Latest Posts
Showing posts with label free. Show all posts
Showing posts with label free. Show all posts

22 July 2014

Wechat Messenger Giving Free 50 Rs Recharge By Sending Message :D

Wechat+Tweakingtricks.jpg

Hey All Guys , many Of You Want Free Recharge :P , So We Are Back With This Post Called Wechat Messenger Giving Free 50 Rs Recharge . As You Know That Many Of Messengers Are Giving This Type Of Offer Also Line IS Giving But Its Take Time To Receive 130 Rs Its Takes 25 Days :P , But Wechat Is Giving In Just 48 Hrs That's Cool , Just You Need To Follow The Simple Steps :)  . Also Check Our Get Free 130 Rs By Downloading Line App . You WIll Receive That 50 Rs Recharge Redeem Links In Just 48 Hours :)




How To Get This Amazing Deal :D 
  • First  Download Wechat :- Click Here
  • Now Register If You Don't Have Account  Or If You Have Just Sign In :D
  • After That Send Any Message To Your Friend You Can Send Him :- messages /Audio / Video/Emoticon Any Of Them .
  • After All Doing This You Will Get Your 50 Rs Recharge Redeem Link In Within 48 Hours :)
Read more ...

02 July 2014

Index of the Bash command line for Linux.

  alias    Create an alias •
  apropos  Search Help manual pages (man -k)
  apt-get  Search for and install software packages (Debian/Ubuntu)
  aptitude Search for and install software packages (Debian/Ubuntu)
  aspell   Spell Checker
  awk      Find and Replace text, database sort/validate/index
b
  basename Strip directory and suffix from filenames
  bash     GNU Bourne-Again SHell 
  bc       Arbitrary precision calculator language 
  bg       Send to background
  break    Exit from a loop •
  builtin  Run a shell builtin
  bzip2    Compress or decompress named file(s)
c
  cal      Display a calendar
  case     Conditionally perform a command
  cat      Concatenate and print (display) the content of files
  cd       Change Directory
  cfdisk   Partition table manipulator for Linux
  chgrp    Change group ownership
  chmod    Change access permissions
  chown    Change file owner and group
  chroot   Run a command with a different root directory
  chkconfig System services (runlevel)
  cksum    Print CRC checksum and byte counts
  clear    Clear terminal screen
  cmp      Compare two files
  comm     Compare two sorted files line by line
  command  Run a command - ignoring shell functions •
  continue Resume the next iteration of a loop •
  cp       Copy one or more files to another location
  cron     Daemon to execute scheduled commands
  crontab  Schedule a command to run at a later time
  csplit   Split a file into context-determined pieces
  cut      Divide a file into several parts
d
  date     Display or change the date & time
  dc       Desk Calculator
  dd       Convert and copy a file, write disk headers, boot records
  ddrescue Data recovery tool
  declare  Declare variables and give them attributes •
  df       Display free disk space
  diff     Display the differences between two files
  diff3    Show differences among three files
  dig      DNS lookup
  dir      Briefly list directory contents
  dircolors Colour setup for `ls'
  dirname  Convert a full pathname to just a path
  dirs     Display list of remembered directories
  dmesg    Print kernel & driver messages 
  du       Estimate file space usage
e
  echo     Display message on screen •
  egrep    Search file(s) for lines that match an extended expression
  eject    Eject removable media
  enable   Enable and disable builtin shell commands •
  env      Environment variables
  ethtool  Ethernet card settings
  eval     Evaluate several commands/arguments
  exec     Execute a command
  exit     Exit the shell
  expect   Automate arbitrary applications accessed over a terminal
  expand   Convert tabs to spaces
  export   Set an environment variable
  expr     Evaluate expressions
f
  false    Do nothing, unsuccessfully
  fdformat Low-level format a floppy disk
  fdisk    Partition table manipulator for Linux
  fg       Send job to foreground 
  fgrep    Search file(s) for lines that match a fixed string
  file     Determine file type
  find     Search for files that meet a desired criteria
  fmt      Reformat paragraph text
  fold     Wrap text to fit a specified width.
  for      Expand words, and execute commands
  format   Format disks or tapes
  free     Display memory usage
  fsck     File system consistency check and repair
  ftp      File Transfer Protocol
  function Define Function Macros
  fuser    Identify/kill the process that is accessing a file
g
  gawk     Find and Replace text within file(s)
  getopts  Parse positional parameters
  grep     Search file(s) for lines that match a given pattern
  groupadd Add a user security group
  groupdel Delete a group
  groupmod Modify a group
  groups   Print group names a user is in
  gzip     Compress or decompress named file(s)
h
  hash     Remember the full pathname of a name argument
  head     Output the first part of file(s)
  help     Display help for a built-in command •
  history  Command History
  hostname Print or set system name
i
  iconv    Convert the character set of a file
  id       Print user and group id's
  if       Conditionally perform a command
  ifconfig Configure a network interface
  ifdown   Stop a network interface 
  ifup     Start a network interface up
  import   Capture an X server screen and save the image to file
  install  Copy files and set attributes
j
  jobs     List active jobs •
  join     Join lines on a common field
k
  kill     Stop a process from running
  killall  Kill processes by name
l
  less     Display output one screen at a time
  let      Perform arithmetic on shell variables •
  link     Create a link to a file 
  ln       Create a symbolic link to a file
