Friday, 24 June 2016

Create Unlimited Facebook Account Without Phone Number And Email [WORKING] 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  12:33:00

Sufyan Hacker



Facebook is most popular Social Networking Website in world. Facebook signup process is most secure now those days. You need one mobile number or email for create user account on Facebook Website. But in this post I give you a trick ,make fake account without email and mobile number in just 1 min. This trick is awesome guyz because you don't need any email and mobile number for facebook sign up process.

This facebook trick is done disposal email service.


1. ) Open



(TEMPAIL is disposal email website)

2. ) this website give you a temporary email, copy this email.

3. ) Open ,fill up the form and paste email in email section.

4. ) Click on Sign Up ,your account will we created on facebook.

5. ) Go to

(step 1) tab and

reload the page

,now you see a mail come from facebook ,open that email click on confirm now button and your fake facebook account process is completed.

Now with this trick you make verified fake facebook account without and email and Number.

Note:- Do not use this trick for any illegal purpose.


Hack Facebook Account Via Anomor Pishing Trick 2017 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  12:26:00


Hello Guys How Are You Today? Today I Am Going To Share
New Phising Method Without Wapka wml codes With You In This Method You Don't Have To Make Wapka Site Or Not to do Hardwork For Making Phising On Wapka.
So Is A Site Where You No Need To Make Phising. ON this Site They had Maked Best Phising links .SO U have To Only Send This Links To Vicitm And Ask Him To Login.

°°Follow Below Steps°°
1. First Go To This Site Site And Sign up There
2. Then Log In On Anomor After This u will see many Links Like (Link 1, Link 2, Link 3)
3. You will choose Any Link And Copy This Link and
4. send this link To vicitm
5. When He Login On This Link. His Id And Password Will Send On My Vicitm Option In Zoneurl Site
6. Open again zonurl acunt then click On (My Victims) option then u will See victims email & pass
Thats It U Hacked A Account. Its A New Type Phising And Many People Are Not Know About This.
You Know? it's All For You...Because HackingTipsAndTricks

 You Can ask any question in Comments!


Sufyan Hacker Latest Pics June 2016

Posted by Sufyan Hacker  |  at  02:49:00



Thursday, 23 June 2016

Why You Should Always Log Out Of Facebook While Watching, visiting NSFW websites

Posted by Sufyan Hacker  |  at  05:26:00

 Why You Should Always Log Out Of Facebook When Watching Porn

Did you know that Facebook actively tracks you if you visit porn websites? If you’re logged on Facebook and go on any adult entertainment website or shady porn website, chances are that the porn website has a Facebook plug-in button. This Facebook plug-in will actively track you down and know that your have been surfing porn.
Facebook tracks your surfing habits because the social networking giant collects data about the websites you’re visiting so they can target the ads you see – including your taste in porn.
According to their data policy, Facebook states:
“We collect information when you visit or use third-party websites and apps that use our Services (like when they offer our Like button or Facebook Log In or use our measurement and advertising services).
“This includes information about the websites and apps you visit, your use of our Services on those websites and apps, as well as information the developer or publisher of the app or website provides to you or us.”
Facebook ‘Share’ and ‘Like’ buttons actively track visitors visiting any website despite the fact that the social media network had promised these wouldn’t be used to track its users seven years back.
Facebook won’t use porn surfing habits to target you with sexual ads but the worrying thing is that Facebook will know exactly what you have been watching.
The only option left for you, if you are an avid porn fan, is to log out of Facebook and use VPN and/or Tor to surf such adult entertainments sites without the fear of tracking


Wednesday, 22 June 2016

How To Make Facebook Profile with No Name 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  01:41:00

