Sunday, June 12, 2016

Be Aware Because I Bet, You Don’t Know About Facebook

we all know that in today’s generation people really affordable to this popular social networking site Facebook, in the vast number of users in daily basis sign up Facebook and millions of users already using Facebook but they might be unknown with this seven facts that they can do very well if they are facing this seven problems right away.

7 Things I Guess You Don’t Know About Facebook

#1 Facebook Tracks You

Facebook is using undefined technology so that they can track your every single click and browsing history of your browser, you must have realised that whenever you have liked any post of any XYZ page in Facebook the next very day the same page’s post will appear in your news feeds which means Facebook analysis and track you clicks and interest, so with that analytics they showing more about that related stuffs, so how can you manage to block Facebook from Tracking you, however, you probably don’t want to get tracked by Facebook so downloading some of the software who helps you to block Facebook to track you.

#2 Block Game Invitation

Facebook not only allowed its users to just chat one with another, it also allow you to play games to get engaged with the term Facebook, So people or you may say users sends you gaming invitation which is real sickness from the regularly incoming invitation, so you really wanna rid out of it. Then follow the steps. Go to Setting -> Privacy -> Blocking -> Block App Invites now enter the name of the Friend (Done).

#3 Remove Application With Their Rights

Do you know that the application you are giving authority to post in your wall behalf of you can irrespectively get you ID and Passwords too, at the time of applying the application you must have asked by the program that you are going to give rights to the particular Application such as posting and liking posts behalf of you. So does that sounds GOOD? Probably no, so now don’t worry if you have accepted all those application to your profile you can now manually remove that application from your Facebook right now. Follow the instruction below to do the same. Go to Setting -> Privacy -> Blocking -> Block App now enter the name of the Application you wanted to block, or else if you don’t know then you can see the list of application your have given authority.

#4 Facebook Monopoly With The Paid And Popular Stuffs

Facebook basically worked harder in visualising the important posts at first in your news feeds, such as Promotes posts or pages will come in your news feeds first rather than your friends just in posted any status, Facebook also shares at first when the post become popular, just a Monopoly.

#5 You Cannot Make Your Gender And Cover Photos Private

It’s really hard to believe that no one in facebook have the right to hide their Gender and Cover Photos. You can search any profile on facebook, but you can’t see their wall and other privacy, but you can see their Gender & Profile Picture.

#6 Facebook Sharing Actually Works Different

What  do you do in  facebook? Sharing links of your fav articles? Sharing others article? Let’s tweak it follow my rule. Paste any link on your status wait for the thumbnail to appear once it appears  delete the URL you posted in the status, Guess what? Facebook will automatically suspend the Post’s URL giving it a simple and outstanding look. Actually, this was the process bloggers uses most of the time while publishing their articles in facebook in order to reach more audience.

#7 You have to Pay in Order to Send Message



7 Things I Bet You Don't Know About Facebook
7 Things I Bet You Don’t Know About Facebook

This might be unknown to many, but it was actually a lesser known feature of facebook. Some Reputed Names or Celebrities Already making full use of this feature. You can apply the option of Pay per message if a person wants to message you he/she have to pay the recommended cost in order to message you.
These Seven facts about facebook might be unknown to many because these are rare and beneficial. You can try each and every point anytime and anywhere in facebook there is no restriction for testing these seven facts.

How To Create Fake Facebook Conversation Online


Today Facebook is one of the important part of our life as we daily make chats with our friends through this social network. But what about creating a fake conversation of Facebook? Yes it is possible ,you can create it. You can prank with your friends by this cool Fake conversation creating trick. In this post i will tell you a method by which you can easily create fake sent and received message of Facebook and then you can share that conversation with your friends and can make them fool by this. And there will be no need of suing any app in your device as just a online sites will do this work for you. And the method is very simple and you will get to know following up the complete guide discussed below.


How To Create Fake Facebook Conversation Online

The method is quite simple and you will just use some cool sites that will let you to create a fake conversation for Facebook and you can use it to prank your friends and that will be very cool. So follow up steps below to proceed.
Steps For Creating Fake Facebook Conversation Online
Below we had mentioned two sites with the help of which you can create Fake Facebook conversation and that for free and without any use of app.

#1  Simitator.com

This is the cool site in which you can easily create Fake Facebook chats for you and then take their screenshots crop them and then send then to friends to play prank with them. Follow the steps for creating Fake Facebook conversation in the app :-
  1. First of all upload the profile picture of first person and then give its name there.
  2. Now on the second step upload the picture for second person and then type its name too.
  3. Now enter the date and that it type the message to have Fake conversation with you.
    Create Fake Facebook Chat Online
    Create Fake Facebook Chat Online

#2 Fakeconvos.com

The another good site that will allow you to create conversation exactly same as Facebook, follow steps below to proceed.
  1. First of all open the site and then logged in with your account.
  2. Proceed with the guide there with the receiver and sender’s name.
  3. Now create any Fake conversation that you want to use to prank your friends.
So above is all about Create Fake Conversation Online. By this method you can easily create any of fake conversation with any random names of your friends and can fool your friend with this. Have fun with this cool Facebook Conversation creating trick and pranks your friends. Don’t forget to share this cool post. And leave a comment below if you have any related queries with this.

