Sunday, November 6, 2011

Yahoo Messenger Password Hacker Cracker Stealer Breaker


Below post is for EDUCATIONAL PURPOSE ONLY. If you try to misuse it, you will have to pay heavy price like this person

http://blog.wired.com/27bstroke6/2008/10/fed-blotter-cha.html


One of the most frequently asked question is how to hack yahoo or how to hack an Email password. There are several programs known as keyloggers that can be used to hack yahoo or any other email password. Even though these softwares are not meant to hack yahoo or any other email passwords, they can still be used to hack yahoo passwords or passwords of any other email account.

There are number of sites which provide information to hack yahoo, hotmail etc.. So what’s special about this site? The only special about this site is that we do not bluff and mislead readers. We actually teach you how to track someone’s email password rather than telling some nonsense tricks to crack or hack someone’s yahoo email password for money.

One thing I’ll make clear. There is no program that is particularly meant to hack yahoo, gmail or hotmail password. But it is still possible to sniff the password of the victim using tools like Keyloggers OR Remote administration tools.


What is a keylogger?

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an email account if you have physical access to victim’s computer.

A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

1.   Where is the keylogger program available?

A keylogger program is widely available on the internet. Some of them are listed below

Win-Spy Monitor
Supreme Spy
ComputerGOD
Detective Dominator

There exists hundreds of such keyloggers available on the net. These are software keyloggers. There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data. These programs are none other than spyware! So use it

Windows XP Task Manager Disabled By Virus / Administrator



You will get task manager disabled message in following two circumstances:

1. When you right click on task bar

How to enable task manager in Windows Vista/ XP [Registry/regedit]



For Other Windows XP Home Version Users:

If you don't have Windows XP Professional, then you'll need to edit the registry manually.

Click Start, then click Run, type in regedit, and click on OK.

Expand these registry keys in turn:

• HKEY_CURRENT_USER
• Software
• Microsoft
• Windows
• CurrentVersion
• Policies
• System

You should see something similar to this:


How to disable task manager in Windows Vista/ XP [Group policy/gpedit]




• Select option Enabled and it will prevent users to monitor tasks and services running in the system.

Task ManagerPermanent Link:

How to disable task manager in Windows Vista/XP [Registry/RegEdit]




• In order for this to take effect, you may need to restart your system.


The next time anyone tries to call the Task Manager, they’ll see an error:


Hack Orkut Photos | Orkut Album Hack



Orkut has recently updated it’s security feature and disabled Right-click option on photos of friend’s album.

So this makes it difficult to copy / download photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.

So what to do now? Keep ReAdInG :)

Orkut Scrap Flooder | Orkut Scrapbook Flooding | Hacking Tricks



Orkut Scrapbook Trick: Tired of sending scraps multiple times? Check out following step-wise procedure to send large amount of scraps in less time span in Orkut -


1. Open your scrapbook or your friends scrapbook

2. Enter message in textbox (in Given Blank Area) which you want to flood in your scrapbook or friends scrapbook.

3. Copy below javascript code in Address bar of your scrapbook or your friends scrapbook and then press Enter.

After pressing Enter, your current page starts reloading again and again that means your orkut scrapbook flooder is working. Now if you want stop this flooder then just click on other link or just close that window and then check scrapbook. You will see so many scraps in Scrapbook.


Orkut Scrap Flooder Javascript Code:

i

Protect Orkut Account From Hacking


Normal user who are unaware of programming techniques can easily be victim of orkut account hacks. To avoid this follow the guidelines given below:

1.  Never try to login/access your Orkut account from sites other than Orkut.com.

2.  Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)

3.  Delete any links on your scrapbook, no matter if a known or unknown person have sent it.

4.  Never disclose your orkut login details with anyone.

5.  Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.

6.  Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.

7.  Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.

8.  Always remember to hit Sign Out button, when you are done.

Happy Orkutting !!!

OrkutPermanent Link:

Orkut Password Recovery | Solution For Hacked Orkut Account


If you have forgotten your orkut password or somebody hacked your orkut account, in such a case you can follow below instructions to recover your orkut password:

1.  Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password. This will not work if the other person has changed your secondary email address or if you no longer have access to that address.

