Friday, 13 September 2013

Hi Friends ...!


I have an good News for all PTC here is the new and best pay per click site you never seen


here is the details




they provide 70+ ads for premium members this will be a king of ptc ever i seen


sign up today and earn more money from your home as much you can....!



Friday, 2 August 2013

Hi ! Friends


Today i have a good news for all PTC users. why you all still using Neo Bux and clicking Ads for 0.001$
Here is a PTC site they give 0.1$ for a ad and daily 43 ads you can make 4.3 ads daily

and also thery provide paypal,Payza,Egopay,Okpay,Solidtrustpay,Perfect Money


Signup Today and Earn More Money .....!

Happy Earning Folks.......!



Friday, 10 May 2013

Hi Friends !
You are so lucky to hear this
why you all waiting for 0.001$ per click

just turn your life you can get 5$ /click
it's really awesome dudes
happy Earning @@@!

signup link :   http://adf.ly/O9lkM



Monday, 29 April 2013

Hi Friends!
Have a Happy Day!
I Found  Another website where we can get money by just click ads they provide ads every day
we can upgrade our account and earn more money!

step 1:
just sign up and earn money
http://adf.ly/O2JVa



Sunday, 28 April 2013

Alternative google Adsens Programe

hi friends
i found a alternative program for Google Adsense
it is clicksor register your blog and post your ads in this blog then you can earn money
here is the signup link

http://adf.ly/NxDIQ

happy earning!

Easily Earning Money by psring the links

hi dudes i have another methods earn money from facebook and twitter just copy and past the links in your wall
using adf.fy
step1: copy the url and paste shrink and paste where you want if u get more clicks you will get more money
stpe 2: this is the link for the adf.ly account

http://adf.ly/NxDwk
happy earning folks!

Saturday, 27 April 2013

STEPS TO INCREASE GOOGLE ADSENSE CLICK-THROUGH RATE





The purpose of this article to is to help you increase your revenue from CTR using Google AdSense. Following the steps outlines will help you optimize your websites to give you the best possible moneymaking strategies.

Step 1 - Apply and Comply Having a website can generate revenue for you twenty four hours a day, seven days a week. Google AdSense is a free program that has an advertising revenue especially designed to help websites like yours to increase their revenue simply by displaying AdWords ads.

Each page on your website must be content rich on various topics. These pages should all be centered around a theme which Google will use to target relevant ads to your website. Once you have applied Google will set up an account for you and provide you with the code you need for displaying ads. Insert the code into the pages on your websites and you can start displaying ads immediately. Google search and page-ranking technology will search for ads that are relevant to your content pages. This technology matches the primary language of your pages and ads are targeted to your specific geographic location. This means that ads that serve users from Canada, for example, will not be the same ads that appear on your website for users in Australia. This 'geotargeting? by Google akes the ads relevant to all the visitors to your website and it also means that you may not see all of the ads that are targeted to your website. You do not have to be technologically literate to display AdSense ads on your web pages. Google does it all for you. All you have to do is insert the code and maintain the website. At first, you may see public service ads appearing and you do not get paid for these.

Step 2 - Create More Content Pages For Your Website Content pages are the pages in your web site that Google will use to target ads to your website. These pages should be content-rich. In other words, you should have lots of content that the user will be interested in. Each page of your website should be centered around one keyword that is related to the whole theme of your website. A keyword is the focal point of the article. When you decide on a theme, brainstorm list of suitable keywords for which you can write articles. For example, keywords for a website dealing with lawn care could include the following keywords: Seeding your lawn Hedges Mowing the lawn Preventing insect infestation Flowers Flowering shrubs

Then you proceed to write articles for each keyword which can be anywhere from 150 to 500 words. Each keyword article will have its own page where you can display ads. The more content pages you have, the more ads you can display and this, of course, leads to more revenue for you. Keyword articles can be of several kinds - keyword rich and informative. Keyword rich articles contain the keyword in virtually every sentence. The rate is typically 4 - 8 % of the total word count. Informative keyword articles have a more conversational style and are easier to read. If the content pages are clearly focused, Google will be able to serve highly relevant ads to your pages. This means your visitors will be interested in the ads, resulting in more click-thrus and more money for you.

