This is Virus Community

Your Ultimate Tech Destination On My Web.

This is Virus Community

Your Ultimate Gadgets Destination On My Web.

This is Virus Community

Your Ultimate Technology Updates Destination On My Web.

This is Virus Community

Your Ultimate Tech Articles Destination On My Web.

This is Virus Community

Your Ultimate Virus and Malware updates Destination On My Web.

Tuesday, 17 November 2015

4 Ways To Be Anonymous Online

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!


1. Using Proxies

A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage ofa proxy is that your real IP address is Hidden so when you hack your giving the IP address ofthe proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you areIP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it.


2. Using Tor


Tor-proxy is a free proxy-server service that Internet users can useto hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal auser's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it


3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted trafficover a network through an encrypted channel.In easy language,you can surf net withoutbeing monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide.


4. Using VPN

Virtual Private Network. Basically it’s a private network which lets users to connect to other users orremote sites using a public network usually internet. It uses "virtual" connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure,such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid Andfree VPN services.
 

A History Of Hacking

A History Of Hacking


A history of hacking Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle Captain Crunch, is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL TAP (Youth International Party Line Technical Assistance Program) magazine to help phone hackers (called phreaks) make free long- distance calls. Two members of California's Homebrew Computer Club begin making blue boxes, devices used to hack into the phone system. The members, who adopt handles Berkeley Blue (Steve Jobs) and Oak Toebark (Steve Wozniak), later go on to found Apple Computer. Early 1980s Author William Gibson coins the term
cyberspace in a science fiction novel called Neuromancer. In one of the first arrests of hackers, the
FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan- Kettering Cancer Center to Los Alamos National Laboratory. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit
card and computer fraud. Two hacker groups form, the Legion of Doom in the United States and the
Chaos Computer Club in Germany. 2600 The Hacker Quarterly is founded to share tips on phone and computer hacking. Late 1980s The Computer Fraud and Abuse Act gives more clout to federal authorities. Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks. At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and
Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison. First National Bank of Chicago is the victim of a $70-million computer heist. An Indiana hacker known as Fry Guy -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles Prophet, Leftist and Urvile. Early 1990s After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab
St. Louis' Knight Lightning and in New York grab Masters of Deception trio Phiber Optik,  Acid Phreak and Scorpion. Fellow hacker Eric Bloodaxe is picked up in Austin, Texas. Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit,
conducts raids in 12 major cities, including Miami. A 17-month search ends in the capture of hacker Kevin Lee Poulsen (Dark Dante), who is indicted for stealing military documents. Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs Data Stream, a 16-year-old British teenager who curls up in the fetal position when seized. A Texas A&M professor receives death threats after a hacker logs on to his
computer from off-campus and sends 20,000 racist e-mail messages using his Internet address. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. Late 1990s Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone. A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message The media are liars. Family's own 15-year-old son eventually is identified as stalking culprit. Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses. Popular Internet search engine Yahoo!
is hit by hackers claiming a logic bomb will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. There is no virus, Yahoo! spokeswoman Diane Hunt said. 1998 Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway. In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called spamming. Hackers break into United Nation's
Children Fund Web site, threatening a holocaust if Kevin Mitnick is not freed. Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and
transportation systems from hackers. Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Make A Disco Keybord

Make A Disco Keybord

Make a Disco Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows.

This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. Keyboard tricks To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Save the file as Disco.vbs or "*.vbs". Cool Keyboard Tricks Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco. This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working
perfectly. You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process.

What Is Dram (Dynamic Random Access Memory)

What Is Dram (Dynamic Random Access Memory)


Dynamic random access memory (DRAM) is the most common kind of random access memory (ram) for personal computers and workstations.
The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory
Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from some starting place
DRAM is dynamic in that, unlike static RAM (SRAM),
it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds
Static RAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a
storage cell that holds a charge in place.
Static RAM is generally used for cache memory, which can be accessed more quickly than DRAM.
DRAM stores each bit in a storage cell consisting of a capacitor and a transistor.
Capacitors tend to lose their charge rather quickly; thus, the need for recharging.
A variety of other RAM interfaces to the computer exist
These include: EDO RAM and SDRAM.

