
1. Stephen Wozniak

2. Tim Berners-Lee

3. Linus Torvals

4. Tsutomu Shimomura

5. Richard Matthew Stallman

6. Johanna Rutkowska.

Simple Trick To Convert A Webpage To PDF File
In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started.
How To Save Web Page To PDF File ?
1. Open the Google Chrome Browser on your PC or MAC
2. Then go to the web page that you want to convert as a PDF.
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser.
4. Now Change the destination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document.
Make money from YouTube videos
Remember that viral video you laughed at yesterday while chowing down on your doughnuts? That video could have earned the maker more than £100,000.We’re not kidding when we say you can earn some serious dollar from YouTube videos and it might just be the funnest money making gig like EVER.
While it sadly isn’t as easy as clapping your fingers and the money appearing in your bank account like magic, making money out of YouTube videos is still a relatively simple concept.
And, in an effort to help you earn some dollar, we’ve put together this step by step guide. Send us some of your earnings maybe?
How to make money from YouTube videos
How much money can you make?
How does it work?
What do you need to get started?
How do you make your videos the bestest?
How can you make even more?
How much money can you make?
Straight in there with the killer question, you shrewd lot. Well, the answer is a bit of a mixed bag really, if we’re honest.
While you might be lucky and find a video clip of yours goes viral and earns you £100,000 (like the guy who uploaded a clip of one of his son’s biting the other one’s finger), this is very unlikely. That said, if you have got something funny, by all means give it a shot.
You’re much more likely to build up revenue by getting an audience through constant content, whether you’re making vlogs, cat videos or just talking about custard creams.You might remember the tale of 17 year old Fred Pye – he hit the news recently for earning £24,000 a year by making walk-throughs for Grand Theft Auto.
But as we said, it isn’t all like this. Livie Rose, a beauty blogger from Brighton says her pay fluctuates from thousands one month to £50 the next, and some people only report a few pounds here and there.
What can you realistically expect?
As a benchmark you can expect to make around $1.50/1000 views. This means that 1million views = $1500… That’s around £880 to us English folk.
However, keep in mind that a lot of the channels (such as Epic Mealtime) sign advertising contracts with certain companies or even promote their own merchandise, like T-shirts, which can earn them even more on top of their views alone.
It’s hard to put a total on this but the possibilities are endless depending on what your videos are about.
How does it work?
The basic deal with this is Google Adsense, a nifty little programme that allows you to monetise (we love that word) your website or videos with adverts.
After you’ve signed up with the beast that is YouTube and built a decent amount of followers and views you’ll receive an email asking if you want to monetise your videos. You’ll then be able to select videos you want to earn dollar on.
The basic gist of this is companies pay Google to advertise on your videos and you’ll get a cut of the profit.
Just to be clear, you can’t monetise any videos with copyrighted material in them. So no nicking other people’s stuff y’hear?
What do you need to get started?
Depending on what you’re planning on filming you’ll need to get your setup sorted from the beginning.
There’s no point having good content if you’re filming it on your iPhone. A decent setup goes a long way towards showing that you’re serious and having people respect your videos.
You’ll need:
A decent camera – Quality is important and you’ll need to record your videos in full 1080p HD.
Video editing software – Both PCs and Macs have pretty decent video editing software (Movie maker & iMovie) but Adobe Premier is a decent option for advanced users.
Sound recording equipment – Most cameras come with a microphone but if you’re looking for top sound quality you might need to purchase a decent microphone.
Lighting – This is not an essential but some top Youtubers swear by it.
A decent backdrop – If you’re filming a vlog or pieces to camera you might want to set up a decent backdrop. You can stick with plain white or jazz it up a bit with a collection of posters for example.
How to make your videos the bestest?
As we said before, the way this works is you get popular then you get paid. You can’t sign up to monetise videos no one has watched yet.
It makes sense really, who wants to pay to advertise on a billboard no one walks past? Yet while building up a decent audience might seem daunting, there are some easy tips that might help you get there sooner:
Choose your genre: One of the most popular genres on Youtube is gaming walk-throughs but it’s a pretty competitive. Take some time to think about what you can do well and whether you think you can make a success of it. Other genres that work well are: product reviews, comedy, how to’s, sports and films.
Choose a good username: Sounds trivial, trust us, it isn’t. You need to make your username memorable and steer clear from numbers and random characters. Yes, that means Xxx_ponysrock92_xxX is a no go. Sorry.
