Ez money Ez life my friend

Saturday, 20 April 2013

How to Convert Videos using VLC Media Player



How to Convert Videos using VLC Media Player



Yes, now VLC can be used to convert videos to other formats like 3gp, avi, mkv etc.


 Follow the steps given below 

1) Open VLC Media Player .

2) Click on Media and select Convert / Save (Ctrl+R ) Option.


3) Now Add the Files by using Add Button on the new Window which appeared.


4) Now Click on Convert / Save Button and this will Open an Another Window .


5) Now select the Destination File and Profile ( Conversion Format ) as you wish.


6) Finally Click on the Start Button to Begin the Conversion and it is done.

Saturday, 6 April 2013

Log out of your facebook account from another computer



Sometimes we go to cyber cafe or any other places just to open our Facebook account but forget to log out.. No need to worry about that, there is a way to log it out from any other computer..

Follow the steps given below:


  1. Log in your account (from anywhere)
  2. Go to Account Settings (located in the right side of "Home" button)
  3. Choose the "Security"option
  4. Go to Active Sessions (All of your log-ins are listed there
  5. Click on "End Activity" and you will be logged Out..
Thus, in five simple steps you can save your Facebook account from being used by others and thereby improving yourself by getting to one more better step towards cyber security.

Hope you enjoyed this post.

Please Like and Share.

Friday, 5 April 2013

Hack anyone's Wi-Fi Connection!





 Follow the given steps below to hack anyone's wifi connection

 1.Install Commview, then paste the included “cv.exe” to the directory you installed it to (C:\ProgramFiles\commviewwifi)

 2.Open commview and install the commview drivers to a card. It should prompt you about your  wireless card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work

 3.Go to the “rules” tab and check “enable advanced rules”

4.Type in the box labelled formula “tods=1 and dmac=FF:FF:FF:FF:FF:FF” then type a name for your formula in the box labelled name and than click add/edit.

 5.This should now appear in the upper box. if it is not checked, check it.

 6.Click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled “capture data packets”)

7.Click the play button and scan for the network you want to crack.

 8.Once you have found it, drag the channel menu down to the desired channel and click capture.

 9.Now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.

 10.It should now say connected with limited connectivity.

 11.Go back to your commview menu and click on the packets tab. you should see a couple of packets.

 12.Looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled “ARP REQ” and than click send packet, and selected. A mini menu should now appear.

 13.On the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.

 14.Go back to the main commview window and go to the rules tab, and uncheck the rule you made.

 15.You are now injecting and you should see the number of packets rising really fast.

 16.Save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a “dump” .cap file.

 17.Extract the Aircrack-NG folder.

 18.open aircrack-ng-GUI that can be found in the map “bin” and select the files you saved, and than click launch.

 19.Look at the list of IV’s you have, and select the network you want to crack , there should be a list of a lot of them, chose the one with the most IVs.

 20.You are connected to your neighbor’s Wi-Fi. Buy him some nice gift as he just let you use his 4Mbps connection

Hope you enjoyed this post.

Please Like and Share

Get people attracted towards your product/service/business



Nowadays, e-mail marketing has become very popular, especially for products related to computers and technology.

There are many free e-mail sending softwares available over the internet. Just google searching is needed!!!!

But for all that, a list of e-mail addresses that people use is required, otherwise, it will be difficult to spread the word of promoting your product.

So, here is a small list of e-mail addresses that people are using.


" ogglemark@aol.com, elnaz_soltan@hotmail.com, lkelly984@yahoo.com, joaovitorrbd@hotmail.com, franceswilkes@tiscali.co.uk, zoemcleod@myguide.net, tylerhanson7@hotmail.com, emmajayne96@hotmail.co.uk, williamsshamekia@rocketmail.com, alynushi@att.net, deeana323@gmail.com, mairi_allan24@hotmail.com, taylor.bonds@yahoo.com, mollyjanec@hotmail.com, gfkhan1987s@live.co.uk, maisieanne@live.co.uk, jhdfjhdfjhdfj@hotmail.com, prettypinkyhyh@hotmail.co.uk, maliazac@comcast.com, sophie.cole@hotmail.co.uk, dr.ric@comcast.net, shashlante@yahoo.com, sienna_billy@yahoo.co.uk "  

To get more, we have collected a list of 31000 e-mail addresses for sale at just Rs.100. And also, you can pay us by doing mobile recharge on our number. We are sorry that we are taking charge, but for collecting such a huge list we had to spend a lot, so we are recovering it.


