Saturday 27 December 2014

Facebook CEO Mark Zuckerberg's Friends List



Everyone knows Mark Zuckerberg, CEO & Founder of Facebook. No one can access Mark Zuckerberg's Friend list as he has limited the privacy to "only me". But his Friends did not do the same, using this idea we have found out some of his Facebook friends. In this post I have made a list 20 of his friends Facebook Profile link. If you don't believe me you can check the following profiles Friend List.

Above was the list of Friends of Mark Zuckerberg . Sound quite weird! Isn't it?
Unknown Web Developer

Tuesday 23 December 2014

Upgrade To Windows 10 (Free Download Full Version)


I am going to discuss about Upgrade To Windows 10 (Free Download Full Version) for free of cost. Recently, Microsoft has just announced that they have released an early Technical Preview of Windows 10.  I always loved the moment when new OS release comes from Microsoft Windows 10. Users were expecting Windows 9 after the previous 8.1 but it was quite surprising that Microsoft Skipped 9 and released Windows 10. In this latest version of microsoft windows 10 has new look of Metro Style UI (User Interface) and Microsoft had to take a new step to create a Mixture of Windows 7 and Windows 8 to create 

Upgrade To Windows 10 (Free Download Full Version)

Windows 10 Free Download Full Version 1024x640 Upgrade To Windows 10 (Free Download Full Version)
Upgrade To Windows 10 (Free Download Full Version)
So far Windows 10 has received positive response from technical groups and it is not official released by Microsoft. However they have released a preview version. You can easily Download and Upgrade to Windows 10 for free of cost and get concept of how this product will work. I’m also excited to install this on your new system.

Features of Windows 10

There are some features that you’ll get after,
  • Mix of Windows 8 & Windows 7 Metro style UI (User Interface).
  • New Cleaned Start Menu.
  • Virtual Desktops Feature.
  • Task View Option.
  • Dynamically Resizing of Windows Apps.
  • Huge Search Improvements.

Windows 10 Specifications

  • Windows 10 Technical Preview : English
  • Setup File Name: WindowsTechnicalPreview-x86-EN-US.iso (32 Bit) / WindowsTechnicalPreview-x86-EN-US.iso (64 Bit)
  • Full Setup Size: 2.9 GB (32 Bit) / 3.81 GB (64 Bit)
  • Setup Type: Offline Installer / Full Standalone Setup:
  • Compatibility Architecture: 32/64 Bit (x86)
  • License: Free
  • Developers: Microsoft

Minimum System Requirements for Windows 10

Make sure you system meets minimum system requirements are following :-
  • Processor: 1 GHz
  • Memory (RAM): 1 GB (For 32 Bit) / 2 GB (For 64 Bit)
  • Space: 16 GB Free Hard Disk Space

Upgrade To Windows 10 Download ISO 32/64 Bit

Click on below button to start Windows 10 Download ISO 32/64 Bit Free of cost. This is Technical Preview released by Microsoft yet.  You can easily download and install it via USB or DVD.
                                                                                OR

Installation Code

NKJFK-GPHP7-G8C3J-P6JXR-HQRJR
Above is official Installation Code Provided by Microsoft here. You can also download your own Language ISO as well.
Now, in this way you’re sucessfully Upgrade To Windows 10 (Free Download Full Version) ISO 32/64 Bit,Enjoy don’t forget to share it with your friends. If you face any problem feel free to discuss in below comments,
Unknown Web Developer

Saturday 6 December 2014

TOP 10 Black Hat Hacker and their story


To accompany the technological advancements of the computer world and the constant changing definition of a hacker, we thought it was time to look back at ten of the most notorious black hat hackers and the legendary hacks that earned them such a title.
First, it should be known that a black hat hacker is computing slang for a person who engages in illegal or malicious hacking. A white hat hacker is a computer hacker who intends to improve internet security. It is note-worthy that many white hat hackers, such as Steve Jobs of apple, Mark Zuckerberg of Facebook, and even many hackers listed below, were once black hat hackers.
After reading these all tell us in comment who inspired you and who is now your favourite.

10. Kevin Poulsen (Dark Dante)

Kevin Poulsen (Dark Dante)
The notorious ’80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured.
He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.