Catchy relevant titles: Make your title both catchy and relevant. That way people will remember it, and more people will stumble across it if they’re searching for something similar.
Upload regularly: You won’t build an audience if you stop posting! Remember, the longer you keep that audience locked in, the more monies you get.
Be original: There’s nothing wrong with tried and tested formats such as reviews or cat videos, but you have to make sure you stand out from the crowd. Go forth and be different kids!
Show your enthusiasm: You need to be creating videos about something you love. Having a passion for your videos will show! If you don’t love what you’re doing you’ll soon get bored and the videos will start to show that. The passion comes first and the money comes second…
Always make sure to follow the rules too; no inappropriate content, copyright or spamming. Play nice and you’ll be fine.
How do you make more?
If you’ve built up a pretty sizeable base and have a dedicated audience, there is one other avenue to explore aside from Google Adsense and YouTube itself.
Patreon is a great little web tool that allows your fans to sign up and donate money directly each time you post something new.
The key to this is building up an audience that appreciates you – if they like what you do the chances are they can be persuaded to part $1 or more each time you upload. Yes it’s US money, but money is money!
Also, as mentioned above, you can approach companies to talk about advertising or at the very least free sample for you to review/talk about.
You might even want to branch out into creating your own merchandise once/if you make a name for yourself.
Some of the big shots on here are earning about three thousand dollars everytime they post a new video. Yes you read that right.
So, have you decided to give YouTube video-ing a crack? We’d love to see your efforts and hear how it went! Make sure to hit us up in the comments below.
TOP TEN OPERATING SYSTEM FOR HACKING
So today I come up with the OS that hackers used for hacking. The top on this list is the Kali Linux which has almost all types of hacking tools that are totally free for everyone. All operating systems are based on Linux kernel, we all know the reason behind this fact, that Linux is the free and open source. Today we're discussing Top Ten Operating System For Hacking which has great penetration testing or ethical hacking tools.
1. Kali Linux
Kali Linux is a Debian-derived Linux configuration create for digital forensics and penetration testing. It’s maintained and funded by Offensive Security Ltd. Kali Linux updates its tools, and it’s available for many different platforms like VMware, ARM, and many more.
2. BackBox
It is based on Ubuntu is a Linux distribution. Your safety assessment and penetration testing want to play, then, this software should be in your repository is one. It actively protects the IT infrastructure.
3. Backtrack 5r3
As viewers of the operating system, keeping in mind the savviest security is built. It also protects data within the discipline is a useful tool for the early newcomers. These security tools today to assemble the largest database update discovery and provides a fast and easy way.
4. SELinux
Linux, or SELinux various userland tools and improved security is used for books that have an upstream repository. SELinux services and facilities as well as the usefulness of this tool are found in the compilation of policy, policy management and coverage of various capabilities.
5. Knoppix
Knoppix STD PCs that focuses on safety devices based on Knoppix Live CD Linux configuration. The GPL license following categories tools, password cracking, authentication, encryption, forensics, honeypots, intrusion detection systems, firewalls, network utilities, penetration, of packet sniffers, assemblers, risk assessment and Wi-Fi networking.
6. Pentoo
Pentoo a security assessment and penetration testing Live CD and Live USB is designed for. Based on Gentoo Linux, Pentoo both 32 and 64 bit offers installable live CD. Some tools are available with the latest version of the toolchain compiled from a tough double - Pentoo kernel security and peace are hard and extra screws.
7. Live Hacking Operating System
OS also live hacking penetration testing or ethical hacking tools useful for hacking a large package which is based on Linux. These include the inbuilt GNOME graphical user interface. There is only one command line, which is available in a second variation, and it requires very little hardware requirements.
8. Matriux Krypton
Weakerth4n later, it is based on the Debian operating system is probably the first division. It provided 300 security and ethical hacking tools, systems and cyber forensics investigations, security testing, penetration testing and network management etc.
9. NodeZero Linux
NodeZero Linux is a powerful, reliable and stable. Based on the industry leading Ubuntu Linux distribution, NodeZero Linux needs all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.
10. DEFT
DEFT Operating System is based on the Linux Kernel 3 along with the Digital Advanced Response Toolkit. It uses WINE in order to run Windows tools Linux and predominantly run with the LXDE desktop environment.
So above is all about Top Ten Operating System For Hacking. Hope you like it so please don't forget to share this post with others.