Step 3 - Use higher paying keywords whenever possible You will earn more if the average AdWord that Google displays pays more per click. You should not create pages on unrelated keywords just because they pay more. Some of the high paying keywords that users query on search engines are: Vacations Education Investing Money Medicine However, don't create a page on vacations on a lawn care page, just because the ads pay more. It takes away from the legitimacy of your website. If you are an AdWords advertiser, you can log into your account and Experiment. As you will be sharing the revenue with Google, you will receive a percentage of the amount each advertiser pays per click. For example you may find that if you type in 'ladders?, the maximum price per click is 15 cents. A percentage of this will not get generate a very high revenue. However, if you type in 'valium?, you may find that the price per click is $5.00. The bottom line is the keywords you use can increase the amount of money you earn.

Step 4 - Create new pages with higher paying keywords and at the same time maintain relevance to the theme of your website. Selecting keywords related to the same topic, can make a difference in how much money you earn by users clicking on relevant ads on your pages. Check the theme of your website for higher paying keywords and create articles related to these words. The terminology you use can determine how effective your website will be in attracting visitors. For example if you are selling teeth bleaching products a query for toothpaste may or may not select your website in the search. If you are selling products on your website, ensure that you have keyword articles related to the competition as well as your own products. This does not mean that you will advertise for the competition. The article can be a comparison of your product with another demonstrating why the user should purchase your product.

Step 5 - Create a brand new website with higher paying keywords You can create a brand new website to take advantage of Google's AdSense program. Therefore, you will need to select a topic with high paying keywords. Then provide great information about that topic. Now that you have the content pages and keywords you want, you need to place the ads where they can be seen, and clicked, by the visitors to your website. Most Internet users are so bombarded byads that they automatically tune out the ads that appear on a website. Your goal is to make your ads more appealing to the users and less like ads. Any time that users click on an ad, they have an actual interest in what that ad is selling. To maximize the number of click-thru ads on your site receive, you have to make them less like traditional advertising.

Step 6 - Create different kinds of web pages Different pages on your website serve different purposes. If the object of your website is to sell a particular product or service, create web pages specifically for that purpose. Then have other pages on your website that are geared towards high search engine traffic. Once you realize which pages you are creating for AdSense, select appropriate keywords. Try to select keywords that are the highest paying keywords on the topic.

Step 7 - Create high quality information pages Give the visitors to your website the answers they need. The keyword articles should give information about the topic and not ramble on with a disjointed list of sentences. When writing keyword articles, do not copy and paste from other websites. This is illegal. It's much better to write something new and unique. The writing in the articles should be of a conversational tone using language that the ordinary person will understand. For example, it would be of no point to write this ebook in completely technical language that only a computer programmer would understand. You would not be able to understand it and therefore not apply the techniques. The same is true of keyword articles. If the user does not like the first few sentences, he/she will not continue reading and will move on. Do not create a page about a topic and save it with another to try to generate high paying ads to your page. If your page is relevant to the topic, visitors will click-thru to other pages and ads.

Step 8 - Use the Best Ad Format For Your Web Page Research has shown the best format for ads to maximize click-thrus are 336 x 280 rectangles. The next best size is 300 x 250. Banner are the worst ads to show on a site and the tall thin ads don't fit well on a page because they are usually on the left or the right. The best placement of ads on a page is in the center - right in the users line of vision. You have to put the ads in their face to maximize the effect of click-thrus by users. The best size ad to use is the 336 x 280 rectangle or if space ia at a premium use the 300 x 250 rectangle.

