Saturday 29 September 2012

Benefits of using BCC while sending Email


Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!


What is BCC?


BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in theTo: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, theBCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:,  the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?


How to Edit Text Style in FaceBook Chat


Hey guyz, this time Learn Hacking has brought some Facebook Hacks for you.

In this post I will teach you how to do the following in FaceBook Chat : make text Bold , Italics Underline.

The code to do all this is given below.

For making the text Bold
  • type your words between * *(two stars ) will automatically turns into bold.
  • Example : You write
    Learn to *hack*
    will turns to
    Learn to hack

For underlined Text

  • type between _ _(two underscores) will automatically turns into underlined text
  • Example:
Hacking Talent _rocks_ .
Turns to
Hacking Talent rocks.

For writing Bold+Underline

  • Whatever you type between *_ _* will automatically turns into Bold+Underline
  • Example:
You *_love_* hacking?
Turns to

You 
love hacking?

If so then make sure you subscribe to Hacking Talent and get regular updates on your email id..:)

Why Should You buy Original Antivirus Software How Antivirus Work


Hey Friends! This time at Hacking Talent, instead of any hack we have brought a Topic of Healthy Discussion for you.


Should you Buy An Original Antivirus or not?


Everyone out here might have a different approach and a different answer to this question.
Well I am just going to give you pros and cons of this topic and then you can decide on your own,whether its worth going for an Original AntiVirus Software or not.
Well in this insecure cyber world Trojans , Keyloggers , Worms and other forms of virus are just like terrorists of real World. They aim to harm anything and everything they can.
Our Systems Firewall And Antivirus act as Soldiers to defend us from these malicious attackers.
All kings of virus whether Trojan , Keylogger or worm are nothing but small softwares whose execution starts whenever we click on them, Knowingly or unknowingly.
These softwares are meant to either harm the computer or to fetch out important information.


So how does AntiVirus work ?

What is a Hardware Keylogger and how Hardware Keylogger works.


Hey Hackers! in this post of Learn Hacking, we are going to tell you about Hardware Keylogger. You all might already know about what is a keylogger.
If you are new to the term keylogger, you may read more about What is a Keylogger and How keylogger Works Here.
Now we are going to tell you What is a Hardware Keylogger and How a Hardware keylogger works.
Here is what a Hardware Keylogger Looks like.



Hardware Keylogger is nothing but a programmed chip (Mostly in assembly Language), so as to capture all the keystrokes and save them in its internal memory. The keylogger can then be taken out and all the stored information can easily be assessed by the hacker. Hardware Keylogger are most commonly used in cyber cafe’s and other public places where a lot of people come and access the internet. Beware of such places.

Tuesday 25 September 2012

Most Common Reasons behind the disapproval of Google Adsense

If you are a Google AdSense account holder, then this article would help you a little to protect your account. It is observed that many of the AdSense account holder having approved account, face it’s disapproval problem by Google after some days, due to some invalid activities. In this article I have discussed some of the reasons by which it can be disapproved by Google team, and some of the tips and measures to protect your AdSense account.




About AdSense

Details, history and instructions about top domains


Need Domains for your websites?



Given bellow are the top level domains with their details and prices on web host daddy, a cheap domain seller.

About web host daddy

Web host daddy is a cheap web hosting platform where you can easily signup for a cheap hosting service.
A good thing about this platform is that they announce so many sales for their users and give up to 65% off on these sales


The prices are given in Canadian dollars $CAD. Please convert them in your currency using an online currency converter. Click here to go the currency converter in a new tab.

Saturday 22 September 2012

How to Insert Images in Facebook Chat | Facebook Hacking


You can actually insert images in Facebook Chat, you may use them as emotions or similes as well (as the size of the images is small).
The beauty of this trick is that you can even display the images of people who are not in your Friend list or can even display the Images of Facebook Pages on chat.
Now here is how to do it.
  1. Open your chat.
  2. Just Go to your profile or any other profile or any official page you want to use as an emotion ot want to use the image in Facebook chat.

Bug In Windows Calculator


Have you ever used square root button in windows?

If yes, it is a possibility that you might have come across this bug…. If not, you are just about to know it..

Just follow the steps:-

1) Open calculator ie..  
   Goto run and type – calc 
2) Now type the following
   2.1) Type 4
   2.2) Take its square root  by using the square root button,
   2.3) Now you will get 2. Subtract 2 from it.
   2.4) The answer should have been 0 but its not. You would have       got a long number as your answer.

See.. it was as simple.

Here is the general syntax to this bug.

1) Take Any number 
2) Take its square root
3) Subtract its square root from it
4) Your answer is not 0.. That’s the bug.

