Saturday

How to set up VPN in Windows7



If you didn't know that VPN is a secure manner to surf internet, read Why Should I Use VPN - What is VPN


How to set up VPN in Windows7 :


  1. From Windows 7 Desktop, click Start - Control Panel to open the control panel;
  2. Click Network and Internet, click Network and Sharing Center;
  3. Click Set up a new connection or network, then Connect to a workplace;
  4. Select option No, create a new cnonection, then Use my Internet connection (VPN);
  5. In the Internet Address text box, enter 67.212.175.123 just like in the table downhere.
  6. in Next window, use freevpnaccess as User name field, and use 2821 in the Password field, then click "Connect" button to start the free VPN connection.

if you get an error go here http://www.freevpnaccess.com/ and see if the user and/or the password has changed, then change it.

Enjoy !

LocationVPN ServerProtocolUsernamePassword
US - Chicago67.212.175.123PPTPfreevpnaccess.comClick here
UK - London83.170.84.216PPTPfreevpnaccess.comClick here
Canada - Montreal184.107.164.10PPTPfreevpnaccess.comClick here
NL - Haarlem212.7.192.139PPTPfreevpnaccess.comClick here
US - Miami69.60.121.29PPTPfreevpnaccess.comClick here
UK - Maidenhead94.76.233.203PPTPfreevpnaccess.comClick here



If you didn't know that VPN is a secure manner to surf internet, read Why Should I Use VPN - What is VPN


Why Should I Use VPN - What is VPN



Encrypting your web connection by using a VPN service is extremely useful. A VPN enables you to break out of restrictive networks, hide your content from network administrators and eavesdroppers, and even unlock Netflix and Pandora content that is otherwise blocked in your country.

virtual private network connection achieves two technical results: 1) a VPN cloaks and encrypts your signal, making your online activity completely illegible to any eavesdroppers, and 2) a VPN manipulates your IP address, making you appear to come from a different machine/location/country. While your VPN will slow down your connection speed by 25% - 50%, there are many good reasons to cloak your activities and change your IP address.

1. Use Public or Hotel Wi-Fi in Confidence

Use Public or Hotel Wi-Fi in ConfidencePhoto Alto / Getty Images
Most people are unaware of this, but that Starbucks hotspot and that 10-dollar-a-day hotel wi-fi is not safe for confidential email and browsing. Public wi-fi offers no encryption security to its users, and your signals are broadcast for anyone savvy enough to eavesdrop. It's very easy for even a junior hacker to intercept your unencrypted wi-fi signal using an Evil Twin phony hotspot or a Firefox Tamper Data plugin. Public wi-fi is terribly insecure, and is perhaps the biggest reason why mobile users should consider spending the 15 dollars per month for the safety of a VPN connection.

If you log into a public wi-fi network, and then connect to a personal VPN, all of your hotspot web use will then be encrypted and hidden from prying eyes. If you are a traveler or a user who is regularly using public wireless, then a VPN is a very wise investment in privacy.

2. Access Full Netflix and Streaming Content from Outside the USA

Netflix.com
Because of copyright agreements, Netflix and Hulu and Pandora and other streaming media providers cannot broadcast all content outside of the USA. This means: many movies and shows are blocked to users in the UK, Canada, South America, Australia, Asia, and Europe. This geographical enforcement is managed by reading your user login IP address, and tracing it to its country of origin.

By using a VPN service, you can manipulate your machine's IP address to be from within the USA, therein unlocking access to more Netflix and Pandora streams. You will need to configure your television movie player or mobile device to use the VPN connection, but if you are a streaming fan, then the effort and cost of a VPN is worth it.

3. Break Out of a Restrictive Network at Work/School

E+ / Getty Images
As an employee of a company, or a student at a school/university, you will be subject to an 'Acceptable Use' policy for browsing the Web. 'Acceptable Use' is often debatable, and many organizations will impose draconian restrictions, like blocking you from checking your Facebook page, visiting YouTube, reading Twitter, surfing Flickr, performing instant messaging, or even accessing your Gmail or Yahoo mail.

A VPN connection will allow you to 'tunnel out' of a restrictive network and connect to otherwise-restricted websites and webmail services. More importantly: your VPN browsing content is scrambled and indecipherable to the network administrator, so he cannot collect any recorded evidence about your specific web activities. About.com does not recommend violating Acceptable Use policies as a rule, but if you feel you have justifiable reasons for bypassing your specific network restrictions, then a VPN connection will help you.

