How To Send Friend Requests When You Blocked









1. Get the email address first. not difficult.
2. Visit Personal Contacts as a Friends


3.you can send friend request even if your are blocked by using their email address.
4. If you want to send friend request to lot’s of friends here is an quick and easy way to do this.
5. Open up a new notepad file, paste all your friends email separated by comma (,)
6. Save the notepad file with the extension .vcf
7. This is your list of your contact files containing your friends email address.


8. Visit the Facebook page to add your vcf file
8. Go to Add Personal Contacts as Friends click on the last option other tools there you can find upload contact file.
9. Browse your .vcf file and upload to the Facebook link given above.
10. It will send request to your friends by email automatically.

May2014

0 comments:

How to Hack Facebook Account

First Trick


Some Common passwords that you can try on your friends are :



1. Their mobile number or their girlfriend or boyfriend mobile number. (always try his previous or old mobile number as they are not as much as fool that they appears)


2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.


3. Date of births


4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus , Favorite Mobile Name and much more..


5. Most important now most website ask that password should be alphanumeric now what users do they just 
adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.



Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.


2nd Trick Forgot pass | Hack Facebook

1) About username for hack facebook account person

2) Copy username
    Ex. www.facebook.com/hacker.chaklasiya
    Copy --> hacker.chaklasiya

3) Open Facebook And click on " Forgot your password? "



4) Past In Box To Copy Username Then Click On search




5) Then Click on this link " No Longer have Access To These " Then Click onContinue




6) create a new email account and new mobile number (Note : Do not use number on facebook and email ) Than put mobile number or email then click on continue





7)  See Image and follow steps and hit continue





7.2) Trusted Contact




8) Choose Your Common Friend



9) Click On Continue

10) Bingo!! you create  your  new pass and hack your friend account

Note : hack and forgot pass in 24 hour So tack care and see don't open your friend account in 24 hours if your friend open his account so enjoy

0 comments:

How to Recover Deleted Facebook Messages


Step 1 : Access Facebook Account



Step 2 : Click Setting On The Upper Right Corner of the Page, Click The Setting Icon



Step 3 Click Setting 



Step 4 : Add And Chose Your Primary Mail




Step 5 : Click "Download copy" of your Facebook data





Step 6 : Click on Start My Archive



Step 7 : Check your Primary Mail To got The Mail By FaceBook

Subject is YOUR DOWNLOAD YOUR DATA IS READY



Step 8 : Open This Mail And Click Link of given Last in Mail Data




Step 9 :  Click Download Archive



Step 10 : Your Data Is Download Now





Step 11 :  Wait For Complete Download



    Step 12 :

    •  Open Downloaded Archive
    • When you're ready to download your Facebook archive, repeat steps 1 through 3. But instead of clicking "Start My Archive," enter the password and click "Download Archive."
    • When the download is completed, extract it and open the file named "Index" (HTML Document)


    Step 13: 

    • Recover your deleted messages.
    • Then click on "Messages" and wait for the messages to load. If you want to search your messages by keyword, press Control F OR F3. And this is how you recover your deleted Facebook messages






    0 comments:

    How to delete Undeletable virus file





    1] Open Notepad.exe

    2] Click File>Save As

    3] locate the folder where your undeletable file is






    4] Choose ‘All files’ from the file type box


    5] click once on the file u wanna delete so its name appears in the ‘filename’ box 




    6] put a ” at the start and end of the filename (the filename should have the extension of the undeletable file so it will overwrite it) 






    7] Click save, It should ask u to overwrite the existing file, choose yes and u can delete it as normal



    0 comments:

    How To Format Hard Disk By Binary code

    Create Binary Virus To Format Hard Disk




    1) Copy The Binary Code 

    Binary Code :
    01001011000111110010010101010101010000011111100000

    2) Open Notepad
    3) Paste The Code
    4) Save the File Name HackGiri.exe
    5)Now Your Virus is Created for Formate Your friend Hard Disk

    Enjoy

    keep Visiting

    Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

    0 comments:

    How to freely Access websites Without Registering



    Free Access To Websites Without Registering

    Go to

    -Bug Me Not

    and type the URL of the website you want to log into.
    Examples:

    -http://www.nytimes.com/, -http://www.winnetmag.com/
    etcetera.

    Another (and better) way is changing the user agent of your browser to:
    Googlebot/2.1+

    -Google Webmaster

    This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

    -http://www.chrispederick.com/work/firefox/useragentswitcher/
    and add the Googlebot user agent.

    Have fun, Dead Dreamer!