9. Albert Gonzalez

Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison. 

8. Vladimir Levin


Vladimir Levin
It’s almost like the opening of a James Bond movie: in 1994, while working from his laptop from his Russian apartment in St. Petersburg, Vladimir Levin transferred $10 million from the accounts of Citibank clients to his own accounts around the world.However, Levin’s career as a hacker was only short lived, with a capture, imprisonment and recovery of all but $400,000 of the original $10 million. During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid. The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.

 7. Robert Tappan Morris


On November 2, 1988, Robert Morris released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down. Due in part to the need for social acceptance that seems to be common amongst many young hackers, Morris made the fault of chatting about his worm for months before its release on the Internet. Morris claimed it was just a stunt, and added that he truly regretted causing $15 million worth of damage: the estimated amount of carnage his worm left behind.
Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act but only had community service and a fine as his penalty. The defense for such a light sentence was that Morris’ worm didn’t destroy the actual contents of affected computers. Morris now works in the department of Electrical Engineering and Computer Science at Massachusetts Institute of Technology (MIT).

6. Michael Calce (MafiaBoy)


Michael Calce (MafiaBoy)
In February of 2000, Michael Calce launched a series of widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup, TNT. In 2001, the Montreal Youth Court sentenced Calce to eight months of open custody, one year of probation, restricted use of the Internet, and a minimal fine.

5. David Smith

David Smith
Smith’s fame is due to being the author of the infamous e-mail virus, Melissa. Smith claims that the Melissa virus was never intended to cause harm, but its simple means of propagation (each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world. Smith’s virus takes an unusual turn in that it was originally hidden in a file that contained passwords to 80 well-known pornography websites. The name Melissa was derived from a lap dancer Smith met while on a trip in Florida. Even though over 60,000 email viruses have been discovered, Smith is the only person to go to federal prison in the United States for sending one.

4. Adrian Lamo


Nicknamed “the homeless hacker,” Adrian Lamo used coffee shops, libraries and internet cafés as his locations for hacking. Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo’s arrest was issued, followed by a 15-month investigation by federal prosecutors in New York.
After several days in hiding, he finally surrendered to the US Marshals, and then to the FBI. Lamo was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.

3.George Hotz


George Hotz
The name of the acclaimed jailbreak artist, George Hotz, will forever be associated with the April 2011 PlayStation breach. Being one of the first hackers ever to jailbreak the Sony PlayStation 3, Hotz found himself in the midst of a very relentless, public and messy court battle with Sony – perhaps worsened by Hotz’s public release of his jail breaking methods. In a stated retaliation to Sony’s gap of the unstated rules of jail breaking – never prosecute – the hacker group Anonymous attacked Sony in what would be the dubbed as the most costly security break of all time to date.
Hackers broke into the PlayStation Network and stole personal information of some 77 million users. However, Hotz denied any responsibility for the attack, and added “Running homebrew and exploring security on your devices is cool; hacking into someone else’s server and stealing databases of user info. is not cool.”

2. Jonathan James (c0mrade)


Jonathan James (c0mrade)
Jonathan James, 16-year-old black hat hacker, became the first juvenile imprisoned for cybercrime in the United States. James gained his notoriety by implementing a series of successful intrusions into various systems. At an amazingly young age of 15, James specialized in hacking high-profile government systems such as NASA and the Department of Defense. He was reported to have stolen software worth over $1.7 million. He also hacked into the Defense Threat Reduction Agency and intercepted over 3,000 highly secretive messages passing to and from the DTRA employees, while collecting many usernames and passwords.
On May 18, 2008, at the age of 25, James committed suicide using a gun. The words in his suicide note provide some insight into this obviously brilliant but troubled youth who thought he would be a scapegoat and blamed for cyber crimes he did not commit: “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

1. Gary McKinnon

Gary McKinnon
In 2002, an exceptionally odd message appeared on a US  Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon.
McKinnon suffers from Asperger’s syndrome, which is the least severe form of autism. The symptoms of Asperger’s syndrome certainly match Gary’s actions: that is, highly intelligent with an exceptional understanding of complex systems. Though sufferers often have difficulty reading social cues and acknowledging the impact of their often-obsessive behavior, they tend to be geniuses in one particular subject. For Gary, it was computers.
Gary has been accused of executing the largest ever hack of United States government computer networks — including Army, Air Force, Navy and NASA systems. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.