Step 9 - Make Sure That the Ad Block is Positioned Properly Where you have the ad located on your web page affects how often users will click on it. Ads should be as close to the top and the middle as possible. Internet users look to the center of the page to find information. If your ad is placed down the sides, it will often be overlooked. People who use your web page because of a keyword search are generally looking for specific information. Having the ad placed front and center will get their attention, whereas ads on the side will not. Place the large rectangle ads just above the content, not in the right or left hand columns.

Step 10 - Choose the Best Colors for Your Ads Google AdSense offers advice for publishers as to the color of the ads on their web pages. They allow you to customize your ad colors. The recommendation from Google for using custom palettes is to:

? Have the background of the ads the same color or a color similar to the background color of the page.
? Have the border of the ad a color that is predominant on the page.
? Have the title of the ad a color that is similar to the color of the text on the page.
? Have the URL of the ad a color similar to other links on the page. Statistics show that navy blue color works best as a link. The color of the URL should not stand out on the page. The top ranking color for URL's is dark gray. It does not mask the advertiser URL even though light grays do the same thing. Avoid unconventional colors for URLs. Blue is actually considered a non-stimulating color, and some publishers say it can actually have a negative effect on purchasing or deciding to click-thru. Blue is considered by many to be sleep inducing, and is the worst choice if you are interested in a call to action. Sometimes if the effect you want is calming, blue can be integrated effectively. When starting out with placing ads on your web pages, the best advice is to experiment until you find a combination that works for you. Research and statistics have shown the default layout provided by Google AdSense is not the best option.

Step 11 - Don't try to cheat your way to a higher revenue Many publishers have tried to increase their revenue from Google AdSense by clicking on ads on their own website or using software which automatically repeats clicks. Such attempts to gain more money from the ads displayed on your web pages is fraudulent and will result in the automatic cancellation of your account. Google has engineers who can detect this type of fraud. By trying to spam your way to extra money won't work out. You will get kicked out of the program and you won't make any money at all. Prohibited methods of clicking include:

? Repeated manual clicks
? Use of robots
? Automated clicking tools
? Deceptive software
? Clicking on your own ads Legitimate clicks are those that are generated as the result of a user to your site clicking on one or more ads on various pages

Saturday, 30 March 2013

FaceBook Malware And Countermeasures in a Nutshell



FaceBook Malware And Countermeasures in a Nutshell

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Social media’s history precedes the 21th century and ever since then malevolent people have attempted to infiltrate the computers of innocent people using these media in hope of 
  1. Obtaining sensitive information such as bank details and personal information, 
  2. Using the machine as a bridge in major cyber-attacks
  3. Impersonating you and using your account for their own ends,
  4. Installing some form of adware on your computer and bombarding your machine with endless pop-up ads, spreading spam through your computer for material gains, deceiving you to fill out a survey or by any other means try to acquire financial resources and transmitting the virus to more people via your machine with the hope of multiplying their material gains,
  5. Retaliating, gaining fame or proving that they can infiltrate someone’s machine or/and spreading the virus to a lot of people for the same reasons.
Generally, every virus is  malicious as this is its raison d’être. To effectively combat viruses in  Facebook, one must be aware not only of the necessary steps that ought to be taken in order to protect himself, but one also needs to know the various ways in which they can be transmitted to his machine as this will greatly reduce the risks of getting a virus by showing when and where to expect them. In addition, one must also acquaint himself with the means of combating an existing malicious code on his machine imported by a social media such as Facebook.
 
 Below, I discuss several notorious Facebook viruses and talk about their purpose, their way of dispersal, ways of avoiding them and last but not least, getting rid of them.
 
 
 
 
 
There are 9 popular ways of attacking your Facebook profile. They are:

1. Clickjacking, where hidden actions are executed when you click on a button or link in plain sight.

2. Drive-by downloading, where a malware is immediately installed on your device when you visit a website. Drive-by downloading usually occurs without any permission request or notice that you are downloading the malware.

