Thursday 2 June 2016

Airtel 1000 Minutes Free Calling For Every Month June 2016

Today I am Sharing You That How To Get 1000 Minutes Free Calling in Airtel Between Your Family Members For Every Month. Nowaday Airtel Is Become India's Leading Provider Of Prepaid and Postpaid, Wireless Internet, Broadband, Digital Tv, And Mobile Services.

                                        


Follow This To Get 1000 Minutes Free:-

  • Visit Offer Page.Enter Name & Contact Number.
  • Click on “Get a callback”.
  • You will get a callback from Airtel.
  • Activate Your Plan, You have to pick the rental and choose the free benefits that 
  • each family member needs.
  • Now include your family in the plan & start sharing!

What To Get With This Plan:-
  • Enjoy free calls upto 1000 minutes per months.
  • Save 30% on mobile bills
  • Share your plan at just Rs. 199/year
  • Have one plan for all your devices
  • Add up to 5 family members to your plan

Sunday 29 May 2016

Tricks To Get Unlimited Paytm By Simple Way 2016

»TaskBucks is the fastest growing For Giving FREE RECHARGE And Free PayTM Cash Do cool new Tasks and Earn Free Recharge & PayTM Cash on TaskBucks, best way to add to your pocket money.

»Download and Install The APK From The Links Given Below[important]​




Open App and Signup​ You’ll get Rs. 20 Bonus once you complete 2 offers​ Now Search “Browser” in play store and download any 5-10 browser’s​ Now Open Taskbucks again and Click on “Stories” tab.​

»Click on “Share to get ₹ X” of any story (Where X=4/5)​ Now click on whatsapp icon to share on whatsapp​ Now click on the group in which you are alone (you can easily make this type of group – 1st make group of two and then remove another person)​
»Now click on the link and open it 5-6 times in different browsers​ You will get notification that you have completed the offer and you have been rewarded​

»Now follow 3 to 8 steps for other stories and you will get Unlimited Recharge&Paytm Cash​ Also Download App And Complete Offers To Get Unlimited Recharge and Paytm Cash​ Enjoy & Share !​ ​

Downloads & Links:-

Click Here To Download Free Recharge App (Open in Android)

Tuesday 24 May 2016

Airtel Unlimited Free Internet 2016

1.APN: airtelgprs.com
2.Activate 3G for better speed.(if HP works with 3G spped no need to bother)
3.Install Hammer VPN-Download Here
4.Lport-9201
5.Rport-0
6.Select any free server
7.leave other field as it is ..u dont have to be advance.
8.Tap connect
9.if u see Authenticating (successful DNS)
10.Speed 5-150 Kbps
11.When you will get server is full (try different server)

Unlimited Tricks:-

If u see your daily limit reached
Then disconnect internet
Uninstall Hammer VPN
ES fileexplorer - internal storage - android - DELETE playstor.srf and hammervpn Folder.
INSTALL Older Version hammervpn
It will get Connect.

Tricks To Make Unlimited Calls To India And Other Countries 2016

Primo App – Get Unlimited Free Calls to India & Other Countries: Primo is the messaging app that’s also an alternative to expensive phone plans. You get the best of messaging apps and phone service with Primo.

Steps To get Free Calls from Primo app:-

Download Primo App From Here

Open the App create new account by entering all required details.
On next page, add your Mobile Number & verify it to get additional free minutes.
After successful verification, you can see free 25 minutes in your account.
Now go to Rewards Tab & grab more free minutes by completing below given tasks :
– Add Email Address & get 25 Free Minutes.
– Set Profile Photo & get 25 Free Minutes.
– Enter Location & get 25 Free Minutes.
– Enter Home Town & get 25 Free Minutes.
– Refer friends & get 25 Free Minutes per referrals.
Enjoy Free Calls!

Monday 23 May 2016

Tricks To Create Unlimited Gmail 2016

METHOD:-

1ST METHOD:-

This method is too simple and by this u wil get unlimited gmail ac without creating gmail id !

You just have to put (.) (Dot Sign) between ur gmail ac content before @gmail.com and and by this u will get unlimited gmail ac and this method/trick called "DOT TRICK"

EXAMPLE:-
If your gmail id is :- Example.com@gmail.com then this below all id will be yours and its also authorized by google !
E.xample.com@gmail.com
Ex.ample.com@gmail.com
Exa.mple.com@gmail.com

Now put dot to more one step and u will get more gmail id and u can also use 2/3/4/5/6 dot in one gmail id to create more !

NOTE:- Don't worry its not create ac from ur gmail as all of the ac are same ac and all the mail will be forward to ur main gmail ac !

2ND METHOD:-

This method is too simple as above one !

STEP:-
If ur gmail id is example.com the just add '+' (plus sign) After your username end and before of the @gmail.com and also add a word/number after '+' (plus sign) And u will get more gmail id !

EXAMPLE:-
example.com@gmail.com=example.com+1@gmail.com
example.com+2@gmail.com
example.com+word@gmail.com !