How to Bypass Phone SMS Verification on any Website/Service

Sometimes putting up your phone number to a website while creating any account could be a troublesome task as your private number can be leaked through many sources. Therefore, we are here with a trick to Bypass SMS Verification Online on Websites. With the help of listed 8 websites, you can easily bypass SMS verification process.




Today while creating accounts on numerous websites you need to confirm your phone number through verification SMS, but sometimes you might notice that the website is not much secure to bestow your personal mobile number with them. As your private number can be leaked through some untrusted websites by their data exposure. So alternative method to avoid all this is bypassing this verification. In this method, you don’t need to enter your personal number for verifying, as you will have to use an artificial verification number. So this method is very tricky and absolutely works, which you will get to know after reading the below method.

How to Bypass SMS Verification Online on Websites for Free

Firstly let me clear one thing, you should not go for this bypass SMS verification if you want to verify for some trusted networks like Gmail, Yahoo, Facebookand all other. And this method is very modern to bypass SMS verification at some promotional networks where there is a risk of your number being leaked. So just follow up the below steps to proceed.
You Just need to visit any of the site listed below, as these websites are perfectly bypassed the SMS verification.

1. www.Receive-SMS-Online.com


Receive-SMS-Online
Receive-SMS-Online

In this website, you will find out the 7 dummy numbers that you can use to verify through SMS verification. There you need to select any number and then open that number that you have used to verify any website. and you can search out your corresponding verification code in Inbox

2. www.receive-sms-now.com


receive-sms-now
receive-sms-now

This is another website which offers 22 dummy numbers for verifying process, you can choose any of them and can tap on it to find your particular verification SMS on it.

3. www.freesmsverification.com


freesmsverification
freesmsverification

Here you will find the six different dummy mobile numbers that you can use to bypass your SMS verification as the verification code will be there inside the inbox that you have selected on this website.

4. www.receivesmsonline.com/


receivesmsonline
receivesmsonline

Here you will find 10 different number from the US to receive SMS online for absolutely free. You can undoubtedly use this site to verify your account. It also gives a number of Poland, Norway and Canada too. So you can make full use of this website.

5. www.hs3x.com


hs3x
hs3x

In this, website you will find out more than 10 dummy numbers that you can verify through SMS verification. You just need to click the number page and refresh in order to view arrived messages. Numbers are updated monthly.

6. Onverify.com


onverify
onverify

Onverify.com helps your online business to automatically call your customer, validate a transaction or action. Through HTTP API or SOAP API s. You can use its Phone/SMS delivery option to receive text messages.

7. Sellaite.com


sellaite
sellaite

On the page, you can find the mobile phone numbers to receive SMS-messages online for free and without registration, which will be instantly displayed on this page. To view SMS messages received by phone, select the phone number and click on it.

8. Sms Receive Free


SMS Receive free
SMS Receive free

This provides a virtual phone number that allows you to verify and register for various websites, absolutely free. The phone numbers are disposable and all messages are discarded after 24 hours. Provided virtual phone numbers are refreshed with new ones every month.
Now wheresoever you require to verify your phone number just visit any of above eight websites, select any of the numbers, fill it in the place of your number in the verifying network, come back to the site and check out your verification code and fill it there and you are done.
So this is all about How to Bypass SMS Verification Online on Websites for Free. With the help of above-mentioned sites, you can efficiently verify any number and can access the services of any network that need phone number verification first. Also, will be extremely secure as you don’t have used your personal number. Hope you like this trick to Bypass SMS Verification, don’t forget to share it with other and leave a comment below if you have any related queries.

Xtreme Download Manager – Get 5X Faster Download Speed – Windows, MAC and Linux

You might have used IDM for the Windows operating systems to increase your downloading speed. This Internet Download Manager divides downloads into multiple streams for faster downloading. But the main problem for using this IDM is that it works only on Windows and cannot be installed in other operating systems like Linux, Mac etc. Moreover, this IDM is not free. So, here is the better solution for us i.e Xtreme Download Manager.