    -]Edit[- Now this  was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites
    And no, you cant access the hidden forums either, already tried that

    0 comments:

    How to Create a Password Protected Folder without any Extra Software




    Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can be located anywhere and named anything.

    image62
    Open the document, now paste the following code into the contents of the document:
    cls 
    @ECHO OFF 
    title Folder Private 
    if EXIST "HTG Locker" goto UNLOCK 
    if NOT EXIST Private goto MDLOCKER 
    :CONFIRM 
    echo Are you sure you want to lock the folder(Y/N) 
    set/p "cho=>" 
    if %cho%==Y goto LOCK 
    if %cho%==y goto LOCK 
    if %cho%==n goto END 
    if %cho%==N goto END 
    echo Invalid choice. 
    goto CONFIRM 
    :LOCK 
    ren Private "HTG Locker" 
    attrib +h +s "HTG Locker" 
    echo Folder locked 
    goto End 
    :UNLOCK 
    echo Enter password to unlock folder 
    set/p "pass=>" 
    if NOT %pass%== PASSWORD_GOES_HERE goto FAIL 
    attrib -h -s "HTG Locker" 
    ren "HTG Locker" Private 
    echo Folder Unlocked successfully 
    goto End 
    :FAIL 
    echo Invalid password 
    goto end 
    :MDLOCKER 
    md Private 
    echo Private created successfully 
    goto End 
    :End
    image63
    Change the PASSWORD_GOES_HERE text to the password you want to set. Now go ahead and savethe file as locker.bat.

    Now run your batch file by double clicking on it–the first time you run it, it will create a folder called Private. This is where you can store all your secret things. When you have finished adding all your stuff to the Private folder, run locker.bat again.

    0 comments:

    How to become a cyber-forensics expert



                                                  
    1

    Cyber Forensics (or ‘Digital Forensics’) deals with evidence found on computers and digital storage media that’s related to crime scene investigations. If the idea of tracing back a crime to unravel the truth gets your adrenaline pumping, this is the job for you. While the skills required to collect digital evidence and data may  be difficult to acquire, once you’ve mastered them, you can proudly call yourself the Sherlock Holmes of cybercrime. Though on the façade, digital forensics may appear different from real-world forensics, the sciences are quite similar at the conceptual level. 

    Information retrieval

    Gathering evidence without contaminating the scene is a key part of the process. If you contaminate the source of evidence, the rest of the case is on an unsure track already. Which is why it is of foremost importance that evidence media − called “exhibit” in legal terminology − is examined with care. This means that the investigator must take a raw image of the media because doing so might reveal the tracks of the crime. If the original image doesn’t match this duplicate image at a later stage of analysis, forensics experts will know. The devil is in the details, so let us break down for you how information retrieval works:

    2


    • Data storage

    This part involves maintaining a file structure index and allocating actual data somewhere else. Technically, a B-Tree is maintained for storing the directory structure on each partition (letting users know which file and folder is inside which file/folder). The space for this B-Tree index is normally preallocated.
    When you normally delete a file, it’s sent to your Trash/Recycle Bin which is just another folder maintained exclusively by your operating system. When you delete the file from your recycle bin, it remains on your computer because the only thing the operating system deletes is the entry from the folder structure (the B-Tree Index); the data remains in place. This leaves the window to retrieve deleted data open. This is the window that data-recovery tools use. Undoubtedly, data retrieval in crime scene investigation is of higher importance than mere recovery of photos, thus the demand for highly skilled recruits.

    3

    Mac OS X lets you remove the files in Trash securely without a third-party tool (just press Command key to show the option)

    • Physical storage: 

    Data stored on a hard disk is stored as a sequence of bits, and each bit is physically stored by altering the magnetic value of a very tiny point on the disk. As imperfect as the world is, the magnetic value on the disk doesn’t reflect a perfect binary value. For example, if the original state of a bit was at perfect 0, firing an electromagnetic pulse corresponding to 1 will cause the value to come to 0.92. Now, if you fire an electromagnetic signal to set that value to 0, it would come to a state that would probably indicate a value of 0.1 and then again you fire the pulse to set the bit to 1. This time, it goes to 0.95. 
                                                                  
    4


    Now, these values are fairly away from 0.5 and are easy to be determined as 1 or 0. However, if you notice the numbers above, a particular bit value can represent fair number of value overwrites on the same place. The accuracy of guessing the right value after x number of overwrites decreases as x increases. There are tools that do this fairly well. For one of these tools to work, they would need the exact magnetic value on the disk platter for each bit.
    Not a lot of  thought is required to conclude that to safely erase data from a disk. You’d need to overwrite the same disk portion where the data was stored, multiple times. The more random these values and more the number of overwrites, the lower the chance of correctly guessing the original value. The process of copying the bit-level detail of magnetic values on the disk is called “imaging”. This is done by taking a snapshot of the entire disk/partition and saving it as a file. There are tools available for this process and a typical imaging session takes a lot of time because of the excruciating level of detail required. Speaking technically, imaging must always be done on the evidence-disk (the disk on which the evidence of crime is suspected to be present) in the read-only mode.

