Saturday, August 31, 2013

These sites have their sets of practice problems, practice sessions and competition rounds. Major of the competitions are sponsored by some big shot companies and they also keep a keen eye on the contests, so who knows you might just one lucky person to be selected for a big internship or for a big job. Some of these competitions are held on weekly, monthly or yearly basis where as others have specific dates for competitions. 


TopCoder is indeed the world’s largest competitive software development community where developers from all over the world take part in. The community offers timed programming competitions in various categories like algorithms, testing, design, assembly, SRM, marathon and many others. The competition is sponsored by big names like Microsoft and the NSA and they offer cash prizes for the winners. Solutions can be submitted in Java, C++, C#, or VB.


CodeChef is a non-commercial organization operated by DirectI, an Indian software company based in Mumbai, India. It is a global programming community which hosts online contests, trainings and events for programmers from around the world.

Sphere online judge (SPOJ)

Sphere online judge is one of the earliest competitions, with support for more than 40 programming languages and compilers. The SPOJ platform has been created around an online judge system, which serves for the automatic assessment of user-submitted programs.


CodingBat is a live coding site, which offers problems to build coding skills in Java and Python. The problems here provide instant feedback which also works as a brilliant platform for the coders to practice and grasp the basics of programming.

Google Code Jam

Google Code Jam is an annual programming competition sponsored and supported by Google itself. Here, professional and student programmers provided complex algorithmic challenges to solve using the programming language of their choice in a limited amount of time.

Dream in Code

Dream In Code (DIC) is a online community for programmers and web developers. Members have free access to thousands of programming tutorials, code snippets, forum topics and more.


Codeforces is an online programming platform where you can practice variety of problems and submit competitive ones and compete on problems submitted by other users.

UVa Online Judge

This online coding site is maintained by University of Valladolid, Spain. Here you can find problems from past programming contests such as the ACM International Programming Contest and also one can submit their own source codes in a variety of languages.

Python Challenge

Focused on the Python programming language, Python Challenge is a series of programming challenges. Although any language could be used to solve the puzzles, many of the clues are easier to decipher if you’re working in Python.

Facebook Puzzles

As the name suggests this small set of programming problems is conducted by Facebook to evaluate potential hires. One can submit their solutions in a variety of languages like C++, C, Haskell, Java, Perl, PHP, Python, or Ruby.


ACM – ICPC is one of the world’s largest programming contest conducted annually. The contest is basically sponsored by IBM for teams of students. The contests majorly involves algorithmic programming problems. Regional contests lead to World level Finals. Supports only two languages i.e. C/C++ and Java.

Some other platforms worth a mention including IEEEXtremehackers.orgTimus Online Judge,DWITE

Thursday, August 29, 2013

Android has a got very important place in our Tech World.Now in market you can get many devices running on Android like Smartphones to Tablets, Tablets to Camera and i can simply say that the major Portable device in the market are running on Android.But there is no PC running on Android, So if you want then you can run Android on your PC.
Things needed:
  • Android ROM File you can get any android version ROM file that you want to run.Here i Will be using Android 4.2 Jelly Bean: Download From here
  • Virtual Box Software Download From here

Download all the things needed in this process and then go through the below step to install Android OS on you PC.

  • After Downloading the Virtual Box.Install the Virtual Box on your System and while installing it may ask you to install a new network adapter so not to worry.
  • Now Launch the Virtual Box and create a new virtual machine, this is going to be where you gonna run Android OS.Click on New button and after that name your machine.Now select Linux from Type Drop down list and then other Linux in version.Finally hit Next.
  • Now set the memory Slider to 512 MB or more this is the RAM which Android OS will be using and click Next.
  • Now create a virtual Hard Drive and click on Create.Select VDI and Click Next button and select the Fixed Size button also and final proceed by Clicking Next.
  • Choose how much space do you want to allocate the Virtual Hard disk and also select the Location where do you want to create this disk.
  • Now Select the new virtual machine you created above.Then click on Settings button, then Click on Storage on the left hand side and at the last click on Empty entry in the Storage Tree.
    •  Now select Chose a Virtual CD/DVD disk file from right side menu.And Browser the Android ROM file that you downloaded and Click on open.Now Switch ON your Virtual Machine by Clicking on the Start Button at the top Toolbar.