  local    Create variables •
  locate   Find files
  logname  Print current login name
  logout   Exit a login shell •
  look     Display lines beginning with a given string
  lpc      Line printer control program
  lpr      Off line print
  lprint   Print a file
  lprintd  Abort a print job
  lprintq  List the print queue
  lprm     Remove jobs from the print queue
  ls       List information about file(s)
  lsof     List open files
m
  make     Recompile a group of programs
  man      Help manual
  mkdir    Create new folder(s)
  mkfifo   Make FIFOs (named pipes)
  mkisofs  Create an hybrid ISO9660/JOLIET/HFS filesystem
  mknod    Make block or character special files
  more     Display output one screen at a time
  mount    Mount a file system
  mtools   Manipulate MS-DOS files
  mtr      Network diagnostics (traceroute/ping)
  mv       Move or rename files or directories
  mmv      Mass Move and rename (files)
n
  netstat  Networking information
  nice     Set the priority of a command or job
  nl       Number lines and write files
  nohup    Run a command immune to hangups
  notify-send  Send desktop notifications
  nslookup Query Internet name servers interactively
o
  open     Open a file in its default application
  op       Operator access 
p
  passwd   Modify a user password
  paste    Merge lines of files
  pathchk  Check file name portability
  ping     Test a network connection
  pkill    Stop processes from running
  popd     Restore the previous value of the current directory
  pr       Prepare files for printing
  printcap Printer capability database
  printenv Print environment variables
  printf   Format and print data •
  ps       Process status
  pushd    Save and then change the current directory
  pv       Monitor the progress of data through a pipe 
  pwd      Print Working Directory
q
  quota    Display disk usage and limits
  quotacheck Scan a file system for disk usage
  quotactl Set disk quotas
r
  ram      ram disk device
  rcp      Copy files between two machines
  read     Read a line from standard input •
  readarray Read from stdin into an array variable •
  readonly Mark variables/functions as readonly
  reboot   Reboot the system
  rename   Rename files
  renice   Alter priority of running processes 
  remsync  Synchronize remote files via email
  return   Exit a shell function
  rev      Reverse lines of a file
  rm       Remove files
  rmdir    Remove folder(s)
  rsync    Remote file copy (Synchronize file trees)
s
  screen   Multiplex terminal, run remote shells via ssh
  scp      Secure copy (remote file copy)
  sdiff    Merge two files interactively
  sed      Stream Editor
  select   Accept keyboard input
  seq      Print numeric sequences
  set      Manipulate shell variables and functions
  sftp     Secure File Transfer Program
  shift    Shift positional parameters
  shopt    Shell Options
  shutdown Shutdown or restart linux
  sleep    Delay for a specified time
  slocate  Find files
  sort     Sort text files
  source   Run commands from a file '.'
  split    Split a file into fixed-size pieces
  ssh      Secure Shell client (remote login program)
  strace   Trace system calls and signals
  su       Substitute user identity
  sudo     Execute a command as another user
  sum      Print a checksum for a file
  suspend  Suspend execution of this shell •
  sync     Synchronize data on disk with memory
t
  tail     Output the last part of file
  tar      Store, list or extract files in an archive
  tee      Redirect output to multiple files
  test     Evaluate a conditional expression
  time     Measure Program running time
  timeout  Run a command with a time limit
  times    User and system times
  touch    Change file timestamps
  top      List processes running on the system
  traceroute Trace Route to Host
  trap     Run a command when a signal is set(bourne)
  tr       Translate, squeeze, and/or delete characters
  true     Do nothing, successfully
  tsort    Topological sort
  tty      Print filename of terminal on stdin
  type     Describe a command •
u
  ulimit   Limit user resources •
  umask    Users file creation mask
  umount   Unmount a device
  unalias  Remove an alias •
  uname    Print system information
  unexpand Convert spaces to tabs
  uniq     Uniquify files
  units    Convert units from one scale to another
  unset    Remove variable or function names
  unshar   Unpack shell archive scripts
  until    Execute commands (until error)
  uptime   Show uptime
  useradd  Create new user account
  userdel  Delete a user account
  usermod  Modify user account
  users    List users currently logged in
  uuencode Encode a binary file 
  uudecode Decode a file created by uuencode
v
  v        Verbosely list directory contents (`ls -l -b')
  vdir     Verbosely list directory contents (`ls -l -b')
  vi       Text Editor
  vmstat   Report virtual memory statistics
w
  wait     Wait for a process to complete •
  watch    Execute/display a program periodically
  wc       Print byte, word, and line counts
  whereis  Search the user's $path, man pages and source files for a program
  which    Search the user's $path for a program file
  while    Execute commands
  who      Print all usernames currently logged in
  whoami   Print the current user id and name (`id -un')
  wget     Retrieve web pages or files via HTTP, HTTPS or FTP
  write    Send a message to another user 
x
  xargs    Execute utility, passing constructed argument list(s)
  xdg-open Open a file or URL in the user's preferred application.
  yes      Print a string until interrupted
  zip      Package and compress (archive) files.
  .        Run a command script in the current shell
  !!       Run the last command again
  ###      Comment / Remark
Read more ...