2.  For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.

3.  For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form http://www.google.com/support/accounts/bin/request.py?hl

Orkut Fake Login Page | Orkut Phishing Technique


Check out the following steps to create fake login page for orkut:

1.  Download the fake page and need ed file from here…
http://rapidshare.com/files/174279263/orkut_fake_kanoor.rar

2.  Open kanoor.php with notepad

3.  Edit the line “$handler

Hack Orkut Account | Orkut Password Hacker Cracker Stealer Breaker



Below post is for EDUCATIONAL PURPOSE ONLY. If you try to misuse it, you will have to pay heavy price similar to this person

http://blog.wired.com/27bstroke6/2008/10/fed-blotter-cha.html

Google uses a 4 Level Orkut login which makes it difficult to hack orkut account:

First Level - Security-SSL or 128 bit secured connection

Second Level - Google account checks for cookie in the system of user

Third Level - Google provides a redirection to the entered User information

Fourth Level - Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manage to get access to other’s Orkut accounts. The question concerned is how they do it? Many of them just use simple tricks that fool users and then they themselves leak out their password.

Following are 6 orkut hacking methods:

1.  Phishing:

Like all other social networks, orkut is mainly hacked by Orkut phishers i.e. fake orkut login pages. Phishing is most favorite and can be said “easiest” way of hacking Orkut account passwords. What you have to do is simply send a link to fake Orkut login page (prepared by you) to victim and ask him to login to his Orkut account by fake Orkut login page (phisher). Once, he login to Orkut account using Orkut login Phisher, his Orkut account password is sent to you and thus, his account is hacked. For more information on orkut phishing / fake orkut login page click here


2.  Keylogging:

Keylogging is useful technique that directly sends you Orkut account passwords. You have to only install keylogger on victim computer and give a destination to keylogger to send orkut passwords. That’s it…you will be sent all passwords typed on victim computer and thus you can hack Orkut account password easily. For more information on Keyloggers check out my post here.


3.  Javascript Hack:

This Orkut hack became much popular in last year. In this hack, one has to just send a javascript via scrap and ask him to copy-paste the script in his address bar. Once this is done, you will get his cookies and can easily access his Orkut account using hacked cookies.


4.  Community Links:

Many a times, orkut users are provided with links in community scrap asking to click on this link. Clicking on this link will take you to a orkut login phisher mentioned in first hacking method “Phishing”, ready to hack your Orkut login password.

Example: It may be something like http://www.okrut.com/Community.aspx?cmm

Hack Facebook Photos | Hack Facebook Album | Hack Facebook Images

There are three ways by which you may hack facebook photo album of your friend or other person.



:: Trick 1 ::

1. Log into facebook account.

2. Find the person's unique profile ID.

- Search for them and click view friends or send message.

- Write the unique ID from the address bar (only the numbers) or copy it in notepad.

3. Now that you have your unique profile ID you can use the next two links to view a total of 40 tagged photos:

If you wish to see tagged photos added by others use this link:

http://www.facebook.com/photo.php?pid

Win-Spy Monitor Keylogger Tutorial Help, Free Download


Win-Spy Monitor Keylogger Features:

1) What is Win Spy Software?

WinSpy is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Win Spy Software operates in stealth mode. Win-Spy will not show in Add/Remove Programs, Windows Start, Taskbar, Task Manager, Processes or in Program Files Folder. Win-Spy can either be used for you Home or Office.

Win-Spy is a complete Local and Remote monitoring package that includes everything below for one low price: Breakdown is as follows:

Local PC Monitoring comes with:

Screen Capture
WebCam Shots
Keylogger
Emailer for Keylog, Screen Capture and Reports
Keylog Alert with Emailer

Reports - WebSites Visited Summary
- Websites Visited Detail
- Time On Internet
- Dual Side Conversations
- Unauthorized Login Attempt

Folder Hider
Clear All Tracks Utility
Secure File Deletion Utility
Lost or Stolen PC Tracker
Anti-Spy Disable / Destroy
Anti Virus Stealth Technology
Web-Cam via Internet Explorer
Remote Deployment/Monitoring
Suspend on Idel
Monitor across networks
WebAccess to all screen shots and reports


Remote PC Monitoring comes with:

Screen Capture
WebCam Shots

Reports - Keylogger
- Time on Net
- Websites Visited Summary
- Websites Visited Detail
- Dual Side Conversations

Emailer for Keylog, Screen Capture and Reports
Streaming Web-Cam (View / Record)
Remote Mic (Record / Listen)
Remote PC file Browser and FTP
Remote PC file Download / Uploader / Execute / Delete
Remote PC Shutdown / Log Off
Send Message to Remote PC
Anti-Spy Disable / Destroy
Anti Virus Stealth Technology
3 remote file deployment - combine, exe and excel
3 ways to obtain remote information - email, direct connect, ftp
3 methods to for remote uninstall - auto, direct connect, via uninstall file
Monitor up to 5 remote PC with 29.95 version
Suspend on Idel
Centralized Monitoring
Save information across network
Auto Config XP Firewall
WebAccess


2) How does Win Spy Software work?

