Search

Friday, 20 September 2013

How toBypass ANY SMS(PHONE) verification


How toBypass ANY SMS(PHONE) 

verification


This guide will only work with US numbers -

How this works:

You get a free virtual number that can be used for reviving sms and sending SMS. You don't need to verify by email. You can create unlimited phone numbers, and the numbers will never expire, when they are in use.


Step 1:
First, you have to go to: Textfree Web for Free Unlimited Texting


From Your Computer . Now from there, create an account. By clicking On Signup FREE, and 

then filling out the form.

Step 2:
Now login, into your account. When you have to enter the zip code, enter something like 


this 10453. At entering the age, just enter some random age.

Now choose a number and then hit Confirm.

Step 3:
Now click on Options. From there you can copy your phone number. Use this to bypass any 


SMS verification.


Visit This Site For Doing So :- http://pinger.com/tfw/

how to make fear facebook friends pranks

how to make fear  facebook friends pranks

FACEBOOK PRANKS:

Facebook is worlds popular social networking site.It is that success because most of them use Facebook for chatting with friends,sharing pictures,videos and some other information.And there are many Facebook tricks available to make use of Facebook effectively.Now here in this post i will let you a PRANK that makes your friends scary.

Ghost Facebook Prank:

  • Just click here to go to GHOST PROFILE
  • As soon as click above link then you are directed to ghost profile 
  • Just wait for few seconds then you will see that suddenly a ghost arrises  from center of Facebook just like below
  • Now just copy the link and send to your friends
facebook+ghost+profile
  • I used this tricks on my friends and many of friends are so scarred  especially girls are shouting when they watched this prank and scared a lot.

How to convert your video file in to animated image


How to convert your video file in to animated image 


Hey there, in this tutorial i am going to show you how you can easily convert the format of your video file to animated image. TO do so all you need is format factory and its a free desktop application which will help you to convert any video into the animated format and you can also convert your video in to any format you want without losing the quality of the video.
Get the Format Factory from here.
Just install the format factory tool and then simply open it.

How to convert video file into animated file

Select GIF there and then simply click on add file and then browse the video file you want to convert it in the animated image.

how to convert video file into image

Now just click on the start and then the process will be going on and it will alert you when the file conversation is completed and just click on the file and go to the output folder and you will get your video file converted into the animated image.

NSA purchased zero-day exploits from French security firm Vupen


NSA purchased zero-day exploits from 

French security firm Vupen


The National Security Agency bought hacking tools from a security firm, based on 

documents unearthed by a FOI request.

The bombshell media leaks that exposed the U.S. National Security Agency's surveillance 

projects were easily one of the main stories of the year -- with international and political 

repercussions -- but now a Freedom of Information request has unearthed the additional 

purchase of hacking tools.

Ex-NSA contractor Edward Snowden is wanted by the U.S. government for leaking 


confidential documents to the media which exposed the agency's surveillance techniques 

used not only on American citizens, but allegedly other countries and their residents.

While Snowden is currently living in Russia under guard and silent, revelations continue to 


surface. One of the latest reports claims that the NSA is able to access data from Apple 

iPhones, BlackBerry devices, and phones that use Google's Android operating system. In 

addition, following document leaks which suggested the NSA was accessing email records, 

number of companies offering secure email shut down, and in their place, encrypted 

mobile phone communication applications have risen.

A fresh report, brought on by a Freedom of Information (FOI) request by government 


transparency site MuckRock, shows that the NSA purchased data on zero-day vulnerabilities 

and the software to use them from French security company Vupen.

According to the documents, the NSA signed up to a one-year "binary analysis and exploits 


service" contract offered by Vupen last September.

Vupen describes itself as "the leading provider of defensive and offensive cyber security 


intelligence and advanced vulnerability research." In other words, the security firm finds 

flaws in software and systems and then sells this data on to governments.

In addition, Vupen offers offensive security solutions, including "extremely sophisticated 


and 

government grade zero-day exploits specifically designed for critical and offensive cyber 

operations."

Zero-day vulnerabilities are security flaws in systems discovered by researchers and 


cyberattackers which have not been found or patched by the vendor. These flaws can then 

be exploited to gain access to a system and its information, or the vulnerabilities can be 

sold 

on the black market. White-hat hackers may reveal the flaw to the vendor for free or as 

part 

of a 'bug bounty' program.

The finding isn't all that surprising, considering a report released in May previously claimed 


that the United States is the world's "biggest buyer" of malware.