Pkhackingtricks is back with Facebook tricks but we admit that this trick is little bit older. However, it works still and is a cool trick to experiment. This time I assure that I’ll research more on such tricks to share with you. Let us learn how to make Facebook profile with no name. No, not just create. You can also change your name on existing Facebook profile. To do this, you will need few prerequisites and a little knowledge about making a Facebook profile with single name. You need to be careful before performing this trick.
Before stepping into the tutorial, let me list out the adverse effects regarding this trick so that you might stay out for any reason.
  • This trick will ruin your profile. (Yeah! Who loves a Facebook profile with no name?)
  • Your friends cannot search you using the site header or even, to message you. They need to remember your username or scroll for recent messages.
  • Not all browsers show you invisible.
  • You have number of limits for changing your name on Facebook. Anything you go wrong might result in banning of changing your Facebook name permanently.
  • Your name will be invisible only at certain places on Facebook. How about other places? It will show you a character instead of anonymity.
Pages on Facebook where you will be anonymous or be having your Facebook profile with no name is given in the below table.
[table width=”728″ colwidth=”150|20″ colalign=”left|center”]
News Feed,Yes
Individual Post Page,Yes
Friend Request Frame,Yes
Timeline Review,Yes
Notification Frame or Pop ups,No
 Also remember that only Google Chrome supports a Facebook profile with no name. Other browsers like Mozilla Firefox and Google Chrome will not show you anonymous, instead shows a character.
That’s all about the adverse effects and limitations of this trick. Let us move into the tutorial.

Prerequisites to Make Facebook Profile with No Name

  • Google Chrome for Windows
  • An Indonesian proxy address


  1. Log in to your Facebook account.
  2. Navigate to Account Settings and change the current language to Bahasa Indonesia.
  3. Now, in a new tab navigate to the following URL.
  4. Copy any proxy address which has good speed. More importantly, let it be the recent one. Avoid selecting a proxy which has been checked long time ago. Note down the proxy port.
  5. Press Winkey + R and type “inetcpl.cpl” (without quotes)
  6. On Connections tab, select LAN settings.
  7. Tick the check box Use proxy server for your LAN.Proxy Settings for Facebook profile with no name
  8. Paste the proxy address and type the proxy port in the Local Area Network (LAN) dialog box.
  9. Click OK and open the tab where you have left with Account Settings of your Facebook account.
  10. Now click on your Name and paste the character given in this notepad file.
  11. Paste it in the first name field.
  12. Delete all the content from the last name field.
  13. Type your password and click on Save Changes.
  14. And voila! Your Facebook profile with no name is now seen.
Don’t forget to remove the proxy address.
And, this is how your post appears when you post from a Facebook profile with no name.
Facebook profile with no name

Troubleshoot problems

Problem: I changed the proxy and language but my Facebook doesn’t opens up the Edit section when I click on my name.
Solution: All proxy addresses doesn’t work. The “proxynova” site which I’ve suggested above often checks for new proxy addresses. I recommend you to use a high-speed proxy which shows Last Check below 3 minutes.
Problem: I’ve updated my name. Now all websites loads too slow or sometimes timed out.
Solution: After updating the name, you need to remove the proxy settings which you’ve applied during the trick. Follow the Step 5 and Step 6, then remove the check for Use a proxy server for your LAN. Click OK and you are done.
Problem: It asks for Last Name.
Solution: Please check that you have chosen the language Bahasa Indonesia already.
If you have any other queries or suggestion, please comment below or Contact us


Tuesday, 21 June 2016

Has Your TeamViewer Account Been Hacked? Here's What to Do Immediately

Posted by Sufyan Hacker  |  at  11:00:00

Do you have remote login software TeamViewer installed on your desktop?

If Yes, then it could be possible that your system can be accessed by attackers to steal your personal details, including your bank and PayPal accounts, as several reports on Reddit and Twitter suggests.

According to recent reports, the popular TeamViewer software that is used to remotely control PCs appears to have been HACKED!

Over the past few days, a number of users headed on to the Internet forums to report that unknown attackers are taking control of their computers through their TeamViewer accounts and, in some cases, trying to steal money through services like eBay or PayPal.

This same behavior has also been reported by the IBM security researcher Nick Bradley, who said:
"In the middle of my gaming session, I lose control of my mouse, and the TeamViewer window pops up in the bottom right corner of my screen. As soon as I realize what is happening, I kill the application. Then it dawns on me: I have other machines running TeamViewer!"
But, the question still remains: What really happened to TeamViewer?

Actually, no one knows, at least, for now.

Because no evidence indicates a system-wide security breach at TeamViewer that could have given the attackers some sort of backdoor into users' PCs.

TeamViewer has also reacted by strongly denying the claims that the intrusions are the result of a hack on TeamViewer's network.