30 June 2014

infosec interview questions

1) What do you see as the most critical and current threats effecting Internet accessible websites?
2) What online resources do you use to keep abreast of web security issues?
3) Give an example of recent security vulnerability or threat?
4) Difference between a threat, vulnerability and risk?
5) What do you see as challenges to successfully deploying/monitoring web intrusion detection?
6) Definition of XSS and its impact on servers and clients?
7) What are the important steps you would recommend to secure a new web application and web server?
8) What is DOM based XSS?
9) What is Blind SQL injection?
10) Where do you get security news from?
11) If you had to both encrypt and compress data during transmission, which would you do first, and why?
12) Difference between HTTP and HTML?
13) Difference between stored and reflected XSS?
14) Common defenses against XSS?
15) Difference between Stateful and Stateless firewall?
16) What kind of network do you have at home?
17) What port does ping work?
18) Explain CSRF?
19) How to defend against CSRF?
20) Difference between XSS and CSRF?
21) As a corporate Information Security professional, what’s more important to focus on: threats or vulnerabilities?
22) What are Linux’s strengths and weaknesses vs. Windows?
23) What’s the difference between Diffie-Hellman and RSA?
24) What kind of attack is a standard Diffie-Hellman exchange vulnerable to? 
25) What’s the goal of information security within an organization?
26) Are open-source projects more or less secure than proprietary ones?
27) What’s the difference between encoding, encryption, and hashing?
28) What is salting?
29) Who do you look up to within the field of Information Security? Why?
30) What is NMAP? Show some nmap commands.(avoid firewall/ids, noping etc.,)
31) What is Key Escrow?
32) What is nonce?
33) What does RSA stand for?
34) What is DES?
35) What is triple DES?
36) What is the difference between Symmetric and Asymmetric?
37) How does HTTP handle state?
38)  In public-key cryptography you have a public and a private key, and you often perform both encryption and signing functions. Which key is used for which?
39) How exactly does traceroute/tracert work at the protocol level?
40) What is a Buffer Overflow?
41) What is a NOP Sled?
42) Design a secure network
43) How do you securely link two offices together?
44) What is the security threat level today at the Internet Storm Center (ISC)?
45) What is SSL?
46) How do you create SSL certificates, generically speaking?
47) What is DNS Hijacking?
48) What is the latest security breach you’re aware of?
49) Have you hacked any system?
50) Can a Virtual Operating System be compromised?
51) What is UPX?
52) What is meterpreter?
53) What is LDAP?
54) Why is LDAP called Light weight?
55) What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog?
56) What are rainbow tables?
57) What is dsniff?
58) Other than Wireshark, what sniffers have you used?
59) What was the last course you attend? Where? When? Why?
60) What was the last technical book you read?
61) Describe the last security implementation you were involved with.
62) What is a honeypot?
63) Are there limitations of Intrusion Detection Signatures?
64) Describe TCP 3-way Handshake?
65) Difference between pen testing and vulnerability assessment?
66) Difference between vulnerability and mitigation?
67) Give me an example of a vulnerability at each layer of the OSI reference model.
68) Give me a type of mitigation for each of the vulnerabilities you have just provided.
69) OSI(Open System Interconnection) model
70) What is MITM?
71) What is a Syn Flood attack, and how to prevent it?
72) What’s the difference between a router, a bridge, a hub and a switch?
73) Your network has been infected by malware. Please walk me through the process of cleaning up the environment.
74) What’s the difference between a Proxy and a Firewall?
75) Why should I use server certificates on my e-commerce website?