    Now We Will Install the Android From its ROM file

    • It will Show a Blue Installation Screen like below Screen Shot.Select the Last Option Installation by Scrolling down down from arrow keys and hit enter.
    •  Now Select the Create/Modify Partion option.And Select New at the bottom of the screen and press Enter key.Select Primary option and press enter to create a partion which will occupies your virtual drive.
    • Now select the Boot able option and press enter, select the Write option and press enter, then type yes (to confirm) and press Enter again.Select Quit and choose the partion you created above and press Enter.
    •  Now you will be asked to choose the File System.Choose ext3 File System and select yes to confirm.
    • Now be patient as it will take some minutes to install Android, select yes to install it and select yes again to make the system directory writable.
    • Now Finally you will be Prompted a Congratulation screen showing that you have successfully installed Android OS.Now Just run Android OS by hitting enter.

    Now you are done you installed the Android OS.Now just configure the OS for the first time and enjoy Android !!
    If you find any difficultyin any of above steps feel free to comment below we will help you for sure.Don't forget to share this Awesome article with your friends!! :) - See more at:

    Monday, August 19, 2013

    How to get ip address of facebook friend

      First open notepad and paste this code 

    $ip = $_SERVER['REMOTE_ADDR']; 
    $dt = date("l dS \of F Y h:i:s A"); 
    $data = $ip.' '.$dt."\n"; 
    fwrite($file, $data); 
    header( 'Location: ; 
    Replace the black highlighted text with your picture or page link and now click save as and select all files and name it  as 


    1)Go to any webhosting site like
    2) Signup for an account ( choose a right domain name e.g : )
    3) After creating an account on x10hosting, go to the File Manager and open the public_htmldirectory

    4) Click Upload, and select the PHP file that you created on Step1.4 (ip.php)

    5) Select all permissions from Read/Write/Execute (777)

    Step 3 getting the ip address 

    After setting up an account and uploading the .PHP File, it's time to get IP Address of any Friend on Facebook
    1) Go to the domain that you created in Step2. in my example
    2) You'll see the PHP file that you created, right click>Copy Address Link
    3) The link will be something like this :
    In our example it will be:
    4) Send that link to any of your friends, after he/she clicks on the link, he/she will be redirected to the link that you replaced in step1.3 (in my example : )
    5) Go to your domain name again like step1 (e.g:
    6) You'll see a new text document named ip_log.txt
    7) Click that file, you'll get all IP Addresses of your friends that accessed that link.
    Done!  Now you can track their IP Location using IP Tracer,
                                Please leave comments if it works :D

    Hacking an Gmail,Yahoo,Hotmail emails using Google

                today i will show u how to hack any gmail yahoo etc accounts very easily.
              I have seen the those people who want to hack someones email accounts spend their lots of time on searching but found nothing.Most of noob hackers try to hack someone with phishing attack.But today i am going to show you a very new method which is called hash technique.
    So lets just begin 

    1. open
    2. now paste this code in the search bar and hit enter

      ext:sql intext:e10adc3949ba59abbe56e057f20f883e 

    3. Now click on any of the displayed pages

       4, After clicking you will se these hashes along with the emails

    5. copy any hash code Eg( 127359f404a2b735de9ba1336c66f480) and go to paste the hash code and click descrypt hash  After 2-3 seconds it will
    give u the password if found.
    Some emails wont work they hve changed their passwords or the hash code result is null
    I hope that u will enjoy this tutorial thanks and like us on facebook

