Scam: 'See who viewed your Facebook profile'!

Scam: 'See who viewed your Facebook profile'!


Many of us are quite curious to know who viewed our Facebook profile. However, unfortunately scammers too are aware of this, and use the lure of such functionality as a way to trick users.

And, one such scam is again prowling on Facebook having claimed thousands of victims. The rogue application is spreading virally among Facebook users pretending to offer them a way of seeing who has viewed their profile.

According to security firm Sophos, "Messages spreading rapidly across the Facebook social network right now say: OMG OMG OMG... I can't believe this actually works! Now you really can see who viewed your profile!"

Google Earth 6: Everything you need to know

Google Earth 6: Everything you need to know

Google
Google has announced the release of Google Earth 6. The latest version is available for Windows, OS X and Linux. The update that follows Google Earth 5.2 release earlier this year adds three major updates to the virtual geographical tool.

Here's looking into what the latest update includes:

Top 10 things that SHE doesn’t want to hear-must read thing :D

Top 10 things that SHE doesn't want to hear
 
You look a bit fat in that dress
Now which girl would like you telling her that she is looking fat. A statement like this will definitely have you spending the night on the couch.

Your mom looks like she's your younger sister
Yes, girls love their mom, but don't ever do the mistake of comparing them, especially in the looks department. You won't score any brownie points by doing this.

I have the best time with my friends
You may enjoy hanging out with your friends, but that doesn't mean you say that to her on her face. Sometimes it's best to be diplomatic.

I can't go out because I want to watch a match
Unless your girlfriend is a sports buff don't give her this excuse very often.

You remind me of my ex
That's the worst thing you could say to your girlfriend. She will always be left wondering if you got into the relationship only because she is a mirror image of your ex.

My mom is the best cook
Women take great pride in their culinary skills. So don't ever claim that your mom cooks better than any woman in the world. You may just have to put up with burnt food for the rest of the week.

I don't like your friends
Like you love hanging out with your friends, your girlfriend loves her friends. Don't make your dislike for them so obvious. Friends can influence your girl to a great extent, so make sure you are in their good books.

Why do you spend so much on beauty treatments?
Don't question your girlfriend spending long hours in the beauty parlour. If you like to spend time playing football and getting dirty then she'd like to spend her time getting pretty. Accept it!

Wow! That girl is hot
Whether it's Priyanka Chopra or Angelina Jolie or just some random girl on the road, never ogle at a woman openly in front of your girl.

I need some space
If you feel the need for space try and suggest it in a subtle manner. Being far to open about it may leave you with too much space and no gf.

How to hack a web address and redirect to our own web address using notepad

How to hack a web address and redirect to our own web address

A simple text file edit makes sites redirect to another web address. When you type address in address bar in any browser and enter it then it will display another web page, for example:- when you type Google.com you will be redirected to Yahoo.com

Top 15 Hacking softwares-Download with key


Download Top 15 Security Hacking Software



1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnera

China directed Google hacking: WikiLeaks

China directed Google hacking: WikiLeaks

The United States believes that Chinese authorities orchestrated a hacking campaign into computers of Google and Western governments, according to leaked documents cited Sunday by The New York Times.

The secret cables obtained by whistleblower site WikiLeaks said that China's Politburo directed the hacking. It cited a cable from the US embassy in Beijing, which mentioned information from "a Chinese contact."

How to Clone Hard Drives

How to Clone Hard Drives

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

How To Hide Your Files In a JPEG-using WinRAR

How To Hide Your Files In a JPEG

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.

All Google Hacking Keywords-The Complete Collection

Google Hacking Keywords-The Complete Collection

It's not so hard, you just type 1 of these lines into the search bar at www.google.com. Then you'll get several links with secret information about different hompages, for example: admin passwords for ftps, ventrilo servers etc.



"admin account info" filetype:log

!Host=*.* intext:enc_UserPassword=* ext:pcf

Hack Sify Account For Free Internet

How to Hack Sify Account For Free Internet !