+ Kevin Mitnick


Kevin mitnick
Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988.
According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.
Unknown Web Developer

Friday 28 November 2014

10 Must Know Useful Android Tips And Tricks


Whether you are a newbie for android and eager to try out every available option you see on the screen, or familiar with the system, including the annoyances that plague you on a daily basis, tips and tricks to get around a system is always helpful. I am here to help you with that.
Android Tips And Tricks You Should Know
In this post, I will be featuring 10 Awesome and use android tips and trick that may improve your experience while using your Android device. Do note that the steps may vary a little from one Android phone to another due to the differences in the build and the OS version and also sometimes from mobile-to-mobile, but if you play around with it, the next step isn't too far off.

1. Disable App Notifications

If you are tired up by annoying app notifications that just keep coming and If you don’t know already, these app notifications also drain your phone’s battery. If you want to turn them off, and you are on Jelly Bean 4.1 and above, here’s how you can do it:
  1. On any of your unwanted notifications in your notification bar, long press on the notification for a message box to appear.
  2. Tap on App Info > Untick Show Notifications > OK.
Disable App Notifications

2. Disable Mobile Data

Whenever you don’t need to stay connected with internet, disabling the Mobile Data can help you keep your smartphone battery from draining too quickly and can also increase your battery life. Turning off mobile data is as easy as:
  1. Going to Settings > Data Usage.
  2. Disable Mobile data by toggling the setting from ON to OFF.
Disable Mobile Data

3. Set Mobile Data Limit

If you want to keep track of how far your usage is from your monthly mobile data limit? If you have ICS and above, there is a feature which lets you keep track of how much of the quota you have left. Its easy , just follow the steps below : 
  1. Head over to Settings > Data Usage.
  2. Set your data limit by dragging the orange line to reflect your monthly quota.
  3. Set your data usage cycle based on when your "month" starts and ends, and you’re done.
You will be alerted once you hit the limit you have set. Note that the tracked data usage of your phone may vary slightly than your carrier’s tracking.
Set Mobile Data Limit

4. Add Multiple Google Accounts

You need a Google account to use an Android phone but did you know you can choose to run more than one Google account on your Android device. This is convenient if you use more than one account for several of your Google services. To add multiple Google accounts follow these steps:
  1. Go to Settings > Add account.
  2. Select Google and setup your New or Existing Google account.
  3. Once added, choose what you want to sync with the account.
Repeat all the steps above if you want to add more accounts.
Add Multiple Google Accounts

5. Disable Automatic App Updates

Prefer to read through app permissions and manually pick which app updates to adopt? You can, but first you need to disable your automatic app updates. Here are the steps:
  1. Open Play Store and head over to Settings.
  2. Tap on Auto-update apps.
  3. Choose Do not auto-update apps.
If you want to enable the auto updates, follow the same path and choose Auto-update appsat any time or via Wi-Fi (available for certain Android devices only).
Disable automatic Apps Updates
To update your apps manually, just open Play Store, and on the main page swipe in from the left and tap on My apps. You can tap on apps with pending updates and update them manually, or if you like to update them all at once, just tap on Update All.

6. How To Check For Android System Updates

For Android users that are using stock ROM, you may want to look for new updates to your system. To check for updates:
  1. Go to Settings > About phone/tablet.
  2. Tap on System updates.
  3. Tap Check now to look for system updates.
Check For android System updates

7. Changing Default Apps

If you have already set some default apps for particular tasks (e.g. using Chrome for opening web links) but wish to change this:
  1. Go to Settings > Apps.
  2. Swipe right and look for the All tab.
  3. Select the app you want to remove as default.
  4. Tap on Clear defaults.
Changing Default Apps

8. Organize Homescreen Shortcuts With Folders

Once you have a lot of apps installed, your home-screen might be filled with app shortcuts. Unlike the app drawer, the apps on your home screen are not arranged alphabetically. So, you might want to create some folders for your homescreen shortcuts.
  1. Assuming you have more than a handful of shortcuts already on your homescreen, long press on any of the shortcuts and drag it onto another shortcut.
  2. A circle should now appear around the apps, indicating that a folder has been created.
  3. By tapping on the newly created folder, a mini window will pop up with your apps in it.
  4. You can drag and drop additional apps into the folder if you like. You can also rename the folder by tapping on the text area at the bottom of the mini window.
Organize Homescreen Shortcuts With Folders

