page contents

Saturday, December 28, 2013

How To View Facebook Private Profile Photo In Large Size?

How To View Facebook Private Profile Photo In Large Size?

Sometime you want to see a clear image of someone on Facebook who might not be your friend but his/her privacy setting stop you from doing this. In this tutorial I will teach you to view Facebook private  or locked profile picture in large size with very simple trickstrick.


How To View Facebook Locked Profile Picture ?

1. Open the Facebook profile of the person whose profile picture is locked or is set to private.
2. Right click on the profile picture and click on Copy Image Url as shown in the image below.


 Facebook Private Profile Photo

3. Open that image in new tab by  right clicking and selecting Paste (CTRL + V)
4. Now change the value of image size highlighted below which might be s160x160 to s720x720 (If its not clear try (s320x320)


 Facebook Private Profile Photo

5. The image will enlarge in size. This trick does not always work.

The Best Hackbook Review - Beginner's Guide to Hacking with Tools


https://freehdphotogallery.blogspot.com





The Hack Book is an awesome eBook for beginners who wants to dive into the field of hacking. It contains guides to hacking tools and scripts along with underground hacking websites with awesome stuff. I would recommend this book if you are newbie in the field of hacking. You must check out the Free Sample of this eBook by Clicking Here. Check out the complete article to know more about this book.



Topics Covered In The Hack Book

  • Learn various Hacking Techniques.
  • Learn To Secure Your Computer From Various Hacking Attacks
  • Learn How to Tap Computers. (12+ Tools Included!)
  • How to use Malware's (30+ Tools Included!) and also Protect yourself against it.
  • Learn To Be Anonymous On The Internet
  • Few ways of Hacking Facebook, Yahoo and Email Accounts. (Scripts Included!)
  • Make Destructive Viruses. (2 Programs Included)
  • Network Hacking
  • Website Hacking.
  • Access to the latest Hacking Tools and Underground Communities.

Features

Non Technical Writing - First off, the writing. The writing isn't technical at start for the readers convenience. But the usage of technical words is important later on in the eBook is something you will find. The upside is that, he explained EVERY single technical keyword at some point of time in the eBook.
Hacking Tools – The best part about the eBook is that the author gives you a handful of POWERFUL hacking tools to kick start your hacking adventures. And unlike the other websites on the web, we are given tools such as these : Learn How to Hack | Hacking eBook 
Coding -  Though coding isn’t required for implementing the whole of this eBook.Also,he doesn't teach you the whole of coding in the book (which is near impossible for any writer). He stressed well on the importance of learning coding after reading this book to become a successful and professional Hacker. The more coding you learn, the better you get at it.
Very Descriptive – The book has many pictures. As you can see for yourself in the sample book, you will see that he has given a thorough explanation with pictures for EXTREMELY easy understanding.

I would say this is a MUST READ for any budding hacker.

The Most Top 6 Black Hat Hackers In The World

The Most Top 6 Black Hat Hackers In The World


Every One know there are two types of hackers. First one are good hacker also knows as "White Hat Hackers" and another one which know as "Black hat Hackers". In this article we are going to discuss about top most 6 Black Hat Hackers in the world and their hacks which make them famous all over the world.






George Hotz

Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and  as a result he hacked the Sony’s company iPhones. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack the device with assistant things?  The secret is to figure out how “to speak to the device”. He also mentioned that what he did was completely legal. It seems people can be dangerous in certain way when they are bored. Who knows what may happen if crazy smart geek will find the way of his ideas.





Kevin Mitnick

Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he started hacking. For several years he hacked dozens of companies. What's interesting, for those “services” he was finally arrested in 1995 at his apartment for hacking. Kevin also has served 5 years in prison, nevertheless despite of his experience he runs his own security firm named Mitnick Security Consulting. The other side of the coin is, however Mitnick published a book that calls “Ghost in Wires”, which is about his ups-and-downs, victories and crushes. He shared that every hack was like a climbing to mountain and he reached the Everest. This is one more proof how talent has pined, because of a boredom.

 

 

Adrina Lamo

Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status. He was famous for breaking into several high-profile computer networks. Lamo might use his gift to help people to consult, what is actually he did, but as exception and compromise. His baby steps in hacking, Adrian Lamo made pretty early and became known for the first time for operating the AOL watchdog site. As many others, he was arrested in 2003 and had to correspond for each and every computer crime. Thus, even if Lamo now works as a threat analyst and public speaker, his glory will always follow him, because our past if the part of our “present”  and a part of who we are.