TYPES OF HACKERS
Hackers are three types:-
1. White hat hacker
2. Gray hat hacker
3. Black hat hacker
White Hat and Grey Hat Hacker & What is the Real Difference?
What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.
So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.
White Hat Hacker
A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.
Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
Publish computer, they can exploit their capabilities found a new circle. They were not limited to the constraints of the physical world, instead, they can travel through the virtual world of computers. Before the Internet, interaction and exchange of information for the Bulletin Board System (BBS) is used. When the Internet appeared, however, real explosion occurred.
Today, anyone can become a hacker. Within that value, are three types of hackers. Also known as the black hacker, cracker to obtain personal benefits in criminal activities is someone who uses his computer knowledge. A typical example of a financial institution to make some money on the exploitation of the weaknesses of the system is one.
The white hat hacker. White hat hacking can be considered like a black hacker, though, a significant difference. A white hacker does with any criminal intent. , Their system testing white hackers who want to contract companies worldwide. They test how secure their systems, and they could be found that would indicate any faults. You want to be a hacker with a white cap, Linux, a PC and an Internet connection is all you need.
Grey Hat Hackers
A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.
If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.
If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.
Each year, Def Which Las Vegas, Nevada is observed. However, hackers are not the only ones who go to this event. Computer media, computer security experts, lawyers, and government employees are also. The Hacker (computer security, worms, viruses, new technologies, coding, etc.) in the world, somehow, all of them related, is composed by different kinds of tracks. Besides tracks, computer hacking, lockpicking and even robots that related events are compared. Around the world, public or private institutions, to protect the system: in the end, you want to use ethical hacking, white hat hacking or whatever the name, it has a purpose. After all, hackers can now be located anywhere, and they can be counted by millions. Soon, white hat, white hat concepts like the Linux operating system or will be common knowledge. A true testament to how much our society has been affected by technology.
Black Hat Hackers
Black hat hackers all over the world have become the iconic image of hackers. For the majority of computer users, the word hacker social misfits and criminals has become a synonym for.
Of course, the media is an injustice created by their interpretation, so a hacker and a black hacker (or cracker) is what is important to learn. Therefore, the black hat techniques and how they make our life a little more difficult to learn two.
With malicious intent who breaks into computer systems or networks (you prefer cracker, or) black hat hacker is used to describe. A white hat hacker contrast, black hat hacker probably destroying files or stealing data for the purpose, takes advantage of the break. Black Hat hacker victim without notifying other hackers and / or known to the public can exploit. The other organization is able to secure it offers the opportunity to exploit the vulnerability.
HOW TO BECOME A WHITE HAT HACKER
Ethical hacking is the perfect career choice for those interested in problem solving, communication and IT security. Here's what it takes to become a white hat hacker.
A math wiz with an interest in cryptography, IT security and computer forensics is looking for a career path. A bachelor's and master's degrees in mathematics, and with both strong technical aspirations, Benedikt best candidate for penetration testing and ethical hacking.
Benedikt be lacking in it that will help them in the work and IT related work experience certificate. Benedikt white hat hacking and if we need more hands-on experience they can get their foot in the door will help the security recommendations of a number of IT certifications. We identify long-term career goals as you can discover some Benedikt offer alternative career paths and certification
Dear Benedikt:
His academic background is excellent. Given her math skills, just to find among his interests cryptography'm not surprised. Direct, hands-on work with the cryptography involved in the development work is to find yourself, as long as it, though, the research and educational institutions itch to scratch can be a difficult.
Namely, white hat hacking and penetration testing - on the other hand, the more aggressive side of the security seal is a perfect backdrop.
To start with the Certified Ethical Hacker (CEH) certification would urge you to go after. CEH certification is a vendor neutral and CEH certified professionals are in high demand.
CEH five-day training class without prior work experience is recommended for candidates, but also a self-study options are available to help pass the required exam. This intermediate level certification offered by EC- Council and system hacking, data, social engineering, SQL injection, trojans, worms, viruses and Service (DoS) attacks and other types of attacks, including denial, is focusing on. Candidates also cryptography, penetration testing, firewalls, honeypots and must show greater knowledge.
