Have you checked out the BitMaker app? Sign up with my code and we will each get 2,500 Satoshi when you try it. Code: https://goo.gl/U4c1GJ
TECHnicalEra12 is your ultimate source for hacking tips, Termux tricks, WiFi hacking tools, phishing tutorials, password cracking, ethical hacking guides, Android exploits, cybersecurity advice, and more. Everything is for educational purposes only — learn the tools, techniques, and tricks used by hackers and protect yourself from cyber threats.
Wednesday, December 7, 2016
Wednesday, October 26, 2016
Warning! Your iPhone Can Get Hacked Just by Opening a JPEG Image, PDF or Font File
What's worse than knowing that innocent looking JPEGs, PDFs and font files can hijack your iPhone, iPad, and iPod.
Yes, attackers can take over your vulnerable Apple's iOS device remotely – all they have to do is trick you to view a maliciously-crafted JPEG graphic or PDF file through a website or an email, which could allow them to execute malicious code on your system.
That's a terrible flaw (CVE-2016-4673), but the good news is that Apple has released the latest version of its mobile operating system, iOS 10.1, for iPhones and iPads to address this remote-code execution flaw, alongside an array of bug fixes.
And now that the company has rolled out a security patch, some hackers would surely find vulnerable Apple devices to exploit the vulnerability and take full control of them.
So, users running older versions of iOS are advised to update their mobile devices to iOS 10.1 as soon as possible.
Besides this remote code execution flaw, the newest iOS 10.1 includes security updates to address 11 security flaws in the firmware for the iPhone, iPad, and iPod Touch.
Those flaws include local code execution vulnerabilities, a remote code execution bug in WebKit (CVE-2016-4677), a flaw in contacts (CVE-2016-4686) that would allow an application to pull Address Book details even when access has been revoked.
To update your iOS device go to Settings → General → Software Update.
Security Updates for Mac, Apple Watch, and AppleTV
Apple has also released security updates for Mac PCs, Apple Watches and Apple TVs.
So, Mac users are advised to update their system to macOS Sierra (10.12.1), which includes security fixes for 16 CVE-listed vulnerabilities.
Those weaknesses include an image-handling bug (CVE-2016-4673), a denial of service (DoS) error in Nvidia graphics card drivers, a bug that exposed the length of user passwords and Remote Code Execution (RCE) flaws that could be triggered by font files and PDF files, among others.
Meanwhile, Apple Watch users are recommended to update their devices to watchOS 3.1, which includes fixes for 8 security flaws.
Those flaws include 2 vulnerabilities in sandbox profiles that could allow third-party apps to view image libraries and sound files without permission.
AppleTV users are also advised to update their devices to tvOS 10.0.1, which includes patches for 10 vulnerabilities, including the WebKit remote code execution flaw, the sandbox profiles flaws, and the CoreGraphics JPEG flaw.
So get your Apple device patched before getting caught by hackers.
Monday, October 24, 2016
Get your data back
Friday, October 21, 2016
Unlock & Earn
Do you wanna make free 💵 just by 🔓 your 📱 and get to read exciting News ? ☑ the 🔗 below and download one small apps from Your Android 📱
Bitcoin mining
Sunday, October 16, 2016
Easy money download n earn
Wednesday, October 12, 2016
Expand Memory Card size
Hi Guys I Am Back With A Amazing Trick
For You , With This You Can Convert Your
1 Or 2 Gb Memory Card Into 4 Gb If You
Like This Trick Then Follow All Steps
Carefully........
Follow These Simple Steps-
1- 1- First Of All Take A Backup Of Your
Memory Card...
2- Now Download This Toolkit In Your
Pc..By This Link:- https://docs.google.com/uc?export=download&id=0B2aSWJmIeC97M1hxcEN6NHZkeTA
3- Extract 'increase internal space of
memory Card Toolkit' which you have
downloaded.
4- Now Put Your Memory In Computer..
• But First Take Backup...
