Pages

Search

Saturday 19 April 2014

Code to Invite All Friends to FaceBook Page At Same Time

 
WORKING AND VERY EFFICIENT!
Instructions:
1. Click Invite Friends on whatever you are inviting people to
2. In the dropdown next to the search box, click Search All Friends
3. Scroll ALL the way down until names stop loading (I found it easy to click the first name and then hold down the spacebar or Page Down button)


4. For EVENTS Copy this code:
javascript:elms=document.getElementsByName("checkableitems[]");for (i=0;i<elms.length;i++){if (elms[i].type="checkbox")elms[i].click()}

For PAGES Copy this code:
javascript:var inputs = document.getElementsByClassName('uiButton _1sm');
for(var i=0; i<inputs.length;i++) {
inputs[i].click();
}

For Chrome:
5. Press (CTRL+Shift+J) for WINDOWS or (Command+ Option+J) for MAC on your keyboard.
6. Paste the code into the box at the bottom and press enter (next to the blue ">")
7. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

For Firefox:
5. Press (CTRL+Shift+K) for WINDOWS or (Command+Option+K) for MAC on your keyboard
6. Paste the code into the box at the bottom and press enter (next to the blue ">>").
7. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

For Safari:
5. Go to Preferences - Advanced - check "Show Develop menu in menu bar" and close the preferences window.
6. Go to Develop - Show Error Console (or Command + Option + C)
5. Paste the code into the box at the bottom and press enter (next to the blue ">").

For Internet Explorer:
5. Press F12 on your keyboard
6. Click the "Console" tab
7. Paste the code into the box at the bottom and press enter.
8. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

Sunday 13 April 2014

How to Hide | Change Your IP Address


Changing or Hiding the IP address is one of the biggest concerns of all Hackers as the IP Address can reveal the identity if the Hacker. Its just like your online address. If anyone can find your actual online address (IP Address), tracing you back won’t be that difficult.

Thus it is very important to hide or change your IP address before doing any kind of hacking attack or even think of doing so.



We can use the proxy service called Hide my Ass (pro VPN).

http://www.hidemyass.com/vpn/


What’s that? Let me explain in detail.  We all know about proxy servers. They help us to hide your ip address or change ip address but there are many things you guys don’t know.

1) Free proxies are not completely anonymous – Your up can be disclosed by the website owner to the concerned authorities if needed.

2) Companies limit the maximum speed of browsing in free proxies – Say your internet speed is 8 Mbps, still using free proxies you can browse internet with a speed of only 265 kbps. This is irritating, isn’t it.

3) Many Webmasters can block users accessing free proxies.

There are different type of proxies. Read Types of Proxy | How to Hide IP Address for more. Even I wanted a reliable and Elite Proxy which can help me completely hide my Online Identity and what else could be better than changing my IP address every minute. I looked for many solutions online and then I found the PRO VPN of Hide My Ass.

HideMyAss.com

To be very honest, in the beginning I was a bit confused when I saw the software. I was not very sure if it would work the way I wanted to but then I gave it a try. I thought of jiving it a try just for 1 month. It was just for $11.52 then , not it costs $9.99 only. I could actually think of spending $11.52 for my only if it gave me the kind on anonymity I wanted on internet. It helped me secure my online Identity online.


You can also download its trail version for testing it.

Here are benefits I got after using the PRO VPN of Hide My Ass.
  • Super fast, high speed elite / anonymous proxies. Elite proxies are 100 times more secure than free proxies
  • I could select the country whose IP address I wanted in just 1 click. It offers over 38000+ unique IP Address from 53 different countries.
  • I can set the timer to automatically change the IP Address. This way my IP Address gets changed every minute without me bothering to do so. If I am implementing a hacking attack, no-one could actually find my actual IP Address so I am always on the safer side.
  • It anonymously encrypts all the traffic and works with all kind of platforms. Unlike free proxies the PRO VPN of Hide My Ass is not blocked by the websites. The traffic seems to be of legitimate human users, not proxies so on one can catch you using them.

I am giving away some screenshots for you guys so that you can have a look at what

the software looks like.

Here is what the homescreen of the VPN looks like:


We can select the IP Address of the country we want. There are 53+ countries and

38,000+ IP Address to chose from. We also get the provision to set the IP timeout ie we can select the time after which each IP Address should change and we get a new IP Address. It is a simple one click setting. Hiding / Changing your IP Address automatically was never so simple.


Now that you guys have everything infront you you, you can imaging how easy it is to change the IP Address automatically using the Hide My Ass Pro VPN. This surely is the best proxy service out there. I was so overwhelmed by its response that I decided to write a detailed review about its performance.