CEH is an interesting credential for someone with your background; hacking involves a great deal of problem solving, which you're used to in math, as well as communication skills, which you expressed an interest in. Becoming a certified white hat hacker also involves staying on the legal side of hacking, never engaging in illicit or unethical hacking activities and protecting the intellectual property of others. As part of your certification process, you'll need to agree to hold up EC-Council's code of ethics and never associate yourself with unethical hackers or malicious activities.
In addition to the CEH, you should also consider the SANS GIAC curriculum instead of either the SSCP or Security+ certifications that you mentioned. If you start with their Security Administration certs, beginning with the GSEC, you might find yourself better positioned to climb an active, well-respected and deep security curriculum. The GIAC credentials will work well with your background to set you up very nicely on your career path in IT security.
TOP 10 FACEBOOK PROFILE HACKING TECHNIQUES
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the Top 10 Facebook Profile Hacking Techniques
Top 10 Facebook Profile Hacking Techniques
1. Facebook Phishing
Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.
2. Keylooging
Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
3. Stealers
Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are softwares specially designed to capture the saved passwords stored in the victim's browser, Stealers once FOOD can be extremely powerful.
4. Session Hijacking
In a session hijacking attack, connection for a hacker to access victims' accounts on a Web site used to authenticate a user uses the browser cookie stole the victims: an HTTP fees If you are accessing your session hijacking can often be very dangerous, session hijacking is widely used LAN.
5. Sidejacking With Firesheep
The attacker and the victim is on the same Wi-Fi network, but it is still popular now a days, attacks were common in late 2010 Sidejacking, Firesheep sidejacking widely used to attack, Firesheep works. HTTP session hijacking attacks as a sidejacking another name, but it is targeted by the Wi-Fi users.
6. Mobile Phone Hacking
Millions of Facebook users through their mobile phone to access Facebook. The hacker then perhaps his / her Facebook account can access the victims can access the mobile phone. A cell phone is used to monitor many of them are mobile software.
7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
8. USB Hacking
If an attacker has physical access to your computer, they just automatically store passwords in the browser program with a function to extract a USB is inserted, you also get access to the link below which can be read by the attack is posted on:
9. Man In the Middle Attacks
The victim and the attacker on the LAN and are on a switch based network, a hacker client and server W / B can place himself or he, ARP poisoning capture all traffic because of the default gateway can act as gateways to the other name for the man in the middle attacks, a very broad topic and is beyond the scope of this article,
10. Botnets
Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.
How to Earn Money on YouTube
You’ve probably heard stories about regular people earning money on YouTube and thought, “Hey, I can do this too!”. While earning thousands of dollars probably isn’t realistic, you can start earning money quickly, especially if you have a strong subscriber base. Follow this guide to get your videos monetized and start earning revenue off of those YouTube ads.
Steps to make money with YouTube
1.Set up and build your YouTube channel. Your channel is your personal presence on YouTube. Each YouTube account has one channel attached to it. A YouTube account is the same as a Google account, and creating a YouTube account will grant you access to other Google products, such as Gmail and Drive.
Create your account or use your existing one. Add keywords to help people find your channel. You can add keywords by navigating to the Advanced section of your Channel Settings. Make sure that your keywords are relevant to your content.
Your user name can also work for or against you. If it’s short, easy to remember, and original, people will be more apt to remember you. However if you are using an existing account, just stay with it. It doesn't help if you keep changing accounts.
2. Add content. Try to upload content that is high quality, and isn't super long. (This option can vary depending on what type of content you decide to upload) Also try to upload regularly and stay consistent with your uploads.
Even if your content isn't great at first, keep at it. Practice makes perfect. Try to make each video better than the last. You will often learn as you go.
Improve your content by either using a better camera or trying better editing software or techniques. Also try to improve the way things are filmed. Use a tripod, have a friend help you or light your scenes better. It all helps for a better end product which in turn helps you get a better audience.
By uploading regularly you can help hold an audience. People are more likely to subscribe if you add content on regular schedule, and maintain that schedule as much as possible.
Make sure to tag your videos with key words that describe the content, as well as an eye-catching description. These will help drive people to your video from YouTube searches.
3. Gain an audience. Building an audience is key to increasing your monetization. You need people to watch your ads in order to make any money off of them. There is no one secret to getting more subscribers, just make the best content that you can and they will come to you.
Keep uploading content and try to get people hooked. Send your video out on Twitter and Facebook. Share it with people. Distribute it elsewhere on the internet. Subscribers are essential to becoming a partner.
Interact with your viewers by responding to comments and making occasional videos directly related to viewer comments and questions. Connecting with your community will bring more members into that community.
