How to hack facebook latest trick 2011



CLICK ON THE LINK BELOW


http://www.takethislollipop.com/


And click on connect with facebook button


Login with your account and see what happen........

Upcoming os of ubuntu










Canonical is already working on the next version of Ubuntu, which will be long-term support (LTS) with a curiosity, instead of the 3 years of support that was offered for each version, this time will be 5 years. Good news for those who do not usually update as often. LTS to Ubuntu 4.12 has been chosen name, Precise Pangolin, Pangolin something like precise and publication schedule is as follows:     
December 1, 2011 - Alpha 1  
2 February 2012 - Alpha 2    
March 1, 2012 - Beta 1     
March 29, 2012 - Beta 2     
April 19, 2012 - Release Candidate (RC)     
April 26, 2012 - Final version there are only a little over six months to see what we offer at Canonical will be his first LTS with Unity.

Best Antivirus 2011 survey



NOD32

15 (39.5%)

Kaspersky

3 (7.9%)

Avast!

11 (28.9%)

Avira

5 (13.2%)

Norton

0 (0%)

Panda

0 (0%)

Microsoft Security Essentials

0 (0%)

AVG

3 (7.9%)

BitDefender

0 (0%)

G-Data

1 (2.6%)

McAfee

0 (0%)

Dr. Web

0 (0%)

F Prot

0 (0%)

Rav Desktop

0 (0%)


How to setup your own ftp server


Process-1:
First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..

1) Goto no-ip & create urself a free account.

2) Now ur account been created & ll receive ur account password via mail to ur email address.

3) After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.

5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:-ftpserve.com) Click on Submit.

6) Now u have owned ur own static address (example: abc.serveftp.com)

7) Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users..

8) After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it.

9) At last tick on da check box present at the static address.

10) U have ur own static web address.


Process-2:
Installation & setting of the FTP-Server

1) You have to install Serv-U 4.1.03 , download this software from here

2) Run Serv-U & use da wizard to setup ur FTP.

3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next.

4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain field & click upon next.

5) U ll be asked for anonymous access, select No & click upon next.

6) Next u ll be asked for creating a named account, select yes & click upon next.

7) Choose any user name u wish (eg:-xyz) & clcik upon next.

8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password.

9) U ll be asked for da home directory for the account which u have created above.Select directory & click upon next.

10) Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next.

11) At last ur account has been created click finish.


Process-3:
Configuring the user accounts which u have been created.

1) On the left tree-menu, select da account which u have been created above & den click upon General Tab.

2) Goto Hide 'Hidden' Files.

3) Check Allow only and enter the number one in the box.

4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth.

5) choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)

6) Click upon Dir Access Tab.

7) Now u can c home folder here.Highlight it & make ur permission.

8) If u want only users to download check only these Read,List & Inherit.

9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder.

10) If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner.

11) There are many things u can do, These are only the basics....

12) Your server is now ready to be connected..

13) Login with your username & password...


Uninstall windows using cmd


Uninstalling Windows from Command Prompt:

One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me.

The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel.

If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool.

If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt.

The procedure is as follows:

Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.

Start the computer to Safe Mode with Command Prompt.

At the command prompt, type cd\, and then press ENTER.

Type cd\windows\system32, and then press ENTER.

Type osuninst.exe, and then press ENTER.

On screen instructions will guide you through the uninstall process to revert to the previous operating system.
This procedure can only be performed by users logged on as Administrator or a user with administrativ

The good collection of shells


How to submit your site on 140+ search engines


Make Search Engine with your name


Great list of hacking video tutorials



Black Hat No virus attched to any of my posts

List of videos




Assembly Primer for Hackers (Part 8) Unconditional Branching Video Tutorial

Assembly Primer for Hackers (Part 7) Working with Strings Video Tutorial

Assembly Primer for Hackers (Part 6) Moving Data Video Tutorial

Assembly Primer for Hackers (Part 5) Data Types Video Tutorial

Assembly Primer for Hackers (Part 4) Hello World Video Tutorial

Hacking Flash Applications for Fun and Profit (Blackhat) Video Tutorial

Auditing Flex AMF3 and BlazeDS based RIAs (Blackhat 2008) Video Tutorial

OpenX vulnerability scan with Acunetix Web Vulnerability Scanner Video Tutorial

Dissecting the Conficker Worm Video Tutorial

Cross Site Scripting (XSS) Primer Video Tutorial

Is the Internet Infected (CBS 60 minutes) Video Tutorial

Hacking Wired and Wireless Keyboards using Electromagnetic Emanations Video Tutorial