 In this way u can get unlimited gmail ac without another mobile number and u can also use this trick on signup of any app multiple time and u can also use this trick to use one gmail id on 5/6/999 android device !

Sunday 22 May 2016

Airtel Unlimited Whatsapp Tricks Working Blocked Sim 2016


Only Works
Rooted Android Mobile
Blocked Airtel Sim
ProxyDroid - Download Here


How To Use This Airtel Unlimited Free Whatsapp Trick:

Download Airtel Modded ProxyDroid
Now Install It Manually.
Goto Proxydroid configurations And Make Below Settings
Host : 202.56.230.6
Port : 3128 (or) 8080
Proxy Type : HTTP
Now Mark On Proxy Enable Switch
Save The Settings And Connect Now.


Now Enjoy Unlimited Free Whatsapp With your blocked sim.

New DDoS Tools For Pc 2016

Methods

You can categorize denial-of-service attacks into at least three different types, which include:
  1. Volume-Based
These are the simplest attacks. The attacker simply sends a large volume of packets to the target thereby using up all the resources. The resources used might simply be bandwidth. These attacks include ICMP and UDP floods.
  1. Protocol-Based
These attacks often use the server's resources rather than bandwidth going to and from of the server. They can also use the resources of the network equipment on the periphery of the server (such a firewalls, intrusion detection systems, and switches). Examples include Smurf attacks (ICMP to a broadcast IP with a spoofed IP), Fraggle attacks (same as the Smurf, only using UDP), SYN floods, ping of deaths (oversized ICMP with the same destination and source IP and port), and many others.
  1. Application Layer Attacks
These attacks are compromised of what appear to be legitimate application layer (layer 7) requests to the server that are intended to crash it. These include attacks on Apache HTTP Server and Microsoft IIS, and includes tools such as Slowloris.

DoS & DDoS Tools


                                                              DOWNLOAD

Free Common DDoS Tools For Pc 2016

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.
What Is a Denial of Service Attack?
A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.
In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack only floods a service.
DDOS or Distributed Denial of Service Attack
This is the complicated but powerful version of DOS attack in which many attacking systems are involved. In DDOS attacks, many computers start performing DOS attacks on the same target server. As the DOS attack is distributed over large group of computers, it is known as a distributed denial of service attack.
To perform a DDOS attack, attackers use a zombie network, which is a group of infected computers on which the attacker has silently installed the DOS attacking tool. Whenever he wants to perform DDOS, he can use all the computers of ZOMBIE network to perform the attack.
In simple words, when a server system is being flooded from fake requests coming from multiple sources (potentially hundreds of thousands), it is known as a DDOS attack. In this case, blocking a single or few IP address does not work. The more members in the zombie network, more powerful the attack it. For creating the zombie network, hackers generally use a Trojan.
There are basically three types of DDOS attacks:
  1. Application-layer DDOS attack
  2. Protocol DOS attack
  3. Volume-based DDOS attack
Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server.
Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more.
Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets.
There are many tools available for free that can be used to flood a server and perform an attack. A few tools also support a zombie network to perform DDOS attacks. For this post, we have compiled a few freely available DOS attacking tools.
Free DOS Attacking Tools

1. LOIC (Low Orbit Ion Canon)
LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.
It can be used simply by a single user to perform a DOS attack on small servers. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.
Image 1: Low Orbit Ion Canon
You can see the snapshot of the tool above. Enter the URL or IP address and then select the attack parameters. If you are not sure, you can leave the defaults. When you are done with everything, click on the big button saying “IMMA CHARGIN MAH LAZER” and it will start attacking on the target server. In a few seconds, you will see that the website has stopped responding to your requests.
This tool also has a HIVEMIND mode. It lets attacker control remote LOIC systems to perform a DDOS attack. This feature is used to control all other computers in your zombie network. This tool can be used for both DOS attacks and DDOS attacks against any website or server.
The most important thing you should know is that LOIC does nothing to hide your IP address. If you are planning to use LOIC to perform a DOS attack, think again. Using a proxy will not help you because it will hit the proxy server not the target server. So using this tool against a server can create a trouble for you.
Download LOIC here:

2. XOIC
XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways. Like LOIC, it comes with an easy-to-use GUI, so a beginner can easily use this tool to perform attacks on other websites or servers.
Image 2: XOIC
In general, the tool comes with three attacking modes. The first one, known as test mode, is very basic. The second is normal DOS attack mode. The last one is a DOS attack mode that comes with a TCP/HTTP/UDP/ICMP Message.
It is an effective tool and can be used against small websites. Never try it against your own website. You may end up crashing your own website’s server.
3. HULK (HTTP Unbearable Load King)
HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.
It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server’s resource pool.
The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.
4. DDOSIM—Layer 7 DDOS Simulator
DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.
This tool is written in C++ and runs on Linux systems.
These are main features of DDOSIM
  • Simulates several zombies in attack
  • Random IP addresses
  • TCP-connection-based attacks
  • Application-layer DDOS attacks
  • HTTP DDoS with valid requests
  • HTTP DDoS with invalid requests (similar to a DC++ attack)
  • SMTP DDoS
  • TCP connection flood on random port
Read more about this tool here:http://stormsecurity.wordpress.com/2009/03/03/application-layer-ddos-simulator/
5. R-U-Dead-Yet
R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.
6. Tor’s Hammer
Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
Download TOR’s Hammer here: http://packetstormsecurity.com/files/98831/
7. PyLoris
PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.
8. OWASP DOS HTTP POST
It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.
9. DAVOSET
DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.
10. GoldenEye HTTP Denial Of Service Tool
GoldenEye is also a simple but effective DOS attacking tool. It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
Detection and Prevention of Denial of Service Attack
A DOS attack is very dangerous for an organization, so it is important to know and have a setup for preventing one. Defenses against DOS attacks involve detecting and then blocking fake traffic. A more complex attack is hard to block. But there are a few methods that we can use to block normal DOS attack. The easiest way is to use a firewall with allow and deny rules. In simple cases, attacks come from a small number of IP addresses, so you can detect those IP addresses and then add a block rule in the firewall.
But this method will fail in some cases. We know that a firewall comes at a very deep level inside the network hierarchy, so a large amount of traffic may affect the router before reaching the firewall.
Blackholing and sinkholing are newer approaches. Blackholing detects the fake attacking traffic and sends it to a black hole. Sinkholing routes all traffic to a valid IP address where traffic is analyzed. Here, it rejects back packets.
Clean pipes is another recent method of handling DOS attacks. In this method, all traffic is passed through a cleaning center, where, various methods are performed to filter back traffic. Tata Communications, Verisign, and AT&T are the main providers of this kind of protection.
As an Internet user, you should also take care of your system. Hackers can use your system as a part of their zombie network. So, always try to protect your system. Always keep your system up to date with the latest patches. Install a good antivirus solution. Always take care while installing software. Never download software from un-trusted or unknown sources. Many websites serve malicious software to install Trojans in the systems of innocent users.

How To Kick Off Someone Who Connected Invisibly Using Wifi Kill On Android

In a public or open wi-fi network if a user consumes most of the band-width, then, the speed drops. So, it is very necessary to block the user from the wi-fi network. There arevarious methods to kick someone off a public wi-fi network. You can block the MAC address of the user and restrict him/her from wi-fi network. This is of-course a rude behaviour and don’t block anyone from the wi-fi network without warning him.

KICK OFF WI-FI USER FROM PUBLIC OR OPEN WI-FI NETWORK

METHOD 1:-

 USE WIFI KILL ANDROID APPLICATION TO BLOCK USERS

“WiFi Kill” is an android application that let you block other users of a same wi-fi network using Android device. The application needs root access for performing the task. It considers the device as a router and filter any MAC address and block the user’s MAC address.
The application is not available in Google play store. You can download the free version of ‘WiFi Kill’ and install the app in your phone. Open Wi-Fi Kill application icon, it opens and scans the network, then it shows you the complete list of all the connected devices with IP addresses in the application window. The application also displays the manufacturers details of each device connected to the network (you will not get any device name). Check the device IP that you want to block. Tap on it to get a pop up menu which shows three different reject method those are “drop policy”, “drop policy+reject target”, “drop policy+redirected to 127.0.0.1”.
WiFi Kill
“Drop policy” stops any downloads which are in progress in the associated device.
“Drop policy + Reject target” stops all the current downloads and stops all the future connections as well.
“Drop policy + Redirected to 127.0.0.1” redirects any attempting connection by the selected device to it’s own localhost. That mean, the device attempts to connect itself rather than connecting to the remote address. This option always shows the connection as active. But, you can’t open any page and it doesn’t show you any error.
According to me, third and last option is the best as it make the connection fake and the user does not have any clue regarding this.
Disclaimer note: This method is for education purposes only. We never encourage our readers to kick someone off your wi-fi network without any reason or without prior permission of network admin. Google also discontinue the application from the play store.
Download the application from here.

Friday 20 May 2016

Hack The Airtel Digital TV And Watch Channels For Free 2016

How To Hack Airtel Digital Tv And Watch 52+ Channels For Free:

1) ON DTH after 1pm.Now go to menu and click parental control. Then lock channel which you want(don't lock all) with 85660009 password.

2) Now save it and go to home screen. Then go to airtel advertise page (0 or 99) watch 2to3 min. then off it.

3) ON DTH. It take time to start. when it start remove card from box. Again go to parental control and remove lock. now OFF DTH. Add card restart it and watch FREE.
IT WORK FOR ONLY MIDNIGHT. DO NOT PUT ANOTHER PASSWORD,IF U PUT YOUR DTH BOX IS BLOCKED AND You WANT TO DELETE ALL SOFTWARE.