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty


How to Hack Wi-Fi: Cracking WPA2-PSK 

Passwords with Cowpatty


I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK 

passwords. A few months ago, we cracked WPA2 using aircrack-ng. In this tutorial, we'll 

use a piece of software developed by wireless security researcher Joshua Wright called 

cowpatty (often stylized as coWPAtty). This app simplifies and speeds up th

dictionary/hybrid attack against WPA2 passwords, so let's get to it!

Step 1: Find the Cowpatty

Cowpatty is one of the hundreds of pieces of software that are included in the BackTrack 

suite of software. For some reason, it was not placed in the /pentest/wireless directory, but 

instead was left in the /usr/local/bin directory, so let's navigate there.

[code]

cd /usr/local/bin

Because cowpatty is in the /usr/local/bin directory and this directory should be in your 


PATH, we should be able to run it from any directory in BackTrack.

Step 2:
Find the Cowpatty Help Screen

To get a brief rundown of the cowpatty options, simply type:



[code]

cowpatty

BackTrack will provide you a brief help screen. Take a note that cowpatty requires all of the 


following.

- a word list

- a file where the password hash has been captured

- the SSID of the target AP

Step 3:
Place the Wireless Adapter in Monitor Mode

Just as in cracking with aircrack-ng, we need to put the wireless adapter into monitor mode.

[code]

airmon-ng start wlan0

Step 4:
Start a Capture File

Next, we need to start a capture file where the hashed password will be stored when we 

capture the 4-way handshake.

[code]

airodump-ng --bssid 00:25:9C:97:4F:48 -c 9 -w cowpatty mon0

This will start a dump on the selected AP (00:25:9C:97:4F:48), on the selected channel (-c 


9) and save the the hash in a file named cowcrack.

Step 5:
Capture the Handshake

Now when someone connects to the AP, we'll capture the hash and airdump-ng will show 

us it has been captured in the upper right-hand corner.

Step 6:
Run the Cowpatty

Now that we have the hash of the password, we can use it with cowpatty and our wordlist 

to crack the hash.

[code]

cowpatty -f /pentest/passwords/wordlists/darkc0de.lst -r /root/cowcrack-01.cap -s Mandela2

As you can see in the picture, cowpatty is generating a hash of every word on our wordlist 


with the SSID as a seed and comparing it to the captured hash. When the hashes match, it 

dsplays the password of the AP.

Step 7: Make Your Own Hash

Although running cowpatty can be rather simple, it can also be very slow. The password 

hash is hashed with SHA1 with a seed of the SSID. This means that the same password on 

different SSIDs will generate different hashes. This prevents us from simply using a 

rainbow 

table against all APs. Cowpatty must take the password list you provide and compute the 

hash with the SSID for each word. This is very CPU intensive and slow.

Cowpatty now supports using a pre-computed hash file rather than a plain-text word file, 


making the cracking of the WPA2-PSK password 1000x faster! Pre-computed hash files are 

available from the Church of WiFi, and these pre-computed hash files are generated using 

172,000 dictionary file and the 1,000 most popular SSIDs. As useful as this is, if your SSID 

is not in that 1,000, the hash list really doesn't help us.

In that case, we need to generate our own hashes for our target SSID. We can do this by 


using an application called genpmk. We can generate our hash file for the "darkcode" 

wordlist for the SSID "Mandela2" by typing:

[code]

genpmk -f /pentest/passwords/wordlists/darkc0de.lst -d hashes -s Mandela2

Step 8: Using Our Hash

Once we have generated our hashes for the particular SSIDs, we can then crack the 

password with cowpatty by typing:

[code]

cowpatty -d hashfile -r dumpfile -s ssid

Download Torrent Files Directly To Your DropBox Account

Download Torrent Files Directly To Your 

DropBox Account


Torrent is the popular way of downloading stuffs from the Internet. We all use sometorrent client and then start downloading files from Internet. There are some web based clients are also available that allow us download torrent files. But in schools, colleges and office, torrents clients are blocked but those places have high speed Internet. If torrentclients are blocked then we can not use that high speed Internet to download our favorite files from the web.
Download Torrents Files to your DropBox Account Without Any Torrent Client

For this kind of situation, I know a nice web based torrent client called BoxoPus. BoxoPus works in different way. It download file from torrent and then upload it directly to your Dropbox account. It does not have any limit and offers unlimited traffic.

