Jahan Zaible Ghari

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 28 July 2013

How To Disable Right Click in Blogger(blogspot) or Webpage

Posted on 04:27 by Unknown

 Disable Right Click for blog


This post explains how to disable right click on blogger(blogspot) or any other webpage using a html(javascript) code.
It is so annoying if someone copies(thefts) your blog posts,articles,images and another kind of information owned by you saying that they are the original owners of the content.
But,I think 'disabling right click' is not the right solution for that.
Most people come to your site to read information and very small percentage of people come to your site to steal your work,images,etc.So,most people feel it insulting and I think it's very unprofessional thing to do
If you want to protect your images,my suggestion is to add a Watermark(logo) of your sitename,or your name on the images,pictures,etc.
Note:Using this javascript code,you only disable the right click by warning the visitors that the content is copyrighted.

How To Disable Right Click On Your Blog ?

 1. Got to your blogger Dashboard and then Click on Layout.
blogger widget

 2. Now Click on Add Gadget and select Html/Javascript.
blogger widget
 3. Now paste code given below in the pop up window.
 4. Copy the code from this file and paste it in that blogger widget.
 5. Save it and done. Now users will not be able to right click on your website.  5. If you like to disable mouse on your computer then check out tutorial given below.
  • Disable Mouse On Your Computer
Read More
Posted in Tricks | No comments

Free Router Simulator Softwares

Posted on 04:13 by Unknown
If you are going to take a networking exam like CCNA, CCNP… it is better to practice with real routers. But when the budget is not big enough or you can only access to hardware in your school then router simulator softwares are the best things you can get for free. The followings are a number of free and popular router simulators you can download and practice with:
GNS3 – GNS3 is a graphical network simulator that allows simulation of complex networks. It is an excellent complementary tool to real labs for Cisco network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP or CCIE. This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X.
Screen shots:

 gns3.jpg
Packet Tracer – Packet Tracer 5.0 is the latest version of Cisco Networking Academy’s comprehensive networking technology teaching and learning software. Innovative features of Packet Tracer 5.0, including powerful simulation, visualization, authoring, assessment, and collaboration capabilities, will help students and teachers collaborate, solve problems, and learn concepts in an engaging and dynamic social environment. Moreover, it’s totally free! You can download this software but you need toregister first or you can find a mirror download with google (with keyword “download packet tracer”)
Screen shots:
Packet_Tracer_Main_Interface
Packet_Tracer_CLI_Interface
Packet_Tracer_Back_Interface
SemSim – The free trial version (2.3MB) offers some CCNA exam router simulation labs & 20 flash cards
Screen shots:
CCNA_Lab_semsim_1
CCNA_Lab_semsim_2
Boson NetSim – Boson offers three certification-focused products, NetSim for CCENT 7.0, NetSim for CCNA 7.0 and NetSim for CCNP 7.0. The NetSim for CCNA 7.0 product contains CCNA-specific lab exercises that cover the skill set you will need to prepare for your CCNA exam. The demo version (21.58MB) is a good choice to get started.
Screen shots:
boson_netsim_1
boson_netsim_2
boson_netsim_3
CertExams offers advanced network simulators including router / switch / terminal simulator. The simulators help in preparing for networking exams such as ccna or jncia. It would also be very helpful for those who want to get started with configuring Cisco or Juniper routers in a simulated environment. The demo version (6.95MB) is limited to:
- Six lab exercises
- Router simulator is limited to User EXEC, Previleged EXEC, and Global Configuration mode commands.
Screenshots:
certexam_router_simulator_1
certexam_router_simulator_2

RouterSim’s CCNA Network Visualizer – You can design, build and configure your own network. The demo version is 44.49MB. It is ideal for:
- Anyone studying for the Cisco® CCNA™ 640-802 exam
- Deployment over a LAN network
- Distance education and deployment on a Citrix server or Microsoft Terminal Services
- Corporate trainers and employees
- Students at colleges, universities, and technical institutes
Screen shots:
routersim_screenshot_1
routersim_screenshot_2
-->
Read More
Posted in CCNA | No comments

