Archive for 2010

Amazing Facebook Layouts (Themes)

Red Rock Theme

How to install Facebook Layouts (themes)

To install a Facebook layout on Firefox install either the Greasemonkey or Stylish extensions. After installing the one of those 2 Firefox add-ons, restart Firefox, go to a Facebook layout (Theme) page and click the install button on the top right corner.

To install a Facebook layout on Chrome, just directly go to a Facebook layout (Theme) page and click the install button on the top right corner.
For other browsers, before download choose your browser near the download tab and download and install.

Bonus: Auto-Colorizer for Facebook - a Greasemonkey only script which changes the Facebook layout color depending on each profile picture. That means each profile will basically have a different color.

Click here... Browse and download your desired theme...
Friday, December 24, 2010

Free Calls via Gmail till 2011 by Google

Just when year 2010 was coming to end, Google has decided to play Santa by extending free Google Voice calling via Gmail till end of 2011. Google Voice acts as voice mail transcription, free local calls, free local SMS, cheaper International Calls and single number for several other numbers - mobile, home, office.
Free calling for US and Canada citizens via Google Voice was destined to end by this year's last day. Back in June, Google opened up Google Voice for all US and Canada based citizens. 

After Apple approved Google Voice App for iPhone, Google released the same for iPad and iPod touch as well. Still Google Voice continued to be available only to consumers in US and Canada. Active effort has been put in to make use of Google Voice wherever possible and recently we saw its integration into Gmail. Post this, a new Call Phone option appears in the Gmail interface based Chat list. Of course, consumers in US and Canada need to have a Google Voice account to reap such benefits.

Tuesday, December 21, 2010

New Google Search Alerts against Hacked Websites.

Notifications will warn users against web pages that may infect the computer.
On a normal day, you'd visit Google to search about something and click on one of the links in the Search Results. 
But there's no way of knowing if the link you clicked contains malicious code. Last weekend, Google made Search Engine updates live, which includes a new alert feature. From now on the Google Search Results will clearly show notification for hacked websites.

The notice of 'This site may be compromised' helps you avoid the pages that have been compromised with malicious code and spam to attack the visitor's system.

Monday, December 20, 2010

Google Body Browser Flaunts Web3D Tech (HTML 5)

Google Labs has always churned out pretty interested experimental features like Transliteration, Indic Music Search, WalkyTalky, Google Scribe and so on. 
Google has released a new Body Browser experiment that shows a detailed 3D model of the human body in Google Chrome web browser beta. 
Users can view through the anatomical layers of human body, zoom in and navigate to explore the human body parts. 
The new Google Body Browser is pretty commendable for use in a medical education environment. 

Body Browser is supported only by browser with WebGL support. WebGL is a cross-platform web standard for low-level 3D Graphics API exposed through the HTML5 canvas element. This experimental feature lets you identify whether you wish to explore male or female anatomy. Rest is all based on your interests and interactions with the 3D model of a human body. You can click and zoom in to different anatomical layers to see the finite details. 

Saturday, December 18, 2010

Facebook to use Face Recognition to Tag Photos

Face Recognition technology developed in-house to group similar faces together and make tagging simpler.

Facebook proudly boasts of getting millions of photos uploaded per day compared to photo-upload and sharing service - Flickr. After uploading hundreds of photos, it becomes difficult to tag all your friends. To make that task easier, Facebook has announced new Tag Suggestions feature that automatically suggests who (out of your contacts) should be tagged in the photo from a group of similar photos. 

This feature makes use of Face Recognition technology to group similar looking faces together. Facebook would be rolling out this feature for US region by next week. 

Popular social network Facebook is one of the most favorite hangout for youngsters and an online junction to connect for many. As of now, tagging multiple photos can be a time consuming task. 
With the new Tag Suggestions feature, thanks to Facebook's Face Recognition technology developed in-house, it will automatically show similar photos to be tagged, as soon as you upload a new batch. This is how it is supposed to work.

Suppose you upload photos of your recent college reunion on Facebook. When you wish to tag them, Facebook will groups similar faces together from the photos uploaded and show them with 'Who is this?' suggestion. 
Thursday, December 16, 2010

Accelerate your Game Performance with Futuremark 3DMark 11

Your PC s performance is determined by the interactions between different hardware components, the operating system and the type and amount of software running. A benchmark provides a set of performance tests that can be repeated with a high degree of accuracy on a wide range of computer hardware.

