Sponsor Ads


Close this ad

Top Ten Ways to Save your Wet Cell Phone

Top Ten Ways to Save your Wet Cell Phone

Top Ten Ways to Save your Wet Cell Phone
1) Do not Panic at all

You can make your phone when you follow the instructions at the right time. Stay calm and no panic. The key for solving this problem is a patience.

2) Remove your cell phone from the water

The water takes longer to enter your mobile phone. Glass of water, if spilled, and mobile phone charger is connected to mobile phones, please unplug the charger immediately. Most of the damage may occur if power is wet phone.

3) Remove the battery

Remember, the phone’s battery as soon as possible, otherwise the circuit on a cell phone were damaged by the impact to be removed. Circuits to survive in water to see if your phone has no battery or other connected.

4) Remove SIM Card

Contact list is the most important thing you want to hold the phone. Some people do not care to pay for your cell phone contact list again. There may be other important data on your SIM card. Sun wipe you register the SIM card with a dry towel or paper towel.

5) Remove all covers and external connectors

Make sure all covers, many gaps, remove slots open in your phone. If the water is removed in all possible areas of wet cell phone.

6) Use Newspaper To absorb Water

Everyone has a tissue sample at home. Do not panic, in this case, you can use paper that has a good ability to absorb water has. Do not panic if none exists, you can use a small towel to remove excess water from the wet cell phone.

7) Use ear-buds

There are some tight places in your phone where your fingers can not reach. You can use ear-buds to remove the water.

8) Place the phone near microwave

You can help your wet cell phone emitted near the rear exit of microwaves by a low heat to dry your phone space.

9) Place wet phone in front of an air conditioner

You can make your phone safe, before the humid air. The air conditioner has dry air and water evaporates faster.

10) Place the phone on top of a TV

This method does not work if you hang on the wall LCD televisions. However, when the output simmer TV screens at the top, you can dry your phone. This process may take some time to dry your phone, but the procedure, in cases where you will spend time with your guests instead of drying your mobile phone.

Did You Like Top Ten Ways to Save your Wet Cell Phone??


read more

Cleaning Up Your Wall

Cleaning Up Your Wall

Cleaning Up Your Wall
Has your wall ever gotten hijacked by notifications such as "Blah started the quiz: Dr. Phil's Personality Test" then "Blah completed the quiz: Dr. Phil's Personality Test with the result The Vain, Self-Centered Leader" followed by a big story stating the same thing. Get rid of the duplicates by clicking on the Remove button that appears to its right when you hover on it! I've seen so many walls overrun by these useless notifications. I also remove the notifications that appear on my wall when I change some information on my profile. I like things neat and organized. (Which is why I hate that the current Facebook rearranges posts on my wall every now and then instead of following a chronological order.

Did You LIke Cleaning Up Your Wall?


read more

Customizing Info Privacy

Customizing Info Privacy

Customizing Info Privacy
When I first started out on Facebook, I had decided to add to my friends list only people that I knew personally, so I filled out all the details in my Info tab. Then I started getting friend requests from online acquaintances or even strangers and I realized I couldn't display certain contact information to these people. As I was about to delete the info, I realized that you can customize privacy settings for each individual item in your Contact Information. Here's how:


1.Click the Info tab on your profile.
2.Hover your mouse over the Contact Information portion.
3.Click on the Edit button that appears on its upper right corner.


4.Click on the padlock icon next to each item and select Customize.
5.Select Some Friends and choose only the friends or networks that you want to allow. You can even put exceptions.

Another way to do this is to hover your mouse over Settings (beside Logout), then click on Privacy Settings. There you can control your privacy settings for your Profile, Search, News Feed and Wall, and Applications.

Did You Like Customizing Info Privacy?


read more

Hacking Yahoo Messenger

This tutorial will tell you how to hack Yahoo Messenger while you are engaged in chatting with some person. While you are chatting through Yahoo Messenger , Yahoo will hide the IP addresses of all the computers that are connected through the Yahoo Messenger application to the chat room. So it is not possible to directly find out the IP of the person you want to hack. Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo Messenger chat. The procedure to Hack Yahoo Messenger is discussed in detail below.
While you are chatting via Yahoo Messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly. It is not possible to hack Yahoo Messenger directly to get the IP address. So to hack his IP, you must establish a direct communication with him. So ,how to do this? It’s easy. Just start chatting with some one via Yahoo Messenger . During the process of chatting send him a big file. Now the file transfer takes place directly between your computer and the victim’s computer(via Yahoo Messenger application). So now, you are ready to go. Here’s the step-by-step process to hack Yahoo Messenger and get the IP address of the person .
  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).
NOTE: If you are new to “netstat” and other IP related commands refer this tutorial: Windows XP IP Utilities
  • The pic given below shows netstat results of my computer. I was not chatting when i took this pic and hence it looks modified.
  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via Yahoo Messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.
TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED
Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established. That’s It! You have now hacked Yahoo Messenger to get his IP address.
Once you hack Yahoo Messenger  and get his IP address you can use any of the Remote Administration tools or perform NETBIOS Hacking .
NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via Yahoo server itself). So in this case the above hack may fail to work.