3. Password compromise is when the criminals create false log-in pages to mislead you into giving your login details in Facebook applications or by other means request these details via Facebook’s apps.

4. Direct messages can be malicious when one or more of your friends’ accounts are compromised (infected) and they unwittingly send you messages which often lead your machine contracting the malware as well.

5. Malicious content is another way in which criminals spread their malware. After your friend is infected, he will most likely send Wall Posts (and other means of spreading the word) with malicious content.

6. Shortened links are a way for criminals to disguise the malign content the real URL contains.



 
6. Shortened links are a way for criminals to disguise the malign content the real URL contains.

7. Harmful apps can be installed on your device after you click on a malign link. This usually happens when after you click the link and you are requested to update a popular program like Adobe Flash Player (if the malicious app is disguised in a video). These apps may also request for sensitive information or login details.

8. Fake profiles are a widespread practice and that is why you should not add people in Facebook that you do not know. Usually, these profiles include pictures of a very beautiful woman or man. This is in order to make the profile appealing and to trick you into adding the criminal as a friend. Once you do, they will not only spy on your personal information and photos, but also send you malicious content and messages.

9. E-mails are a popular method for phishing and spreading malware. The criminal would send you an e-mail that looks and feels just like a message from Facebook and will claim that you have a new friend request or some notification; when you click on the link to add the friend or check the notification, you will have installed a malware
 
 
 

 WORM_STEKCT.EVL

 

 

Stekct.Evl is a relatively new  Facebook virus, transmitted via  the Facebook pop-up chat window. It can infect your machine if someone from  your friend list who is infected unwittingly sends you a harmless-looking  link to a website and  you open it. If you open such a link from a  Facebook chat message, the worm will automatically  download a replica of itself. It affects only 1 OS;  namely, Windows.

The bad part is that if you are using an older version of this OS (Windows 2000, Windows XP, Windows 9x etc.) and an out-of-date AV product without full real-time protection and sandbox when you get infected, your  anti-virus software might not be able to deal with it. Stekct.Evl not only  attempts to overrule such protective  software but also tries to delete it  from your machine. This may make post-infection treatment difficult for some users and the best way for them to deal with this malware is to not get infected at all.

Prevention.
One effective way of avoiding the worm is to ensure that it was a friend of yours who actually send the message. You just have to be patient before opening the link and ask your friend about it, whether they sent it or what it contains. If he wants you to see this link, then he will surely answer.

However, if he does not answer it is very likely a message send by the malware and you should disregard it. Normally, if it is the worm, they will either not respond to your message (as it was not they who sent the original message and they might not be looking at their Facebook at the moment) or they will tell you that they did not send you any link. In both cases, you are safe from the malware and you will not enable it to spread to your friends as well.

After you have ensured that this is a malware, you can notify your friend that they are infected so they can take measures to remove it. Another means to be protected is to have a decent AV product with full real-time protection and sandbox.

 

 

Prevention – Continued
The URL in the Facebook message leads to an archive file named
May09-Picture18.JPG_www.facebook.com.zip”

It is indeed an executable file and actually not that cunningly masked. Thus, be sure to trace the path of the link and see if there is a “May09…” should you be in doubt whether a link by your friend leads to this particular malware.

The only problem is that the actual link is not in plain sight due to a URL shortening technique (there are more than 300 URL shortening providers now). Thus, in order to be safe you first have to preview the link, to see where it leads to and what sort of thing is there. Every famous URL shortening service provider gives you the option to preview a shortened link before opening it.

For instance, to get a preview of the link when it is shortened by bit.ly and goo.gl just copy the shortened link to your browser and add a plus sign at the end of the URL. Click here to see a more comprehensive list of ways to preview a shortened URL on the various websites that offer shortening services. Another way of viewing what is the real URL behind the shortened one is to use a URL decoder like http://trueurl.net/. If you cannot get a preview of the link then follow the other step mentioned above to avoid infection.
 