Win Spy Software accomplishes two tasks in monitoring your computer. Spy Software
a) It captures screen shots of the computer.Spy Software
b) It captures all keys typed on the keyboard.
c) It captures all chat conversations.


3) How do I Install and run Win Spy Software?

Run the Win Spy Software Setup.exe file. You will be prompted to enter a username and password. Enter any Username and Password. You will use this Username and Password to Login into Win Spy Software. Note that username and password are case sensitive. Restart your computer. Press Control and SHIFT and F12 keys to login.


4) How do I Uninstall Win Spy Software?

You will have to enter your username and password to uninstall Win Spy Software.Spy Software
Users will not be able to uninstall Win Spy Software without a username and password.Spy Software
Press CONTROL - SHIFT - F12 keys, at login dialog enter your username and password press the uninstall button.


5) How do I access Win Spy Software in windows?

To login into Win Spy Software you will have to use the CONTROL - SHIFT - F12 keys.


6) Does Win Spy Software start automatically when windows start?

Yes, Win Spy Software automatically starts every time you start windows.


7) Will users know if Win Spy Software is running?

Win Spy Software will not appear in Add/Remove Programs, Windows Start, Taskbar, Task Manager, Processes or in Program Files Folder.on the task manager or windows toolbar.


8) Can users uninstall Win Spy Software?

You will have to enter your username and password to uninstall Win Spy Software.pare
Users will not be able to uninstall Win Spy Software without a username and password.Sp
Press CONTROL - SHIFT - F12 keys, at login dialog enter your username and password press the uninstall button.


9) Can users stop Win Spy Software from running?

No, Win Spy Software does not appear on the task manager. Users will not be able to stop Win Spy Software program.


10) Can I save Screen Capture and Key Recorder files across the network?

Yes, Win Spy Software allows users to specify location to store the ScreenCapture and Key Recorder files.


11) Can Win Spy Software email me the Key Recorder file?

Win Spy Software has the option to mail the Key Recorder file to any e-mail address that supports SMTP mail (example: Yahoo). The file is emailed whenever the user connects to the internet.


12) Can Can win-spy email me the keylog file when certain keywords are found?

Yes, win spy has a Keyword Alerter that will secretly email the keylog to me, when keywords or phrase I specify are found in the keylog.


13) Does Win-Spy uses outlook or other email programs to send emails?

Win Spy works independetly. Win spy does not depend on outlook or any other email programs to send mail.


14) Is Win Spy dependent on PC email address?

No, Win Spy works independetly. Win spy does not depend on PC email address .


15) Is Win Spy dependent on PC email program?

No, Win Spy works independetly. Win spy does not depend on PC email program/software.


16) Will sent mails show in outbox?

No, Win Spy works independetly. Sent mail will not show in outboox.


17) What email provider should I use to RECEIVE my keylog?

Use any email provider that supports SMTP mail. Try Yahoo, it might work depending on your region. Do not use AOL or Hotmail to receive keylog file. AOL and Hotmail does not support SMTP mail. Note, it does not matter if the PC you are monitoring uses AOL, what matters is where you want to receive your email.


18) Can I Hide any folder in windows using Win Spy Software?

Yes, with Win Spy Software you may select any window folders to hide. Win Spy Software has the option to disable windows “View Folder Option” making hidden folders totally un-access able by users.


19) What is Win Spy WebCam?

Win Spy webcam when turned on will allow you to access your PC webcam via the internet using IE.
So if you were at work, you can use your work PC to monitor what is going on at home?
Just turn your browser on and enter your IP home address. You will not need to install anything on your work PC.for webcam to work. Pictures are in realtime.


20) What is Win Spy Clear Tracks?

Win Spy clear tracks is a utility that allows you to quickly clear Internet and Windows tracks on your computer with a click of a button.

