Friday 30 March 2012

Posted by Unknown On 05:36

I hardly use facebook chat but recently stumbled across the new facebook chat application that might be useful to our readers who love facebook chat. Facebook recently released  an IM application and I took some time to test run it just to see what it looks like. It’s a stand-alone messenger application but still needs browser support based on my view. It kinda looks ok but there can still be improvements to make it look more like a standard IM application. With this facebook messenger running, you can get notifications and chat with multiple users at the same time. This facebook messenger also has the ticker included so you can still keep a track of your friends activities while on chat.
facebook-messenger-for-windows
Below is a screenshot of what it looks like when in use:
download official facebook chat application messenger for windows
Posted by Unknown On 05:33

It’s been a while since my last post on symbian phone hacking but this time around, I’m bringing something different from mobile stuff. I’m posting a tutorial with detailed screenshots on how you can install, run and switch between multiple operating systems with a software called VirtualBox.
VirtualBox is a powerful x86 and AMD64 / Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL)
Why is virtualization useful?
Although I have dropped the full link for a complete user manual for this software below, I shall however brief you about why this software (VirtualBox) is particularly useful. The techniques and features that VirtualBox provides are useful for several scenarios:
* Running multiple operating systems simultaneously – VirtualBox allows you to run more
than one operating system at a time. This way, you can run software written for one
operating system on another (for example, Windows software on Linux or a Mac) without
having to reboot to use it. Since you can configure what kinds of “virtual” hardware should
be presented to each such operating system, you can install an old operating system such
as DOS or OS/2 even if your real computer’s hardware is no longer supported by that
operating system.
* Easier software installations — Software vendors can use virtual machines to ship entire
software configurations. For example, installing a complete mail server solution on a real
machine can be a tedious task. With VirtualBox, such a complex setup (then often called
an “appliance”) can be packed into a virtual machine. Installing and running a mail server
becomes as easy as importing such an appliance into VirtualBox.
* Testing and disaster recovery. Once installed, a virtual machine and its virtual hard disks
can be considered a “container” that can be arbitrarily frozen, woken up, copied, backed
up, and transported between hosts.
On top of that, with the use of another VirtualBox feature called “snapshots”, one can save
a particular state of a virtual machine and revert back to that state, if necessary. This way,
one can freely experiment with a computing environment. If something goes wrong (e.g.
after installing misbehaving software or infecting the guest with a virus), one can easily
switch back to a previous snapshot and avoid the need of frequent backups and restores.
Any number of snapshots can be created, allowing you to travel back and forward in virtual
machine time. You can delete snapshots while a VM is running to reclaim disk space.
* Infrastructure consolidation – Virtualization can significantly reduce hardware and electricity
costs. Most of the time, computers today only use a fraction of their potential power
and run with low average system loads. A lot of hardware resources as well as electricity
is thereby wasted. So, instead of running many such physical computers that are only partially
used, one can pack many virtual machines onto a few powerful hosts and balance the
loads between them.
What you need to get started
- You need a standard Computer with at least 1gb or ram and 40gb of hard disk although I will advice anybody to use 2GB RAM and anything above 40GB harddisk as the minimum requirements.
- The parent OS must have admin priviledges.
- You need the installation CD for the oerating system you wish to use in your virtual machine
Installation procedures
next
Posted by Unknown On 05:28

There are lots of people complaining that they have one or two problems with their notebook due to hibernation and that makes one wonder if hibernation actually damages a computer. As a matter of fact, I hate shutting down my laptop because of the time taken to start up and the time taken to restore my browser tabs which may be up to fifteen at times. Hibernating your computer is a very good way to save your work but people often try to convince me that it’s going to damage my motherboard eventually. Is there any truth to this? Is it a practice one should avoid?
First, let me try to tell you what happens when your system goes into hibernation. What most people do not know is that when you hit the hibernation button, your computer actually shuts down but it usually stores a file on your hard disk which is used to restore whatever you’ve been doing.
does hibernation damage your computer?
Posted by Unknown On 05:26