5- After Backup Of Your Memory Then
Open Drive Increaser.bat file from
extracted folder.
6- After That The Script Will Open In
Your Pc..It Will Ask You For Name Of
Your Memory/Sd Card.. like Technical Era
7- Now Your Have To Enter Your Drive's
Letter... If You Don't Know Your Drive's
Letter Then Go To My Computer.
8- Here You Will See Your Drive's Letter
• for example because it very important
to be careful while entering your drive
name. Like My drive's name is G:
9- Now Again Enter Your Drive Name...
10- Now Wait Some Time this Script Can
Take 2-10 Minutes Or Maybe More...
11- Its All Done Now See Your Memory
Card Internel Space If It Is 4 GB ( Then
You Have Good Luck ) If It Is Not
Increshed [Then You Have Bad Luck ]
• If it increased then now, you have
converted your Memory Card/SD card's
internal storage and now you can restore
the backup that you have taken
Dos atrack Any vulnerable site
JUST FOLLOW THIS SIMPLE STEPS
(1.) JUST GOTO START AND TYPE CMD IN SEARCH BOX..... NOW TYPE THIS COMMAND IN CMD TO GET IP OF SITE U WANNA HACK
TYPE " ping www.whichsiteyou wanna hack.com"
NOW U WILL GET IP OF THE SITE
IN MY CASE ITS IP OF MY SITE
(2.) NOW JUST DOWNLOAD THIS 2 SOFTWARES FROM GOOGLE
(i.) RDOS
(ii.) PORT SCANNER
(3.) NOW THE MOST IMPORTANT STEP
NOW U GET IP OF UR SITE BY USING
STEP 1 NOW SCAN THE OPEN PORT OF THE SITE USING PORT SCANNER SOFTWARE
SIMPLY JUST ENTER THE IP WE GOT IN STEP 1
AND ENTER IT IN PORT SCANNER
Check if the port is open
(4.) NOW OPEN RDOS SOFTWARE AND ENTER IP THAT WE GOT IN STEP 1AND ENTER PORT 80 (ALWAYS OPEN IN SO MANY SITES)
OR ENTER PORT THAT WE GOT FROM PORT SCANNER
. NOW THE SITE WILL BE CRASHED SLOWLY
WILL BE DONED AND AFTER SOME TIME U CAN SUCCESSFULLY JUST CRASH IT ..
Note : educational purposes only
How a hacker can hack your Facebook Account
This post is only for security
purpose don’t try any illigal activity and
i’m just shared these methods because
protect our facebook account from these
types of hacking attacks.
1) Hack Facebook Account Password By
Phishing:
Phishing is still the most popular attack
vector used for hacking Facebook
accounts. There are variety methods to
carry out phishing attack. In a simple
phishing attacks a hacker creates a fake
log in page which exactly looks like the
real Facebook page and then asks the
victim to log in. Once the victim log in
through the fake page the, the victims
“Email Address” and “Password” is
stored in to a text file, and the hacker
then downloads the text file and gets his
hands on the victims credentials.
2) Hack Facebook Account password by
Keylogging :
Keylogging is the easiest way to hack a
Facebook password. Keylogging
sometimes can be so dangerous that
even a person with good knowledge of
computers can fall for it. A Keylogger is
basically a small program which, once is
installed on victim’s computer, will
record every thing victim types on his/
her computer. The logs are then send
back to the attacker by either FTP or
directly to hackers email address.
3) Stealer’s :
Almost 80% percent people use stored
passwords in their browser to access the
Facebook. This is quite convenient, but
can sometimes be extremely dangerous.
Stealer’s are software’s specially
designed to capture the saved passwords
stored in the victims Internet browser.
4) Hack Facebook Account
Password By Session Hijacking :
dangerous if you are accessing Facebook
on a http (non secure) connection. In
Session Hijacking attack, a hacker steals
the victims browser cookie which is
used to authenticate the user on a
website, and use it to access the victims
account. Session hijacking is widely
used on LAN, and WiFi connection.