Blocking Spyware with Ghostpad Video Tutorial

Calling Multiple SIP Phones Simultaneously using Ghostcall Video Tutorial

Exploiting the SIP Digest Leak Vulnerability using VoIPPACK Video Tutorial

Hijacking Session Cookies using Surfjack Video Tutorial

Assembly Primer for Hackers (Part 3) GDB Usage Primer Video Tutorial

Assembly Primer for Hackers (Part 2) Virtual Memory Organization Video Tutorial

Assembly Primer for Hackers (Part 1) System Organization Video Tutorial

Exploiting XSS and SQL Injection bugs with ExploitMe (NotACon 2008) Video Tutorial

Cyber War is Bullshit (Dojosec) Video Tutorial

Using Snort as a Forensics Tool (Dojosec) Video Tutorial

Advanced SQL Injection (Dojosec) Video Tutorial

Analyzing and Hacking Wireless Networks (Dojosec) Video Tutorial

Automated VOIP Penetration Testing using Sipautohack Video Tutorial

Exploiting MS09002 with FastTrack Video Tutorial

Hacking with FastTrack (Shmoocon 2009) Video Tutorial

Ettercap MITM Attack Demo Video Tutorial

Hacking Answering Machines Video Tutorial

Hacking SIP Proxies with Sipvicious to make Free Calls Video Tutorial

Cross Site Request Forgery (CSRF) Tutorial Video Tutorial

Sfuzz Fuzzer Demo Video Tutorial

Cloning SIM Cards and Hacking Payphones Video Tutorial

SSLstrip Tutorial Video Tutorial

Making Money on the Web the Blackhat Way Video Tutorial

Reading and Writing Barcodes Video Tutorial

Hacking Barcodes Video Tutorial

Solar Sunrise Documentary Video Tutorial

Bluetooth Hacking Video Tutorial

In the Realm of Hackers Documentary Video Tutorial

BBC Experiments with Botnets Video Tutorial

MS09002 Internet Explorer Remote Code Execution Vulnerability Video Tutorial

Geo Targeting Cyber Attacks using IP Addresses Video Tutorial

Typosquatting and URL Hijacking using Urlcrazy Video Tutorial

SEAT (Search Engine Assessment Tool) Video Tutorial

Triumph of the Nerds (PBS Documentary) Video Tutorial

Backtrack Foo (From Bug to 0day) Defcon 16 Video Tutorial

Autoimmunity Disorder in Wireless LANs (Defcon 16) Video Tutorial

Bypassing the Linux Kernel ASLR and Exploiting a Buffer Overflow Vulnerable Application with ret2esp Video Tutorial

The Machine that Changed the World (Documentary) Video Tutorial

Shmoocon 2009 Chris Pagets RFID Cloning talk Video Tutorial

Attack of Cyber Pirates Documentary Video Tutorial

Hacker Attack Documentary Video Tutorial

Hijacking the Internet using a BGP MITM Attack (Defcon 16) Video Tutorial

Anti Forensics techniques for OSX (Vincenzo Blackhat DC) Video Tutorial

History of the Computer Documentary Video Tutorial

Scanning the Internet with Nmap (Defcon 16) Video Tutorial

Demonstration of Hardware Trojans (Defcon 16) Video Tutorial

Remote Command Execution on a web server through a reverse shell invoked by a RFI vulnerable script Video Tutorial

PHP Shell Injection on a Website through Log Poisoning Video Tutorial

Phreaks, Confs and Jail (The Last HOPE) Video Tutorial

Hacking International Networks and Systems via VoIP Video Tutorial

Active HTTPS Cookie Hijacking (Mike Defcon 16) Video Tutorial

Bytecode Injection into a Running Process using Ptrace() Video Tutorial

TCP connection reset in a local network through ARP poisoning and packet injection Video Tutorial