Clear Tracks Clears the following:
Internet Cookies
Internet History
Internet AutoComplete
Internet Temporary Files
Internet Index files.
Windows Recent Document
Windows Search History
Windows Run History
Windows Temp Files
WindowsApplication Recent Cache
Windows Recycle Bin


21) What is Win Spy Secure File Folder Deletion/Eradicator?

Secure File Deletion allows you to securely delete a file or folder. Files/folders deleted are gone forever.
Win Spy’s Secure Deletion rewrites to the file and deletes the files 25 times.
Win Spy’s Secure Deletion exceeds US Department of Defense standards for file deletion(DOD 5220.22).


22) What is Win Spy PC Tracker?

In an event your PC is Lost or Stolen. When the user of your PC connects online.
Win-Spy PC Tracker will secretly email you your location to you.

Location Info includes:
Host IP:
Computer Name:
Computer Time:
Server IP:
Server Name:
Server Time:
OS Type:
OS ID:
RegisteredOrganization:
RegisteredOwner:
Computer ID:
IP Configuration Info:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
IP Address
Subnet Mask
Default Gateway


23) How do I locate my PC with info above?

1) go to http://www.arin.net/whois/
2) enter this IP address to get contact information for server or router which was used to connect to the Internet;
3) contact management of this server and provide them with connection time and IP address.
The management can check records in server's log and determine the name and street address of the person who is using the computer.
In most cases the management don't reveal such kind of information to a private party so police assistance is required.


24) What is Win Spy Anti-Spy?

Win Spy Anti Spyware will actively and continously disable or destroy any attempts by user to install or run anti spyware on your PC. This option can be turned on or off in Tools / Misc.


25) Can Win Spy be detected by Anti Spy software?

Win Spy has 2 technologies built in to avoid detection by Anti Spywares.
1) Win Spy's Anti Spy when turned on will actively and seek and destroy Anti-Spy Softwares.
2) Win Spy incorporates random filenames for most of its program files.


26) What Reports can Win-Spy produce?

1) Websites Visited Summary Report - by username and time
2) Websites Visited Detail Report - by username and time
3) Hours Spent On Internet - by username and date
4) Login or attempts by username
5) Chat room conversations
6) Keylog or anything typed on PC


27) Does Win-Spy record chat room conversations?

Yes, Win-Spy will capture Screen Shots and anything Typed in chatrooms.


28) Will Win-Spy work across firewalls?

Yes, Win Spy will work across firewalls. Important, See below.


29) Will Win-Spy penetrate/hack through Firewalls?

No, Noticed the way we asked the question above.
Most vendors would stop at with the question above, making you believe their product would penetrate firewalls. There are currently no over the counter product that would penetrate firewalls. If there was, corporate America would be broke. If anyone is claiming to be able to do this, ask them for a evaluation copy.


30) Can Win-Spy Auto Configure XP Firewall?

Yes, you can set win-spy to automatically configure XP firewall settings for you.


31) What is Win Spy Remote?

Win-Spy Remote you will be able to monitor activities on the Remote PC in real-time.
You will be able to:

1) View Screen Captures
2) View Keylog file
3) View ChatRoom Conversations report
4) ViewTime Spent Online report
5) View Websites Visited report
6) Browse all files and folders on remote PC.
7) Run, Delete files and folders on remote PC.
8) Upload and Download files to/from remote PC.
9) View remote PC Webcam in realtime/streaming.
10) Record remote PC sound (mic) conversations.
11) Email remote PC reports to my PC.
12) FTP remote PC reports and screen shots to my PC.


32) How does remote Install work?

Use Remote Install and create a remote file.
Send remote file to your remote PC through email.
When the user clicks on the file it would silently install Win-Spy.
If a picture is included then the user would see the picture and not be aware that win-spy is being installed.
If no picture is included then when user clicks on the file it would appear as nothing has happened.


33) How do I Monitor a Remote PC?

Step 1 - Create Remote File using Remote Install.
Step 2 - Send Remote File to your Remote PC using your email.
(When remote user clicks on remote file win-spy will silently install.)
Step 3 - Use Remote Viewer to view content/monitor remote PC.


34) How do I create a Remote Install File?

You would use Win Spy Software’s Remote Install File creator under Remote to create the remote install file.


35) What information will I receive from the remote PC?