Saturday, 27 July 2013

Six Tips for protecting Wireless Networks-Wi-Fi

Posted on 10:18 by Unknown

                                                                                                         With the growing presence of the technology, the number of satisfied people of
 Wi-Fi is rapidly growing. A growing number of users of mobile and cordless phones, as well as a number of laptop computers with embedded wireless adapters that allow connection to the internet where there are available network.
Wi-fi networks are quite useful, an easy target for hackers even when security features are activated. However, downloading and changing a few things will significantly reduce the chances your system to be successfully attacked by hackers.
1. Be informed how your wireless network work
In short, unlike wired networks, wireless network uses radio signals to transmit data. The signals are transmitted at different distances, depending on the components involved in network infrastructure. These signals could be taken by anyone who uses the right tools.
Wireless-Router-Network-Diagram
2. Second Change your SSID and the factory default password
Identification number – SSID, digital is the name of your network. To protect your wireless network, you first need to change the SSID name to something that would not you discovered that you are the owner of the network. If you have the opportunity through the hardware you are using off the option to transfer the SSID. Factory default password is a huge security problem for users because it is known to most hackers that lists factory default passwords are easy to find online. Change the password via software in your wireless hardware.
Wi-Fi network name SSID
3. Configure the MAC filter
Changing the SSID options without adding a MAC filter is just like changing the locks in your house and leaving the key in the lock. MAC (Media Access Control) is a filter which allows control of access to the wireless network. To enable access to the computer network, you need to add their MAC address in the software options available on the hardware you are using. The address consists of 12 numbers and serve to limit access to the network.
how-to-secure-wireless-network-mac filter
4. Encryption
There are several types of encryption protocols such as WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Encryption protocols work that way they encrypt data before being posted. If you have access to the encryption protocol, its activation and proper configuration is vital to your wireless network.
linksys-wpa2-security
5. Investing in additional software and Turn Firewall ON
Even with all the security configurations provided by the underlying hardware and software is still a great chance to your computer wireless network and be used by a hacker. By adding additional software or hardware  to protect wireless networks have the ability to better monitor and control the flow of information and traffic.
Router Schematic-WiFi-firewall
A “firewall” is designed to protect computers from intrusions and can be hardware-based or software-based. Wireless routers generally contain built-in firewalls, but sometimes they come with the firewall turned off. Be sure to check that the wireless router’s firewall is turned on.
6. Turn Network Name Broadcasting Off
Wireless routers may broadcast the name of the network ( SSID ) to the general public. This feature is often useful for businesses, libraries, hotels and restaurants that  offer wireless Internet access to customers, but it is usually unnecessary for a private wireless network. It is recommended that owners of home Wi-Fi networks turn this feature off.
Network Name SSID broadcast disable

- See more at: http://www.itadvicex.com/six-tips-for-protecting-wireless-networks-wi-fi/#sthash.GtXZWb9R.dpuf
Read More
Posted in Tricks | No comments

Useful Shortcut Keys For Facebook

Posted on 02:08 by Unknown
 facebook-shortcut



SHORTCUT KEY:- Here are Some useful Shortcut Keys For Facebook


New Message
Chrome:-   ALT + M
Firefox:-    SHIFT + ALT + M
Explorer :- ALT + M + ENTER

Search Shortcut
Chrome:-   ALT + ?
Firefox:-    SHIFT + ALT + ?
Explorer :- ALT + ? + ENTER

Home Page / News Feed
Chrome:-   ALT + 1
Firefox:-    SHIFT + ALT + 1
Explorer :- ALT + 1 + ENTER

Profile Page 
Chrome:-   ALT + 2
Firefox:-    SHIFT + ALT + 2
Explorer :- ALT + 2 + ENTER

