many more apps are very likely to be added to the list as new users do the jailbreak.

Microsoft has already confirmed the jailbreak, saying that it “applauds the ingenuity” of the software developers behind the project, but also hinted that a future fix could block their attempts to modify the system kernel.

netham45 explained that Microsoft would have a very hard time trying to block their efforts. “They can patch it through Windows Update, but since we have the ability to reinstall from recovery partitions we can revert any Windows Updates they release,” he explained.

The jailbreak would only last until the Windows RT device is restarted and even though it may sound like a glitch, it’s actually a simple way to make sure that you won’t lose the warranty or get infected by some sort of virus compiled for the tablet-oriented operating system.


What is HTTP Header Injection Vulnerability

           What is HTTP Header Injection Vulnerability

                     

HTTP Header

HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection

HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.
I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:
GET / HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: canadaedu.apple.com
Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d
Connection: Close
Expect: <script>alert(411731119275)</script>
Pragma: no-cache

How To Recover Your Hacked WordPress Website In Easy Steps?

How To Recover Your Hacked WordPress Website In Easy Steps?

WordPress is one of the most popular content management systems at present. However as a general law, the increasing popularity comes with a number of dangerous has gained attention of bad boys as well. There are so many people who are reporting the cases of hacked WordPress account on a regular basis. So I have thought of putting a complete guide to discuss how to recover your hacked WordPress.

                                     

Ways To Recover Hacked Account

Below is the perfect path to follow to get your hacked account back:
Backup – Even if your website is infected to a small extent, it is still very much necessary to secure the backup for your website before waiting for watching the things turning into worst. Don’t forget to take backup of your entire database and all files. You can also try for a faster solution by using BackupBuddy.
Change Login Details and Secret Access Keys – At the time you sense the hacking attempt, just try to login to your account to check whether your login details are still effective or not. If the username and password details are not yet changed then immediately change all the WordPress secret access keys in wp-config.php file and of-course your username and password.
Running Scanners – Running a scanner is also a very helpful step and comes at number 3 in this list. The scanners are basically used for identifying the compromises at the level of database. You can try out Cloud Sites WP Scanner plug-in or Sucuri Malware Scanner. After running the scanner you should make sure to move the next step stated below.
Installing Your WordPress Again – Next important step involves Deleting all the files existing in the directory of WordPress except wp-config.php file and wp-content directory. After that you need to download and install a totally fresh copy of WordPress. Now edit the wp-config-sample.php file by substituting the sample values by picking the actual database values from the wp-config.php file that you haven’t deleted as stated above. Now you can delete the present file and replace it with your own file.
Review Content Folder – Next task involved to check all the folders to find ones with any suspicious activity in your wp-content directory. So carefully analyze the folders content and remove any one that seems not to be belonging to you. If you later find that the folder was actually needed then you can get it back from your backup.
Analyze and Re-install Your Plug-ins – The next steps after completing with reviewing the folders’ content includes reviewing the plug-ins. Collect information about what plug-ins you are not using currently and uninstall them all for the time being. Now coming to all other activated plug-ins that you are using currently, deactivate and delete these plug-ins and then re-install and activate the active plug-ins.
Analyze Your Themes – Now the next thing that should be taken care of is the task of removing the extra themes which are not in use currently. Next task again involves reviewing your activated theme. Look through the PHP or Javascript code to find out any suspicious activity there. Most of the time hackers make such malicious changes in header.php or footer.php files.

Following this step by step guide can really help you a lot in getting your WordPress back. Also always remember to keep checking for the activities on your WordPress site. Also make it a habit to keep a time by time backup of your database. For more recovery details you can check onhttp://codex.wordpress.org/FAQ_My_site_was_hacked.

How to Secure before Getting hacked !

Every one is looking to make their blog looks secure and try to make their blog safe from hackers so that hackers can not take any kind of information from your blog. You can protect and increase security of your by doing following things :-
Chap Secure plugin
You can increase the security of your log-in by using Chap secure plugin, It helps in encrypting passwords by using CHAP protocol. It will help hacker to get in trouble.
Login Lockdown Plugin
This plugin helps a lot in stopping a hacker because if he is trying to play with your login screen then this plugin will limit hit after few wrong attempts.Just download the plugin and activate it. This plugin helps to secure your blog from newbie hackers. ;)
WP Security Scan
This plugin helps to check all the codes of your website from hacking Malware and scripts. It can find out which code or which file has virus in the blog.
Updating WordPress regularly
Try to upgrade the WordPress regularly as soon as any new version is launched. Most of the bloggers do not update WordPress and chances are huge that old WordPress version can get hacked.
Tac Theme Checker
You can install a plugin “Tac Theme checker” which can check your theme before activating it. It helps you to check the complete theme when you upload it into Dashboard and it helps to check the files completely in few seconds.
Make your security Bullet proof
You should increase your security more and more by adding some official steps from WordPress website and you can read them here http://codex.wordpress.org/Hardening_WordPress.
Theme of your Blog
Your theme plays an important part in hacking, If you are using some cracked version of theme then be ready to get hacked soon. Cracked themes often have codes which helps to get you hacked. I would suggest that get a proper theme from any web design company so that there is no chance to get hacked due to unethical themes.
I hope these steps will help you to protect from all the hack attempts. If you have any other method then do let us know in below comments. Thank you