tag:blogger.com,1999:blog-48941624239082434712024-03-06T09:19:31.488+04:00Hackers EliteMikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.comBlogger242125tag:blogger.com,1999:blog-4894162423908243471.post-23724834043417718802014-07-21T13:17:00.000+04:002018-04-26T10:00:16.175+04:00How to get in-app purchases for free in Android<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP-_h4lum5MgCc2DQhuEZGI5cWKNIMAxmv8pMjIPHUGvox4JEgfnbggzafIQRtls59_BG4bNlxEfadM-sNdobSEwFSoZXz7C3iD_rFAg240Q4W2HRIPcAyYfVzVGOR2y46eBUwjcfcJE0/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP-_h4lum5MgCc2DQhuEZGI5cWKNIMAxmv8pMjIPHUGvox4JEgfnbggzafIQRtls59_BG4bNlxEfadM-sNdobSEwFSoZXz7C3iD_rFAg240Q4W2HRIPcAyYfVzVGOR2y46eBUwjcfcJE0/s1600/1.png" width="400" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">In this post i will teach you how to get in-app purchases for free in Android device. There are paid apps, that you need to pay before you download it. But there are apps which is free to download, but in game there are some things that you can buy with real money, or activate to Pro version. And in this post we gonna learn to do that all for free.</span><br />
<span style="color: #0b5394; font-size: large;"><br />
</span> <span style="color: #0b5394; font-size: large;">1) You need a <b><a href="https://hackerzelite.blogspot.com/2014/01/what-is-root-and-how-to-root-your.html" target="_blank">rooted Android device</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">2) Download <b><a href="https://adf.ly/3582876/free-in-app-purchases-in-android" target="_blank">this app</a></b> and install it.</span><br />
<span style="color: #0b5394; font-size: large;">3) Now go to Settings of your device. And from Security select </span><span style="color: #6fa8dc; font-size: large;">Unknown sources</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">4) After that you need to change time zone of phone to the Moscow GMT +4:00.</span><br />
<span style="color: #0b5394; font-size: large;">5) After that open app you just downloaded on step 2. And you need to press on the Grant button from pop out SuperSU window. And your device need to be connected to the internet!</span><br />
<span style="color: #0b5394; font-size: large;">6) And you can see the list of your apps, where in-app purchase is available.</span><br />
<span style="color: #0b5394; font-size: large;">7) Choose one app from list and wait after its finished loading.</span><br />
<span style="color: #0b5394; font-size: large;">8) And after app opened, you need to go to page of upgrading, or if its a game the press on the plus button to buy coins or something like that.</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdcUbiXxCSJqccyAdV1GzvhcB4paNPhj8fjRvTr2ZSIZvKewXHqAcEY7n0TZdQwRzSLrCrieEmfzjLQFVjksT8ZewI1qGQricyc0T18ZPSECIOWM-_RXjrsX04Mj8RebwoBRGfcDAfWqI/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdcUbiXxCSJqccyAdV1GzvhcB4paNPhj8fjRvTr2ZSIZvKewXHqAcEY7n0TZdQwRzSLrCrieEmfzjLQFVjksT8ZewI1qGQricyc0T18ZPSECIOWM-_RXjrsX04Mj8RebwoBRGfcDAfWqI/s1600/2.png" width="180" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">9) After that press on the purchase button and in pop out little window press on </span><span style="color: #6fa8dc; font-size: large;">BUY </span><span style="color: #0b5394; font-size: large;">button.</span><br />
<span style="color: #0b5394; font-size: large;"><br />
</span> <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAeCid3LrmdFValGJ2uiEqC_5qYt4GsiBGZZHUde6IELU1Sl9qg9bS1rkHzzbeYpKMapoZgcPW3anY7YM4CLC87XaHKuYBEdU528qObuMoUnEpWoMkMJ3RtzYxLpQn-W3XMmaM4UaKmWU/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAeCid3LrmdFValGJ2uiEqC_5qYt4GsiBGZZHUde6IELU1Sl9qg9bS1rkHzzbeYpKMapoZgcPW3anY7YM4CLC87XaHKuYBEdU528qObuMoUnEpWoMkMJ3RtzYxLpQn-W3XMmaM4UaKmWU/s1600/3.png" width="320" /></a></div>
<span style="color: #0b5394; font-size: large;"><br />
</span> <span style="color: #0b5394; font-size: large;">10) And You can see </span><span style="color: #6fa8dc; font-size: large;">Payment Successful</span><span style="color: #0b5394; font-size: large;"> message.</span><br />
<span style="color: #0b5394; font-size: large;">11) But after you finished in-app purchasing i recommend you to delete that app, if you want to do in-app purchasing then install it again.</span><br />
<span style="color: #0b5394; font-size: large;">12) Now you can't use Play Store, its showing no connection error message. </span><br />
<span style="color: #0b5394; font-size: large;">13) After you have deleted that app, you need to install one app from <b><a href="https://hackerzelite.blogspot.com/2014/06/how-to-edit-hosts-file-in-android.html" target="_blank">this post</a></b>. Do all as in that post and open that hosts file.</span><br />
<span style="color: #0b5394; font-size: large;">14) And remove 2nd line from file. Only keep first line </span><span style="color: #6fa8dc; font-size: large;">127.0.0.1 localhost</span><span style="color: #0b5394; font-size: large;"> and press on the save button and in pop out window press on the </span><span style="color: #6fa8dc; font-size: large;">OK </span><span style="color: #0b5394; font-size: large;">button and after that on </span><span style="color: #6fa8dc; font-size: large;">Yes </span><span style="color: #0b5394; font-size: large;">button.</span><br />
<span style="color: #0b5394; font-size: large;"><br />
</span> <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEtthBFtQK0Z8ZOvE3IgnDWmE1rnfOCQVqf-XiubJngGaquyj02XhFI271OcKAk4XBb5fKv0b09kgFLl_I_5Yym-wfOAXUAJtYh7rlqxu1vl8ilUybz8yGAOS9rdLcWvOBgsa8Vx2dp94/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEtthBFtQK0Z8ZOvE3IgnDWmE1rnfOCQVqf-XiubJngGaquyj02XhFI271OcKAk4XBb5fKv0b09kgFLl_I_5Yym-wfOAXUAJtYh7rlqxu1vl8ilUybz8yGAOS9rdLcWvOBgsa8Vx2dp94/s1600/4.png" width="400" /></a></div>
<span style="color: #0b5394; font-size: large;"><br />
</span> <span style="color: #0b5394; font-size: large;">And that's all. You can ope Play Store!</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com5tag:blogger.com,1999:blog-4894162423908243471.post-65103483099823263542014-07-19T12:52:00.000+04:002014-07-29T09:30:35.251+04:00Hackers Dictionary<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghZc7Mknor65akrTpHivEEDVjlJuJ5j3SnakOu33EbuT1YkZX7CXjvjHT0gILfSXqbYsrhDfBLdq4-HZ0dck3g4d0tJIo4o2mHVFGdZDerOdXHjxGDsW46Ye2_dfhrSe_tTqZk0C3zONk/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghZc7Mknor65akrTpHivEEDVjlJuJ5j3SnakOu33EbuT1YkZX7CXjvjHT0gILfSXqbYsrhDfBLdq4-HZ0dck3g4d0tJIo4o2mHVFGdZDerOdXHjxGDsW46Ye2_dfhrSe_tTqZk0C3zONk/s1600/1.png" height="320" width="278" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">If you are a newbie in hacking then you need to learn some things. There are some terms that every hacker should know about them. Some words and abbreviations</span><span style="color: #0b5394; font-size: large;"> that you should know.</span><br />
<blockquote class="tr_bq">
<span style="color: #6fa8dc; font-size: large;">Some words you need to know about</span></blockquote>
<span style="color: #6fa8dc; font-size: large;">Algorithm </span><span style="color: #0b5394; font-size: large;">- A series of steps specifying which actions to take in which order. </span><br />
<span style="color: #6fa8dc; font-size: large;">ANSI Bomb</span><span style="color: #0b5394; font-size: large;"> - ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys. </span><br />
<span style="color: #6fa8dc; font-size: large;">Back Door</span><span style="color: #0b5394; font-size: large;"> - Something a hacker leaves behind on a system in order to be able to get back in at a later time. </span><br />
<span style="color: #6fa8dc; font-size: large;">Binary </span><span style="color: #0b5394; font-size: large;">- A numbering system in which there are only two possible values for each digit: 0 and 1. </span><br />
<span style="color: #6fa8dc; font-size: large;">Black Hat</span><span style="color: #0b5394; font-size: large;"> - A hacker who performs illegal actions to do with hacking online. (Bad guy, per se) </span><br />
<span style="color: #6fa8dc; font-size: large;">Blue Hat</span><span style="color: #0b5394; font-size: large;"> - A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events. </span><br />
<span style="color: #6fa8dc; font-size: large;">Bot</span><span style="color: #0b5394; font-size: large;"> - A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions. </span><br />
<span style="color: #6fa8dc; font-size: large;">Botnet</span><span style="color: #0b5394; font-size: large;"> - Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks. </span><br />
<span style="color: #6fa8dc; font-size: large;">Buffer Overflow</span><span style="color: #0b5394; font-size: large;"> - A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing. </span><br />
<span style="color: #6fa8dc; font-size: large;">Cracker </span><span style="color: #0b5394; font-size: large;">- A specific type of hacker who decrypts passwords or breaks software copy protection schemes. </span><br />
<span style="color: #6fa8dc; font-size: large;">DDoS </span><span style="color: #0b5394; font-size: large;">- Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter. </span><br />
<span style="color: #6fa8dc; font-size: large;">Deface </span><span style="color: #0b5394; font-size: large;">- A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site. </span><br />
<span style="color: #6fa8dc; font-size: large;">Dictionary Attack</span><span style="color: #0b5394; font-size: large;"> - A dictionary attack is an attack in which a cyber criminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program which fills them in. The program just fills in every single possible password on the list, untill it has found the correct one. Dictionary files usually contain the most common used passwords. </span><br />
<span style="color: #6fa8dc; font-size: large;">DOX </span><span style="color: #0b5394; font-size: large;">- Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc. </span><br />
<span style="color: #6fa8dc; font-size: large;">E-Whore</span><span style="color: #0b5394; font-size: large;"> - A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money. </span><br />
<span style="color: #6fa8dc; font-size: large;">Encryption</span><span style="color: #0b5394; font-size: large;"> - In cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is apply the reverse mathematical operations. In technical speak, encryption is applies mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message. </span><br />
<span style="color: #6fa8dc; font-size: large;">Exploit </span><span style="color: #0b5394; font-size: large;">- A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it. </span><br />
<span style="color: #6fa8dc; font-size: large;">FUD </span><span style="color: #0b5394; font-size: large;">- Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone. </span><br />
<span style="color: #6fa8dc; font-size: large;">Grey Hat</span><span style="color: #0b5394; font-size: large;"> - A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.Hacker (definition is widely disputed among people...) = A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor. </span><br />
<span style="color: #6fa8dc; font-size: large;">Hacktivist </span><span style="color: #0b5394; font-size: large;">- A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. </span><br />