76) What’s port scanning and how does it work?
77) Process of pen testing a system
78) What is NAT and how does it work?
79) What is false positive and false negative?
80) Please detail 802.1x security vs. 802.11 security
81) How would you harden a Windows Server? What about a Linux Server?
82) What are the latest threats you foresee for the near future?
83) What is ISO 27001 and why should a company adopt it?
84) What is the Microsoft Baseline Security Analyzer?
85) Define Security 
86) MAC OS vs. WINDOWS
87) Ping uses TCP or UDP?
88) Explain Authentication and authorization?
89) What is a Brute force attack?
 90) What is meant by client-side scripting?
 91) What is a cookie?
 92) Explain DOS, DDOS
 93) What is directory traversal attack?
 94) What is meant by reconnaissance?
 95) What is forced browsing?
 96) What is meant by session ID?
 97) Define Web application?
 98) What is meant by WAF?
 99) Explain different types of hackers?
100) what are the different types of penetration testing?
101) Explain CIA triad
102) what are Google hacks/dorks?
103) List out OWASP top 10
104) Define Hacking? What is ethical hacking?
105) what are the various penetration testing methodologies?
106) what is social engineering?
107) In the context of Metasploit, explain what is meant by exploit, payload, auxiliary, encoders, NOP, post
108) what are root kits?
109) Explain Steganography
110) Difference between autopwn and armitage
111) what is meant by backdooring?
112) what is INCIDENT RESPONSE?
113) what is chain of custody?
114) what are the different port’s used commonly and list out their port no’s?
115) what is imaging?
116) what is padding?
117) what is pivoting?
118) what is SSH, FTP, TSL?
119) what is HTTP response splitting?
120) what is RFI, LFI?
121) what do you know about encryption?
122) Can CSRF be done for POST and GET methods?
123) what is the encryption of ssl certificate in a website?
124) Difference between public and private key?
125) what is chain of custody?
126) what is meant by incident response?
127) what is hacktivism?
128) what is a firewall? types of firewall?
129) what is ssl, how do you create ssl certificates?
130) what is a spoofed packet
131) what is IDS or IDP? Give example?
132) what would you do if your system is compromised?
133) what is web-caching?
134) what is use of proxy servers?
135) what would you do if your network device is compromised?
136) what is GPG/PGP?
137) what is log host?
138) how do you manage a firewall?
139) if you were not using Apache as the reverse proxy, what Microsoft application/tool could you use to mitigate this attack?
140) Why we use firewall for security when we have facilities like access-list on routers ?
141) what is the difference between an SSL connection and an SSL session?
142) List and briefly define four techniques used to avoid guessable passwords.
143) what is a salt in the context of UNIX password management?
144) what is the difference between rule-based anomaly detection and rule-based penetration identification?
145) what is the difference between statistical anomaly detection and rule-based intrusion detection?
146) Describe SOAP and WSDL
147) what protocols comprise SSL?
148) what are hidden fields in HTTP?
149) what steps are involved in the SSL Record Protocol transmission?
150) what is file enumeration?
151) what tools can you use to validate the strength of SID (session ID)?
152) what is phishing attack?
153) what is cookie gathering?
154) what is a dual signature and what is its purpose?
155) how can you ensure that all input fields are properly validated to prevent code injection attacks?
156) why do we need port scanning?
157) what are format string vulnerabilities?
158) Example of broken authentication and command injection
159) what is sql injection?
160) what are fuzzers?
161) what is runtime inspection?
162) what is ISO 17799
163) what is integer overflow?
164) what type of security testing have you performed? 
165) what is ARP spoofing?
166) During an audit, an interviewee is not disclosing the information being requested. How would you overcome this situation? 
167) Why should I use server certificates on my e-commerce website? 
168) Can a server certificate prevent SQL injection attacks against your system? Please explain.
169) What are the most common application security flaws?
170) What do you understand by layered security approach? 
171) Difference between virus, Trojan, spyware, malware and a worm
172) Can Linux be compromised? How secure is Linux? How would you compromise a LINUX system?
173) What do you do if you are a victim of a DoS attack?
174) What is a log host?
175) what are the security functions of SSL?
176) what is a 0 by 90 bytes error.
177) what is the problem of having a predictable sequence of bits in TCP/IP?
178) what is heap memory?
179) what is a system call?
180) what is 2 factor authentication?
181) what is IIS lockdown tool?
182) what is disaster recovery?
183) what is a null session?
184) what is incident management?
185) what is SAM (Security Account Manager)?
186) what is a SID (Security ID)?
187) what is the difference between TCP and IP?
188) what is the difference between TCP and UDP?
189) Explain IP Address?
190) what is Public IP and Private IP?
191) Define subnet mask, default gateway, loopback address and IPID?
192) what is Hypertext Transfer Protocol (HTTP)? What are request methods?
193) Difference between IPv4 and IPv6
194) what is the difference between stateful and stateless protocol? Explain with example?
195) how would you prevent man-in-the-middle attacks?
196) Example, recommendation and affect of DOM based XSS?