 
 
Purpose
The purpose of the worm is to collect sensitive information (possibly for identity theft or infiltrating your bank account) and as it uses your Facebook account to send messages to your friends. This is so as the worm Stekct.Evl aside from deleting your anti-virus software installs another worm called “WORM_EBOOM.AC” which monitors your browsing activity in various social media such as Facebook, Twitter, MySpace and WordPress. It examines not only your private messages but also posted messages which were deleted and message posting.

Post-infection treatment
Treatment includes running your computer in safe mode and deleting several registry values and files via the Registry Editor, then restarting your device in normal mode and running your anti-virus software to perform a scan for files named “WORM_STEKCT.EVL”. Click here to see exactly what ought to be deleted in the Trend Micro Threat Encyclopedia; the procedure is described in section “Solution”.

If you are using a newer version of Windows and a decent AV product with full real-time protection and sandbox you might be able to deal with it easily as the sandbox will run the risky file virtually and the AV will find the virus immediately after downloading. However, if you do not have such AV product you might not be able to install it after the infection as the worm strives to keep AV products away from your computer.
 
 
The Koobface Virus (WORM_KOOBFACE.AZ)

Koobface is a not so recent malware which transmits through Facebook and other social media. Basically, you get a message from a friend in Facebook (not through the pop-up chat window) providing you with a sentence like “This is the video with you on the street” and a link to watch it.

If opened, the link seems like you are entering YouTube (classic phishing) or another trustworthy website and it also seems that a legitimate video is hosted because the name of your Facebook friend is stated in the website (the website could be YouTube or it could be different) to have hosted the video and there is a photo extracted from his Facebook further indicating this.

The thing is that “before” playing the video you are required to install something (such as a newer version of Adobe Flash Player) and if you click “Install” (thus, downloading setup.exe) the worm is saved on your device. The worm then browses through your cookies, connects to your social media sites via the login information saved in these cookies and attempts to infect your friends by sending them the same message.

Purpose
The purposes of this worm, from the objectives mentioned in the introduction are 4, 1, and 3.Namely, the worm will alter your Google search results to consist of sites it wants to advertise and, thus, you will be bombarded with search results, which are ads and generate money for the wicked guys .Also, if you own and develop websites, the Koobface worm may steal your passwords and misuse them  Moreover, the malware may open on your machine pop-ups asking you to install “security software” which serves their own ends; the malware may also use your social media accounts to send messages to your friends 
 
 
 
Prevention
Prevention methods are many. Firstly, you should only install software from respected and trustworthy websites (like the Adobe Flash Player update in the above mentioned example). Secondly, you should always confirm that the link points to the trustworthy website it claims to point to. Thus, to effectively guard yourself against the worm and the phishing attempt, you should always check if the spelling of the website is correct, there might be a missing letter or an extra one.

You should turn on any firewall you might have and have reliable AV software installed which is actively protecting you. Another way to avoid the Koobface is explained earlier concerning Stekct.Evl, but it somewhat applies to this particular worm as well.Last but not least,make sure that your browser gets frequently updated and that you use a browser that has an anti-phishing blacklist.

Post-infection treatment.
It is not difficult to get rid of Koobface. Firstly, you should remove your cookies and change your password. This will disable the worm from using your Facebook account. Secondly, you should enable login approvals. This will make logging in from a new device to require a security code sent to your mobile phone.

Thus, even if you get the Koobface, your Facebook will be unharmed. To effectively remove the worm and eliminate the other consequences stemming from the presence of Koobface on your device just run a full-system scan using up-to-date AV software.It is that simple.
 
 
Malicious applications on Facebook

Malicious applications on Facebook have appeared and disappeared just as quickly, but not without leaving a trail of destruction. The thing is that Facebook promptly notices these malicious apps and removes them from its directory but many people get infected before, as Facebook has 1 billion users and each second that such a malware is in the apps database, a lot of people get affected.