You’ve got a video you need to watch on youtube and it keeps buffering, pausing every few seconds. You feel like just closing the tab because it’s so frustrating but you keep trying because you just have to watch it. This problem often happens when you’re using a slow connection but there’s an easy fix for it which works for me. I’ve been using a broadband connection over the last couple of months but just last weekend, I went out of town and my broadband modem became useless where I was. I had to use a slow dial-up connection and Youtube videos kept buffering for like eternity.
I was able to watch Youtube videos without buffering using a simple trick. Before getting started, you should have Real Player installed on your computer because you’ll be needing this.
- Go to youtube and locate the video you want to watch
- Check the address bar on your browser and change www to just m as shown below

how to watch youtube videos faster without buffering
Posted by Unknown On 04:07

Welcome again to "HACKING begins - An approach to introduce people with the truth of HACKING".  Today I'll tell you how can you stream live tv on your 2G mobile phone. 
Well you can also try with 3G or Wi fi.  Some time due to media player stream protocol is not user so may be many of you face this problem. 


Hope you like the tutorial ... 

Posted by Unknown On 03:56

Welcome again to "HACKING begins - An approach to introduce people with the truth of HACKING".  Window 7 is a awesome product of Microsoft but the main problem is they are just allow  users to 30 day trail. So guys now i have a good news. You can now activate your Win 7 and make OS Genius. Surprised but it is true. Download Window Loader from below and install it on your Window after 5 minutes your window restart and your Window is fully activated. 

Wednesday 7 March 2012

Posted by Unknown On 01:56


Welcome to "HACKING begins - An approach to introduce people with the truth of HACKING", Today in this post I'll tell you how can you send fake and anonymous mails to any one. This technique is called E-MAIL FORGING.  E-MAIL FORGING is a art to sending fake emails 
without knowing the password of victim.

WARNING : This article is only for educational purpose don't misuse this. HACKING begins

WWW.HIDEMYASS.BIZ - SEND FAKE E-MAIL is the fabulous online website, used to send fake and anonymous email. All Sent e-mails go to INBOX.

Posted by Unknown On 01:55


Welcome to (HACKING begins - "An approach to introduce people with the truth of HACKING"), Hello friends today in my article I'll tell you how can you hack with your browser with just simple JAVA SCRIPTS.These are just simple scripts that works on any of browser and you can also play these scripts on
your friends.

  • Javascript Hack 1 : Edit Any Webpage
javascript:document.body.contentEditable='true';document.designMode='on';void 0

Copy & Paste the code in browser.

  • Javascript Hack 2 : Reveal Passwords Under Asterisks

javascript: alert(document.getElementById('Passwd').value);

Copy & Paste the code in browser.

  • Javascript Hack 3 : Shake the Browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i) ;self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
Copy & Paste the code in browser.

  • Javascript Hack 4 : Cool message trick Just type your message

javascript: contentBodyEditable="true".DesginMode="Message"
Copy & Paste the code in browser.

  • Javascript Hack 5 : This is for Orkut Hack

javascript:function reverse() { var inp = " ! dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();

Copy & Paste the code in browser.

  • Javascript Hack 6 : Rotates images from your web page in a circle

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

Copy & Paste the code in browser.

  • Javascript Hack 7 : Shake the Browser

Tuesday 6 March 2012

Posted by Unknown On 03:31




Step 1. Download IP FINDER script


Step 2 . Create a Free Hosting Account in my3gb.com.

Step 3 . Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

Step 4 . Set the permission to 777 on ip_log.txt.

Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
Posted by Unknown On 03:28

Hello friends I have found for you a very easy and effective method for breaking windows Password with this software you can easily break Administrator password , user account passwords .You can also break advance level of passwords like SYSKEY password , Facial Expression Password , and Thumb Recognition passwords. the Syskey password is very strong password if you forget the password there is no option to recover this password .you will have to install new windows. But now there is no need to install windows .you can easily break any password of windows in any OS. If you have forgotten your password, or your computer is locked out, or you do not have access to the password of the system, you only need to boot from this software from CD/DVD/USB to reset your lost password. Then you can get back into your system in a minute. No need to call a technician, no need to re-install anything, and you certainly don't need to reformat.

Download ISO File ::  Windows Password Recovery

Posted by Unknown On 03:26

Welcome to "HACKING begins - An approach to introduce people with the truth of HACKING". 

Best List Of TROJAN