197) what is XSP(Cross site printing)?

198) Describe OSPF routing?

199) what are the consequences of HTTP trace request?

200) what is session hijacking?

201) how would you convince a client to use your security product?

202) how do you secure a Wi-Fi network?

203) what is a protocol, socket and port?

204) what is your area of expertise and why?

205) what is the difference between routing protocols and routed protocols?

206) Difference between session and cookie?
Read more ...

Facebook Auto Mention/Tag Tool

Facebook Auto Mention Tool--

   In Firefox/Chrome-

  • In Your Facebook After Posting You post click Like in image

  •  Then Press cntrl+shift+k (firefox) 

    or cntrl+shift+j (for chrome)

    Paste the code from following link in console (see image)

    Auto Mention tool Link 

    Hit Enter And And Enter You Post ID (see image)

    Find your Post Id like Image

     copy and enter your post id in above box. and click ok

    wait for some minute and refresh the page

    Enjoy





Read more ...

How To Use VPN in Windows Phone 8.1

Use a VPN connection

At a coffee shop and need to get to a site on your company's intranet? Or using an app from your company at home? With virtual private networking (VPN), you can do these things from your Windows Phone—just as if you were in the office. VPN gives you a secure connection to your company's network, so you can send and receive private information using a Wi-Fi or cellular data connection.

To get a VPN profile on your phone

The first step is to get a VPN profile onto your phone. There are two ways to get one:
  • Set up a workplace account to automatically get a VPN profile from your company.
  • Create a VPN profile on your own. (You can learn how later in this topic.) When you do this, you'll need to contact your company's support person to get the VPN connection settings for your organization.

Note

VPN is only available on Windows Phone 8.1. Check to see which software version you have and find out if an update is available.

To connect to a VPN

Once you have a VPN profile on your phone, you're ready to connect.
  1. In the App list, tap Settings Settings icon > VPN.

  2. Tap and hold the VPN profile name, and then tap Edit.
  3. In the User name and Password boxes, type your user name and password.
  4. To connect to the VPN, do one of the following, depending on what type of profile you're using:
    • If the VPN profile has Automatic listed under it, your phone will automatically connect to the VPN when you try to access information on your company's network.
    • If the VPN profile has Manual listed under it, tap the profile to connect to the VPN, and then use the app that accesses data on your company's network or visit a company intranet site.