<span style="color: #6fa8dc; font-size: large;">IP Address</span><span style="color: #0b5394; font-size: large;"> - On the Internet, your IP address is the unique number that others use to send you traffic. </span><br />
<span style="color: #6fa8dc; font-size: large;">IP Grabber</span><span style="color: #0b5394; font-size: large;"> - A link that grabs someone's IP when they visit it. </span><span style="color: #6fa8dc; font-size: large;">Keylogger </span><span style="color: #0b5394; font-size: large;">- A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.Leach = A cultural term in the warez community referring to people who download lots of stuff but never give back to the community. </span><br />
<span style="color: #6fa8dc; font-size: large;">LOIC/HOIC</span><span style="color: #0b5394; font-size: large;"> - Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances. </span><br />
<span style="color: #6fa8dc; font-size: large;">Malware</span><span style="color: #0b5394; font-size: large;"> - Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave. Neophyte = A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking. </span><br />
<span style="color: #6fa8dc; font-size: large;">smith </span><span style="color: #0b5394; font-size: large;">- Somebody new to a forum/game. </span><br />
<span style="color: #6fa8dc; font-size: large;">OldFag</span><span style="color: #0b5394; font-size: large;"> - Somebody who's been around a forum/game for a long time. </span><br />
<span style="color: #6fa8dc; font-size: large;">Packet </span><span style="color: #0b5394; font-size: large;">- Data that is sent across the Internet is broken up into packets, sent individually across the network, and reassembled back into the original data at the other end. </span><br />
<span style="color: #6fa8dc; font-size: large;">Phreak </span><span style="color: #0b5394; font-size: large;">- Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc. </span><br />
<span style="color: #6fa8dc; font-size: large;">Phreaking </span><span style="color: #0b5394; font-size: large;">- The art and science of cracking the phone network. </span><span style="color: #6fa8dc; font-size: large;">Proxy </span><span style="color: #0b5394; font-size: large;">- A proxy is something that acts as a server, but when given requests from clients, acts itself as a client to the real servers. </span><span style="color: #6fa8dc; font-size: large;">Rainbow Table</span><span style="color: #0b5394; font-size: large;"> - A rainbow table is a table of possible passwords and their hashes. It is way faster to crack a password using rainbow tables then using a dictionary attack (Bruteforce). </span><br />
<span style="color: #6fa8dc; font-size: large;">Remote Administration Tool</span><span style="color: #0b5394; font-size: large;"> - A tool which is used to remotely control (an)other machine(s). These can be used for monitoring user actions, but often misused by cyber criminals as malware, to get their hands on valuable information, such as log in credentials. </span><span style="color: #6fa8dc; font-size: large;">Resolver </span><span style="color: #0b5394; font-size: large;">- Software created to get an IP address through IM (instant messenger, like Skype/MSN) programs. </span><br />
<span style="color: #6fa8dc; font-size: large;">Reverse Engineering</span><span style="color: #0b5394; font-size: large;"> - A technique whereby the hacker attempts to discover secrets about a program. Often used by crackers, and in direct modifications to a process/application. </span><br />
<span style="color: #6fa8dc; font-size: large;">Root </span><span style="color: #0b5394; font-size: large;">- Highest permission level on a computer, able to modify anything on the system without restriction. </span><br />
<span style="color: #6fa8dc; font-size: large;">Rootkit (ring3 ring0)</span><span style="color: #0b5394; font-size: large;"> - A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode. </span><br />
<span style="color: #6fa8dc; font-size: large;">Script Kiddie</span><span style="color: #0b5394; font-size: large;"> - A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking. </span><br />
<span style="color: #6fa8dc; font-size: large;">Shell </span><span style="color: #0b5394; font-size: large;">- The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. OR A shell is an script-executing unit - Something you'd stick somewhere in order to execute commands of your choice. </span><br />
<span style="color: #6fa8dc; font-size: large;">Social Engineer</span><span style="color: #0b5394; font-size: large;"> - Social engineering is a form of hacking that targets people's minds rather than their computers. A typical example is sending out snail mail marketing materials with the words "You may already have won" emblazoned across the outside of the letter. As you can see, social engineering is not unique to hackers; it's main practitioners are the marketing departments of corporations. </span><br />
<span style="color: #6fa8dc; font-size: large;">Spoof </span><span style="color: #0b5394; font-size: large;">- The word spoof generally means the act of forging your identity. More specifically, it refers to forging the sender's IP address (IP spoofing). (Spoofing an extension for a RAT to change it from .exe to .jpg, etc.) </span><br />
<span style="color: #6fa8dc; font-size: large;">SQL Injection</span><span style="color: #0b5394; font-size: large;"> - An SQL injection is a method often used to hack SQL databases via a website, and gain admin control (sometimes) of the site. You can attack programs with SQLi too. </span><br />
<span style="color: #6fa8dc; font-size: large;">Trojan </span><span style="color: #0b5394; font-size: large;">- A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. </span><br />
<span style="color: #6fa8dc; font-size: large;">VPS </span><span style="color: #0b5394; font-size: large;">- The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionallyequivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software. </span><span style="color: #6fa8dc; font-size: large;">Warez </span><span style="color: #0b5394; font-size: large;">- Software piracy </span><br />
<span style="color: #6fa8dc; font-size: large;">White Hat</span><span style="color: #0b5394; font-size: large;"> - A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se) </span><br />
<span style="color: #6fa8dc; font-size: large;">Worm </span><span style="color: #0b5394; font-size: large;">- Software designed to spread malware with little to no human interaction. Zero Day Exploit = An attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability.</span><br />
<blockquote class="tr_bq">
<span style="color: #6fa8dc; font-size: large;">Abbreviations</span></blockquote>
<span style="color: #6fa8dc; font-size: large;">DDoS </span><span style="color: #0b5394; font-size: large;">- Distributed Denial of Service </span><br />
<span style="color: #6fa8dc; font-size: large;">DrDoS </span><span style="color: #0b5394; font-size: large;">- Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur. </span><br />
<span style="color: #6fa8dc; font-size: large;">FTP </span><span style="color: #0b5394; font-size: large;">- File Transfer Protocol. Used for transferring files over an FTP server. </span><br />
<span style="color: #6fa8dc; font-size: large;">FUD </span><span style="color: #0b5394; font-size: large;">- Fully Undetectable </span><br />
<span style="color: #6fa8dc; font-size: large;">Hex </span><span style="color: #0b5394; font-size: large;">- In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal. </span><br />
<span style="color: #6fa8dc; font-size: large;">HTTP </span><span style="color: #0b5394; font-size: large;">- Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web. </span><br />
<span style="color: #6fa8dc; font-size: large;">IRC </span><span style="color: #0b5394; font-size: large;">- Internet Relay Chat. Transmiting text messages in real time between online users. </span><br />
<span style="color: #6fa8dc; font-size: large;">JDB </span><span style="color: #0b5394; font-size: large;">- Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability. </span><br />
<span style="color: #6fa8dc; font-size: large;">Malware </span><span style="color: #0b5394; font-size: large;">- Malicious Software </span><br />
<span style="color: #6fa8dc; font-size: large;">Nix </span><span style="color: #0b5394; font-size: large;">- Unix based operating system, usually refered to here when refering to DoS'ing. </span><br />
<span style="color: #6fa8dc; font-size: large;">POP3 </span><span style="color: #0b5394; font-size: large;">- This is the most popular protocol for picking up e-mail from a server. </span><br />
<span style="color: #6fa8dc; font-size: large;">R.A.T</span><span style="color: #0b5394; font-size: large;"> - Remote Administration Tool </span><br />
<span style="color: #6fa8dc; font-size: large;">SDB </span><span style="color: #0b5394; font-size: large;">- Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user) </span><br />
<span style="color: #6fa8dc; font-size: large;">SE </span><span style="color: #0b5394; font-size: large;">- Social Engineering </span><br />
<span style="color: #6fa8dc; font-size: large;">Skid </span><span style="color: #0b5394; font-size: large;">- Script Kid/Script Kiddie </span><br />
<span style="color: #6fa8dc; font-size: large;">SMTP </span><span style="color: #0b5394; font-size: large;">- A TCP/IP protocol used in sending and receiving e-mail. </span><span style="color: #6fa8dc; font-size: large;">SQL </span><span style="color: #0b5394; font-size: large;">- Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection." </span><br />
<span style="color: #6fa8dc; font-size: large;">SSH </span><span style="color: #0b5394; font-size: large;">- Secure Shell, used to connect to Virtual Private Servers. </span><br />
<span style="color: #6fa8dc; font-size: large;">TCP </span><span style="color: #0b5394; font-size: large;">- Transmission Control Protocol, creates connections and exchanges packets of data. </span><br />
<span style="color: #6fa8dc; font-size: large;">UDP </span><span style="color: #0b5394; font-size: large;">- User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing. </span><br />
<span style="color: #6fa8dc; font-size: large;">VPN </span><span style="color: #0b5394; font-size: large;">- Virtual Private Network </span><br />
<span style="color: #6fa8dc; font-size: large;">VPS </span><span style="color: #0b5394; font-size: large;">- Virtual Private Server </span><br />
<span style="color: #6fa8dc; font-size: large;">XSS (CSS)</span><span style="color: #0b5394; font-size: large;"> - Cross Site Scripting </span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">You should learn this all. Else you will stay a newbie.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-48779169075495937142014-07-17T16:26:00.000+04:002014-07-17T16:26:07.525+04:00Change Processor Name Permanently<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggUdS3p5MlEtgVV4vEECOKdsLB6Gm8iudo0PUVB3hTRtkSH0q9TY7V9X3Il7FFdJCJjxtooqJktEOJp5whzMtkI1p_TTAXOlvb73Vb9CfQAny4v16RrENyw1X1NSGV69Vr0PJOQI3pPpQ/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggUdS3p5MlEtgVV4vEECOKdsLB6Gm8iudo0PUVB3hTRtkSH0q9TY7V9X3Il7FFdJCJjxtooqJktEOJp5whzMtkI1p_TTAXOlvb73Vb9CfQAny4v16RrENyw1X1NSGV69Vr0PJOQI3pPpQ/s1600/1.png" height="300" width="400" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">There are a way to change your computer CPU name from Properties of it. So you can prank with friends with this trick. Change the name to whatever you want and make a dream computer for your friends. No need to download any software, we can do that all without any third party software.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1) Open notepad and type in text given below.</span><br />