 

 

 Gary McKinnon

This “black hat” McKinnon  hacked into 97 United States military and NASA computers. He could be the biggest threat  for government. Glasgow-born McKinnon wanted the truth to come out and show itself. In March 2002 Gary was arrested by police. “Black hat” used his hacking skills to “research” his beliefs and evidence of UFOs  inexhaustible source of power, into the US government’s computers. He didn’t do that because of boredom, but because of obsession and thirst to hidden knowledge. Probably this computer crime is serious, but forgivable. Man wasn’t going to hack computer system because he was bored or to prove something, we were 

looking for the truth no more than.

 

 

 Jonathan James

 Story of Jonathan James  is sad, nevertheless his life can be compared to comet – short, but bright. In 1999 teenager at the age of 15 years old hacked into Bellsouth and Miami-Dade school network. Jonathan James damaged NASA Systems, it costed $41,000 to fix the systems.  It goes without saying that he made serious damage. To stole software from NASA that worth $1.7 Million is one the biggest computer crimes. He wasn’t after information or justice, he was after money… As they say, never speak ill of the dead. Jonathan James was sentenced 6 months house arrest and banned from using computer, however that didn’t prevent him to commit suicide.

 

 

Kevin Poulsen

This talented “cyber-terrorists” could have a great career and almost blow his chance.  It seems that this hacker likes contracts  and his life reflects it pretty well. He hacked into the US Department of Defense's ARPANET. However later  he worked as a consultant testing Pentagon computer security. Late on Kevin hacked  FBI, after that hacked phone lines to radio station  of Los Angeles… Poulsen’s life reminded American switchbacks… Certainly he was wanted by FRI  and finally they caught him. Despite of such interesting past, Kevin is a law-abiding citizen and has several awards  of International Academy of Digital Arts and Sciences.

Tuesday, December 10, 2013

SEO-Trips & Tricks

Sometimes the simplest SEO tweaks create a big difference in how you're perceived by the search engines. A finely tuned site can boost traffic and even create conversion easier as visitors locate it easier to locate what they're looking for. While many webmasters think of SEO as a long-term strategy, here are 5 things that will make an immediate impact.

1. Review Your Robots.txt File

If you have a robots.txt file upon your site, check it out. You might be amazed by what you locate. Many sites are unknowingly withholding pages, folders, and images that would make for good search engine spider food. Also, run a site scanning tool like "Screaming Frog" to look if you're excluding any pages. Both of these provide a quick repair and have both short and long-term benefits for you.

2. Assess Canonicalization of your Domain

Search engines hate duplicate content. Most sites unwittingly harm themselves by giving the search engines two copies of their landing pages. It only takes a moment to repair this. If your site exists as www.yoursite.com and yoursite.com, then you need to establish a canonical domain name. SEs don't like seeing two versions of your content. To repair this, create a easy 301 redirect that redirects all non-www pages to their "www" equivalent.

3. Check For Duplicate Title Elements

You can do a quick check for duplicate title elements in Google's Webmaster Tools. This will say you whether you have duplicate pages, keyword cannibalization, or bad title element structure. Checking this property feature will speedily show you where the issues are and give you a clue as to how to fix them.

4. Review Your Google and Bing Listing

The web is becoming more localized. Google and Bing are both favoring local listings over national ones. Because of this, you need to ensure that you're seen at the local level. It's surprising how many websites and companies don't have a local listing. Even if you do sell nationally, it pays to have your business listed in the local listings. It makes you look more legitimate and you might even acquire visitors (and sales) that originate from your own town or city.

5. Review Links in your Footer and Sitewide

Update any outdated links (or remove them). By reviewing links in your main footer, breadcrumb, and any other navigation element, you will also speedily figure out whether you have duplicate content issues with default pages like "index.html." These pages need to be 301 redirected to the perfect page. Then, the links themselves can be updated to point to the absolute page. Cleaning up your internal link structure will pay off faster than you might think. As search engines find it easier to crawl your site, you'll find more of your pages being indexed  - and that leads to more traffic for your website.

Enable Custom Robots Header Tags For Blogger

Blogger has recently introduced search preferences tab in Blogger and continually introducing new features in it to help fellow bloggers do better SEO of their blogs. This will help bloggers to increase your blogs traffic and get better google search results rankings.

One of the new features introduced by blogger's developers is Custom Robots Header Tags.This tool plays great role in our blog's Search Engine Optimization. Using it properly helps us to gain more visitors from search engines and hence our blog page views will also increase.
Also the search engine will not accept the duplicate content form your site so you can avoid your site duplicate content with the custom robots header tags settings.