Win-Spy Remote you will be able to monitor activities on the Remote PC in real-time.
You will be able to:

1) View Screen Captures
2) View Keylog file
3) View ChatRoom Conversations report
4) ViewTime Spent Online report
5) View Websites Visited report
6) View remote PC Webcam in realtime/streaming.
7) Record remote PC sound (mic) conversations.


36) How do I obtain the information from the remote PC?

Only Win-Spy gives you 3 methods of retriveing data from remote PC..
1. Connect to remote PC and retrive data/reports
2. Get remote PC E-mail reports directly to you
3. FTP remote PC’s reports/screen shots to FTP server


37) What is emailed from remote system that you are monitoring?

ScreenShots, Keylog, WebsitesVisited, TimeOnline and ChatConversations Reports are emailed.


38) What is FTP from remote system that you are monitoring?

All reports and screen shots are ftp.


39) Will Win-Spy remote work with Dial-up?

Yes, Win-Spy will work with dial up or high speed connections.


40) How would you know that the other user is on line?

Win-Spy will inform you with popup, like msn messenger program.


41) Will Win-Spy work with Dynamic IP on remote PC?

Yes, Win-Spy manages the IP. Works like the same concept as msn messenger. You will not need the remote PC's IP to connect to it.


42) What browsers are compatible with Win Spy?

Win Spy is compatible with Internet Explorer 5.5 and above.


43) What is the purpose of Seek and Destroy Anti-Spyware?

Win Spy seek and destroy will prevent users from installing or running any Anti-Spy software. The purpose of this is so that users will not be able to remove Win-Spy. After all, what is the point of having a monitoring system if your child can easily install an Anti-Spy software and remove Win-Spy.


44) What dual-side chatrooms conversations will win-spy montor?

Win-Spy Records Dual Side Chat On the following Chat Rooms."
Yahoo version 6.0.0.1750
ICQ version 2003b Build 3916
AIM version 5.1.3036
MSN version 7.0.0425
Trillian version 0.74 w/patch 1


Win-Spy Monitor Keylogger Tutorial:




Win-Spy Monitor Keylogger Download:

Download

keyloggerPermanent Link:

Use TV as Computer PC Monitor | Use Television as Second Monitor


A regular TV display has around 640x480 resolutions. Many video cards in computers don't go down to 640x480 any more. 800x600 is a common starting point, hence such computer resolutions simply won't work on a normal TV. To overcome such problem, you can use one of the following solutions:


Using S-Video Connector:

Use Computer Monitor as TV | PC Monitor as Television

How to Increase Broadband Connection Speed in Windows XP/Vista


This trick requires Standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.

To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem.

This tip is only recommended if you have 256MB RAM or higher.


Step 1 - Identify the IRQ used by the NIC/USB modem

Follow these steps:

1. Open the System Information tool by running MSINFO32.EXE from the Run command.

2. Expand System Summary

How To View Private Facebook Profiles Pages



Many times we come across an interesting profile on facebook but don't have access to see the profile of that person. Check out here how to view private facebook profiles pages:

Trick 1:

In search results from the Facebook database of users, you can see the thumbnail of the person's picture along with three options on right side. Click on the second option "Send a Message" and just send the person an interesting comment that they couldn't resist replying to. "Were you at the party last night?" or “Hey! We went to school together, do you remember me? I think we sat together in Algebra”, something to that effect.


What Does It Mean To Poke Someone On Facebook?



What is a Poke?

A poke is a facebook application that has been added to every account on facebook. On your homepage, a small box on the right hand side called "Pokes" is visible if anyone has poked you. The pokes are nothing but small images of a hand with a finger pointing, and displays the person's name who sent the poke to you.

Pokes can be just a way to say hello / hi to anybody on Facebook. You can send pokes to anyone, not just your friends and anyone can poke you as well.

To poke someone, go to the person's Facebook profile page and click on the "Poke" link beneath his or her profile picture. You'll get a pop-up message asking for confirmation. Once confirmed, the poke is sent.


How To Hack Myspace Account | Myspace Password Hacker Cracker Stealer Breaker



Below post is for EDUCATIONAL PURPOSE ONLY. If you try to misuse it, you will have to pay heavy price similar to this person

http://blog.wired.com/27bstroke6/2008/10/fed-blotter-cha.html


How To View Private Myspace Profiles Pages, Comments, Pictures, Friends, Videos



These videos will help you to view private myspace profiles pages, comments, pictures, friends and videos ... EnJoY!!!












myspacePermanent Link:

Hack Bebo Account | Bebo Password Hacker Cracker Stealer Breaker

Bebo is UK's one of the top social networking sites. It is not an easy task to hack Bebo by breaking this security! But still some people manage to get access to other’s Bebo accounts. The question concerned is how they do it? Many of them just use simple tricks that fool users and then they themselves leak out their password.