<blockquote class="tr_bq">
<span style="color: #6fa8dc; font-size: large;">Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0] "ProcessorNameString"="</span><span style="color: #0b5394; font-size: large;">Intel(R) Core(TM) i7-2600K CPU @ 6.60GHz</span><span style="color: #6fa8dc; font-size: large;">"</span></blockquote>
<span style="color: #0b5394; font-size: large;">You can change </span><span style="font-size: large;"><span style="color: #6fa8dc;">Intel(R) Core(TM) i7-2600K CPU @ 6.60GHz</span></span><span style="color: #0b5394; font-size: large;"> to whatever you want.</span><br />
<span style="color: #0b5394; font-size: large;">2) Save file as </span><span style="font-size: large;"><span style="color: #6fa8dc;">processor.reg</span></span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">3) Now open it, and after that in pop out warn windows press on the </span><span style="font-size: large;"><span style="color: #6fa8dc;">Yes </span></span><span style="color: #0b5394; font-size: large;">button and after that on </span><span style="font-size: large;"><span style="color: #6fa8dc;">OK </span></span><span style="color: #0b5394; font-size: large;">button to close it.</span><br />
<span style="color: #0b5394; font-size: large;">4) Now go to properties of your computer and you can see the results!</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-66614692952276925072014-07-16T10:12:00.000+04:002014-07-16T10:12:30.700+04:00Speed Up Internet Connection using DNS<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhKrSzAPAfl28GLuuKVp_Qa1rJSgy_vLsMoCFztwhgjz8RSXSDesr50FrkDJ6gG7W-c4oNB3H8pHQne8zXBzwyic89uyFq9ok26XTbEuTvuIc06XSY51A30Xw9x9mG_hXSUnx9QE8QsM4/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhKrSzAPAfl28GLuuKVp_Qa1rJSgy_vLsMoCFztwhgjz8RSXSDesr50FrkDJ6gG7W-c4oNB3H8pHQne8zXBzwyic89uyFq9ok26XTbEuTvuIc06XSY51A30Xw9x9mG_hXSUnx9QE8QsM4/s1600/1.png" height="284" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">In previous post i posted the <b><a href="http://hackerzelite.blogspot.com/2014/04/tips-to-speed-up-your-slow-internet.html" target="_blank">best solutions to speed up your internet connection</a></b>. And visitors find it useful and post helped them a lot. So in this post i will show you another way to speed up internet connection using DNS.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. Right click on small network icon at bottom of right side and select </span><span style="color: #6fa8dc; font-size: large;">Open network and sharing center</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">2. Select network connection and press on the </span><span style="color: #6fa8dc; font-size: large;">Properties </span><span style="color: #0b5394; font-size: large;">button in new opened small window.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdL2eEfLPIyAZpmSwaB9MSGryrQj-M9kVeesvq1Ziz5Fs3RvpAhL2zWLRmNEM_9tA0zb-IEy6dHPTrrk-BHnwuRt1ImetmjaUsZcy2nzZUEUHSQjYpNUFzLH9PJqmBOMu7z9IK8Z3QNnk/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdL2eEfLPIyAZpmSwaB9MSGryrQj-M9kVeesvq1Ziz5Fs3RvpAhL2zWLRmNEM_9tA0zb-IEy6dHPTrrk-BHnwuRt1ImetmjaUsZcy2nzZUEUHSQjYpNUFzLH9PJqmBOMu7z9IK8Z3QNnk/s1600/2.png" height="293" width="400" /></a></div>
<span style="color: #0b5394; font-size: large;">3. Switch to the </span><span style="color: #6fa8dc; font-size: large;">Networking</span><span style="color: #0b5394; font-size: large;"> tab and double click on </span><span style="color: #6fa8dc; font-size: large;">Internet Protocol Version 4 (TCP/IPv4)</span><span style="color: #0b5394; font-size: large;">. Tick on </span><span style="color: #6fa8dc; font-size: large;">Use the following DNS server addresses</span><span style="color: #0b5394; font-size: large;"> and fill the </span><span style="color: #6fa8dc; font-size: large;">Preferred DNS</span><span style="color: #0b5394; font-size: large;"> server and </span><span style="color: #6fa8dc; font-size: large;">Alternate DNS server</span><span style="color: #0b5394; font-size: large;"> with any values of given below.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div style="text-align: center;">
<span style="color: #6fa8dc; font-size: large;">Google DNS </span></div>
<div style="text-align: center;">
<span style="color: #0b5394; font-size: large;">Preferred DNS server: 8.8.8.8 </span></div>
<div style="text-align: center;">
<span style="color: #0b5394; font-size: large;">Alternate DNS server: 8.8.4.4 </span></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<div style="text-align: center;">
<span style="color: #6fa8dc; font-size: large;">Open DNS </span></div>
<div style="text-align: center;">
<span style="color: #0b5394; font-size: large;">Preferred DNS server: 208.67.222.222 </span></div>
<div style="text-align: center;">
<span style="color: #0b5394; font-size: large;">Alternate DNS server: 208.67.220.220</span></div>
<div style="text-align: center;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div style="text-align: left;">
<span style="color: #0b5394; font-size: large;">4. After that click on </span><span style="color: #6fa8dc; font-size: large;">OK </span><span style="color: #0b5394; font-size: large;">button and its better to restart computer.</span></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com1tag:blogger.com,1999:blog-4894162423908243471.post-42907674290631011612014-07-15T15:44:00.000+04:002014-07-15T15:44:10.364+04:00The Bluetooth History and Name<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU_pG4kGDnfp9Negab4_1pFIDOjYnSLNHcwqog-GtEe7_YjrW_rWfK2iRtTHd1WLh2sKWYzJSrTCOBxpPrTp_rsUah_hB7j51PcsiJxhUgXybZygiYurB0ll1WzW0WKx6nOYTng6QHl7k/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU_pG4kGDnfp9Negab4_1pFIDOjYnSLNHcwqog-GtEe7_YjrW_rWfK2iRtTHd1WLh2sKWYzJSrTCOBxpPrTp_rsUah_hB7j51PcsiJxhUgXybZygiYurB0ll1WzW0WKx6nOYTng6QHl7k/s1600/1.png" height="270" width="400" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Nowadays anybody know about Bluetooth. But i think after some years it will be out of date, because NFC comes to change it. But still Bluetooth is really important part of our device. So ever you interested about Bluetooth, why its called Bluetooth? The story of Bluetooth. If no then you should read this post, because its and informative and interesting. </span><br />
<span style="color: #0b5394; font-size: large;">Intel mobile computing engineer Jim Kardach was approached by his boss him asking him to develop technology which would help integrate wireless into the notebook. Jim developed a technology for exchanging data over short distances using short-wavelength radio transmissions.</span><br />
<span style="color: #0b5394; font-size: large;">Intel later approached a small group of companies including Ericsson and Nokia, IBM, Motorola, Nokia and Toshiba to form a consortium to discuss the short range wireless technologies and the need to develop a single short-range standard for the same. The idea was to discourage having three or more competing standards for the same technology. During this process of negotiations, it was noticed that each company referred to the technology by different names and this created much confusion. It was then that Jim came up with a code name Bluetooth. Jim Kardach being a huge history fan heard from Sven of Ericson talk about a 10th century king of Denmark. Back at home he received a novel he had ordered named ‘The Vikings’ by Gwyn in which he again read about the Harald Balaatand whom Sven had mentioned. King Harald Blaatand “Bluetooth” 11 united parts of Norway and the dissonant Danish tribes into a single kingdom and ruled Denmark and Sweden seamlessly. Jim proposed the codename to the Special Interest Group (SIG) that was working on a single standard. Harold “Bluetooth’s” success in uniting Scandinavia seemed like the perfect name to describe a technology which would make PC’s and phones communicate seamlessly. This name was initially proposed as a codename only until the group came up with a singular name for the technology. However, the group evidently adopted the name in the end.</span><br />
<span style="color: #0b5394; font-size: large;">That's all you need to know about Bluetooth. I hope you find this interesting. Then make sure you share this post with your friends.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-14408887860012734172014-06-21T13:09:00.000+04:002014-06-21T13:09:25.508+04:00Soccer World Cup related Websites Hacked<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiACAurWGqbiZ30RGfY9b9I0jy_lGRzeF3Sie23Tkbh-Z3cMDRVPz9q13z-9QEYgSgwI9igm3GcnWi4tFHZWCuP64itRNfuFBgubiUA6O6jlXTPsVzgbPYe-r6xtitHRGQVuE3JV9GQT68/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiACAurWGqbiZ30RGfY9b9I0jy_lGRzeF3Sie23Tkbh-Z3cMDRVPz9q13z-9QEYgSgwI9igm3GcnWi4tFHZWCuP64itRNfuFBgubiUA6O6jlXTPsVzgbPYe-r6xtitHRGQVuE3JV9GQT68/s1600/1.png" height="360" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Anonymous promised <b><a href="http://hackerzelite.blogspot.com/2014/06/group-of-hackers-anonymous-plan-cyber.html" target="_blank">cyber-attack on World Cup Sponsors</a></b>. They kicked offline earlier this week include World Cup sponsor Hyundai and government state Mato Grosso. </span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">"We had a busy last few days and there is more still to come," a hacker who calls himself Che Commodore and who claims to be a member of the Anonymous hacker collective told Reuters on Wednesday.</span><br />
<span style="color: #0b5394; font-size: large;">"Companies and institutions that work with a government that denies the basic rights of its people in order to promote a private, exclusive and corrupt sports event will be targeted"</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">"Cyberattacks have become a popular way of gaining notoriety and publicity, though it’s not clear what motivations were behind this attack but could well be the issues that have seen Brazilians protesting almost daily," Edward Parsons, senior manager in the cyber security at KPMG, said in an emailed statement to Mashable.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">They are using DDos ( Distributed Denial of Service ) to destroy websites. </span><br />
