Saturday 31 December 2011

CEH v7 Instructor Slides


     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


Read more...

Thursday 29 December 2011

Angry Birds for PC Full for Free


        The most popular and addictive mobile game Angry birds is now available for PC. To play this game your PC should have following hardware.
  • Operating System: Windows � XP / Vista / Windows � 7 
  • Processor: 2GHz 
  • Memory: 512 MB 
  • Video: 3D-graphics card compatible with DirectX, 128 MB 
  • Sound Card: Sound device compatible with DirectX � 9.0c
  • Free space on hard disk: 45.2 MB

Read more...

Learning PHP, MYSQL and Javascript



     This book will help you to:

  • Understand PHP essentials and the basics of object-oriented programming
  • Master MySQL, from database structure to complex queries
  • Create web pages with PHP and MySQL by integrating forms and other HTML features
  • Learn about JavaScript, from functions and event handling to accessing the Document Object Model
  • Use libraries and packages, including the Smarty web template system, PEAR program repository, and the Yahoo! User Interface Library 
  • Make Ajax calls and turn your website into a highly dynamic environment
  • Upload and manipulate files and images, validate user input, and secure your applications

      NOTE : Password for the rar file is tricks4u


Read more...

Wednesday 28 December 2011

HTML in 10 Steps or Less


If you are building your own Web pages and need HTML solutions fast, then this book is for you-whether you're new to Web site authoring or you need a quick refresher on how to create a table. Open the book and you'll discover clear, easy-to-follow instructions for more than 250 key HTML Web tasks, each presented in ten quick steps-or less. Easy-to-navigate pages, lots of screen shots, and to-the-point directions guide you through every common (and not so common) HTML challenge-and help you get more done in less time.
  • Each solution is ten steps-or less-to help you get the job done fast
  • Self-contained two-page spreads deliver the answers you need-without flipping pages 
  • A no-fluff approach focuses on helping you achieve results
  • A resource packed with useful and fun ways to get the most out of HTML

   NOTE : Password for the rar file is tricks4u



Read more...

Monday 26 December 2011

Social Engineering - The art of human Hacking


                 The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick�one of the most famous social engineers in the world�popularized the term �social engineering.� He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.


  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

      NOTE : Password for the rar file is tricks4u



Read more...

Thursday 22 December 2011

USB Pen Drive Virus


Virus is a program which infects computer, in different way. I am explaining about a Virus Which can easily be made in C or C++. When we have run .exe file of this Pendrive-usb virus then when we connect pendrive with our computer usb,it will not be connected. Operating System would not be able to detect pendrive.
Read more �
Read more...

Teach yourself Linux in 24 hours


              Sams Teach Yourself Linux in 24 Hours is a tutorial aimed at making the Linux beginner more effective and productive users of the operating system. Most books in this category are more of a general reference in nature and are designed to cover Linux in general. Well, every Linux distribution is different - file locations can change, commands can be a little different, etc. This means the readers of those books may not find answers specific to their installation. This book will use the effective Sams Teach Yourself format to instruct the reader how to: install the operating system, configure their hardware, and effectively use the tools that come with the Red Hat distribution included on the CD-ROM.

  • Learn how to install Red Hat Linux by walking through an easy to follow hardware configuration
  • Understand how to use Linux commands, configure your network and servers and manage users of your system
  • Discover the power of X(TM) Windows

   NOTE : Password for the rar file is tricks4u


Read more...

How To Block Websites Without Software..

Block websites without software

Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

Read more �
Read more...

Trick to increase the windows experience index

Here Is How You Can Change the WEI Score


Read more �
Read more...

Tuesday 20 December 2011

Getting good with Javascript

Rockable javascript

        This book will introduce you to important programming concepts, It will show you how to write your first scripts, and make you comfortable with JavaScript codes. You will learn following topics in this book.