    Sunday, August 18, 2013

    Top 10 Interview Puzzles You Should Be Prepared For

    Y.Narayana Reddy | 
    Puzzles, riddles, logical questions, and lateral thinking questions are important part of any selection process for a job interview. Every eligible candidate is first asked to clear the aptitude round and only then the whole interview process puzzlesbegins. These tests are the most objective way of screening a candidate; there is no subjectivity involved at all – either your answers are right or they are wrong. So your future may depend on your ability to pass them. So being good at solving puzzles can you an edge and make the whole hiring process easier. You can check how good you are by answering these top 10 interview puzzles (Don’t google them, try solving and wait for the next blog for answers):
    1. The Two Egg Problem
    You are given two eggs, and access to a 100-storey building. Both eggs are identical. The aim is to find out the highest floor from which an egg will not break when dropped out of a window from that floor. If an egg is dropped and does not break, it is undamaged and can be dropped again. However, once an egg is broken, that’s it for that egg. If an egg breaks when dropped from floor n, then it would also have broken from any floor above that. If an egg survives a fall, then it will survive any fall shorter than that.
    The question is: What strategy should you adopt to minimize the number egg drops it takes to find the solution?.
    2. Heaven’s Gate Problem
    A person dies, and arrives at the gate to heaven. there are three doors. one of them leads to heaven. another one leads to a 1-day stay at hell, and then back to the gate, and the other leads to a 2-day stay at hell, and then back to the gate. every time the person is back at the gate, the three doors are reshuffled. How long will it take the person to reach heaven?
    3.  Jelly Bean Problem
    You have three jars that are all mislabeled. one contains peanut butter jelly beans, another grape jelly jelly beans, and the third has a mix of both (not necessarily a 50/50 mix). How many jelly beans would you have to pull out, and out of which jars, to find out how to fix the labels on the jars?
    4.  King and Wine
    A bad king has a cellar of 1000 bottles of delightful and very expensive wine. A neighboring queen plots to kill the bad king and sends a servant to poison the wine. Fortunately (or say unfortunately) the bad king’s guards catch the servant after he has only poisoned one bottle. Alas, the guards don’t know which bottle but know that the poison is so strong that even if diluted 100,000 times it would still kill the king. Furthermore, it takes one month to have an effect. The bad king decides he will get some of the prisoners in his vast dungeons to drink the wine. Being a clever bad king he knows he needs to murder no more than 10 prisoners – believing he can fob off such a low death rate – and will still be able to drink the rest of the wine (999 bottles) at his anniversary party in 5 weeks time. Explain what is in mind of the king, how will he be able to do so ? (of course he has less then 1000 prisoners in his prisons)
    5. Four Ships Puzzle
    Four ships are sailing in four different directions. Each ships traverses a straight line at constant speed. No two ships are traveling parallel to each other. Their journeys started at some time in the distant past. Sometimes, a pair of ships collides. A ship continues its journey even after a collision. However, it is strong enough only to survive two collisions; it dies when it collides a third time. Now, five of six possible collisions have already taken place (no collision involved more than 2 ships) and two ships are out of commission.What fate awaits the remaining two?
    6. How to Escape?
    A man is trapped in a room. The room has only two possible exits: two doors. Through the first door there is a room constructed from magnifying glass. The blazing hot sun instantly fries anything or anyone that enters. Through the second door there is a fire-breathing dragon. How does the man escape?
    7.  Truthtown or Liartown?
    You’re trying to get to Truthtown. You come to a fork in the road. One road leads to Truthtown (where everyone tells the truth), the other to Liartown (where everyone lies). At the fork in the road is a man from one of those towns — but which one? You get to ask him one question to discover the way. What’s the question?
    8.  Age of the Children
    A man walks into a bar, orders a drink, and starts chatting with the bartender. After a while, he learns that the bartender has three children. “How old are your children?” he asks. “Well,” replies the bartender, “the product of their ages is 72.” The man thinks for a moment and then says, “that’s not enough information.” “All right,” continues the bartender, “if you go outside and look at the building number posted over the door to the bar, you’ll see the sum of the ages.” The man steps outside, and after a few moments he reenters and declares, “Still not enough!” The bartender smiles and says, “My youngest just loves strawberry ice cream.” How old are the children? A variant of the problem is for the sum of the ages to be 13 and the product of the ages to be the number posted over the door. In this case, it is the oldest that loves ice cream. Then how old are they?
    9.  3 light switches 
    You have a set of 3 light switches outside a closed door. One of them controls the light inside the room. With the door closed from outside the room, you can turn the light switches on or off as many times as you would like. You can go into the room – one time only – to see the light. You cannot see the whether the light is on or off from outside the room, nor can you change the light switches while inside the room. No one else is in the room to help you. The room has no windows.
    Based on the information above, how would you determine which of the three light switches controls the light inside the room?
    10. Chasing Dog
    There are four dogs each at the corner of a unit square. Each of the dogs starts chasing the dog in the clockwise direction. They all run at the same speed and continuously change their direction accordingly so that they are always heading straight towards the other dog. How long does it take for the dogs to catch each other and where?

