Make All Images On Facebook Revolve - Funny Instant trick

0 comments


I hope you all are fine, Today I didn;t have hacking trick for you but yes, I have very funny trick for all of you. That will make all images on facebook revolving , This trick can help you to impress a girl easily . Read Out whole post to know more.....


Make All Images On Facebook To Revolve

This is a really cool trick by using simple Javascipt,Its really cool and its working.I have tested it.There was a fake Virus Spreading a Website that just scams you and automatically sends it to all your friends.But this script which i  found is really working.

So this is you have to do:- paste below code in your address bar of your browser


javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
Paste the above script in the URL box as shown.And then you'll see the images revolving as you move your mouse cursor.Here is what you have to do :





Cool huh ?? Its really amazing.If you have any questions then please do post them below..

Steganography

0 comments

I shall never be held for any damage caused to you by this information...

Steganography is a cryptographic technique that is used to hide data in other form of data. 
eg: we can hide text in images or hide text into audio/video files without altering the actual format of data. 
The file that is used ti hide the data and which contains the hidden data is called carrier file. for eg: if we hide a text in image file then our image file is carrier file and text file is hidden file.




Steganography basically used following types of techniques to hide the data:
1. Least significant Bit Insertion (LSB)
2. Filtering & Masking
3. Algorithm Transformation


1. LSB:


In this Least significant bit of every byte of carrier file is replaced by the bit of hidden message. Which means the suppose data that we wan to hide is in the following binary:
11110000 -----------> (eq. 1)


now let us suppose the that carrier file is in following binary :
10101010 11001100 10110000 11110101 01010110 00011111 10010101 11101111


now when we apply stegnography the LSB of every byte(in bold) of carrier file will be replaced by each bit of data that we want to hide( eq marked as 1). Resulting data would be as following after applying stegnography:


10101011 11001101 10110001 11110101 01010110 00011110 10010100 11101110
u can see that every LSB of Result(in bold) is exactly matching the each bit of hidden data marked as eq 1.


Thus by such replacements the data is hidden to a file. This replacements doesnt causes much difference between original carrier file and steganographed file. for eg: in case of images, the difference caused by this replacements is not visible to human eye.


2. Masking and filtering
This method basically uses the luminance of images for hiding data. The luminous of carrier file is decreased in order to hide data. This decrease in luminousity is not detected by human eye. Less the variance in luminous of image less will be the chance of being caught.


3. Algorithmic Transformation
In this technique the mathematical transformation technique is used to hide data. eg: JPEG images use Discrete Cosine Transform(DCT) technique for compression.
so in order to hide data in JPEG:
1. we first need to calculate DCT of image & find all coefficient below a specific threshold.
2. Replace these bits with bits of data that we wanna hide.
3. Take the inverse transform & store the regular image.


Most of the software that are used for steganography use LSB insertion technique.
Some use Blank spaces and TAB spaces in word document to hide data.
Some software use the color difference, which means that there is little difference in color depth of carrier file and steganographed file.
Some s/w apply encryption before steganography, it is cool because even if someone catches ur data and even if he/she decrypts the data he/she will not be able to find the hidden data due to steganography

CHANGING MP3 SONG ALBUM INFO&PICTURE

0 comments


HERE IS A SIMPLE TRICK FOR THOSE WHO LOVE TO PLAY WITH TRICKS
TO CHANGE THE MP3 SONGS ALBUM INFO AND ALBUM PICTURE


.If you play a mp3 song in iPOD,or media player in computer you can notice a album picture is displayed with album info .If that song is downloaded from any sites it display the adv logo in album picture

This is the snapshot of album picture of a mp3 song playing in mediaplayer






Here is a simple trick to change that album picture to your picture

Download MP3 TAG EDITOR TOOL



This is a small tool to edit the mp3 songs tag(around 250 KB)

Install mp3 tag editor tool in your system ,and run after install





Now click file and select open directory ,browse to the folder where you saved your mp3 songs and click open

Then it will look like the above picture ,under the file name you can see all the songs in the folder you selected.Now click the song that you want to change album picture

Now look at the red arrow in ID3v1.1 just under it ,you can see title,artist,album,year
This is the album info you can change this if you wish to add your name or anything else

Now click the tab picture





You can see three tab there

Click in load picture

then a small window will come ,browse to the picture you wish to replace with the current one and click open

now you can see the picture is changed to your picture 




Now click Write tag and click exit.then mp3 tag edotor will close

Now got the folder where you saved the mp3 song

Then open the song in media player that now you edited in mp3 tag editor 



Look at that album picture is changed to your picture

So this is trick enjoy

Edit any Website/Webpage

0 comments


How easy is it to edit any webpage on any website in your browser and create fake screenshots? Very simple and easy. Paste a simple code into the address bar and you can actually edit any page on any site in realtime. Though this sounds like fun, it can have serious implications.