 “WARNING FROM FACEBOOK TEAM” (defunct)– analysis of similar malicious apps in the context of the former one.

Background
This malicious malware was removed from the Facebook’s apps database, but it was active last year. This does not mean that similar malicious apps do not circulate Facebook’s directory as we speak. If you are security savvy, you will immediately notice that such a warning cannot be from the Facebook team as it is dispersed through your friend list.

Once you got curious and opened the request notification that one of your friends sent you, the app would have taken you to its index where you would be further informed that you have to verify your Facebook account, otherwise it would be terminated. This warning may have caused a sense of urgency to act for many,making them agree to whatever the app requested from them.
 
 
Thus, they would not only give it their basic information, access to their profile information and photos, but also enable it to post on their behalf (status updates, photos, etc…). In this way, the application would have had control over an ever-expanding number of people. Similar malicious apps exist and have the same goals which are merely wrapped in a different message.

Purpose 
The purpose of this (now defunct) and similar malicious apps which circulate the Facebook’s directory is and  from the Introduction. Namely, to impersonate you and use your Facebook account to expand their scope of victims and to lead every victim to a page which claims that you need to complete a survey in order to continue – the so called survey scams which, if filled out, would provide material gains or other similar apps may intend to obtain sensitive information to the hackers.

Treatment 
Treatment methods vary: You can search in Google or other search engines for an app that you suspect of being malicious and check if there are reports claiming that it is malicious or scam, if it is – then definitely someone wrote about it. You can also ask the friend who sent the message whether the app worked for him or if it proved malicious. Most importantly, trust only the apps of reliable developers/creators. This will help you avoid giving permissions to rogue apps. It is also useful to be able to deduce from the apps messages, context and presented ideas the degree of its reliability and credibility.

Post-infection treatment
Assuming that you have installed a similar app, you should be certain that it is dispersing spam to your Wall, Timeline and friends, so you should delete all traces of its messages, including references to it in the newsfeed or/and profile. Next, you need to terminate its control over your Facebook. This is done by clicking the down triangle in your Facebook, Account Settings and then clicking on Applications.
 
 
 After you have entered, just pick the one(s) that are malicious, remove and block them from the list of apps which you have authorized to interact with your Facebook. Also, do not forget to signal Facebook for this misconduct by entering the app window and clicking the “Report/Contact This App” link.

Further context 
An instance of a similar malicious app is Profile Viewer which had the same purpose as the false Facebook team warning. Specifically, it claims that it does or shows something which it does not do or show (that you can see who viewed your profile and when) so you can give the app permissions, which it will use to your detriment. In addition, it is also a survey scam as it requires that you fill out a survey before “continuing”.

Bear in mind that all apps which claim to track your profile views are fake, as developers are not allowed access to the information necessary to create “Profile Viewer” applications. This means that one should be very cautious when an app is claiming to add new features to the Facebook platform, such as a profile viewer or dislike button, as such apps are most likely fake and contain malware.

Also, be aware that as Facebook has around 1 billion users more and more people will try to achieve their own ends by tricking people, so one should be cautious and attentive to detail in order to differentiate between fake and real apps. The malicious app’s demand will definitely come from some popular notion, idea, person or event. This is proved by the fact that numerous survey scams were “successful” by claiming that they show the demise of Osama Bin Laden, Whitney Houston or Lady Gaga.

Finally, you should not give your Facebook account and password to third-party websites, you should not click on a notification (for instance, that somebody tagged you in a picture) that seems illegitimate, instead you should open it yourself from your profile (if the notification is real) and, lastly, to avoid scam mails which pretend to be coming from Facebook team itself, bear in mind that the Facebook team will never ask for your password via email and that legitimate mails from Facebook usually begin with “update” rather than “notification”.
 