Friend Request
Chrome:-   ALT + 3
Firefox:-    SHIFT + ALT + 3
Explorer :- ALT + 3 + ENTER

Message Shortcut
Chrome:-  ALT + 4
Firefox:-    SHIFT + ALT + 4
Explorer :- ALT + 4 + ENTER

Notifications
Chrome:-   ALT + 5
Firefox:-    SHIFT + ALT + 5
Explorer :-  ALT + 5 + ENTER

Account Setting
Chrome:   ALT + 6
Firefox:    SHIFT + ALT + 6
Explorer : ALT + 6 + ENTER

Privacy Setting
Chrome:-   ALT + 7
Firefox:-    SHIFT + ALT + 7
Explorer:-  ALT + 7 + ENTER

Facebook Official Page
Chrome:   ALT + 8
Firefox:    SHIFT + ALT + 8
Explorer : ALT + 8 + ENTER

Service Agreement
Chrome:-   ALT + 9
Firefox:-    SHIFT + ALT + 9
Explorer:-  ALT + 9 + ENTER

Help Center
Chrome:-  ALT + 0
Firefox:-   SHIFT + ALT + 0
Explorer:- ALT + 0 + ENTER
Read More
Posted in Tricks | No comments

How to Disable Startup Programs without any Software in Windows

Posted on 02:06 by Unknown
                            msconfig

Hi all users here a trick to disable all your Startup program without any Software
Follow my Instruction to Disable your unwanted Startup :-

1:-Press Window + R (start RUN)

2:-Type  msconfig in it

3:-A windows box(app) will open like pic above

4:-go to Startup section >Deselect Starting softwares  ,click apply and then ok ..Now all done

ENJOY ......
-->
Read More
Posted in Tricks | No comments

Windows Security Hacker Free Download

Posted on 01:13 by Unknown



Is Tool Say AP Window Ki Security Hack Kar Sakty Ho
Is Say Ap Explorer, System, Network, Dos K All Options Ko Disable And Enable Kar Sakty HO
Is Say Ap Logo Message B Change Kar Sakty Ho
Bus Click Karo Or Wo Option Disable Ya Enable Ho Jaye Ga

For Download Click On Download Button

                                                  
                               
                                     

Read More
Posted in Windows | No comments

Password Hacking Faq

Posted on 01:09 by Unknown

-->

Some of the password basics

 
Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the system, the user has to present a valid ID to use the system, followed by a password to use the account. Most systems either do not echo the password back on the screen as it is typed, or they print an asterisk in place of the real character.
On most systems,the password is typically ran through some type of algorithm to generate a hash. The hash is usually more than just a scrambled version of the original text that made up the password, it is usually a one-way hash. The one-way hash is a string of characters that cannot be reversed into its original text. You see, most systems do not “decrypt” the stored password during authentication, they store the one-way hash. During the login process, you supply an account and password. The password is ran through an algorithm that generates a one-way hash. This hash is compared to the hash stored on the system. If they are the same, it is assumed the proper password was supplied.
Cryptographically speaking, some algorithms are better than others at generating a one-way hash. The main operating systems we are covering here — NT, Netware, and Unix — all use an algorithm that has been made publically available and has been scrutinized to some degree.
To crack a password requires getting a copy of the one-way hash stored on the server, and then using the algorithm generate your own hash until you get a match. When you get a match, whatever word you used to generate your hash will allow you to log into that system. Since this can be rather time-consuming, automation is typically used. There are freeware password crackers available for NT, Netware, and Unix.
 

1. Why protect the hashes?

 
If the one-way hashes are not the password itself but a mathematical derivative, why should they be protected? Well, since the algorithm is already known, a password cracker could be used to simply encrypt the possible passwords and compare the one-way hashes until you get a match. There are two types of approaches to this — dictionary and brute force.
Usually the hashes are stored in a part of the system that has extra security to limit access from potential crackers.
 