    Saturday, August 10, 2013

    Using Google to Find Passwords.
    Method 1: Facebook!
    We will be using a google dork to find usernames and passwords of many accounts including Facebook!
    The Dork: intext:charset_test= email= default_persistent=
    Enter that into Google, and you will be presented with several sites that have username and passwords lists!
    Method 2: WordPress!
    This will look for WordPress backup files Which do contain the passwords, and all data for the site!
    The Dork: filetype:sql inurl:wp-content/backup-*
    Method 3: WWWBoard!
    This will look for the user and passwords of WWWBoard users
    The Dork: inurl:/wwwboard/passwd.txt
    Method 4: FrontPage!
    This will find all users and passwords, similar to above.
    The Dork: ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-"
    Method 5: Symfony!
    This finds database information and logins
    The Dork: inurl:config/databases.yml -trac -trunk -"Google Code" -source -repository
    Method 6: TeamSpeak! (big one!!!!!)
    This will search for the server.dbs file (a Sqlite database file With the SuperAdmin username and password!!!)
    The Dork: server-dbs "intitle:index of"
    Method 7: TeamSpeak2!!! (also big!)
    This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for "superadmin account info:"
    The Dork: "inurl:Teamspeak2_RC2/server.log"
    Method 8: Get Admin pass!
    Simple dork which looks for all types of admin info
    The Dork: "admin account info" filetype:log
    Method 9: Private keys! (not any more!)
    This will find any .pem files which contain private keys.
    The Dork: filetype:pem pem intext:private
    And the Ultimate one, the regular directory full of passwords....
    Method 10: The Dir of Passwords!
    Simple one!
    The Dork: intitle:"Index of..etc" passwd

    Friday, August 9, 2013

    After writing Real Python for the Web, I've mostly been coding in the high-level frameworks. Recently, thanks to an awesome gig, I re-introduced myself to Flask, which is "a microframework for Python". Flask is a tool and a platform. Like any other tools there are right and wrong ways to use it. Unlike some other tools, however, it can be a little unclear how to get started and correctly use it.


    Before we get started on how to use Flask, let's talk a little about the best practices and where some of the design ideas come from.
    I've been developing web applications with Django for about a year and a half now. Django adheres to the "Don't Repeat Yourself" policy. One of the many reasons people use Django as their web-framework of choice is because it comes with equipped with a number of tools out of the box. Because so much is built in and because of the way Django is designed there is a "django" way of doing things. If you look at enough Django apps you'll start to see the patterns emerge and get a feeling for how to use it.
    Most of the design patterns that I've seen emerge in Django projects are in line with some of Python's core principles. Python is itself a tool. In order for Django to be an effective tool it must use the tools it is constructed from correctly. If you didn't already know, Python has some coding "guidelines" that can help you figure out how to best use it.
    They're called the Zen of Python.
    To give them a read, simply open a python interpreter and type-
    >>> import this
    -and then you'll see
    The Zen of Python, by Tim Peters
    Beautiful is better than ugly.
    Explicit is better than implicit.
    Simple is better than complex.
    Complex is better than complicated.
    Flat is better than nested.
    Sparse is better than dense.
    Readability counts.
    Special cases aren't special enough to break the rules.
    Although practicality beats purity.
    Errors should never pass silently.
    Unless explicitly silenced.
    In the face of ambiguity, refuse the temptation to guess.
    There should be one-- and preferably only one --obvious way to do it.
    Although that way may not be obvious at first unless you're Dutch.
    Now is better than never.
    Although never is often better than *right* now.
    If the implementation is hard to explain, it's a bad idea.
    If the implementation is easy to explain, it may be a good idea.
    Namespaces are one honking great idea -- let's do more of those!
    These are words to code live by. Read here for a more detailed explanation.
    The Zen of Python not only applies to raw Python code but to Python projects as well. Like anything else it will take you a fair amount of practice to really 'get' these.
    Why did I bother bringing these ideas up? Because they'll make you a better coder, make your life as a coder easier and make you easier to work/code with. It's also the 'right' way to use Python.
    How does all of that relate to Flask? Well, when you use Flask as a tool to solve your problems, these guidelines can help you avoid trouble and unnecessary work.

