Wednesday, September 28, 2011


Well there are many techniques for hacking out Facebook Password well these include Phishing Attacks, Keylogging and other Social techniques but today we are going to see how to hack passwords using new feature introduced by Facebook the 3 Trusted Friends Password Recovery Feature in this what happens if you have lost your password and you don’t have any access to your default email address than this feature will handy by sending request to your 3 trusted friends and hence gaining your account password again.
For this technique you need to create 3 fake Facebook account and you need to surely add these as friends into your victims account whose account you are going to hack.
After succefull addition of your fake accounts into victims account as friends follow the below steps .:
1. Go to Facebook and click Forgot your Password ?
Hack Facebook with 3 Trusted Friends Method
2. Than you will get something like below just enter the details you know about him enter his Username, email address and full name.
Hack Facebook with 3 Trusted Friends Method
3. After entering everything check it again and click on search.
Hack Facebook with 3 Trusted Friends Method
4. After succeful search for the user Facebook will show some information about how many emails are linked to the account and there is simple option saying No Longer Access to These click that one.
Hack Facebook with 3 Trusted Friends Method
5. Now it will promote you to enter a new email address on which you will get the password resetting option so enter your email address I suggest you creating a Fake or Temporary email address for safety purpose.
Hack Facebook with 3 Trusted Friends Method
6. Than it will promote you to enter the Security well if you have some security guess about that one than that’s ok but if you don’t know it than simply enter 3 wrong answers and it will take you to the 3 trusted friends recovery page like below.
Hack Facebook with 3 Trusted Friends Method
7. Now just click continue and facebook will ask you to choose 3 trusted friends choose the 3 fake profiles of your which you created and added into the victims account.
8. After selecting 3 accounts facebook will send security codes to these accounts just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5
That’s it now you are succefull in Hacking Facebook Password with the 3 Trusted Friends Method.
Remember .: this trick only works if 3 trusted friends agree to give youthe security code so its really important that you add your 3 fake accounts into your victims facebook account as a friend.

Top 7 Strangest Things in Space

7. Dark Matter
Dark Matter
Scientists think it makes up the bulk of matter in the universe, but it can neither be seen nor detected directly using current technologies. Candidates range from light-weight neutrinos to invisible black holes. Some scientists question whether dark matter is even real, and suggest that the mysteries it was conjured to solve could be explained by a better understanding of gravity.

6. Exoplanets
Until about the early 1990s, the only known planets in the universe were the familiar ones in our solar system. Astronomers have since identified more than 500 extrasolar planets (as of November 2010). They range from gargantuan gas worlds whose masses are just shy of being stars to small, rocky ones orbiting dim, red dwarfs. Searches for a second Earth, however, are still ongoing. Astronomers generally believe that better technology is likely to eventually reveal worlds similar to our own.

5. Gravity Waves
Gravity Waves
Gravity waves are distortions in the fabric of space-time predicted by Albert Einstein's theory of general relativity. The gravitational waves travel at the speed of light, but they are so weak that scientists expect to detect only those created during colossal cosmic events, such as black hole mergers like the one shown above. LIGO and LISA are two detectors designed to spot the elusive waves.

4. Galactic Cannibalism
Galactic Cannibalism
Like life on Earth, galaxies can "eat" each other and evolve over time. The Milky Way's neighbor, Andromeda, is currently dining on one of its satellites. More than a dozen star clusters are scattered throughout Andromeda, the cosmic remains of past meals. The image above is from a simulation of Andromeda and our galaxy colliding, an event that will take place in about 3 billion years.

3. Neutrinos
Neutrinos are electrically neutral, virtually mass-less elementary particles that can pass through miles of lead unhindered. Some are passing through your body as you read this. These "phantom" particles are produced in the inner fires of burning, healthy stars as well as in the supernova explosions of dying stars. Detectors are being embedded underground, beneath the sea, or into a large chunk of ice as part of IceCube, a neutrino-detecting project.

