Wednesday, September 2, 2015

Download youtube video without any software

Hi friends, This is an awesome trick for those who love to download youtube videos at all the places, even at their workplace. There, they don't have to download and install any additional software for downloading the youtube video.
Follow these steps:


  1. Open desired video in youtube.
    For example: https://www.youtube.com/watch?v=KNhp5EnR86Q
  2. Insert 'ss' before youtube in the given link. So above link will become https://www.ssyoutube.com/watch?v=KNhp5EnR86Q or ssyoutube.com/watch?v=KNhp5EnR86Q
  3. After editing the URL, hit Enter. You will be navigated to a page where you will find links to download the video.
    Refer below screenshot:

In case of any problem, please let me know through comments.

Wednesday, August 26, 2015

How to see hidden friends' list in facebook

Hi friends, you must have seen that facebook gives you different option to control your privacy settings, on your statuses, posts and even on friend list. If a friend has made their friend-list hidden (visibility set to "Only Me") then you can't check their friends, as I've done. But now, a new Free Chrome extension "Facebook Friends Mapper" can reveal all friends of such users.

How to use Facebook Friends Mapper Chrome extension?

1. Install Facebook Friends Mapper extension from Chrome web store.
2. Open Facebook Profile of user you want to target.
3. You will find 'Reveal Friends' option on Friends tab.
4. Click on Reveal Friends and Bang!




Note: There must be at least one mutual friend of the user of which you want to reveal friend list, no matter victim is in your friend list or not.

Monday, August 24, 2015

Send WhatsApp message without using any number

Hi friends, In previous post I've told you about how to hack your friend's whatsapp to read their conversation. In this post, I'll tell you how can you use WhatsApp without using your mobile number, i.e. WhatsApp without using any number. Friends, you might be knowing that Facebook has launched web version of the WhatsApp currently for the chrome browser
which is becoming very popular day by day.

For messaging anyone without using any number, do the following steps:
Steps:
  • Uninstall WhatsApp from your Android phone.
  • Download and install WhatsApp again.
  • Block all messaging services on your phone. Keeping your phone to flight mode will automatically block all messaging services.
  • Now open WhatsApp and Enter your number. In such case WhatsApp will accept numbers, but will not be able to send any verification message.
  • WhatsApp verification is not yet done, so users will not be able to use it.
  • Now WhatsApp wil ask you for alternate method of verification. Click on 'Verify through SMS' option and provide your email address.
    Press Send button and within 2 second, press Cancel button. This will stop the authorization process.
  • Now another app Spoof Text Message will be needed to spoof the message.
  • This app will ask for some details. Use below details :
    • To: +447900347295
    • From: + (country code) ( mobile number)
    • Message: Your e-mail address


Now, your message will be sent from a spoof number and you can chat with your Friends with this spoofed number.

Saturday, August 22, 2015

Most useful and frequently used LINUX/UNIX commands with examples

Pages

Tuesday, January 13, 2015

Most useful and frequently used LINUX/UNIX commands with examples

Hi Geeks, This article will provide the most useful ad frequently used LINUX / UNIX commands along-with the example.

If I miss any command then don't forget to write them in comment.