How to Use Boxopus

Boxopus is very simple and work fast. Just visit Boxopus and register for a new account. You can use your Facebook, Twitter or Dropbox account to login on Boxopus.

Then you well see a big text box with browser button. Now pick a torrent file from your system and click on "Put IN My DropBox" button.
Download Torrents Files to your DropBox Account Without Any Torrent Client

Then it will show you the detail of the torrent with a big "Start Download" Button. Click on the button to start download.

You also need to authorize the app to access your dropbox account to put the file in it. After that it will start downloading the file and it will directly saved in the DropBox account inside a folder Boxopus.


This app is really helpful for those who want to download movies from the high speed Internet in office or schools.

If you like this post, share it with your friends on various social media websites. Don't forget to subscribe us to get this kind of tips.

2013 latest Technology That May Change The World

2013 latest Technology That May 

Change The World

Technology That May Change The World

INTRODUCTION 

We have seen great leaps in digital technology in past the past five years. Smartphones, cloud computing, multi-touch tablets, these are all innovations that revolutionized the way we live and work. However, believe it or not, we are just getting started. Technology will get even better. In the future, we could live like how people in science fiction movies did.

IOS 7 (Latest )

iOS 7 is the seventh version of the iOS mobile operating system and is the successor to iOS 6. It was announced at the company's Apple Worldwide Developers Conference (WWDC) on June 10, 2013, and was released on September 18. It includes a redesigned user interface and a number of improvements to the operating system's functionality. The design of iOS 7's new elements was led by Jonathan "Jony" Ive, Apple's Senior Vice President of Design.

Google Glass

Google Glass (styled "GLΛSS") is a wearable computer with an optical head-mounted display (OHMD) that is being developed by Google in the Project Glass research and development project, with a mission of producing a mass-market ubiquitous computer. Google Glass displays information in a smartphone-like hands-free format, that can communicate with the Internet via natural language voice commands. 
While the frames do not currently have lenses fitted to them, Google is considering partnerships with sun glass retailers such as Ray-Ban or War by Parker, and may also open retail stores to allow customers to try on the device.[1] The Explorer Edition cannot be used by people who wear prescription glasses, but Google has confirmed that Glass will eventually work with frames and lenses that match the wearer's prescription; the glasses will be modular and therefore possibly attachable to normal prescription glasses. 
Glass is being developed by Google X, which has worked on other futuristic technologies such as driverless cars. The project was announced on Google+ by Project Glass lead Babak Parviz, an electrical engineer who has also worked on putting displays into contact lenses; Steve Lee, a product manager and "geolocation specialist"; and Sebastian Thrun, who developed Udacity as well as worked on the autonomous car project.[13]Google has patented the design of Project Glass.[14][15] Thad Starner, an augmented reality expert, is a technical lead/manager on the project.

Form 1

Just as the term suggests, 3D Printing is the technology that could forge your digital design into a solid real-life product. It’s nothing new for the advanced mechanical industry, but a personal 3D printer is definitely a revolutionary idea.
Everybody can create their own physical product based on their custom design, and no approval needed from any giant manufacturer! Even the James Bond’s Aston Martin which was crashed in the movie Was a 3D Printed Product.

Oculus Rift
Virtual Reality gaming is here in the form of Oculus Rift . This history-defining 3D headset lets you mentally feel that you are actually inside a Video Game. In the Rift’s virtual world, you could turn your head around with ultra-low latency to view the world in high resolution display.
There are premium products in the market that can do the same, but Rift wants you to enjoy the experience at only $300, and the package even comes as a development kit. This is the beginning of the revolution for next-generation gaming.
The timing is perfect as the world is currently bombarded with the virtual reality topic that could also be attributed to Sword Art Online, the anime series featuring the characters playing games in an entirely virtual world. While we’re getting there, it could take a few more years to reach that level of realism. Oculus Rift is our first step.

Leap Motion
Multi-touch desktop is a (miserably) failed product due to the fact that hands could get very tired with prolonged use, but Leap Motion wants to challenge this dark area again with a more advanced idea. It lets you control the desktop with fingers, but without touching the screen.
It’s not your typical motion sensor, as Leap Motion allows you to scroll the web page, zoom in the map and photos, sign documents and even play a first person shooter game with only hand and finger movements. The smooth reaction is the most crucial key point here. More importantly, you can own this future with just $70, a price of a premium PS3 game title!
If this device could completely work with Oculus Rift to simulate a real-time gaming experience, gaming is going to get a major make-over.

