More

Pages

Thursday, 31 October 2013

Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod


IDM 6.18 Build 5 Crack Free DownloadCrack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod from command line. Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod an dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 


Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.



Version 6.18 Build 5 adds Windows 8 compatibility, adds Crack IDM 6.18 Build 5 - Internet Download Manager 6.18 Build 5 Crack Free Downlaod download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.


What's new in version 6.18 Build 5:

    (Released: Oct 29, 2013)

    -Added support for Firefox 26 and SeaMonkey 2.21
    -Fixed a bug when assembling video files with high bitrate
    -Improved video recognition in Google Chrome


    VueScan Pro 9.3.19 Multilanguage (Win/Mac)




    Download VueScan Pro 9.3.19 (Win/Mac) - Full VersionVueScan Pro 9.3.19 Multilanguage (Win/Mac)SIZE: 16.8/15.3 MbFeatures:* Works with 1200 flatbed and film scanners* Runs on Mac OS X, Windows and Linux* Improves your productivity and quality of scans* Has been downloaded more than 5 million times* Create raw scan files* ICC profiles and color spaces* IT8 color calibrationHome Page - http://

    Hetman Uneraser 3.4




    Download Hetman Uneraser 3.4 Free - Full VersionHetman Uneraser 3.4SIZE: 15.4 MB



    Data recovery software:

    quicker, easy, safer

    DOWNLOAD LINKS:

    Download Hetman Uneraser Free

    EnterpriseDT CompleteFTP 7.4.0 Enterprise Edition




    Download EnterpriseDT CompleteFTP 7.4.0 - Full VersionEnterpriseDT CompleteFTP 7.4.0 Enterprise EditionSIZE: 14 MBFeatures:* FTP and FTPS (FTP over SSL)* SFTP (FTP over SSH) and SCP* HTTP and HTTPS* Multi-protocol gateway* Unlimited users in all editions* Automatic Windows users* Authentication via an external database* Virtual file system* File system permissions Custom .NET extensions for

    Bad Wolf Software SmartEdit 3.211




    Download Bad Wolf Software SmartEdit 3.211 - Full VersionBad Wolf Software SmartEdit 3.211SIZE: 53 MBThe Benefits of SmartEdit- Repeated Phrases List- Repeated Words List- Adverb Usage List- Monitored Words List- Redundancies List- Dialog Tag Counter- Cliché List- Separate Dialog & Prose Checks- Misused Word List- Foreign Phrase Usage List- Profanity Usage List- Suspect Punctuation List-

    Wednesday, 30 October 2013

    [Cracked] IDM 6.18 Build 5 Complete Setup With Crack Free Download


    IDM 6.18 Build 5 Crack Free Download[Cracked] IDM 6.18 Build 5 Complete Setup With Crack is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. [Cracked] IDM 6.18 Build 5 Complete Setup With Crack has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. [Cracked] IDM 6.18 Build 5 Complete Setup With Crack segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.




    [Cracked] IDM 6.18 Build 5 Complete Setup With Crack supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use [Cracked] IDM 6.18 Build 5 Complete Setup With Crack from command line. [Cracked] IDM 6.18 Build 5 Complete Setup With Crack an dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 


    Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.





    Version 6.18 Build 5 adds Windows 8 compatibility, adds [Cracked] IDM 6.18 Build 5 Complete Setup With Crack download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

    What's new in version 6.18 Build 5:

      (Released: Oct 29, 2013)

      -Added support for Firefox 26 and SeaMonkey 2.21
      -Fixed a bug when assembling video files with high bitrate
      -Improved video recognition in Google Chrome
      IDM 6.18 Build 5 Crack



      Tuesday, 29 October 2013

      What is computer hacking? Introduction to Hacking

      What is computer hacking? Introduction to Hacking ?

       

      What is computer hacking?
      In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.

      Now a days,  People started think that hacking is only hijacking Facebook accounts or defacing websites.  Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking.

      So what is exactly hacking, what should i do to become a hacker?!  Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest.  You should always ready to learn something and learn to create something new.


      Now , let me explain about different kind of hackers in the cyber security world.

      Script Kiddie

      Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers.  In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.