2. What is a dictionary password cracker?

 
A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password.
Some of these dictionary crackers can “manipulate” each word in the wordlist by using filters. These rules/filters allow you to change “idiot” to “1d10t” and other advanced variations to get the most from a word list. The best known of these mutation filters are the rules that come with Crack (for Unix). These filtering rules are so popular they have been ported over to cracking software for NT.
If your dictionary cracker does not have manipulation rules, you can “pre-treat” the wordlist. There are plenty of wordlist manipulation tools that allow all kinds of ways to filter, expand, and alter wordlists. With a little careful planning, you can turn a small collection of wordlists into a very large and thorough list for dictionary crackers without those fancy word manipulations built in.
 

3. What is a brute force password cracker?

 
A brute force cracker simply tries all possible passwords until it gets the password. From a cracker perspective, this is usually very time consuming. However, given enough time and CPU power, the password eventually gets cracked.
Most modern brute force crackers allow a number of options to be specified, such as maximum password length or characters to brute force with.
 

4. Which method is best for cracking?

 
It really depends on your goal, the cracking software you have, and the operating system you are trying to crack. Let’s go through several scenarios.
If you remotely retrieved the password file through some system bug, your goal may be to simply get logged into that system. With the password file, you now have the user accounts and the hashes. A dictionary attack seems like the quickest method, as you may simply want access to the box. This is typical if you have a method of leveraging basic access to gain god status.
If you already have basic access and used this access to get the password file, maybe you have a particular account you wish to crack. While a couple of swipes with a dictionary cracker might help, brute force may be the way to go.
If your cracking software does both dictionary and brute force, and both are quite slow, you may just wish to kick off a brute force attack and then go about your day. By all means, we recommend a dictionary attack with a pre-treated wordlist first, followed up by brute force only on the accounts you really want the password to.
You should pre-treat your wordlists if the machine you are going to be cracking from bottlenecks more at the CPU than at the disk controller. For example, some slower computers with extremely fast drives make good candidates for large pre-treated wordlists, but if you have the CPU cycles to spare you might want to let the cracking program’s manipulation filters do their thing.
A lot of serious hackers have a large wordlist in both regular and pre-treated form to accommodate either need.
 

5. What is a salt?

 
To increase the overhead in cracking passwords, some algorithms employ salts to add further complexity and difficulty to the cracking of passwords. These salts are typically 2 to 8 bytes in length, and algorithmically introduced to further obfuscate the one-way hash. Of the major operating systems covered here, only NT does not use a salt. The specifics for salts for both Unix and Netware systems are covered in their individual password sections.
Historically, the way cracking has been done is to take a potential password, encrypt it and produce the hash, and then compare the result to each account in the password file. By adding a salt, you force the cracker to have to read the salt in and encrypt the potential password with each salt present in the password file. This increases the amount of time to break all of the passwords, although it is certainly no guarantee that the passwords can’t be cracked. Because of this most modern password crackers when dealing with salts do give the option of checking a specific account.
 

6. What are the dangers of cracking passwords?

 
The dangers are quite simple, and quite real. If you are caught with a password file you do not have legitimate access to, you are technically in possession of stolen property in the eyes of the law. For this reason, some hackers like to run the cracking on someone else’s systems, thereby limiting their liability. I would only recommend doing this on a system you have a legitimate or well-established account on if you wish to keep a good eye on things, but perhaps have a way of running the cracking software under a different account than your own. This way, if the cracking is discovered (as it often is — cracking is fairly CPU-intensive), it looks to belong to someone else. Obviously, you would want to run this under system adminstrator priviledges as you may have a bit more control, such as assigning lower priority to the cracking software, and hiding the results (making it less obvious to the real administrator).
Being on a system you have legit access to also allows you better access to check on the progress. Of course, if it is known you are a hacker, you’ll still be the first to be blamed whether the cracking software is yours or not!
Running the cracking software in the privacy of your own home has the advantage of allowing you to throw any and all computing power you have at your disposal at a password, but if caught (say you get raided) then there is little doubt whose cracking job is running. However, there are a couple of things you can do to protect yourself: encrypt your files. Only decrypt them when you are viewing them, and wipe and/or encrypt them back after you are done viewing them.
 

