Blogger Tips and TricksLatest Tips For BloggersBlogger Tricks

Tuesday 16 June 2015

Coin BOX calling Hack(Free Call)

[trick]Coin BOX calling Hack(Free Call)



Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
6.Go Home Smiling(hehehe)





Credit- Some orkut community


Thankx

JNV walo enjoy karlo!!!

ALL SAMSUNG SECRET CODES NEW

ALL SAMSUNG SECRET CODES NEW

This post is an collection of numerous secret codes for samsung mobiles.they perform a wide variety of functions like imei checking,software version etc.

*#06# Shows IMEI number of your mobile.
*#9999# Show software version of mobile.

SEE MEMORY CARD PASSWORD IN PC & UNLOCK IT

SEE MEMORY CARD PASSWORD IN PC & UNLOCK IT

INSERT MEMORY CARD IN A CARD READER
GOTO =>C:\system
by any Explorer
=>rename
mmcstore - mmcstore.txt
=>open file u wil find
the password.
Enjoy yaro!!!

ALL NOKIA CODES...TRY IT!

ALL NOKIA CODES...TRY IT!

ALL NOKIA CODES

(1)*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is

reduced my approx. 5%

(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370#

(3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30%

more Talk Time.

Get your Free Domain Now

Get your Free Domain Now

Get your Free Domain Now

There are 4 Steps
Step 1 : check your Domain Availability Under this box

FREE UNLIMITED WEB HOSTING IN HOSTGATOR FOR 1ST MONTH

FREE UNLIMITED WEB HOSTING IN HOSTGATOR FOR 1ST MONTH

UNLIMITED WEB HOSTING IN HOSTGATOR FREE FOR 1ST MONTH



HEY YOU CAN USE UNLIMITED HOSTING OF HOSTGATOR.COM FOR FREE FOR FIRST MONTH*

REQUIREMENTS:PAYPAL A/C WITH 0.01$ IN IT

SECRET CODES 4 CHINA MOBILES

SECRET CODES 4 CHINA MOBILES

Hi,i have already posted china mobile secret codes for you.now let me post certain more china mobile secret codes for you better use of china mobiles.using these secret codes you can perform various functions.

Impress Your Friends With Invisible Folders !!

There have been many questions on how we actually hide a folder in windows Xp box.hack friends
well its not that tuff if you have brain with some computer :)
This technique is my old school way i have used many  times in need !
Look there is no point in creating hidden folders
because you can just go to -

Tools > View >
Show hidden files and folders

35+ Nokia Cheat Codes

35+ Nokia Cheat Codes

Nokia is a cell phone marketing company which is currently comes in world top rates mobile phones.
Now its obvious that a company like Nokia would use some secret codes for programmers to handle the cell phones in quick usage this post mainly focuses on the secret codes given by the company and how can we make most out of it.

Note this post refers to the cell phone hacking which is also know by its code name i.e.PHREKING

Finding IP address in Gmail From Email Header's

Finding IP address in Gmail From Email Header's

Email headers determine where a message is sent, and records the specific path the message follows as it passes through each mail server.

gmailWhen You send an email to any of your friends or others could be your Girl friends Never mind. But When you send the email through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook Express, etc it also sends the Email Header which contains Some important information for Us i.e.Hackers.

Your Facebook can be HACKED in 18 ways--- Beware

Your Facebook can be HACKED in 18 ways--- Beware





1. Social Engineering

2. Facebook Phishing

3. Keylogging

Trick to Use Android Smartphone as WebCam

Trick to Use Android Smartphone as WebCam

If you do not own a WebCam, then you can now easily use your smartphone as Web Camera. If your Smartphone have good Camera quality then its even better. Web Camera Comes really handy when you wish to video chat with your friends or family members.
Use Android Smartphone as WebCam

By using your Android

Most Dangerous Cyber Armies And Their Attacks .

Most Dangerous Cyber Armies And Their Attacks .

The Largest And Biggest Cyber Armies Countdown.

And Their Most Lethal Attacks.

"Sir, We Are Surrounded. They Have Tanks, RPG's , Mens With AK47 , And They Have Snipers on The Rooftop." Boom, Bang Bang...

War is in the genes of Humans, Ancient Humans Used to fight for their land or respect, Then They started fighting for Religion Expansion, Now for Petrol and Fun (Bush)...The New battle ground is now the Internet. We have cyber-armies that hack and destroy for fun, rush, truth, revenge and other things.

Monday 8 June 2015

Run Firefox inside Firefox

Run Firefox inside Firefox :-

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?