<span style="color: #0b5394; font-size: large;">Hackers broke into the foreign ministry's email service, accessing dozens of classified documents including a list of foreign dignitaries planning to attend World Cup matches.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-87606549262557198222014-06-21T12:21:00.000+04:002014-06-21T12:21:20.999+04:00Group of Hackers Anonymous plan Cyber-Attack on World Cup Sponsors<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRIzRVBMx0AYISXgNjk6BCU1bYvLOPZehUCtlDDmO0Y24_e4ynSo_De-vyzAzDWfZ3aTHgqaQcDZMR0D1C082E3lNdKPZ_CUzccNHjcGyVmyzBxGbYEkU9Fx8N7OMu3Dkt8ye4SXtmtfE/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRIzRVBMx0AYISXgNjk6BCU1bYvLOPZehUCtlDDmO0Y24_e4ynSo_De-vyzAzDWfZ3aTHgqaQcDZMR0D1C082E3lNdKPZ_CUzccNHjcGyVmyzBxGbYEkU9Fx8N7OMu3Dkt8ye4SXtmtfE/s1600/1.png" height="368" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Group of Hackers Anonymous plan cyber-attack on FIFA world cup 2014 sponsors. As they say meaning of this cyber attack is to protest the lavish spending on the soccer games in a country struggling to provide basic services.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">“We have a plan of attack,” Commodore told the agency “We have already conducted late-night tests to see which of the sites are more vulnerable… This time we are targeting the sponsors of the World Cup.”</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">"This time we are targeting the sponsors of the World Cup," he said in a Skype conversation from an undisclosed location in Brazil. Asked to name the potential targets he mentioned Adidas, Emirates airline, the Coca-Cola Co and Budweiser.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">Commodore said the hacker AnonManifest used a Trojan virus to get into the Foreign Ministry’s databases and steal the email accounts of several diplomats.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-52912504803640850542014-06-20T15:45:00.000+04:002014-06-20T15:45:19.095+04:00Samsung introduces the Galaxy Tab S<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl5xRMfnJYhj_iGaYduLl5jWB5XRT9eWTaMEMQHSPlSTT5vmwocfKb1o3Su2SSmTCvmORpeo92v3Pq02n3H9nYhwVVaMlrRRB3uVyvvPbb4nIrDFwAHE22Qt6g7HOAXvGntE6fWRlDFjc/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl5xRMfnJYhj_iGaYduLl5jWB5XRT9eWTaMEMQHSPlSTT5vmwocfKb1o3Su2SSmTCvmORpeo92v3Pq02n3H9nYhwVVaMlrRRB3uVyvvPbb4nIrDFwAHE22Qt6g7HOAXvGntE6fWRlDFjc/s1600/1.png" height="276" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Samsung has officially introduced the Galaxy Tab S tablets. New Galaxy comes with Samsung's Super AMOLED screen and WQXGA 2560х1600 bandwidth thinnest and lightest. Galaxy Tab S series will be available in two versions, the main difference between a diagonal screen size of 10.5 inches and 8.4 8.4 the pixel density of 359-inch model, and 10.5 in the 288.</span><br />
<span style="color: #0b5394; font-size: large;">Back side of tablet is very similar to the Galaxy S5 smartphone back side. </span><span style="color: #0b5394; font-size: large;">3 GB </span><span style="color: #0b5394; font-size: large;">operative memory, internal memory can be 16 GB or 32 GB. It is also possible to increase the memory with microSD cards. </span><span style="color: #0b5394; font-size: large;">8 Megapixel back camera and </span><span style="color: #0b5394; font-size: large;">2.1 megapixel </span><span style="color: #0b5394; font-size: large;">front camera</span><br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='600' height='400' src='https://www.youtube.com/embed/qwpfT9jtsMk?feature=player_embedded' frameborder='0'></iframe></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">Battery is too different in this new two tabs. Galaxy Tab S 8.4 tablet have a 4900 mA / h battery. Galaxy Tab S 10.5 have a 7900 mA / h battery.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">Tablet running Android 4.4.2 operating system.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">For tablet there are and </span><span style="color: #0b5394; font-size: large;">Bluetooth Keyboard, </span><span style="color: #0b5394; font-size: large;">Book Cover, Simple Cover.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">Samsung Galaxy Tab S 8.4 and Tab S 10.5 will come in this July, and will cost $400 and $500.</span></div>
<span style="color: #0b5394; font-size: large;">
</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-72067902834081485152014-06-13T18:59:00.000+04:002014-06-13T18:59:17.814+04:00Firefox 30 Available with quickshare on Android in context menu, GStreamer 1.0 support<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhztHYfFV4LrDYg-fvpSP-H0rzmvKflr718wQGTFGLe3ejqSqgbIlKPMDfTBk8qRon8XjrIyxnogijZtQVI6PjM-TgKNur7UfMu8KuxOS5JnLUhmhFoFebNheOZ1kfJf5Heyl-RmO-fIxY/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhztHYfFV4LrDYg-fvpSP-H0rzmvKflr718wQGTFGLe3ejqSqgbIlKPMDfTBk8qRon8XjrIyxnogijZtQVI6PjM-TgKNur7UfMu8KuxOS5JnLUhmhFoFebNheOZ1kfJf5Heyl-RmO-fIxY/s1600/1.png" height="274" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Mozilla launched Firefox 30 for Windows, Linux, Mac and Android. Now its include a button for direct access to sidebar. Now its support GStreamer 1.0 instead of 0.10 version. New quick</span><span style="color: #0b5394; font-size: large;">share </span><span style="color: #0b5394; font-size: large;">buttons added in the context menu on Android version of Firefox.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">So there's the list of new features and bug fixes: </span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Desktop</span></blockquote>
<span style="color: #6fa8dc; font-size: large;">New</span><span style="color: #0b5394; font-size: large;"> - Sidebars button in browser chrome enables faster access to social, bookmark, & history sidebars</span><br />
<span style="color: #6fa8dc; font-size: large;">New</span><span style="color: #0b5394; font-size: large;"> - Mac OS X command-E sets find term to selected text</span><br />
<span style="color: #6fa8dc; font-size: large;">Changed</span><span style="color: #0b5394; font-size: large;"> - Disallow calling WebIDL constructors as functions on the web</span><br />
<span style="color: #6fa8dc; font-size: large;">Changed</span><span style="color: #0b5394; font-size: large;"> - With the exception of those bundled inside an extension or ones that are whitelisted, plugins will no longer be activated by default</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Support for GStreamer 1.0</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Fixes to box-shadow and other visual overflow</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Mute and volume available per window when using WebAudio</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - background-blend-mode enabled by default</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Use of line-height allowed for <input type="reset|button|submit"></span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - ES6 array and generator comprehensions implemented</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Error stack now contains column number</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Support for alpha option in canvas context options</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- Insecure NTLM (pre-NTLMv2) authentication disabled</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- Ignore autocomplete="off" when offering to save passwords via the password manager</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- TypedArrays don't support new named properties</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- Various security fixes</span><br />
<span style="color: #6fa8dc; font-size: large;">Unresolved </span><span style="color: #0b5394; font-size: large;">- Errors loading scripts inside eval scripts with Developer Tools open</span><br />
<span style="color: #6fa8dc; font-size: large;">Unresolved </span><span style="color: #0b5394; font-size: large;">- Mac OS X: cmd-L no longer opens a new window when no window is available</span><br />
<span style="color: #6fa8dc; font-size: large;">Unresolved </span><span style="color: #0b5394; font-size: large;">- Without affecting security, after restoring your session, Extended Validation Certificates might not display</span><br />
<span style="color: #6fa8dc; font-size: large;">Unresolved </span><span style="color: #0b5394; font-size: large;">- Slow shut downs lead to 'Firefox is already running' warning</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Android</span></blockquote>
<span style="color: #6fa8dc; font-size: large;">New</span><span style="color: #0b5394; font-size: large;"> - Add web content to home page panels using Home Feeds Add-On</span><br />
<span style="color: #6fa8dc; font-size: large;">New</span><span style="color: #0b5394; font-size: large;"> - Add Quickshare buttons to Context menu</span><br />
<span style="color: #6fa8dc; font-size: large;">New</span><span style="color: #0b5394; font-size: large;"> - Locales added: Belarusian [be], Argentine Spanish [es-AR], Mexican Spanish [es-MX], Indonesian [id], Latvian [lv], Malay [ms]</span><br />
<span style="color: #6fa8dc; font-size: large;">Changed</span><span style="color: #0b5394; font-size: large;"> - Disallow calling WebIDL constructors as functions on the web</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Fixes to box-shadow and other visual overflow</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Mute and volume available per window when using WebAudio</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - background-blend-mode enabled by default</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Use of line-height allowed for <input type="reset|button|submit"></span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - ES6 array and generator comprehensions implemented</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Error stack now contains column number</span><br />
<span style="color: #6fa8dc; font-size: large;">Developer</span><span style="color: #0b5394; font-size: large;"> - Support for alpha option in canvas context options</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- Ignore autocomplete="off" when offering to save passwords via the password manager</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- TypedArrays don't support new named properties</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- After MP4 video playback, video can not be played again</span><br />
<span style="color: #6fa8dc; font-size: large;">Fixed </span><span style="color: #0b5394; font-size: large;">- Various security fixes</span><br />
<span style="color: #6fa8dc; font-size: large;">Unresolved </span><span style="color: #0b5394; font-size: large;">- Thick lines on some pages</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">The new come soon. Mozilla promises Firefox 31 at the end of July.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-14140771431035644502014-06-12T22:14:00.000+04:002014-07-29T09:30:35.178+04:00How to Hack Facebook with Phishing Attack<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXOkpG2XTj3gHwreFhNi_6hmVeRjiFb3O0oCARjjQIQKFXUPJqBHCdYwf4NNhJrt5gmPGFkZ8rZus5R94IcuqiuNbbjnqt7WGqEC1fND0Df0TRQmF7r6dT856F4B21gIaE700y_NJY60Y/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXOkpG2XTj3gHwreFhNi_6hmVeRjiFb3O0oCARjjQIQKFXUPJqBHCdYwf4NNhJrt5gmPGFkZ8rZus5R94IcuqiuNbbjnqt7WGqEC1fND0Df0TRQmF7r6dT856F4B21gIaE700y_NJY60Y/s1600/1.png" height="240" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">In previous post we already talked about <b><a href="http://hackerzelite.blogspot.com/2014/04/what-is-phishing-introduction-to.html" target="_blank">what is Phishing</a></b>, how we can use it and for what is that. And now really time come to learn how we can hack Facebook accounts using Phishing attack. </span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. Download <b><a href="http://adf.ly/3582876/facebook-phishing-files" target="_blank">Facebook Phishing page files</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">2. Now go to <b><a href="http://adf.ly/3582876/free-webhosting-for-facebook-phishing" target="_blank">this free hosting website</a></b> and create an account. Ar registration time choose free subdomain and write something in text box.</span><br />