2. Quasars
These bright beacons shine to us from the edges of the visible universe and are reminders to scientists of our universe's chaotic infancy. Quasars release more energy than hundreds of galaxies combined. The general consensus is that they aremonstrous black holes in the hearts of distant galaxies. This image is of quasar 3C 273, photographed in 1979.

1. Vacuum Energy
Vacuum Energy
Quantum physics tells us that contrary to appearances, empty space is a bubbling brew of "virtual" subatomic particles that are constantly being created and destroyed. The fleeting particles endow every cubic centimeter of space with a certain energy that, according to general relativity, produces an anti-gravitational force that pushes space apart. Nobody knows what's really causing the accelerated expansion of the universe, however.

Tuesday, September 27, 2011

Five ways to avoid being tracked on the Web

Web spies are getting stealthier and stealthier. Recently they've been caught peering into our browser histories to determine the sites we've visited, even in so-called privacy mode with cookies disabled, as Dan Goodin described earlier this month on The Register.
Many of the companies whose sites were discovered using the technique claimed to have had no idea and immediately decried the spying. Julia Angwin reported on many of these surprise responses on the Wall Street Journal's Technology site.
If the owners of the spying sites aren't even aware of the activity, what are unsuspecting visitors to do? Well, you could wait for the government to take action, as CNET's Declan McCullogh reports in the Privacy Inc. blog.
Or you could rely on the online advertising industry to police itself, despite the marketers' inability to determine which spying practices violate their own guidelines, which Julia Angwin describes on the WSJ's Digits blog.
Personally, I'd rather take matters into my own hands. Here are five ways to reduce the chances that your browsing habits are being recorded.

Block ads and super-cookies before they can download

Last May, Microsoft and Adobe announced that deleting cookies in Internet Explorer 8 and 9 would also delete the long-lasting Flash cookies, or local shared objects (LSOs). The long-awaited change requires Flash 10.3 or later, as Microsoft's Andy Ziegler explains on the IEBlog.
Add-ons for Mozilla Firefox and Google Chrome go a step further by allowing you to prevent LSOs and other tracking files from being downloaded along with a Web page's content. I first wrote about Giorgio Maone's free NoScript add-on for Firefox in a post from January 2008. The extension lets you block Flash and Javascript on a site-by-site and source-by-source basis. I can't think of a reason why Firefox users would not use this add-on.
NettiCat's free BetterPrivacy extension for Firefox lets you decide which Flash cookies to allow and delete. The program can be set to notify you whenever a new LSO is stored, delete the default Flash Player cookie, and even set a keyboard shortcut for erasing LSOs. By default, BetterPrivacy removes all Flash cookies when you close Firefox.

BetterPrivacy options screen
The free BetterPrivacy add-on for Firefox automatically deletes Flash cookies when the browser closes.
(Credit: screenshot by Dennis O'Reilly)
Another great Web-privacy tool that's available for both Firefox and Google Chrome is AdBlock Plus, which not only removes ads from sites but also lets you customize its 40-plus filter subscriptions for ads and known malware domains. Developer Wladimir Palant suggests a $5 contribution. The version for Firefox is available on the Mozilla add-ons site, and the one for Chrome can be downloaded from Chrome Web store.

Improve security and browsing speed in one fell swoop

If OpenDNS isn't the worst-kept secret on the Web, it should be. The service replaces your existing Domain Name System service with one that's both faster and safer. The ad-supported OpenDNS Basic for home users can be upgraded to the ad-free OpenDNS VIP ($10 per year). There's a version of K-12 schools and one for organizations.
OpenDNS works by using a network of Web-cache servers that put site content closer to your browser to minimize the number of hops required to deliver the data. The servers also filter dangerous or inappropriate content based on the criteria you select. For more on the service, see this post from May 2010 (scroll to "Filter potentially dangerous sites").