    Flask is a Microframework

    Before using any tool you should read the instructions. In this case that's the documentation for the project. This will give you a good idea "about the purpose and goals of Flask, and when you should or should not be using it".
    To start, the term 'microframework' might be a bit misleading:
    “Micro” does not mean that your whole web application has to fit into a single Python file, although it certainly can. Nor does it mean that Flask is lacking in functionality. The “micro” in microframework means Flask aims to keep the core simple but extensible. Flask won’t make many decisions for you, such as what database to use. Those decisions that it does make, such as what templating engine to use, are easy to change. Everything else is up to you, so that Flask can be everything you need and nothing you don’t.
    There are a lot of good ideas there. While Django is/can be a full solution without any add-ons, forcing you to do things the 'Django' way, Flask is a much simpler platform that gives you a good enough starting point but lets you finish in your own way.

    Measure Twice Cut Once

    Before you start writing any code plan out how your project is going to work. Break your project down into groups that share common functionality, define your models, views, routes, etc. The more planning you do the easier the coding should be.
    When designing your application you should think of your end goals:
    • How big is this application going to be?
    • How many people are going to use it?
    • What are my performance requirements?
    • How many people are going to be contributing code?
    Think about how your application is going to work. Do some research, look at how other people have solved the same problem or a similar problem.
    Next think about how your project is going to work. This is different than how your application will work. How are you going to structure your work environment? How are you going to make it easy to expand your project? How are you going to keep your workspace clean? How are you going to track bugs down and fix them?
    After meditating on those questions, documentaing your answers, and altering your plans accordingly, you can move on to setting up your project.

    Starting a Project

    If you haven't gone through the Flask Quickstart Tutorial, I suggest you do that first.
    You could use something like Flask-Boilerplate to start off. However, I'm going to start with a blank directory and work towards something we can use as a boilerplate setup.
    1. First create a directory for your project:
      $ mkdir flaskapp && cd flaskapp 
      (replace flaskapp with the name of your application)
    2. Then inside of flaskapp create the following files:
      $ touch app.db requirements.txt
      Initial structure:
      ├── app.db
      ├── requirements.txt
      The top level of our project houses the scripts we'll use to run and manage our application.
    3. Then create a directory called app
      $ mkdir app
      And inside of it put:
      $ touch app/ app/
      ├── app
      │   ├──
      │   └──
      ├── app.db
      ├── requirements.txt
    4. And then create a directory for our static assets and one for our templates:
      $ mkdir app/static app/templates
      ├── app
      │   ├──
      │   ├──
      │   ├── static
      │   └── templates
      ├── app.db
      ├── requirements.txt
    Everything inside of the app directory is what our application will run off of.