<span style="color: #0b5394; font-size: large;">3. After that check your mailbox you will received a mail with verification link. </span><br />
<span style="color: #0b5394; font-size: large;">4. After you clicked on that verification link, you will be redirected to that hosting page.</span><br />
<span style="color: #0b5394; font-size: large;">5. Under </span><span style="color: #6fa8dc; font-size: large;">Action </span><span style="color: #0b5394; font-size: large;">tab press on the </span><span style="color: #6fa8dc; font-size: large;">Refresh Status</span><span style="color: #0b5394; font-size: large;"> and after that press on the </span><span style="color: #6fa8dc; font-size: large;">Go TO CPanel</span><span style="color: #0b5394; font-size: large;"> button.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZRbkf74O7rLgrIwd4xlDqxS83pi9XplutmgY4v7ogl8RG86chD6GoXApWEA9mhyphenhyphene1KhZigsU4uGYauovx8w9FRCYD9wZyqgaeAIAyBD03JjtTWqBi3sHkCWN98lm3dTPMo0PAnkj-Z7E/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZRbkf74O7rLgrIwd4xlDqxS83pi9XplutmgY4v7ogl8RG86chD6GoXApWEA9mhyphenhyphene1KhZigsU4uGYauovx8w9FRCYD9wZyqgaeAIAyBD03JjtTWqBi3sHkCWN98lm3dTPMo0PAnkj-Z7E/s1600/2.png" height="185" width="640" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">6. And now little scroll down find and choose </span><span style="color: #6fa8dc; font-size: large;">File manager</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7ELXVbT5vnEJ0Gv-HuIPPN8hwZo8peeecQlGgx2-jdACxY0UjKG9RsssG7aHtTJuCNWN4ECNHkmDJQlCOgIDWSUbI2StmirWe52H8ngt6PAqQPA-AUZ6fgeUiHJr607WNXX2_AYN8Yhg/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7ELXVbT5vnEJ0Gv-HuIPPN8hwZo8peeecQlGgx2-jdACxY0UjKG9RsssG7aHtTJuCNWN4ECNHkmDJQlCOgIDWSUbI2StmirWe52H8ngt6PAqQPA-AUZ6fgeUiHJr607WNXX2_AYN8Yhg/s1600/3.png" height="120" width="640" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">7. Now in new opened tab you need to enter password of your this web hosting account, enter it and press on </span><span style="color: #6fa8dc; font-size: large;">Continue </span><span style="color: #0b5394; font-size: large;">button.</span><br />
<span style="color: #0b5394; font-size: large;">8. Now go to </span><span style="color: #6fa8dc; font-size: large;">public_html</span><span style="color: #0b5394; font-size: large;"> folder and delete </span><span style="color: #6fa8dc; font-size: large;">default.php</span><span style="color: #0b5394; font-size: large;"> file.</span><br />
<span style="color: #0b5394; font-size: large;">9. After you delete file, press on the </span><span style="color: #6fa8dc; font-size: large;">Upload </span><span style="color: #0b5394; font-size: large;">button.</span><br />
<span style="color: #0b5394; font-size: large;">10. In new screen you need to press on the </span><span style="color: #6fa8dc; font-size: large;">Browse </span><span style="color: #0b5394; font-size: large;">button from right side and choose that zip archive you already download in step 1. And definitely press on the green button.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZWL6B6Bhz2yf-y63z_tCdYPcQqggxcZDoiokHx_a9Yc92LpNj7gA-o0gaXCwXJJcq9A6qVbCy84layseTnPjPVpswbLxUITe4_2WKuiIX9Ld-OWIoOd8vRBNwyxP6qH-GTiUtumVTBLo/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZWL6B6Bhz2yf-y63z_tCdYPcQqggxcZDoiokHx_a9Yc92LpNj7gA-o0gaXCwXJJcq9A6qVbCy84layseTnPjPVpswbLxUITe4_2WKuiIX9Ld-OWIoOd8vRBNwyxP6qH-GTiUtumVTBLo/s1600/4.png" height="212" width="640" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">11. Now you need to send phishing link to victim. Which you entered at registration time. You can find it from CPanel page at right side.</span><br />
<span style="color: #0b5394; font-size: large;">12. But make that link shorten to not detect as SPAM. We already talked about <b><a href="http://hackerzelite.blogspot.com/2014/06/use-url-shortener-to-hide-phishing.html" target="_blank">how we can shorten links with URL shorteners</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">13. After victim open a link and enter his/her login and password you can get it.</span><br />
<span style="color: #0b5394; font-size: large;">14. Go to that webhosting and login to your account. Go to CPanel and after that File Manager. Go to public_html folder and click on log.txt file name. Download that text document and open it!</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrztYj6VIw5MuzC-amcbpo2Bayot3YwqB9uwCaZsuF9GXlHGCnj4Gp8j6Xl8KxtdcGlPL0UFuUANjEL-KbOYD12huIMrH8g-IF2WJVS899AM3QiqHORaCrl5nM89JZkuBZ10P6whiHPOM/s1600/5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrztYj6VIw5MuzC-amcbpo2Bayot3YwqB9uwCaZsuF9GXlHGCnj4Gp8j6Xl8KxtdcGlPL0UFuUANjEL-KbOYD12huIMrH8g-IF2WJVS899AM3QiqHORaCrl5nM89JZkuBZ10P6whiHPOM/s1600/5.png" height="164" width="640" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">Now your done! You have hacked Facebook account using Phishing Attack.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-1426194198850235792014-06-12T15:23:00.000+04:002014-07-29T09:30:35.180+04:00Use URL Shortener to hide Phishing, Malware and viruses URL's<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrTaxlrDmiywehGKYpry8rujBWZFGyJjx1T4F2QrzuNkt3zQuPgvwx8nT13bFSzqFACXTeZhZIdlIMAYwSgKGZwAjx5kXNBC3QgJp5x1WxZYRABG3BbMwbzVPcemkCRtpLtaV3JUc_mj8/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrTaxlrDmiywehGKYpry8rujBWZFGyJjx1T4F2QrzuNkt3zQuPgvwx8nT13bFSzqFACXTeZhZIdlIMAYwSgKGZwAjx5kXNBC3QgJp5x1WxZYRABG3BbMwbzVPcemkCRtpLtaV3JUc_mj8/s1600/1.png" height="330" width="400" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">We already talked <b><a href="http://hackerzelite.blogspot.com/2014/04/what-is-phishing-introduction-to.html" target="_blank">about Phishing</a></b>, about its meaning and for what is that. But as you know URL of phishing website is different and make a doubts. Usual victim don't look at URL bar of website but he/she look at link from where clicking. Means if link contain some words that after that he/she wouldn't click on that. Difficult part is that victim to believe you. So we can make a shorten URL with special URL shorteners.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. Go to <b><a href="http://adf.ly/3582876/url-shortener-no-1" target="_blank">this website</a></b> or <b><a href="http://adf.ly/3582876/url-shortener-no-2" target="_blank">this one</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">2. After that insert Phishing link into the text box and press on the </span><span style="color: #6fa8dc; font-size: large;">Shorten</span><span style="color: #0b5394; font-size: large;"> or </span><span style="color: #6fa8dc; font-size: large;">Shorten URL</span><span style="color: #0b5394; font-size: large;"> button. </span><br />
<span style="color: #0b5394; font-size: large;">3. After that copy generated shorten URL and send it to victim.</span><br />
<span style="color: #0b5394; font-size: large;">I hope that this tutorial will help you to work more professional at Phishing.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-13516395613061591482014-06-11T17:26:00.000+04:002014-06-11T17:26:07.434+04:00Disable Chrome's Notification bell icon from notification area<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvXUbvEKGoOpWCzTX1Zc3sUvrqES-By_uPgto59Jh4u28PkbTMiN0bxJZy5LIEaZv9CCtCxCHL25tKpvF5eI3MNnnFMD6cqBgIavfIwyln4cFfq0SZcLTIOVLjF4rDjyvd7ETJSTeUwcI/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvXUbvEKGoOpWCzTX1Zc3sUvrqES-By_uPgto59Jh4u28PkbTMiN0bxJZy5LIEaZv9CCtCxCHL25tKpvF5eI3MNnnFMD6cqBgIavfIwyln4cFfq0SZcLTIOVLjF4rDjyvd7ETJSTeUwcI/s1600/1.png" height="320" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<span style="color: #0b5394; font-size: large;">Chrome users may noticed that when they are using Chrome browser in notification area bell icon appears. So there are a way to disable that bell icon, and disappear from notification area.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. Open Chrome browser and type in </span><span style="color: #6fa8dc; font-size: large;">chrome://flags</span><span style="color: #0b5394; font-size: large;"> and hit enter.</span><br />
<span style="color: #0b5394; font-size: large;">2. Now use Ctrl+F keyboard combination to open search box in Chrome.</span><br />
<span style="color: #0b5394; font-size: large;">3. Search for </span><span style="color: #6fa8dc; font-size: large;">Enable Rich Notifications</span><span style="color: #0b5394; font-size: large;"> and from drop down menu select </span><span style="color: #6fa8dc; font-size: large;">Disabled</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">But in latest version of Chrome there are no </span><span style="color: #6fa8dc; font-size: large;">Enable Rich Notifications </span><span style="color: #0b5394; font-size: large;">function. </span><br />
<span style="color: #0b5394; font-size: large;">If you can't find any result from that, then try to find next </span><span style="color: #6fa8dc; font-size: large;">Enable Google Now notifications support</span><span style="color: #0b5394; font-size: large;"> and </span><span style="color: #6fa8dc; font-size: large;">Enable experimental Synchronized Notifications</span><span style="color: #0b5394; font-size: large;"> and select both to </span><span style="color: #6fa8dc; font-size: large;">Disabled</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">Now after that all, at bottom of left side press on the </span><span style="color: #6fa8dc; font-size: large;">Relaunch Now</span><span style="color: #0b5394; font-size: large;"> button.</span><br />
<span style="color: #0b5394; font-size: large;">After Chrome restarted, all settings given from you will be appeared.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-53509473536079482282014-06-10T12:14:00.000+04:002018-03-02T17:38:31.991+04:00eBook: Own Your Space, Hackers and Crackers<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDaYNe9guz8J_O6ChY0JTeOcBcS50OqQtq3Lbzxy0wh7XSZpTG294bgU5sdGP6nj87OgzZRH4b6n56Cb-LNVUJsybYKILg5ui_mmlit6gtKeeZZVCtJ94JC9epaWTVf7cT87u2RAXtz3M/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDaYNe9guz8J_O6ChY0JTeOcBcS50OqQtq3Lbzxy0wh7XSZpTG294bgU5sdGP6nj87OgzZRH4b6n56Cb-LNVUJsybYKILg5ui_mmlit6gtKeeZZVCtJ94JC9epaWTVf7cT87u2RAXtz3M/s1600/1.png" width="305" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Want to read about Hackers, who are they and evolution of hackers and crackers. This eBook is from Microsoft. To let know people about hackers. So all you need to know about Hackers is in this eBook. I recommend you to download this eBook and read it right now. I hope you like it.</span><br />
<br />
<div style="text-align: center;">