Instead, the account takeovers are the result of end users' carelessness. Moreover, the company referred to the recent widespread "mega breaches" that have dumped over 642 Million passwords over the past month.
"As you have probably heard, there have been unprecedented large-scale data thefts on popular social media platforms and other web service providers," the company wrote
"Unfortunately, credentials stolen in these external breaches have been used to access TeamViewer accounts, as well as other services."
However, TeamViewer stands strong by its statement that a Denial of Service (DoS) attack knocked some of its servers offline on Wednesday, but the company managed to bring them back online after a few hours.

The company advised its users to avoid careless use of its service and always:
  • Use a different password for each account.
  • Use two-factor authentication.
  • Use a password manager.
  • Don't tell other people your passwords.
Moreover, TeamViewer also announced two new features on Friday aimed at boosting its users' security after numerous users flocked online to complain about getting hacked through its service.

The two new features are:
  1. Trusted Devices
  2. Data Integrity
The Trusted Devices feature is specifically designed to prevent hackers from taking over your TeamViewer account. The feature allows you to approve the new device as trusted before it can access an existing TeamViewer account for the first time.

The device approval process is conducted by clicking a validation link sent to the account owner's email address.

The second feature, dubbed Data Integrity, works by automatically monitoring a user's account activity. If it detects any unusual behavior that might suggest account has been hacked, the service forces users to reset their password.

Here's What you should do:

TeamViewer users are strongly recommended to change their account passwords and use a strong one, and of course, NOT to use the same credentials across multiple sites.

I know, remembering different passwords for different accounts is a real pain, but you can use a good password manager to solve this issue.

Meanwhile, users should also ensure their TeamViewer accounts are protected with a randomly generated password that is at least 10 characters long, contains numbers, symbols, and uppercase and lowercase letters, and is unique.

It is always a good idea to run the TeamViewer software only when it's truly needed, instead of allowing it to auto-start each time your PC is turned on.

If you have also experienced something fishy with your TeamViewer account, let us know in the comments below.


Friday, 17 June 2016

Invite All Friends To Like Facebook Page Single Click 2016 BY Sufyan Hacker

Posted by Sufyan Hacker  |  at  01:01:00

Facebook is one of the most popular social media platform. Where we can create profile, Pages, groups and events to interact with people. Normally we use Profiles but for special purpose, events or business we need to create page, group and event. It is not an easy task to grow page, group or any event. As i already about how to increase page likes. But the difficult task which we face is sending invitation to others to join our page, event or group. Suppose we have 5000 friends so it we task 1 sec for invite every person then we need approx 1,2 hours to complete this task. So don’t worry and waste your precious time.
Today i am going to explain you the best way for how to invite all friends to like page on Facebook.  Which will help you to give tremendous growth to Facebook page likes. Just we need to install extension or even by running small script to invites all friend to like Facebook page. Which you can also to invite all friends to Facebook event. But this method is only working to invite all friends to pages and events. For the group their is a separate which you can follow on add all friends to Facebook group. So here is the best way to invite all Facebook friends to like page.

Method 1st:- Invite All Friends To Like Facebook Page (Chrome Extension).

  • First of all install Google chrome extension.
  • This extension will provide the feature to invite all Facebook friends by one click.
Add to Chrome
  • After the installation of this chrome extension small icon will start appearing on the top right side of the browser.
  • Button will only appear when you open Facebook website otherwise it will disappear.
Invite All Friends To Facebook Page chrome extension
  • Now login into account whose friends you want to invite to like facebook page.
  • After that open Facebook page and then click on the Invite all friend button.
  • New pop up window will appear with name of all friends.
  • Then click on the icon of the extension which had installed.
Invite All Friends To Facebook Page chrome extension
  • After that just wait for few second your all friends invite automatically.

Method 2nd:- Invite All Facebook Friends To Like Page By Using Script.

  • First of all open your Facebook page where you want to invite friends.Then click on Invite all friends option and pop window will appear.
  • After that press F12 button on keyboard. Now console window box will appear.
  • Copy below code and paste them in console box.
var inputs = document.getElementsByClassName(‘uiButton _1sm’); for(var i=0; i<inputs.length;i++) { inputs[i].click(); }
  • After pasting above code into console box press button. Invitation to like Facebook page will be send successfully.
Invite All Friends To Facebook Page script code
So these best possible to invite all friends to Facebook page easily. In case we missed anything or you have any best method let us know.