Xtreme Download Manager is an advanced and powerful download manager that allows you to control your downloads in a much better way. XDM is written in Java programming language and as a result, it can be compatible with all the major operating systems  like Windows, Linux, and Mac OS X. This Download manager is available for free and it is user-friendly. XDM can be integrated easily with browsers like Chrome, Firefox,opera etc.
xdm1
The main advantage of this XDM download manager is that it downloads the files at the maximum possible speed i.e. downloading content at up to 500%  faster speed. Xtreme Download Manager helps you to grab stuff from YouTube, DailyMotion, Metacafe and other websites. It supports HTTP, HTTPS, firewalls, cookies, FTP protocols etc. Let us see how to install it and how it works.

Installing and Using Xtreme Download Manager In Linux:

Installing Xtreme Download Manager in Linux is as simple as running few commands. You have the option of downloading a regular DEB file package and compiling it from source or making use of a PPA repository.
Here we’ll be skipping that hassle and using a third-party repo from Noobslab. I’ve installed Xtreme Download Manager in my installation of Ubuntu 16.04 Xenial Xerus.
xdm2
All you have to do is run these commands in a terminal window and press enter after each of them:
After installing Xtreme Download Manager and opening the application, you’ll be prompted to go ahead and perform the browser integration. I chose Firefox option and was able to do the integration in no time.
xdm3

Installing Xtreme Download Manager For Windows and Mac OS X:

Windows and Mac OS X users can download the installer packages from this Download page link. OS X users need to install Java before installing it. You can also be retracted to the download link by clicking on the below picture.
xdm4
Xtreme Download Manager is full of many features and you need to explore them all to get used to its functions. This simple and easy to use download manager is surely worth a try. Did you find Xtreme Download Manager interesting? Share your views in the comments below.

Friday, June 10, 2016

How to secured Twitter accounts after user credentials were hacking and sold online

Rumors of a Twitter breach started circulating yesterday afternoon, fittingly, on Twitter. Security researchers cautioned users to change their passwords and enable two-factor authentication, a feature that requires a user to verify their identity at login with a pincode sent to a trusted device.

But the rumors were wrong — at least partially. Although millions of Twitter handles and passwords were popping up for sale on the dark web, Twitter hadn’t suffered a breach.LeakedSource, a site that posted the data, speculated that the login credentials were harvested using malware, a plausible theory supported by Twitter’s own security team.
“The purported Twitter @names and passwords may have been amassed from combining information from other recent breaches, malware on victim machines that are stealing passwords for all sites, or a combination of both,” Twitter trust and information security officer Michael Coates wrote in a blog post about the incident.
Twitter moved relatively quickly to secure its users’ accounts — the social media platform forced all users whose information was leaked to reset their passwords today.
Twitter is the latest in a string of social media companies to have millions of its users’ passwords dumped online — 360 million Myspace credentials and 100 million LinkedIn credentials went up for sale in May.
In an interview with Wired, one of the hackers selling users’ login information said that he or she had initially offered the data privately to spammers and others targeting specific individuals’ accounts before putting it up for public sale. The individual told Wired that the LinkedIn data alone sold for roughly $20,000.
Coates says Twitter has been examining the stolen data from other sites and cross-checking it with Twitter’s own records to determine which accounts may be vulnerable and securing them with extra protection, including forced password resets.
“Attackers mine the exposed username, email and password data, leverage automation, and then attempt to automatically test this login data and passwords against all top websites.If a person used the same username and password on multiple sites then attackers could, in some situations, automatically take over their account,” Coates wrote.
Twitter secures potentially vulnerable accounts by monitoring location, device used and login history for unusual behavior, Coates said. 
Coates also noted that some of the passwords supposedly linked to Twitter accounts are not valid. Some hackers “bundle old breached data or repackage accounts from a variety of breaches, and then claim they have login information and passwords for website Z,” he explained.
Twitter recommends two-factor authentication, a strong and unique password, and a password manager to keep your account secure.

32M Twitter accounts may have been hacked and leaked

There is yet another hack for users of popular social media sites to worry about. Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web. Twitter says that its systems have not been breached.