I am sure this was something new for most of you out here..;-)


What is Batch Programming and need for it


Batch file programming

Batch file programming is nothing but a batch of DOS ( Disk Operating System ) commands, hence the name Batch programming . If you are into coding and know many languages you might have noticed that Operating System ( OS ) specific languages ( languages that work only on a particular operating system, eg: Visual Basic Scripting works only in Windows ) give you amazing control over the system. This is why Batch is so powerful, it gives you absolute control over DOS. Batch isn’t often used because it is OS specific, but it is fun and easy to learn. A well-conceived batch file is just the thing to automate the job you want to do.
Batch Files are stored with .bat extension.

What is a FUD Crypter | Download Fud Crypter


Note:- This information is for educational purpose only so that you can know about various kinds of encryyption techniques. the author or Hacking Tips is not responsible for any kind of misuse of this information. We aim only to create awareness so that people can protect themselves from getting hacked and save themselves in this unsafe world of hacking.

Hey guys ! today the topic is FUD CRYPTER and will also provide a download link for the same.

WHAT IS A CRYPTER?

A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code. If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.

What is Metasploit | How to use Metasploit Framework


Metasploit Framwork : Hey Hackers! in this post of Hacking Tips we are going to tell you about the Metsploit Framework. This post is going to answer the following questions for you.

  1. What is Metasploit
  2. How to use the Metasploit Framework
  3. History of Metasploit


What is Metasploit Project: 
The Metasploit Project is a computer security project which aims at providing information about security vulnerabilities and helps in penetration testing and Patching the exploits.

Metasploit framework is its famous sub project, a tool for developing and executing exploits against a remote machine. Apart from Metasploit Framework, Metasploit Project is well known for is anti-forensics and loopholes evading tools.

Thursday 20 September 2012

Trick To Get Free Facebook Advertising Coupon Worth $50


Hello everyone! Ad networks are one of the better ways for promoting Websites worldwide. Google Adwords, LinkedIn, BuySellAds, Facebook are the major ad networks where advertisers can advertise their sites, products etc. Today I’m going to tell about a trick to get free facebook advertising coupon worth $50,         depending upon the country in which you are residing.

  • Login to facebook account.
  • Go to the Facebook Ads creator link by clicking here.
  • Setup your Ad.
  • After you're done creating, click on Review Ad button placed at the bottom of the page.
  • It will take you to the next page where you can see an option of Place Order.

Monday 10 September 2012

How To Create Your Own Font

Hi friends. In windows operating system, there is a hidden utility which lets the user to create custom fonts. So if you want to know how to create custom fonts, then read this post carefully.

1. Go to Start Menu and open RUN. Or press win key+R.
2. Type eudcedit and press enter.





3. A new window will appear to select code. Select any code you like. I have selected 1st, i.e. E000*0



4. Now your font editor will open. You can draw your character as you draw in mspaint.

Password Protect your Word Documents


We all use Microsoft Word to create documents and some times we dont want other people to access our documents specially when you are on a shared computer in your company and you may have your certain secret data stored in your word document that should not be accessed by your boss or other employee’s.



To deal with such a situation Microsoft word 2007 integrated a security feature in Microsoft word so that you can password protect your files.
Just follow these simple steps to make your document protected

Login with Multiple Facebook Accounts in same browser (Chrome & Firefox)




Login Multiple Facebook Accounts on Firefox

STEP 1: Right click on the shortcut of Firefox web browser and click on Properties.

STEP 2: Now, at the end of Firefox Target, you need to add the below code at the end of the path,

-profilemanager –no-remote

For example, C:\Program Files\Mozilla Firefox\firefox.exe” -profilemanager -no-remote

STEP 3: Now when you open the Firefox, you would find a new box. And there you could to login multiple Facebook Accounts.

Run Firefox inside Firefox – Trick


How about Opening Firefox inside Firefox which is again in another Firefox?
And its really easy too, just type in this url in Firefox’s address bar and there you go!
Copy paste following url in a web browser (Mozilla Firefox).

chrome://browser/content/browser.xul

Following is the screenshot of this trick (firefox in firefox in firefox, which is again in another firefox)-
Do comment below if you like the post..


Monday 3 September 2012

Linux A Target Rich Environment for Malware after All, Wirenet Trojan in the Wild

No one is arguing that Windows isn’t the biggest target for malware writers, but it’s starting to look like Microsoft’s OS isn’t alone. Threats for the Mac have made the occasional headline, and a new Trojan is making the rounds on both Mac and Linux. That’s right: a cross-platform virus. 

Wirenet, as it’s being called by Dr. Web (the Russian security company that discovered the malware), is designed to steal passwords. The bug goes after passwords stored in popular Internet browsers and sends them to a server, encrypted with AES

According to Dr. Web, the Trojan can pull passwords from stored password lists and also function as a keylogger. Targeted applications include Chrome, Chromium, Firefox, Opera, Pidgin, SeaMonkey, and Thunderbird. Dr. Web hasn’t yet determined how Wirenet spreads, but it says that the Trojan has been seen in the wild. It installs to the user’s home directory.