Set your browser to clear your history, cache, and cookies on exit

There are good reasons to retain your browser history, cache, and first-person cookies. Holding onto your history makes it easier to retrace your online activities. A big browser cache allows pages you revisit to load faster. And cookies allow sites to make suggestions based on what they already know about you.
Personally, I'd rather bookmark pages I expect to return to; I don't mind pages I revisit loading more slowly; and I don't care for sites' personalized recommendations. Where I've been and what I do on the Web is nobody's business but mine...and Google's, of course. And my ISP's, and the National Security Agency's... . But you gotta draw the line somewhere.
To set Firefox not to save your browsing history, click Tools > Options > Privacy. (If the standard menu isn't visible, press Alt.) You can either select "Never remember history" in the "Firefox will" drop-down menu, or "Use custom settings for history" to view more options. Check "Clear history when Firefox closes" to activate the Settings button.

Mozilla Firefox Privacy options
To view more options for clearing your browsing history in Firefox, check "Clear history when Firefox closes" and click the Settings button.
(Credit: screenshot by Dennis O'Reilly)
Click Settings to open a dialog that lets you clear specific types of data when Firefox closes. These include browsing, download, and form and search history, as well as cookies, log-in IDs, the browser cache, passwords, and site preferences.

Mozilla Firefox clear-on-exit options
Firefox's options for clearing data when the browser closes include browsing and download history, forms and search history, cookies, cache, logins, and passwords.
(Credit: screenshot by Dennis O'Reilly)
You can also set Firefox to remain in Private Browsing mode, to tell sites you don't want to be tracked, and to never remember history. On the Security tab of the Firefox Options dialog you can uncheck "Remember passwords for sites."
To set Google Chrome to clear data on exit, click the wrench icon in the top-right corner, choose Options > Under the Hood > Content Settings, and check "Clear cookies and other site and plug-in data when I close my browser." To view the personal data the browser is storing, click "All cookies and site data."

Google Chrome Content Settings dialog
Google Chrome's option for clearing cookies and cache on exit are located in the Content Settings dialog in the Privacy section Under the Hood.
(Credit: screenshot by Dennis O'Reilly)
In Internet Explorer, click the gear icon in the top-right corner (or Tools on the standard menu) and choose Internet options > General. Check "Delete browsing history on exit" to remove cookies, cache, saved passwords, and Web-form data automatically when the browser closes.

Internet Explorer 9's Options dialog
Internet Explorer's option for deleting your browser history on exit is on the General tab of the Internet Options dialog.
(Credit: screenshot by Dennis O'Reilly)
To view more options, click the Delete button. By default, the option to keep cookies and temporary files for your favorite sites is checked, as are the options to delete temporary Internet files, cookies, and history. Unchecked by default are the options to delete your download history, form data, passwords, and "ActiveX Filtering and Tracking Protection data."

Sign out whenever you're done using a Web service

It's convenient to remain signed into Gmail, Facebook, and other Web services you're likely to return to frequently in the course of a computer session. You may also be tempted to use your Facebook sign-in ID on sites that partner with the company. Unfortunately, the services may be sharing your personal data a bit too freely.
Of course, some people find Google's recording of their Web activities helpful. (In a post from July 2009, I described how to manage what Google knows about you.) But if you'd rather not share your browsing habits, the simple solution is to sign out when you're not actively using the service.

Send and receive from Webmail accounts via a desktop e-mail program

A comment to a recent post relating to Microsoft Outlook and Thunderbird asked why anyone would use a desktop mail program outside of work. Just a few days earlier a friend complained that Gmail lacked several features he had come to rely on in Outlook. I suggested he forward his Gmail messages to his IMAP or POP3 account, as I described in a post from December 2007.
(I've also described in previous posts how to merge your Outlook and Gmail contacts, how to combine and organize your e-mail accounts, and how to sync contacts and calendars between Outlook, Gmail, and iPhone.)
The Electronic Privacy Information Center (EPIC) claims that Gmail violates the privacy of non-subscribers by extracting information from the mail they send to Gmail addresses. EPIC also finds Gmail's data-retention policy and profiling practices a threat to privacy. (See EPIC's Gmail FAQ for more details.)
When you forward mail from a Webmail service to a desktop mail client, the contents of the messages you receive are still scanned by Google's bots before the mail is forwarded, but at least you can reply to the messages from your ISP mail account.
Many people claim the fuss about Gmail privacy is overblown. You can enable HTTPS for all your Gmail transmissions, as I described in a post from August 2008. But for individuals and organizations sending and receiving confidential or otherwise-sensitive data, IMAP and POP3 mail systems are generally more secure than Webmail services.