Open block webs!

OPEN BLOCK WEB USING CALCULATOR
Now access the internet via your standard Microsoft Calculator using this trick.
You can do this for fun or when your browser is messed up for some unexplainable reason.
Steps:

1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

Coin Box Calling Hack



Coin Box Calling Hack
Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star
)

Mobile Hacking Tricks!

Trace MObile Location:

Click On Below Link To Trace Unknown Number ->
Trace Mobile Location 


Mobile Bluetooth Hacking:

Types of Hackers!

Hackers are three types:-
 
1.    White hat hacker
2.    Gray hat hacker 
3.    Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?
 

Hack Victim Computer

How To Hack & Access Same LAN Computers ?
If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.

First Step press win+ R

Go to Run> Type Cmd

now type command net view

GTA Sandrease cheats

GTA Sandreas Cheat Codes
Armor, Health, And Money

hesoyam
Complete Pilot School With All Bronze Medals

Enter rustler as a code.
Never Get A Star Rating

To never get a star rating type AEZAKMI
Make All Traffic Fast Cars

Cheat code of games


Clash of Clans Hack v1.72 for Gold, Elixier and Gems 

working on Android and iOS - without Jailbreak - no Survey.

http://loadsnake.com/coc-hack/

AVOID FRIEND REQUEST BLOCK


    AVOID FRIEND REQUEST BLOCK
    
  We usually send friend requests and if it's not accepted it is kept in pending. 
If  there are lots of pending requests it may lead to block.
   
So this is a simple way to get those requests cancelled and protect your account from being blocked.

How To Trace Your Facebook Profile Visitors

  How To Trace Your Facebook Profile Visitors

Now here we found who recently visited your profile.
Follow below steps for get to know your FB recent visitors
.

Step 1) Go to your Facebook Profile Page.

Chat With Command Prompt

 Hello friends Now U Can Chat With Command Prompt THrough So Here IS A Trick.....

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

BYPASS ANDROID PATTERN LOCK!

BYPASS ANDROID PATTERN LOCK!
METHOD I

Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc...) Installed:

INSTRUCTIONS:

1. Download this zip Pattern Password Disable (Download from attachments) on to your sdcard 
(using your PC, as you cant get into your phone, right )

Sunday 7 June 2015

Reveal *****(Asterisk) Passwords Using Javascript

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Is it is possible to reveal by using only simple Javascript ..?

The Answer is YES it is possible just copy this few lines into your browser & Hit Enter then the password will show ..!!

Virus writing code..!!

Virus writing code..!!

friends want to play with your friends computer..?

if yes then start reading this post.

In this article i came with new pranks (or) tricks (or) similar to virus creating ..
ya it's acts like a virus but not virus it's a simple programme.

Is your Nokia Cell Phone Original ?

Is your Nokia Cell Phone Original ?



Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not?

Hack Passwords through USB Drive

Hack Passwords through USB Drive


Ok after completing my 1st internals i would like to wright a article about Hacking USER NAME & PASSWORD through USB drive(pen drive) in easy steps.yes it is possible to hack passwords through USB drive to do this 1st you need to access the target

Ext_change Virus

Ext_change Virus


Here in this article i came with Extension changer virus today i am gonna showing you how to change an Extension of an files.

Folder Replicator Batch virus

Folder Replicator Batch virus

Today i gonna show you how to make a batch file that creates a folder inside a folder & so on..

How to Make Windows XP into Genuine

How to Make Windows XP into Genuine


In this post i will show how to make your windows XP into Genuine without paying a single buck..!! Yes it is possible to make windows xp into Genuine without buying the original License.

Cannot able to Delete Files or Folders ?


Cannot able to Delete Files or Folders ?



When ever we try to delete some files or folder in our PC some times it shows an error like this

* Cannot delete file: Access is denied
* There has been a sharing violation.
* The source or destination file may be in use.
* The file is in use by another program or user.
* Make sure the disk is not full or write-protected and that the file is not currently in use.

How to speedup Adobe Reader ?

How to speedup Adobe Reader ?


Each new version of Adobe Acrobat Reader seem to be getting slower than previous version. I have used Adobe Acrobat Reader since v4 and it was fast. When it was v5 - v7, the loading speed was still fine. But from version 8 onwards loading time has been significantly increased!

What is mean by Ethical Hacking??

What is mean by Ethical Hacking??
Ethical Hacking, also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers
An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certiļ¬ed ethical hackers are among the most sought after information security employees in large organizations such as Wipro ,Infosys ,IBM ,Airtel and Reliance among others.