      White Hat Hacker:
      White Hat hackers are good guys who does the hacking for defensing.  The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it.  They work for an organization or individually to make the cyber space more secure.

      Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.

      Black Hat Hacker:
      BlackHat hackers are bad guys , cyber criminals , who have malicious intent.  The hackers who steal money, infect systems with malware ,etc are referred as BlackHat hackers.  They use their hacking skills for illegal purposes.

      GreyHat hackers:


      The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.

      Hacktivists
      The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice.  One of the popular hacktivists is Anonymous.


       

      Monday, 28 October 2013

      VSO DVD Converter Ultimate 3.0.0.10




      Download VSO DVD Converter Ultimate 3.0.0.10 - Full Version

      VSO DVD Converter Ultimate 3.0.0.10 MultilanguageSIZE: 27.9 MBRip DVD MoviesConvert DVD to AVI, DVD, MKV, PS3, DIVX, iPad, iPhone, iPod, etc.and Mpeg2, Mpeg4, H264, Xvid tooCopy DVD to DVDMultiple audio + subtitles tracks supportedVideo player included for easy audio and subtitle track selectionSupports ISO images as input

      Netralia VodBurner 1.1.0.199




      Download Netralia VodBurner 1.1.0.199 - Full VersionNetralia VodBurner 1.1.0.199SIZE: 18 MBRecord Skype Video Calls and Edit for Free with Vodburner.VodBurner Features:• Record Skype video calls and create complete video productions from them.• Capture every frame at maximum resolution for the best quality possible.• Create MP4 or WMV files suitable for sharing with others.• Edit the video

      ESET NOD32 Antivirus 7.0.302.26




      Download ESET NOD32 Antivirus 7.0.302.26 - Full VersionESET NOD32 Antivirus 7.0.302.0Size: 129 MBHigh performance NOD32.Little impact on system resourcesEase of ManagementThe main advantages of the program NOD32 Antivirus- Protects your system from viruses, spyware, Trojans, password stealers and other malicious programs- Proactively stop the latest threats- Scans and cleans Internet traffic

      Sunday, 27 October 2013

      [Cracked] IDM 6.18 Build 4 Complete Setup With Crack Free


      IDM 6.18 Build 3 Crack Free DownloadIDM Crack 6.18 Build 4 is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. IDM Crack 6.18 Build 4 has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. IDM Crack 6.18 Build 4 segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.




      IDM Crack 6.18 Build 4 Crack supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use IDM Crack 6.18 Build 4 from command line. IDM Crack 6.18 Build 4 an dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 

      Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.





      Version 6.18 adds Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

      What's new in version 6.18 Build 4:

        (Released: Oct 27, 2013)

        -Redeveloped assembling of video files to improve -compatibility with Windows Media player.
        IDM 6.18 Build 4 Crack



        Install backtrack on your smart phone - mobile hacking

        today we are going to see How to install backtrack  5 on Smartphones and tablets which run on android.For this we have certain Required. Ofcourse the main will be the Android smartphone with 2.1+. Though I recommend 4.0+.In my case ill be using Micromax a110 smartphone. 





        Requirements:

        1.Back | track 5 Arm architecture which can be downloaded from the official website of the Back | track Here.

        2.A smartphone/tablet which needs to be rooted since it requires root permission to run certain scripts. (micromax a110 as example)
        3.Following Android Apps:
        BUSYBOX : It acts like a installer and uninstaller.it needs root permission to run.it has gpu cores and can  run linux kernals on android . Link
         
        Superuser: This app just grants a superuser power to your phone just like “su” does for linux. Link
         
        Terminal Emulator is app that runs a terminal console in android .Link
         
        AndroidVNC is a tool for viewing VNC in Android. Link

        Installation:

        1.Extract the backtrack folder “BT5-GNOME-ARM” to folder named “BT5” on the root of sd.That’s the top level of the SD card. 
        2.Open up the Terminal Emulator 
        3.Type the command “cd sdcard/BT5”

        4.Run this command and you will see root@localhost.
         su
        sh bootbt
         

        5. Now lets run Backtrack GUI with VNC viewer 

         startvnc
        h

        6. Open android vnc
        Nickname : BT5
        Password : toortoor
        Address : 127.0.0.1
        Port : 5901
         7.Click the connect Button and Boom here is your Pentest machine 
         
         
         
         
         

        Saturday, 26 October 2013

        [Cracked] IDM 6.18 Build 3 Complete Setup With Crack Free


        IDM 6.18 Build 3 Crack Free DownloadIDM Crack 6.18 Build 3 is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. IDM Crack 6.18 Build 3 has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators. IDM Crack 6.18 Build 3 segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.