Hope you enjoyed this post.

Please Like and Share

Get Quick Heal Total Security free





Quick Heal Total Security protects your laptops and desktops and provides protection against all kinds of Internet or network-based threats. Upon installation, it acts as a shield against viruses, worms, trojans, spywares and other malicious threats. It also provides security against new and unknown threats with Quick Heal's renowned DNAScan┬« Technology. Its improved Anti-Phishing feature ensures that you do not land on phishing sites when browsing the net. The Parental Control feature allows you to schedule Internet access for your children and its pre-configured restricted browsing ensures that children do not visit adult sites. The PCTuner tool improves the overall efficiency of your system and the PC2Mobile Scan feature scans, detects and removes malwares from your mobile phones. It utilizes minimum system resources, thereby giving complete protection to your system without slowing it down.

Download Quick Heal Total Security 2012 from www.quickheal.com and download crack by clicking here.

Install:
--------------------------------------------------------------------------------
1: Install Quick Heal Total Security 2012 - 2013 (32bit).
2: Restart your computer/laptop
3: Keep pressing F8 key again and again till you get menu to go in safe mode
4: After getting in safe mode, copy all the crack files and paste in quick heal directory where quick heal is installed
Say yes to replace all files.
default directory is => c://program files/quick heal/quick heal total security folder.
5: Run quick heal. Go To Files & Folders Section.
Select Exclude Files & Folders.
Click on Add button.
Add the quick heal folder and subfolders to the exclusion list.
6.Click on Save Changes button.
7: Restart PC and run normally

Hope you enjoyed this post.

Please Like and Share.

Protect your Android mobile/tablet with AVG Mobilation Antivirus Pro



Protect your android mobile/tablet with AVG Mobilation Antivirus 2013 Pro!

This software includes advanced protection, anti-theft service with which you can save your data and prevent your phone from getting stolen forever and also, improve your privacy.

Along with Quick Heal Mobilation Antivirus 2013, this software has raised itself upto the glory by getting into the top positions in android applications.

To download this software, please click here.

Hope you enjoyed this post.

Please Like and Share.

Sunday, 31 March 2013

Largest Cyber-Attack In History Causes Global Internet Slowdown




If you’ve noticed that some websites have been slow recently, there’s a good reason for that. A huge distributed denial of service (DDoS) attack was launched against spam-fighting organization Spamhaus. With traffic peaking at over 300Gbps, this attack has had repercussions across the world. It’s being called the biggest cyber-attack in history.


So, what provoked this attack? A Dutch web host named Cyberbunker was recently blacklisted by Spamhaus. Starting a little over a week ago, the anti-spam organization started getting hit with a large-scale DDoS. Reportedly, the attack would be more than enough to knock down even government infrastructure. Now, Spamhaus is accusing Cyberbunker of hiring Eastern European organized crime outfits to take down the blacklist servers in retaliation.

By using techniques like DNS reflection, the attackers have been slamming Spamhaus for over a week. Steve Linford, CEO of Spamhaus, says that while attacks on large banks usually see peak traffic of 50Gbps, Spamhaus is seeing peaks over six times that amount. “This is definitely huge and [Spamhaus] has an infrastructure that gets hit with this stuff all the time, so for them to have issues with it makes it that much larger,”Adam Wosotowsky, Messaging Data Architect at McAfee Labs, told ExtremeTech today.

Despite the incredible amount of traffic, Spamhaus continues to operate. By working with cloud optimization and security company CloudFlare, the service has remained up and functional, for the most part. By load-balancing the incoming traffic to 23 different data centers across the globe, the attack was effectively diluted.

So Spamhaus got hit with a big attack, but it survived. Big deal, right? Well, unfortunately all of this illicit traffic is having a damaging effect on connection speeds.Netflix, which relies on content delivery networks (CDNs) around the world, is seeing substantial slowdown thanks to the congestion caused by the attack. While the slowdown is far from universal, it is worrisome. If a single attack against an anti-spam company can throw a monkey wrench into the internet,
what would all-out cyberwar do?

We’ve covered the threat of cyber-attacks from China in the past. The United States has even been accused of attacking allies. If a large scale attack were to hit the US, be it from hacking or DDoS, entire industries could crumble. This gigantic attack is just a pissed-off web host giving some “payback” to a spam blocker. What if a terrorist organization or rogue state decided to try to take out infrastructure?
TCP/IP and DNS are resilient, but they aren’t perfect. Interrupt the internet and the first world would drop to its knees.