5) Sidejacking With Firesheep :
Sidejacking attack went common in late
2010, however it’s still popular now a
days. Firesheep is widely used to carry
out sidejacking attacks. Firesheep only
works when the attacker and victim is
on the same WiFi network. A sidejacking
attack is basically another name for http
session hijacking, but it’s more targeted
towards WiFi users.
6) Mobile Phone Hacking :
millions of Facebook users access
Facebook through their mobile phones.
In case the hacker can gain access to the
victims mobile phone then he can
probably gain access to his/her Facebook
account. Their are a lots of Mobile
Spying software’s used to monitor a
Cellphone. The most popular Mobile
Phone Spying software’s are: Mobile
Spy, and Spy Phone Gold.
7) DNS Spoofing :
If both the victim and attacker are on
the same network, an attacker can use a
DNS spoofing attack and change the
original Facebook page to his own fake
page and hence can get access to victims
Facebook account.
8)USB Hacking :
If an attacker has physical access to
your computer, he could just insert a
USB programmed with a function to
automatically extract saved passwords
in the Internet browser.
9) Man In the Middle Attacks :
If the victim and attacker are on the
same LAN and on a switch based
network, a hacker can place himself
between the client and the server, or he
could act as a default gateway and hence
capturing all the traffic in between.
10) Botnets :
Botnets are not commonly used for
hacking Facebook accounts, because of
it’s high setup costs. They are used to
carry more advanced attacks. A Botnet
is basically a collection of compromised
computer. The infection process is same
as the key logging, however a Botnet
gives you additional options for carrying
out attacks with the compromised
computer. Some of the most popular
Botnets include Spy eye and zeus.
Have netpack but Need to Call someone
Make Unlimited Free Calls From All Networks
To India. it's Working with all devices and SIM
cards, You can Make 5 Calls Per Day Without
Internet
Steps To Use:-
•Download SpeekFree
• Now Register On The App
• Enter Your Name, Fb I'd, Age, Gender And Submit.
• Enter Your Mobile Number And SIM Details.
• Now Enjoy Free Calling
• No Need Internet Connection.
– In Speakfree registration, the App will send an
SMS to De-Activate DND for receiving Promotional
SMS on Shopping offers & promotions from Speakfree...
Thursday, September 22, 2016
iPhone Price
Sunday, September 11, 2016
Write and Earn
Sunday, September 4, 2016
Whatsapp sharing data with facebook
Whenever we sign up for websites such as Facebook, Google, Gmail, Yahoo
etc. you agree with their “Terms and Conditions” and “Privacy Policy“. This agreement states that by agreeing to their conditions, we give them a right to use our information for better targeting of advertisements.
These companies do a great job while securing their user’s data against everyone else on the web except for themselves. Even though these companies claim that they keep strict policies about the user’s data and nothing is revealed except for court’s legal processes but that perhaps, is not always the truth.
However, programs such as NSA, XKEYSCORE revealed by Edward Snowden have disclosed that these companies leak customer data to NSA which is further processed. As information nowadays is digital, it’s 0’s and 1’s, which once used to be something on piece of paper.
“Internet has made it easier for Governments to take control of our minds”.
Nowadays, we are more honest to the search engines than our spouses, friends etc. The search engines know more about us than anyone, our interests, our likes, our dislikes etc. Therefore, disabling the “Check” option as in picture below from WhatsApp would prevent your data from being disclosed. Well, my answer is it does not stop. Let me tell you why I think so..
If you believe that a company invests and spends billions of dollars in building the infrastructure, paying electricity bills and giving salaries would allow you to enjoy everything for free, then I think you are mistaken.
We do not pay anything for using Google Search, for utilizing Google Drive, Gmail, Facebook, and WhatsApp. A Company, investing so heavily on their infrastructure would eventually go bank corrupt if they don’t have any rewards to reap.
It turns out that, nothing is free on the internet, there is no free lunch.