  1. grep command: Searches for given string in files
    1. grep -i "search_text" file_name
    2. grep -ilrn "search_text" * (To search in all files)
      Attributes: i for ignore case, l for list names of files, r for searching recursively, n for line number where text is matched in the file
  2. find command: Finds files using file-name
    1. find -iname "MyTextFile.c"
    2. find -iname "MyTextFile.c" -exec md5sum {} \; :Executes commands on files found by the find command
    3. find ~ -empty :Finds all empty files in home directory
  3. pwd command: pwd is Present working directory. It prints the current directory.
  4. cd command: It is used to change the directory.
    1. Use “cd -” to toggle between the last two directories
    2. Use “shopt -s cdspell” to automatically correct mistype directory names on cd
  5. diff command: compares two files
    1. diff -w file1.txt file2.txt
  6. tar command examples:
    1. tar cvf archive_name.tar dirname/ :Creates a new tar archive
    2. tar xvf archive_name.tar : Extracts from existing tar archive
    3. tar tvf archive_name.tar : view an existing tar archive
  7. gzip command examples
    1. gzip file.txt : creates a *.gz compressed file
    2. gzip -d file.txt.gz : Uncompress a *.gz file
    3. gzip -l *.gz : Displays the compression ratio of the compressed file
  8. bzip2 command examples
    1. bzip2 file.txt : creates a *.bz2 compressed file
    2. bzip2 -d file.txt.bz2 : uncompresses a *.bz2 file
  9. unzip command examples
    1. unzip test.zip : Extracts the zipped file
    2. unzip -l test.zip : views the content of zipped file without unzipping
  10. ssh commands: It is used to work remotely
    1. ssh -l kamal remotehost.com : Login to remote gost
      ssh -l kamal 10.201.42.12
    2. ssh -v -l kamal remotehost.com : Debug ssh client
    3. ssh -V : Display ssh client version
  11. ftp command examples
    1. ftp IP/hostname : connects to a remote server
    2. ftp> mget *.html : Download file from that server
    3. ftp> mls *.html - : views the file names located on the remote server
  12. wget command :
    1. wget http://prdownloads.sourceforge.net/sourceforge/nagios/nagios-3.2.1.tar.gz : to download any file from internet
    2. wget -O taglist.zip http://www.vim.org/scripts/download_script.php?src_id=7701 : Download and store it
  13. vim command examples
    1. vim +14 file.txt : Go to the 14th line of file
    2. vim +/search_text file.txt : goto the first match of the specified search text
    3. vim -R /etc/passwd : Opent he file in the read only mode
  14. sort command examples
    1. sort nameList.txt : Sorts a file in ascending order
    2. sort -r nameList.txt : Sorts a file in descending order
    3. sort -t: -k 3n /etc/passwd | more : Sorts passwd file by third field
  15. xargs command examples
    1. ls *.jpg | xargs -n1 -i cp {} /external-drive/directory : Copy all images to external drive
    2. find / -name *.jpg -type f -print | xargs tar -cvzf allImages.tar.gz : Search all jpg images in the system and archive it.
    3. cat url-list.txt | xargs wget –c : Downloads all the URLs mentioned in the url-list.txt file
  16. ls command examples
    1. ls -lh : Displays filesize in KB / MB
    2. ls -ltr : Orders Files Based on Last Modified Time
    3. ls -F : Visual Classification of Files
  17. sed command examples
    1. sed 's/.$//' filename :Converts the DOS file format to Unix file format (removes \r or \n)
    2. sed -n '1!G;h;$p' file.txt : Prints file content in reverse order
    3. sed '/./=' file.txt | sed 'N; s/\n/ /' : Adds line number for all non-empty-lines in the file
  18. awk command examples
    1. awk '!($0 in array) { array[$0]; print }' temp : Removes duplicate lines
    2. awk -F ':' '$3==$4' passwd.txt ; Prints all lines from /etc/passwd that has the same uid and gid
    3. awk '{print $2,$5;}' file.txt : Prints only specific field from a file.
  19. shutdown command examples
    1. shutdown -h now : Shutdown the system and turn the power off immediately.
    2. shutdown -h +10 : Shutdown the system after 10 minutes.
    3. shutdown -r now : Reboot the system
    4. shutdown -Fr now : Force the filesystem check during reboot.
  20. crontab command examples
    1. crontab -u kamal -l : View crontab entry for a specific user
  21. service command examples : Service commands are used to run the system V init scripts. i.e Instead of calling the scripts located in the /etc/init.d/ directory with their full path, we can use the service command.
    1. service ssh status : checks the service status
    2. service --status-all : Check the status of all the services.
    3. service ssh restart : Restart a service
  22. ps command : It is used to display information about the processes running in the system.
    1. ps -ef | more : view the current running processes
    2. ps -efH | more : To view current running processes in a tree structure. H means process hierarchy.
  23. free command: It is used to display the free, used, swap memory available in the system.
    1. free
    2. free -g : If you want to quickly check how many GB of RAM your system has use the -g option. -b option displays in bytes, -k in kilo bytes, -m in mega bytes.
    3. free -t : use this if you want to see a total memory ( including the swap)
  24. top command: It displays the top processes in the system, by default sorted by cpu usage. To sort top output by any column, press O (upper-case O) , which will display all the possible columns that you can sort by.
    1. top
    2. top -u oracle : To display only the processes that belong to a particular user use -u option. This command will show only the top processes that belongs to oracle user.
  25. df command:
    1. df -k : displays the file system disk space usage. By default df -k displays output in bytes.
    2. df -h : displays output in human readable form. i.e size will be displayed in GB’s.
    3. df -T : display type of file system.
  26. kill command: It is used to terminate a process. First get the process id using ps -ef command, then use kill -9 to kill the running LINUX process. You can also use killall, pkill, xkill to terminate a unix process.
    1. ps -ef | grep vim
      kill -9 7243
  27. rm command : Removes a file
    1. rm -i filename.txt : Get confirmation before removing the file.
    2. rm -i file* : Print the filename and get confirmation before removing the file.
    3. rm -r example : It recursively removes all files and directories under the example directory. This also removes the example directory itself.
