How to Upload Pictures from PC to WhatsApp Using Bluestacks

  For the readers who wanted to install WhatsApp on PC, I have already written an article on how to install WhatsApp on PC in windows. WhatsApp is the most famous messenger with about 400 million monthly active users.It is free for the first year and charges 0.99 cents there after every year.
  You can actually install WhatsApp through a software called Bluestacks and the whole process is very clearly explained in my previous article "how to install WhatsApp on PC in windows".

How To Use WhatsApp And Other Android Apps In PC ?

Today Iam here with a new article on how to install whatsApp on your PC or computer.

WhatsApp is a messenger  which became very famous  and there are about 400 million monthly active users for it.Though other messengers like viber ,we chat have given a tough competition, it did not moved away from it's top position in the field of messaging.One can send unlimited number of messages and that too very fast.For the first year it is  free and the from the second year the cost is 0.99cents per year.

Most of us know that WhatsApp is only for mobiles but we can also install whatsApp on PC or computer and can use it  in the same way as of mobile.Now let us see a step by step procedure for installing whatsApp on computer.

Hack windows-7 or 8 Password Easily Without Any Tool or Software

In This Post I Will Teach You To Hack a Forgotten Password of Windows 7 and Windows 8..




 Many of the peoples are changing their passwords and atlast they are forgetting it. But sadly they are formatting their PC and losing their informative datas...

Here is the way How to manage it..

Keep Reading..
 You can follow me by Step by step:


Kali linux:The New Version of BackTrack-The Most Advanced Penetration Testing Distribution, Ever

I'm gonna tell you about an OS - Kali Linux. With Kali Linux, hacking becomes much easier since you have all the tools (more than 300 pre-installed tools) you are probably ever gonna need. Others can be downloaded easily. Now this tutorial will get you started and you'll be hacking with Kali Linux before you know it.

       From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system.

Kali Linux is similar to BackTrack in many ways, but it lays a new foundation and makes substantial improvements that will allow it to be even more useful to penetration testers in the coming years.



How To Run Backtrack On Windows Using Virtualbox

         In this post I am going to tell you how to install Virtual Box on Windows and Mac and use 2 operating systems simultaneously.If you want to use MAC,Backtrack,etc on your Windows operating system you can use many different kinds of softwares. Virtual Box is one of those softwares using which you can use Windows,Backtrack on your Mac operating system without even restarting your system and vicecversa. We taking here example as Backtrack on windows means How to Install Backtrack on your running windows OS.

Downloading Virtual Box

The very first thing you need to do download Virtual Box. Virtual Box is available for free of cost. If you are using Mac Operating system and want to use windows on Mac, you need to download “OS X Hosts” DMG file for that purpose. Download virtualbox from following links as per your requirements.

How to Boost Your Wi-Fi Signal Using a Beer Can

Boost Your Wi-Fi Signal in a Easy Method

        So internet is used by everyone and if you are at home you will always want that your whole house is covered by Wi-Fi so that anytime, anywhere you can access it so internet speed is must at long distance well now you can get some nice Wi-Fi Boosting using a simple and efficient Beer Can well I grabbed this amazing trick from Discovery Channel’s Website and I am posting it on my website. via - discovery
  1. boost-wifi-beer-canEmpty a Beer can obliviously after drinking that and than you have to make sure that its washed thoroughly so that there is no smell or anything left by that liquid Beer, because if anything's is left than it will be a problem and smell will be there in your whole room.
  2. Now after washing that Beer Can thoroughly you have to remove that small can opening piece you can see that in the image on the right hand side.
  3. Now after you have removed the small can opening piece you can to cut the can in the round diameter like in the image on the right hand side, we are doing this because we have to open that can and make a shape like small antenna.
  4. So now you have to repeat the same step on the other corner but this time you have to leave small space between the cuts so that the can remains attached to the bottom and we will have a look of antenna for our modem - router for boosting purpose. So remember this step is really important to follow else your antenna will not look like how it should be.
  5. So now the main steps are completed, now you have to cut the can vertically from between like in the image on the right hand side. and your antenna will take looks like how it should be and now you only have to attach this antenna to your modem so that we can se its effect.
  6. Now last step is too attach this antenna to your modem - router, you can use any adhesive or M-Seal which has really a good hold, so in this step you can change directions of your antenna suiting your will, like in which direction you want it too boost the signal.
  7. Now your antenna is ready for boosting purpose and it will look something like below you can check the image below.
beer-can-wifi-boost

Please try it out...and share..

BackTrack:The Ultimate Linux Based Hacking OS

HELLO, Today I am posting about BackTrack Which is the best tool used for hacking...!

What is BackTrack? How to use it?

Backtrack is Linux Based Penetration Testing Operating system which provides many inbuilt tools which are used for vulnerability assessment, exploitation and penetration testing. Apart from using metasploit framework on backtrack there is a complete series of "Exploitation Tools".It is a custom distribution designed for security testing for all skill levels from novice to expert. It is the largest collection of wireless hacking, server exploiting, web application assessing, social-engineering tools available in a single Linux distribution.  
BackTrack Linux is a fine example of a specialized Linux distribution. Its only purpose is to test your network, devices, and systems for security vulnerabilities. BackTrack is packed with every security and hacker tool used by security professionals and professional hackers. If you're looking for all of the tools in one place, this is it. 
You must love the command line to use this distro, although it does contain a few graphical tools, such as zenmap and wireshark. Even in graphical mode (which comes up with the Gnome desktop), most of the applications open in a terminal window. Fortunately, each command line application opens and displays the help text so you can refer to the command reference right there on the screen. 