read more

Chat without Yahoo Messenger or Gtalk

Chat without Yahoo Messenger or Gtalk
Can we Chat without Yahoo Messenger ? Most of us are familiar with the most widely used applications such as Yahoo Messenger and Gtalk to carry out chatting with our friends. But here I’ll show how to Chat without Yahoo Messenger or Gtalk . As we all know the information we exchange with their servers(Yahoo or Gtalk ) are recorded and stored along with the corresponding IP addresses. This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.
Moreover if the matter is highly confidential, then it is necessary to have a totally private Chat where the messages are exchanged only between the people involved in the Chat and not with any other third party servers. At these situations, it is better to Chat without Yahoo Messenger .
So, how to carry out a private Chat without Yahoo Messenger or Gtalk ?
For this purpose there exists many softwares that support’s you to host a web-based Chat system without any additional software or services. So with these softwares the exchange of messages takes place directly between the two persons engaging in the Chat and will not pass through any other third party server. This ensures 100% privacy and eliminates the desperate need to Chat with Yahoo Messenger .

One of my favorite program for private chat is Easy Chat Server 


 Download:Free Download version 2.5

Easy Chat Server is a Windows program that allows you to host a web-based Chat system without any additional software or services. Unlike other Chat server, you do not need to install Java. It allows you to build one or more web-based Chat rooms on your machine, and provides advanced Chat functionalities aiming to offer discussion space for your users, customers and partners.
Here are some of the screenshots of Easy Chat Server.




Key Features of Easy Chat Server:
  • Easy to use, Simple installation that will have you up and running in minutes.
  • 128-Bit Security Socket Layer(SSL) support. Support for server level certificate creation.
  • Instantly runs a complete Chat server on your PCs – does not need to install any Web Server.
  • Supports full private messaging and One to One private chat.
  • Support of images, smileys, avatar icons.
  • Full Chat and access logs are available within the Chat server.
  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.
  • Multiple styles available for the user to customize rooms.
  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.
  • No spyware, adware or other unwanted extra programs.

read more

Domain Hijacking – How to Hijack a Domain

Domain Hijacking – How to Hijack a Domain
In this post I will tell you about How the Domain names are hacked and How they can be protected. The act of hacking Domain names is commonly known as Domain Hijack ing . For most of you, the term “Domain Hijack ing ” may seem to be like an alien. So let me first tell you what Domain Hijack ing is all about.


Domain Hijack ing is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain Hijack ing is also known as Domain theft. Before we can proceed to know How to Hijack Domain names, it is necessary to understand How the Domain names operate and How they get associated with a particular web server (website).

The operation of Domain name is as follows

Any website say for example gohacking.com consists of two parts. The Domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the Domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of Domain name with the web hosting server is done as follows.
1. After registering a new Domain name, we get a control panel where in we can have a full control of the Domain .
2. From this Domain control panel, we point our Domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new Domain “abc.com” from an X Domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the Domain control panel (of X) he configures his Domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the Domain name “abc.com” is resolved to the target web server and the web page is displayed. This is How a website actually works.

What happens when a Domain is Hijack ed

Now let’s see what happens when a Domain name is Hijack ed. To Hijack a Domain name you just need to get access to the Domain control panel and point the Domain name to some other web server other than the original one. So to Hijack a Domain you need not gain access to the target web server.
For example, a hacker gets access to the Domain control panel of  “abc.com”. From here the hacker re-configures the Domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s Domain name (abc.com) is said to be Hijack ed.

How  the Domain names are Hijack ed

To Hijack  a Domain name, it’s necessary to gain access to the Domain control panel of the target Domain . For this you need the following ingredients
1. The Domain registrar name for the target Domain .
2. The administrative email address associated with the target Domain .
These information can be obtained by accessing the WHOIS data of the target Domain . To get access the WHOIS data, goto whois.Domain tools.com, enter the target Domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.
To get the Domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the Domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual Domain registrar.
The administrative email address associated with the Domain is the backdoor to Hijack the Domain name. It is the key to unlock the Domain control panel. So to take full control of the Domain , the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post How to hack an email account.
Once the hacker take full control of this email account, he will visit the Domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the Domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of Domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can Hijack the Domain within minutes.

How to protect the Domain name from being Hijack ed

The best way to protect the Domain name is to protect the administrative email account associated with the Domain . If you loose this email account, you loose your Domain . So refer my previous post on How to protect your email account from being hacked. Another best way to protect your Domain is to go for private Domain registration. When you register a Domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you Domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private Domain registration costs a bit extra amount but is really worth for it’s advantages. Every Domain registrar provides an option to go for private registration, so when you purchase a new Domain make sure that you select the private registration option.

read more

How to Hack Windows Administrator Password

How to Hack Windows Administrator Password
This Hack will sHow you How to reset Windows Administrator Password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the Password .