If you are still in doubt just go and give it a try. It surely is worth it. I am sure you can spend $9.99 for your online security. It can actually have you from $$$$ loss and at the same time secure your online identity by making you anonymous.


There are many other benefits of using this service. This post has already become too long so will not stretch it more, maybe I will soon write another blog post for you guys describing how this Best Proxy Service can help you from getting hacked and increase your online security by continuously changing your IP Address.

Thursday 10 April 2014

What is IP Address | Its Classes



Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this:
216.27.61.137

What is the use of IP Address?

Let me clear this concept with the help of an example, if you want someone to visit your place what do you do? Tell that person your address don’t you. Similarly what will you do if you want to reach someone over a similar or different network over a computer system. You need some mechanism to address difference computers so that they can communicate with each other or information sharing is possible between two computers. To make this information sharing over computers possible, we need IP Address.
An IP address is just like an online address of a computer. It is used to refer to a computer over a network which makes it possible to address that computer uniquely over the network

To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a “dotted decimal number” like the one above. But computers communicate in binary form. Look at the same IP address in binary:

11011000.00011011.00111101.10001001

The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!

Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.

Now you might be thinking – What is my Ip Address.
Finding your IP address is really simple, just visit http://whatismyip.com and it will display your IP address along with the other important information like your geographic location, Internet provider etc.

Classes of IP Address

The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses

Default Network – The IP address of 0.0.0.0 is used for the default network.

Class A –
This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.
Net     Host or Node
115.     24.53.107


Loopback – The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.
 
Class B – Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Net     Host or Node
145.24.     53.107


Class C – Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Net     Host or Node
195.24.53.     107


Class D –
Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net     Host or Node
224.     24.53.107


Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net     Host or Node
240.     24.53.107


Broadcast – Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255

Monday 7 April 2014

6 Ways to Hack a Facebook Account | Secure Your Facebook Account



6 Ways to hack a Facebook account, something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .

1) Phishing :

The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.

Drawbacks :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.

Prevention :
  • Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
  • Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.  Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.

2) Keylogging :

This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.

Drawbacks :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

3) Trojans/backdoors :

This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .

Drawbacks :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

4) Sniffing:

It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.

Drawbacks :
  • If user is logged out then attacker is also logged out and the session is lost.
  • It is difficult to sniff on SSL protected networks.

Prevention :
  • Always use SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

5) Social Engineering :

This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.

Drawbacks :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).

Prevention :
  • Never give your password to anyone.
  • Don’t believe in any sort of emails which asks for your password.

6) Session Hijacking:

In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.

Drawbacks :
  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.
Prevention :
  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

Sunday 6 April 2014

What is a Hardware Keylogger | How Hardware Keylogger works

A Hardware Keylogger is nothing but a programmed chip (Mostly in assembly Language), so as to capture all the keystrokes and save them in its internal memory. The keylogger can then be taken out and all the stored information can easily be assessed by the hacker. Hardware Keylogger are most commonly used in cyber cafe’s and other public places where a lot of people come and access the internet. Beware of such places.

Always check the keyboard connectors before accessing internet at such places. Hardware Keylogger are extremely powerful and effective and if they are actually installed on any machine and you use it, there is 99.9% chance of you getting hacked.

How can it affect you. Imagine you going to a cyber cafe and make a bank transaction just to pay your bills. No sooner you enter your login detail, the hardware keylogger will save the keystrokes. Some advance hardware keyloggers might also take screenshots at regular interval so that the hacker knows the login details are for which website or webpage.

Once the hacker has all this information in the Hardware Keylogger, imaging what all can he do when he access that information.

And this is just a small example. There is much more damage one can do with a hardware keylogger.

Prevention: To secure yourself from such attack, there is only one way. Check the hardware of the computer you use at public places and even your personal computer if your friends come to your place often. Who knows who might attach the hardware keylogger in your machine.

How to Hack WhatsApp Account





About Whatsapp

Whatsapp Messenger is a cross platform quick messaging application. Whatsapp is assured really the foremost fashionable quick electronic messaging for smartphones. Whatsapp Messenger is accessible for iPhone, Android, Windows Phone, Blackberry and
Nokia and yes, those phones can all message each other. And you all have heard of it if you are not using it. Given below are the several WhatsApp hacks or tricks you should know if you are using WhatsApp.

WhatsApp hack to spy on some other account

So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.

How to Hack Whatsapp Account

All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or  mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • Whatsapp hack to use it by not using your number
  • This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.

Now that you know How to Hack Whatsapp account, you are good to protect yours.