Microsoft Windows History

Microsoft Windows History


WINDOWS VERSION HISTORY:
WINDOWS 1.0 ------>16 Bit Os
(1985)
WINDOWS 2.0 ------>16 Bit Os
WINDOWS 3.0 ------>16 Bit Os
(1990)
WINDOWS 3.1 ------>16 Bit Os
(1992)
WINDOWS NT 3.1 ------>32 Bit Os
(1993)
WINDOWS 95 ------>Used WIN32
API
WINDOWS 98
WINDOWS ME
WINDOWS NT 4
WINDOWS 2000 (or also Known as
WINDOWS NT 5)
WINDOWS XP (or also Known as
WINDOWS NT 5.1)
WINDOWS XP PROFESSIONAL -----
>Supports 64 Bit
WINDOWS SERVER 2003
WINDOWS VISTA (WINDOWS NT
6.0)
WINDOWS 7 (WINDOWS NT 6.1)
------->WINDOWS 7 ULTIMATE
------->WINDOWS 7 HOME PREMIUM
------->WINDOWS 7 HOME BASIC
------->WINDOWS 7 PROFESSIONAL
------->WINDOWS 7 STARTER
------->WINDOWS 7 ENTERPRISE
WINDOWS SERVER 2012
WINDOWS 8 (WINDOWS NT 6.2)
------->WINDOWS 8
------->WINDOWS 8 Pro
------->WINDOWS 8 ENTERPRISE
------->WINDOWS 8 RT (FOR
TABLETS)
XP-EXTENDED PROCEDURE
NT-NEW TECHNOLOGY

5 Deadly Linux Commands That Can Destroy A System

5 Deadly Linux Commands That Can Destroy A System


1. Command  rm -rf  = It will Delete
Everything Explanation  It is a combination of three keywords. First is  rm It will remove all the files followed by this command. Second is  -rf This will run rm command in more effective way and will remove everything  ( all files and folders inside the specified folder ) without asking confirmation from the user. Third is This will start removing the data from the root directroy and will delete everything from the computer including the data of removable media.

2. Command  (){  & }; = Shell function that gets repliacated. This command creates a shell function ,
which once get initialized starts to create multiple copies of itself. It results in taking quickly all the memory and power of CPU.It makes computer freeze or not responding. This is also known as Denial Of Service Attack.

3. Command  mkfs.ext4 devsda1 = This command will format the hard disk Explanation  This command is again composed of two keywords. First is  mkfs.ext4  This part of command will create a new ext4 file system on following device where this command will get executed. Second is devsda1 ;This part of command specifies the 1st partition on the first hard disk which is probably in use by the user. Similarly, This Command  mkfs.ext3 devsdb2 will Format the second partition on the second hard disk with ext3 File system.

4. Command  devsda – Write Any content Directly to a Hard Drive. Explanation  This command will execute normally as other commands in linux do. But output of this command will directly be sent to the file system (NTFS or FAT ) of the Hard Drive. It will result into damaging the file system of the computer.

5. Command  mv ~ devnull – Beware it Will Move your Home Directory To Black hole. Explanation  Moving any of your content and data to following path devnull means you want to destroy it. It means devnull is a black hole where once anything sent , can not be recovered back. NoteMany of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work
otherwise. On other Linux distributions, most commands must be run as root.

10 Hacking Software & Tools Contains A Following Software

10 Hacking Software & Tools Contains A Following Software


- Cain and Abel (sniffer)
- John the Ripper (powerful brootforce)
- NetStumbler (allows to define radius of action of network WiFi in real time for the diagram it is possible to see size of a useful signal) 
- Nmap (one of the best network scanner)
- Putty (a quite good telnet the client)
- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)
- Hping (allows to generate specialICMPUDPTCP packages and to look through answers ping a hostin style of the usual utility ping)
- Lcp (audit and restoration of passwords Windows NT  2000  XP  2003) 
- Nikto (perl the scanner broken Web a server, with support SSL)
- Kismet (sniffer a wireless network 802.11 and the decoder of packages) 38 minutes 

Ubuntu 10.10

Ubuntu 10.10


Ubuntu 10.10 Settings: Configure Ctrl-
Alt-Del As Task Manager How To Bind Ctrl-Alt-Del in Ubuntu
Linux, Windows style???

Always swear by the Ctrl-Alt-Del combo and wants Ubuntu to have the
same feature even though it hasn't crashed on you yet? Well, I understand.

