Wednesday 21 August 2013

Hay guys I made a video of how you can get a phising page for any social media for free under 2min its real easy so check it out!!!!     http://www.youtube.com/watch?v=wI7yYIUAzbk&list=HL1377118693&feature=player_detailpage

Friday 2 August 2013

Make your computer say anything you want it to using Notepad! Talking PC  

1. Open Notepad and copy the code below.
           
            CreateObject("SAPI.SpVoice").Speak"say this"

2. IT should look like the pic below


3. Now save the file you can name it anything you want just make sure it has a ' .vbs ' for example : speak.vbs

4. You can replace the 'say this' with anything you want your computer to say   CreateObject("SAPI.SpVoice").Speak"say this"

5. Now if you open the file you computer is going to say what you typed, depending on the gender of your pc you will hear a male or female voice (yes computer has a gender!!!!!) 

Awesome looking Matrix hacking code effect using Notepad


1. Open Notepad and copy the code below.


@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t   
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A






2. It should look like the pic below. 


3. Now save it, you can give it any name you want just make sure it is ' .bat ' for example matrix.bat

4. Open the program and it should look like the pic below 


We are on Twitter follow us for tips, tricks and updates @ICDSSoftware


Types of Hackers



There are thee types of hackers white hat, grey hat, and black hat hackers. 

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open. 

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal. 

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.



Hackers can also be divided in to groups as follow
  • Type A (rookie hacker): This type of hacker is interested in new technology and hacks that others are preforming. What distinguishes these hackers from others is that they simply don't have the amount of computer expertise to preform many/any hacks. Every hacker starts out as a Type A.
  • Type B (beginner): Has the know-how to solve basic/intermediate computer problems and write basic programs. If you are a Type B hacker, you will make numerous mistakes, some minor, some fatal.
  • Type C (intermediate hacker): Comfortable fiddling with hardware and software alike. Likes to build computers, root cell phones and tablets, and test all electronic devices to their limits. Most Type C, D, and E hackers have their own websites and networks.
  • Type D (expert hacker): King of all other hackers. Can hack almost any piece of software or hardware in almost every way imaginable. Becoming a Type D hacker takes a lot of practice and dedication.
  • Type E (Business hacker): Turns computer knowledge into cash. Type E hackers can do things for money such as rooting devices, selling custom operating systems and programs, and fixing computer problems. These people are most often also Type C or D hackers.
  • Type F (illegal hacker): Called "crackers" by some, you do not want to be one of these.
Post blank statuses on Facebook 



1. Go to the 'what's on your mind ' Status block and type  @[0:0: ]   or  @[2:2: ]


2. Hit Enter and you should have a blank stat.
New Facebook smileys for chats












[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
 [[f9.sleepy]]
 [[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
 [[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
 [[f9.heartbreak ]]
 [[f9.doctor]]
 [[f9.ghost]]
 [[f9.brb]]
 [[f9.wine]]
 [[f9.gift]]
[[f9.adore]]
 [[f9.angel]]
 [[f9.baloons]]
 [[f9.bowl]]
 [[f9.cake]]
 [[f9.callme]]
[[f9.clap]]
 [[f9.confused]]
[[f9.curllip]]
[[f9.devilface] ]


 [[f9.lying]]