    Project Environment/Work Flow

    There are a couple of things that your project environment needs before you can start working on your app.
    1. First thing you need to do is set up virtualenv to manage your python workspace and setup a requirements.txt file, which are both vital to any project. If someone else clones your codebase they can use virtualenv and requirements.txt to get up and running with the correct version of all of the necessary dependencies for your project.
      $ virtualenv venv --distribute
      and then
      $ source venv/bin/activate
      to activate it.
    2. I'm a fan of git for source control - but you can really use whatever you want.
      To set up a git repository for your project do the following:
      Make a .gitignore file so git knows what to ignore
      $ touch .gitignore
      And then put this inside of it
    3. Next you need to instantiate the git repo:
      $ git init
      $ git add .
      $ git commit -m "first commit"
      If you have a Github account you can make a repo there and then push there.
    4. Finally we want to set up some documentation standards for our project. This can range from just leaving comments in your code to having something read all of your code and then create .html files from it so your documentation is traversable and readable.
      Personally I like docco. It outputs beautifully formatted documentation and lets you use markdown in your comments. However, docco is a documentation generator for javascript/coffeescript. Fortunately for us there is a python port called pycco.
      We can add pycco to our requirements.txt and whenever someone goes to get set up to work on our project it'll be already installed in their virtualenv.
      Our requirements.txt so far will read:
      To install everything from here to our virtualenv run
      $ pip install -r requirements.txt
      To run pycco and document all of your code run
      $ pycco ./*.py
      Pycco will traverse your project and store all of your documentation in a docs directory. Check it out.

    Adding Applets and Modules

    All of the project modules/appletts for our app go inside of their own directory inside of the app directory:
    ├── app
    └── module
    Let's use a forum app as an example. One module would be the users of the forum. Inside of app/users you'd put all of the code that manages your application's users: logging in, registration, account management. Then you'd also have a forum module that would have all of the code related to forum posts: posting, commenting, editing.
    Now, say for some reason you needed to have search functionality for both forums and users. Instead of writing separate search code in both the users and forum modules, you could just make a search module that can be re-used in both user and forum.
    Any further functionality related to users would obviously go in users, etc.

    Modules vs. Extensions

    Remember all that extra stuff that Django had built in that Flask purposely left out? Well, you can add those features using Flask Extensions.
    "Flask Extensions extend the functionality of Flask in various different ways. For instance they add support for databases and other common tasks"
    If we need to add support for a database connection (usually you do) we can either write our own (bad idea) or use an extension.
    Take a look around the Flask Extensions page and see what's available.
    Instead of reinventing the wheel and writing your own solution, you can use code that someone else wrote and that other people are currently using. If you run into a bug or don't know how to use it, other people may have a solution.
    However, do keep in mind that depending on other people's solutions has its own share of problems. For starters you are dependent on that person to not only write quality code but that s/he continues to maintain the code. Also, in production environments much time is spent solving the "why doesn't this thing that someone else built work they way I expected" problem - which can be difficult to debug if you are not aware of all the intricacies invoked in the other person's code.

    Wrapping Up

    That's it for this post.
    In Part II, I'll use the concepts developed in Part I to create an application and use some Flask Extensions. We'll explore some more best practices for writing views, templates, models, integrating and managing a database, static files, and forms.
    In Part III, we'll explore writing tests for your application and debugging errors.
    And to finish everything off, Part IV will focus on Flask Blueprints, writing a REST JSON API, Accepting Payments, Deployment on Heroku with Fabric and basic A/B Feature Testing
    Thanks for reading and tune in next time! Oh, and here's the final structure of our basic app:
    ├── app
    │   ├──
    │   ├──
    │   ├── module
    │   │   ├──
    │   │   ├──
    │   │   ├──
    │   │   ├──
    │   │   └──
    │   ├── static
    │   └── templates
    ├── app.db
    ├── docs
    │   ├── config.html
    │   ├── pycco.css
    │   ├── run.html
    │   └── shell.html
    ├── requirements.txt
    facebook Hacking Method 2013 All:

    1 - Android Remote Adminstrator Tool - A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling Android Phones, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it. 

    Here More Information - 

    2- Remort Administrator Tool - A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet. RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.