  • The basics of types, variables, and operators
  • Best practices for efficient coding
  • Testing and optimizing your JavaScript
  • Interacting with HTML elements
  NOTE : Pawword for the rar file is tricks4u


Read more...

Sunday 18 December 2011

NEW DOS TOOL TO KILL SSL SERVER



A newly released denial-of-service (DOS) tool can be used to bring down SSL servers using an average laptop computer and a standard DSL connection.
The hacking outfit decided to release the tool, called THC-SSL-DOS, now because it has already been leaked online a couple of months ago. "We are hoping that the fishy security in SSL does not go unnoticed. The industry should step in to fix the problem so that citizens are safe and secure again," a THC member said.


It's worth pointing out that even without SSL renegotiation enabled, attackers can still use THC-SSL-DOS successfully against servers. However, such attacks would require more than a single laptop.

"It still works if SSL renegotiation is not supported but requires some modifications and more bots before an effect can be seen," the group noted. "Taking on larger server farms who make use of SSL load balancers required 20 average size laptops and about 120kbit/sec of traffic," it added.

Download THC-SSL-DOS

How it works :

Unzip the downloaded file to any drive.
Change the prompt to the drive in which you have unzipped the tool.
Change directory to thc-ssl-dos.
Now run the exe file. Pass the command thc-ssl-dos to execute it. The figure below demonstrates the above steps.

Now in order to perform attack using this tool , you will have to pass the following command;

thc-ssl-dos TARGET IP --accept
On passing the following command the tool will start its process.
The below figure demonstrates this process.


You can also download the source code and analyse it to have a deeper understanding of the tool.

If you have any queries and suggestions then add your comments below.


Read more...

Backtrack Hacking Video Tutorials

Backtrack Hacking Video Tutorials
This are amazing video tutorials of backtack which include very good collection of hacking videos using backtrack such as sql injection, phone phreaking, wireless hacking, website hacking, network hacking and more. Below is the complete list of videos included in DVD. 

Videos Included In The DVD

  • Episode 1 � Network Hacking � Arp Poisoning
  • Episode 2 � Wireless Hacking � Cracking WEP
  • Episode 3 � Wireless Hacking � DeAuth
  • Episode 5 � Lock Picking � Bump Key
  • Episode 6 � Phone Phreaking � Beige Box
  • Episode 7 � Phone Phreaking/Network Hacking � Sniffing VOIP
  • Episode 8 � Lock Picking � DIY Padlock Shims
  • Episode 9 � Lock Picking � Mult-Disc Combo Locks
  • Episode 10 � Hacking Basics � MD5
  • Episode 11 � Website Hacking � Sql Injection
  • Episode 12 � Hacking Basics � Backtrack
  • Episode 13 � Website Hacking � XSS
  • Episode 14 � Staying Secure � SSH Tunnel
  • Episode 15 � Modding � Xbox Softmod
  • Episode 16 � Wireless Hacking � Cracking WPA
  • Episode 17 � Triple Boot � Windows, Backtrack, & Ubuntu
  • Episode 18 � Local Password Cracking
  • Episode 19 � Lock Picking Basics
  • Episode 20 � Ettercap
  • Episode 21 � XSS Tunnel
  • Episode 22 � Playstation 2 Softmod
  • Episode 23 � Cracking WEP Update
  • Episode 24 � Bypass Hotspot�s Access Controls

  • Underground � Install Backtrack 3 on USB
  • Underground � CSRF(Cross Site Request Forgery)
  • Underground � Alternate Data Streams
  • Underground � Local File Inclusion
  • Underground � Windows Privilege Escalation
  • Underground � Bluetooth Hacking
  • Underground � VMWare
  • Underground � Fix Google Mail Enumerator
  • Underground � Home Made Lock Picks
  • Underground � Downfalls of Anti-Virus Software Part 2
  • Underground � Downfalls of Anti-Virus Software
  • Underground � Evilgrade
  • Underground � Trojan Basics
  • Underground � Manipulating Windows User ***s
  • Underground � Combine Files
  • Underground � Password Phishing
  • Underground � Windows SMB Relay Exploit
  • Underground � Application Patching
  • Underground � Metasploit Autopwn
  • Underground � Email Spoofing
  • Underground � Introduction
  • Extracting Database Information from Information_Schema
  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot � Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client


Read more...

