Design your theme

I AM NOT RESPONSIBLE IF ANYTHING GOES WRONG WITH YOUR SYSTEM.
Yes we can make some powerful virus on our own and can create a disaster in our enemies system. i have created 60 different virus applications which stop the functionality of windows applications and make your system useless. There is nothing to code or nothing to program all we have to do is to download a application called as acid virus maker and with this we can create powerful windows virus and BAT files which can really harm the system for sure.
There are different types of windows virus in this software and some are useful and some are dangerous. These virus are simple to create and easy to apply in ones system. once clicked it will start its functionality and do the work assigned to it. There is a List of virus where we can create on our own.
We can also Enable or Disable the some windows applications and can create virus files which will be deleted when run. The list of windows batch which we can create in this software are:
A) Open/Disable Options.
B) Delete Files When Run.
In this Open/Disable Options coloum we can create :
1) Open CMD
2) Open Notepad
3) Shutdown PC
5) Disable MSCONFIG
6) Disable REGEDIT
7) Disable system restore
8) Disable Task Manager
9) Disable Screen saver
10) Disable Firewall
11) Disable paint
12) Disable magnify
13) Disable Notepad
14) Disable Calculator
15) Open Malicious sites
16) Make Spam folders
17) Kill Internet Connection
18) Disable CMD
19) Disable Live Messenger
20) Disable Yahoo Messenger
21) Disable Mouse
22) Disable Keyboard
23) Disable Nod32


24) Disable Avast
25) Disable Norton
26) Disable Malware bytes
27) Disable Kaspersky
28) Disable Firefox
29) Disable Internet Explorer
30) Disable Safe Mode
31) Disable Disk Fragmentation
32) Spam Victims PC
33) Disable Uninstall
34) Add on Startup


And Also some Delete files when Run or Opened the virus.
35) Delete all .DOC Files
36) Delete all .MP3 Files
37) Delete all .WMV Files
38) Delete all .VBS Files
39) Delete all .PPS Files
40) Delete all .WAV Files
41) Delete all .INI Files
42) Delete all .OCX Files
43) Delete all TXT Files
44) Delete all PNG Files
45) Delete all EXE Files
46) Delete all CFG Files
47) Delete all JPG Files
48) Delete all BAT Files
49) Delete all PDF Files
50) Delete all ICO Files
51) Delete all AVI Files
52) Task Kill System Process
These are the 52 BAT applications which we can create using the application Acid Virus Maker. To create a virus just open the application and check the tick mark on the application which you want to use and give a virus name without any spaces and be careful that you are putting a single file name without any special characters and add a comment if you want and click on Make button which is beside About. A BAT file is create in C: drive just copy that and use where ever you want to use it.
BUT PLEASE DONT USE DELETE ALL…………. BAT VIRUS APPLICATIONS IN YOUR OWN SYSTEMS. THIS IS REALLY HARMFUL TO YOUR COMPUTER.





 I tried to explore as many options as i can, and was pretty happy to find some in my Samsung Corby Txt B3210. No need to worry if your phone is not as similar to my model. Because all the Samsung Corby Phones will have the same software and interface which other phones have. So don’t worry and just try to find the options which i tell them here. Some are really interesting and pretty funny. Some of them may be known to this options, but still i am writing for newbie’s and for the people who don’t know much about there Samsung Corby. So please bare with us.
Here goes the list of Unknown Secret Options in Samsung Corby Phone’s :
I) Security : Almost all Samsung phones will have this option called a Phone Lock. The security of the phone is categorized into different ways. Like
  1. Phone Lock : Which locks your phone at startup. (i.e) When you switch off and on your phone and again switch on. It will ask a security password code which you can set in options.
  2. SIM Lock : This option will lock your phone for inserting other Sim’s in it, no matter what ever Sim you put, you cannot open the phone unless you unlock it with a security code which you have kept earlier.
  3. Pin Lock : This is used to lock the Sim Internally.Your Sim will be locked with a pin and cannot be accessible by other. Note: Be careful with this lock, because it make lock your Sim permanently if you have done something wrong.
  4. Privacy Lock : This feature is really useful. As we can lock all the applications and other areas of the phone accordingly. Usually we can lock Messages, Files, Call log,Phonebook, Calender,Memo, Task and Complete phone.
  5. FDM : FDM is Fixed Dialing mode where you can enter a code and lock you out going calls and messages. So when ever you have applied this FDM lock you cant able to send messages or a call from your phone. You can select few numbers to which we can access the FDM lock. So apart from those numbers, you cannot use another number.
  6. Mobile Tracker 2.0 : With Mobile tracker, you can find out your missing phone easily. Its very easy to set up this function. First go to settings, you can find a column called Mobile Tracker 2.0, under that you can see on and off. Click on and then go for the next tab which is Recipients where you can select 2 numbers to whom the message will be sended automatically when a new Sim is inserted in the phone. And next column you can find a option called Sender, in that you can enter any name there, like your name. Next you can see a Message column where you can type a message which will be sended to the recipients.
  7. II) Display : Some of the display options in Samsung Corby are really interesting.Like we can do a lot of changes in the look and feel of the wallpaper.For example
    1. Home Screen : You can change the wallpaper from current theme to a gallery of random images where all the pictures will be changing just like a screensaver.You can select the images of your choice and each and every time when you go to menu and to home, the picture changes automatically.
    2. Wallpaper Zoom : You can zoom any wallpaper into 300% of the picture and save it exactly with that area and location which you want. For example if a person is a wallpaper and you can able to set only his complete body as a wallpaper, where you want only his head part as wallpaper. then you can zoom into the picture and keep the Standard Ratio view off and set only his head as a wallpaper and use it as a wallpaper.
    3. Text Messages : Some people are cant see the too small text messages font which are in built in the phone, There is a chance of increasing your message text font to 10 times more than the normal phone text font.For that you can simple press the volume up and down button to increase the text and to decrease the text size.
    4. Font : You can change your font from default (Small) to Medium and Large. Also you can change the types of fonts.Usually there will be four types of fonts in Samsung Corby phones.
    III) Calls : In Samsung Corby we have excellent features like blocking, Buddy List, FDM and etc.
    1. Buddy List : Coming to the Buddy List. You can save your 5 favorite friends contacts list in a buddy list.So as soon as you press a buddy list, you can see all of your saved 5 friends list there with a beautiful image. Note the buddy list will be visible only when you add a shortcut key on the desktop.This is the fastest way to call friends whom you often call.
    2. Block List : You can auto reject the phone calls which you think is no longer is a wanted contact. You can just block the contact by entering the number of the Auto reject list. When you enter a number and auto reject it. You will be no longer able to receive messages and calls from them.
    IV) Fake Call : Fake call is really useful to get out a unwanted situation’s like public places and meetings where you just don’t want to stay. All you have to do is to save a shortcut for a Fake call and use if whenever necessary.When ever you request for a fake call, a unknown call will ring the phone where you have to lift the phone and keep the phone engage for hours. You can get out easily from places and also when other people try to call to the phone at that time, either it will be in call waiting or in engage.
    These are some of the unknown options which i found out in my corby txt b3210 . There are still a lot of other features in the mobile, which you can find out directly in the sub menu’s of options menu.