“We are confident that these usernames and credentials were not obtained by a Twitter data breach – our systems have not been breached. In fact, we’ve been working to help keep accounts protected by checking our data against what’s been shared from recent other password leaks,” a Twitter spokesperson said.
LeakedSource, a site with a search engine of leaked login credentials, said in a blog post that it received a copy of the user information from “Tessa88@exploit.im,” the same alias used by the person who gave it hacked data from Russian social network VK last week.
Other major security compromises which have hit the news recently include a Myspace hack that involved over 360 million accounts, possibly making it the largest one ever, and the leak of 100 million LinkedIn passwords stolen in 2012.
LeakedSource says the cache of Twitter data contains 32,888,300 records, including email addresses, usernames, and passwords. LeakedSource has added the information to its search engine, which is paid but lets people remove leaked information for free.
Based on information in the data (including the fact that many of the passwords are displayed in plaintext), LeakedSource believes that the user credentials were collected by malware infecting browsers like Firefox or Chrome rather than stolen directly from Twitter. Many of the affected users appear to be in Russia—six of the top 10 email domains represented in the database are Russian, including mail.ru and yandex.ru.
Even though Mark Zuckerberg got several of his non-Facebook social media accounts hacked this week, including Twitter, his information wasn’t included in this data set, LeakedSource claims. Zuckerberg was ridiculed for appearing to reuse “dadada” as his password on multiple sites, but results from LeakedSource’s data analysis shows that many people are much less creative. The most popular password, showing up 120,417 times, was “123456,” while “password” appears 17,471 times. An analysis of the VK data also turned up similar results.
In a statement to TechCrunch, Twitter suggested that the recent hijacking of accounts belonging to Zuckerberg and other celebrities was due to the re-use of passwords leaked in the LinkedIn and Myspace breaches.
“A number of other online services have seen millions of passwords stolen in the past several weeks. We recommend people use a unique, strong password for Twitter,” a Twitter spokesperson said. Twitter suggests that users follow the suggestions in its help center to keep their accounts secure. Twitter also posted on its @Support account that it is auditing its data against recent database dumps.

To help keep people safe and accounts protected, we've been checking our data against what's been shared from recent password leaks.

LeakedSource said that it determined the validity of the leaked data by asking 15 users to verify their passwords. All 15 confirmed that the passwords listed for their accounts were correct. However, experts cautioned that the data may not be legitimate.
Michael Coates, Twitter’s trust and information security officer, tweeted that he is confident the social media platform’s systems have not been compromised.

We have investigated reports of Twitter usernames/passwords on the dark web, and we're confident that our systems have not been breached.

“We securely store all passwords w/ bcrypt,” Coates added, referencing a password hashing function considered secure. “We are working with LeakedSource to obtain this info & take additional steps to protect users,” he continued.
Troy Hunt, the creator of a site that catalogs breaches called haveibeenpwned.com, also expressed skepticism about the authenticity of the data. Hunt told TechCrunch that he’d heard rumors of breaches at Twitter and Facebook for several weeks but had yet to see convincing proof. “They may well be old leaks if they’re consistent with the other big ones we’ve seen and simply haven’t seen the light of day yet. Incidentally, the account takeovers we’ve seen to date are almost certainly as a result of credential reuse across other data breaches,” Hunt said.
Whether or not the leaked Twitter credentials are authentic, it never hurts to change your password — especially if you use the same password across several sites. Turning on two-factor authentication also helps keep your account secure, even if your password is leaked.

Monday, June 6, 2016

How to Trace Call, Location Of Every Single Mobile Phone

This tool uses SS7 Flaw to let you spy on mobile phone calls, messages and user location

The latest news only confirms the theory that Israeli firms are creating a position in the spying and surveillance industry with their ground-breaking and wide-ranging products. The latest news only confirms the theory that Israel is going places as far as digital surveillance is concerned.
Established in 1993, an Israeli firm Ability has developed really amazing software, which has been named Ability Unlimited Interception System to provide unlimited surveillance chances to law enforcement in the US so that criminal activity could be kept at bay, it has been reported. Currently, this system can recognize calls, texts and location of almost any mobile phone around the world and is available for US$20 million. It is also being guessed that it is quite an accomplishment by the Israeli firm to get it for this price and the amazing skills of the system.
Launched in November 2015, the system’s asking price is the maximum rate while it may cost less if the number of targets and customers that are needed to be snooped upon is less.
Forbes reports that: “All a ULIN customer requires is the target’s phone number or the IMSI (International Mobile Subscriber Identity), the unique identifier for an individual mobile device. Got those? Then boom – you can spy on a target’s location, calls and texts.”
This new system outdoes all other currently available espionage technologies, as the people behind Ability’s formation are specialists in the off-air interception of satellite and cellular communications.
Also, this new system is very effective as it can seize all types of mobile phone traffic including GSM, LTE and MTS without needing the approval of the mobile service provider or being in close proximity of the device.
However, how does this system carry out such extraordinary accomplishments?
It actually abuses an error present in the Signalling System No. 7 or SS7, which is the international telecom standard that demonstrates how information is swapped across digital networks from public switched telephone networks (PSTN) for cell phones. The “Signalling Points” of SS7 and the nodes that use out-of-band signalling to help services like call forwarding.
A yet unknown third party is accountable for licensing this vulnerability for Ability and providing access or information about the SS7 fault. Therefore, by simply tapping into the targeted phone, it is easily possible to intercept any mobile phone for law enforcement.
However, this latest installment in inspiring fool-proof spying campaigns for carrying out criminal investigations has again kindled dispute on the breach of user privacy through the use of such software.