How To Hack Mobile Phones Through Bluetooth

Yes guys it is The Moobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. 
 
Once connected to a another Phone by bluetooth you can do the following:
 
 
 
 
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
Switch off the phone
9) Restore factory settings
10) Change ringing volume


Notes:
1.) When connecting devices use a code 0000
2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and download it download
enjoy and keep visiting here :)

Posted in , | Leave a comment

How To Hack Free STD-ISD Calls | make free STD-ISD calls

Today i am going to show you How To make free STD-ISD calls. I hope you will really enjoy it Follow the below steps to do this..

1) Dial 1-800-373-3411 (1-800-FREE-411),

2) When the automated operator greets you (probably after an ad) you need to say “Free Call”. You will, then, be connected to the server.

3) Enter (key in) your destination number in “country code + destination number” format. For example 9122********* could connect you to someone in Mumbai.


4) Continue talking for 5 minutes and then this free call will get disconnected. You know what you want to do after that, yes follow steps 1-4 again.

This number 1-800-FREE-411, when dialed from a landline in USA is a free number. For our readers outside USA there is no reason to get disappointed. You can use skype to call 1-800-373-3411 for free and you can get free international calls anywhere in the world. Yes!! That is free ISD as well as STD calls
i hope you really enjoy it !!

Posted in , | Leave a comment

Google Lauches A New Authenticating Process

Hello Today I am posting about a new authenticating process which Google had launced, its  2-step verification. 
Using 2-step verification will help prevent strangers from accessing your account with just a stolen password. When you sign in with 2-step verification, you'll verify your identity using both a password and a code that you receive on your phone.

Why you should use 2-step verification
2-step verification adds an extra layer of security to your Google Account by requiring you to have access to your phone – as well as your username and password – when you sign in. This means that if someone steals or guesses your password, the potential hijacker still can't sign in to your account because they don't have your phone.

How you sign in with 2-step verification

  1. When you want to access Google products from your browser, go to that product and enter your username and password.

    image of brain with arrow to sign in 
  2. You'll next be prompted to enter your verification code, which you'll get from your phone. You'll only have to do this once every 30 days if you so choose.

    image of phone to verification screen 
  3. Soon after you turn on 2-step verification, non-browser applications and devices that use your Google Account (such as Gmail on your phone or Outlook), will stop working. You'll then have to sign in using your username and a special password you generate for this application. (Don't worry, you'll only have to do this once for each device or application.)

    image of application-specific password to phone

What you’ll need

While 2-step verification requires some web savvy, you only need a few basic items:
  1. A phone that is usually available to you when you sign in. This could be:
    • A standard phone (landline or mobile)
    • Any Android device, BlackBerry device, iPhone, iPod Touch, or iPad that can run the Google Authenticator application
  2. A backup phone that you can use if you lose access to your primary phone. This could be:
    • A work or home phone (landline or mobile)
    • The phone of someone you trust, like a friend or family member.

How to get started

Go to your Accounts settings page and look for the Using 2-step verification link. If you have the link, click it and start the setup process.
If you do not see the link and you are a Google Apps user, you might have to access the 2-step verification setup through a special URL. It is also possible that your domain administrator has not yet set it up for your organization. Check with your domain administrator to find out.

ManageAccount settings page

i hope you really enjoy it this post.  If you have any queries ask me below.

Posted in | Leave a comment

Check SQL Injection in Best 3 Steps


 https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7VotU9eC4YgiQaOdXuSFOqUURZTiURznyX0XEmpZK3CWNYxISgD3Pu5Fa8a80gvv6_442FuoSi3R_RembfYwx2ZurjuY3mBdymGYAm6_7sgTomdtyy3K4_fcmT4iVbG0o7-gWHQX6PuYt/s1600/SQL-Injection-Attack.jpg