7. Is there any way I can open a password-protected Microsoft Office document?

 
Certainly! There are plenty of commercial programs that will do this, but we give props to Elcomsoft. 30-day trial versions are available here.
Read More
Posted in Hacking | No comments

Hack Facebook Password

Posted on 01:08 by Unknown




Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service.
However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.








Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are nothing more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them.
I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains 100% undetected!
 
Here is a summary of benefits that you will receive with Sniperspy:
 
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
 
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
 
3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.
 
4. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
 
5. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
 

How it Works?


 


Since the deployment module is very small in size (81 kb), you can easily drop it onto a word document, image or any other file and send it as an email attachment. This makes the process stealth and the target user will have nothing to suspect. Once they open the attachment, SniperSpy will install silently and the monitoring process will begin.
You can login to your secure control panel from any browser and start viewing the logs to get the password!
So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!



 


What the Target User Uses his/her CELL PHONE to Access Emails?
 
In this case, you will have to use a spy software that works on Cell Phones and mobile devices. The following is one of my favorite software to spy on cell phones:

 SpyBubble is one of the most advanced mobile spy software to track and monitor cell phones.
SpyBubble will allow you to log in from any computer and spy on any smart phone in real time.
 
 
With SpyBubble you can Track Calls, Record SMS & Emails, Know GPS locationsof the target user and more.
Supported Phones: Supports BlackBerry, Android, Symbian, iPhone and Windows Mobile.
So, what are you waiting for? Go grab SpyBubble now to expose the truth:


2. Phishing – The Difficult Way

 
The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofeed webpage) which will exactly resemble the original one. Say for example, a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.
Most Internet users would easily fall prey to such online phishing scams. Thus phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Hence it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers to hack Facebook password since it is the easiest and the safest way.
 

Facebook Hacking Methods that Do Not Work! 

 
Today, there are hundreds of scam websites out there that are waiting to rip off your pockets by making false promises. These websites claim to be the experts in the field of hacking and boast to instantly obtain any password for you. Most people fall victim to these websites and lose their hard earned money. Thus the idea behind this post is to expose the truth behind hacking the Facebook (or any email password) so that you can learn how to do it for yourself and stay away from all those scam websites. The following are some of the hacking methods that actually do not work:
1. Many scam websites claim to exploit a certain vulnerability of Facebook website as a means to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. I advise you to stay away from such scam websites.
2. There is no ready-made software program that is available to hack Facebook password except the keylogger (spy software). In fact, keyloggers are pretty generic and meant to record the keystrokes of a computer which obviously includes the password also. Keep in mind that apart from the keylogger, there is no such program that is specifically designed to gain access to Facebook accounts. Stay away from any website that claim to sell such program.
3. Beware! On many websites and Internet forums you will often see fake articles about Facebook hacking. Most of them will tell you something like this: “you need to send an email to passwordretrieve@facebook.com along with your usernameand password” (or something similar). Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.
I hope this post will help you avoid scams and choose the right approach to accomplish your goal.
-->
Read More
Posted in Hacking | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Windows 8 shortcuts: Keyboard Shortcuts-1
    List of Windows 8 Shortcuts Have you tried Microsoft’s latest Operating system Windows 8 yet? If you already tried, then you’ll find a huge ...
  • Facebook Auto Liker Without Access Token
    AUTO LIKER SITE http://fb-auto-posts-liker.blogspot.com/ Friends.... Now u can use the World's 1st Facebook Auto-Liker Without Access To...
  • Six Tips for protecting Wireless Networks-Wi-Fi
                                                                                                             With the growing presence of the te...
  • Windows Defender Free Download
    Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and ...
  • How to Hack My Space Hacking
    MySpace being one of the world’s largest social networks, has become today a favorite place for many to maintain secret relationships and ex...
  • Free Router Simulator Softwares
    If you are going to take a networking exam like CCNA, CCNP… it is better to practice with real routers. But when the budget is not big enoug...
  • WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8 Free Download
    WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8                                   Microsoft Corporation - 311KB (Freeware) Windows Media Player ...
  • Hacking Gmail account using GX cookie
    Introduction Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attem...
  • Windows 7 Ultimate Highly Compressed in 10 Mb Only Free Download
    Win dows 7 Ultimate is the most versatile and powerful edition of Windows 7. It is including the ability to run many Windows XP productivity...
  • Total PDF Converter 2.1.233 + Key Free Download
    Total PDF Converter 2.1.233 + Key Total PDF Converter converts PDF files to HTML, DOC (Word), text, Excel, PostScript, CSV or image files (e...