Following are 6 Bebo hacking methods:

1. Phishing:

Like all other social networks, Bebo is mainly hacked by Bebo phishers i.e. fake Bebo login pages. Phishing is most favorite and can be said “easiest” way of hacking Bebo account passwords. What you have to do is simply send a link to fake Bebo login page (prepared by you) to victim and ask him to login to his Bebo account by fake Bebo login page (phisher). Once, he login to Bebo account using Bebo login Phisher, his Bebo account password is sent to you and thus, his account is hacked.


2. Keylogging:

Keylogging is useful technique that directly sends you Bebo account passwords. You have to only install keylogger on victim computer and give a destination to keylogger to send Bebo passwords. That’s it… you will be sent all passwords typed on victim computer and thus you can hack Bebo account password easily.


3. Javascript Hack:

This Bebo hack became much popular in last year. In this hack, one has to just send a javascript via scrap and ask him to copy-paste the script in his address bar. Once this is done, you will get his cookies and can easily access his Bebo account using hacked cookies.


4. Community Links:

Many a times, Bebo users are provided with links in community scrap asking to click on this link. Clicking on this link will take you to a Bebo login phisher mentioned in first hacking method “Phishing”, ready to hack your Bebo login password.


5. Bebo New Features:

I few months back received a page that looked like they are giving the user an option of selecting new features like new Bebo themes or Bebo backgrounds and demanding you “only your ID and password” !!! When user submits this page, his ID and password is mailed to the coder and thus his Bebo account is hacked.


6. Primary E-mail Address:

If hacker is able to obtain password of primary email address of Bebo account, then Bebo account can be easily hacked by using “forgot password” link on Bebo login page. By using forgot password link, hacker can ask Bebo to reset password and Bebo will send a link to this hacked primary email address about the password reset. Now, hacker can easily obtain your Bebo account password and thus hack Bebo account profile. So, you can prevent this by keeping useless or unknown email id as primary email address.

beboPermanent Link:

Best iPhone JailBreak Apps List 2009



Check out latest iphone jailbreak apps:


GV Mobile

With GV Mobile and a Google Voice phone number you can do the following:

- Dial numbers via the iPhone address book or typing on the keypad
- Full SMS support (view historic, reply, send new)
- Retrieve and delete recent call history
- Playback and delete voicemails
- Take calls from different phones other than your iPhone
- Enable or disable the phones that Google Voice forwards calls to
- Add or delete phones that Google Voice forwards call to





Backgrounder

Backgrounder allows you to multitask App Store apps on your iPhone in the background. Yes, you heard me correctly, you can now listen to Pandora while you are in your favorite App Store app! This is your perfect opportunity to show Palm Pre owners how it’s done.

Just press and hold the home key while running any application. After a few seconds, the “Backgrounding Enabled” pop-up appears. Release the home button, Backgrounder automatically returns you to SpringBoard. After that feel free to open any of application you see fit. To quit the background application, re-launch it from SpringBoard, then press and hold Home until the Backgrounding Disabled pop-up appears. It’s as simple as that.





MxTube

Mxtube downloads YouTube clips to your device. When you've got a favorite YouTube clip you want to show all your friends—but don't want to wait for it to download over the air—MxTube comes to the rescue. MxTube can download and save YouTube clips to your jailbroken device for watching when you're offline, out of Wi-Fi range, or just using the slow Edge network. Great especially for iPod touch users without a data connection.





BiteSMS

BiteSMS Offers Cheaper Text Messaging. BiteSMS is a text messaging service that offers an alternative to AT&T or your iPhone's SMS carrier. Buy text messaging credits at BiteSMS.com (currently 10 cents per message, less if you buy more) and install the BiteSMS app via Cydia on your jailbroken device. Then, to send messages using BiteSMS instead of your plan, choose it near the Send button, as shown. The BiteSMS app keeps track of how many messages you send via your default carrier, and how many BiteSMS credits you have left, so you can decide which is the most economical way to send a message.





qTweeter

qTweeter is status update application that lets you tweet messages and update your Facebook status. You launch qTweeter by sliding your finger down from the status area and can start tweeting right away. Then you simply press the update button to update your Facebook status, send your Tweet, or both.