Only sify users

U need are a few utilities like angry ip scanner and a Mac Address changer like Gentle Mac Pro. What you got to do fist is scan your ip range and see who all are online then get their mac address. Then use Gentle Mac Pro and change your ip and mac address to some one who is logged on and Bingo you surfing the net for Free. Here are the Link's

How to increase your "Page Hits" using a simple batch file- Best SEO tips

Page hits flooder
Increasing page views of your websites.
This small program can flood ur page hits, but you have to dedicate one browser for it.. like internet explorer

Create Your Own Movies with Xtranormal

Create Your Own Movies with Xtranormal

As always when I watch something clever and creative like that, I found myself wishing for the tools to produce my own little movie (and the hours of necessary free time--but that's another matter).
Text-to-Movie: Click to view larger image.
Turns out the tools are available (and free!) in the form of Xtranormal Text-to-Movie, a simplistic but versatile moviemaking system that runs ent

Sign Into Multiple Google Accounts Simultaneously

Sign Into Multiple Google Accounts Simultaneously

Do you have more than one Google (or Gmail) account? If so, you've undoubtedly encountered the hassle of juggling them in your browser. You have to sign out of one in order to sign into another, and on and on. Major pain.

There were workarounds in the form of the Firefox add-ons, Greasemonkey scripts, and the like, but they were still something of a hassle. (Some people would even open different accounts in different browsers: one in Firefox, another in IE, a third in Chrome, and so on.)

Well, no more--Google's new "multiple sign-in" feature lets you access multiple accounts simultaneously in one browser.

Just sign into your Google Account, access the Account Management page,

Top 25 Worst High-Tech Habits and How to Fix Them

We present to you our 25 worst high-tech habits.



1. Avoiding Security Software

So you thought you could get by without antimalware utilities, just by being mindful of what Web links you click and what e-mail you open. How's that working out for ya? Use something--anything--to protect your PC from the bad guys, who are happy to have you as a target. You can even start with free antivirus software.



2. Failing to Back Up Your Computer

The funny thing about people who admit that they don't back up is that they always preface it by saying, "I know it's bad, but..." Listen: All hard drives crash eventually. All of them. Yours will, too. For help, see our simple guide to getting started with backup.



3. Neglecting Offsite Backup

A thief breaks into your apartment and steals your laptop. No problem: You just backed it up last night. Oh, wait, he stole your backup drive too, because it was sitting right next to the laptop. Store your data in

Top 5 Websites That Used to Rule the Internet

Top 5 Websites That Used to Rule the Internet

The Internet generation is stunningly disloyal. Brands mean very little to us. Our parents might never have bought anything other than a Ford car, or a Westinghouse refrigerator, but we switch online services without a second thought. So join me as I take a look at five Websites that, once upon a time, we simply couldn't live without, but which are either no longer with us, or have perhaps seen better days

1. GeoCities


Once of the original Internet startups created back in 1995, GeoCities offered everybody their very own homepage. Although HTML at the time was pretty easy to master, GeoCities offered tools that made creating pages a matter of a few clicks. And it was all free. Just about anybody could create a Website using GeoCities. Sadly, nearly everybody did. It became clear that graphic design skills are not a dominant characteristic among the American population. Most pages looked like somebody had taken a load of animated GIFs, put a stick of lit dynamite under them, and retired to a safe distance.

GeoCities' gimmick was to build its online community around a geographical location model. Pages of a supposedly financial orientation would end-up under the WallStreet heading, for example, while celebrity gossip would end up in the Hollywood section.

This was a potent concept back in 1999, weak as it might sound today--so much so that GeoCities claimed one third of all Web visitors as the 20th century came to a close. Then again, AOL accounted for even more at the time, so you have to question our priorities back then.

So what happened to GeoCities? Yahoo. Conditions and rules were imposed to tame what was turning into the wild west of the Internet; in the late 90s and early 00s, searching for illegal stuff, such as pirated software or dodgy MP3s, would invariably lead to a GeoCities page. The ease of creating pages had turned into a hindrance. Policing so many pages was a logistical nightmare.

But, most of all, the Internet simply moved on. Fashions changed. Blogs and wikis came along, and it just wasn't cool any longer to have a static home page. Home pages belonged to an era of 14-inch monitors and floppy diskettes.

In 2009, Yahoo! discontinued GeoCities, although--like many of the best things in life--it's available in Japan. Its demise was greeted with dismay.

Several commentators suggested that GeoCities was the first example of how it's impossible for an online service to make money. But we must never forget how important GeoCities was in the evolution of the Internet. It showed people were willing to express themselves online. It proved the Internet was first and foremost a community. And it was the best place to find dodgy MP3s.

 
 
 
2. MySpace
 


Somebody transported in time from 1999 might be forgiven for thinking that MySpace was GeoCities' natural successor. They would have a point. Home pages are replaced with MySpace Profiles, and the whole thing is glued together via a social networking overlay, but there are distinct similarities.

In particular, the same eye-scratching,

"MOBILE NUMBER PORTABILITY"-Everything you need to know

"MOBILE NUMBER PORTABILITY"


Telecom minister Kapil Sibal on Thursday will unveil mobile number portability in Haryana, allowing 18 million cellphone users in the state to retain their number while changing the service provider. Most of the country will have this facility by the New Year, while it will be available throughout the country by March 2011.