Here is the magic code spreading across the web which can edit any webpage

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

Simply copy and paste it into the address bar of your web browser when you are on any page and you can now edit it. Hit go! The links will have turned a more saturated blue, and when you click somewhere you'll be able to edit text. Feel free to edit whatever you want on the page & you can save that page. Though this is a cool tool to have some fun, it is dangerous tool used by scamsters to create fake screenshots and websites resembling the original to misinterpret facts and for phishing attempts. So you need to be alert on the web and not believe everything you see…

You don’t actually need to remember that code – To make this process faster, use the bookmark function on your web browser. Open Bookmarks menu on your browser and add this code as URL and add desired title for the bookmark. You are done. Everytime you need to edit a page, just open this bookmark and edit the page as you desire.

You can shock your friends by showing your skills. 

I checked that this code works on Internet Explorer, Firefox, Opera, and Safari


You now know how easy it is to modify web content and even a kid could do it. Beware of what you see online… it could not be true! 

The Disappearing Google Logo, a Magic Trick

0 comments

Here’s a magic trick to surprise your friends with. What they will see is this: you are at the Google homepage, and you casually ask someone to watch the Google logo.



Then, you move two of your fingers to completely cover the “o”s in the Google logo. When you remove your
fingers, to much surprise, the letters “o” will be missing from the logo Now you ask your friend to move her fingers over the missing “o”s.After your friend removes the fingers, the logo will be complete again!

The trick here? It’s not really the Google homepage you and your friend are looking at – it’s a fake page darkartsmedia.com/Google.html.And when you click on the page, the letters of the logo will disappear
after five seconds. Clicking again will make them reappear after five more seconds.

So when you move your fingers to cover the Google logo,
Simply click anywhere on the page, and wait a bit before you remove your fingers… and when your friend covers the letters, you click again. (A third click, by the way, will change the page to an actual Google homepage so you can perform searches to “prove” the page is real

Get your site visitors in thousands!

1 comments

Some months ago, people have asked me to tell them about SEO "how to get on Google with your specific keyword" So, I've decided to tell you something about SEO.

If you want visitors in thousands than you should follow these steps!



1) Select your keyword first, Google will help you in this. check this out https://adwords.google.com/select/KeywordToolExternal

2) make anchor text. like if you have site thefuturehackers.com and your keyword "hackers" than your anchor text will be <a href="thefuturehackers.com">Flash animations</a> (remove *) It will look something like this hackers

3) you have to create a backlinks for your site. This video will help you in this regard
http://www.youtube.com/watch?v=A7aFcPC-0jc
4) now you have to create relevant Deep links. Use this dork to find relevant blogs
intitle:"flash", "this site uses keywordluv" , "recent comments" (replace flash with your keyword)
This article will tell you how to build deep links "http://blogswithwings.com/keywordluv-gives-high-quality-backlinks-on-comments/&quot; <-- follow the article's instructions!

5) Check your site in Yahoo. Goto Yahoo.com and then write: site:Your site's link here
if you see pages increasing then it means its working, and soon your keyword will get in Google and other search engines. If you keep doing that soon you will reach #1 of Google..

P.S: Don't forget to do On-side SEO work for your site.
see the article about on-side SEO: http://www.searchenginejournal.com/12-basic-on-site-seo-tactics-for-optimized-results/


thanxxxxx


How To Add +1 Button in Facebook Posts

0 comments

Google +1 Button Allows you to recommend Your Favourite Site To Your Friends And it has Lots of Importance in the Google Search Engine In This way you can recommend A website to your Friends in Search Engine.






Let see How to Add This Button to Your Facebook Profile 
You can add this Button to your Facebook Profile with the help of Chrome Extension
First Download The Extension From Here

Youtube Search Commands

0 comments


Search YouTube Like An Expert using Special Syntax


1. channel – This Searches only YouTube channels

2. this week | today | this month - Searches videos uploaded in the given time frame.