9. Disable Animations

Here’s a tip on how to make your Android device run a bit smoother and faster: disable its animations. You will need to have access to Developer Options which can be found under Settings or About device.
Note: For some phones, you may need to go to Build number and tap on it repeatedly until you see "You are now a developer!". Developer options are now enabled.
Under enabled Developer options, look for Window animation scaleTransition animation scale, and Animator duration scale. Then, turn them off (disable) them one at a time.
Disable Animations

10. How To Turn Off Auto-Correction

Is it that you hate the fact that your phone is going English teacher mode on you? Turn off auto-correction for peace of mind when texting. Follow these steps:
  1. Go to Settings > Language & input.
  2. Tap on the settings icon next to the keyboard that you are using, e.g. Google Keyboard.
  3. Look for Auto-correction and tap on it.
  4. Select Off to turn auto-correction off.
Turn Off Auto-Correction

Unknown Web Developer

Tuesday 25 November 2014

Remote Screen sharing and conroling in windows without any software


Remote sharing is nowadays on its peak, people use remote sharing to provide live support or for sharing screens. Most of us always use third party software’s for sharing or controlling remote systems using software’s like Teamviewer or Radmin etc.  Today i am going to teach you guys how to connect any two or as many as windows PC through remote without using any third party tool like team viewer etc. So lets learn how to share screens without any third party tool.As we all knows Windows OS is  full of hidden programs that are only limited to developer or geeks. Today we are going to learn about MSRA (windows remote assistance) executable. MSRA is windows inbuilt remote assistance program using which you can control remote pc’s, share remote screens, provide remote support and much more. Lets learn how to use MSRA for remote sharing.

Steps to Share or Control Remote PC using MSRA:

1. First of all click on startup and type command “MSRA” and press enter as shown below:


Type msra in search option
Type msra in search option

2. Now you will see screen like below having title “Windows Remote Assistance” , there are two options displayed:
  • Invite someone you trust to help you : Choose this option if you want to share your screen with someone.
  • Help someone who invited you : Choose this option if you want to control someone others PC remotely.

Click on Option a “Invite someone you trust to help you” to share your screen:

invite someone to provide remote assistance
Select shown option to continue

Once you click the above option then you will see below panel with multiple options:


Options displayed for Windows remote assistance
Options displayed for Windows remote assistance

Now you can see three different options :
  • Send this invitation as file : On clicking this option you can save the invitation file and send it to anyone from which you require help. After saving the file another window will open containing the password. You have to provide that password to person whom you want to connect to your machine.
  • Use email to send an invitation: You can send invitation directly via email but it requires email client on your machine to send email like outlook etc.
  • Use Easy connect: Another method to directly connect two PC is using Easy connect but this require some basic settings at your routers end i.e. If the computer has IPv6 disabled or is behind a NAT router that blocks Teredo traffic, the Easy Connect option will be unavailable.

Now once you have send the  remote assistance invitation file to user, he can connect to your PC by double clicking the invitation file and then entering the password.

Note: You need to enable remote assistance service.

3. Help someone who invited you : By clicking this option you can provide help to anyone who has done the above task. You will need two things : Invitation file and password to connect remote PC.


Woohooo… Did you know there is another smart option by which you can directly connect to any PC using IP address? If not, well lets learn that too. Yup we can also provide windows remote assistance support using IP address too. Here are options.

1. First of all click on startup and type command “MSRA” and press enter.
2. Now you will see screen where two options are displayed, Select “Help someone who invited you”.
3. After that you will see some option, click on the bottom one “Advanced connection option for help desk” as shown below :


Select advanced connection option for help desk
Select advanced connection option for help desk
After clicking option you see below panel to enter IP address:


Enter IP address or computer name
Enter IP address or computer name
 
After entering IP address press Next to connect to IP address. That’s all.
Hope you all enjoyed the learning. If you have any queries ask me in form of comments.
Unknown Web Developer