4. Monetize your videos. In order to start earning money on your videos, you’ll need to enable monetization. This means you are allowing YouTube to place ads in your video. This also means that you acknowledge that there is no copyrighted material in your video.
You can monetize a video as it uploads by clicking the Monetization tab and checking the “Monetize with Ads” box.
To monetize a video after it has been uploaded, open your Video Manager and click the “$” sign next to the video that you want to monetize. Check the “Monetize with Ads” box.
5. Setup Google AdSense. You can setup Google AdSense for free at the AdSense website. Click the Sign Up Now button to begin creating your account. You must be 18 years or older to create your own account. If you are younger than that, you will need an adult to help you.
You need either PayPal or a bank account and a valid mailing address as well as other information so AdSense can verify who you are and who to send the money to. You only gain money per ad click and a smaller amount per view but it adds up over time. This is why having an audience is key.
6. Check your analytics. Once you have some videos online, monetized, and being viewed, you can check out the analytics on them to see how they are performing. Click the Analytics option in your Channel menu. Here you can view estimated earnings, ad performance, video views, demographics and more.
Use these tools to see how your content is resonating with your audience. You can change your content or your marketing if you’re finding that you aren’t attracting the users that you want to.
7. Market your videos elsewhere. Don't put your videos just on YouTube! Start a blog, make a website or post them on other video or social media sites. The more views it gets, the better. By sharing the link or embedding the video on the internet, you are increasing the chance of it getting noticed and of you making money.
8. Become a YouTube partner. YouTube Partners are YouTube members who have monetized videos with a large number of viewers. Partners gain access to more content creation tools, and can win prizes for the number of viewers they have. Partners also get access to much more community support and tips.
You can apply for YouTube partnership at any time through the YouTube Partner page. In order to gain access to the most powerful Partner programs, you need to have 15,000 cumulative watch hours for your channel over the last 90 days.
Here are some tips which can help you to gain more audience and money
1. Share your video on social media like Facebook, Twitter, etc.
2.Use key words so people see your video.
3.Upload content regularly.
4.Make sure you add tags when uploading videos.
5.Make videos with good content as well as quality.
6.Put time and effort into editing your videos.
7.Make videos based on what's popular on the Internet.
8.Create social networking site accounts (Facebook, Twitter, etc.) and advertise for yourself!
Warning
1. Some people may leave mean comments to bring you down. Don't let them discourage you.
2.Copyrighted content can get your videos taken down, and possibly banned.
3.If any of your videos contain copyrighted content (i.e - music that you didn't make, content from movies, etc) you have less of a chance of getting into the partner program.
4.Partnerships with YouTube for most people do not earn very much. Unless you have a huge success, don't plan on a job free life.
How to Become Popular on Facebook
Ever wanted to know what you can do to become popular on Facebook? It has nothing to do with knowing the right people and everything to do with being Facebook savvy. By improving your profile, socializing, and connecting to a number of different networks, you can start booming with Facebook friends in a computerized heartbeat. You can also follow us on Facebook
Become popular on Facebook
1. Improve your profile. Add your best photo shot from your digital camera on Facebook. Only update your status if you have something out of the ordinary to say or if you are guaranteed to get 'likes' as this will heighten your prestige and character in your social life. People will remember you. Add a photo gallery, of you, your friends, and family members, or even vacation places.
2.Participate in many opportunities. Join as many interesting groups as you can. Add as many applications as are interesting and useful. Become fans as many things that you like, that is a great way to show your friends what you like. You don't want a bunch of profile junk. Take cool quizzes.
3.Join a network including your school or college network. You can then meet people through your network.
4.Search for as many friends as you can and add them. Add friends of friends. Add family members.
5.Socialize! Write on peoples walls only for interesting things. Do not send them virtual drinks and gifts, as many will feel irritated and annoyed. Poke some of them. Comment on photos. Give plenty of compliments,
6.Add information to your profile. Write your (IM) name on your profile. Write your e-mail address on your profile. If you want you can write your cell phone number on your profile, it's too dangerous to put your land line number on there. Put your school or college on your profile. If you have declared your major or your program, just put your major on there. Put you place of employment and previous place of employment. Facebook is somewhat of a resume so try to make it professional as possible because employers and teachers do look at your profile.