Friday 16 December 2011

Introduction to Linux - A Begineers Guide

       
               Many people still believe that learning Linux is difficult, or that only experts can understand how a Linux system works. Though there is a lot of free documentation available, the documentation is widely scattered on the Web, and often confusing, since it is usually oriented toward experienced UNIX or Linux users. Today, thanks to the advancements in development, Linux has grown in popularity both at home and at work.
The goal of this guide is to show people of all ages that Linux can be simple and fun, and used for all kinds of purposes. This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples and encouraged to try out things on your own.

NOTE : Password for the rar file is tricks4u



Read more...

Thursday 15 December 2011

Transform Windows 7 into iOS(Apple Mac OS)



Hi Friends, How r u all? Today I am posting about how to transform window 7 into iOS 5.
Please follow below steps:

1) Download the Software :
Note: There are two software 1 is for 32-bit and other is for 64-bit so download your require software mostly every computer OS is 32-bit.

1: 32-bit version Download
2: 64-bit version Download


2) Double Click on exe file and install it.






















































3) Enjoy you are done.............................
The following screenshots display some major UI elements of iOS Skin Pack.

































:: Advertise Here::


:: If you want to Advertise here then Email us : bangash.hacker@gmail.com ::


 If you have any problem then mention it in comment.
The Bangash Hacker
 
Read more...

Ankit Fadias Ebook Collection

            This are a full collection of ankit fadias ebooks which includes almost all his ebooks if u like it then download it from below link. Some of Ebooks included are DOS attack,hacking into linux, Defacing websites  etc. Below is the screen shots of the all books included in download. For such more ebooks and tutorials subscribe below.







      Note: Password for the rar file is tricks4u



Read more...

Wednesday 14 December 2011

How to become Worlds No 1 Hacker

hacking ebooks

      This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

  • Attack Basics
  • Password Basics
  • Account Basics
  • Denial of Service Basics (DOS)
  • Logging Basics
  • Spyware
  • Port Scanning
  • Unix remote attack
  • SQL injection
  • Spoofing and Hijacking
  • Social Engineering
  • How to become hacker in 15 minutes
  • Making money as Hacker
      NOTE: Password for the rar file is tricks4u



Read more...

Monday 12 December 2011

World trade center attack trick on notepad


            As some of you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or anything else but whatever it is, it does startle us. you will be definately amazed by the this trick.

  • First open Notepad.
  • Type �Q33N� (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.

   Enjoy and subscribe below !!!

Read more...

Sunday 11 December 2011

Advance Matrix Effect Using Notepad

Advance Matrix Effects
I had previously posted about Matrix effect using Notepad . But this is more advance and it looks more realistic then the previous one. So open up your notepad and get started.

How To Create Matrix File ?

  1. Open Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t  
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

  2. Save the file as matrix.bat  (.bat is must)
  3. Done enjoy !!

    More Cool Tricks

    Read more...

    Friday 9 December 2011

    Java Programming Ebook for Free

    • This book is for kids from 11 to 80 year old .
    • This book is for parents who want their child into computer programming .
    • This book is for college students who are looking for a suppliment to over complicated textbooks.
    • This book is easy for begineers of any age.
       NOTE : Password for the rar file is tricks4u 



    Read more...

    Make personal diary using notepad



                  Do you know that you can use your Notepad as a simple digital diary or a personal Log-Book to keep record of your daily work instead of using boring pen and book ? Well, if you dont know then follow the below mentioned steps to make one for yourself !