What are Custom Robots Header Tags ?


These are all the header tags used in blogger and their usage/meaning is defined below.
 
all:  There are no restrictions for indexing or serving. This is default for all pages noindex:  Do not show this page in search results and do not show a "Cached" link in search results. nofollow:  Do not follow the links on this page none:  Equivalent to noindex, nofollow noarchive:  Do not show a "Cached" link in search results. nosnippet:  Do not show a snippet in the search results for this page noodp:  Do not use metadata from the Open Directory project (DMOZ) for titles or snippets shown for this page. notranslate:  Do not offer translation of this page in other languages in search results. noimageindex:  Do not index images on this page. unavailable_after: [RFC-850 date/time]: Do not show this page in search results after the specified date/time. The date/time must be specified in the RFC 850 format. Example: 17 May 2012 15:00:00 PST 


How to Enable Custom robots header tags in Blogger SEO


Follow these steps to enable Custom robots header tags in Blogger Blogs to increase your blog traffic and page views. 
Step 1.  Log in to your blogger account Dashboard and click on your blog. Step 2.  Go to Settings >> Search Preferences.
Step 3.  Click on edit link in front of Custom Robots Header Tags and then click on Yes option.
Step 4. Once you click on the Yes you will see many options. Simply tick on the options as shown in the below image.














Step 5.  Now click on "Save changes" button and You are done!

Download Windows 8 Transformation Pack v7.0


Windows 8 Transformation Pack 7.0. It will transform your Windows 7/Vista/XP user interface to Windows 8, including Windows 8 Boot Screen, Login Screen, Themes, Icons, Wallpapers, Sounds, Fonts, Metro/Modern UI, Aero’s Auto-Colorization, Taskbar UserTile and more.



What’s new in 8TP v7.0

  • Added WinMetro as alternative Metro Start Screen
  • Changed default Immersive UI to Metro Start Screen (WinMetro)
  • Improved sounds scheme files handling method
  • Updated Font installation code based on recent patch
  • Updated Glass UI theme configuration based on hacked Aero Glass in Windows 8
  • Updated Windows 8 Media sound scheme files and resources


Thank you for reading, if you have any question please feel free to ask.

Monday, October 7, 2013

Rate/Price of 3G Packages (Grameenphone, Banglalink and Robi 3G) 2013

We are really excited about 3G internet, now finally Grameenphone, Banglalink and Robi Publish their 3G Packs Rate.

Choose your best packages and enjoy of 3G………..

Grameenphone 3G Packs

Speed
Data Limit
Rate/Price
Validity
512 Kbps
500 MB
50 TK
5 Day
512 Kbps
1 GB
400 TK
15 Day
512 Kbps
1 GB
450 TK
30 Day
512 Kbps
2 GB
650 TK
30 Day
512 Kbps
4 GB
900 TK
30 Day
512 Kbps
5 GB
950 TK
30 Day
800 kbps
1 GB
450 TK
15 Day
800 kbps
1 GB
500 TK
30 Day
800 kbps
5 GB
1000 TK
30 Day
1 Mbps
1 GB
600 TK
15 Day
1 Mbps
2 GB
850 TK
30 Day
1 Mbps
3 GB
1000 TK
30 Day
1 Mbps
4 GB
1200 TK
30 Day
1 Mbps
5 GB
1300 TK
30 Day
1 Mbps
6 GB
1400 TK
30 Day

15% VAT and Auto Renewal applicable for the above packs


Banglalink 3G Packs

Speed
Data Limit
Rate/Price
Validity
1 Mbps
50 MB
50 TK
15 Day
1 Mbps
150 MB
150 TK
15 Day
1 Mbps
1.24 GB
500 TK
30 Day
1 Mbps
2.48 GB
850 TK
30 Day
1 Mbps
3.74 GB
1000 TK
30 Day
1 Mbps
4.96 GB
1150 TK
30 Day
1 Mbps
5.12 GB
1300 TK
30 Day
1 Mbps
10.24 GB
2000 TK
30 Day


Robi 3G Packs

Speed
Data Limit
Rate/Price
Validity
512 Kbps
200 MB
100 TK
7 Day
1 Mbps
1 GB
300 TK
15 Day
1 Mbps
1.5 GB
350 TK
30 Day
2 Mbps
2 GB
800 TK
30 Day
4 Mbps
5.5 GB
1100 TK
30 Day