Sunday, September 25, 2011

How To Enable Facebook’s New “Timeline”

Yesterday Facebook announced a host of new features in what was described by industry observers as the biggest shakeup in Facebook’s history.  Most of these changes are obviously due to the emerging and growing threat from Google Plus, and one of the features that Mark Zuckerberg introduced was the radical redesign of the profile page.  It’s called the “timeline” and it could prove to be the most controversial change of them all.
Not everyone has the timeline design yet and you may have to wait up to several weeks for it.  However, if you’re curious about how it looks on your profile and you want to try it out now, then here is how to do it.
Please note however that your new timeline page will only be viewable to those who also have the timeline design page.  Those who still have the old page design will continue to see your old page design until the timeline feature goes mainstream for everyone.

Step One – Authorise Facebook Developer To Access Your Account

The first step is to sign up as a Facebook developer. This involves enabling and authorising Facebook Developer to access your Facebook account.  Just go here and click “allow“.

Create A New App

The next step is to create a new app.  Don’t panic, you’re not actually going to create one.  On this page, in the top right hand corner are two buttons – “edit app” and “create new app“.  Click “create new app“.

This is the box that will come up next.  Simply put whatever you want into both boxes.  It doesn’t matter, as long as someone else hasn’t reserved the name.  It should also be at least 7 characters long.  As you can see, I put “coolmuoapp“which was the first thing that popped into my head.  Now click “continue“.

Clear The Captcha

Now you have to prove you’re human and not an automated bot.  Enter the captcha and hit “submit“.

Define An Action

OK, you’re almost finished.  In this final screen, the only thing you need to concern yourself with is the “Open Graph” link in the top left hand corner of the page.  Click on that and you will get this :

All you have to do is choose an action in the first text field and choose an object in the second text field.  So I chose “watch” in the first text field and “movie” in the second.  Now press “get started“.
After processing that, Facebook will flip back to the Open Graph page (you may even get an error message) but you can now ignore all of that and head towards your Facebook profile.  Within a minute or two, you should receive an invitation to try out the timeline profile.  Click on that and you are in.  Here’s mine :

At the top, where I have chosen to upload my pic is the area known as the “cover”.  This is where you can upload your own photo and really personalise your page.  You can let your imagination go completely riot and choose something that reflects your personality and who you are.
On the whole, the timeline profile is an interesting development but it is a radical departure from what the profile used to be like, so I am sure there will be lots of people who will vehemently hate the design.  But I would say give it a chance.
As the name “timeline” implies, you can move the slider back over every year you have had the Facebook profile and see all your old status messages.  I found it fascinating seeing what I posted years ago and laughing at some of the bad jokes that I posted (and some of the good ones too).
Let us know in the comments if you have any problems getting the timeline page, and also let us know if you either like or hate the new design.

Questions that Cannot be Answered ????