3. partner – Searches for video uploaded by YouTube partners only.

4. movie – Searches for full length movies available on YouTube.

5. hd - Limits only HD quality videos.

6. 3d – Limits only 3D videos.

7. playlist – returns only videos in playlists.

8. long – Returns videos that are 20 minutes or longer


  • Submit video in Group 
          http://www.youtube.com/group/


  • HTML 5 - no buffering videos.
          http://www.youtube.com/html5


  • YouTube High quality videos
          To view the Youtube video in high quality append the following at the end of the URL as       
          &fmt=6 or &fmt=18 (480p) or &fmt=22 (720p HD) or &hd=1


  • To watch adult Youtube videos
          Do you want to view the adult video without logging in?

          Add NSFW before the word Youtube in your URL.

           http://www.nsfwyoutube.com/xyz

           
           in your address bar


  • Comment search in Youtube
          I searched for SEO.

          http://www.youtube.com/comment_search?q=seo

Get Windows XP CD key from the CD itself

0 comments

It happens sometimes that you may have lost the product key of Your Windows XP Bootable CD and you are in a great trouble. If you have by chance lost the key, then you need not panic. There is an easy way to get back the CD Key. Actually the Key of the CD is already present in it. So we can get it back by following some simple steps.





Steps to find the product Key of Windows XP CD:-

  • First of all insert the Windows XP CD into your CD drive.
  • Now Explore the CD.
  • Now click on the folder named as I386.
  • In that search for the file UNATTEND and open it with Notepad.
  • Scroll it to the last line and Yipee!! The key is in front of you!!!

Create A Virtual Gmail Drive | Store Upto 7GB

0 comments

It forms a New Drive at My Computer just like C: drive, and you can directly Login from here to your Personal Gmail Account without going to Any Browser and you don't need to wait long time to Upload stuff in there.. but you just have to copy and paste it over there..like you do in other drives

and Yeah!! its uploaded on your Gmail account Instantly.

So technically it acts a 7 GB flash drive extension where you can upload any stuff and access it anywhere for free..





Some More info about it :


GMail Drive appears as a virtual drive under your My Computer folder in Windows
Explorer

Please note that GMail Drive is still an experimental tool. There's still a number of limitations of the file-system (such as total filename size must be less than 65 characters). Since the tool hooks up with the free Gmail Service provided by Google, changes in the Gmail system may break the tool's ability to function. I cannot guarantee that files stored in this manner will be accessible in the future.

Download Free :
http://www.softpedia.com/progDownload/GMail-Drive-shell-extension-Download-15944.html

Announing The Launch Of MOBILE Site

0 comments


For the convenience of our visitors we have launched a mobile version of our site which u will open diretly on ur iphone,mobile phone ........anywhere and   any time 

To open it simply Type thefuturehackers.com in ur mobile browser address bar ...........nd the mobile site will open


NOW ENJOY BROWSING thefuturehackers.com AT UR FINGER TIPS

Google Adsense Complete User Guide

0 comments


For most Bloggers who are making money, Google AdSense plays an important role. AdSense often is the biggest earner for a blog and not to forget it also is a big earner for Google.

There are many blogs and forums which might give a lot of detailed information and help on AdSense, it is still a little daunting for people using AdSense for the first time.

Probably with that in mind, Google has launched an online tool called AdSense Academy which allows people to master all facets of AdSense


Features of Adsense Academy



The online checklist can be accessed from here. The best part is we do not need to have an AdSense account before trying it out.
It has a detailed checklist from how to create your first ad unit, ad format and identifying where the ad should be placed.
Users can also take a quiz to actually complete a milestone like someone would in a training course at an academy. This will allow users to learn all the basics of AdSense.
I found it Very HelpFull For Newbies and mastering them who already know about adsense

Access Google Adsense Academy Here

Yahoo Got Down Infront of Facebook and Google Why?

0 comments






News Came from the center of SAN FRANCISCO that Facebook and Google defeat Yahoo in Internet World. There was a time when most of the peoples always visits on the Yahoo's site for any kind Internet work like mailing, searching, news, feeds etc but in today's world when we all have been move towards the social networking sites, we forgot Yahoo and that's why Yahoo defeated by Facebook and Google and Yahoo failed to keep it up.
 