Most of us have experienced a situation where in we need to gain access to a computer which is Password protected or at times we may forget the Administrator Password without which it becomes impossible to login to the computer. So here is an excellent Hack using which you can reset the Password or make the Password empty (remove the Password ) so that you can gain Administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

* You do not need to know the old Password to set a new one
* Will detect and offer to unlock locked or disabled out user accounts!
* There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than Password editing.

How it works?

Most Windows operating systems stores the login Password s and other encrypted Password s in a file called sam (Security Accounts Manager). This file can be usually found in \Windows \system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the Password associated with Administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the Password .
Another simple way to reset non-Administrator account Password s

Here is another simple way through which you can reset the Password of any non-Administrator accounts. The only requirement for this is that you need to have Administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will sHow you a list of user accounts on the computer. Say for example you need to reset the Password of the account by name John, then do as follows

4. Type net user John * and hit Enter. Now the system will ask you to enter the new Password for the account. That’s it. Now you’ve successfully reset the Password for John without knowing his old Password .

So in this way you can reset the Password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

read more

How to Hack Orkut Account

How to Hack Orkut Account
Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack. Hence it’s almost impossible to use the brute force approach to hack Orkut Account . Before we discuss How to hack Orkut lets take a look into the 4 level secure login feature of Orkut Account .


Second LevelOrkut Account checks for cookie in the sytem of user
Third LevelOrkut provides a redirection to the entered User information
Fourth LevelOrkut doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut  using input validation attack!!!
It is not an easy task to hack Orkut by breaking this security! How ever still some people manages to get access to other’s Orkut Account s. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to protect your Orkut Account being hacked.

Ways to Hack Orkut Account

1. Using Keyloggers is one of the Easiest Way to Hack Orkut password. Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an Orkut Account .
A keylogger program is widely available on the Internet. Some of the best ones are listed below
A detailed information on Keylogger Hack can be found in my post Hacking an Email Account .
2. Phishing Attack is the most popular way of hacking/stealing other’s password. This attact works by using fake login pages to fool innocent Orkut users to enter their Orkut username and password in these fake login pages instead of the real ones. When the users land on these page they enter their Orkut username and password thinking it to be the real page but actually it is other way round. It submits all the entered details to the creator of the fake login page. In this way it’s obvious for many people to lose their Orkut Account password.
3. Orkut New Features: Some sites on internet may claim to offer many additional features for Orkut users. Also these sites will offer a login page from their own website and force users to login to their Orkut Account from this page itself inorder to gain access to the additional features. In fact these sites are acam and they take away your password when you enter your Orkut username and password on their pages. This is similar to that of phishing attack.
4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not Orkut . This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.
5. Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it. So be careful, javascripts can even be used to hack Orkut !
6. Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut Account , then hacker can hack Orkut Account by simply using USER ID and clicking on ‘forget password’. This way Google will send link to the already hacked primary email ID to change the password of the Orkut Account . Hence the email hacker will change your Orkut Account ’s password. Hence your, Orkut Account is hacked too.
So a better thing would be to keep a very unknown or useless email ID of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker. Hence your Orkut Account saved.
So, I hope that this post not only teaches you to hack Orkut Account  but also to hack protect your Orkut Account .

read more

What to do when your Orkut Account is Hacked ?



What to do when your Orkut Account is Hacked ?
It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut , Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.
Here are some options suggested by Google Support when your forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:
Type the email address associated with your Google Account or Gmail user name at Gmail Forgot Password Link – you will receive an email at your secondary email address with a link to reset your Google Account Password. This will not work if the other person has changed your secondary email address or if you no longer have access to that address.
2. For Google Accounts Associated with Gmail:
If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:
If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message. It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.

read more

How to Copy Locked Photos from Orkut



How to Copy Locked Photos from Orkut
Recently Orkut updated it’s security feature and disabled Right-click on Photos of friend’s album. So this makes it difficult to Copy Photos from Orkut . It’s a new security update made by Orkut to prevent people from Copy ing Photos from Orkut and misusing it. This may be annoying most of you! Then…
How To Copy Locked Photos From Orkut ?
Yes it’s still possible to Copy the Photos from Orkut . Here’s a step-by-step procedure to Copy the photo.
1. Login into your Orkut Account.
2. Goto your friend’s album and open the photo that you need to Copy .
3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.
4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….
Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!

4. Now the photo gets displayed seperately on your browser.
5. You can Right-Click and select the Save As option to save the photo onto your PC.
The browser also displays the direct link to the photo. This link can be used to share the Orkut Photos with your friends without the need to login to your Orkut account to access Photos .
Please express your opinions through comments. Cheer Up..
Happy Orkut Hacking.

read more