        IDM Crack 6.18 Build 3 Crack supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use IDM Crack 6.18 Build 3 from command line. IDM Crack 6.18 Build 3 an dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. 



        Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.





        Version 6.18 adds Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 7 and Vista support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

        What's new in version 6.18 Build 3:

        What's new in version 6.18 Build 3

        (Released: Oct 25, 2013)
        • Improved video recognition in web players
        • Redeveloped assembling of video files to improve compatibility with some video players
        • Fixed bugs

        Windows XP Highly Compressed 10 MB Full Free Download




        Windows XP ISO Free Download -Ghsoftwares.

        Windows XP ISO Highly Compressed is a good window in all the windows. Every person like this window because it had a great future. Windows 8 ISO Highly Compressed is very beautiful in a graphic and his other features. Now in these days every person wants to install Windows 8 ISO Highly Compressed on his PC. It had a platform for all installed softwares on single window button. Windows XP ISO Highly Compressed is not easy to learn.
        New Futures in Windows XP ISO Free Download

        No.1 New Windows music.

        No.2 In Windows 8 ISO ORB Images.

        No.3 Now Windows 8 ISO Highly Compressed More Stable and Reliable.

        No.4 UAC Disabled (You should be able to run Metro Applications without any problem).

        No.5Windows Smart Screen Filter Disabled.

        No.6 New Look for Windows Media Player.

        No.7 New Windows 8 ISO Evolution Theme (Default).

        No.8 Show extensions for known file types.

        No.9 Enabled Glass Effect (DWM) without a supported card.

        No.10 Windows will tell you exactly what it is doing when it is shutting down or is booting.

        No.11 Add command prompt to right click context menu.

        No.12 Enabled addition Avalon effects.

        No.13 Added “Explore from here” context menu while right clicking on folders.

        No.14 Get rid of the Windows Mail splash screen.

        No.15 Maximum Simultaneous Downloads for Internet Explorer to 20 (Default was 2 ).

        No.16 Enabled DirectX Video Acceleration in Windows Media Player.

        No.17 Disabled Auto Rip disc when inserted in Windows Media Player.

        No.18 Highly customized shell.

        No.19 Enabled Auto Eject disc when ripping is completed.

        No.20 Disabled deleting files from computer when deleted in library in Windows Media Player.

        No.21Disabled Auto Add Played Media files.

        No.22 Enabled Advanced Option in Monitor Folders in Windows Media Player.

        No.23 Disabled deleting contents from devices when deleting playlist in Windows Media Player.

        No.24 Enabled ClearType Tuning.

        No.25 Added ‘Copy to Folder’ to right click context.

        No.26 Added ‘Move to Folder’ to right click context.

        No.26 Enabled Search in system folders.

        No.27 Improved reliability and improved performance for gaming.

        No.28 Disabled the NTFS Last Access Time Stamp (speeds up viewing folders in ntfs).

        No.29 Disabled kernel paging.

        No.30 Disabled kernel paging.

        No.31 Disabled 8.3 names on NTFS.

        No.32 Disabled Low disk space checks.

        No.33 Faster Shutdown.

        No.34 Fully Automated Windows Setup.

        No.35 Added ‘Open With Notepad’ to right click context.

        No.36 Disabled StickyKeys Keyboard shortcut (Popups up when pressing SHIFT key five times).

        No.37 Disabled FilterKeys Keyboard shortcut (Popups up when pressing SHIFT key eight seconds).

        No.38 Disabled ToggleKeys Keyboard shortcut (Popups up when pressing NUM LOCK No.1 key five seconds).

        No.39 Disabled Windows Media Player AutoUpdates.