Step 1
Send an SMS to 1900 in following format: PORT - eg. PORT 9999999999

Truth Revealed - Making of a Hollywood movie-Shocking pics

How do they do it-Making a Hollywood movie


http://2.bp.blogspot.com/_Fzq94YVbHHM/TG15-p5IdwI/AAAAAAAA3qA/XaxVp0GRVYU/s400/unnatural_nature_01.jpg
http://4.bp.blogspot.com/_Fzq94YVbHHM/TG15-PyMDeI/AAAAAAAA3p4/Pq87qyFv0RQ/s400/unnatural_nature_02.jpg

"Google and Facebook have begun to chip away at its principles"-Tim Berners Lee

"Google and Facebook have begun to chip away at its principles"-Tim Berners Lee

Facebook, LinkedIn and other social networking sites represent "one of several threats" to the future of the world wide web, its founder, Sir Tim Berners-Lee has warned. Some of the web's "most successful inhabitants", such as Facebook and large telecoms companies, have begun to "chip away" at its founding principles, Berners-Lee wrote in a Scientific American journal essay published today. "The web evolved into a powerful, ubiquitous tool because it was built on egalitarian principles," he said. "The web as we know it, however, is being threatened in different ways. Some of its most successful inhabitants have begun to chip away at its principles."

He added: "The more you enter, the more you become locked in. Your social networking site becomes a central platform – a closed silo of content, and one that does not give you full control over your information in it. "The more this kind of architecture gains widespread use, the more the web becomes fragmented, and the less we enjoy a single, universal information space." Berners-Lee also

A new phone from Google could replace credit credits at the register

A new phone from Google could replace credit credits at the register

eric schmidt
Google CEO Eric Schmidt holds up a phone that people will be able to use to pay for purchases




THE GIST                 
  • A new phone from Google will contain a near-field communication chip.
  • The technology will allow a person to tap her phone to a device at the check-out register in order to pay for purchases.
  • Google thinks the phone could replace credit cards.

A new Google mobile phone imbedded with a chip that makes it a virtual wallet so people can "tap and pay" is poised to make its debut, the Internet giant's chief said. The successor to the Internet firm's Nexus One smartphone runs on fresh "Gingerbread" software and is imbedded with a near-field communication chip for financial transactions, according to Google chief executive Eric Schmidt.

"I have here an unannounced product that I carry around with

How to remember TOO Many PASSWORDS

How to remember TOO Many PASSWORDS???

Now a days, most of us have at least 100 IDs and passwords, and is looking for ways to remember or manage them, right? Here is the solution.

Password
Can you keep track of all your passwords? Photograph: Alexander Fediachov/Alamy

I keep an alphabetical list in a little black book, partly because I have more trouble remembering which log-on I used than remembering the password. This is a function of having used four different email addresses over the past 20 years, as well as having different IDs for some different purposes. It's a reasonably safe approach because I don't write down the actual IDs or passwords, just a few letters to remind me which ones I used, and it never leaves my private office.

The first thing to do is to decide which are your really important sites. Examples could include your email and Facebook addresses, Amazon, anything to do with banking, and so on. These five or six sites should have passwords that are unique, hard to guess, and unrelated to one another. One way to remember these passwords is to create a little picture for yourself, based on the site's associations.

You should not re-use the same password even for the less important sites. However, you can devise a personal system that creates hard-to-guess passwords that you know how to reconstruct. One example is to use the initial letters of a line from a popular song. This would give you a string such as MRwtam (Moon River, wider than a mile) which is impervious to a standard "dictionary attack". Into the middle of this

Everything you need to know about USB 3.0

Everything you need to know about USB 3.0

SuperSpeed USB
SuperSpeed USB ... it is coming. Eventually. WIll it be worth the wait?
It looks as though USB 3.0 will not become ubiquitous until Intel adds support to its standard chip sets, and we don't know when that will happen. All we have to go on is a recent item from Taiwan's DigiTimes, which said Intel planned to support USB 3.0 in a forthcoming laptop platform codenamed Chief River, with chips being released to manufacturers around September 2011.

Intel's next laptop platform is codenamed Huron River, and

The infamous website E-petitions shelved

The infamous website E-petitions shelved



Martha Lane Fox
British business entrepreneur Martha Lane Fox Photograph: Teri Pengilley for the Guardian


David Cameron often speaks about openness in government, but a Downing Street innovation to encourage greater public participation has been quietly shelved. Officially, the infamous No 10 e-petitions website, launched by the previous government, is under review.