People generally come up with the argument that when they have nothing to hide, why would they be afraid? The question is, if they have nothing to hide and if they are not willing to keep secrets then how we can trust such organizations with our personal text and calls information?.
I will leave you with thoughts to ponder about this serious issue, are you safe online?
Wednesday, August 31, 2016
Wanna Win Pokémon Go?? Here's how to
REQUIREMENTS:-
FLY GPS app from play store.
Setting Up The Software:-
Download and install the app.
Go to Settings > About Phone > Tap on Device number 7 times to activate developer mode.
Go back to Settings > Developer Options > Locate ‘Select mock location app.’ > select fly GPS.
Mock location app
4. Go to Settings > Location and set GPS mode to high accuracy.
GPS accuracy
5. Now open fly GPS and select any location you want.
Select Location
6. Open menu > Tap on “GPS service run”. > Tap on joystick location mode Pokemon.
See the joystick.
That's it your done..
Friday, August 19, 2016
Thursday, April 21, 2016
DirectX
Top Fauchet Mining
FAST THEN A ROTATOR. OPEN ATLEAST 10 FAUCET AT A TIME USING THE MOUSE ROLL BUTTON. YOU CAN
DOWNLOAD A COPY OF THESE LIST HERE http://adf.ly/1XHGrU AND USE MS-OFFICE TO REPLACE MY BTC ADDRESS WITH YOURS THEN
IT WILL BE YOUR REFERRAL LINK ENJOY EARNING FROM YOUR REFERRAL AS WELL. THANKS FOR USING MY
REFERRAL LINKS IN ADVANCE.
NOTE: YOU MUST CLAIM ALL THE SITE BEFORE GETTING EARNING FROM YOUR REFERRALS. THIS IS BECAUSE YOUR
ADDRESS WILL BE NOTED BY THE FAUCETS.
==========================================================
*[HOT FAUCET LIST UPDATED]*
==========================================================
http://faucet.bitcoins43.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://coindice.win/?ref=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.dayrox.com.ve/dayroxfaucets/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://goldcoinsfaucet.xyz/btc/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.predimania.com/QuinielaFaucets/index.php?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.claimyourbitcoins.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.masterbtc.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.joseluisestevez.com.ve/yeyofaucets/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://coinad.us/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://kingsfaucet.com/index3.php?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.dayrox.com.ve/dayroxfaucets/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://yellow.btcmatrix.club/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.faucetbitcoin.net/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://giantbitcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://allworldhyip.com/free-btc/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.faucbtc.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://satoshiprofit.com/?code=e60528598654b633
http://btc-faucet.co/?id=24102
http://oneadfaucet.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcoin.faucet.ovh/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bubble-bit.co.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://zoobit.co.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://your-bit.co.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcoin-for-us.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://investingbit.co.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.claimyourbitcoins.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.satoshisfaucet.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://valley-bitcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitfaucetstory.com/faucetInfo/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.newsbtcoins.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freeclaimbtc.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bs-coins.info/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://faucet.bitcoinbarry.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://satoshiclaims.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://f3-btc.com/?r=1JiFpqKr6EunXKXFrpdKehaYNdeUg6H
http://freecoins.us/?r=1JiFpqKr6EunXKXFrpdKehaYNdeUg6H
http://www.babyfreebtc.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcoinshowers.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://chiripabits.com.ve/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://red.btcmatrix.club/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://generator-satoshi.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://megafaucetbox.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.daddycoins.com/?referer=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freeclaimbtc.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://faucet-book.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://giantbitcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.plingeling.se/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://marubits.net/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freeclaimbtc.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.plingeling.se/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://goldcoinsfaucet.xyz/btc/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://infotest777.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://u24.co/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://grayfaucet.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://investingbit.co.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://satoshiclaims.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://dashmafia.com/faucetinabox-r62/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://atlantinv.com/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://cryptodex.tofful.in.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://rapidbitco.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://puzzlebitco.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://coolwebinfo.eu/btc/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freebitcoinhome.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://f3.octopus.pp.ua/?r=1JiFpqKr6EunXKXFrpdKehaYNdeUg6H
http://rekbitcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcoinmxn.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.winfreebit.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitboxlosangeles.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
================================================================
[OTHER FAUCET LIST]
================================================================