<a href="http://adf.ly/3582876/ebook-own-your-space-hackers-and-cracker" target="_blank"><img alt="Photo Sharing and Video Hosting at Photobucket" border="0" src="https://i.imgur.com/8JHJVq6.png" /></a></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-89365605656461012232014-06-08T20:46:00.001+04:002014-06-08T20:46:53.074+04:00Facebook keyboard shortcuts must everybody know<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfs82RvFgtrZdEGvIy-hxep8mAdQ4udm_y7ocxyxnLJn2UwD5x91CWdUEZ6hgsAJXUzBUawWI8yNqHNkVSQfY3jrjX5ouDeNAoEBkIxjfMXXZM4zBe1o4jaz7Lnrf0FSNuTvgZWb_kKQU/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfs82RvFgtrZdEGvIy-hxep8mAdQ4udm_y7ocxyxnLJn2UwD5x91CWdUEZ6hgsAJXUzBUawWI8yNqHNkVSQfY3jrjX5ouDeNAoEBkIxjfMXXZM4zBe1o4jaz7Lnrf0FSNuTvgZWb_kKQU/s1600/1.png" height="238" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Facebook is a famous social network nowadays. And people around the world spend a long time on it. Because its place where you can stay connected with your friends and get new friends from different countries. Some people use Facebook for communication, some people for business etc.<br />So to make more easy to use a Facebook you need to use keyboard shortcuts. Which really easy to remember and useful. There are a different shortcuts for different browsers. But i think its better to give you global shortcuts list. That will work in all browsers definitely.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHhsmuNnkQBcaulX_vtJe4pOvanWkv-8WaXsubweF4lbz7cs-nb2QarJE4Vucnesj14KpHlajuklM71wefGHv7cX9yx28He5OGpBnz1FWZTokR4GZyrwyQQR0kV2gV3xhC6HsOYSeuB-M/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHhsmuNnkQBcaulX_vtJe4pOvanWkv-8WaXsubweF4lbz7cs-nb2QarJE4Vucnesj14KpHlajuklM71wefGHv7cX9yx28He5OGpBnz1FWZTokR4GZyrwyQQR0kV2gV3xhC6HsOYSeuB-M/s1600/2.png" height="640" width="448" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">Share with your friends and let them too know about these shortcuts.</span></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-67878777873970818912014-06-08T17:59:00.000+04:002014-06-08T17:59:24.870+04:00How to edit hosts file in Android<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibkV-CMWRvrKDvS_M1m4JPxUdsFJGkHPTYj20qtOWwCvZO4Ij-_TZAZPS9sax0jdxRN63GQJAqnMBnwACDpzfKOsa_GTBLKkm0iLwgGhNdGAo6argjGHqPneckrqUOfCF7C1RS29snBEo/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibkV-CMWRvrKDvS_M1m4JPxUdsFJGkHPTYj20qtOWwCvZO4Ij-_TZAZPS9sax0jdxRN63GQJAqnMBnwACDpzfKOsa_GTBLKkm0iLwgGhNdGAo6argjGHqPneckrqUOfCF7C1RS29snBEo/s1600/1.png" height="320" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">I think that you know about hosts file. Which is known from Windows and you use it for blocking some websites in computer. Or maybe you have a virus on computer which automatically add lines in hosts file and block some websites and you can't access website. Android too have a hosts file. So we can edit it, if we have some websites problem with accessing them then we can check hosts file and remove unwanted lines. Or just block some websites.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. We need a <b><a href="http://hackerzelite.blogspot.com/2014/01/what-is-root-and-how-to-root-your.html" target="_blank">Rooted device</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">2. After that we need to install <b><a href="http://adf.ly/3582876/edit-hosts-file-on-android-app-download" target="_blank">this app </a></b>on device from Play market.</span><br />
<span style="color: #0b5394; font-size: large;">3. Now open that app you just downloaded.</span><br />
<span style="color: #0b5394; font-size: large;">4. Go to next directory </span><span style="color: #6fa8dc; font-size: large;">File system root</span><span style="color: #0b5394; font-size: large;"> -> </span><span style="color: #6fa8dc; font-size: large;">etc</span><span style="color: #0b5394; font-size: large;">.</span><br />
<span style="color: #0b5394; font-size: large;">5. Now from that folder find </span><span style="color: #6fa8dc; font-size: large;">hosts</span><span style="color: #0b5394; font-size: large;"> file. Press on it and in pop out window choose </span><span style="color: #6fa8dc; font-size: large;">edit file</span><span style="color: #0b5394; font-size: large;"> line.</span><br />
<span style="color: #0b5394; font-size: large;">6. Now remove unwanted lines or add if you want to block websites ( to block you need to add this line 127.0.0.1 example.com ). And after that press on the floppy icon from top to save it.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlWjEIdr_49hWVQDy_eu0GWlr_y5z5eK8SRby1Aw8Z7BnWtQeybQAQz12pxFgVyPgA-uR7AGP7K7_rbE3oLBB7Cs7C19Uvj_vr1j-ABUF3MoTGyiibILnLcp4iQxbDKUjIsmcaYGosy1c/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlWjEIdr_49hWVQDy_eu0GWlr_y5z5eK8SRby1Aw8Z7BnWtQeybQAQz12pxFgVyPgA-uR7AGP7K7_rbE3oLBB7Cs7C19Uvj_vr1j-ABUF3MoTGyiibILnLcp4iQxbDKUjIsmcaYGosy1c/s1600/2.png" height="160" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">After that in pop out window press on </span><span style="color: #6fa8dc; font-size: large;">OK </span><span style="color: #0b5394; font-size: large;">and after that </span><span style="color: #6fa8dc; font-size: large;">Yes</span><span style="color: #0b5394; font-size: large;">. And Grant with SuperSu if asks.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">That's it! All new settings appeared to Android hosts file successfully.</span></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com5tag:blogger.com,1999:blog-4894162423908243471.post-69350348490508054342014-06-08T13:47:00.000+04:002014-06-08T13:47:13.531+04:00How to keep Facebook account Secure<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEEUuA7djD9iaZxH-Frdap6Tt5wmnBn35v6JAbGd1vEqFosqlICrb15QvTSmeqSXj73lcztJ960XhUs3je32ImSCo-oVMFkGHlxbIcff6PybLWjOUQvSdlN8Hwgv3xB0voocnq4gOeXm4/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEEUuA7djD9iaZxH-Frdap6Tt5wmnBn35v6JAbGd1vEqFosqlICrb15QvTSmeqSXj73lcztJ960XhUs3je32ImSCo-oVMFkGHlxbIcff6PybLWjOUQvSdlN8Hwgv3xB0voocnq4gOeXm4/s1600/1.png" height="384" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Nowadays Facebook is the most popular social network. And security is the most important thing for social networks. Because in our account we keep information that we want to keep private, or only visible to our friends and family member. </span><br />
<span style="color: #0b5394; font-size: large;">And in this this post i will suggest you the best ways to keep secure your Facebook account.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Use a strong password</span></blockquote>
<span style="color: #0b5394; font-size: large;">This is the important thing. And don't use the same password for any other account. Use a different combination of </span><span style="color: #0b5394; font-size: large;">letters</span><span style="color: #0b5394; font-size: large;"> </span><span style="color: #0b5394; font-size: large;">and </span><span style="color: #0b5394; font-size: large;">numbers. U</span><span style="color: #0b5394; font-size: large;">se logical operators like (</span><span style="color: #0b5394; font-size: large;">!, </span><span style="color: #0b5394; font-size: large;">@ or &) etc.</span><br />
<span style="color: #0b5394; font-size: large;">To stay away from brute force attacks. I recommend you to open <b><a href="http://adf.ly/3582876/password-generator-website" target="_blank">this website</a></b> which can generate a strong password.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Privacy Settings </span></blockquote>
<span style="color: #0b5394; font-size: large;">From privacy setting you can manage who can see your stuff. Set it to only friends can see your stuff and don't let unknown persons to see your posts. Keep account locked from search engines which make your account more secure.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Security Settings </span></blockquote>
<span style="color: #0b5394; font-size: large;">Make secure your email accounts like Gmail, Hotmail, Yahoo etc. with the help of two step protection. Go to Facebook Settings -> Then Switch To Security Settings. Add 2 email address and mobile number. Activate all given security settings available such as </span><span style="color: #0b5394; font-size: large;">Log in Notification, </span><span style="color: #0b5394; font-size: large;">secure browsing, trusted Contacts.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">External Links And Apps</span></blockquote>
<span style="color: #0b5394; font-size: large;">Do not click on any link if you have any doubts which can send by friends or any other company, which want you to put your email and password. Also check URL before login into Facebook. Sometimes people make fake Facebook Log in pages. Never enter password in any application. If you see different link then close it, do not enter login and password.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Updated Browser </span></blockquote>
<span style="color: #0b5394; font-size: large;">Keep up to date your browser, because in new version security is more strong and you stay safe.</span><br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">About Section Settings </span></blockquote>
<span style="color: #0b5394; font-size: large;">All your personal information is in about section. Where is placed where you live, your phone number, about your family, your date of birth, your work place etc. </span><br />
<span style="color: #0b5394; font-size: large;">Kepp that all information hidden from unknown persons, make it visible only to friends or only to you.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-86506886189367987682014-06-07T11:59:00.000+04:002014-06-07T11:59:46.267+04:00How to Hide Android App from menu<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPyD-6AyOW8mc-8MGzy19MkWBvvxv6I57-ZRqJtRqCaZXVwZO3HiZ_kBnqCvUOBgY8zf5CUtpkznGnh9QOXjY15pep8eyLohpPcNo3LgpBCLwIdFrTZCJLavNf2DuCpzMg8ihRtGMv518/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPyD-6AyOW8mc-8MGzy19MkWBvvxv6I57-ZRqJtRqCaZXVwZO3HiZ_kBnqCvUOBgY8zf5CUtpkznGnh9QOXjY15pep8eyLohpPcNo3LgpBCLwIdFrTZCJLavNf2DuCpzMg8ihRtGMv518/s1600/1.png" height="400" width="400" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Its really happens that you want to keep apps in your Android device but want make them private. Hide app, only you can access that app and nobody other. That's really possible thing for Android devices. We just can do that with next steps.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">1. First of all we need a <b><a href="http://hackerzelite.blogspot.com/2014/01/what-is-root-and-how-to-root-your.html" target="_blank">Rooted device</a></b>.</span><br />
<span style="color: #0b5394; font-size: large;">2. After we have it, we need to install <b><a href="http://adf.ly/3582876/hide-apps-in-android" target="_blank">this app</a></b> from Play Market on device.</span><br />
<span style="color: #0b5394; font-size: large;">3. Now just open it and it asks to check for root availability. And you will see SuperSu pop out window, where you need to </span><span style="color: #6fa8dc; font-size: large;">Grant</span><span style="color: #0b5394; font-size: large;"> app.<br />4. After that just swipe to right from left corner app icon, and you will detected menu of app, just open </span><span style="color: #6fa8dc; font-size: large;">Setting</span><span style="color: #0b5394; font-size: large;"> of app.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglpI5Ck6RmxoRGfotLVegeAnbkVXa5KXgb0RfQLQ-Idq2OsuApnpJz-PTN76An3n9Cuar6otjcwzjqaQbB1Gx6HJ7vz0ZwAdqMBPgZk2xAd315jSxT5r9k2Be2zBDTwjmgzc6Inq5-tEg/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglpI5Ck6RmxoRGfotLVegeAnbkVXa5KXgb0RfQLQ-Idq2OsuApnpJz-PTN76An3n9Cuar6otjcwzjqaQbB1Gx6HJ7vz0ZwAdqMBPgZk2xAd315jSxT5r9k2Be2zBDTwjmgzc6Inq5-tEg/s1600/2.png" height="400" width="235" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">5. And turn on Pin Protection. And you need to type a password of app two time. So there are more settings, you can enable which one you want. For example you can change that app name to other that nobody have a doubt that you hide apps.</span><br />