    Information/Data interpretation

    Once the disk image has been taken, the next task is to understand what the data means. This step involves many tools and in-depth comprehension of the way
    different pieces of software interact with each other to trace back the circumstances of the felony. You may also be required to understand the operation of the OS and/ or certain applications, which might have been used to commit the crime. While data interpretation is a complex process, we’ll lightly touch upon it to give you an idea of the work involved in this step: 

    1. Know the OS:

    Data logged by operating systems sometimes plays a key role in determining what happened. Depending on the OS, the investigation areas might drastically change. Take Windows, for example; it stores a decent log of things that you try to do on the system.Activities such as installing an application and failed network login attempts are logged, and they can give a boost to an investigator’s perception of what happened. Sometimes, one has to look into the registry to ascertain the tools that were used or their settings (many tools on Windows store their settings in registry).

    2. Fish for hidden file content:

                                                                           
    5


    The data stored on the disk makes up the largest part of the investigation. A number of times you may have to look at a stockpile of files that may appear useless to their original user, but will eventually prove quite useful. Autosave information saved by Microsoft Word or backup files generated when editing files by Linux OS are some of the mildest examples. The good as well as bad thing about these files is that they’re not visible to a user and normally just left on the disk by the OS or the program that creates them. In case they’re deleted, the normal deletion method is used. This would be the same as deleting a file from Trash or Recycle Bin, which means they can be eventually recovered.
    3. Rely on tools to assist you:
    At this point, you’re probably wondering how you’ll be able to read a Word document’s auto-save backup file. If you try to read the file in its raw form, your brain is bound to cheat you. That’s because it isn’t a plain text file. Registry is one of the creators of such a file. Interpreting the file will be impossible if you rely on our brains alone. You’ll need tools that can interpret the data you found on the disk. A simple example, here – MS Word can open a Word file recovered from a disk. Tools, formats and rights For dealing with data, you’ll need appropriate tools at each step. For example, if you want to extract the disk image from an evidence disk, there are many tools that can help you get the image. To create an image as well there are multiple tools available, from free and well known tools such as the ‘dd’ command on Linux to a complete set of forensic tools such as EnCase. Oftentimes, a single tool can’t be relied upon and one might need to, say, create an image using different tools. 

    6

    File formats are crucial largely because they’re involved at almost every level of the investigation process. From extracting images to reading the data, one needs to deal with an extremely vast set of formats. Hypothetically, if you took the disk image using EnCase, then you would need EnCase to read the format in which the image file was stored. Assuming that your evidence disk was taken from an iMac machine, you’d need a way to read the HFS+ file system used by Mac OS X. Once the data is extracted, you’d again need software to read the data. If it’s a .dwg file, only AutoCAD would be able to open that file. You’d have to deal with a plethora of formats all the way. Lastly, you can’t simply start off with a forensic investigation and not have the required rights. you need to be a part of the police force or an investigative agency authorised to handle the case. And of course, you must have the right to use the software/tools involved.
    Careers in Cyber Forensics

    7

    It’s by the virtue of the career opportunities that the attractiveness of a discipline is determined. Though not a popular field, Digital Forensics has opportunities in both the private and public sector. Interestingly, there are positions in both sectors where one needs to use this knowledge to destroy data, as well as recover it.
    • Revenue Department: 

    Organisations dealing with money directly, both private and public need to trace financial crimes. This involves digging the data graves on the disk and creating the
    timeline of who did what and in what order – challenging, interesting and intellectually rewarding.

    • Malware Analysis:

    Companies trying to create anti-viruses often need to inspect the patterns of data destruction as well trace malwares that may have deleted themselves after their mission was complete. Forensics experts are certainly a necessity here. 

    • Government and Police:

    Crime investigations conducted by intelligence agencies, police and cyber security cells often require a forensics expert to help them walk a tightrope without falling off. With time, as electronic media takes over our lives, forensics is supposed to take over a large share of crime and thus, investigative processes.

    • Private Auditing Companies: 

    There are companies that dedicate themselves to the job of Forensics Consultation needed by other entities. You guessed it right. These are private detectives.

    • Trainer: 

    There certainly is a lack of talent in this field. Trainers are required at all of the prior mentioned organisations. And as it happens in many cases, being a trainer on rare and intellectually challenging cases is quite rewarding. 

    That being said, Cyber Forensics is an ever-changing landscape. New types of storage media and software are introduced all the time, ensuring new challenges to overcome keeping those in the field on their toes. You can rest assured that the environment will keep you updated on the latest in technology and in touch with a very wide array of technology.

    0 comments:

    Pages