3DMark 11 is the latest version of the world s most popular benchmark for measuring the graphics performance of gaming PCs. Designed for testing DirectX 11 hardware running on Windows 7 and Windows Vista the benchmark includes six all new benchmark tests that make extensive use of all the new features in DirectX 11 including tessellation, compute shaders and multi-threading.

Sunday, December 12, 2010

How to create a simple fake virus for windows by using the nircmd utility.

Have you ever dreamed of creating a fake virus yourself to play a prank by installing the virus on your friend computer and a making a fool of him. If Yes then this post is of great interest to you.
So what would you like to do with a virus to make your friend believe that a virus has infected his/her computer.
Hmm….let me guess?
1. Suddenly Opening and closing of cd drive.
2. Power off the monitor.
3. Log out the user out of windows xp.
4. Turn off the computer.
5. And much more….well actually any of the above events combination can make any windows user thinks that his/her system is infected.
Tuesday, November 23, 2010

Think twice before you post anything on social networking sites.

Social networking sites allow you to express yourself and keep in touch with friends by exchanging messages or comments and posting personal profiles describing who you are and your interests, blogs or online diaries, photos, creative writing, artwork, videos, and music. Instant Messaging (IM) and sharing online profiles are popular forms of social networking.

If practiced safely, there can be many positive aspects of social networking. You can connect with friends and seek like-minded individuals. However, you should understand how posting too much information on your profile and communicating with people you’ve only met online can put you in potential danger.

Some sites and services ask you to post a “profile” with your age, sex, hobbies, and interests. While these profiles help you connect and share common interests, potential exploiters can and do use these profiles to search for victims.
Users may pose as someone else — a different person or a person of a different age — without others knowing. Such users have taken advantage of this and this aspect of social-networking profiles to entice or sexually exploit teens.
You can’t “take back” the online text and images you’ve entered. Once online, “chat” as well as other web postings become public information. Many web sites are “cached” by search engines, and photos and text can be retrieved long after the site has been deleted.
Teens have been punished by their families; denied entry into schools; and even not hired because of dangerous, demeaning, or harmful information found on their personal sites or blogs.
Thursday, November 11, 2010

Facebook, Twitter, WordPress Fail Security Report.

Facebook, Twitter, and WordPress have failed a security exam conducted by "security think tank" Digital Society, highlighting old vulnerabilities most recently displayed by the spread of Firesheep.
Gmail and WordPress, which use an encryption and identification process known as SSL, received A's. Google scored a C, Yahoo and Amazon received a C-, and Hotmail and Flickr received a D-.

The main reason Twitter and Facebook failed is because neither uses complete SSL authentication, according to the report. In other words, a user can't know for sure if the authentication page they think they're visiting is actually HTTP. WordPress without SSL, the free version commonly used by personal bloggers, also lacked SSL authentication for logins.

A Facebook spokesman said the company has "been making progress testing SSL access across Facebook and hope to provide it as an option in the coming months."
Saturday, November 6, 2010

5 Useful Applications For A USB Drive

We all love our USB drives, don’t we? You should probably be using someportable apps on your USB drive.
In this post, I want to cover a few apps that will make managing your USB drive easier. In essence I’ll talk about tools that can be used to make things easier if you’ve got a USB drive – not about apps that work from your drive.
So here we go - five applications to make things easier if you’re using a USB thumb drive.

1) Prevent Virus Infections on your USB Thumb Drive with ThumbScrew
If you’re working on a system that’s probably infected with viruses, you wouldn’t want to see your USB thumb drive get infected by the same – they probably have some backups of your data that you cannot afford to lose. However, if you’re in an inevitable situation where you really have to access the USB drive do so after you install ThumbScrew.
ThumbScrew can be used to write-protect your USB drive so that malware from your computer doesn’t spread to it. Download and launch the app, right click the System Tray icon and choose ‘Make USB Read Only’. Nothing could be written to the USB Drive, you’re completely protected from infections spreading to your disk from your computer.