<span style="color: #0b5394; font-size: large;">6. Now get back to first screen of app, Hidden apps tab. And press on the plus button.<br />7. Now from </span><span style="color: #0b5394; font-size: large;">device apps list you need to chose which apps you want to hide. Check them and press on the Save button at top of right side.</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0Pe8up8PSvyLU8AQFN0gGFMdzSPT1KBx12nNLujce-Quw2u777Pe2LAGDlkqlFv6ObcSDWoEA6aFfhGb88se5HYXzw_uCdflaFQKoCZBLNp4XhjlgG1lwqQLjgRHrGAtpXrAzAfsl8j4/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0Pe8up8PSvyLU8AQFN0gGFMdzSPT1KBx12nNLujce-Quw2u777Pe2LAGDlkqlFv6ObcSDWoEA6aFfhGb88se5HYXzw_uCdflaFQKoCZBLNp4XhjlgG1lwqQLjgRHrGAtpXrAzAfsl8j4/s1600/3.png" height="232" width="320" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Now your done! You can see that your selected apps disappeared from device.<br />To unhide app just open this app again and press on app you want to unhide. And on pop out window choose </span><span style="color: #6fa8dc; font-size: large;">Unhide </span><span style="color: #0b5394; font-size: large;">line. </span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-17228849917752835402014-06-06T16:25:00.000+04:002014-06-06T16:25:29.625+04:00Google launches 64-bit version of Chrome, which will run more quickly<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMZRUZqJHBu2RFCavLXONyf_DBNWNpEFjmAb_nLKka0h9xbYniYDAW_oQnFhPOOSMKCemud-2WnW75PBryO2H_5FdhFankG_rHyTnwiNDPyezZqd4a4ySfCSoRwl2pGQWUAZ0sGfTe9X4/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMZRUZqJHBu2RFCavLXONyf_DBNWNpEFjmAb_nLKka0h9xbYniYDAW_oQnFhPOOSMKCemud-2WnW75PBryO2H_5FdhFankG_rHyTnwiNDPyezZqd4a4ySfCSoRwl2pGQWUAZ0sGfTe9X4/s1600/1.png" height="256" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Google announced 64-bit version of Chrome browser. For now Dev and Canary channels </span><span style="color: #0b5394; font-size: large;">available only for Windows 7 and 8 users. You can Download both of them from their channels: <a href="http://adf.ly/3582876/dev-version-of-chrome-64-bit" style="font-weight: bold;" target="_blank">Dev</a> and <b><a href="http://adf.ly/3582876/canary-version-of-chrome-64-bit" target="_blank">Canary</a></b>. </span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">This 64-bit allows Google to take advantage of the </span><span style="color: #0b5394; font-size: large;">compiler</span><span style="color: #0b5394; font-size: large;"> </span><span style="color: #0b5394; font-size: large;">and </span><span style="color: #0b5394; font-size: large;">latest processor </span><span style="color: #0b5394; font-size: large;">optimizations. Speed is improved, especially in graphics and multimedia content by 25 percent.</span><br />
<span style="color: #0b5394; font-size: large;">With 64-bit Chrome able to take advantage of the latest OS features such as High Entropy ASLR on Windows 8.</span><br />
<span style="color: #0b5394; font-size: large;">Google's specialists point out that in 64-bit Chrome increased stability in the site. The display elements of the failures were down twice.</span><br />
<span style="color: #0b5394; font-size: large;">There are a more settings for developers. Still its running beta version but you can download it from his channels given higher. You don't need to uninstall chrome from computer, just download 64-bit and install on it. </span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-68548749393351245082014-06-05T12:54:00.000+04:002014-06-05T12:55:14.292+04:00Apple Launches Swift Programming Language for Writing OS X and iOS Apps<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_vTnmgp72QAFCLdNvog2sm_zOrEdbWKd4ekT7Hn6pjEgZZ3wyfpyd-AX_mDYKSONwj8aLk3YDgnasyJrzh81UiccVgx2VUc0ceZpNyQ7_4TJuLHxIMG6-iA0lvhV2NXB5-SleFnF5UPM/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_vTnmgp72QAFCLdNvog2sm_zOrEdbWKd4ekT7Hn6pjEgZZ3wyfpyd-AX_mDYKSONwj8aLk3YDgnasyJrzh81UiccVgx2VUc0ceZpNyQ7_4TJuLHxIMG6-iA0lvhV2NXB5-SleFnF5UPM/s1600/1.png" height="360" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">At WWDC 2014 Apple come with new <b><a href="http://hackerzelite.blogspot.com/2014/06/apple-introduces-ios-8-release-date-and.html" target="_blank">iOS 8</a></b> and <b><a href="http://hackerzelite.blogspot.com/2014/06/apple-announces-os-x-yosemite-operating.html" target="_blank">OS X Yosemite</a></b> operating systems. But that's not all. Apple really surprised us by launching new Swift Programming Language. Swift seems to be poised to replace Objective-C as the main programming language on Apple’s platforms. This programming language will use the same LLVM compiler and runtime as Apple’s Objective-C implementation.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<br />
<blockquote class="tr_bq">
<span style="color: #0b5394; font-size: large;">Some of the highlights of the language according to Apple</span></blockquote>
<span style="color: #0b5394; font-size: large;"><br /></span>
<br />
<ul>
<li><span style="color: #0b5394; font-size: large;">Generics </span></li>
<li><span style="color: #0b5394; font-size: large;">Structs that support methods, extensions, protocols. </span></li>
<li><span style="color: #0b5394; font-size: large;">Tuples and multiple return values </span></li>
<li><span style="color: #0b5394; font-size: large;">Closures (similar to blocks in C and Objective-C) unified with function pointers </span></li>
<li><span style="color: #0b5394; font-size: large;">Fast and concise iteration over a range or collection </span></li>
<li><span style="color: #0b5394; font-size: large;">Functional programming patterns, e.g.: map and filter</span></li>
</ul>
<span style="color: #0b5394; font-size: large;"><br /></span><ul>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikJ-cwjpS9mPkG3ThVav6S6nOKNkkZn5x7yxiyelwvY5G1wCz1tdChzXgdQ-wG6xED5XRiN8IgD7wvG2GMh7HrCbIbrKLEqI227vCghoSb2gystTCJfAyoRzEOIFtYbq-fSMmmKh80Q60/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikJ-cwjpS9mPkG3ThVav6S6nOKNkkZn5x7yxiyelwvY5G1wCz1tdChzXgdQ-wG6xED5XRiN8IgD7wvG2GMh7HrCbIbrKLEqI227vCghoSb2gystTCJfAyoRzEOIFtYbq-fSMmmKh80Q60/s1600/2.png" height="266" width="400" /></a></div>
<div>
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div>
<span style="color: #0b5394; font-size: large;">If you are a developer then you can <b><a href="http://adf.ly/3582876/swift-programming-language-book" target="_blank">download this Book</a></b> and read about that programming language.</span></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-31028135080311253102014-06-03T20:07:00.001+04:002018-03-02T17:38:10.880+04:00eBook: Hacking For Dummies<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLnCVvpyaKN1LhEFH5lXKS1Nh1Rio6MepoAiP1Ezt4shU7PKDZ7BMcpZV0znVAfAE1oemW9L902-etkJJyDvvVLFlwlRkBrzFR4bfn6FGQifCk9GotnqxNUeP0bcLklGT-y7SvIwE6MOk/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLnCVvpyaKN1LhEFH5lXKS1Nh1Rio6MepoAiP1Ezt4shU7PKDZ7BMcpZV0znVAfAE1oemW9L902-etkJJyDvvVLFlwlRkBrzFR4bfn6FGQifCk9GotnqxNUeP0bcLklGT-y7SvIwE6MOk/s1600/1.png" width="317" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">The best ever eBook to start learn Hacking from zero. You don't know nothing, but really want to start learning, you are ready for that. I recommend you to download this eBook right now for free and start learning and understand all about Hacking.</span><br />
<br />
<div style="text-align: center;">
<a href="http://adf.ly/3582876/ebook-hacking-for-dummies-4th-edition" target="_blank"><img alt="Photo Sharing and Video Hosting at Photobucket" border="0" src="https://i.imgur.com/8JHJVq6.png" /></a></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-61163533248644121422014-06-03T19:35:00.000+04:002014-06-03T19:35:19.283+04:00Apple Introduces iOS 8: Release date and features<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlGViX1fn0WA-cwVCWY5wotYyYApRndfGoOxI1jnfx7rUaaZ4epvKqIVZucZnfmwXUuRPUyzwfNBH8HP9xI6eMzK9z9gbhhr8n9vnZXImbgyk1IBatXkePA57rePPIWs6PFTnrzgTa72A/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlGViX1fn0WA-cwVCWY5wotYyYApRndfGoOxI1jnfx7rUaaZ4epvKqIVZucZnfmwXUuRPUyzwfNBH8HP9xI6eMzK9z9gbhhr8n9vnZXImbgyk1IBatXkePA57rePPIWs6PFTnrzgTa72A/s1600/1.png" height="370" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">At WWDC 2014 Apple come with new <b><a href="http://hackerzelite.blogspot.com/2014/06/apple-announces-os-x-yosemite-operating.html" target="_blank">OS X Yosemite</a></b>. And that's not all. Apple introduced New iOS 8. Now its available but in beta version. It will be more interesting for developers with its new features. But full version of iOS8 come in autumn. For now i don't recommend you to upgrade your iDevice to iOS8. Because after that you can't downgrade to old version of iOS. This new version is compatible with devices given in picture below.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOUrZ7TkTYH6xHTRiIVaOlnsCf9jxc2PQH9v09YXHacZfD5z6zs4oEJ8oM-w-rzDqDQllEXd9NS2kU0i9POdedj8KdCVIYZ_HczcdFGMr2XsKoCJUAfFOqgUPmTo6XHvbuc71RzST-9lE/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOUrZ7TkTYH6xHTRiIVaOlnsCf9jxc2PQH9v09YXHacZfD5z6zs4oEJ8oM-w-rzDqDQllEXd9NS2kU0i9POdedj8KdCVIYZ_HczcdFGMr2XsKoCJUAfFOqgUPmTo6XHvbuc71RzST-9lE/s1600/2.png" height="190" width="640" /></a></div>
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">This new version is full of new features. Design changed. If you press two time on home button you will be able to see not only recent opened apps, now you can see most called contacts icons.</span><br />
<span style="color: #0b5394; font-size: large;">Fast way to answer messages without closing your currently opened app.</span><br />
<span style="color: #0b5394; font-size: large;">Group messaging. Record something and send via message directly from messaging.</span><br />
<span style="color: #0b5394; font-size: large;">New keyboard feature. More easy to write something.</span><br />
<span style="color: #0b5394; font-size: large;">New Parental setting. You can lock your child iDevice app Store. And when he/she want to download paid apps you can see warn message on your iDevice, which asks you able your child to download that app.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-17747633686771082992014-06-03T18:15:00.000+04:002014-06-03T18:15:29.575+04:00Apple Announces OS X Yosemite Operating System<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi68MvR3ZRmRn8MpNhq0JMkGnuVGXUqlexZru6QamZLV0tY2LS7gt4sn4ZYZHP7fsynNUMd90ZTd_GGDQWeeN5ttu5omD3DaUDVx9VGY6CEVABch_oLLpzennWeFcF6txDcU1szlWBFw44/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi68MvR3ZRmRn8MpNhq0JMkGnuVGXUqlexZru6QamZLV0tY2LS7gt4sn4ZYZHP7fsynNUMd90ZTd_GGDQWeeN5ttu5omD3DaUDVx9VGY6CEVABch_oLLpzennWeFcF6txDcU1szlWBFw44/s1600/1.png" height="382" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">At WWDC 2014 Apple come with new version of Mac OS X</span><span style="color: #0b5394; font-size: large;">. Which version of Mac OS X named Yosemite. Apple took that name from "Yosemite" park in California.</span><br />