    How To Create RAT - 
    You Tube Link -
    Download Link - 
    Download Link 2 Official Website - 
    Pdf Version -

    3- Keylogger - Keyloggers are programs which record each keystroke on the computer they are installed on. This provides a complete log of text entered such as passwords, emails sent and websites visited. This log can then be automatically sent over a remote connection without the person using the computer necessarily knowing about it. Because of this, keyloggers are typically associated with malicious software and they will usually be picked up and removed by virus scanners. However, there are also keyloggers which are commercially available for home or office use. In this way, keyloggers have a distinct set of purposes which make them very useful in certain situations. 

    How To Create Keylogger - 
    You Tube Link -
    Download Keylogger -
    Pdf Version -

    4- Phishing - In computing, phishing is a form of criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as well. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, and technical measures.

    How To Create Facebook Fake Login Page -
    You Tube Link -
    Download fake Login Page -
    Pdf Version -

    5- Click-Jacking - Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker. 

    What Is Clickjacking ? How It's Work ? - 
    You Tube Link -
    Advanced Tutorial ClickJacking - 
    Pdf Version -

    6- Tabnabbing - Tabnabbing is a computer exploit and phishing attack, which persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine. The attack's name was coined in early 2010 by Aza Raskin, a security researcher and design expert. The attack takes advantage of user trust and inattention to detail in regard to tabs, and the ability of modern web pages to rewrite tabs and their contents a long time after the page is loaded. Tabnabbing operates in reverse of most phishing attacks in that it doesn’t ask users to click on an obfuscated link but instead loads a fake page in one of the open tabs in your browser. 

    What Is TabNabbing ? How It's Work -
    You Tube Link - 
    TabNabbing In Backtrack 5 -
    Pdf Version -

    7- Session Hijacking - The Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token. Because http communication uses many different TCP connections, the web server needs a method to recognize every user’s connections. The most useful method depends on a token that the Web Server sends to the client browser after a successful client authentication. A session token is normally composed of a string of variable width and it could be used in different ways, like in the URL, in the header of the http requisition as a cookie, in other parts of the header of the http request, or yet in the body of the http requisition. The Session Hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server. 

    What Is Session Hijacking ? How It's Work ? - 
    You Tube Link -
    Pdf Version -

    8- Side Jacking Using Fire Sheep - HTTP session hijacking, better known as “sidejacking”, poses a major threat to all internet users. This is due to the common use of Wi-Fi networks, which are inherently unsecure, but also because of the wide-spread misplaced trust in the safety of internet use on phones and perceived secure connections. It has been demonstrated that wired networks are also not necessarily safe from sidejacking attempts and even your interactions in an App store can be at risk as well.

    If you are logging into Facebook using the open Wi-Fi network at your local watering hole, an individual with a simple tool such as Firesheep can gain access to your account, change your password, and then potentially take advantage of other programs linked to that account. These sidejacking attacks can be done without any programming knowledge and the problem isn’t simply limited to the unencrypted Wi-Fi networks we are familiar with. Firesheep can be used to intercept information sent over any unencrypted HTTP session, whether it is wired or wireless. And what can a Sidejacker do with my connection to an App store, you may wonder? Great question! Elie Bursztein at Google cites the various ways your App browsing and buying can be compromised. It can be everything from password stealing to App swapping, when an attacker’s malware App is downloaded instead of the actual App that was paid for.The industry is slowly starting to adapt the practice of always on SSL to protect users, including in App stores. The implementation of always on SSL, or end-to-end encryption using HTTPS, is a great place to start. It is natural to visit a website and feel secure because you have logged in to your account with a unique username and password, but the problem is that if the rest of the traffic is not encrypted, a Sidejacker can gain access to the vulnerable cookie and then manipulate any personal information within the account. However, when a website is secured with HTTPS from the time of first access to the time you leave, the entire session is encrypted in a way that prevents your information from being compromised.

    What Is SideJacking Using FireSheep ? -
    You Tube Link -

    9 - ARP Poisoning - Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control (MAC) address is changed by the attacker. Also, called an ARP spoofing attacks, it is effective against both wired and wireless local networks. Some of the things an attacker could perform from ARP poisoning attacks include stealing data from the compromised computers, eavesdrop using man-in-the middle methods, and prevent legitimate access to services, such as Internet service.