Girls and Pro Gamers Video Tutorial

Storing Mined Data from the Web for Fun and Profit Video Tutorial

Crawling the Web for Fun and Profit Video Tutorial

Attacking Intel Trusted Execution Technology (Wojtczuk Rukowska) Video Tutorial

Defeating SSL using SSLStrip (Marlinspike Blackhat) Video Tutorial

DNS Spoofing with Virtual Hosts Video Tutorial

Clickjacking Video Tutorial

Cyber War (PBS Documentary) Video Tutorial

Ten Cool Things You Did Not Know About Your Hard Drive Video Tutorial

Cracking WPA PSK with AircrackNG Video Tutorial

BSODomizer in Action Video Tutorial

Reverse DNS Lookup with DIG Video Tutorial

Hacking DNS Lookup with DIG Video Tutorial

Phreaking Documentaries (Kevin Poulsen) Video Tutorial

Dumping Passwords from Memory with Pmdump Video Tutorial

Life and Times of Kevin Mitnick Video Tutorial

US Passport RFIDs Cloned by Chris Paget Video Tutorial

Freedom Downtime (The Story of Kevin Mitnick) Video Tutorial

Revolution OS Documentary Video Tutorial

Backtrack 3 Hard Drive Installation (Infinity Exists) Video Tutorial

EUI 64 a building block for Auto Configuration in IPv6 Video Tutorial

How to assign IPv6 address Video Tutorial

IPv6 Header Structure Video Tutorial

Cyber Wars Documentary Video Tutorial

How to make Files Undetectable by Anti Virus Video Tutorial

IPv4 Vs IPv6 Video Tutorial

Packet Sniffing With Ettercap Video Tutorial

Hackers ( Outlaws and Angels ) Documentary Video Tutorial

Hackers are People Too Documentary Video Tutorial

History of Linux Documentary Video Tutorial

Mobile Malware (Talk at UNENIX) Video Tutorial

Computer Security and Voting (Talk at USENIX) Video Tutorial

Web Warriors Documentary by CBC Video Tutorial

IPv6 Address Space Video Tutorial

Reverse Engineering 101 ( Using IDA to break password protections ) Video Tutorial

IPv6 101 Whats new in IPv6 Video Tutorial

Network Vulnerability Assessment Basics Video Tutorial

Cracking WEP Cloaking and 802.11 Non Public Band Comunication Video Tutorial

Reverse Engineering 101 ( Using a Hex Editor to Find Passwords ) Video Tutorial

iPhone Hard Drive Video Tutorial

Caffe Latte Attack on the iPhone Video Tutorial

Installing Backtrack 3 on Vmware Workstation Video Tutorial

Doctor Crazie Security Series Proper Disposal of Data and Hard Drives Video Tutorial