Here I have listed some tips which can help you to become Popular on Facebook
1. Try not to make facebook your "diary".
2.Look good in your photos. Do not over edit your photo's, take the picture outside for good lighting, make sure it has good quality. When taking a picture smile, put your chin down a little and look into the camera. Using picnik.com you can also whiten your teeth, even skin tone or make an zit disappear. If you're not comfortable with your smile look cute by smiling with your mouth closed. always attractive.
3.If you want to be well liked on Facebook, and in life for that matter, cultivate your friendships. Be outgoing and fun when you are around others. You'll likely get invited to parties and such, but even if you don't you can always throw a party yourself.
4.Don't give compliments to people unless they are genuine. People can tell when they aren't.
5.Like they say: "If you want to have a friend, you have to be one." People never write on your wall? Ask an old friend how it's going, or ask that girl on your soccer team if practice is cancelled, and hopefully you'll get a conversation going, giving both yours and their wall some action.
6.Like/comment the last on girl pictures,so they see that you have liked and they'll maybe like your profile picture !
7.Try to add as many people in your network as possible (the more friends) the more popular you will look!
8.Spice up your profile. There are lots of Apps out there to express your individuality. Try to put the apps in the boxes because you don't want to junk up your info.
9.Go on Facebook around 6:00-10:00pm, because you get more likes due to more people having finished work and schoolwork, so they go on Facebook as a break.
10.Don't try to tease your other friends. Make them make fun of you so that they would be closer to you.
I think this will must help you of you have any problem just comment bellow I am waiting for your response
You can also follow us on Facebook
How to Hack Wi Fi Using Android
Do you want to test your network security? It used to be that you needed a desktop OS such as Windows or Linux installed on a computer with a specific wireless network card. Now, however, you can also use certain Android devices to scan and crack wireless networks. These tools are available for free as long as your device is compatible. Hacking routers without permission is illegal. These steps are provided to test the security of your own network.
I will tell you two methods to hack wifi
1. WEP Routers
2.WPA2 WPS Routers
You can also join us at Facebook
************************************
WEP Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy S1/S2/S3/S4/S5
Galaxy y
Nexus One
Desire HD
Micromax A67
2.Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this article goes into more detail.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Tap "Run bcmon terminal". This will launch a terminal similar to most Linux terminals.Type airodump-ng and tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Type airodump-ng wlan0 and tap the Enter button.
5.Identify the access point you want to crack. You will see a list of available access points. You must select am access point that is using WEP encryption.
6.Note the MAC address that appears. This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down.
Also note the Channel that the access point is broadcasting on.
7.Start scanning the channel. You will need to collect information from the access point for several hours before you can attempt to crack the password. Type airodump-ng -c channel# --bssid MAC address -w output ath0 and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.
Replace channel# with the channel number the access point is broadcasting on (e.g. 6).
Replace MAC address with the MAC address of the router (e.g 00:0a:95:9d:68:16)
Keep scanning until you reach at least 20,000-30,000 packets.
8.Crack the password. Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and type aircrack-ng output*.cap and tap Enter.
9.Note the hexadecimal password when finished. After the cracking process is complete (which could take several hours), the message Key Found! will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work.[2]
When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter 1234567890.
WPA2 WPS Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy Ace/S1/S2/S3
Nexus One
Desire HD
2.Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this article goes into more detail.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. The Reaver APK can be downloaded from the developers' thread on the XDA-developers forums.
5.Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.
You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.
The access point you select must accept WPS authentication. Not all routers support this.
6.Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.
7.Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.
Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful.[1]
I think I have cleared all the doubts, if there is still any doubt just comment bellow
How to Hack a Website with Basic HTML Coding
If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.
Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.
Steps to Hack a Website using HTML codes
1. Open the site you want to hack. Provide wrong username and wrong password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --) An error will occur saying wrong username and wrong password. Now be prepared because your experiment starts from here.
2. Right click anywhere on that error page =>> go to view source.
3. Right click anywhere on that error page =>> go to view source.
4. Delete the JavaScript from the above that validates your information in the server. Do this very carefully.—Your success in hacking the site depends upon how efficiently you delete the java script code that validates your account information.
5. Take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write ).
6. Go to file => save as and save it anywhere in your hard disk with ext.html (e.g.: c:\chan.html).
7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.
Warnings
Do the coding and changes very carefully. Your success to hack the site depends upon this i.e. how efficiently you delete the JavaScripts that validate your account information.
If you have any problem just comment below