 
 
 
Conclusion

It can be concluded that malware has penetrated the Facebook community, to some extent. There are several reasons (I have enumerated 6 in the Introduction) why malware is created. These malware take various forms, whether of applications or executable files which you will not even notice installing and have negative effects on your device. To effectively combat Facebook malware one must:

  • Regularly change your password and not use cookies
  • Remove any apps that seem shady and that have not performed what they claimed they perform
  • Be aware that messages in your inbox, chat messages, posts on Walls and Timelines, and notifications (such as a “notification” that claims that somebody tagged him in a picture) may contain malware if the friend sharing them is infected and one should ask your friend whether it was he who sent the message
  • Enable login approvals
  • Use up-to-date anti-virus software, preferably, with full real-time protection and up-to-date version of his OS
  • Enable a firewall and use up-to-date browser that has an anti-phishing blacklist
  • Check the path of shortened URLs by previewing them or using a URL decoder
  • Not give your Facebook account and password to third-party websites
  • Delete spam, viral or malicious messages that can be found in your Facebook profile and report any malware found
  • Only use the services of trustworthy developers
  • If a dubious link points you to a well-known website, always check the website’s spelling to avoid phishing
  • Note that legit mails from Facebook usually consist of “update” notices instead of “notification” and that Facebook will never ask for his password via mail
  • Don’t click on a notification if it appears illegitimate, but see what it is about from your profile (if the notification is real)
  • Deduce from the app’s messages, context and presented ideas the degree of its reliability and credibility
  • Only add friends that you know are real – don’t add unknown people as friends to your Facebook account.
  • Don’t trust apps which claim to add a new feature to the Facebook platform, such as profile viewer and dislike button
  • Avoid links which lead to surveys that need to fill out before you”continue,” as they are most likely scams
  • Be aware that popular ideas, notions, people and events are often a basis for scams
  • Periodically read materials on the latest threats in Facebook to understand how to handle them.

 

 

How To Use Mspy To Monitor Cellphones Remotely

How To Use Mspy To Monitor Cellphones Remotely - Complete Guide

 


 



Mspy is currently the best and cheap Cellphone spyware in the market, Unfortunately there is no proper step by step guide on how to use Mspy. So today i will be writing a step by step Guide (in Faq Format ) On How to Use Mspy to monitor Cellphones Remotely

 

 

 Cellphone Spyware or keylogger is piece of software, which once installed on a cellphone will record all the phones activity such as calls ,sms ,mms , emails and other such credential data and will send them to the attacker (hacker)

 Mspy is currently the best Cellphone Spyware both in features and in cost , Following are some of the best Features in Mspy


  • SPY on Calls
  • SPY on Sms
  • SPY on Emails
  • Track Gps
  • Remote Control
  • Easy To Install
  • Completely  Undetectable 
  • View All Logs Online
  • Compatible with All SmartPhones (Ios, Android, Blackberry, Symbian , Windows )
and more ...









 Some of the popular uses of Mspy are

  • Monitor your chilidern , Employees
  • Spy on Your Spouse
  • Locate Cellphones via GPS 
and more ...


 You can get a Copy of  Mspy from the following link

                                                            Download Mspy

You can choose the number of months as you wish but best would be to select 3 months


 You can Monitor Multiple Cell Phones by selecting The Business plan from the following link


                                                    Download Mspy Business 





Once you purchase Mspy, You will recive an e-mail containing a password to your mSpy Control Panel

Step 1. Log into your Control Panel and follow installation instructions given by the wizard.

After logging in, you will see the Wizard asking you to select the OS of the target mobile device and install the surveillance software. The installation takes just a couple of minutes.

Step 2. You'll be shown the combination code by the Wizard.

After installing mSpy, dial the combination code you get from the wizard on the target phone.

Step 3. View the data captured by the software online.