Familiarity is a good thing. This is for those of you who seeks
familiarity in an unfamiliar surrounding.
Especially for recent converts from WIndows.
Right after installing or
reinstalling Ubuntu, one of the first
Ubuntu must haves or customization is the ability to simulate the behaviour of the control-alt-delete combination key
strokes to open the Task Manager, or the System Monitor, as it is called in Ubuntu.
This article will show you the easiest way to customize this feature to end tasks or kill unresponsive processes.
Unlike other methods which involved using terminals, if you did this just once and understood the steps, you will be able to reduplicate this for other new
installations of Ubuntu without referring to your notes whatsoever.

Some background:
In Ubuntu, when you press Ctrl-Alt-Del,you will get the Log Out screen, which
is not what Windows users expected. Here's how to enable the Ctrl-Alt-Del shortcut the "right" way: Go to "System > Preferences >
Keyboard Shortcuts" (In Ubuntu 10.04, older versions may have it elsewhere under a different name, look around) .

1. Change the key combo for the current Ctrl-Alt-Del binding:
Look for "Log out", where you can see: "Log out - Ctrl+Alt+Delete"
Click on the "Log out" line and you will be prompted to enter a new key, try "Ctrl-Shift-Del" or whatever key combination not in use.
2. Enter the new Ctrl-Alt-Del:
At the bottom of the "Keyboard Shortcuts" window, click on "Add", to
add a new "Custom Shortcut" combination. Name:* Ctrl-Alt-Del Command: gnome-system-monitor *You can name it whatever you want,
even "Windows Task Manager", as in Windows. Click "Apply", and then click on "Disabled", next to the new Ctrl-Alt-Del entry, and press Ctrl-Alt-Del to enter the
new key combination when you see "New shortcut", and you're done!
Test it out by pressing Ctrl-Alt-Del .

You Wanna Backup Your Computer

You Wanna Backup Your Computer

Backup the whole c drive
backup c:\document files
backup program files
deleting a log file on c drive backup the registry
Type those code on notepad and save
it .bat extinction like: "backup.bat" @echo off
::script developed by Learn Advance
Hacking
:: variables are created for the backup
drives and the command to execute
set drive1=D:\ set drive2=E:\
set backupcmd=xcopy /s /c /d /e /h /
i /r /y echo ### Backing up the whole C
drive to E...
%backupcmd% "C:\" "%drive1%" echo ### Backing up C:\MyDocs to
drive E...
%backupcmd% "C:\MyDocs"
"%drive2%\Apache2" echo ### Backing up Program Files to
drive E...
%backupcmd% "C:\Program Files"
"%drive2%\C Backup\Program Files" echo ### Deleting a log file on C for
cleanup...
del c:\path\to\file.log echo ### Backing up the Registry...
if not exist "%drive2%\Registry"
mkdir "%drive2%\Registry"
if exist "%drive2%\Registry
\regbackup.reg" del "%drive2%\Regis
try\regbackup.reg" regedit /e "%drive2%\Registry
\regbackup.reg" :: use below syntax to backup other
directories...
:: %backupcmd% "...source directory..."
"%drive%\...destination dir..." :: delete these following lines if you
don’t want the DOS window to stay
open after backup
echo Backup Complete!
0@pause.

