Sahil's Life

Official Blog of Sahil. Get to know interesting stuff

Archive for the tag “hack facebook”

How to Write a Short Story

  1. Nothing can help you “learn” how to write a good,short story better than reading good short stories. Notice the style and how they have used the small amount of words to their advantage. Choose authors that you enjoy, choose some of the “classics,” as examples and if you can, find some well known authors. Pay attention to how the authors develop their characters, write dialogue, and structure their plots.
  2. Collect ideas for your story.

    Collect ideas for your story. Inspiration can strike at any time, so carry a notepad with you wherever you go so that you can write down story ideas as they come to you. Most of the time, you’ll just think of small snippets of information (a catastrophic event around which you can build a plot, a character’s name or appearance, etc.), but sometimes you’ll get lucky and a whole story will reveal itself to you in a couple of minutes. If you have trouble finding inspiration, or if you need to write a story in a hurry (for a class, for example), learn how to brainstormor if you can’t come up with any ideas you might have to look to family and friends for inspiration.

  3. Begin with basics of a short story. After you’ve chosen an idea, you need to remember the basics of a short story before writing one. Steps to a good short story are:

    • Introduction (Introduces characters, setting, time,weather, etc.)
    • Initiating Action (The point of a story that starts the rising action)
    • Rising Action (Events leading up to the climax/turning point)
    • Climax (The most intense point of the story/the turning point of the story)
    • Falling Action (your story begins to conclude)
    • Resolution/Conclusion (a satisfying ending to the story in which the central conflict is resolved – or not -) You don’t have to write your short story in order. If you have an idea for a great conclusion, write it down. Move backward or forward from your starting idea (it may or may not be the beginning of the story), and ask “What happens next?” or “What happened before this?”
    • Find inspiration from real people. If you have trouble understanding or finding attributes of a character, turn to your life. You can easily borrow attributes of people you know or even strangers you notice. For example, you might notice someone is always drinking coffee, they talk in a loud, booming voice, they are always typing away at the computer, etc. All of these observations would together make a very interesting character, and they could easily be attributes of real people.
    • Know your characters. For a story to be believable, the characters have to be believable and realistic. It can be a difficult task to create real characters that are interesting and realistic. But here are a few strategies to create characters.
    • Write a list, titled with the character’s name, and write all the attributes you can think of, from their position in the orchestra to their favorite color. You should know as much as possible about your characters, from what their central motivations are to what their favorite foods are. You won’t include all this information in your story, but the more you know, the more your characters will come to life, both for you and for the reader.
    • Make sure your characters personalities are not perfect. In real life, nobody is perfect. Everyone has their flaws. Of course, that extends into the realm of storytelling, too. Every character needs to have some flaws, some problems, some imperfections, some insecurities. You might assume that people wouldn’t like to read about a character with a lot of flaws, but that couldn’t be farther from the truth! People can relate to characters with problems, as that’s realistic. They definitely can’t relate to perfect characters. When trying to come up with flaws, you don’t need to give your character some huge, bizarre issue (although you definitely can). For most characters, try to stick with things you know about. For example, the character could have anger issues, be afraid of water, be lonely, dislike being around other people, be sad, etc. All of these could be taken further in development.
  4. Limit the breadth of your story. A novel can occur over millions of years and include a multitude of subplots, a variety of locations, and an army of supporting characters. The main events of a short story should occur in a relatively short period of time (days or even minutes), and you typically won’t be able to develop effectively more than one plot, two or three main characters, and one setting. If your story has much more breadth, it probably needs to be a novella or novel.

  5. Decide who will tell the story. There are three main points of view from which to tell a story: first-person (“I”), second-person (“you”), and third-person (“he” or “she”). In a first-person story, a character in the story tells the story; in the second-person the reader is made a character in the story; and in the third-person, an outside narrator tells the story. (Second-person narration is rarely used.) Keep in mind that first-person narrators can only tell what they know (which will be limited to what they see firsthand or are told by others), while third-person narrators can either know everything and explore every character’s thoughts, or be limited to only that which can be observed.

  6. Organize your thoughts. After you have prepared the basic elements of your story, it can be helpful to do out a time-line in some way to help you decide what should happen when. Your story should consist at least of an introduction, initiating incident, rising action, climax, falling action, and resolution. You can draw or write a visual with very simple descriptions of what should happen in each of these stages. Having this done will help you keep focused when writing the story, and you can easily make changes to it, so that you are able to keep a steady flow as you write the full story.

  7. Start writing. Depending on how thoroughly you’ve sketched out your plot and characters, the actual writing process may simply be one of choosing the right words. Generally, however, writing is arduous. You probably won’t know your characters and plot as well as you thought but it doesn’t matter. Outlines are not the same as stories, and actually writing a story is the only way to complete one.