If all the settings are configured, you'll be able to view the first logs in a couple of minutes. Congratulations! Now all activities on the target phone are monitored and can be viewed any time in your private mSpy account.
Once installed Its impossible for the owner of the target phone to detect the mSpy software .Currently  Mspy is not detected by Any Antivirus Software's








 

Adding background images to windows drives

Adding background images to windows drives

 

Isn't it cool to have great wallpaper for your desktop but it might be more fun to have amazing background images for your drives. Drives Background Image is a Windows freeware application that allows you to set a wallpaper for each disk drive on your computer. This program is very easy to use you only need to select wallpaper for your background, it also provide option to change icons of your drives, changing text color and it provide instant preview of your selected settings. But  keep in mind that Windows 7 users need administrator privileges while running this program, as the application attempts to modify the configuration of the local hard drives. Its pretty nice program for window customization and every one  should try this tool. Follow below steps to download and learn to use this program.
 
 
 

   Features of the program:

  • Autodetect Available Drives
  • Set Background To Multiple Drives
  • Remove Background From Multiple Drives
  • Set Icons To Multiple Drives
  • Remove Icon From Multiple Drives
  • Auto Recover Default Icons
  •  Events Log
  • Drive Preview
  • Icon Preview
  • Easy Clean GUI

 Download Here

Learn To Hide Files Behind The Images

Learn To Hide Files Behind The Images

 

There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
 
 
 

 

How To Hide File Behind Image ?

 

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.

 

 

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
 
 
 

 


 
 5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 
 


 
 
  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replace filename with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
 
 
 
 
 

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.

 

Posting Facebook Status Upside Down

Posting Facebook Status Upside Down

 

 

 In this tutorial i will share with you simple facebook status trick. If you want to post something creative or something cool as your facebook status then this trick will let you post any facebook status upside down. Basically this is a website which allows you to flip your text. so lets dive into it.

 

 

How To Do ?

  1. First GoTo FlipText Website by Clicking Here.
  2. Enter you message or text in text area and click on Flip.
  3. Copy the upside down text and paste it in your facebook status or where ever you want to use it.
  4. Enjoy!

 

 


Making Nameless Folder In Windows

 

In this small tutorial i will show you a smilpe windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows  operating system.







 

How To Make Nameless Folder

 

 Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.

 

 

 

  1. Make a Newfolder on desktop or where ever you want.
  2. Right click on this newly created folder and select Rename.
  3. Erase the text showing "New Folder".
  4. Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
  5. After that leave alt key and Press enter.
  6. Done you just created nameless folder.


Wednesday, 27 March 2013

FaceBook Security Question Hacking







Facebook ID Can Be Hack by Stealing Security Question - Answer

 

  

 

  Hello !! HW readers after a long time, I posted trick on Hacking and Stealing. Today's post is about Facebook "Security Question" - Answer Stealing, I mean, This post gonna show you how to steal victims Security Question - Answer and hack victims Facebook ID.  Basically here I'll use SET and Phishing attack fully 100% FUD (Fully Un-Detectable), we gonna use this two tricks to steal Facebook Security Question- Answer.

 

 Requirements :

 
 

 Find out Victim FB Profile Link.

 

  • Open your FB Home page Click Here

    • Search your victim name in search Box and copy Link

    • Copy this Address link from Profile

 

 

 

   

 Find out Victim's Security Question.
  • Log out your Session or any other FB ID running.
  • Go to FB Account Recovery Page, Click Here.
  • Paste Victim's profile link and click on search
 

 

Here, we got victim's ID, now click on This is my Account

 

 

 

  • After you will be redirected to victim A/c Recovery page
  • Click on "No longer have access to these


  •  


    • Now, here use your Fake G-mail or Yahoo ID and Click on Continue.

     

     

    ✔ How to Steal FB Security Answer.

     

    Make your Victim fool or delude him using SET tricks and Mind, Look at below Image >>>

     


     

    Stealing Process and Get FB Sec Ans.

    • When your Victim will go on your Phished Page he will see something looks like this. 
     
     

     
     

    And when your Victim will Enter his or her Security Question - Answer and clicks on Continue, The Answer Provided by him will be stored in log.txt file on your Phishing server. Download it and Open it.