Public Key Cryptography Video Tutorial

Symmetric Key Cryptography Video Tutorial

CryptoAnalysis (Types of attacks on Cryptography) Video Tutorial

IEEE 802.11W and Cisco MFP II Video Tutorial

IEEE 802.11W and Cisco MFP I Video Tutorial

War Driving is so 2000, Here comes war shipping Video Tutorial

RSA 2006 Keynote Bill Gates Video Tutorial

Cryptography (Introduction) Video Tutorial

Cold Boot Encryption Attack Video Tutorial

Fatal DNS Attack Discovered Video Tutorial

Cool Computer Program Video Tutorial

WEP Tutorial 3 Video Tutorial

WEP Tutorial 2 Video Tutorial

WEP Tutorial 1 Video Tutorial

CSMA CA Video Tutorial

Access Control (CSMA CD) Video Tutorial

Analyzing Robots.txt for Fun and Profit Video Tutorial

Automated Mining of FTP Sites for Fun and Profit Video Tutorial

SSL MITM Attack Over Wireless Demo Video Tutorial

SSL MITM Attack Over Wireless Video Tutorial

Install Vista in 2 mins (funny) Video Tutorial

How Spammers Abuse Whois and SMTP Part 3 Video Tutorial

How Spammers Abuse Whois and SMTP Part 2 Video Tutorial

How Spammers Abuse Whois and SMTP Part 1 Video Tutorial

USB Beer ( Funny Video ) Video Tutorial

User Information Leakage on P2P Networks Video Tutorial

Changing your Firefox User Agent to Emulate Googlebot Video Tutorial

Virtual carrier sensing (NAV) mechanism Video Tutorial

WiFi State Machine (Part 3) Video Tutorial

WiFi State Machine (Part 2) Video Tutorial

WiFi State Machine (Part 1) Video Tutorial

WiFi MAC header (Part 2) Video Tutorial

WiFi MAC header (Part 1) Video Tutorial

Wireless Frames Format and Types Video Tutorial

Connecting wireless station to AP Video Tutorial

fping (Part 4) Video Tutorial

fping (Part 3) Video Tutorial

fping (Part 2) Video Tutorial

fping (Part 1) Video Tutorial

RC4 Basics Presentation (2) Video Tutorial

Macchanger Video Tutorial

Pcap2air Video Tutorial

Netstumbler (Part 2) Video Tutorial

Netstumbler (Part 1) Video Tutorial

AireplayNG (Part 5) Video Tutorial

AireplayNG (Part 4) Video Tutorial

AireplayNG (Part 3) Video Tutorial

AireplayNG (Part 2) Video Tutorial

AireplayNG (Part 1) Video Tutorial

ARP Packet Injection Programming Video Tutorial

TCP Packet Injection (2) Video Tutorial

TCP Packet Injection Video Tutorial

IP Packet Injection (2) Video Tutorial

IP Packet Injection Video Tutorial

Ethernet Packet Injection Video Tutorial

Generic Packet Injection Program (2) Video Tutorial

Packet Injection Basics Presentation Video Tutorial

Packet Sniffing using Wireshark Video Tutorial

Packet Sniffing using Tcpdump Video Tutorial

Data Packet Sniffer Programming Video Tutorial

TCP Packet Sniffer Programming Video Tutorial

IP Packet Sniffer Programming Video Tutorial

Ethernet Packet Sniffer Programming Video Tutorial

Generic Packet Sniffer Programming (2) Video Tutorial

Generic Packet Sniffer Programming Video Tutorial

Raw Sockets Basics Presentation (2) Video Tutorial

Raw Sockets Basics Presentation Video Tutorial

Internet Worm IP Scanning Programming (2) Video Tutorial

Internet Worm IP Scanning Programming Video Tutorial

Internet Worm Basics Presentation (2) Video Tutorial

Internet Worm Basics Presentation Video Tutorial

Programming an ARP DoS Tool (2) Video Tutorial

Programming an ARP DoS Tool Video Tutorial

Sending Messages using IPC Framework Video Tutorial

Programming the Framework Video Tutorial

Architecture of Security Tools Presentation (2) Video Tutorial

Architecture of Security Tools Presentation Video Tutorial

RC4 File Encrypt Decrypt Program Video Tutorial

RC4 Simulation using C Video Tutorial

RC4 Basics Presentation Video Tutorial

VMWare Hacking at Defcon 15 Video Tutorial

Bruice Schneier at Defcon 15 Video Tutorial

Home using WEP gets Hacked Video Tutorial

History of Hacking Part 5 Video Tutorial

History of Hacking Part 4 Video Tutorial

History of Hacking Part 3 Video Tutorial

History of Hacking Part 2 Video Tutorial

History of Hacking Part 1 Video Tutorial

Prism Strip Video Tutorial

Simple Replay Video Tutorial

AirodumpNG Basics (Part II) Video Tutorial

AirodumpNG Basics (Part I) Video Tutorial

AirdecapNG Video Tutorial

AirmonNG Video Tutorial

TCP Echo Client using Sockets Video Tutorial

TCP Echo Server using Sockets Video Tutorial

Hello World TCP Server using Sockets (2) Video Tutorial

Socket Programming Basics Presentation (3) Video Tutorial

Socket Programming Basics Presentation (2) Video Tutorial

Hello World TCP Server using Sockets Video Tutorial

Socket Programming Basics Presentation Video Tutorial

Vehicular Communication Basics (3) Video Tutorial

Vehicular Communication Basics (2) Video Tutorial

Vehicular Communication Basics Video Tutorial

Wireshark Basics (3) Video Tutorial

Wireshark Basics (2) Video Tutorial

Wireshark Basics (1) Video Tutorial

Nmap ( OS and Service Fingerprinting) Video Tutorial

Nmap Usage Basics Video Tutorial

Network Grep (Ngrep) Basics Video Tutorial

Netcat Basics (Bind Remote Shell) Video Tutorial

Netcat Basics (Server Mode) Video Tutorial

Netcat Basics (Client Mode) Video Tutorial

Netbios Basics using SMBClient Part 2 Video Tutorial

Netbios Basics using SMBClient Part 1 Video Tutorial

DNS Zone Transfer using DIG Video Tutorial

Domain Information Groper ( DIG ) Basics Video Tutorial

Say THANKS if you liked this postThumbsup <