  8. Come out swinging. The first page —some would say the first sentence—of any writing should grab the reader’s attention and leave him/her wanting more. A quick start is especially important in short stories because you don’t have much room to tell your story. Don’t dillydally with long introductions of the characters or uninteresting descriptions of the setting: get right into the plot, and reveal details about the characters and setting piece-by-piece as you go along.

  9. Keep writing.

     Keep writing.

    Keep writing. You’re almost certain to hit some bumps in the road to finishing your story. You’ve got to work through them, though. Set aside a time to write each and every day, and make it a goal to finish, say, a page each day. Even if you end up throwing away what you wrote on that day, you’ve been writing and thinking about the story, and that will keep you going in the long run.

  10. Let the story “write itself”. As you write your story, you may want to turn your plot in a different direction than you had planned, or you may want to substantially change or remove a character. Listen to your characters if they tell you to do something different, and don’t worry about scrapping your plans altogether if you can make a better story as you go.

  11. Revise and edit. When you’ve finished the story, go back through it and correct mechanical mistakes, as well as logical and semantic errors. In general, make sure the story flows and the characters and their problems are introduced and resolved appropriately. If you have time, put the completed story down for a few days or weeks before editing. Distancing yourself from the story in this way will help you see it more clearly when you pick it back up.

  12. Get some second opinions. Send your revised and edited story off to a trusted friend or relative for revisions, edits, and suggestions. Let your reviewers know that you want to hear their real opinions of the story. Give them time to read it and think about it, and give them a copy that they can write on. Make sure you consider everything that your reviewers tell you—not just the parts you would like to hear. Thank your reviewers for reading your story, and don’t argue with them.

  13. Incorporate whatever edits, revisions, and suggestions you feel are valid. Your writing will be better if you can carefully consider constructive criticism, but you don’t have to follow all the advice you get. Some of the suggestions may not be very good. It’s your story, and you need to make the final call.

  14. Don’t give up. It may be frustrating if you’re having trouble writing. You can run out of steam, get angry at characters, or feel like throwing your computer or notebook across the room. Often, you can begin to doubt your own writing skills if you dislike something you’ve written. Your mind can easily tell you that it’s not worth it to continue, and you should give up. When these thoughts arise, they can easily take over and make you quit then and there. One of the hardest tasks as a writer is to learn to squash those feelings and continue writing. When you begin to have these doubtful feelings, or get tired or bored, stop writing. You can get up, take a walk, get a snack, watch TV, or anything to relax. When you return, do so with a fresh mind. You may still not want to write, but tell yourself a few good things about your story – anything about it, from one good passage you wrote, to a well-thought out dialogue, to an interesting character – congratulate yourself. If someone else knows about your story and has read it, they can also be a good source of encouragement. Just tell yourself that you will finish this story because you want to. It doesn’t matter if the story isn’t the best ever written – but you have a goal to finish it, and that’s what you’ll do.

How to Become a hacker!

So now i am going to post about how to become a hacker for a few days as i get many questions regarding this so i am fed up with those questions!! all of you just sub. to my blog and enjoy!! Happy hacking!

There is a community, a shared culture, of expert programmersand networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker.’

There is another group of people who loudly call themselves hackers, but aren’t. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn’t make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills s of the shared culture that originated the term ‘hacker.’Become a Hacker

THINK LIKE A HACKER

Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them:

  • The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
  • No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it’s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  • Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren’t doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
  • Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian, however; authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing.
  • Attitude is no substitute for competence. Hackers won’t let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.

Learn the Language of Programming

Learn how to program. The best way to learn is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more, and repeat until your writing begins to develop the kind of strength and economy you see in your models. To be a real hacker, however, you need to get to the point where you can learn a new language in days by relating what’s in the manual to what you already know. This means you should learn several very different languages. Besides being the most important hacking languages, the following represent very different approaches to programming, and each will educate you in valuable ways.

  • Python is a good language to start off with because it’s cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. Javais an alternative, but its value as a first programming language has been questioned.[1]
  • If you get into serious programming, you will have to learn C, the core language of Unix (C++ is very closely related to C; if you know one, learning the other will not be difficult). C is very efficient with your machine’s resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason (unless machine efficiency is essential).
  • Perl is worth learning for practical reasons; it’s very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl to avoid C programming on jobs that don’t require C’s machine efficiency.
  • LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.

Familiarize Yourself With Unix

1Get one of the open-source Unixes and learn to use and run it. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can’t be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. So, bring up a Unix (like Linux but there are other ways and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.