It was very painful on Tuesday when Yahoo's chief It was very painful on Tuesday when Yahoo's chief executive Carol A. Bartz has been fired by it's board. She focused on Yahoo's online media and original reporting but she was not focusing on developing the new social networking's tools, like mobiles app and video services which peoples wants.
Most big problem of Yahoo is that their problem shared with all internet pioneer, AOL. Both statutory  capitalized on the first huge shift of online news papers and say that how peoples will read it all but failed to follow the internet users and cellphone screen advertisers and social networkings. Both companies have to be media company.

Where on the other hand Facebook and Google types of companies have happily fulfill these kinds of demands of users with connect on the mobile and make bond with social networkings which attracts the users also with advertisers.
Yahoo hangs on it's idea, years ago Shar VanBoskrik, who is a digital marking analyst ay Forrester Research. He discover that peoples will come to his site and give their feedbacks on the requirement of proples and then implement all the possible basic needs persons.  
According to comScore, Yahoo is still world's second most visited site which has the 177.6 unique visitors a month, it's second only to Google but more than Facebook.
Source: Google

Change IP address//Using PROXY

1 comments

I m gona show you how to change ip address or using proxy to change the ip

Open mozilla and goto google type "proxy list by country" and hit search

now you can see many sites list,select anyone
here i selected
http://www.samair.ru/proxy/type-01.htm

then you can see the window like this




here you can search for desired country and copy the ip and port number
As you can see there are many proxies on different countries ! only problem ! they are always not working

Thats why we will need to check manually from the following site

http://www.ip-adress.com/Proxy_Checker/
now paste the copied ip and port number to the box and click "check this proxy"




As you can see this proxy is not working
go back to the proxy list and select another one

copy another ip from http://www.samair.ru/proxy/type-01.htm
come back to (http://www.ip-adress.com/Proxy_Checker/) and paste into the box and click check this proxy




look at the result:

Great ! this one is working we can surf with this !

ok now click tools (in your mozilla browser),select option


select advanced,,select network and click setting


select manual proxy configuration
copy paste the ip to the http proxy box
copy paste the port number to port
click ok in setting window and option window

Your ip address is changed now,
goto http://www.ip-adress.com/
you can check your ip

now you can surf with this ip

well if you are not satisfied with this ip and want a elite one (like i do)
goto http://www.ip-adress.com/Proxy_Checker/
you can see there is a small column names proxy list
there you can see the ip address and type
select anyone ip type elite (copy this one-ip)
paste into the box and click check this proxy
if you are lucky you will get the result working
try again and again until you get the working one



i got something like this one
now goto tools -->advanced-->network-->click setting
and paste the ip and port number








click ok -->ok

goto http://www.ip-adress.com/




Great ! Now you can play with this as much as you want

I hope you like this tutorial

These are some sites providing working proxies

http://proxy-heaven.blogspot.com/
http://www.socks24.org/
http://elite-proxies.blogspot.com/
http://hidemyass.com/proxy-list/
http://www.proxylist.net/

Hide files(MP3/txt) in MS word document-Trick

0 comments

I already told how to hide files/folder in a picture file(jpeg).Today I'll be showing you how to hide files (txt/mp3) on Word Documents (docx). (YOU CAN'T EDIT THE DOCUMENT AFTER YOU HIDE THE FILE)
There are two methods to do this. I'll show you both!

What will you need?

- Word Document (docx)
- File to hide (jpg/mp3/etc)
- 7Zip (1st Method only)
- OfficeXMLsteg (2nd Method only)






Download and setup 7Zip.

http://www.7-zip.org/


Click on the document file with right button, put the mouse on 7Zip, and select "extract here"!



After that, copy those files to a new folder and add to that folder the file you want to hide.








Then select all the files of the folder, click with the right button, put the mouse on 7Zip and choose Add to archive! 




Then on the file name you type: thenameyouwant.DOCX



And you should now have a new document! If you extract it again the hidden file will be there! If you cannot open the document check the second method!



hope you guys enjoy the trick

How can I become a hacker?Where to start?

0 comments



The term "Hacker" is spreading all over social networking sites/internet .So now everyone want to be a hacker.Manyone out there call themself hacker ,they dont even know a single programming language.Then you will ask who you are? I am not a hacker ,I am network/system admin having some knowledge in networking ,and know some programming language like C,C++,vb.net,php,java,...Oh i am going off the mark,sorry .Ok so here I like to share something that I hope will helpful for those one who wish to become a hacker.Dont harsh on me for any spell/grammer mistakes english is not my native language... 