        No.40 Disabled IPv6.

        Windows 8 ISO Highly Compressed is a great by his futures.


        Quick Heal detects virus that demands ransom of $ 300



         Best antivirus OF all the time read here

        NEW DELHI: Cyber security firm Quick Heal today said it has detected a new computer virus, CryptoLocker ransomware, which after encrypting files in a user's computer demands a ransom of $ 300 (around Rs 18,500) for decrypting them.
        Ramsomware, a kind of malicious software, is designed to block access to a computer until a certain sum of money is paid.

        Generally, it targets individuals.
        "In early September 2013, Quick Heal Threat Research and Response lab received several incidents about a malware that once executed encrypts files in the victim's computer and demands a certain ransom for decryption," Quick Heal said in a statement.

        This malware makes a demand of $ 300 through prepaid card services like UKash, Bitcoin or MoneyPak, it added.

        This type of malware is spread using social engineering tricks especially via email such as fake FedEx or UPS tracking notifications with attachments. Once the victim opens such email attachments, CryptoLocker gets installed and starts scanning the hard disk for all kinds of documents, it said.

        Documents include images, videos, documents, spreadsheets and presentations, Quick Heal said adding the virus encrypts the files and once the user starts operating his/her system, it pops a message demanding a sum of $ 300 to buy a private key to decrypt the files, Quick Heal added.

        "The malware gives a deadline of 100 hours to pay the ransom and get the private key to decrypt the data. If the amount is not paid it destroys the private key and your encrypted data is locked forever with no way to recover it," the firm said.

        Hackers behind this malware are able to avoid the trace back by using digital cash systems like Bitcoins and MoneyPack where the payments can be anonymous.

        "Since last couple of weeks we have been seeing over 500 incidents per day of this malware. The incidents are being reported from all over India," Quick Heal Chief Technical Officer Sanjay Katkar said.

        The firm also said that cyber criminals are employing similar tactics to fleece money from the victims.
        "Another similar kind of ransomware that goes by the name of 'Anti-Child Porn Spam' was seen infecting few computers in last couple of days. This shows that the trend for ransomware is growing," Quick Heal added.

        introduction To DDOS attack (HD) - how to hack server


        Introduction To DDOS attack video tutorial   OR distributed denial-of-service attack (explanation with demo) this attack is almost undetectable over the web so recent news "Google announced it had built "Project Shield" to help small websites stay online during DDoS (distributed denial of service) strikes" so we need to know what this ddos do and how it work u will learn all in this tut. for more visitn 


        Best antivirus for windows - 2010/2012/2013

         
        best anti virus ever 2013 


         (click image to zoom)
        one of the most asked question in computer section  

        "which anti virus is best for windows?"
        we so here is the image of antivirus with compression
        between other antivirus compare and find your best one 
         

        all paid anti virus  are good in his job 


        according to way2hackintosh   "Quick Heal"  is the best
        antivirus for your system  but yes  this anti virus

        cause your PC run slow because of his run time scan  (RATING 4.5 STARS) 

        1 > it provide all kind of security   

        2 > boot time scan ( which is power full weapon again
        virus"


        3 >   quick heal  have ability to repair file  instead

        spiking  ( try this download a strong virus and scan
        with different antivirus u will find the difference)   


        4 > quick heal  also posses power to delete system file 
        even if its his awn fine 


        5 > quick heal have one great thing  its made with a
        algorithm that study your every day use of computer  and
        if there is any change in computer  like (registry
        change without installing anything)  then quick heal
        Warn you about change 
        that's all 


        -image source wikipedia

        Thursday, 24 October 2013

        What it take to make graph search ? history facebook engieenring

        Last week we added the ability to search posts using Graph Search, a feature that has been two years in the making. With one billion new posts added every day, the posts index contains more than one trillion total posts, comprising hundreds of terabytes of data. Indexing these posts and building a system to return real-time results has been a significant engineering challenge—and this is just beginning.