Categories

  • Android
  • AntiVirus
  • Audio and video Players
  • Auto Cad
  • C/C++
  • CCNA
  • Converters
  • Facebook Auto Liker
  • Hacking
  • Inpage
  • Locks
  • Media players
  • MS Office
  • Nokia
  • photo Editors
  • Recovery
  • Recovery.
  • Sites Unblocker
  • Social Network
  • Softwares
  • Tricks
  • Typing Tutors
  • Ufone
  • UniversalDrivers
  • Video Editings
  • Visual Studio
  • Wifi
  • Windows

Blog Archive

  • ▼  2013 (166)
    • ►  October (1)
    • ►  August (31)
    • ▼  July (45)
      • How To Disable Right Click in Blogger(blogspot) or...
      • Free Router Simulator Softwares
      • Six Tips for protecting Wireless Networks-Wi-Fi
      • Useful Shortcut Keys For Facebook
      • How to Disable Startup Programs without any Softwa...
      • Windows Security Hacker Free Download
      • Password Hacking Faq
      • Hack Facebook Password
      • How to Hack Windows administrator password
      • How to Hack My Space Hacking
      • Desktop Phishing Tutorial - The Art of Phishing
      • Hackers compromised cPanel's proxy server used by ...
      • Fern wifi Cracker- A Wireless Penetration Testing ...
      • XSS EXPLOITS
      • Worm Attacks | Your Fb Account Can Be Hacked
      • Top 5 Computer Hackers Ever
      • Collection of All Google Tricks
      • Top 5 Computer Programmers in the World
      • Hacking Gmail account using GX cookie
      • Get Any Microsoft Products for FREE!!
      • TRACING An IP
      • How to Hack Email Account with Cookie stealing [Fo...
      • Hacking Single Player Games
      • Interesting Hacking Quotes
      • Hidden Features Of Format Factory
      • How To Check All System Configuration
      • A History About Hacking [Inforgraphic]
      • Top 10 Hollywood Movies About Hacking
      • Trick to find facebook Profile ID
      • Hack Facebook Account
      • Hacking Google maps and google Earth
      • How to become Worlds No 1 Hacker
      • Get password behind asterisks
      • How to view saved password in google chrome
      • Shocking Facts about Facebook Creator Mark Zuckerb...
      • Windows Security Hacker Free Download
      • How to Hack Windows administrator password
      • CHANGE YOUR DRIVES BACK GROUND
      • Find Your Missing USB Drive in Windows XP
      • How to Increase Virtual Memory and Boost Computer ...
      • Top 10 Windows 8 Tips And Tricks
      • AutoCAD 2007 with Crack Free Download Full Version
      • Autocad 2013 Download Full Version Free Download
      • Cisco Packet Tracer 5.3.3
      • Unity 4.1.5 Free Download`
    • ►  May (3)
    • ►  April (3)
    • ►  February (13)
    • ►  January (70)
Powered by Blogger.

About Me

Unknown
View my complete profile