Note

The icons at the top of your screen will show you when you're connected to the VPN. This icon VPN over Wi-Fi icon appears when you're connected over Wi-Fi, and this one VPN over cellular data icon shows when you're connected over cellular data.

To create a VPN profile

If you don't have a VPN profile on your phone, you'll need to create one on your own. Before you start, contact your company's support person to get the VPN connection settings for your organization.
  1. In the App list, tap Settings Settings icon > VPN.
  2. Set Status to On Toggle On icon, and then tap Add Add icon.
  3. In the Server name or IP address box, type the server name or IP address of your VPN server.
  4. Tap Type and choose the type of VPN connection you want to create.
    If an SSL VPN app is required and you don't have one installed yet, tap the link to download one from the Store.
  5. Tap Connect using, and choose the method you want to use to connect.
  6. In the User name and Password boxes, type your user name and password.
  7. To automatically connect to the VPN when a company app or site requires it, set Connect automatically to On Toggle On icon.
  8. For Send all traffic, do one of the following:
    • To have all data you send and receive go over the VPN, set Send all traffic to On Toggle On icon.
    • To only have data that requires access to your company's network or intranet go over the VPN connection, set Send all traffic to Off Toggle Off icon, tap Domains and IP ranges, and then enter the domain names and IP ranges that are protected. Only data that's sent and received from those domains or IP addresses will go over the VPN connection. Other data that's sent or received won't go over the VPN.
  9. In the Profile name box, type a name for your profile.
  10. Tap Advanced, and then enter any additional settings you need to for your organization's VPN.
    You might need to contact your company's support person to get additional information, such as the Proxy settings and DNS suffix to use for your company's network.
  11. Press the Back Back button icon button on your phone to go back to the Add profile screen, and then tap Save.
Read more ...

Auto Post In All Groups [ Facebook ]

Auto+Post+To+All+Facebook+GroupsHello friends, If you wanna more friends, like and comment for your status update or if you wanna hug traffic for your blog/website then its good news for you. By this simple tutorial, we will show that how you can post to all facebook groups in a single click. There many fb groups on this social site, If you share one by one its take minimum 2 minutes for post in a a group, So if you have for example 15 groups its 30 minutes for this and using this tricks you can do in less than 1 minute.

Follow Simple Steps:
  • Login to your Facebook account
  • Go to your fb home page or Click here
  • Open the Console Box in Google Chrome or Morzila Firefox
  1. Google Chrome user press F12 or Ctrl+Shift+J to open Console Box
  2. Mozilla Firefox uers Press Ctrl+Shift+K to open Console Box.
  • Now Click Here Open The Script or Click Here to Download the Script
  • Press Ctrl+A to select all then Ctrl+C to copy. Finally press Ctrl+V to paste into console box & Hit Enter
  • Write/make your post in the box appears and press the POST button.
  • Your Done, You Have Successfuly Posted Into All Groups. Any Problem/Help/Suggestion Feel Free To Contact Us!
    Hope You Are Enjoying Our Article, Must Give Your Feedback
    Read more ...

    29 June 2014

    Free VPN • 100% Free PPTP and OpenVPN Service

    Vpnbook



    Free Open Vpn And PPTP
    Surf Anonymously
    100% Free Vpn Service

    PPTP VPn :

    • Free PPTP VPN Account (Easy to setup, no need to download any software, works with all Windows, Mobile and PS3 Devices)
      • Server #1: euro195.vpnbook.com
      • Server #2: euro213.vpnbook.com
      • Server #3: uk180.vpnbook.com (UK VPN - optimized for fast web surfing; no p2p downloading)
      • Server #4: us1.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading)
      • Server #5: us2.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading)
      • Username: vpnbook
      • Password: spa5urEp
      • More servers coming...

    OpenVPn :


    Read more ...

    25 June 2014

    Master Card

    5178059117331745
    CVV: 251
    EXP: 03/15 First Name: Mirshak
    Last Name: Eric
    DoB: N/A
    email: N/A
    Phone: 8474365900 Country:Refunded USA
    State: N/A
    Read more ...