    A MAC address is a unique identifier for network nodes, such as computers, printers, and other devices on a LAN. MAC addresses are associated to network adapter that connects devices to networks. The MAC address is critical to locating networked hardware devices because it ensures that data packets go to the correct place. ARP tables, or cache, are used to correlate network devices’ IP addresses to their MAC addresses.In for a device to be able to communicate with another device with a known IP Address but an unknown MAC address the sender sends out an ARP packet to all computers on the network. The ARP packet requests the MAC address from the intended recipient with the known IP address. When the sender receives the correct MAC address then is able to send data to the correct location and the IP address and corresponding MAC address are store in the ARP table for later use.

    ARP poisoning is when an attacker is able to compromise the ARP table and changes the MAC address so that the IP address points to another machine. If the attacker makes the compromised device’s IP address point to his own MAC address then he would be able to steal the information, or simply eavesdrop and forward on communications meant for the victim. Additionally, if the attacker changed the MAC address of the device that is used to connect the network to Internet then he could effectively disable access to the web and other external networks.

    What Is ARP Poisoning How It's Work - 
    ARP Poisoning Advanced tutorial - 
    You Tube Link -
    Pdf Version -

    10- Stealers - It is a small software which steals passwords that are stored in our web browsers, chat apps such as yahoo messenger .etc , Stealer's then send these stolen passwords to the Hackers FTP server, Usually Stealer's look like keyloggers but there are many differences, Stealer's steal only passwords that stored in the web browsers they wont capture keystrokes typed by the user

    What Is Stealers How It's Work - 
    Advanced tutorial -
    You Tube Link -

    11 - Java Drive By - A Java Drive-By is a Java Applet that is coded in Java and is put on a website. Once you click "Run" on the pop-up, it will download a program off the internet. This program can be a virus or even a simple downloader. If you'd like to get the source code or wanna know more information about a Java Drive-By, use Google.

    What Is Java Drive By ? How It's Work -
    You Tube Link - 
    You Tube Link For Noobs Peoples -

    12 - Cookie Stealing Attack - Cookies are small files that stored on users computer by websites when a user visits them. The stored Cookies are used by the web server to identify and authenticate the user .For example when a user logins in Facebook a unique string is generated and one copy of it is saved on the server and other is saved on the users browser as Cookies. Both are matched every time the user does any thing in his account. So if we steal the victims cookie and inject them in our browser we will be able to imitate the victims identity to the web server and thus we will be able to login is his account . This is called as Side jacking .The best thing about this is that we need not no the victims id or password all we need is the victims cookie.

    What Is Cookie Stealing Attack ? - 
    You Tube Link -

    13 - Social Engineering - Social engineering is the use of deception and manipulation to obtain confidential information. It is a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. In anti virus computer security software, social engineering is generally a hacker's clever manipulation of the natural human tendency to trust. The hacker's goal is to obtain information that will gain him/her unauthorized access to a system and the information that resides on that system. Typical examples of social engineering are phishing e-mails or pharming sites.

    What Is Social Engineering ? - 
    You Tube Link - 
    Pdf Version -

    14 - Botnets - Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

    What Is Botnet ? How It's Work ? - 
    You Tube Link - 
    Pdf Version -

    15 - Man In the Middle Attacks - A Man-in-the-Middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-Middle attacks can be abbreviated in many ways including, MITM, MitM, MiM, or MIM.

    How They Work ? What Was That -
    You Tube -
    Pdf Version -

    ( This Tutorial Was Written By Nakul Mohan (Cia) And Edward Maya ( Ghost Shell ) )
    ( We Are Anonymous We Are Legion We Do Not Forget We Do Not Forgive Expect Us. )

    All information in this tutorial is for educational purposes only. Any illegal activity relating to this tutorial is not my responsibility, although I would like to say I don't care how you use it, I do. So please do not use this for Black-hat activities. One day when you grow up you might realise that you have been a skid, by using mass-deface techniques and SQLi for your entire life. Do not just hack a site because it is there. I have a few sites of my own and its annoying, unproductive, and pointless.