  28. cp command : Used for copying files from source to destination
    1. cp -p file1 file2 : Copy file1 to file2 preserving the mode, ownership and timestamp.
    2. cp -i file1 file2 : Copy file1 to file2. if file2 exists prompt for confirmation before overwritting it.
  29. mv command: used to rename a file / folder
    1. mv -i file1 file2 : Rename file1 to file2. if file2 exists prompt for confirmation before overwritting it.
    2. mv -f file1 file2 : Rename file1 to file2. if file2 exists overwrite it without prompting for confirmation
    3. mv -v file1 file2 : It will print what is happening during file rename, verbose output
  30. cat command : used to view the file
    1. cat file1
    2. cat file1 file2 : view multiple files at the same time. It prints the content of file1 followed by file2 to stdout.
    3. cat -n /etc/test.txt : It will prepend the line number to each line of the output while displaying the file.
  31. mount command
    1. To mount a file system, we should first create a directory and mount it:
      1. mkdir /newDir
      2. mount /dev/sdb1 /newDir
    2. We can also add this to the fstab for automatic mounting. i.e Anytime system is restarted, the filesystem will be mounted.
      1. /dev/sdb1 /newDir ext2 defaults 0 2
  32. chmod command: chmod command is used to change the permissions for a file or directory.
    1. chmod ug+rwx file.txt ; Give full access (read, write and execute) to user and group on a specific file.
    2. chmod g-rwx file.txt : Revoke all access (read, write and execute) for the group on a specific file.
    3. chmod -R ug+rwx file.txt : Apply the file permissions to all the files in the sub-directories.
  33. chown command: change the owner and group of a file
    1. chown oracle:dba dbora.sh : To change owner to oracle and group to db on a file. i.e Change both owner and group at the same time.
    2. chown -R oracle:dba /home/oracle : change the owner recursively
  34. passwd command : used to change the password through command line
    1. passwd : User can change their password using this command. It will ask for current password.
    2. passwd USERNAME : Super user can use passwd command to reset others password. This will not prompt for current password of the user.
    3. passwd -d USERNAME : Remove password for a specific user. Root user can disable password for a specific user. Once the password is disabled, the user can login without entering the password.
  35. uname command: It displays important information about the system such as — Kernel name, Host name, Kernel release number, Processor type, etc.
    1. uname -a
  36. su command
    1. su - USERNAME : Switch to a different user account using su command. Super user can switch to any other user without entering their password.
    2. su - raj -c 'ls' : Execute a single command from a different account name. In the following example, john can execute the ls command as raj username. Once the command is executed, it will come back to john’s account.
    3. su -s 'SHELLNAME' USERNAME : Login to a specified user account, and execute the specified shell instead of the default shell.
  37. mkdir command: to create directories
    1. mkdir ~/myDir : creates a directory called myDir under home directory.
    2. mkdir -p dir1/dir2/dir3/dir4/ : It creates nested directories using. If any of these directories exist already, it will not display any error. If any of these directories doesn’t exist, it will create them.
  38. ifconfig command: used to view or configure a network interface on the Linux system, same as ipconfig in windows.
    1. ifconfig -a : View all the interfaces along with status.
    2. Start or stop a specific interface using up and down command as below.
      1. ifconfig eth0 up
      2. ifconfig eth0 down
  39. ping command :
    1. ping google.com : Ping a remote host.
    2. ping -c 5 google.com : Ping a remote host by sending only 5 packets.
  40. whereis command
    1. whereis ls : When wewant to find out where a specific Unix command exists (for example, where does ls command exists?), we can execute this command.
    2. whereis -u -B /tmp -f lsmk : When you want to search an executable from a path other than the whereis default path, you can use -B option and give path as argument to it. This searches for the executable lsmk in the /tmp directory, and displays it, if it is available.
  41. whatis command : It displays a single line description about a command.
    1. whatis ls
    2. whatis ifconfig
  42. man command : Displays the man page (manual page) of a specific command
    1. man crontab
  43. locate command: Using locate command we can quickly search for the location of a specific file (or group of files). Locate command uses the database created by updatedb.
    1. locate crontab
  44. tail command
    1. tail file.txt : Print the last 10 lines of a file by default.
    2. tail -n N file.txt : Print N number of lines from the file named file.txt
    3. tail -f log-file : View the content of the file in real time using tail -f. This is useful to view the log files, that keeps growing. The command can be terminated using CTRL-C
  45. less command: less is very efficient while viewing huge log files, as it doesn't need to load the full file while opening. After opening file through less, following command is very useful:
    1. CTRL+F – forward one window
    2. CTRL+B – backward one window
  46. fg command : This command resumes execution of a suspended process
  47. date command :
    1. date -s "01/13/2015 13:55:14" : Set the system date
    2. Once you’ve changed the system date, you should syncronize the hardware clock with the system date as shown below.
      1. hwclock –systohc
      2. hwclock --systohc –utc
  48. mysql command
    1. mysql -u root -p -h 192.160.10.2 : To connect to a remote mysql database. This will prompt for a password.
    2. mysql -u root -p : To connect to a local mysql database. If you want to specify the mysql root password in the command line itself, enter it immediately after -p (without any space).
  49. yum command
    1. yum install httpd : To install apache using yum.
    2. yum update httpd : To upgrade apache using yum.
    3. yum remove httpd : To uninstall/remove apache using yum.
  50. rpm command
    1. rpm -ivh httpd-2.2.3-22.0.1.el5.i386.rpm : To install apache using rpm.
    2. rpm -uvh httpd-2.2.3-22.0.1.el5.i386.rpm : To upgrade apache using rpm.
    3. rpm -ev httpd : To uninstall/remove apache using rpm.