Thursday, 16 June 2016

How to share your WiFi password easily using QR codes 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  03:54:00

How to share your WiFi password easily using QR codes

This is how you can share your Wi-Fi password with QR codes to your friends

You do not need to face the trade off between “easy to remember” and “hard to guess”

The first thing people do when they visit someone is asking the WiFi password. And if you are among the security conscious geeks who set a password such that even F.B.I. might have hard time cracking it, you may not want to bother about remembering and typing your password again and again.
The solution to this problem is “QR code”. You can generate a QR code for your Wireless AP and the aspiring person has to scan it in order to connect. You can generate QR code online or offline, but we recommend doing it online.
There are various websites which let you generate these codes, we recommend using as it is hassle free and provides live demonstration of your QR code.
Go to the website and you will be presented with this :
This is a simple text option. You can fill your password in the text section and generate the corresponding code.
Then you have to save it in your device, get it printed and place somewhere. Numerous formats are offered along with vast customization options. That is you can adjust the QR code’s color scheme, size etc.
This code, when scanned will present the text . Then, user will have to copy the text and paste in the password section of connection prompt of your AP.
This is one way, the other one is to use a dedicated QR code. Click on the “lock” icon on this website’s left pane and you’ ll see something like this.
Fill the details and download the code. The user then has to scan it using a feature rich QR code scanner. Which will display the details and establish connection on one tap.
A good scanner which has the required feature is QR and Barcode Scanner
On Scanning the dedicated QR code on your Android phone using this app, the details will be displayed as follows:
For connecting, you just have to tap the connect icon once.
This was all about how to share your complicated WiFi password easily. If you have any doubts or have some suggestions, you can ask in the comments.


Sunday, 12 June 2016

What Is Darknet & How To Access It

Posted by Sufyan Hacker  |  at  23:49:00


What Is Darknet & How To Access It

A Darknet is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports.

The Dark Net, Deep Net or The Hidden Internet are anonymous that means you will not be able to know the website owner or to who the website belongs too, Over the usual Internet,
A non-indexed website owner or website developer can be tracked by doing some Internet searches or wondering to different sites. However, web pages on the Dark Net or say Dark Web are using the TOR (The Onion Router) network and the foundation of the TOR is to include numerous nodes, so the source is not traceable.

The Deep Web and the Darknet
Most people are confused about what exactly the Darknet is. Firstly, the Darknet is sometimes confused with the Deep Web. 'Deep Web' refers to all parts of the Internet which cannot be indexed by search engines, and so can't be found through Google, Bing, Yahoo, and so forth. Experts believe that this Deep Web is hundreds of times larger than the 'surface Web' (i.e., the internet you can easily get to from Google).

Birth of the Darknet
October 29, 1969
Charley Kline, a student at the University of California, Los Angeles, types out the first message between computers connected by ARPANET, the Internet progenitor developed by the Pentagon’s Defense Advanced Research Projects Agency.
Darknets were able to receive data from ARPANET but had addresses that did not appear in the network lists and would not answer pings or other inquiries.
Just a few years later, a number of isolated, secretive networks begin to appear alongside ARPANET. Some eventually become known as "Darknets."

Birth of The Onion Router
September 20, 2002
Researchers at the U.S. Naval Research Laboratory release an early version of Tor ("The Onion Router"), which conceals the location and IP address of users who download the software. Originally designed to protect the identity of American operatives and dissidents in repressive countries like China, Tor also has another natural constituency: denizens of the darknet.
As of 2015 "The Darknet" is often used interchangeably with the dark web due to the quantity of hidden services on Tor's darknet. The term is often used inaccurately and interchangeably with the deep web search due to Tor's history as a platform that could not be search indexed. Mixing uses of both of these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions

Currency of the darknet
Bitcoin plays an important role throughout the Darknet. Since staying anonymous is key, Bitcoin is the only currency you can pay with there. Unlike the “normal” web almost every other website has the “Bitcoin accepted” sign displayed on it.  Because of Bitcoin’s pseudo-anonymous nature, it’s the perfect currency to power such an ecosystem.

on January 3, 2009 A man calling himself Satoshi Nakamoto "mines" the first Bitcoin, a form of untraceable cryptocurrency. Unlike previous digital currencies that failed because there was nothing to prevent users from literally copying their money, Bitcoin makes use of an innovative public accounting ledger that prevents double spending. Unsurprisingly, the cryptocurrency is an instant hit in the darknet, its anonymity making it a perfect tool for money laundering and criminal activity.

