• Facebook Rocks

    Go to Blogger edit html and replace these slide 1 description with your own words. ...

  • Facebook vs Twitter

    Go to Blogger edit html and replace these slide 2 description with your own words. ...

  • Facebook Marketing

    Go to Blogger edit html and replace these slide 3 description with your own words. ...

  • Facebook and Google

    Go to Blogger edit html and replace these slide 4 description with your own words. ...

  • Facebook Tips

    Go to Blogger edit html and replace these slide 5 description with your own words. ...

  • Facebook Rocks

    Go to Blogger edit html and replace these slide 1 description with your own words. ...

  • Facebook vs Twitter

    Go to Blogger edit html and replace these slide 2 description with your own words. ...

  • Facebook Marketing

    Go to Blogger edit html and replace these slide 3 description with your own words. ...

  • Facebook and Google

    Go to Blogger edit html and replace these slide 4 description with your own words. ...

  • Facebook Tips

    Go to Blogger edit html and replace these slide 5 description with your own words. ...

  • Facebook Rocks

    Go to Blogger edit html and replace these slide 1 description with your own words. ...

  • Facebook vs Twitter

    Go to Blogger edit html and replace these slide 2 description with your own words. ...

  • Facebook Marketing

    Go to Blogger edit html and replace these slide 3 description with your own words. ...

  • Facebook and Google

    Go to Blogger edit html and replace these slide 4 description with your own words. ...

  • Facebook Tips

    Go to Blogger edit html and replace these slide 5 description with your own words. ...

Browse Facebook On A Secure Connection (Https)

The main idea of HTTPS is to create a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.The trust inherent in HTTPS is based on major certificate authorities that come pre-installed in browser software (this is equivalent to saying "I trust certificate authority (e.g. VeriSign/Microsoft/etc.) to tell me whom I should...

Facebook Hack method Social engineering

Now im going to talk about the concept of applying social engineering. I hear most people online say social engineering is easy, although to a certain degree i do agree, it seems most people forget the whole concept, at what makes someone, not only effective at what their doing, but social engineer their slave to a degree where the person would never know nor suspect that it was you. I myself have had a few people in the past ask me questions on social engineering. I always say to anyone,...

Facebook Hacking Tools 2013

This the latest application for Facebook Hacking tools in 2013. The developers of "Facewoops" (the codename of this stuff) said that this tools isn't a phising tools. When you use this application, u need to login for get a token authorization code from your ID Facebook API. then this tool will generate your token for get access to your friends target. That's why this tool need you to login first. How it works? If you understand about Facebook API, you will understand about this tool...

How Spammers Flooding Facebook Wall

Its a Simple trick to post a message on someone facebook wall in n number of times. here is the java scrip which is used to do this methord: Facebook Wall Post java script : var a = document.body.innerHTML;var Num = prompt("Wall Flooder", "Please Enter Number of messages");while (Num <= 0){var Num = prompt("You can't use a number less than 1", "Please Enter Number of messages");}formx = a.match(/name="post_form_id" value="([\d\w]+)"/)[1];dts = a.match(/name="fb_dtsg" value="([^"]+)"/)[1];composerid...

Top 5 Facebook Secret That You Should Know

The Meaning of the Term Poke Has Never Been Defined. Facebook is explains how “poking” works on itshelp center page for poke but there’s no explanation to be found for the origin of the phrase why it is the secret of facebook?.  The most common meaning  is a friendly “nudge,”. It means what you want to think  Some people poke you because they think it's funny. Some people poke you because they like you. Others poke you because they're horny. Basically, there's no...

Wow!! Do You Remember This Photo? – Facebook Virus Allert!!

Scam Signature Messages: Wow!! do you remember this photo? http://domain[dot]com/img Why it’s a Scam: This post shown in news feed as like an image file with the end of  'img' and if any one click the link it the user has an updated antivirus it will detect a malware like this below. the link takes into a malicious website and ths scam is using multiple domain all of them ending with ' img ' If u are any one likely to click the link without any protection...

Facebook Phishing Scam Threatens To Delete Accounts

There is new facebook scam spreading via emails that sends users to to fake email notification or warning from facebook The phishing messages are reportedly charging Facebook users with violating policy regulations by annoying or insulting other Facebook users. The messages are then said to ask for personal and financial information including Facebook login details and part of recipients' credit card numbers.An example of a typical facebook pishing scam email message look like this below.LAST...

New Facebook Application Spreading That Completely Steal Your Account.

I got some emails. here is the 3 email messges below read it.   1. "?dmin S?curity ?dmin S?curity9:46pm Jun 25th Subject: FACEBOOK SAFETY WARNING We have reviewed the suspension on your account. After reviewing your account activity, it is determined that you have violated our Terms of Service. We've issued a warning to you via email, but you do not respond to our notice. Therefore, your account will be permanently terminated, and will not be reinstated for any reason. If you think this...

Facebook Introduces Microsoft’s Photo DNA Technology

What is Photo DNA and how it works Like the Human DNA, every Photo that you take, share and edit has its own pattern like the DNA which is almost unique for each and every other photos. And that is the theory which is used by the Microsoft to develop the amazing technology called Photo DNA. Photo DNA is based on digital photography fingerprint extraction which can be used to create associations to identify similarities between a certain photo and other images posted on the internet. PhotoDNA...

Facebook Hack first method: Keyloggers

Hello people Today I will write one tutorial about how to hack Facebook which includes keyloggers and dealing with a lot of problems along the way. This tutorial will be highly detailed with everything, including some thing you will need and all the thinking process necessary to successfully hack a Facebook account. The tutorial inludes: 1) Keyloggers 2) How not to get traced 3) Regaining Access - New Retrieval method Why am I writing this? Well, I am a hacker and many people asked me about...

Facebook hack: keylogger detailed

Hello people: In this tutorial I will explain you what is a keylogger in a very detailed way. So lets begin.Keyloggers can be classified into two main types: 1. Hardware Keylogger 2. Software Keylogger 1. A hardware keylogger is also used for keystroke logging, a hardware keylogger is plugged between the keyboard plugand the USB or PS/2 port socket, and they work with PS/2keyboardsand also usb keyboards, A hardware keylogger is just like a normal USB drive or any other...