Airtel 2015 Trick to Get 500 MB Free 3G Data


Hello friends, after a long we are going to post free internet offer. Airtel dongle is always a good choice for customers who love affordable data plans with high speed.


Trick 1


Free 500 MB for Gujarat & Maharashtra users

Just dial *129# and select 3rd option of ‘popular pack’. Choose 4th option of internet pack and select 98Rs (500 mb) plan. Press 1 and set it on auto renewal.
Working only in Gujarat & Maharashtra circles. (try it at low balance below 98 Rs).
You can also use it multiple times for more data benefits.
Hurry up! It may stop working anytime.
Trick 2

Trick to get 2gb 3G data using Moto E

Here is the latest airtel trick to get 2 gb of 3G data. Follow the steps given below:-
1) You will need Moto e first gen android phone and 2 airtel sim cards.
2) If you are not having moto e then use it’s build prop file (for advanced users only).
3) So, I am assuming that you are having a moto e phone. Now insert your first airtel sim card in sim slot 1 and turn on mobile data. Visit this link and click on ‘activate 1gb data for 2 months’ offer. You will get 500 MB of 3G data per month for 2 months.
4) Follow similar process with another sim card and sim slot 2.
5) So, in total you will get 2 gb data for 2 months using this 3g trick.

If You Have Any Questions or Doubts.
Feel Free to Comment.
Admin Must Reply Soon.
Come There Daily for Latest UPDATES.

Friday, August 21, 2015

How to Spy on Text Messages

Spy on Text Messages
Since the popularity of text messages have significantly increased during the recent years, it has also become a popular channel for most people to exchange secret messages and engage in dubious activities. These text messages can start with a simple SMS and grow up to large conversations with modern IM apps like WhatsApp, Viber and FB Messenger. Therefore, in order to find out the truth sometimes it becomes obligatory to spy on text messages. Particularly if you are a parent or an employer, it becomes your right to spy so as to investigate what is happening with your child or employee.