        Collecting the Data
        One of the biggest challenges we faced in building this product was that Facebook's underlying data schema reflects the needs of a rapidly iterated web service. New features often demand changes to data schemas, and our culture aims to make these changes easy for engineers. However, these variations makes it difficult to sort posts by time, location, and tags as wall posts, photos, and check-ins all store this information differently. We currently have 70 different kinds of data we sort and index on, many of them specific to certain types of posts. In addition, the data is contained in a production MySQL database. This means that harvesting this data puts a significant load on databases that are simultaneously serving production traffic, and the process must be carefully monitored.

        Building the Index
        We store our harvested data in an HBase cluster, from which we execute Hadoop map-reduce jobs to build our index in a highly parallel process. This index-building process converts the raw data into a search index that works with Unicorn, our search infrastructure. We separate the data into two parts - the document data and the inverted index. The document data for each post contains information that will later be used for ranking results. The inverted index contains what is traditionally considered to be a search index, and building the inverted index requires going through each post and determining which hypothetical search filters match.

        Updating the Index
        To update the index, we subscribe to changes in the MySQL databases using a technology called Wormhole. Whenever a new post is created, an existing post is modified, a post is deleted, or some connection to a post is edited, we schedule an update on the corresponding post. To avoid code duplication, we run these updates through the same logic mentioned in the "Collecting the Data" section above. However, there is one major distinction: when we originally collect the data, we intentionally bypass our caches, as we want to avoid sending them requests for old data that is likely missing from the cache. When processing an update to the index we hit those caches, as we expect the data to have been recently accessed and be present in the cache.

        Serving the Index
        The posts index is much larger than other search indexes that Facebook maintains. Before we started working on the ability to search through posts, all Facebook search indexes were served entirely from RAM. This was ideal for quick lookup and was a tenable setup given reasonably small search indexes. However, storing more than 700 terabytes in RAM imposes a large amount of overhead, as it involves maintaining an index that is spread across many racks of machines. The performance cost of having these machines coordinate with each other drove the Unicorn team to look into new solutions for serving the posts index. The solution we decided on involves storing the majority of the index on solid-state flash memory. We managed to preserve performance by carefully separating out the most frequently accessed data structures and placing those in RAM.

        Ranking Results
        With a trillion posts in the index, most queries return many more results than anyone could ever read.  This leads us to the results ranking step. To surface content that is valuable and relevant to the user, we use two primary techniques: query rewriting and dynamic result scoring. Query rewriting happens before the execution of the query, and involves tacking on optional clauses to search queries that bias the posts we retrieve towards results that we think will be more valuable to the user. Result scoring involves sorting and selecting documents based on a number of ranking "features," each of which is based on the information available in the document data. In total, we currently calculate well over a hundred distinct ranking features that are combined with a ranking model to find the best results. We will continue to work on refining these models as we roll out to more users and listen to feedback.

        Project History
        Like many other products at Facebook, the ability to search over posts was originally conceived as a Hackathon project. My second day as a Facebook intern coincided with a company-wide Hackathon, and I spent the night aiming to implement a way for my friends and me to find old posts we had written. I quickly discovered that the project was much more challenging than I had first anticipated. However, the engineering culture at Facebook meant that I was supported and encouraged to continue working on it, despite the scope of the project. The majority of the work--infrastructure, ranking, and product--has been accomplished in the past year by a few dozen engineers on the Graph Search team. We are very excited to share the results of our hard work with people using Facebook, and look forward to seeing how people use the new feature and improving it based on their feedback. We hope that being able to search for posts will enable a richer Facebook experience for everyone.

        source - facebook engineering

        Tuesday, 22 October 2013

        Google technology 'uProxy' to provide uncensored internet for global activists (news)

        Google technology 'uProxy' to provide uncensored internet for global activists m happy after hearing this news :D 







        Google announced uProxy on Monday at the Google Ideas Summit in New York, but the tool is not exactly ready yet. Furthermore, the company doesn’t even want to speculate about when users will be able to use it yet, saying instead they want to try it out through a few trusted testers in order to improve it and build up its security