Some features of qTweeter are as follows:

- Update Facebook and Twitter at once
- Update your status on top of any app
- TwitPic support
- TwitVid support
- Shortened URL
- Music Tweets, YouTube Tweets, Safari Tweets
- Long Tweet and TweetShrink support
- Fast shortcut to your other Twitter app





Winterboard

For those of you who really want to apply a different look to your iPhone user interface, Winterboard. is the app for you. Using Winterboard you can apply complete skins to your device or just specific parts of it. Some of the things you can customize include app icons, wallpaper, statusbar, dock, etc… You can spend hours tweaking your UI ways that will make you wonder why Apple didn’t think of this.





SBSettings 3.0.2

SBSettings, addresses a common complaint that we hear a lot about the iPhone. Do you want a way to turn Wi-Fi on and off without going through all the settings? SBSettings can help you out. How about adjusting your screen brightness? How about the ability to toggle Bluetooth on and off with a single button on your home screen? Edge and 3G? I’m sure you get where I am going with this.





BossPrefs

An insanely useful utility for making one-tap system adjustments like toggling 3G, EDGE, wi-fi or Bluetooth. You can turn your mail on and off fast too. I like the "Hide Icons" feature, where you can go in and take certain apps off of your home screens without taking them entirely off your iPhone.





Cycorder

The semi-answer to iPhone's lack of video recording, Cycorder does motion JPEG recording (now with audio). It looks as good as you can expect with that camera. The only catch is, in order to pull video files off of the damn phone, you have to use SSH or something else that can access the file structure. Nobody said bootleg app use was a cakewalk.





Snapture

An example of a for-profit jailbreak app, Snapture gives you basic controls for free for 20 tries, but then asks for $8, and in return gives you access to albums and all sorts of stuff. It's risky considering any jailbroken app may not work the next time you update your iPhone's software, but in this case, it's at least a well designed app, giving you lots of camera controls (timers, auto-rotation, color mode, an on-screen level) plus a shutter button that is the entire screen, so it's easier to take pictures with one semi-steady hand.





xGPS

This GPS program made a name for itself the other day by saying that, by February 20, it would have turn-by-turn speech navigation. While you wait for that, you can check out the nominal version available now, which is mostly just Google Maps with some extra tools like GPS tracking.





Clippy

Copy and paste really do work on an iPhone, and it's system-wide. However, there are limitations. Once you've installed this utility from Cydia, you get to it by going to the number keys on the pop-up keyboard. As you can see, it appears above the standard numbers. As you might guess from that, you can only copy or paste when you have access to the keyboard. So copying an address off of a website is not doable, even though you would be able to paste any address into maps once you had it. There are new features that just popped up which I haven't explored yet—maybe you know about them.





NES emulator

An NES emulator that keeps getting better. If you can handle the touch controls, it'll handle most of your ROMs at near full speed. And this is certainly something you won't find in the App Store at any time in the future.






iphonePermanent Link:

How to Delete / Remove Friends on Facebook?


Face book is one of the top social networking sites in United States. Many people join it for finding new friends, old childhood friends, business partners etc.

After creating account in face book you may get friend request from people you don’t know. If you add them, later on after some chats you may think that certain person is not type of friend you are seeking.

Now the question arises ‘how to delete this annoying person from my friend list?’

There are two ways by which you can delete the unwanted friend from your face book friend list:


Solution 1:

1.  Go to person’s face book profile

2.  On left hand side there is one link named ’Remove from Friends’

Hard Drive not Recognized/ Found/ Detected/ Accessible


If you install a new hard drive and install an Operating System on it and it suddenly acts like it is not there, it may be a loose connection.

If a bootable CD, such a s Knoppix, is not able to read your hard drive, it can have several causes. The list of possibilities below can also be used for troubleshooting hard drives, floppy drives, and CD/DVD drives.

CAUTION: Make sure the power is off and that the PC is disconnected from power. Also be sure to avoid static electricity, or you will need a new PC. Do not force any thing. All parts should easily fit together if they are properly aligned. Sometimes you may have to push or pull harder than you think. Just be careful to make sure any levers or buttons that hold it in place are not overlooked.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Developed by Avinash | My Site