Eye Tribe
Eye tracking has been actively discussed by technology enthusiasts throughout these years, but it’s really challenging to implement. But Eye Tribe actually did this. They successfully created the technology to allow you to control your tablet, play flight simulator, and even slice fruits in Fruit Ninja only with your eye movements.
It’s basically taking the common eye-tracking technology and combining it with a front-facing camera plus some serious computer-vision algorithm, and voila, fruit slicing done with the eyes! A live demo was done in LeWeb this year and we may actually be able to see it in in action in mobile devices in 2013.
Currently the company is still seeking partnership to bring this sci-fi tech into the consumer market but you and I know that this product is simply too awesome to fail.
Firefox OS
iOS and Android are great, but they each have their own rules and policies that certainly inhibit the creative efforts of developers. Mozilla has since decided to build a new mobile operating system from scratch, one that will focus on true openness, freedom and user choice. It’s Firefox OS.
Firefox OS is built on Gonk, Gecko and Gaia software layers – for the rest of us, it means it is built on open source, and it carries web technologies such as HTML5 and CSS3.
Developers can create and debut web apps without the blockade of requirements set by app stores, and users could even customize the OS based on their needs. Currently the OS has made its debut on Android-compatible phones, and the impression so far, is great.
You can use the OS to do essential tasks you do on iOS or Android: calling friends, browsing web, taking photos, playing games, they are all possible on Firefox OS, set to rock the smart phone market.

Project Fiona
Meet the first generation of the gaming tablet. Razer’s Project Fiona is a serious gaming tablet built for hardcore gaming. Once it’s out, it will be the frontier for the future tablets, as tech companies might want to build their own tablets, dedicated towards gaming
Google driverless car
The Google driverless car is a project by Google that involves developing technology for autonomous cars. The software powering Google's cars is called Google Chauffeur.[2] Lettering on the side of each car identifies it as a "self-driving car." The project is currently being led by Google engineer Sebastian Thrun, director of the Stanford Artificial Intelligence Laboratory and co-inventor of Google Street View. Thrun's team at Stanford created the robotic vehicle Stanley which won the 2005 DARPA Grand Challenge and its US$2 million prize from the United States Department of Defense.[3] The team developing the system consisted of 15 engineers working for Google, including Chris Urmson, Mike Montemerlo, and Anthony Levandowski who had worked on the DARPA Grand and Urban Challenges.[4]
The U.S. state of Nevada passed a law on June 29, 2011 permitting the operation of autonomous cars in Nevada. Google had been lobbying for robotic car laws.[5][6][7] The Nevada law went into effect on March 1, 2012, and the Nevada Department of Motor Vehicles issued the first license for an autonomous car in May 2012. The license was issued to a Toyota Prius modified with Google's experimental driverless technology.[8] As of April 2012, Florida became the second state to allow the testing of autonomous cars on public roads.[9] California became the third state to legalize the use of self-driven cars for testing purposes as of September 2012 when Governor Jerry Brown signed the bill into law at Google HQ in Mountain View.

Top Trends for 2013

1) Internet of Things
The Internet of Things is more than just the newest buzzword. The IoT promises to be the most disruptive technological revolution since the advent of the World Wide Web. Projections indicate that up to 100 billion uniquely identifiable objects will be connected to the Internet by 2020, but human understanding of the underlying technologies has not kept pace. This creates a fundamental challenge to researchers, with enormous technical, socioeconomic, political, and even spiritual consequences.
2) Cybersecurity
Recent technological advances in computing, communications, software, and hardware have enabled the significant growth of cyberspace, an important aspect of modern life that continues to transform the way citizens, business, and governments interact, collaborate, and conduct business. Our heavy dependence on various digital infrastructures has made them strategic national assets that must be protected to ensure economic growth, prosperity, and safety in the future.

3) Big Data Visualization
We've entered a data-driven era, in which data are continuously acquired for a variety of purposes. The ability to make timely decisions based on available data is crucial to business success, clinical treatments, cyber and national security, and disaster management. Additionally, the data generated from large-scale simulations, astronomical observatories, high-throughput experiments, or high-resolution sensors will help lead to new discoveries if scientists have adequate tools to extract knowledge from them.

