Tuesday, 22 April 2014

How to make symbols with keyboard

How to make symbols with keyboard

Try this shortcut keys in the comment or for sending msg anywhere.
Alt + 0153 ..... ™...  trademark symbol
Alt + 0169 .... ©....  copyright symbol
Alt + 0174 ..... ®.... registered trademark symbol
Alt + 0176 ...°...... degree symbol
Alt + 0177 ...±.... plus-or-minus sign
Alt + 0182 ...¶..... paragraph mark
Alt + 0190 ...¾.... fraction, three- fourths
Alt + 0215 ....×..... multiplication sign
Alt + 0162 ...¢....  cent sign
Alt + 0161 .....¡..... .upside down exclamation
Alt + 0191 .....¿..... upside down question mark
Alt + 1...... ☺.....smiley face
Alt + 2 ......☻..... black smiley face
Alt + 15.....☼..... sun
Alt + 12......♀..... female sign
Alt + 11.....♂...... male sign
Alt + 6.......♠..... spade
Alt + 5.......♣......  Club
Alt + 3........♥.....  Heart
Alt + 4.......♦......  Diamond
Alt + 13......♪..... eighth note
Alt + 14......♫...... beamed eighth note
Alt + 8721.... ∑....  N-ary summation (auto sum)
Alt + 251.....√..... square root check mark
Alt + 8236.....∞.....  infinity
Alt + 24.......↑.....  up arrow
Alt + 25......↓......  down arrow
Alt + 26.....→..... right arrow
Alt + 27......←..... left arrow
Alt + 18.....↕...... up/down arrow
Alt + 29......↔...  left right arrow

Friday, 11 April 2014

Download torrent via internet explorer or mozilla

1. First download your .torrent file.
2. Then go to zbigz.com and click upload torrent.
3. After uploading your torrent you will get your content in .zip file.
4. Download the .zip file and extract it.
5. That it simple!

Thursday, 10 April 2014

Make Your Computer Welcome You

Make your Computer Welcome You

We generally see in movies that the PC of the Actor/Actress welcomes him by calling his/her name.
We also want that our PC should also welcomes us like them.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."


Make Windows Greet you with a Custom Voice Message at Startup
To use this trick, follow the instructions given below:-
1.      Click on Start. Navigate to All Programs, Accessories and Notepad.
2.      Copy and paste the exact code given below
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
3.    Replace Username with your own name.
4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file     as Welcome.vbs or "*.vbs".
 5.  Copy the saved file.
 6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in  Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
7.  Paste the file.
8. That’s it.
Note: For best results, it is recommended to change sound scheme to No Sounds.

Wednesday, 2 April 2014

Top methods for hacking fb accounts

Now a days every one is searching on net how to hack a Facebook account..Everyoneis trying to get the methods of hacking Facebook....I have got some e mails regarding this topic . So I have decided to give a series of post on this topic....Today's post is an introductory post on this topic . I’m now discovering all the methods used to hack Facebook password and some counter measures can also help you protect your Facebook account from hacking.1. PhishingPhishing is still the most popular attack vector used for hacking Facebook accounts.There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and"Password" is stored in to a text file, and thehacker then downloads the text file and gets his hands on the victims credentials.2. Key loggingKey logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.3. Stealer'sAlmost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.4. Session HijackingSession Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used toauthenticate the user on a website, and use it to access the victims account. Sessionhijacking is widely used on LAN, and WiFi connections.5. Side jacking With Fire sheepSide jacking attack went common in late 2010, however it's still popular now a days.Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.6. Mobile Phone HackingMillions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probablygain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.7. DNS SpoofingIf both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.8. USB HackingIf an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.9. Man In the Middle AttacksIf the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.10. Bot netsBot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same asthe key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include Spy eye and Zeus.