Technology giant Google to delete Street View data

Technology giant Google to delete Street View data



Google Street View London
Google Street View car in London. Photograph: Harold Cunningham/Getty Images

Google is to delete the sensitive information – including full emails and passwords – it illegally captured from Wi-Fi networks when its Street View cars mapped the UK's towns and cities.


The technology giant has signed a commitment (PDF) to improve its data handling following the

Happy 25th Birthday Microsoft Windows

Happy 25th Birthday Microsoft Windows

It was 25 years ago today that Microsoft released Windows 1.0. The world’s most popular operating system has gone through a number of versions since then, and the next iteration, Windows 8, is expected within 2 years.

Windows 1.0
TheHackingArena.blogspot.com

At the time it launched, Windows() actually wasn’t a full operating system. Rather, it was a graphical user interface (GUI) that ran on top of DOS. Microsoft Chairman Bill Gates said at launch that Windows 1.0, which carried a suggested retail price of $99 in 1985, was “unique software” that would

How To Remove and Add Right-Click Menu Items from Files and Folders

How To Remove and Add Right-Click Menu Items from Files and Folders

Removing Items

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!

Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.

For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means

How To Add A Url Address Bar To The Taskbar

How To Add A Url Address Bar To The Taskbar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

How to delete An "UNDeletable" File

How to Delete An "undeletable" File

  1. Open a Command Prompt window and leave it open.
  2. Close all open programs.
  3. Click Start, Run and enter TASKMGR.EXE
  4. Go to the Processes tab and End Process on Explorer.exe.

How to Make Invisible Password Protected Folder

How to Make Invisible Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How To Hide Partitions Without Using Any Software

How To Hide Partitions Without Using Any Software
Here is a very cool and simple trick to hide any partition of our hard drive on computer. Many times we will think of hiding some confidential data form others.I have shown two easy methods to hide partitions without using any software.
Hide Partitions Using Command Prompt

1. Go to Start–>Run.

Game Boost

GameBoost - program your computer's settings for his best work during the games and surfing the Internet. GameBoost is based on the programs GameGain and Throttle. The utility, which optimizes your computer for maximum performance in online games and internet connection. Made changes to the registry and system files to enhance memory performance, image rendering, animation, speed Internet connections. All changes are made in

Everything you need to know about Facebook's new MESSAGING system


Facebook's much-speculated messaging service is here. CEO Mark Zuckerberg has termed the new system a "convergent" modern messaging system that "handles messages seamlessly across all the ways you want to communicate" in a single inbox.

Though as widely speculated the messaging system is not an email killer, it sure

How to Backup Facebook Data and Download

Now Facebook is supporting a good new feature! You can make backup all of your Facebook Photos, Links, informations, Wall Posts, Messages, Videos etc in a zip file and download it to save your Facebook data on your computer. So if you loose any of your Facebook contents, you can get them from saved backup file. Let's see how to do this job. 


1. Login to your Facebook account.


2. Now at the top right side, go to Account > Account Settings.

Facebook may announce e-mail service on Monday

Social networking site Facebook may announce its e-mail service as early as Monday, if online buzz is to be believed. The announcement of 'Project Titan' could see '@facebook.com' e-mail addresses being unveiled, an overhaul of the site's entire messaging system. No British event is planned, however, so it seems that the so-called "Gmail killer" may have a limited launch, if at all. TechCrunch has reported that the product may be limited at launch, while pointing to the significant potential of a service that integrates e-mail with Facebook's popular places, photos and events applications, reports the Telegraph. Unusually, Facebook has chosen not to use its Palo Alto headquarters for the launch. Instead, the event may be held at Web 2.0 Summit in San Francisco. According to social media news blog Mashable, Facebook's current messaging system is "difficult to manage. Users are unable to send messages outside of Facebook, and the system can't handle simple things like attachments and forwarding". "If Facebook really wants to take on Google, it needs to have a far more robust messaging system, akin to web-based

Real Hide IP 4.0.5.6 Full Version

Download Real Hide IP 4.0.5.6 Full Version (FREE)
Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Real Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Encrypt/Lock Computer Drives Or Pendrive In Windows 7



Encrypt/Lock Computer Drives Or Pendrive In Windows 7



Microsoft Bitlocker drive encryption is used to encrypt/lock any Local drive or removable drives like pendrives.Bitlocker encrypts the drives using 128 bit key.Once the drives are encrypted/locked it can only opened using the password.Microsoft introduced bitlocker encryption in windows vista.The bitlocker feature is currently available in Ultimate and Enterprise editions of windows 7 ,Vista as well as the Windows Server 2008 and Windows Server 2008 R2 .Bitlocker requires that your hard disk should have atleast two NTFS drives :One of the operating system and the other with a minimum size of 100 MB.