1. Is it good if a vacuum really sucks?

2. Why is the third hand on the watch called the second hand?

3. If a word is misspelled in the dictionary, how would we ever know?

4. If Webster wrote the first dictionary, where did he find the words?

5. Why do we say something is out of whack? What is a whack?

6. Why does "slow down" and "slow up" mean the same thing?

7. Why does "fat chance" and "slim chance" mean the same thing?

8. Why do "tug" boats push their barges?

9. Why do we sing "Take me out to the ball game" when we are already there?

10. Why are they called "stands" when they are made for sitting?

11. Why is it called "after dark" when it really is "after light"?

12. Doesn't "expecting the unexpected" make the unexpected expected?

13. Why are a "wise man" and "wise guy" opposites?

14. Why do "overlook" and "oversee" mean opposite things?

15. Why is "phonics" not spelled the way it sounds?

16. If work is so terrific, why do they have to pay you to do it?

17. If all the world is a stage, where is the audience sitting?

18. If love is blind, why is lingerie so popular?

19. If you are cross-eyed and have dyslexia, can you read all right?

20. Why is bra singular and panties plural?

21. Why do you press harder on the buttons of a remote control when you know the batteries are dead?

22. Why do we put suits in garment bags and garments in a suitcase?

23. How come abbreviated is such a long word?

24. Why do we wash bath towels? Aren't we clean when we use them?

25. Why doesn't glue stick to the inside of the bottle?

26. Why do they call it a TV set when you only have one?

27. Christmas - What other time of the year do you sit in front of a dead tree and eat candy out of your socks?

Saturday, September 24, 2011

How to Use the New File History Feature in Windows 8

Jealous of your Mac OS X friends and their great Time Machine feature? Windows 8 has a new feature called File History that works much the same way, giving you an easy method to restore previous versions of your files.
If you’re a Windows 7 or Vista user, you’ve probably already read about how to use Previous Versions, and this is similar, but works a lot better. By default File History in Windows 8 takes snapshots of all files in your Libraries, Desktop, Contacts, and Favorites every hour (although this can be changed to more frequently or less frequently) and keeps the snapshots forever (this can also be changed).

Setting Up File History

To get started with File History it first needs to be enabled. To enable it, launch the control panel from the new Windows 8 start screen.
When the new Metro style control panel opens, scroll all the way to the bottom and select the More settings option.
This will launch the classic control panel we are all used to in “category“ view. To get to the File History settings, select the System and Security link.
If you look near the bottom of the list you will see an option that says File History, click on the link. This will bring up the settings for the File History feature.
You now will either need to plug in a USB Drive (this can be either a thumb drive or an external hard drive), or you can specify a network location. If you plug in a USB Drive the “turn on” button will immediately become available. However to cover all the methods we are going to opt to choose a network location. To do this, click on the “Change drive” link on the left hand side to bring up the dialog where you can select the “Add network location” button. When the window opens, you can select the PC on which you wish to save your File History.
Once you’re done and you have clicked on the OK button, you will be taken back to the File History settings screen. Simply click the “turn on” button to activate File History.
When you click on the “turn on” button a message will pop up asking you if you wish to recommend the location that you used for File History to other users in your HomeGroup as a place to save their File History. If you have a HomeGroup and want to have a central location where all users in the HomeGroup can store their File History you will probably want to say yes, otherwise it’s OK to choose no.
Once you have selected the option which pertains to your setup, File History will now be set up and working. The one thing you may want to configure is the option that allows you to take snapshots more regularly than every hour and you might also want to configure how long copies are kept for. To do this hit the “Advanced settings” link on the left hand side.
Once you have configured the settings to match your needs you are ready to go.

Restoring A Deleted File Or Folder

In this example I have 1 file in the Documents Library called “My Plans To Take Over The World”, and I am going to accidently delete the document and restore it using File History.
I’ve now deleted the file permanently by doing a Shift-Delete as I don’t think I will be taking over the world anymore. I have also created two new files called “New File 1” and “New File 2”, making the library look like this:
A few minutes later, my partner in crime phones me and tells me that he is free this week, and it looks like a good week to conquer the world. The problem is that I just deleted my plan. Luckily I had set up File History a while back and can recover the document.  So basically what we need to do is restore the file that we deleted but we don’t want to effect any files that we may have edited since then, such as “New File 1” and “New File 2” . To do that we to that we select the File History button on the ribbon.
This will launch the File History browser, and give you all the different versions of the Documents Library.
If I scroll back to Version 8 of 10 using the arrow that’s pointing back (left), you will see that my document called “My Plans To Take Over The World” is there. I can then select it to choose it for restore.
Once we have selected the file that we want to restore, we can click on the Blue Orb (Center Button) to restore the document. File History will launch the folder that you are busy working with and show you that the file is now there.