    • First open up the Notepad.
    • Then Type in .LOG (in capital letters) and press enter.
    • Save it with any name and close it.
    • Open the file again.

                  When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

    Read more...

    Thursday 8 December 2011

    Watch Star Wars movie in CMD

           
                        This is very intersting and amazing command prompt trick which will play star wars movie in the command prompt or cmd. Below are complete steps with screen shots for this trick with. Without wasting time lets gets started.


           1. Go to start > Run and type in cmd and press enter
           2. Now type in telnet as shown below and press enter.


           3. After that enter o as shown below and press enter.


           4. Next enter towel.blinkenlights.nl as shown below and press enter.


           5. Now star wars movie will start playing on your command prompt.


           6. Enjoy !! and dont miss to subscribe below .

    Read more...

    Wednesday 7 December 2011

    Free mobile recharges

    Hey friends, All of you might be using ultoo for free mobile recharges. Here is another website for the same.
    Join amulyam to get free mobile recharge. Its true. I am using this and recharge my mobile twice a month
    Read more �
    Read more...

    How To Open Number Of Sites With A Single Click ?

     Open Number Of Sites With A Single Click
    Today i will show you how to make a batch file which will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.

    How To Do ?

      1. Open Notepad and copy below codes
      @echo off
      start www.coolhackingtrick.com/
      start www.google.com
      start www.facebook.com
        2. Save this file as batch.bat
        3. Now open your save file and it will open three websites with just one click.
        4. You can also add more sites by writing Start followed by websites URL.

      More Tricks


      Read more...

      Tuesday 6 December 2011

      How to reset BIOS password using cmd

      In the previous article, I have told how to reset BIOS password using hardware methods. Now I am going to tell you how to reset BIOS Password using Command Prompt.
      Yes!!! We can do it by using MS DOS Command. Let us see:

      This method works only if you have access to the system when its turned on because this method requires MS DOS. Open MS DOS from programs
      Read more �
      Read more...

      Google 3D sketch


      Hello designers! If you are already tired of creating 3D models using the challenging Photoshop software, why not try an easy-to-use software for a change? Here i have found an amazing software that you can use to create, design your own architecture models, modify and share 3D models in Google Earth. See Google SketchUp, it is an spontaneously intuitive, fun and freesoftware for anyone to use.

      Read more �
      Read more...

      Install XP/Any Operating System within 10 minutes


      Hi friends, Today I am going to tell you how to install XP or any other operating system within 10 minutes.

      Not only operating systems, but this process speeds up installation of any other software also. You may use this trick to speed up installation of .NET framework, Photoshop or any other software that takes much more time. We all know that after loading the file or copying the file from the boot disk to temporary space the system requires a first time reboot.
      Read more �
      Read more...

      Open window in GOD mode


      On first instance this looks like a joke but it is true and NOT A JOKE. God mode makes you true Windows God allowing you to access all Windows settings without having to click or hop between different dialog windows. You can open God Mode in upcoming Windows8 and existing Windows 7, Vista 32 bit and Windows Server 2008 (32 bit) operating systems.

      How to Enable & Open God Mode on Windows
      Read more �
      Read more...

      Hacking For Begineers Free Ebook

      Hacking For Begineers
      Hacking for begineers, as the name says is completely for begineers you can begin your hacking journey with this book or Hackers underground handbook both are amazing books for noobs. The book is well written and you will enjoy reading it. More Ebooks and tutorials are own its way so subscribe below and dont miss them. Below are some topics covered in this book.

      • Concept of Ethical hacking
      • Email Hacking
      • Windows Hacking
      • Linux Hacking
      • Wireless Hacking
      • Mobile Hacking
      • Trojans
         Note : Password for the rar file is tricks4u


      Read more...