Hide Folders in Nokia / Java phones without software

Hide Folders in Nokia / Java phones without software


Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone without the need of any software.This trick can be used for phone from Nokia,Samsung,Motorola,LG or any other company.The only requirement is that your phone should support java which almost all mobile phones support now .
So,If your phone support java then here is the Trick Hide Folders in Nokia / Java phones without software
  1. Create any new folder or you can use any existing folder that is to be hidden.
  2. Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as images.jad

14 tips and tricks to buff up your Gmail skills

14 Tips and Tricks to buff up your Gmail skills


8. Back up your filters
Enable the Filter import/export Labs feature and you can back them up (and restore them) from the Filters tab under Settings.

9. Send blocked files
Gmail's anti-virus technology translates into this: it'll block any file with an EXE, OCX, BAT, COM or DLL extension, even if it's ZIPped up. You can bypass this simply by renaming the file extension to TXT, but don't forget to tell your recipient what you've done, and remember you'll be breaking Google's codes of conduct, so don't make a habit of it.
1
0. Drag and drop
Fancy using all that spare capacity on your Gmail account as a back-up drive? Windows users should install Gmail Drive, while Mac users should check out gDisk instead.

11. Import mail into Gmail
You've got two options here, both of which require you to enable IMAP access in Gmail (under Settings > Forwarding and POP/IMAP). First, import – if necessary – your mailboxes into Thunderbird and then use Gmail Loader.
Gmail loader
IMPORT EMAIL: Upload your Thunderbird mailboxes to your Gmail account quickly and easily
12. Transfer selected messages
If you only want to transfer selected messages without forwarding them, set up your Gmail account in IMAP mode alongside your existing accounts in a supported application (Outlook, Windows Live Mail or Thunderbird), and then simply drag and drop those messages you wish to upload into Gmail.
13. Use multiple Gmail signatures
GeekFG enables you to create multiple HTML signatures for different accounts or requirements. Each is stored as a bookmarklet which you just drag and drop on to the Compose mail window when you want to use it.
14. Custom Gmail signatures
Fancy creating a signature that adds the latest blog post from your site? Assuming your blog has a site feed set up, just download BlogSigs, which also works with Yahoo Mail, Hotmail and Outlook.
Blogsigs
PROMOTE YOUR BLOG: Add a link to your latest blog post to your email signature
-------------------------------------------------------------------------------------------------------



Gmail liberates you from your PC. Once you've set it up and redirected all your mail accounts to it , your email is no longer tied to a single PC. All you need is access to a secure web browser and you're in touch with everyone and everything.
Okay, so you've liberated yourself, but what next? Read on for 14 tips for more advanced users which can simplify how Gmail works and make it more powerful and useful.
1. Back up Gmail
Once you've been seduced by Gmail, it's easy to forget that your email is now inaccessible to you whenever you're offline. Plus, of course, there's no locally stored backup of your mail, however unlikely it is that Google will lose your mail.
If you're happy playing with the command line, and you want an unobtrusive way of backing up messages to your hard drive, check out LifeHacker's excellent guide.
2. Access Gmail offline
Alternatively, back up your Gmail and access it offline at the same time by using a compatible mail client, such as Windows Live Mail or Thunderbird – if you pick the latter, we recommend setting it up via IMAP, in which case you'll also need the Gmail Account Setup add-on.
Make sure your email client is configured to download the entire message and not just mail headers: in Thunderbird check the server settings of your Gmail account; in Windows

25 handy Google search tips and tricks

25 Handy Google search tips and tricks


The good thing about Google is that generally, you don't have to be too precise or bend over backwards to find things.
When you want something specific, though, or just can't find it the old-fashioned way, these tips will bring it right to your fingertips.
1. Add context
Simply typing in a search term is usually enough, but you can help Google along by adding a little more context to your query. The easiest way is with Boolean operators.
For instance, type fish+chips. The most common are + and – for adding and removing elements, but you can also use * as a wildcard, the tilde symbol (top left of your keyboard) for similar terms, and quotes to get only the "exact phrase you type". One that almost nobody uses is |, which means 'or'.
2. Search certain sites
Google doesn't have to look at the entire internet. By adding a 'site: clarification', you can point it to just one page (or, using an 'I' as well, multiple).

LinkWithin

The Hackers Arena