        At its Ideas Summit in New York, Google revealed Uproxy: a service that aims to change the way people around the globe use the internet. A browser extension for Chrome and Firefox, uProxy can bypass restrictive firewalls that hinder users from accessing vital (and trivial) information online by creating peer-to-peer connections. If someone from a country with limited internet access installs uProxy, they can get a friend from the US to authorize them to surf the open web using their connection. The service has yet to launch, but its creators -- the University of Washington and Brave New Software -- have opened a restricted beta for select, technically adept users to make it as "secure, private, and robust" as possible. If you know anyone who could benefit from uProxy   

        -source www.engadget.com 

        Monday, 21 October 2013

        New Phishing attack targets Italian Postal and Financial service again

         
         
         
         
        A phishing attack is a complex combination of technology and psychology. There are numerous ways in which people are being made fools and they can be conned by hitting on unsecured website links.
        Sophos experts detected this week an intriguing case of phishing against the Italian postal service Poste Italiane, the scheme attracted the researcher's attention due the reuse of an old social engineering trick.
         
        here is the graph in percentage  of phishing 
         
         
        also i use to hack some one  according to hacker phishing is the best way to hack someone because its easy to use no risk and victim dont get idea about phishing

        read more stay tune have fun remember #hacking is not crime

        Sunday, 20 October 2013

        CyberLink Power Director 12.0.2109.0 Multilingual Free Download





        Free Download CyberLink Power Director 12.0.2109.0 Multilingual - Full VersionCyberLink PowerDirector 12.0.2109.0 MultilingualSIZE: 531 MBExport formats of video files :- 3D- Video : MVC NEW, Side-by-Side NEW, Anaglyph- High resolution : AVCHD, MPEG- 2 HD, WMV-HD- MKV- MPEG- 2- MPEG- 4- MPEG- 4 AVC- MPEG- 1- WMV- DV-AVI- QuickTime- RealMedia- AVCHD to SD Card- 3GPP2 for 3G mobile phonesBurn

        GET Video Converter Ultimate 7.9.1 Free Download





        Free Download GET Video Converter Ultimate 7.9.1 - Full VersionGET Video Converter Ultimate 7.9.1SIZE: 37.69 MBGET Video Converter Ultimate makes all these happen:- Remove DRM copy protection from WMV WMA, iTunes M4P M4A M4V AAC M4B ASF, BBC iPlayer WMV and MP4.- Download Video from Youtube and other Video sharing websites.- Rip DVD to all pop video & audio formats while maintaining the high

        Android 4.4. KitKat: Features & Release Date News


        android kitkat: with better UI  

        While  apple trying to be like android almost not apple look like changing into android user interface as the user interface of android is better then jelly bean Google has turned Android into one of the best-looking operating systems available  


        Android KitKat: Wider hardware support in mobile and computer 


        One of Android's biggest issues is fragmentation thanks to the sheer number of devices available 

        This problem is heal by large number of device available in mobile coumpines Google will apparently try to make amends with Android 4.4, which is rumored to have lower specification demands and can therefore be installed on older phones and tablets 

         

        Android KitKat: Exclusive Cloud-based system

        Cloud storage is old news – we already have the likes of Google Drive, Dropbox and Box, but Google may be looking to integrate this feature more tightly with Android. Perhaps in the same way that Apple uses iCloud for backups and the like? 

        Android KitKat: Better battery life

        ohh !! thankx god this is what i want  i mean everyone what a better battery life of course and it not only depend on hardware but also it depend on software you are using 

         Android 4.4 is supposed to make better use of multi-core CPUs and is apparently "lightweight" in terms of the demands it places on the hardware.

         Android KitKat: Smoother screen orientation changes

        Android KitKat: Improved security and bug-squashing

        security is the main issue for all kind of software  cyber crime is spreading like lightning speed and android is easy to modify and vulnerable and easy target for hacker to use android platform  and in recent news millions of android device hacked so this time google come up with all new security and bugs   

         

         Android Jelly Bean on the Nexus 4 is on the left and Android KitKat, as seen on the Nexus 5 leak, is on the right

         

        1. Notification bar is no longer black. Now transparent and icons are white
        2. Google's Roboto font appears to be narrower, similar to the HTC Sense 5 UI
        3. Bar above the app tray is gone. The only divider is a homescreen page indicator using translucent dots
        4. Camera icon is completely new
        5. App drawer icon no longer has an outer circle. Now a translucent circle and dots appear more rounded
        6. Phone icon is completely new. Darker blue, flatter and with less prominent gradient/highlights
        7. Like the notifications bar, the control bar is no longer black and is transparent with white icons for the navigation controls: Home, Back and Multitasking