http://www.freebitcoins4u.co.uk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.satoshididu.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.wytewolfbtc.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcobear.com/?r=?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.bitcoinerz.eu/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bitcoin.cryptorials.io/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.siizo.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
ttp://www.top-bit.com/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://gamerfaucet.com/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.q-crazy-fire-p.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://dizy-faucet.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.littleempire1d.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://f2.octopus.pp.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://msfy.pro/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://free-satoshi.eu/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://greenfaucet.cf/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://btcn.in.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://free4btc.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.rapidbitco.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://ilovebitcoins.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://faucet-bitco.in.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://elenafaucets.com/freebitcoin03/?ref=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://satoshicoin.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://f17.octopus.pp.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.bitboxnewyork.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://satoshimonster.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.250satoshi.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://elenafaucets.com/freebitcoin04/?ref=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://bctec.ru/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://x-faucet.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.skolingas.eu/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.bonumcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.limo-service-montreal.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://coinsbit.in/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://bitcoins.brutalcoins.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://korh.one/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://joninhaxs.tk/faucet/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://earnbits.org/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.faucet.zarabotat-bitcoin.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://faucet1.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.paidonlinesites.com/bitcoin/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://megafaucet.work/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.earncoin.us/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.cryptobox.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://atlanticcity.faucetbtc.club/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://btc-free.tk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://btc-easy.tk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://btcfy.xyz/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://go-btc.tk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://btc-free.tk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freebitcoinearn.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://www.electrogalaxy.net/faucetgalaxy/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://freebtcfaucet.net/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://lotofsatoshi.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://purplehomebtc.tk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://lotofsatoshi.com/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://faucet4.ru/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
https://djchange.cc/free/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
http://f9.octopus.pp.ua/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
SatoshiCollector.co.uk/?r=1J1kT4ZKvAb8TvBv1WGsV8wUoQE9amLrtn
Thursday, February 18, 2016
Removing Windows.old Directory from Windows
- Just open up Disk Cleanup utility.
- You can do so by searching for Disk Cleanup and opening it up.
- Now choose your Windows Installation drive, obviously its going to be C:
- It will scan for sometime then show you the results, but now you need to click on “Clean up System Files”
- Now it will search once again, now wait for the files to load and just select the option “Previous Windows Installation”
- Yes, thats the option you need to choose, now press OK and it will ask you really want to delete that folder, press Yes and thats it, your folder and all its files will be deleted.
Tuesday, February 9, 2016
See Who Views Your Facebook Profile ?
How To Use Profile Visitors For Facebook ?
- Download Profile visitors for facebook from here in your Google chrome.
- Now login to your facebook account, you will now notice an extra ‘visitors’ tab next to the left of ‘home’ on the top blue bar.
- Click on it, a popup will open showing you the recent visitors of your facebook profile with time, but as I mentioned before, it will only show those visitors who have already installed the extension.
Monday, February 8, 2016
PC PROBLEMS & THEIR SOLUTIONS
1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data cables, RAM, Display Card , CPU connections.
2. CONTINUOUS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input Output System)
5. CONTINUOUS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is pressed for Longer time)
6. FDD LED IS GLOWING CONTINUOUSLY
Data cable to be connected properly (twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart) Enter your search terms.Submit search form.
10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY
Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.
12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord.
16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.
17. MISSING OPERATING SYSTEM
The System files missing namely Ie; command.com} -User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set properly.
b. Operating system used for formatting is not valid.
20. SHOWING DIVIDE OVER- FLOW MESSAGE
a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.
21. HARD DISK MAKING NOISE WHILE PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.
22. HARD DISK HANGS WHILE PROCESSING
Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to 800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device...