1 Bitcoin equals 468.53 US Dollar as of 28/may/2016

The Uses of Darknet
Darknets in general may be used for various reasons, such as:
To better protect the privacy rights of citizens from targeted and mass surveillance
Protecting dissidents from political reprisal
Whistleblowing and news leaks
Computer crime (hacking, file corruption etc.)
Sale of restricted goods on Darknet markets
File sharing (porography, confidential files, illegal or counterfeit software etc.)

Access the Darknet
All darknets network require specific software installed or network configurations made to access them
To access the hidden web you need two things – for starter The Onion Browser (also known as TOR Browser) that can access dot onion pages and a search engine or web page that can help you to search the dark web.

Recently there are many websites that are known as the deep web directories. Since they are hidden and are unable to search due to the reason that they are not listed correctly. Most of the links on such directories do not guide you where the link will lead to.

Here is some software used to access the darknet

1) Tor the most popular instance of a darknet
So what is Tor?
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.What is Tor?
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Other Popular Deep Web Technologies

I2P – This is an anonymity network which you may find slightly more techie to install and get running, but once you do there are some great tools and apps, including one to make it easier for you to set up your own hidden blog.

FAI (Free Anonymous Internet) – Based on blockchain technology, this network allows for the anonymous publishing and browsing of content and has a social network style homepage that lets you follow other users, share content with your followers, and tip the creators of content you like. FreeNet – One of the older and most highly regarded systems,

FreeNet combines deep web with DarkNet. This means that you can maintain a list of trusted peers and either connect to them only, or connect to them in preference to less trusted peers. As far as I know, this gives the highest level of privacy and security of any system, but does require a little more effort to make the most of.

ZeroNet – Based on torrent technology in combination with Bitcoin encryption, this is a new system which is not well developed but which I think holds promise for the future.

Is this safe to browse the Dark Net?
All safety depends on you. What you are looking for? You can create a private chat room where you can talk with your friends, or you can also hire a person for the  wet job(for the wrong work). It could be a journalist for exchanging of intelligence documentation, or someone selling illegal drugs. There are also websites that sell unlicensed weapons.
If you are willing to analyze the types  of sites that are accessible on the darknet, then a majority of web sites usually belongs to the Gangsters. Why, due to the fact that it gives you full anonymity. You will find some forum where people will be talking about suicides, murders and the odd things they did. And If you have a week heart than don’t even think to search that!

How to stay anonymous when surfing the Darknet
In order to access the Tor network you have to remain anonymous, this is not a request, it’s a prerequisite. This is done through a special web browser called, surprisingly enough, TOR. TOR stands for “The Onion Router”, it got its name from the fact that in order to reveal the core user of the browser you’ll have to peel a lot of layers off just like an onion.

You can use TOR to surf the pedestrian web (the everyday Internet you  know ) anonymously, or you can use it to access the Darknet.

Here’s the deal:

When you access the pedestrian Internet , you are directly communicating with websites. But when you’re accessing a website through TOR it’s like asking another user to ask another user to ask another user to fetch the webpage information for you. This is of course a over simplified explanation but the general idea is that communications bounce around a lot of different computers and it makes it very difficult to track who is actually viewing a website, sending an email or conducting any other action.

It also makes the Internet connection extremely slow, but for now here’s what you need to know about TOR:

It’s a free to download browser, The browser is built on top of the Firefox browser’s open source code so it’s pretty intuitive. Once you download and launch it it will connect you to the TOR network and you’re good to go.

TOR network was initially created by the US military to communicate anonymously. They still dump government files – not open to the general public – on the Darknet. Since the federal and other governments are themselves using the Darknet, they do not consider it feasible to order TOR to shut it down.
The Darknet (Deep Web) Explained

Additional security – using VPN
Although no one knows your identity when using TOR, some people like to add an additional layer of protection and connect to TOR through a Virtual Private Network (VPN). The reason is, that even though you’re anonymous, you can still be identified as using TOR for “something”.