         

        Second official KitKat teaser emerges via Twitter - suggests October 28 launch

         

        thats all about android kitkat thankx for reading stay connected and yeha subscribe us for more .....  your way2hackingtosh admin

        Wednesday, 16 October 2013

        How to Make a $19 Police Scanner



        Overview

        In this guide I will explain how to build an inexpensive SDR (software defined radio) that can be used to receive police, fire, taxi, and other digital radio transmissions. I will do my best to explain the steps in detail, and provide further resources to help along the way.

        I have to give a lot of credit to the creator of the following guide: http://public-xrp.s3.amazonaws.com/docs/

        Sunday, 13 October 2013

        Google Costa Rica Hacked By Dr.Freak from Xploiters, Pakistani Hacker

        Pakistani Hacker name as "Dr.Freak" from "Team Xploiters" hack Google Costa Rica. Ebay.co.cr, yahoo.co.cr, msn.co.cr, Flicker.co.cr and Amazon.co.cr  also hacked. This was not 1st time when Pakistani Hacker attack on Google just to show their skills. Just 2 day ago an other Pakistani hacker name 1337 hack Google Malaysia. Basically there are only 2 backhats team remain in Pakistani Cyber Space. "Team MadLeeTs" and "Team XpLoiTers". Both are trying their best to proof which of them are best.

        Hacker was able to hack to attack DNS poisoning using registrar server. Now Google Costa Rica Local domain have hackers DNS address.  But one thing is for sure that this kind of cyber attack really create huge questions for security experts. Google.com.my was still defaced at the time of news published.


        Deface Page Say's:
        "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        THIS SITE HAS BEEN 0WN3D BY XPLOITERS
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        [#] Hacked by Xploiters! The Leaders Of Cyber World 

        [#] We are: Dr.Freak | Xploiter | void{0} | g00n

        [#] YOU MADLEETS F***TARDS CAN'T EVEN COME CLOSE TO OUR LEVEL!
        [#] WHAT ARE YOU? SELF-PROCLAIMED 1337 (n00bs in reality)? WE ARE THE FU**IN' 1337 MAKERS!
        [#] YOUR BIGGEST ACHIEVEMENT IS DEFACING SOME POPULAR DOMAINS VIA DNS?
        [#] HERE WE ARE DEFACING THEM WITH OUR LEFT HAND's MIDDLE FINGER. (_^!^_)

        Hacked By: Dr.Freak | g00n | void{0} | Xploiter

        [#] Pakistan Zindabad
        [#] Join us: www. Xploiter .net 
        [#] All Rights Reserved 2013- Onward"

        Hacked Sites:
        google.cr
        yahoo.cr
        ebay.co.cr
        youtube.co.cr
        yahoo.co.cr
        flickr.co.cr
        amazon.co.cr
        msn.co.cr

        Mirrors:
        http://zone-h.org/archive/notifier=Dr.Freak

        Friday, 11 October 2013

        OpenSUSE 12 Free Download Full Version Software





        Download OpenSUSE 12 - Free Software - Full VersionOpenSUSE 12

        SIZE: 8.49 GBLanguages: cs de es fr it nl pt ru tr zh zh-twopenSUSE - a free operating system based on Linux for your PC, laptop or server.



        DOWNLOAD LINKS:

        Download OpenSUSE 12 Free

        Free Download Microsoft Office ProPlus 2013 VL 64 Bit en-US + Microsoft Toolkit Full Version





        Download Microsoft Office ProPlus 2013 VL 64 Bit en-US + Microsoft Toolkit Full VersionMicrosoft Office ProPlus 2013 VL 64 Bit en-US + Microsoft ToolkitSIZE: 746 MBHow to Install: (1): Please use 7Zip/WinRAR/Universal Extractor to EXTRACT FILES(2): run the setup(3): Use the given Microsoft Toolkit to activate(4): Enjoy and Support Developers, Buy It, They Deserved It!