Are you shocked? Well, many irritated hacking pseudo-experts asked me such a question.

Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

This is the picture of a hacker. Fortunately, it's the one created by the media. Considering the definition above, this course should be entitled "Anti Facebook Hacking Course", as it has nothing to do with the media nonsense. Let me explain you why.

What is this Facebook Hacking Course really about?

Facebook Hacking Course basically contains series of videos which will tell you exactly how hackers hack facebook accounts, what methods they use and how you can avoid falling for these kinds of attacks. The course contains Video Modules parts which will tell you about Facebook hacking and security and with each part there is a lab where you can practice what you learned.




The author of this course is Rafay Baloch, an expert into the field of hacking. His Facebook Hacking Course contains:
  • The exact techniques which hackers use to hack facebook accounts.
  • Security tips to protect your facebook account from getting hacked.
  • Protecting your Privacy

And the best part of this course is that he has made it in such a manner that even a 5th grade kid can understand it and learn how to hack facebook account.

With my experience of over 3 years in the field of ethical hacking and security, all I can tell you is that this course contains everything a beginner needs to learn how to hack facebook, and to educate the Internet users to be aware of the common scams and frauds and stay away from them. This course does not demand any prior knowledge about Hacking.
Bonus

By buying this Facebook Hacking Course you will get the following bonus:

1. Secret Anonymizing Techniques

This section will contain 2 bonus videos which will tell you the exact methods used by hackers to hide their identity while doing malicious things online.

2. Direct Email Access and Support
If you get stuck or don't understand any thing presented in the course, there is 24/7 support to help you no longer how much time it takes. However this offer is for limited time only.


Do you have questions, comments, or suggestions? Feel free to post a comment!




Send anonymous email to Hack Facebook, MySpace, Youtube, Hotmail, Yahoo, Gmail Accont Passwords

Have you ever had the need to send completely anonymous emails to someone? Perhaps you were trying tohack someones email password by sending him a phisher link. Acctually Anonymous Mailer software is very useful in Phishing where you have to send anonymous email to victim and make him login to his account using our sent phisher link.

Anonymous Mailer is an Award winning anonymous Email sending software, by which a user can send Emails directly from computer, no matter the From email id exists or not. No need to reveal your original email address to anyone. Send emails from any@any.com.

So, just follow steps below to be able to send anonymous email using this anonymous mailer software.

Anonymous mailer - Send anonymous email to Hack Facebook, MySpace, Hotmail, Yahoo, Gmail Accont Passwords

1. First of all download Anonymous mailer software from here.

2. Run Nemesis Anonymous Mailer.exe file to see something like this:


3. Now, fill in following information:
  • Name: Name of email account you want to appear on email.
  • Email From: Email address (fake) which will appear to victim as if email is being sent from this email address.
  • Email To: Victim email address.
  • Subject: Subject of anonymous email.
  • Message: The body of anonymous email.... include phisher link over here.
4. Also, this anonymous mailer software has unique feature of assigning itself proxy while sending email. So, your real IP address is never revealed to victim. For this, check "Enable Proxy" and enter the proxy server address which you wanna use.

5. Now, hit on "Send" and your email will be send to victim like this:


6. And on opening the email, victim will fall to our email. As sender email id will be the one we have entered in "Email From" field as shown below:


7. Now, our anonymous email sent successfully is ready to hack hotmail, yahoo, gmail, facebook, myspace, etc. passwords via this anonymous email.

Note: The software is available as trial version and you can use it only 3 times per computer.

You will be now able to send anonymous email using this anonymous mailer software. Anonymous mailer software is useful in Phishing used to hack email passwords. 

Do you have questions, comments, or suggestions? Feel free to post a comment!




Total Pageviews

Recent Comments

Recent Posts