I have heard a lots of people nowadays ask on How to Check SQL Injection   I hope you will really enjoy it 
So Today I'm teaching SQL injection (SQLi) indepth so I will try teaching you guys a little of that as well. SQLi is the most popular attack on any website these days.There has been an enormous increase in SQL programmers and websites,and the biggest problem with SQL is "Either your perfect/hacked".Due to poor
coding programmers often leave vulnerabilities in their site and hackers its our job to inform them and patch them up.So lets see

how to check if a site if vulnerable to SQLi


Since this is still the basic,there is nothing much to do.All you have to is:


1.Get a site which uses SQL queries. For your convenience simpler terms it is any site which has "
www.site.com/something.php?ex=43". You must have seen tons of such sites.Note: NOT all sites which have "=" use SQL queries it might also use "PHP Get/Post method".

2.Once, you have a site like then just insert a apostrophe (') like this "
www.site.com/something.php?ex=43'".

3.If the site is vulnerable to SQL then it would return an error something like this.You might get an error like this "
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' AND single_group = "S"' at line 1"

This error need not be the same always,as long as you get an error you can tell that the site is vulnerable to SQLi and its up to you to become a her and report to the site admin.

Posted in , | Leave a comment

Airtel Hack 2012-13 for Unlimited Free SMS By AlienBases

Many people search for free Airtel message center number to start sending unlimited messages without paying for them. Well, previously many websites made posts on these free message center numbers, but after the frequent use of the number, Airtel capped or filtered those numbers from further use. But still there are few working message center numbers and here I am going to reveal that with you. Note that Airtel might ban this number anytime, so be fast in using this and send free sms to anyone from your Airtel mobile number.

How to send unlimited free SMS using free SMS center no hack


  1. Navigate to Messages option on your mobile and click on Settings
  2. Click on Message Center Number and proceed to add a new message center number.
  3. In Message Center Name field, write anything. For an example, “Hungry Hacker”.
  4. In the Message Center Number field, write +919810051905
  5. Choose Preferred Connection Type as Packet Data
  6. Save the message center and activate it from the options.

Now we have configured the message settings to send and receive all message through an another message center number. But since we have selected Packet data as connection type, we have to do some additional settings on our phone.

  1. Go to your phone menu and navigate to Settings >> Phone Settings >> Connection >> Packet Data
  2. In the settings of packet Data, edit the following options
  3. Packet Data Connection >> When available and Access Point >> Airtel Live
  4. Save all settings and you are done.

Note: Here we are using a CDMA message center number to send free messages from Airtel mobile. Since CDMA networks don’t support 91 as the country code, you have to add 0 before every number. This is very important and if you make mistake here, this trick will not work.

Example : Suppose you want to send free messages to 9861098610, now while composing the SMS, type this number as 09861098610 in stead of 919861098610 or +919861098610.

And also, message center number settings option may vary from phone to phone. The above steps are mentioned for Nokia mobile phones. If you want to try sending free SMS from any other handset, use your mobile manual and set the new message center number accordingly.

Posted in | Leave a comment

How to Send free SMS Worldwide | Hack Send Free SMS To Worldwide


Most of you might have heard about Google Voice which provides great free VOIP service within USA. However, Google Voice is not free for people outside USA. When you try to visit Google Voice home page from anywhere but USA, it says that Google Voice is not available in your country. Today, we bring you a hack that will let you use Google Voice to send and receive free SMS anywhere in the world.
Requirements:
  • A smart Phone (iPhone, Blackberry or other smart phones)
  • Internet connection
  • Two Google Voice Accounts
Steps

If you have a smart phone you can download the google voice application for it. If Google does not have an application for your device you can still use web version which you can access from your phone’s web browser.
You will need a Google voice Account . If you are outside USA you can use a proxy such as Click Here to create Google Voice account. Remember that you will need one account for each person that you want to send (or receive) SMS to (from). Google Voice comes with a USA phone number that you have the option to choose from host of numbers.
Once you have the accounts set up you can login to your phone using this information. The good thing is that this application works on GPRS too. Moreover, you can use GPRS without the special data plan for iPhone.
After you have logged into your application successfully, you can send SMS to any number in USA and Canada. Since all your friends now have a Google Voice Number you can sms them and they can reply back on your Google voice number. Your friends or partners need not be within the same country. They can be anywhere in the world. This is totally free SMS service for you.....
Enjoy !!