4. Download and Upload P2P Files in Privacy

Photo Library / Getty Images
The MPAA and other cinema and music associations absolutely detest P2P file sharing. For reasons of both profit and legality, the MPAA and other authorities want to forbid users from sharing movies and music online. They nab offenders by masquerading as fellow file sharers, or by eavesdropping on your ISP signal.

A VPN can be a P2P user's best friend. While a VPN connection will slow your bandwidth by 25% - 50%, it will cipher your file downloads, uploads, and actual IP address so that you are unidentifiable by authorities. If you are a file sharer, and do not wish to risk copyright prosecution or civil lawsuits, definitely consider spending 15 dollars a month on a good VPN. The privacy and protection from surveillance is definitely worth it.

5. Bypass the Country's Web Censorship and Content Surveillance

Flickr / Getty Images
In the same way 'Acceptable Use' policies are enforced at workplaces and schools, some nations choose to impose oppressive internet censoring on their entire countries. Egypt, Afghanistan, China, Cuba, Saudi Arabia, Syria, and Belarus are some examples of nations who surveil and limit access to the World Wide Web.

If you live in one of these restrictive countries, connecting to a VPN server will enable you to 'tunnel out' of the censorship restrictions and access the full World Wide Web. Simultaneously a VPN conceals your page-by-page activity from any government eavesdropping. As with all VPN connections, your bandwidth will be slower than uncloaked internet, but the freedom is absolutely worth it.

6. Cloak Your VOIP Phone Calls

E+ / Getty Images
Voice-over-IP (internet telephoning) is relatively easy to eavesdrop on. Even intermediate-level hackers can listen in to your VOIP calls. If you regularly use VOIP services like Skype, Lync, or online voice chatting, definitely consider implementing a VPN connection. The monthly cost will be higher, and the VOIP speed will be slower with a VPN, but personal privacy is invaluable.

7. Use Search Engines Without Having Your Searches Logged

Like it or not, Google, Bing, and other search engines will catalog every web search you perform. Your online search choices are then attached to your computer's IP address, and are subsequently used to customize advertising and future searches for your machine. This cataloging might seem unobtrusive and perhaps even useful, but it is also a risk for future public embarrassment and social faux pas.

Don't let Google store your searches for 'anti-depressants', 'love advice', 'divorce lawyers', and 'anger management'... consider getting a VPN and cloak your IP address so you can keep your private searches private.

8. Watch Home-Specific Broadcasts While You Are Traveling

Stone / Getty Images
Local network news can be rather dodgy in some countries, and access to your favorite streaming television, sports games, and video feeds can be locked out while you are away from your home country.

By employing a VPN tunnel connection, you can force your borrowed connection to access your home country as if you were physically there, therein enabling your favorite football feeds and TV and newscasts.




If you still interested how to set up a VPN in windows (1 minute to set it up), read How to set up VPN in Windows7 - Very easy steps 

How Hackers can Track your Mobile phone with a cheap setup



Cellular phones have become a ubiquitous means of communications with over 5 billion users worldwide in2010, of which 80% are GSM subscribers. Due to theiruse of the wireless medium and their mobile nature, thosephones listen to broadcast communications that could reveal their physical location to a passive adversary.

University of Minnesota researchers found a flaw in AT&T and T-Mobile cell towers that reveals the location of phone users. The attack, described in a Research paper (Click to Download Pdf), is most useful for determining whether a target is within a given geographic area as large as about 100 square kms or as small as one square kilometer. It can also be used to pinpoint a target's location but only when the attacker already knows the city, or part of a city, the person is in.

Ph.D. student Denis Foo Kune says, “Cell phone towers have to track cell phone subscribers to provide service efficiently. For example, an incoming voice call requires the network to locate that device so it can allocate the appropriate resources to handle the call. Your cell phone network has to at least loosely track your phone within large regions in order to make it easy to find it“.

The messages contain I.D. codes. In order to match the codes to the cell phone number, researchers called the phone three times. The code that appeared three times in the same time period in which researchers were listening in is most likely the code of the cell phone.“From there we can use that I.D. to determine if you’re around a certain area or if you’re on a particular cell tower,” he said.