Important security steps when using the Darknet
Turn off running scripts in the TOR options (click the button just before the address bar). This is because most of the sites in Darknet are criminal in nature. If you land on one, they might want to trace you down. And scripts created using JavaScript can be dangerous if they manage to store something on your computer.

Think twice before you click any link as you do not know who operates the website and where any of these links lead to. Use only known directories to reach authenticated destinations.

DO NOT DOWNLOAD ANYTHING TO YOUR COMPUTER. No BitTorrents and no downloads as they may give away your actual IP when storing things to your computer.

This is not for you
In all likelihood, you’ll never need to venture into the Deep Web. The Surface Web contains all the services and tools the average person could ever want. You won’t find any streaming video services or social networks or corporate websites you will feel like you are using the internet on 1990 .
months ago few social networks  start to appear on the darknet but it's not yet that large and its not for your daily life ! it's a darknet social network ! can you imagine a social network that was made only for mafia men !

The Darknet is fraught with bogeymen just waiting for you to let down your guard.
you will be an easy target on the darknet for those who are waiting to catch the new victim ! don't be the victim everyone is looking for !

But if you ever do need the sanctity of secure communications and true anonymity
a level of protection that the Surface Web simply can’t provide then rest easy.
Everyone has a voice in the Darknet, down in the depths where even Google’s spiders fear to crawl.

This post was written for educational purposes only. If you wish to use the Darknet, do it at your own discretion and at your own risk. Make sure to be aware of any consequences that may follow.

                                 Sufyan Hacker (Author) 





Saturday, 11 June 2016

Windows 10 Automatic Upgrade Drives A Man Crazy And He Can’t Handle It Anymore

Posted by Sufyan Hacker  |  at  06:40:00

                                 Sufyan Hacker (Author)

upgrade windows 10 
 Short Bytes: Remember that irritating Windows 10 upgrade popup that keeps testing your patience while you are busy in some important work? Well, a person has found it too much to handle and expressed his anger in the form of a rant full of swearing.
Ever since it appeared on the horizon, Windows 10 has created a fair amount of controversy due to its upgrade policies. The forced Windows 10 upgrade has interrupted a live weather forecast, ruined a pro-gamer’s live stream, and irritated thousands of Windows 7 and 8.1 users.As another chapter from the same book, an old clip from last October is making rounds on the internet. This video shared on Voat shows how a techie loses his cool when Windows Upgrade cuts him off with a notice that his upgrade is going to start soon.

Microsoft has been repeatedly accused of using dirty tricks to push Windows 10 upgrade before the free offer expires on July 29, 2016 (Here’s how to grab the upgrade even after the expiry date).
Coming back to the video, you can watch it below:
The Windows user fails to keep his calm and starts yelling an explosive rant about this flawed upgrade policy.
“It doesn’t even give you a choice to say no, it just comes up whenever it wants, automatically, and says f*** you, we’re turning off your computer in 10 minutes and 47 seconds,” he says. He calls it like putting a gun to head and forcing you to upgrade with giving any choice.
While this video is seven months old, nothing much has changed. Windows users who are willing to stick to their old operating systems are still frustrated due to Microsoft’s aggressive push.
In an official statement Microsoft has denied these accusations and said that customers have a choice. “As we shared in October, Windows 10 will be offered as a ‘recommended’ update for Windows 7 and 8.1 customers whose Windows Update settings are configured to accept ‘recommended’ updates,” said Microsoft.
Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.