Posted in | Leave a comment

Tips for Protection Against Keyloggers

  
 
 
1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares

1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares
 
1.Enable Your Firewall:-

Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-

Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.

This tips and tricks will help you out in protecting yourself from these harmful spywares

Posted in , , | Leave a comment

Restore your computer after virus Attack

Restore your computer after virus Attack

Even after the virus is totally removed from the Computer, some Pepole find it difficult to restore all those things back which were affected by the virus. A virus usually when enters into a system disables the registry editor and task manager so that the user can not remove the virus from the system.

Here is a free tool Re-Enable using which even a novice users can fix all the things which were disabled by the virus. An antivirus can remove the virus files but sometimes it may fail to restore the system settings. In such situations this tool can come handy.
http://1.bp.blogspot.com/_F7GuXCzPQdY/TGLTgssan1I/AAAAAAAAEQI/F7cVkRXrJmY/s1600/Re-Enable_1.png

The program has the ability to restore functionality to these Windows features:
  • Windows Registry
  • Command Line Tool
  • Windows Task Manager
  • System Restore Config
  • Folder Options
  • Run command
  • My Computer
  • Task Scheduler
  • Right Click Context menu
  • Ms-Config (Xp only)
  • Control Panel
  • Search

You will require dot net 3.5 or higher version to run this software. Or if you don’t want to download .Net framework then you can try the portable version of this software.

Download Re-Enable

Do you have questions, comments, or suggestions? Feel free to post a comment!

Posted in , | Leave a comment

Make Your Pc A Cool Look And Feel

Hi guys today i come up with a trick that make your pc feel cool and also awesome look.
So Like all know by using several themes we can give our pc a different look ...

Want to give your pc a 3D Look Using this application?

Using a small software known as Bump Top You can switch your desktop to a 3D view have 
Look At image below..:)


                                         Download Bump Top


Want To make your pc more dynamic and Professional Look?

Now if you are not satisfied With This 3D look Lets Go deeper and Have A Look On
My Exciting new look..Yes You can also make your pc look like this

How To Make its Very simple Just Download A Software known as Rainmeter 
Here
Install It 
After that download any of the Skins as your desired look from below
                                                   Download
           Download

Goto your downloaded Skin
right click on file and click on "install RainMeter skin"

Hope You have liked this tutorial do share ,hit like us ,post comments Thank you.

Posted in , | Leave a comment

Finding Vulnerabilities using Uniscan



Today i am sharing a tool by using which you can found vulnerabilities in a website. The name of the tool is UNISCAN. It is written in perl. It also comes in Backtrack. But here i am sharing the perl script for use on windows operating system. For using this script on windows operating system you must install the perl language on your windows operating system. 


Download Perl Language.

 

After installing the language you can use your script with the help of Command Promp (DOS).

Here is the command for using script 

 

C:\perl uniscan.pl -u http://www.example.com/ -qweds

 

It will starts the scanning..................

This scripts automatically check the vulnerabilities like XSS , SQL , BLIND SQL , LFI , RFI and etc.....

 

Note: Must put the "/" character at the end of the url.

 

Usage of UNISCAN...

C:\perl uniscan.pl -u http://www,example.com/ -qweds

C:\perl uniscan.pl -f sites.txt -qweds

C:\perl uniscan.pl -i uniscan

C:\perl uniscan.pl -i "ip: xxx.xxx.xxx"

C:\perl uniscan.pl -u http://www,example.com/ -r

 

Download UNISCAN from here:

 

.::DOWNLOAD::. 

Posted in , , | Leave a comment