How To Write A "C" Program Without A Main Function

How To Write A "C" Program Without A Main Function


Is it possible to do
that.Yes there can be a C program
without a main function.Here’s the
code of the program without a main
function… #include #define decode(s,t,u,m,p,e,d)
m##s##u##t
#define begin decode(a,n,i,m,a,t,e) int begin()
{
printf(” hello “);
} Does the above program run without
the main function? Yes, the above
program runs perfectly fine even
without a main function.But
how,whats the logic behind it? How
can we have a C program working without main ? Here we are using preprocessor
directive #define with arguments to
give an impression that the program
runs without main.But in reality it runs
with a hidden main function. The ‘##‘ operator is called the token
pasting or token merging
operator.That is we can merge two or
more characters with it. NOTE: A Preprocessor is program which
processess the source code before
compilation. Look at the 2nd line of program- #define decode(s,t,u,m,p,e,d)
m##s##u##t What is the preprocessor doing
here.The macro decode(s,t,u,m,p,e,d) is
being expanded as “msut” (The ##
operator merges m,s,u & t into
msut).The logic is when you pass
(s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters
(tokens). Now look at the third line of the
program- #define begin decode(a,n,i,m,a,t,e) Here the preprocessor replaces the
macro “begin” with the expansion
decode(a,n,i,m,a,t,e).According to the
macro definition in the previous line
the argument must de expanded so
that the 4th,1st,3rd & the 2nd characters must be merged.In the
argument (a,n,i,m,a,t,e) 4th,1st,3rd &
the 2nd characters are ‘m’,'a’,'i’ & ‘n’. So the third line “int begin” is replaced
by “int main” by the preprocessor
before the program is passed on for the
compiler.That’s it… The bottom line is there can never exist
a C program without a main
function.Here we are just playing a
gimmick that makes us beleive the
program runs without main function,
but actually there exista a hidden main function in the program.Here we are
using the proprocessor directive to
intelligently replace the word begin”
by “main” .In simple words int
begin=int main.

Delete Auto Run Virus Manually

Delete Auto Run Virus Manually

Delete AUTO RUN virus manually

1) Going to the first step, Please Disable CD or DVDUSB autorun in the windows 
2) Open the Winrar.exe ( start Programs Winrar Winrar.exe ) 
3) Now browse the infected file through the Winrar application 
4) We can watch the hidden files for the particular drive using Winrar now. 
5) Look for the file autorun.inf and open by using Notepad 
6) When you open, We can find a exe file in that. It is the main danger. 
7) Note this .exe file and close the autorun.inf file Now look for that .Exe file in the Drive
(e.g d ) 
8) Now delete the autorun.inf file and .exe file together 
9) Restart your system, now there is no virus in your system.

How Can We Change Our Ip Address

How Can We Change Our Ip Address


1. Change Your IP Address
netsh interface ip set address
name=”Local Area Connection” static
192.168.0.1 255.255.255.0
192.168.0.254
You need to statically assign an IP address of 192.168.0.1
You need to set a subnet mask of
255.255.255.0
You need to set a default gateway of
192.168.0.254
2. Set static IP address to getting an address from DHCP.
netsh interface ip set address
name=”Local Area Connection”
source=dhcp
3. Changing Your DNS Settings
netsh interface ip set dns name=”Local Area Connection” static
192.168.0.250
4. The name of the interface you want
to change the primary DNS setting for
is Local Area Network
The IP address of the DNS Server is 192.168.0.250
5. To change the IP address of the
secondary DNS server you will need to
specify the index parameter
netsh interface ip add dns
name=”Local Area Connection” 8.8.8.8 index=2
6. set your DNS settings to be assigned
dynamically
netsh interface ip set dnsservers
name=”Local Area Connection”
source=dhcp for more cmdnetsh help.

Power Of Linux

Power Of Linux


1. Google, Facebook, Twitter and Amazon are all
powered by Linux.
2. 850,000 Android devices are activated every
single day,all running Linux. That means 100 Android devices have come online since you started reading this post, all running Linux.
3. 700,000 TVs are sold everyday most of which
are running Linux.
4. 9 out of 10 world's supercomputers run Linux.
5. 8 out of 10 financial trades are powered by Linux.

How To Track Who Visited My Facebook Profile?

Find someone’s IP Address

  1. Its easy to do. Just follow these steps and you’ll succeed in finding out who visited your Facebook Profile!
  2. Go To Your Facebook timeline- facebook.com/xyz
  3. Right click on your timeline and hit “View page Source”.
  4. Now, you’ll be redirected to a new page with lots codes.
  5. Hold CTRL+F on your keyboard, a text box appears at the right corner, in that box, type- “InitialChatFriendsList” (Don’t include Quotes)
  6. Next to that word, you’ll see a list of numbers, these are the profile ID’s of people who visit your timeline.
  7. Just go to “facebook.com”  and paste the ID number beside it with a “\” . For example, if the ID is abcd, you have to put it as- facebook.com/abcd.
  8. The first ID shows the one who visits profile more often while the last ID never visits your profile!

Find someone’s IP Address

Find someone’s IP Address


I often see these kinds of messages, someone calling you/your friends “fat” and “racist”? Big deal. It’s the Internet, the most public of public places. It’s completely your fault for adding some “random dude” that you don’t know. You must understand how web applications work. Anyways here’s the way of finding someone’s IP address on Facebook.


