Login / Register

Tips and Tricks

  • How to Hide Facebook Friend List from Others

    Privacy is one of the big concerns of Facebook, but recently FB implemented a lot of new settings for maintaining a user’s privacy.

    Now, a user has control on almost everything in their profile (e.g. status, photos, albums etc). The user also has the control of how they want to share material (e.g. with everyone, friends, friends of friends, etc). Users can even manually hide a status from specific people.

    do the following simple steps

    • Login to your Facebook account
    • Go to your Profile page
    • Click on Friends

    Then You will get the following screens  , click the manage button on the right top side

    In the friend list. make it only me to hide your friendlist. done

    Read more »
  • All the Terms Of Hacking World You Should Know

    Common Terms Of Hacking World:

    1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack.

    2# VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.

    3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

    4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for  collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World Wide Web. The part  Hypertext is a structured text that makes use of logical links (hyperlinks) between nodes containing text. 

    5# SSH: Secure Shell( SSH)  is a cryptographic i.e, encrypted network protocol that operates at layer 7 of the OSI Model. It allows remote login and other network services to operate in a secure way over an unsecured network. In simple words, SSH is used to connect with Virtual Private Servers.

    6# FTP: The FTP or File Transfer Protocol is a standard network protocol that is used to transfer files between a client and server using a computer network.

    7# XSS (CSS): Cross-site scripting or XSS is a type of computer security vulnerability usually found in web applications. This vulnerability allows hackers to inject client-side script into web pages which are viewed by other users.

     8# Script Kiddie: A Skiddie or Script Kiddie is an unskilled individual who uses programs or scripts developed by other hackers to attack networks and computer systems even to deface websites.

    9# VPN: A Virtual Private Network or VPN helps in extending a private network across a public network, such as Internet. It allows the users to send and receive data across public or shared networks just like their computing devices are directly connected to the private network. Hence this benefit from the security, functionality and management policies of the private network.

    10# Nix: Nix is a very powerful package manager for Linux and other Unix based systems that make package management reproducible and reliable. It provides side-by-side installation of multiple versions of a package, atomic upgrades and rollbacks,  easy setup of build environments and multi-user package management.

    11# SQL:  Structured Query Language or SQL is a special-purpose programming language designed for managing data contained in a relational database management system (RDBMS), or even for stream processing in a relational data stream management system or RDSMS.

    12# FUD: Fully undetectable or FUD in short, can stand for data that had been encrypted, making it appear to be random noise. This term is used in hacker circles to refer something as a clean software to many anti-viruses but still contain some kind  of hacking tool inside it.

    13# LOIC/HOIC: The Low Orbit /High Orbit Ion Cannon, often abbreviated to LOIC/HOIC. It is an open source denial-of-service attack and network stress testing application written in BASIC and is designed to attack as many as 256 URLs at a time.

    14# Trojan: A Trojan or Trojan horse is a type of malware that disguises itself as a legitimate software. these Trojans can be employed by hackers and cyber-thieves trying to gain access to users’ systems. Users are typically tricked  into loading and executing Trojans on their systems.

    15# Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.

    16# SQL Injection: SQL injection is a famous code injection technique, commonly to attack data-driven applications.In this attack, malicious SQL statements are inserted into an entry field for execution.

    17# Root: Root is the Highest permission level on a computer that allows the user to modify anything on the system without a  single restriction.

    18# Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.

    19# White Hat Hacker: A white hat hacker is a computer security specialist ( ethical hacker ) who breaks into secured systems and networks to test and assess their level of security. These are the good guys in the hacking community and use their skills and knowledge to to improve security by exposing vulnerabilities before a malicious hacker (also known as black hat hackers) detects and exploits them.

    20# Black Hat Hacker: A black hat hacker is an individual with very good computer knowledge and with a sole purpose to bypass or breach internet security for malicious reasons. Black hat hackers are also known as dark-side hackers or crackers. These are the guys with whom White hat hackers have to fight all the time.

    21# Grey Hat Hacker: The term Grey Hat hacker refers to a computer hacker or computer security expert who sometimes violate laws or typical ethical standards, for personal purposes but don’t have the malicious intentions like a typical black hat hacker.

    22# Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.

    23# Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.

    24# IP Grabber: IP Grabber is a link that grabs victim’s IP when they visit it the particular web address.

    25# Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

    26# Phreak: Phreak is a slang term coined to describe the activity of a culture of people who  experiment with, explore, or study, telecommunication systems. Phreaker, phreak, or phone phreak are names commonly for and by individuals who participate in phreaking.

    27# DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.

    28# Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

    29# Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.

    30# Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

    31# RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity.

    source: Hackagon.

    Read more »
  • Photoscan by Google Turns Your Phone Into a Photo Scanner

    The team behind Google Photos has released a new app that save your old physical prints and give you a digital copy to save and upload to Google Photos. The premise is pretty simple; take a picture of your picture and let the app crop, zoom, and adjust the image automatically for you. Then you’ll have a copy saved in your Google Photos library to do anything with.

    Photos are automatically cropped, rotated, and color corrected. You can save them to Google Photos with one tap — and then, when you want to find them, you can just search for “scans” inside Google Photos and they’ll all come up. (You can also save them to your camera roll or share them to other apps.)

    PhotoScan by Google Photos(Download for Android)

    Scan in seconds:This app capture your favorite printed photos quickly and easily, so you can spend less time editing and more time looking at your bad childhood haircut.

     For iphone download here from app store 

    Read more »
  • Youtube Magic Easter Eggs

    Youtube Magic Easter Eggs

    Search below keywords in Youtube search bar and see the magic happens in your screen. These are one of the best easter eggs that works with youtube websiteሸ

    Google Easter Eggs for Pro Internet User

    • “Use the force luke” – You can move everything around with your mouse like a Jedi.
    • “Beam me up scotty” – All search results teleport on the page.
    • “Doge meme” – All fonts change to comic book sans.
    • “Do the Harlem shake” – Everything moves wildly to the Harlem Shake song.

    Youtube TV (Really Amazing Trick)

    Youtube TV is one of the best features for PC users. When you go to youtube tv website, you don’t see any type of ads and other disturbing things. The interface is very clear and very eye catching for any web users. Use this website for watching youtube videos in your PC like a pro user.

    Read more »
  • Cool YouTube Tricks Every User Should Know

    We all know Youtube is one of the most popular video streaming websites. We all see lots of video from Youtube Websites. Here we share some tricks for youtube user that definitely increase your knowledge about Youtube Website.

    #1 Download Whole Youtube Playlist of Videos from Single Click (With Software or Without Software)

    Download Whole Playlist of Youtube Video from a single click without software from a website. 

    For Computer users:

    Open Downvids.net in your computer and paste youtube playlist URL. This website provides you download links of all youtube videos in the single click.


    For android Mobile: Download Downvids from play store

    #2 Download Youtube Videos without any Software

    Download any youtube video from this simple trick. Add SS before youtube in URL and you can easily download any youtube video in your computer and mobile.

    Read more »