<span style="color: #0b5394; font-size: large;">This version come with new features. Changed design, added gadgets function, new smart search, fast Safari browser, iCloud </span><span style="color: #0b5394; font-size: large;">Drive</span><span style="color: #0b5394; font-size: large;"> </span><span style="color: #0b5394; font-size: large;">and messages new settings. And now we talk about this all new things.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<span style="color: #0b5394; font-size: large;">Design of this new version is more similar to iOS 7 system interface.</span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfFa2fy-Z2ho9MWbyOYyVRHUGJYZem7vmPL4Zj7Mn_jgdHols9ltsCej_juQ66ALNpKQpFe5HySqL2Cg_DgxHrS5TUj6daAYlgSE6T4c8uUnYBcULlxsHTzF1pktrjDM0U_KNxzoCY2xQ/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfFa2fy-Z2ho9MWbyOYyVRHUGJYZem7vmPL4Zj7Mn_jgdHols9ltsCej_juQ66ALNpKQpFe5HySqL2Cg_DgxHrS5TUj6daAYlgSE6T4c8uUnYBcULlxsHTzF1pktrjDM0U_KNxzoCY2xQ/s1600/2.png" height="230" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">You can add a widgets in Notification Center. Which make more easy to do some things.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNSqJ98LkjrA3VkNW-WJQ3mEh_rcw1-P7VhJUO0BUSfyuHq0XRSaOECCSsr4xuiCCtWiKfPW2jwG3_ARFxrfWH_PkFZhpEuzqDcEnBxQ-qHy-JD44X5QeUy5NaOBB83QZpXk7jJBcpZak/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNSqJ98LkjrA3VkNW-WJQ3mEh_rcw1-P7VhJUO0BUSfyuHq0XRSaOECCSsr4xuiCCtWiKfPW2jwG3_ARFxrfWH_PkFZhpEuzqDcEnBxQ-qHy-JD44X5QeUy5NaOBB83QZpXk7jJBcpZak/s1600/3.png" height="316" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">In this version you can see new search settings, Now search bar will be placed at center of your screen. Which search now whole web, and we can say smart search.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEyytIFzu6efxAHYWi7CBZM3Zp72xl5pGAIhKmxnD3J_HOqQqtnvLAmM3lWeKuhwOYxH1bdhaa-FIw8EhUlP5xNS90XvstboHaxLoVam2JyymYqOtzxJgyX0-fBl7pb9U9Ytdpy5ESFyE/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEyytIFzu6efxAHYWi7CBZM3Zp72xl5pGAIhKmxnD3J_HOqQqtnvLAmM3lWeKuhwOYxH1bdhaa-FIw8EhUlP5xNS90XvstboHaxLoVam2JyymYqOtzxJgyX0-fBl7pb9U9Ytdpy5ESFyE/s1600/4.png" height="255" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">New fast Safari browser. More easy to surf the web and save bookmarks. The fast browser now. Chrome go to number two.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNPCHiFricWMC7036IgI1mlA_G1epCBI0x3wM8NL0kjYOBxx5_xijxsIZb3JZccrq5ENVq5exTa_nkd9KKNEfWvYlaTpagnSj9K8Mb_DprwB1pvzFzRIcI2oGj3EhiNH7ce0DP6T6GvMc/s1600/5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNPCHiFricWMC7036IgI1mlA_G1epCBI0x3wM8NL0kjYOBxx5_xijxsIZb3JZccrq5ENVq5exTa_nkd9KKNEfWvYlaTpagnSj9K8Mb_DprwB1pvzFzRIcI2oGj3EhiNH7ce0DP6T6GvMc/s1600/5.png" height="250" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">And new features in Mail. Now you can send up to 5 GB files. Before that was not possible thing, but now its possible with OS X Yosemite.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">And you can now send SMS and MMS with iMessage directly from computer.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi87SojrLWWaYrsKHlYbouno10cJPa9ACaVthZ-12T5tRiiS82WuKx06gbnUzWQvgG6KbpJYnjRIBf1sqK-loopmIid6VEALUaJchrjk7RhAy3dBF2HmciQUZVU_As6xkBKH0FQSaKxnCY/s1600/6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi87SojrLWWaYrsKHlYbouno10cJPa9ACaVthZ-12T5tRiiS82WuKx06gbnUzWQvgG6KbpJYnjRIBf1sqK-loopmIid6VEALUaJchrjk7RhAy3dBF2HmciQUZVU_As6xkBKH0FQSaKxnCY/s1600/6.png" height="235" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">Handoff is one of the new features of Yosemite.</span><span style="color: #0b5394; font-size: large;"> </span><span style="color: #0b5394; font-size: large;">Handoff </span><span style="color: #0b5394; font-size: large;">allows you to quickly pick-up where you left of on any device. For example, if you're viewing a web page on Safari on your Mac, you can open that same page on your iPad simply be swiping up on the lockscreen.</span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ9Zhls6FfwOF9HNXgbU-eK1kfV9kFsTuJ5qxwATfunTHc1s3aZfzQsa-h0U8JisaKqzXoMFE-Dg0JwnABpqh1fa2m2BcbfcpwEL6XcC4nMjfFJskpI0TBn6TnnlogxvsKI-OTTCAwqhI/s1600/7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ9Zhls6FfwOF9HNXgbU-eK1kfV9kFsTuJ5qxwATfunTHc1s3aZfzQsa-h0U8JisaKqzXoMFE-Dg0JwnABpqh1fa2m2BcbfcpwEL6XcC4nMjfFJskpI0TBn6TnnlogxvsKI-OTTCAwqhI/s1600/7.png" height="237" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="color: #0b5394; font-size: large;">And at last. You can </span><span style="color: #0b5394; font-size: large;">View and accept calls from your iPhone on your Mac.</span></div>
Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-25305733712361311652014-06-02T18:53:00.000+04:002014-06-02T19:06:45.142+04:00New Skype Translator to Break down language Barriers<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggSJL3wj2Mn8-K9vq7B0jbz9LgALD_G-9FFGeRfI6M0x7BvFvj4HvwVPJuvkNpTdHBj9ZG5yvs4uFoOzOFc5p4lG2rsagTYpcRHdClMgMYmqH5BTQgg8WSDO_5b1IcF7dSViuAXIri9zk/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggSJL3wj2Mn8-K9vq7B0jbz9LgALD_G-9FFGeRfI6M0x7BvFvj4HvwVPJuvkNpTdHBj9ZG5yvs4uFoOzOFc5p4lG2rsagTYpcRHdClMgMYmqH5BTQgg8WSDO_5b1IcF7dSViuAXIri9zk/s1600/1.png" height="426" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Skype is very important thing nowadays. Because its help people to communicate from different places. If your friend, familiar person so far away from you and you miss him/her and want to listen his/her voice and see, then you just call him via Skype. Its give you a chance to get friends from different countries. People speak on Skype by different languages, and that's a problem, that they don't understand each other. Its too difficult to speak with person who speak in different language. You need to use translator or explain with emotions. </span><br />
<span style="color: #0b5394; font-size: large;">Soon Skype become with a new function. Skype app will synchronized translate video calls. Two part of video call can speak in their native language and listen partner.</span><br />
<span style="color: #0b5394; font-size: large;">About this report </span><span style="color: #0b5394; font-size: large;">Satya Nadella, </span><span style="color: #0b5394; font-size: large;">General Manager of Skype.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='600' height='400' src='https://www.youtube.com/embed/5wzCXPUNixo?feature=player_embedded' frameborder='0'></iframe></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="color: #0b5394; font-size: large;">In this project Microsoft team works about 10 years. And definitely they have done this with Skype team together.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-42806594331914178882014-06-02T18:23:00.000+04:002014-06-21T16:14:06.944+04:00You must watch this: iPad vs Paper<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvHJLvzXR3U1afIwzz7ISCKWUaoi1f2lDbgQ00KVNv8DebniuT43MlhU98SNOLbYJq6WTaFSP9WO-Rr8juBmGb1q_99z69MuNM3LBaIIM4KYtsSKNJSpKlhme1HLsXpYYXqg_v26aXVMI/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvHJLvzXR3U1afIwzz7ISCKWUaoi1f2lDbgQ00KVNv8DebniuT43MlhU98SNOLbYJq6WTaFSP9WO-Rr8juBmGb1q_99z69MuNM3LBaIIM4KYtsSKNJSpKlhme1HLsXpYYXqg_v26aXVMI/s1600/1.png" height="353" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">We live in century of technology. And its grow up with every new day. It have and his good and bad sides. Now is more easy to find something, because we have a Google, Bing. Its to easy to remember birthdays because Facebook remind us. But that's make people robots. Kids forget what is street, and you can't see kid in street who play football. </span><br />
<span style="color: #0b5394; font-size: large;">In this post i will share a video with you. Name of video is iPad vs Paper. Now you can imagine little bit different about this video, but stop! I recommend you to watch this video. And write in comment section below of this post, what's on your mind? What you feel after watching this video.</span><br />
<span style="color: #0b5394; font-size: large;"><br />
</span> <br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='600' height='400' src='https://www.youtube.com/embed/UR4mlLiyjYo?feature=player_embedded' frameborder='0'></iframe></div>
<span style="color: #0b5394; font-size: large;">
</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0tag:blogger.com,1999:blog-4894162423908243471.post-37639231822810848092014-05-28T21:23:00.000+04:002014-06-24T16:10:53.228+04:00Be Careful from new Facebook virus you get from friends as a new video post<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSoc2bBPIxwXlekuJarliAxi3zrFVR2pqqJRWVKTT5BGsKypRD9x0WSM1aQ-AWAbZCaPYzZxM-PWwGNTd1acg6tBwFBhGWZGe6x2Dr30reCZuJ__MdvhSUaJG9r9XH5uokje7bgkSAn1w/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSoc2bBPIxwXlekuJarliAxi3zrFVR2pqqJRWVKTT5BGsKypRD9x0WSM1aQ-AWAbZCaPYzZxM-PWwGNTd1acg6tBwFBhGWZGe6x2Dr30reCZuJ__MdvhSUaJG9r9XH5uokje7bgkSAn1w/s1600/1.png" height="339" width="640" /></a></div>
<br />
<span style="color: #0b5394; font-size: large;">Today in 28 of May group of hackers uploaded a new virus in Facebook. You can get a new notification from your friends. Where your friend posted about a new video which he/she make for his/her friends, and tagged all his/her friends on that status. And given a link which shortened. After victim open a link he/she redirected to famous hidemyass proxy website and after that notified for download a file. </span><br />
<span style="color: #0b5394; font-size: large;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZF1jCztXQhEesJdblAlXCummCtSo0gxTVzdIRtTMW7cBfioBcKMAmv0f2_Ra3oRTBJjGuVWUOLtfKgMSRxtz4Q5S-3JWutO4VP48329e4Sl96-yZVZm_7nlMz1AY7-oIRS1fLMN_56Ig/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZF1jCztXQhEesJdblAlXCummCtSo0gxTVzdIRtTMW7cBfioBcKMAmv0f2_Ra3oRTBJjGuVWUOLtfKgMSRxtz4Q5S-3JWutO4VP48329e4Sl96-yZVZm_7nlMz1AY7-oIRS1fLMN_56Ig/s1600/2.png" height="276" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<span style="color: #0b5394; font-size: large;">I detect this just 5 minute ago. I still don't know what kind of virus is this. I think after victim open it his/her computer detect as zombie. And hackers can do all after that. I think its for DDosing websites. </span><br />
<span style="color: #0b5394; font-size: large;">So skip that notification on Facebook. I think its come with some apps on Facebook. After you open it on your account you give app permission to post that status on your timeline and tag all your friends. </span><br />
<span style="color: lime; font-size: large;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-lZ_osT55iCzEkeUjHPS52VbLReG8AfmLboYEI5jgduBCL7mTyIVmAX_JGb_v3MBbPqRlGLoZ2SPJI5rPFJpXyzAh5jifgdHLfBfNJ25KxxswLYsWsKmxjuBE4VBo9NGVxcFRONEoCM/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-lZ_osT55iCzEkeUjHPS52VbLReG8AfmLboYEI5jgduBCL7mTyIVmAX_JGb_v3MBbPqRlGLoZ2SPJI5rPFJpXyzAh5jifgdHLfBfNJ25KxxswLYsWsKmxjuBE4VBo9NGVxcFRONEoCM/s1600/3.png" height="280" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<span style="color: #0b5394; font-size: large;">Stay tuned with Hackers Elite and know about all cyber news. And you'll stay safe on internet.</span>Mikayel Aleksanyanhttp://www.blogger.com/profile/10113507482544835672noreply@blogger.com0