The process requires a feature cellphone and a laptop, running the open-source Osmocom GSM firmware and software respectively, along with a cable connecting the two devices. It also uses a separate cellphone and landline.

The attackers use the landline to call the target's cellphone when it's located near the same LAC as the equipment and use the laptop output to monitor the broadcasts that immediately follow over the airwaves to page the target phone.

The implications of this research highlight possible personal safety issues. The group explains their work in a recently presented at the 19th Annual Network & Distributed System Security Symposium and was titled “Location Leaks on the GSM Air Interface”. The group has also contacted AT&T and Nokia with some low-cost options that could be implemented without changing the hardware.

I Hope that this article was helpful, leave a short comment thank you.

Tuesday

Secret codes for samsung, motorola, LG and Nokia


Samsung Secret Codes : 
Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#


LG Secret Codes :

LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#


Motorola Secret Codes :

IMEI number:
*#06#
Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []


Nokia Secret Codes :

*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display(operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that supports WLAN.



Related Articles :

How Hackers can Track your Mobile phone with a cheap setup

Sub7 - Remote Administration Tool

Really Hacked websites by p7771

What is a Certified Ethical Hacker

Cyber Crime

Hacking Ebook - Ethical

How do spammers/scammers earn fraudulant money

Why hackers hack a page in social networks - Facebook Twitter Pinterest Google plus - How to be safe

How To Bypass iCloud Activation Lock on iOS 7 Iphone

Biggest Password database ever - Cracking password

How to reset password for BackTrack 5 VMware image

Remote Administration Tool Tutorial - What is a RAT

Stealth Genie - Cellphone spy anywhere anytime GPS location phone call listening and everything

Free fresh email list 2014 everyday - Free Facebook email list- Free google plus email list -

Real Story about Paypal Hacker - Paypal Hacking 2015

Annuaire téléphonique Djezzy ORASCOM ALGERIE - Hacked Piraté

Batch Windows To KILL Your Computer

[Free Tutorial] How to GeT Any windows version free - Direct Download or Torrent

How to Hack a Facebook Account 

Hack modem ISP and get more internet debit downloading and uploading 

Paypal Hacker Money from Database -- New 2015

BOTNET free download 2015 - pro Hacking

[Cracked] Internet Download Manager v6.21 + CRACK + Patch free direct Download 

How To Root Xperia E1 Dual (D2105) latest Kitkat 4.4.2 

Official ps3 jailbreak 4.75

Facebook Hacker v6.2 - Hack facebook password

Hack Facebook - Update

PayPal Money Generator - NO SURVEY NO PASSWORD FREE

Wifi Hacker V3 - The real or the Scam

Evil Open Directories List and Other Interesting Files

Hack website login using google dork and sql database

Freshly HACKED CreditCards 2015 - Dead

How to surf anonymously



1) anonymouse.org

Surf the web under the illusion that their actions are private and anonymous. Unfortunately, this is not the way it is. Every time you visit a site for a piece of cheese, you leave a calling card that reveals where you are coming from, what kind of computer you use, and other details. And many cats keep logs of all your visits, so that they can catch you! This service allows you to surf the web without revealing any personal information.



It is fast, easy, and it is free too!

2) hidemyass.com

Use this free proxy to surf anonymously online. Proxy to change your IP address, secure your internet connection, hide your internet history and protect your privacy online.

3) pagewash.com



4) breadandwater.info

The website is brought to you via proxy server and your information is kept secret.



I Hope that this article was helpful, leave a short comment thank you.

Unlimited Free SMSs around world



This is a tutorial how to send free SMSs from your computer, let's get started..


1. Click here (http://www.pinger.com/textfree) and click on "sign up FREE"

2. Enter you informations, check the check box, enter captcha and click "create"

3. Enter random US zip code (you can get it from here), chose male or female (doesn't matter) and sellect random age. Then click "find"

4. Chose number you want and click "confirm"

5. If it ask you if you want to share your number with your Facebook friends just click "cancel"

That's it, you registered and now when you want to send someone SMS just click on plus simbol to add their number and everything after is like a chat.

Note: To remove "-Sent from Textfree Web" after every SMS go to options and remove signature ;)


Related Articles : 

How To Bypass Phone and SMS verification of Any Website

Receive SMS Online - 13 Sites List


I Hope that this article was helpful, leave a short comment thank you.

Receive SMS Online - 13 Sites List