2) Eject USB Devices Quickly with USB Disk Eject
Windows does give you options to eject your USB drives – we all use that by clicking on the Safely Remove Hardware’ option in the System Tray. But have you ever thought it’s too cumbersome and the list confuses you more than helps you remove thatparticular device?
People who’ve got multiple USB Devices connected to their system will have really felt this annoyance as the hardware remove dialog doesn’t make it clear which option removes what device.
Here’s the solution: Download this tiny but functional app called USB Disk Eject. Just double-click when you need to remove a USB drive and a window will pop up listingthe devices connected to your system via USB. Each device is labelled clearly and legibly. Just double-click on the one that you want to get removed and you’re done.
Sunday, October 31, 2010

How to use your Gmail space as your hard disk

If you are having extra space on your Gmail account and you are running out of space on your hard disk. Then you can use that free Gmail space as a hard drive. Using a cool freeware program called Gdrive will create an extra drive inside My Computer and every time you use this drive i.e. use files from it, is actually downloading and uploading to your Gmail account.

1>    First download Gmail Drive
2>    Extract the files from the downloaded file and click Setup.
Friday, October 1, 2010

How to protect your facebook account from hackers...

Over the past week, Facebook has been nudging its users - first gently, then firmly - to review and update their privacy settings.
You may have procrastinated by hitting "skip for now," but Facebook eventually took away that button and forced you to update your settings before continuing to use the site.
After finally accepting Facebook's recommendations or tweaking the privacy settings yourself, though, you might have made more information about you public than what you had intended.
At the same time, Facebook has given users many granular controls over their privacy, more than what's available on other major social networks.
So if you want to stay out of people's view, but still want to be on Facebook, here are some things to look out for as you take another look at your settings.
Just follow these 10 steps...

1. Some of your information is viewable by everyone.
Everyone can see your name, your profile photo and the names of work and school networks you're part of. Ditto for pages you are a fan of. If you are worried about a potential employer finding out about a quirky fetish or unorthodox political leaning, avoid becoming a Facebook fan of such groups. You can't tell Facebook you don't want those publicly listed. Your gender and current city are also available, if you choose to specify them. You can uncheck "Show my sex in my profile" when you edit your profile if you don't want it listed, and you can leave "Current City" blank.

2. Your list of friends may also be public.
Facebook also considers your friends list publicly available information. Privacy advocates worry that much can be gleaned from a person's list of friends — even sexual orientation, according to one MIT study. But there is a way to hide the list. Go to your profile page and click on the little blue pencil icon on the top right of your box of friends. Uncheck "Show Friend List to everyone." Either way, those you are already friends with can always see your full list.

Friday, September 24, 2010

Send Email in Mission Impossible Style [Self Destruct]

You might remember the world famous movie scene from Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.
Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient’s inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? 
Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?
Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that’s already been sent or read. Don’t leave your messages sitting in peoples’ inboxes forever. Get a free BigString email account to protect your privacy.
BigString takes the risk out of email
Now, with BigString, you can finally take the risk out of email and put an end to “sender regret.” It is the world’s first & only email service that thoroughly protects your safety and privacy.

Thursday, September 9, 2010

How to make your profile confidential from search engines?

Have you tried searching your name on search engines like Google or Yahoo? You might be surprised when you see results that shows your Facebook profile, this is assuming that you already have an account though. If this is an issue where is related to pricay then please consider reading this article. It will guide you on how to make your Facebook profile private and unsearchable on search engines.
In order to hide your profile from search engines, do the steps below.

1. Login to Facebook so you can make necessary changes to your settings.

2. Navigate/Go to Privacy Settings under Settings menu on upper right corner of Facebook.
Saturday, September 4, 2010

Google IP ban then all the way to access Google services

Hi friends I have several days of crippling google internet ip blocking my view the solution reached by the method of problem today, in fact, a method we all know, a little configuration, hosts are able to access all Google services without interruption. Not only that google searches which fitted the cause of the address engelinide are lifting so that your calls are inserted from happening, and the results to propose, you mean you properties of reuse can be whatever prolix without you this trouble recovered from a let.
\ WINDOWS \ system32 \ drivers \ etc directory and get into [the secret files, view open and known file extensions, hide the feature you remove (the folder options menu)] hosts file in notepad with the open and your localhost line to the bottom.
Thursday, August 26, 2010

Top 5 Websites To Learn How To Hack Like A Pro

hackerWhether you’re a college student, a middle-aged networking guru or a wife and mother fascinated by the world of online games – everyone occasionally comes across a situation where some form of hacking would make life a whole lot easier.
Maybe you’ve lost the license that came with your legitimate software package that you paid for. Maybe you want to make a backup copy of your favorite DVD movie, but there’s copy-protection encoded onto the disk. Or maybe you’re just stuck on a popular online game and you want to know if there are any hacks available to level up in the game without the required effort.
Whatever your specific needs or situation – I’m not here to judge. In the field of computers and Internet technologies, just about everything is written in one programming language or another. No programmer is perfect – they all make mistakes. There are back doors, secret codes and vulnerabilities in just about any application you come across. Because of that, if you learn how to hack on your own, or just following the efforts of active hacking communities can provide you with tremendous eye-opening insight into the inner-workings of even your most “trusted” software applications.

