Loading
Showing posts with label Guides. Show all posts
Showing posts with label Guides. Show all posts

Torrific.com Alternative-same as Torrific.com

Because of SOPA we have lost some good services like Torrific.com .I have got this site which leeches torrents on server just like Torrific.com , you can download torrents Directly from download managers, like IDM.

about torrific.com but torrific is down and now you can migrate to this site








*first you have to sign up for new account, after give your email, password etc and sign up for this service



*After that download the torrent file and upload it to the zbigz site






*Upload it to the zbigz site





*After done click the green button and choose Free download






*Now choose Free download





*Then you can see like this







Download speed depending on your Internet connection.

I have personally tested http://zbigz.com/ , worked very well.

How-to: use Google Music from anywhere (yes, outside of the United States)

While browsing internet I found a cool stuff that i would like to share with you. It is about using Google Music Service Outside USA.Using Google Music service you can upload upto 20,000 songs and can listen them anywhere .. A video is also included to help you out in case you find some difficulties in following the steps..
www.hackerplus.in

Anonymous Surfing-Hide your real IP-Ultra surf



Ultra surf is a small free tool/utility that help you to bypass the firewall/gateway/router  restriction imposed by your ISP,at your workplace,schools or colleges. It also help to stay anonymous by hiding your real IP.


How to create Proxy chain | proxy chaining tutorial

A proxy is a server that acts as a gateway between your computer and your destination. Read my previous post on proxy server for detail. Proxy servers are used to stay anonymous over the internet. .
By using proxy server you can hide your real IP over the internet while surfing.

User---------->[proxy]----------->[website]

the website will get the IP of the proxy not yours.

Proxy Chaining: Proxy chaining is the use of more than 1 proxy servers to stay anonymous. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. This can be shown like this..


User---------->[proxy1]---------->[proxy2]---------->[proxy3]---------->.......---------->[proxyN]---------->[website]

the user first connect to Proxy1. After connecting to Proxy1, Now the user will connect to Proxy2, then, the user will connect to Proxy3, then the user will connect to Proxy4, and thus using N proxies, the user will then connect to website he want to use.

You can use as many proxies u want but you can never be 100% anonymous.

How to create proxy chaining


Blogger Sitemap Generator Guide- Increases Your Traffic

One thing that you can do to make your blog indexed fast by search engines such as Google, Yahoo, or Bing is by sending the sitemap address of your blog.

The following are the way to use Blogger Sitemap Generator :

  1. Please visit http://digitalinspiration.com/tools/blogger/sitemap/index.php
  2. Enter your blog address into the empty field available, do not forget to write your complete blog address including the http:// and ends with / (slash) (e.g. http://www.blogspottutorial.com/ ), and then click the Create Blogger Sitemap button. 

About HTML5?

So What’s New in HTML 5?

Well if you look at the HTML5 websites and applications you may feel that it is more of a programming language, but the truth is that it’s the same old HTML with some new markup tags and attributes, which make web designing easier than ever before. It’s backward compatible with HTML4 and thus you need not learn it from scratch. The new semantic tags, web page segmentation, the new link types, improved Media Handling with and tags are just a few important new features that we will discuss in this article, that are sure to affect your SEO strategies.....

Login With Multiple Accounts Within One Browser

Some time we require to Login to our different accounts of Facebook, Gmail, Yahoo,  etc without Signing Out from first one. If you are in such situation than you can use a Firefox Addon called Multifox which allows Firefox to connect to websites using different user names Simultaneously!. Isn't that great. For that you require a Mozilla Firefox browser which you can get freely from Firefox Website

For example, if you have multiple Gmail accounts, you can open them all at the same time. Each Firefox window, managed by Multifox, accesses an account without interfering each other. Just follow below step to get Multifox Addon on your Firefox.

1.Go to http://br.mozdev.org/multifox/
And click on Install (Install for your Firefox Ver 3.6 or 4)


2.It may give you a pop up to allow it. Just click allow and you will see a install window like below. Click On Install.



3.After Installing you will be asked to Restart your Firefox. Just save your work and Restart.

4. After restarting your browser you can right click on Tab menu and then select Open in a new Identity profile

How To Prevent From Hackers

I Post this Topic to Protect people From HAcker.Hope you like it.Please give me your Comment.


How to Protect from Hacking or atleast avoid it?




1. Download Panda USB Vaccine which disable the Autorun.inf File.By Autorun.inf file,Any Program can executed when a new USB Device is Plugged in.For Download Go to-http://www.pandasecurity.com/homeusers/downloads/usbvaccine/


2. Intall a Good Firewall as it protect the unauthorized access of Internet by Hacker,Keylogger.I suggest you to install Zone Alarm.Download It from-http://www.zonealarm.com/security/en-us/anti-virus-spyware-free-download.htm


3. If file is Suspicious,Then run it in sand boxie.Sandboxie runs your programs in an isolated space ,which prevents them from making permanent changes to other programs by Virus,Program and data in your computer.You can also run Virus in SandBoxie which does not harm your computer.Download It from 
here- http://www.sandboxie.com/index.php?DownloadSandboxie.


4.Antiloggers are programs which are specially used for detecting the presence of keylogger, One of the popular antilogger is a zemana antilogger which claims to detect almost any keylogger .Download 
It from here- http://www.zemana.com/download.aspx


5. If someone installed stealth FUD Keylogger,then it is very hard to Detect it.So install Key Scrambler.Using advanced encryption algorithms, KeyScrambler encrypts your keystrokes deep in the kernel, as soon as they enter the computer.When the encrypted keystrokes finally arrive at the intended application, the decryption component of KeyScrambler goes to work, and you see exactly the keys you've typed.Download It from here-
http://www.qfxsoftware.com/download.htm


6. Install a Good Spyware as it protect your computer against spyware threats.Spyware cease is one of my most favorite antispywares. The reason why I like is that it has a very user-friendly interface and it can protect your computer against 99% spyware threats. So if you are looking for a good antispyware software I recommend Spyware cease.Download It form 
here- http://www.spywarecease.com/download.php


7. Install a Antivirus.I recommended You use Kaspersky and Norton.


8. Try to Turn off Javascript.


9. Never Download file from Hacking,Warez sites because file is binded with Keylogger,Virus.


10. If you Want more than Sandboxie,Then use Virtual Machine Software.It creates a temporary new operating in which you can do anything.You can compare Sandboxe and Virtual Machines to Proxy and VPN.


11. Never Use Proxy because some proxies store your Username,Password.Always use Good Free VPN. Some 
of Good VPN are 
a.http://www.cyberghostvpn.com/files/download.php
b.http://www.macrovpn.com/
c.https://www.ultravpn.fr/


12. Always use Logout in any website,Forum instead of directly closing the Website.


13. Don't Click on Malcious link as it can copy Cookies,Intsall RAT by using Java applet.


14. Install Deep Freeze.Faronics Deep Freeze makes computer configurations indestructible and prevents against unwanted workstation changes—regardless of whether they are accidental or malicious.Download It from here-http://www.faronics.com/en/DownloadEvaluationEditions.aspx


15. There Is no Program/Software which hack Gmail,Facebbok,Twiiter,Yahoo etc. Account.Don't Believe on them.


16. If File is small,Do online Virus Checking at
a.http://novirusthanks.org
b. http://onlinescan.avast.com/
c. http://www.virustotal.com/


17. Don't Use Public Wi-Fi Hotspot.Connect it through VPN.


Note: Although I tried to keep it up to date but there may be a better option available. So don't forget to google.

Related Posts Plugin for WordPress, Blogger...