Who are HACKERS?


If you want to become hacker ,you have to know who are the real HACKERS.There are some peoples stalling on the internet,defacing outdated ,small firms website and claiming he is a hacker.They are just using the tools that someone made,they dont know what they are doing,they dont even know any programming language .The real hackers call them script kiddies.There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end. The basic difference is this: hackers build things, crackers break them. If you want to be a hacker, keep reading.

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘ hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker. The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.

Hackers Attitude

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated. Ok...I think everyone got what i mean by Hackers attitude.

If you want to be a hacker, repeat the following things until you believe them: 1. The world is full of fascinating problems waiting to be solved. Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.

To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re- address old ones.

3. Boredom and drudgery are evil. Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren't doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.

Freedom is good

Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.

Follow the Masters



As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters — not just intellectually but emotionally as well. Or, as the following modern Zen poem has it:     To follow the path:      look to the master,     follow the master,     walk with the master,     see through the master,     become the master.

I know you cant be Kevin Mitnik or Peter Norvig in a day ,but you can become a master hacker if you have the attitude,skills and mindset that a hacker need . Steve Woznaik didnt had any knowledge or experience in programming when he programmed micro control for personal computer.Read the books and essay's written by other hackers.Respect and follow the masters .If you want to be a real hacker stay away frow crackers,never seek help to them.Their are many supreme real hackers outthere follow them. 

 

How To Grant Someone To Access Your Gmail account without Telling Him Password

0 comments

In Some Case may be you want to Share your mails without telling the passwords Then let see How to do this.


First click on the Top most corner of the icon and click on mail settings as shown below

Now Click on Account an Import Tab

Now You can see this Below Image in your Page and Here You Have To Click on Add Another account.
After Clicking on add another account a new tab will be open and now you have to type the Email of the person who you want to grant permission to access your mails.
After Clicking on the Next step in the above screen you will be on the below screen now You have to click on grant permission and send email
Now You have ranted Him Permission and he have got an email regarding this and  now he can easily access your Emails If you want to stop him from reading your mails you can do this by clicking on the delete button from the same tab Accounts and import as shown below.

6 Best Free Antivirus Apps For Android Devices

0 comments


Now a days our smartphones have started to be treated like small computers that we can take everywhere we go and as they are having some very important data like contacts,card details, it is important to protect this crucial data from theft and malicious softwares. Would you take the risk to delete antivirus from your laptop? No then how about securing your mobile phone.In this article we will take a look at some of the famous six free anti-virus for android mobiles. Have a look:








1) Lookout Mobile Security :

The Lookout Mobile Security anti-virus app monitors all software applicatons and scans them on daily or weekly basis. The app has “Find My Phone” feature that can show you your Android device on a map. In-case you misplace your mobile in your apartment, you can use Find My Phone to activate a siren from the Web. This is an added factor that makes Lookout Mobile Security the one coolest option. Lookout Mobileantivirus scans and cleans your mobile device, keeps the backup of your valuable data and locates your device.



2) Phone Spam Blocker USA :

If you’re getting spam calls, text spam and annoying calls from telemarketers, then Phone Spam blocker does the trick. It includes daily number updates and lets you search suspicious numbers to report new phone spam. Restore your privacy, avoid identity theft and save minutes with Phone Spam Blocker USA.



3) Super Security:

Super security is a free app that provides cloud based antivirus engine to help you get rid of malware and provides strongbox to hide your sensitive data. The features include-missing device find back, task manager, anti malware, strongbox, and community based antivirus engine.




4) Anti-Virus Laser:

It’s an action puzzle game that lets you delete the virus in fun way. While playing, you have to control the laser beam and fry the viruses before they reach out. You can upload your score and see your world ranking. The free version has just 10 levels.



5) SmrtGuard Mobile Security :

It’s the free anti-virus app that protects your Android from any virus. It comes with ‘Find Phone’ via GPS ,’Audio Ping’, ‘Remote Lock’, ‘Call Blocker’ and ‘SimCard Guardian’ features. The app secures wireless backup.



6) AntiVirus Free :

Antiviurs Free as the name hints is the free Android mobile antivirus program that helps you scan and clean your mobile phones. Besides this, it also filters problematic messages, files, and folders and deletes them.



Download any of these free anti-virus and secure your data by making your Andriod mobile phone virus free.