Popular Ways to Spy on Text Messages

The following are some of the commonly used methods to spy on text messages like as SMS, IM chat conversations and Emails.

Using a Spying App: The Easiest Way

Today, even though there exists a large number of mobile apps to spy on text messages, many are simply overpriced and some will never really stand up with the competition at all. However, there are a few spy apps that are really worth stating and mSpy is one among them. When it comes to spying on text messages, mSpy is my favorite one. In addition to SMS, this app is capable of spying on various text messaging apps like WhatsApp, Viber, Snapchat, iMessage, Skype and many more.
Spy on Text Messages
https://store.mspy.com/affiliate.php?ACCOUNT=BITEXGRO&AFFILIATE=50559&PATH=http%3A%2F%2Fwww.mspy.com%2Ftext-message-spy.html&AFFSRC=STM

The following are some of the exciting features of mSpy which makes it a perfect choice for spying on text messages:
  • Spy on call logs, SMS and Contacts
  • Secretly record emails, web history and bookmarks.
  • Spy on Internet activity including social media like Facebook, Twitter and Gmail.
  • Spy on text messaging apps like WhatsApp, iMessage, Viber, Snapchat, Skype, LINE and more.
  • Track GPS locations in real-time.
  • Record keystrokes, photos and videos.
  • Operates in a complete stealth mode and remains undetected!.
For parents and employers, mSpy can offer an additional help as it supports a handful of control features as well:
  • Block access to unwanted apps and calls.
  • Remotely lock the phone or restrict its usage.
  • Remotely delete unwanted contacts, call logs, SMS and photos if desired.
  • Get instant alerts when profane language is typed or viewed.

How it Works?

After you order mSpy you will need to install the app onto the target phone which will only take 2-3 minutes to complete. If you need any assistance, the support team is ready to help you out any time you need.
Once the installation is complete, all of the recorded text messages and data will show on your online dashboard which can be accessed from any web browser across the world.
Compatible Phones: Android, BlackBerry, iPhone, iPad, Windows Mobile and Tablets.

Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't!


facebook hacking
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? Today, we'll take a look at this topic in detail with some example websites and software and get answers to some common related questions.

Back in 2005, I came across a mechanism that reportedly hacked Yahoo mail password for a user using some simple tricks. It didn't work for me for obvious reasons but I didn't stop believing the possibility until I grew up to realize how helpless I am here. One of the major concerns of large organizations like Facebook and Yahoo is security because of the super sensitive information about people they have. Several hundred million dollars are spend yearly by these organizations to ensure security and then there's these websites that claim to undo all that protection in less than a minute.

The Facebook password cracking Websites and Software

Let's start with some examples here. I googled the subject and picked the top results without order. Didn't care to search harder because there are thousands such and I know that all are FAKE.

So let's look at this GETFBHACK.com.
hacking facebook password
Their FREE Facebook hacker program is said to be capable of cracking the password of any Facebook user within a day. Sounds cool, I could try it out, but my Norton Antivirus rejected the file straight away.

I also picked up another one. This Hack-Fbook-Password asks me to enter the profile ID of a user and it will crack the password. I said Okay and began the process.
facebook hacking
It ran certain algorithms to determine the password and finally landed me on a page that said I could DOWNLOAD the password IF I fill an online survey first. Those of you who've been redirected to surveys would know they don't work and are put just so to get traffic and earn money.

I said maybe I should leave the website now but hey, they gave me a prize!
hacking facebook

So I just became the luckiest person in my city just like that!

Now tell me, how can a sane person believe in all this?

The truth!

Let me get this straight to you, these websites do nothing at all just waste your time and are never able to do the job. In fact, downloaded programs just make the situation worse when you run them. I had my Norton Antivirus to guard me otherwise I could be in severe danger currently.

These software are mostly keyloggers and tracking programs that record your keystrokes and action and steal personal information from your computer in the background and send it to their master servers. So ultimately a hacker wannabe gets hacked, how ironic!

From now on in the post, I'll be using the word 'Hacker' for these websites and software since you're no more in the position to be called that.
Hacking Tips & Tricks Update Soon. STAY TUNED.