        DOWNLOAD LINKS:

        East-Tec Eraser 2013 Free Download Full Version





        Download East-Tec Eraser 2013 10.2.5.100 - Full Version - Free Software

        East-Tec Eraser 2013
        SIZE: 5.9 Mb
        Home Page - www.east-tec.com

        Key Features and Benefits:
        Destroy all evidence of your online activities: Clean Web Sites, pictures, movies, video clips, sounds, e-mail messages, chat room conversation history, AutoComplete, etc.



        DOWNLOAD LINKS:

        Free Download East-Tec Eraser 2013

        Realtek Ethernet Drivers Free Download Full Version Software





        Free Download Realtek Ethernet Drivers 

        WHQL 8.020 W8/8.1 + 7.075 W7 + 6.252 Vista + 5.818 XPRealtek Ethernet Drivers 

        Supported: WHQL 8.016 W8 + 7.072 W7 + 6.252 Vista + 5.818 XPSIZE: 40.71 Mb



        DOWNLOAD LINKS:

        Download Realtek Ethernet Drivers Free

        Metasploit and Rapid7 Offical Sites Hacked by KDMS Team, Palestinian Hacker

        Metasploit and Rapid7 Offical Sites Hacked by KDMS Team, Palestinian Hacker.

        We can Officially say that today and yesterday was DNS hijacking day. Yesterday Avaria AVIRA, WhatsApp, AVG, Alexa was hacked by Palestinian Hacker by DNS hijacking. After that Google Malaysia was hijacked by Pakistani hackers. And Now one of most leading White hat hackers tools site hijacked by Palestinian Hackers. Let see what will happened tomorrow?

         These sites are consider as world most secure sites. By the way they are the one who create security for world. But Backhats again about to break their security by DNS hijacking.


        We also found some Tweets about Hack. They confirm that their sites was Hijacked.
        I can confirm that the DNS settings were changed for a few minutes and pointed to 74.53.46.114
        — HD Moore (@hdmoore) October 11, 2013
        They temporarily hijacked our domains by sending a spoofed DNS change request via Fax to http://t.co/W5BBC7jhvy
        — HD Moore (@hdmoore) October 11, 2013
        Yup, the whole thing was resolved in less than an hour, but DNS changes may be cached until the TTL expires
        — HD Moore (@hdmoore) October 11, 2013
         Hacked Sites:
        rapid7.net
        www.metasploit.com

        Mirrors:
        http://zone-h.org/archive/notifier=KDMS

        Thursday, 10 October 2013

        Google Malaysia Hacked By 1337 from Madleets, Pakistani Hacker

        Pakistani Hacker name as "1337" from "Team MadleeTs" hack Google Malaysia. This was not 1st time when Pakistani Hacker attack on Google just to show their skills. Just few month ago same hacker hack Google Kenya, Google BurundiGoogle Uzbekistan and Google Serbian.

        Hacker was able to hack to attack DNS poisoning using registrar server. Now Google Malaysia Local domain have hackers DNS address. 

        Their is not any specific reason mention behind this hack by hacker. But one thing is for sure that this kind of cyber attack really create huge questions for security experts. Google.com.my was still defaced at the time of news published.



        Deface Page Say's:
        "Google Malaysia STAMPED by PAKISTANI LEETS

        We are TeaM MADLEETS

        H4x0r HuSY - KhantastiC HaXor - H4x0rL1f3 - InvectuS - Shadow008 - r00x - Don - MindCracker - Dr.Z0mbie - phpBuGz - MaD GirL 
        MaDCoDe - Sn!p3r_GS - DeXter - Neo Haxor - Darksnipper - Pain006 - b0x - R3DL0F - Sahrawi - 3thicaln00b - Hmei7 - MakMan - Sniffer - AL.MaX HaCkEr - Ch3rn0by1
        =======================
        www.MaDLeeTs.com
        | LeeTHaXor@Y7mail.com |
        =======================

        Pakistan Zindabad"

        Hacked Sites:
        www.google.com.my
        www.google.my

        Mirrors:
        http://www.zone-h.com/mirror/id/20957809
        http://www.zone-h.com/mirror/id/20957806