4) Cloud Computing in Science and Engineering
Cloud computing has emerged as a dominant paradigm, widely adopted by enterprises. Clouds provide on-demand access to computing utilities, an abstraction of unlimited computing resources, and support for on-demand scale-up, scale-down, and scale-out. Cloud platforms are also rapidly becoming viable for scientific exploration and discovery, as well as education. As a result, it is critical to understand application formulations and usage modes that are meaningful in such a hybrid infrastructure, the fundamental conceptual and technological challenges, and ways that applications can effectively utilize clouds.
5) Mobile Computing Meets the Cloud
It could be argued that two of the most important technological developments of the last few years are the emergence of mobile and cloud computing. By shifting the hardware and staffing costs of managing computational infrastructure to third parties such as Google, Microsoft, or Amazon, cloud computing has made it possible for small organizations and individuals to deploy world-scale services; all they need to pay is the marginal cost of actual resource usage. At the same time, the deployment of 3G and 4G networks, the rapid adoption of feature-rich smartphones, and the growing integration of computation into consumer products such as cars and home appliances, have brought mobile and pervasive computing into the mainstream.
6) Internet Censorship and Control
The Internet is a battleground where fights for technical, social, and political control are waged, including between governments and their citizens, separate governments, and competing commercial interests. These fights take many forms, including Internet filtering versus circumvention, surveillance versus anonymization, denial of service attacks and intrusion attempts versus protection mechanisms, and on- and offline persecution and defense of online activists. These battles impact and are impacted by the Internet's technical structure. As the Internet continues to embed itself into our world, its structural changes will have an increasing effect on our social and political structures, and our social and political structures will have increasing impact on the Internet's technical structure. This special issue of IEEE Internet Computing will explore the technical, social, and political mechanisms and impacts of Internet censorship and control.
7) Interactive Public Displays 
Next-Generation Mobile Computing
9) 3D Imaging Techniques and Multimedia Applications
10) Safety-Critical Systems: The Next Generation

13) Multicore Memory Coherence
As we enter an era of large multicores, the question of efficiently supporting a shared memory model has become of paramount importance. Massively parallel architectures lacking coherent shared memory have enjoyed great success in niche applications such as 3D rendering, but general programming developers still demand the convenience of a shared memory abstraction

Finally, BlackBerry Messenger is coming to Android and iPhone this weekend

Finally, BlackBerry Messenger is coming 

to Android and iPhone this weekend




The BBM app will be available for devices running Android 4.0 and up, or iOS 6 and iOS 7. 

It will allow Android and iOS users to communicate with BlackBerry owners.

BlackBerry's popular BlackBerry Messenger (BBM) instant chat application will be available 

for Google's Android and Apple's iPhone this weekend, the company said.


Rumors about the app coming to Android and iPhone started in June. The app will be 


available for devices running Android 4.0 and up, or iOS 6 and iOS 7. It will allow Android 

and iOS users to communicate with BlackBerry owners.

BlackBerry Messenger (BBM) is a proprietary Internet-based instant messenger and 


videotelephony application included on BlackBerry devices that allows messaging (and 

videocalls for BlackBerry 10 smartphones) between BlackBerry users. BBM currently has 

more than 60 million monthly active customers on BlackBerry alone, and the overwhelming 

majority use BBM an average of 90 minutes per day.

The news comes in the wake of other rumors that Blackberry could fire 40% of its staff. 


This comes at a time that the company is suffering heavy losses from its failed PlayBook 

tablet and a fading popularity in the smartphone market.

BBM for Android and iPhone features:

BBM Chat – Enjoy real, immediate conversations with friends on Android, iPhone and 


BlackBerry smartphones. Not only does BBM let you know that your message has been 

delivered and read, it also shows you that your friend is responding to the message.

More than chat – With BBM you can share files on your phone such as photos and voice 


notes, all in an instant.

Keep your group in the loop – Multi-person chats are a great way to invite contacts to chat 


together. BBM Groups lets you invite up to 30 friends to chat together, and go a step 

further 

than multi-chat by sharing photos and schedules. And, with Broadcast Message, you can 

send a message out to all your BBM contacts at once.

Post Updates and stay in the know – BBM lets you post a personal message, profile picture 


and your current status, and lets your contacts know instantly in Updates.

Your unique PIN – Every BBM user has a unique PIN that maintains your privacy, so you 


don’t have to give out your phone number or email address to a new or casual contact.

Availability: BBM will be available as a free download for Android smartphones running Ice 


Cream Sandwich and Jelly Bean (Android 4.x) beginning at 7AM EDT on September 21. 

BBM for iPhones running iOS 6 and iOS 7 will become available for each market on the App 

Store schedule of 12:01 AM local time on September 22.

You can download the app from the BBM website: www.bbm.com