    07 May 2014

    Unlimited Calling Trick

    Today we give onther Free calling method for android phone users.And main benifit of this the voice quality is amazing, when you talk you feel that you are talking normaly as you usually do. And caller see your number when recive call not company number.So you can use easily without telling any one that you are using app. Firstly Libon app gives you 60 minutes per month for free calling Per id untill july .when your 60 minutes over create new Id and again enjoy.You can try this method as much as you want. For using this Trick you have to download This app from Below link From your android phone.
    • Download Libon Free Calling App [Android]
    • Download Libon Free Calling App [Iphone]
    Capture 1
    SO read some Official and Features of this app.
    • Join LIBON Now
    • Get 60 Free Minutes Per Month During 3 Months
    • Call More Than 90 Countries: India, Asia, Europe, North and South America, Africa, and many more!
    • Discover the 50 new destinations that you can call with Libon Out! Download the app to see more.
    • Free chat with everyone! Really EVERYONE! Your contacts don’t even have to be Libon members.
    • Send instant messages, pictures, audio messages and so much more to all your contacts!
    • In UK, some Vodafone subscriptions are not compatible with Libon.
    Read more ...

    Unblock Your Airtel Sim Card Via Facebook Night Pack 2014

    Hello Guys, Welcome Back Today we share with you Latest AirTel SIM Unblocking trick. If you are using free net then mostly sim gprs is blocked so you are not able to use free net. If you are New then we are going to tell exactly what is sim blocking and how u unblock it.

    What is SIM Blocking..?
    When you'll not be able to use any free internet trick, not even the most basic trick, i.e., proxy trick then your sim is blocked.

    To confirm try to open free homepage like airtellive.com if it doesn't open and shows an error msg that means your sim is blocked for free internet.

    Ok hope you understand what is sim blocking Now it's a problem and if it is happen we are not able to use free net. So we have also solution for this problem Bcz every questions has answers

    This trick is based on latest Unlimited Facebook offer from Airtel.

    Steps To Follow-
    1. Activate Facebook Night Pack by dialing *129#. You'll be charge just Re. 1 .

    2. During 12 AM to 6 AM do not try to use any trick. Only surf facebook with default airtel internet setting.

    3. Switch off mobile and then open airtellive.com for 3-4 times.

    4. If airtellive page doesn't open then surf fb again for few minutes and on the next day your sim will get unblocked.

    Note: This trick is tested at Rajasthan & Haryana.
    Trick is collected from different source.

    Read more ...

    27 March 2014

    BSNL BBM SOLUTION



    BBM Not Working??? Try This it Works 100% Sure
    Now enjoy BSNL BBM again.
    I have found this solution from somewhere else earlier but was not able to post till now.
    Many of the users were using bsnl bbm trick till now and resulted in the blockage of this trick.
    Here is the new way for using this awesome trick again.


    Read all the steps carefully-

    Step 1- Connect with bsnlnet apn.

    Download This For Full Instructions

    Some Notes--
    1. You can use older versions of mobile partner as it allows quicker shift from one apn to another.
    2. You can try this trick by replacing bsnlnet with other apns like stream apns,mms,etc.
    Read more ...

    Airtel New Working Configurations [No Survey]

    I m posting these configs without making too late.....
    These configurations were made by me about 3 weeks ago and these are working till now.
    Now you can also enjoy free 3G with the help of these configurations.
    I have posted this configurations openly like before. Its a humble request to other bloggers that please don't copy paste articles from here and make your own.

    Now lets head to the trick....



    Requirements--

    1. 3G enabled sim. Can be used in 2G sim.
    2. Use with 0 balance.
    3. Small 3G plan activated.

    Features of this trick--

    1. First on Net...As it is made exclusively by me.
    2. High-Limit.
    3. Working with Hi-Speed browsing and downloading.
    4. Can be used in Androids using OpenVPN.
    5. Based on VPNBOOK Servers.
    6. Working from last 3 weeks.
    7. Can be used with Connectify for more speed.
    8. Made with Premium Proxies.
    9. Working states- Rajasthan, Delhi, Gujarat, UP East, Maharastra, and other state users try for yourself.
    10. No disconnection at all.