Make your Computer Welcomes You On Start-up

    Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome. 

Then here you can learn how you can make your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."
Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-

Cool Keyboard Trick - Make a Disco In your Keyboard

Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows.
This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.


To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-

Hack Saved Passwords From Browsers (see passwords behind ASTERISK using java-script)

Today I am going to share a JavaScript method to see the password behind the asterisk in your browser. You have to just follow these given steps to use this trick:

STEP 1
First of all create a new bookmark in your browser , give it any name. e.g: View Password.
And click on save.

AIMP3: An Excellent Music Library And Player

          Music players come and go. Yesterday, a particular player might’ve been the #1 music library manager. Tomorrow, a new music player could come out and decimate the current competition. The cycle has always been true and will always stay true. Does AIMP3 offer enough to be that music player?

Snagit 11-Full Version- The Best Screen Capture Ever..!

      SnagIt, the award-winning screen-capture software. Using SnagIt, you can select and capture anything on your screen, then easily add text, arrows, or effects, and save the capture to a file or share it immediately by e-mail or IM. Capture and share an article, image, or Web page directly from your screen. Or, capture and share any part of any application that runs on your PC. Automatically save in one of 23 file formats, or send to the printer, to your e-mail, or to the clipboard. Use SnagIt’s built-in editors to modify, annotate, and enhance your images and the Catalog Browser to organize your files. Increase your productivity while quickly creating professional presentations and flawless documentation. With powerful new features that allow you to edit previously placed objects, capture embedded links and add interactivity to your captures, SnagIt 11 makes it easier than ever before to capture, edit, and share anything on your screen.

     

How To Detect Who Is Stealing Your WiFi Network

           Who doesn’t like things which come for free, and for sure free Wireless network is one of the best things you can ask for. Surprisingly, the network statistics for 2014 confirm that stolen Wireless Network is one of the biggest network-related threats that the world is facing. Wireless Networks are generally stolen because we forget to secure it at times, however hackers can still bypass security, here’s how you can detect devices stealing WiFi instantly. Good thing is that you don’t really need much knowledge to follow this tutorial.
devices stealing wifi network

10 Ways To Download Torrent Files With IDM

            How to Download Torrent files via IDM or with any download managers? Without using Torrent softwares too..

       In this tutorial I will explain how to download torrents with idm with 10 times faster as compared to torrent download manager.No other download manager can perform like internet download manager. First How to Download IDM?

HOW TO COPY TEXT FROM ANY IMAGE USING MICROSOFT ONE-NOTE

 Sometimes we come across a image in which some useful text is written and we want to copy that text but it takes too much time to type text from the image so now this post is going to save your time. I’ll show you to copy text from any image very easily just read and follow these given steps to copy text from any image and please share this post with your friends also to spread information.



Step 1
First of all you need Microsoft OneNote. It comes with Microsoft Office package. [ I am using Microsoft Office 2010].

File Transfer For PC - Send Files From PC to PC

Transfer Your Files To Other Computers Over Wi-Fi Network

       CC File Transfer is free web based file transfer software built for people that need to transfer files PC to PC regularly. It helps you share files, photos, music and video with your friends. This file transfer program eliminates the hassles of FTP and limitations of email file transfer especially for transferring large files. The simple interface makes transferring files as easy as dragging and dropping files. It can transfer files over the Internet or LAN/home network even transfer files from Windows to Linux / Mac OS.

Introduction of CC File Transfer

Doesn't it drive you crazy that to just swap a few files with your friends you'd have to be a computer expert, capable of deploying a file server, handling permissions settings, comprehending a lot of stuff you're likely to never use afterwards? How about just uploading the files you want to exchange through your web browser and downloading your friends' files just the way you'd normally download a file off the Net?

SHUTDOWN YOUR PC FROM YOUR SMARTPHONE

 Here i am posting a new trick to shutdown your PC from your smartphone.You can do something more instead of shut down. You can also Lock, unlock, restart, take screenshot of current screen or use your device as wireless mouse and keyboard. This trick is quit difficult for beginners, but I have divided this trick in  some easy steps which will help you achieve your goal easily. Here are some steps given below just read and follow them carefully...

Required Things:
  • An Android Phone
  • PC or Laptop to Shutdown
  • Wifi Modem [Please Note That: Phone and computer should be on same WiFi network. i.e connected to same WiFi Router.]
  • Softwares for your android phone and for your pc [Download Links are given in step 1]
STEP 1:

    First of all you have to download 2 applications. One for your android phone and other one is for your computer. Download links are given below:

TALK IT! FOR PC-Type Anything, Computer Will Speak It For You...

TALK IT! is a small software and also it is a text-to-speech tool that pronounces whatever words kids type - including ones they've made-up - using 20 different funny and surprising voices. Talk It! works in both English and Spanish.
It comes bundled with Microsoft Plus! for Kids, a package launched by Microsoft in 1997. This program was developed by SoftVoice and Microsoft, and was never sold as an individual program.

This program lets the kids enter any text using the keyboard, and then listen to it.