To Restore A Previous Version Of A File

In this example I only have 1 file in my Documents Library called “My Plans To Take Over The World”. The document looks like this.
I now make changes to the document and save it. So it now looks like this.
A few hours later I realize that I like the the original plan better, so to get the older version back I can click on that specific document and click the File History button.
This will allow us to scroll through Versions of the document while viewing its contents.
If we scroll one version back.  We can see that we can see the old version of the document.
When you click on the Restore Orb, you will be asked what you want to do.
That’s all there is to it.

Friday, September 23, 2011

Samsung Unveils Flexible Android Smartphone

by on Sep.22, 2011, under Internet
Think a flexible smartphone is just science fiction? You might have to think again, thanks to Samsung. The Korean company recently unveiled Galaxy Skin, an Android smartphone that can take on different shapes and take on even hammer blows, set for a 2012 Q2 release.
So aside from its flexible form, what specs can Galaxy Skin boast of? For starters, it will have a flexible 4″ AMOLED display (800×480) made of plastic polyimide substrate. Samsung already confirmed that they have started production of such screens. This form of AMOLED technology consumes less energy but still delivers good screen brightness compared to the normal Samsung AMOLED screens.
Other known specs of Galaxy Skin include 1 GB RAM; 1.2 GHz processor; 8 MP rear camera and VGA front camera with auto focus, self-portrait, stop motion, action shot, and Panorama shots; and 1500 mAh battery. Connectivity-wise, it has Bluetooth 3.0, USB 2.0, and Wi-Fi 802.11 b/g/n features. It will reportedly run on Android Jellybean (the next Google OS version after Ice Cream Sandwich), but there are speculations that Google will make a special version for it, namely Android Flexy.
With the Galaxy Skin, one can have table clock, smart projector, or even a wristwatch. Now we await Apple’s statement regarding this.

How To Shutdown A Computer With A Cell Phone/Email

In this tutorial, I am going to teach you how you can control your computer’s basic function using Microsoft Outlook and your Cell Phone Network. For this tutorial I am demonstrating how a user can shutdown, restart, hibernate their computer, just by sending an email from their phone.
To make this happen, all you need is Microsoft Outlook installed on the PC which you want to control from your cell phone
Now let’s begin with the tutorial.
First, you need the batch files to perform the Shutdown, Hibernate operation.
For example,
shutdown -r -t 10 -c “shutting down”
Copy this code and paste it in notepad, save it as shutdown.bat
Now open up Microsoft Outlook. I am assuming that you have already configured it for your Email and I am not going to teach you about setting mail in Microsoft Outlook. Now we will need to make it so that Outlook checks your inbox about every minute.
You can do this by going to Tools>Options. Then click on Mail Setup tab, and then, the Send/Receive button.
Make sure that the Schedule an automatic send/receive every… box is checked, and set the number of minutes to 1 or anytime you may like. Now you may close all of these dialog boxes.
Now go to Tools>Rules and Alerts. Click on E-mail Rules tab. In new window select Check messages when they arrive and click Next.
Now in next page, check on, on this machine only and with specific words in the subject.
After checking these two values, click on specific words underlined.
Search Text window will open, in the input field type the command that shuts down the PC. You can use any commands. For prevention of accidental execution I kept %shutdown% as a command. Click on Add button after you are done and click on OK.
Now click on Next.
In the next window check mark on start application. In the lower screen, click on application link.
Now you’ll be welcomed to your familiar file open window. Load all files. And select the batch file that you’ve created to shutdown your PC.
If everything went well you’ll see the screen similar to below:
Click on Next, again click on next (don’t choose any things in this step). And finally click on Finish button.
You’ll have %shutdown% alert shown in the E-mail Rules tab.
Now, when you send a message from your phone to your e-mail address with the Subject  %shutdown% your computer will trigger shutdown.bat file and instantly executes the command in that batch file finally leading to shutdown the PC.
You can use any batch file to execute any command.
Hope you loved this tutorial.