19 Best Hidden iPhone Secret Codes In 2016

Posted by Sufyan Hacker  |  at  06:30:00

                                  Sufyan Hacker (Author)

19 Best Hidden iPhone Secret Codes In 2016

About 25 percent of iPhone users are hardcore, they really dig out more and more information relating to their iPhone and they do experiments with their iPhone as well, but average iPhone users really don’t care or don’t want to do experiments with their costly iPhone, they just need common functions with amazing features that none of the Android or Windows users have.
Today we came up with top class secret codes of iPhone that users may or may not be aware of, the secret codes are only to dial from dialer pad and the magic of each code are different.
You can unlock new features on your iPhone using these secret codes. Having a high price means having high-quality specs with several features, so that’s why iPhone is the top most smartphone in terms of security. The below codes works on every iPhone which will unlock some of your iPhone secret features.
  • *#06# – It will display your iPhone IMEI. It is an identifier for your mobile phone hardware.
  • *3001#12345#* – This code opens you field mode which contains all of the iPhone inner settings, cell information and newest network.
  • *#67# – You can check the number in order to call forwarding when the iPhone is busy. And again, but for when the iPhone is busy.
  • *646# – (Postpaid only) It will display your available minutes.
  • *225# – (Postpaid only) To check the Bill Balance
  • *777# – To check the Account balance use this code for prepaid iPhone only.
  • *#33# – You can check call control bars by using this code. Also for seeing whether barring is enabled or disabled for outgoing you can check all the usual suspects like fax, SMS, voice, information, etc.
  • *#76# – For checking connected line presentation is enabled or not you can use this code. like to the calling line presentation you can also check whether the connected line presentation is enabled or disabled.
  • *#21# – You can set inquiry for call forwards. Find the settings for your call forwarding. You will see whether you have fax, SMS, voice, knowledge, sync, async, paid access & packet access call forwarding enabled or disabled.
  • *3282# – It will let you know about the use of information info.
  • *#61# – To check the number of missed calls.
  • *#62# – You can verify the number for forwarding calls If there is no service is available.
  • *3370# – EFR mode Enhanced Full Rate improves your iPhone voice quality, but it will slightly reduce battery life.
  • *#5005*7672# – To check SMS centre.
  • *331* – Barring code # Outgoing calls abroad to block the lock code to inquire about her please contact your network operator.
  • *#43# – Call Waiting Status.
  • *43# – Activate awaiting.
  • #43# – Deactivate waiting.
  • *#31# – It allows you hide your number. your number.


Tuesday, 7 June 2016

How To Convert Text Into Audio Using Notepad

Posted by Sufyan Hacker  |  at  05:28:00

Everyone loves to hear what is written in a paragraph or in a document. This is the reason why the audio books are getting popular now a days. In this article i will show how you can convert text into audio using the Notepad.
Why Use Notepad?
Because it is the most commonly used text editor everyone uses. That’s the reason.

How To Convert Text Into Audio Using Notepad

STEP 1: Open Notepad. You can do this by searching for Notepad in the windows search Or Press Win+R and type Notepad and Press Enter.
STEP 2: Now, Copy following program and paste it in Notepad–
Dim message, sapi
 message = InputBox("A Best Text to Audio converter"+vbcrlf+"From -","Text to Audio converter")
 Set sapi = CreateObject("sapi.spvoice")
 sapi.Speak message
STEP 3: Now lets save the code we entered above. The code has to be saved in .vbs format rather than standard .txt format.
STEP 4: Now navigate yourself to the location where the code is stored. in my case it was stored on the desktop so i will just go to the desktop and check for it. You can see that the file we saved was in the Visual Studio Script ( vbs ) format.
text to audio converter using notepad
STEP 5: Now just double click on the saved file and Enter the text you want to hear in the text box. The moment you click OK , You can hear the text you entered as Audio.
text to audio converter using notepad 2
Feel free to comment your opinions down below.


How to Instantly Translate Anything Using Your Smartphone Camera 2016

Posted by Sufyan Hacker  |  at  01:42:00

How to Instantly Translate Anything Using Your Smartphone Camera

This Google app allows you to translate just by clicking an image with your smartphone’s camera

Imagine you are touring to a foreign country and come across a sign in a language that you are unable to read or understand. Now you have help at hand with a new App that translates foreign language road signs to your language.
Initially, Quest Digital introduced the app as Word Lens, an augmented reality (AR) project that was free to try. However, a purchase of $5 language packs was required to be done for it to be of any practical use. Later, Google acquired Word Lens and now the technology happens to be a part of the Google Translate app on iPhone, Android, and Google Glass, which is completely free to use.

How It Works

Open the app, Word Lens and select the languages you want to translate to and from, and then just point the camera at any typed text to view the translation.

