Here we go, Twitter finally introduced the most anticipated security feature “Two-Step authentication” that prevents hackers getting access to your twitter accounts. The recent cyberattacks from Syrian Electronic army(SEA) forced the twitter to enable the 2-step verification feature. The SEA … Continue reading
Bypassing Android encryption by freezing android phones
German Security Researchers have discovered that freezing an Android phone allows hackers to access the Encrypted data stored in the phone. The encryption method introduced in the Android version “Ice cream sandwich” by Google. The researchers bypassed this encryption system … Continue reading
Get ready for Facebook Graph Search
Facebook has a new tool that lets you search for people based on their Facebook activity. It’s called Graph Search, and it’s gradually becoming available to every Facebook user on the planet. Once you have access—there’s a waiting list—you’ll be able … Continue reading
Samsung Galaxy S4 keeps calm, carries on with big screen, 8-core chip and, yes, eye tracking
If you’re looking for Samsung’s new Galaxy S4 to define a novel new era of smartphone greatness, it’s time to temper your expectations. The brand-new flagship smartphone, which runs the latest Android 4.2.2 Jelly Bean, improves hardware significantly and … Continue reading
How to Bypass CPAlead Surveys On Websites
Hello again everybody. Today i will teach you how to bypass the stupid annoying surveys that pops up wasting your time and get in to your nerves . So here is a brilliant method to block that thing First go … Continue reading
12 Search Expert Tricks to search the Web more effectively
Hey guys…Its been some time since i posted something.So here is something usefull for you.This will help you google search anything you want more effectively and better search results.Hope this helps Explicit Phrase:Lets say you are looking for content about … Continue reading
Tutorial : How to make a Hidden Tor Website or Service | Completely Anonymous
Tor is a A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet. You can make your own website or server inside TOR and it will be hidden inside the TOR … Continue reading
Easily Share Large Files Directly PC To PC Using Web Browser Without Uploading Anywhere
Easily Share Large Files Directly PC To PC Using Web Browser Without Uploading Anywhere FilesOverMiles is a tool for direct file sharing, fast and secure way to send files over the Internet. No setup or sign up and the file … Continue reading
Tutorial : Reveal Email Address of any Facebook User
So In this tutorial I will teach you how you can get the email address of a person who has set his privacy so that you cannot view his email address. There is no way to view a hidden Email … Continue reading
How to Send Fake Emails to Anyone
Hey guys.It’s been a long time since i posted something new.So i thought i would share with you guys something very interesting.That would be how to send anonymous mail to anyone! With this method,you can mail to anyone anything from anyones email id !Its a very simple and interesting method.So here is it.
First go here http://www.webwizny.com/sendemail.php
Then give the fake email id that would be displayed at the receiver email id of your victim.
Give the receivers email id.
Give the topic and write the body.
Click send!
Its that easy and you did something that others would think as uber-difficult.
Hope you liked it!