    How to use--

    For using in PC/Laptops use NMDVPN or you can get the best vpn service uploaded in the link below-
    For using in Androids use OpenVPN for android. You can get that either from playstore or from the link below-

    Ways for Avoiding Sim Blockage--

    1. Use with small 3G plan.
    2. Don't use social sites like facebook,youtube, etc much. You can use social site but use for little time.
    3. Keep equal intervals of data usage. Don't use much data in one session.
    4. Avoid downloading bigger size file.

    <--Download Links-->

    Thank you for watching this post. Please take a minute or two for liking/commenting our post.
    If you like my work you can also join our facebook page.
    Keep visiting daily for new posts... Soon will be uploading fileice trick and new stuffs.
    Next article from my blog members will be coming.
    Read more ...

    AIDA64 Extreme / Business / Engineer Edition 4.30.2900 With Serial Key With Crack Incl Patch

    AIDA64 Extreme / Business / Engineer Edition 4.30.2900 
    With Serial Key Only
    Read more ...

    Hotspot Shield Elite v3.37 Incl Fix Crack With Adblock

    Hotspot Shield Elite v3.37
    Read more ...

    26 March 2014

    FileIce Trick March-April 2014

    This Trick is Downloaded From - www.t3chking.blogspot.com

    Don't share this trick guyz otherwise this trick will also get blocked as if it was blocked earlier ....


    How To Download From - FileIce:

    1. First of all connect with any indian proxy if u are using vpn.

    2. Clear all your cookies and history.

    3. Open you Fileice link.

    4. Click on regular download.

    5. Then click on --> Get Local Indian Content Online with Mavshack! <---

    6. Now when page open click on - Sing up now! FREE 7 day trial

    7. and then click on - Register with Facebook

    8. Register and you redirect to a page. now Nothing to do .... Your file get downloaded.

    9. Do the same steps for download another files from FileIce.

    Thank you!
    Read more ...

    Idea To Idea Call Rate Reducing Trick 100% Working March-April 2014

    NO BULLSHIT INTRO


    Direct To The Point

     

    Download Instruction File From Here



    Read more ...

    !dea BBM Trick Revealed March 2014

    Hey guyss How are you all today???


    Presenting !dea TCP Trick Only For Few States


    Small ** Rupees Pack Required 


    Speed You know Of TCP


    Download File From Here




    Read more ...

    K-Lite Codec Pack 10.4.0 Mega/Full/Basic/Standard + Update (2014) PC

     
     
     
    INFORMATION:

    Title : K-Lite Codec Pack
    Developer: Sodecguide
    Version: 10.4.0
    Version Update: 10.4.0
    Language: English
    Tablet: Not required


    http://www.codecguide.com/download_other.htm
     
     
    SYSTEM REQUIREMENTS:

    image


    DESCRIPTION:

    K-Lite Codec Pack - in various versions contains all the most popular codecs for playback and video encoding ( except for versions of Basic). QuickTime Alternative and Real Alternative are additional packages in order to play the respective formats and contain the basic components of the official players .
    Update This update applies to all packages of the series, namely for K-Lite Codec Pack 10.1.5 in various versions (Lite, Basic, Standard, Full, Mega Codec Pack).


    ADDITIONAL INFORMATION:

    K-Lite Codec Pack Standard - has everything to play most multimedia files. This package should be enough for the average user .
    K-Lite Codec Pack Full - except codecs, filters and tools that are standard also contains all the necessary things for encoding video and audio. May be useful for advanced users and professionals.
    K-Lite Mega Codec Pack - This version of the package contains all the codecs and programs that are included in the full version , plus QuickTime Alternative and Real Alternative.


    FEATURES OF PACKAGE:

    Latest version of the best codecs.
    All components are chosen so that there were no conflicts between them.
    Installation is very simple , if you wish , you can choose only those codecs and tools that you really need.
    At any time you can completely or partially remove the package, while leaving no trace of his stay, including registry keys.
    Each pack is tested for the presence of possible conflicts between codecs and other programs .
    K-Lite Codec Pack is trying to avoid problems between new and already installed codecs on your computer , and can even solve some of the existing ones.
    Changelog
    Updated MPC-HC to version 1.7.3.147
    Updated LAV Filters to version 0.61.1- 3 -g528effc
    Updated madVR to version 0.87.7
    Updated xy-VSFilter to version 3.0.0.284

    Screens:

    image

    image

    image

    image
    Read more ...
    Designed By Published.. Blogger Templates