While “instant” may not be a technically precise description, the app processes the change so quickly that it may well be. Besides signs, it even changes documents right in front of you, making it simple to know the world around you even when you are unable to speak the language.
Launch the app on your smartphone to give it a spin, and tap the camera icon, as shown in the image above. The languages default to an English-to-Spanish translation, so if you wish to see something else, just tap the languages up top to change them.
How to Instantly Translate Anything Using Your Smartphone Camera

You will see a screen like the one above when you tap the camera and it will show you what your camera sees. Point it at some words and watch them change right in front of you. Further, tap the red camera button to snap a photo, if you want to save a specific image. That’s it.
Also, you do not need an internet connection for the app to function. Since, Google stores translation files locally on your phone, there is no need for you to sign up for a local data plan and download them when you travel abroad.


Word Lens is not flawless. While Google resolved that major problem to the original Word Lens app—the cost—it still suffers from the same problem all translation apps do: they are seldom 100% precise.

Take a look at the screenshot above. If you speak Spanish, you might be able to identify that it sounds a little like what you are reading in this article. Also, you will likely notice that especially in the grammar department, the translation is not perfect.
The app will help you can get a general understanding of what you are reading in spite of the errors. So, you should not expect too much and just need to take its strengths into account. Also, you shouldn’t use this live translation feature on a lengthy article. It works best with signs and short blocks of text that you might come across when are outside.
Additionally, it is a very complicated job for a smartphone to do live translation with word replacement. Google Translate will mostly look a little overexcited and jittery when exchanging words because you can never hold your phone completely still. There will be text fluctuation when there is movement. If things are too wobbly in live mode, just snap a picture and you won’t have to worry about it.
On the whole, these disadvantages are significantly overshadowed by the unbelievable usefulness of the app. We are sure to end up with more precise translations and less jittery replacements. However, it’s still pretty unbelievable for now though.

Where to Get It

Google Translate is a free app available for download on iPhone, Android, and Google Glass. To view the download page, you can click those links or can just search the app store on your iPhone or Android to get it directly on your device.


Adobe Photoshop CS6 CRACK Serial key Updated 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  01:35:00

Adobe Photoshop CS6 Image

Adobe Photoshop CS6 is a complex graphics and image editing software and paint program. It has become a mainstay with graphics designers, professional photographers, and even hobbyists to edit graphics as well as create and manipulate images. What sets Photoshop aside from the rest of the crowd are the endless possibilities to manipulate images while making almost no compromise at all on quality. Photoshop CS6 goodies reside in features such as intelligent auto-correction, masks, HDR imaging, color management, effects, animations, histogram palettes, brushes, accurate selection tools, layer control etc.
System Requirements:
Intel Pentium 4 or AMD Athlon 64 processor (2GHz or faster) processor
1GB of RAM
3.2GB of available hard-disk space for installation; additional free space required during installation (cannot install on removable flash storage devices)
16-bit color and 512MB of VRAM (1GB VRAM required for 3D features)

Adobe Photoshop CS6 Screenshot
Install Instructions:
1. Download from the link below
3. Install application from “Adobe CS6” folder by double clicking on
the “Set-up.exe” (With admin rights on your system.)
2. Choose TRY install.
3. Select your language. (You can not change it after installation)
4. Close application. (IMPORTANT)
5. Go to the installation folder and Rename the original “amtlib.dll”
(amtlib.dll.BAK) (You may need it for second try) It is generally ;
C:\Program Files\Adobe\Adobe Photoshop CS6 OR,
C:\Program Files (x86)\Adobe\Adobe Photoshop CS6 OR,
C:\Program Files\Adobe\Adobe Photoshop CS6 (64 Bit)
6. Copy “amtlib.dll” from “cracked dll” folder and paste it in to the
installation folder.
7. Double click on “AdobePatchInstaller.exe” in the folder
“Photoshop_CS6_13_0_1_update” to update version 13.0.1
8. 3D features and some GPU-enabled features are not
supported on Windows XP.

Don't forget to fllow me on  Google+


Sunday, 5 June 2016

Sufyan Hacker Latest Pics

Posted by Sufyan Hacker  |  at  04:44:00

Sufyan Hacker (Author)



Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge


Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>