Where You Can Go To Learn How To Hack Like a Pro

One thing that’s obvious when you visit the websites where professional hackers hang out – there’s so much about programming that even the most seasoned professional programmers don’t know. Professional hackers are an exceptional, amazing and terrible breed of individuals all packaged into one. While I write this, I realize that I am also describing over half of our readership – you know who you are! These folks take programming to an extreme that’s simply astounding when you see it in action.
While many of us write applications using all of the standard techniques that you learn in programming classes in college, these folks take programming into a realm where there are no rules. They can test all aspects of an application until they find a chink in the armor, and then exploit those vulnerabilities.
As we explore the world of hacking, it should be noted that there are two major forms of hacking – we’ll call it “white hat” and “black hat.” The “white hat” hackers call themselves “ethical hackers,” in that they find vulnerabilities and exploits only to make the programming and application communities more secure for everyone. However, there’s a whole other community of hackers who find vulnerabilities to do nothing more than exploit them as much as humanly possible. Now that you know what sort of community you may be entering, let’s get on with the list of top sites where you can learn how to hack.

#1 – CyberXtreme: Hacking and Warez

CyberXtreme is an impressive forum with a significant hacking section, but also entire sections on technology, graphics and even a tech support area. Here you’ll find cracks, secret codes, free download packages (some containing cracked software which may be illegal to download in your area, so be careful). The forum is very protective of its content, so you’ll have to register with a valid email address before you can even get a glimpse of the content that’s on the forums.
learn how to hack
The hacking section is very detailed and, as shown above, includes not only free tools and software exploits, but if you want to learn some coding tricks from the resident hacking gurus, just enter the “Coding & Programming” forum and you’ll get your fill. Before long you’ll be writing up your own customized hacking tools!
Saturday, August 21, 2010
Tag :

Blue Screen Virus Creation 1.0

For all those who use a computer there`s nothing worse than the appearance of the blue Windows screen announcing a fatal system error indicating that something has gone horribly wrong inside your PC (and that from this moment on your PC won`t work). 

Blue Screen Virus Creation 1.0 is a joke of doubtful humour to play on your friends (or better, your enemies) that simulates those circumstances of fatal system errors using the famous blue screen... 

Friday, August 6, 2010

Domain Hacking...

In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hacking. For most of you, the term “domain hacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows

Any website say for example consists of two parts. The domain name( and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 
2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new domain “” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “” to point to his web server (of Y). Now whenever an Internet user types “”, the domain name “” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What happens when a domain is hacked

Now let’s see what happens when a domain name is hijacked. To hack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of  “”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name ( is said to be hijacked.

Friday, July 30, 2010
Tag :

Gmail Hack : Using one gmail id with different aliases

Well this is not a new thing which i am going to post here and i have been using this method from last 2 years but today when D3 posted this in oug i thought i should share it here with you people also.

You can use your one gmail to make different accounts at forums etc.
ofcourse there are some temp mail services but they are usually black listed

so here goes.

If your email address is then you can use it like

1. – the normal one
2. – googlemail one
3. – add dots, add dots at differnt places to make different combinations
4. – add a + and after that write anything.
Saturday, July 24, 2010
Tag :

Unthinkable Hacking Techniques !!!

Hi Guys ! I am posting this article for those who use pirated softwares. Because this is the time to stop using pirated softwares. You can't even imagine what your loss can be if you are using your PC for professional purposes. 

Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.
Sunday, July 18, 2010
Tag :

Free 10 Attractive Blogger Templates

Here are the best Blogger Templates , chosen by . If you have any questions about these templates , like how to set it, how to change this or similar , don’t be afraid to ask.

1) Magasin Uno
2) Natural Health
3) Bcute
4) GameZine
5) Windows 7
Friday, July 16, 2010


Read latest Computer Tips & Tricks Posts in your Inbox for Free

Find Us on Facebook

Popular Post

- inferno19 - Just a dark world redefining hacking blogs - Copyright © -