      Sunday 4 December 2011

      Uninstall WindowsProgrammes With A Right Click

      Uninstall Windows programmes with a right click
      As you know when ever we want to uninstall any windows program we need to go to control panel and manually uninstall them. But here is a trick which let you uninstall any windows program from their desktop shortcuts. MenuUninstaller is a free peace of software that adds an "Uninstall" option to the Windows context menu so you can remove programs from their shortcuts.

      How To Uninstall WindowsProgrammes With A Right Click ?

        1. Download  Menu Uninstaller  and install it on your pc.
        2. After installing an uninstall option will be added to your windows context menu.
        3. Right click on any shortcut and you will See Uninstall option as below.
      Uninstall WindowsProgrammes With A Right Click
        4. Click on it to uninstall any programme.
        5. Check out some other cool trick and tips given below.

      Awesome Computer Tricks For You

      Read more...

      List of some good proxy sites

      proxy sites

                   Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.

      List Of Top Proxy Sites


      http://aniscartujo.com/webproxy
      http://www.badboysproxy.com
      http://www.surfscreened.com
      http://www.hagiomusic.info
      http://www.greenpips.info
      http://urlbrowse.com
      http://www.hideipaddress.net
      http://www.sneakfilter.com
      http://www.browsestealth.com
      http://www.sneak1.info
      http://proxiesrus.com
      http://www.surfindark.com
      http://www.navydog.com
      http://falsario.com
      http://www.proxypit.com
      http://www.proxypan.com
      http://myspacewebproxy.org/
      http://www.allfreehere.info
      http://www.takefreely.info
      http://autobypass.com
      http://www.proxcity.info
      http://www.proxyzip.org
      http://www.cheekyproxy.com
      http://www.eggproxy.com
      http://www.theschoolcloak.com
      http://www.hidemefast.com
      http://browseanywhere.info
      http://www.404surf.com
      http://www.cloakip.net
      http://www.browsedark.com
      http://www.dartprox.com
      http://www.proxish.com
      http://www.surfsneak.com
      http://www.surfsneaky.com
      http://www.browsehidden.com
      http://www.filterhide.com
      http://www.browsesneak.com
      http://myspaceproxyy.com
      http://www.browsesneaky.com
      http://www.proxyz.us
      http://www.sneakschool.com
      http://www.iphide.com
      http://www.proogle.info
      http://greatproxy.info
      http://www.playnsurf.info
      http://www.realproxy.info
      http://aplusproxy.com
      http://www.ecoproxy.com
      http://freedom.webtuo.com
      http://www.slyuser.com/
      http://tenpass.com
      http://pawxy.com
      http://pawxy.org
      http://logu.in
      Read more...

      Saturday 3 December 2011

      Simple Trick To Find Facebook Profile ID

      facebook trick
      In my previous post i have posted about Facebook status update trick in which we use profile id, but what if  person got username. So this is the trick which will let you get profile id of any person who got custom username. Check below image and see how URL of  facebook profile looks before and after custom username.

      How To Get Facebook Profile Id ?

      facebook trick

      In case of Profile ID before custom username you can easily identify it by looking at Profile URL, But in case of profile with custom username its not same. Below are simple steps to find Profile ID having custom username.
      • Go to the profile you want to find Profile ID
      • That URL will look like this www.facebook.com/username
      • Change that URL to graph.facebook.com/username
      • Then you will get something like below image.
      facebook trick        

      More Awesome Facebook Hacks

      Read more...

      Friday 2 December 2011

      What Is Keylogger And How To Be Safe From Keyloggers?

      keyloggers
      In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

       1. What is keylogger ?

      You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

      2. How it can harm you ?

      In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
      • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

      3. Types of  keyloggers 

      There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                                    HARDWARE KEYLOGGER                                  
      hardware keyloggers 

       SOFTWARE KEYLOGGER
       software keyloggers
                                    

       4. How to Protect yourself from keyloggers ?

      Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
      • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
      • You can even use above method to protect your facebook profile, yahoo or gmail id.
      • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

      You May Also Like To Read

      Read more...