Using NETSTAT to find IP address of that User


To do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd)

note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.

When command prompt opens Type the following command and hit Enter.

netstat -an



And you will get all established connections IP addresses there. Note down all the suspicious IP’s


The Next Step is to Trace that user using his IP address.


To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. It will show you the location of the user.

Only works on chrome  


http://www.ip-adress.com/ip_tracer/


It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

How To Disable/crash/destroy Someone Facebook

How To Disable/crash/destroy Someone Facebook


This is very simple & 101% Working
http://34255353309

Just ask your victim or friend to copy this link & comment it to his profile pictureIf victim do this his id was temporary locked & asking photo verification
It's 101% working method.

don't try this for illegal purposes.

How to Unlock/Bypass iPhone Passcode

How to Unlock/Bypass iPhone Passcode

The method is very simple and even non technical person can implement this. you just have to follow some of the simple steps that i have discussed below and you can easily Unlock/Bypass iPhone Passcode.
This methody will only work for you if you had already enabled Find My Phone feature on your iOS device. Bu this you can restore all your data online by logging into your icloud account and following the below steps.
  1. First of all visit icloud Find My Phone official page in your desktop from Here .
  2. Now here login with your icloud id and password.
  3. Now select all the devices from the browser top menu.
  4. Now select the device from iphone, ipad and ipods in which you want to unlock passcode.
  5. Now click on erase button that will erase all your data including the passcode file that stores the current passcode of your iphone.
  6. Now using setup assistance like itunes restore your iphone with recent backup file excluding passcode file.
  7. Thats you are done, your iphone will get unlocked.

Unlock/Bypass iPhone Passcode Using iTunes


  1. You need iTunes in this method, download and install itunes in your Pc and proceed with below steps.
  2. First of all connect your iphone with your computer using USB Cable.
  3. Now in itunes click on restore option.
  4. There select out the most recent backup file and click on restore option.
  5. Now restore process will start and your device will reboots.
  6. Now when your iphone starts you can use it without any need of passcode to enter there.
So above is all about How to Unlock/Bypass iPhone Passcode. By this method you can easily restore your iphone to initial settings and that will unlock your ios device

Top 10 Tips To Improve System Speed

Top 10 Tips To Improve System Speed


1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.

5. Empty the recycle bin regularly.The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months.
This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8. Always make two partitions in your hard drive.
Install all large Software's (like PSP, Photoshop, 3DS Max etc) in the second partition.
Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9. When installing new Software's disable the option of having a tray icon.
The tray icons use up available RAM, and also slow down the booting of your PC.
 Also disable the option of starting the application automatically when the PC boots.
 You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust.

Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed.
Use compressed air to blow out any dust from the CPU. Never use vacuum.

Wednesday, 4 November 2015

How To Create A FaceBook Virus

How To Create A FaceBook Virus


Creating virus is illegal but creating funny virus is not.
Here I will show you how to make a funny virus to panic
your friends.

In this tutorial I will show you how to make Facebook virus
using simple commands on notepad. .
This will make the victim think they have got a virus when
they click on an icon such as Internet Explorer.

1) Open notepad
2) Type this in :

@echo off msg * WARNING
VIRUS DETECTED!! AFTER 5
MINUTES YOUR FACEBOOK ACCOUNT WILL
BE DELETED!!TO REMOVE THE
VIRUS CLICK OK OR CLOSE THIS
BOX!
PAUSE shutdown -r -t 300 -c
?SORRY!!! YOUR FACEBOOK ACCOUNT
IS NOW BEING DELETED!!!
PLEASE WAIT ..........."


4)Save as facebook password breaker .bat

5) Send it to your friends and say them it can break Facebook
accounts

When He/She double click it a message will open and their
computer will restart. After five minutes windows will restart, that is all.
This is totally harmless and will give you a laugh.

Block Your Enemy Sim Card Easily

Block Your Enemy Sim Card Easily


Blocking sim card Block any
Sim with this Code

  1. Keep Your Enemy Cell Phone
  2. Type This Code
  3. The Code Is *043814752968243#

Note:-

To unblock the sim call customer care and get the puk code Enjoy and start Blocking Your Enemies.