  • There are other operating systems in the world besides Unix. But they’re distributed in binary — you can’t read the code, and you can’t modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast. Under Mac OS X it’s possible, but only part of the system is open source — you’re likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple’s proprietary code.
  • Download Linux online[2] or (better idea) find a local Linux user group to help you with installation.
  • While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
  • A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This is a way to get a look at the possibilities without having to do anything drastic.

HTML is Important

  1. 1

    Learn how to use the World Wide Web and write HTML. Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web. This doesn’t just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web’s markup language. If you don’t know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.

 

Learn English

  1. 1

    If you don’t have functional English, learn it. English is the working language of the hacker culture and the Internet, and you will need to know it to function in the hacker community. Translations of technical books written in English are often unsatisfactory (when they get done at all). Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, the correlation is strong. If you can’t yet write competently, learn to.

 

Earn Respect

  1. 1

    Earn respect as a hacker. Like most cultures without a money economy, hackerdom runs on reputation. You’re trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren’t really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a gift culture. You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.

    • Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom’s most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
    • Help test and debug open-source software. Any open-source author who’s thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you’re interested in and be a good beta-tester. There’s a natural progression from helping test programs to helping debug them to helping modify them. You’ll learn a lot this way, and generate good karma with people who will help you later on.
    • Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
    • Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There’s a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
    • Serve the hacker culture itself. This is not something you’ll be positioned to do until you’ve been around for a while and become well-known for one of the four previous items. The hacker culture doesn’t have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you’ve been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.

5 Real Life Zombies

The thought of our bodies walking around and operating without our personal conscious or as the more spiritual believe without our soul is an idea that has intrigued and captivated the minds of human beings for centuries. Whether it be the living-dead and body snatchers of Hollywood movies or the stories of voodoo priests using potions to turn rivals into mindless drones to do their bidding, myths, movies, and stories about zombies have been a mainstay in human culture. But the idea of our bodies walking around without freewill or after we have passed may be closer to the realm of the natural than we all thought.

We have all been in the situation where we see a hideous bug in our sink or bathtub and instead of squishing it we take a more timid approach and turn the water on and drown the pest. Imagine you try to that and you watch the ugly sucker spin down the drain. You return to the bathroom later to make the horrifying discovery that the bug had returned from the dead. There are two possibilities: either you have a bathroom infested with bugs or you are dealing with a wolf spider, whose appearance is even more terrifying than its name.

01

LINK

Scientists at the University of Rennes in France collected 120 Wolf Spiders and submerged them underwater and waited for them to die. After all signs of life left their little spider bodies (some stayed submerged for 40 hours) the scientists laid the corpses out to dry so they could later weigh them.

A few hours later the spiders rose from the dead. Even though they were not craving brains, the spiders still appeared to be zombies. When threatened with drowning the spiders enter a comatose state where their metabolism virtually stops and all signs of life cease (the description of this comatose state sounds like death). After things get dry they awake and carry on with their business as if nothing ever happened.

02

LINK

The weta is s large insect (some species growing as large as 4 inches long) that are native to New Zealand. They have a very painful bite and can inflict painful bacteria laced scratches with their spiny legs. Their physical appearance is cricket-like but with a few distinguishing features. These creatures mere existence is terrifying but combine that with the fact that these insects are undead and you have one formidable zombie bug.

The tree weta have a protein in their blood that prevents water from freezing. Weta can survive being frozen alive for months at time in temperatures as low as -10°C by putting themselves in a suspended animation, like Sly Stallone in Demolition Man.

03

LINK

This is an impressive feat, but it is also important to note that while in this suspended animation the weta’s heart and brain dies then recovers upon thawing out. This bug is technically a zombie.

04

LINK

The jewel wasp is a solitary wasp that is known for its bizarre reproductive practice. The wasp stings a roach, herds it like a sheep into its nest, and then proceeds to lay an egg on the roach’s abdomen so its little baby will have plenty to eat upon hatching. So how does this relate to zombies?

The jewel wasp systematically stings the roach in the abdomen. This temporarily paralyzes the roach’s front legs so the wasp can now finish its work. Next, the wasp stings the roach in the brain. The venom of the wasp then disables the roach’s escape reflex getting rid of the cockroach’s will to live.

The wasp has created a zombie roach, but it is not done. Eventually the roach can walk again, but now has no desire to run from the wasp. The wasp then begins walking the roach like dog using the roach’s antenna as a leash. What happens next is perhaps best described by science writer Robert Zimmer: “The zombie roach crawls where its master leads, which turns out to be the wasp’s burrow.” Once there the roach allows the wasp to lay an egg on its abdomen. Then the zombified cockroach quietly sits in the wasps burrow and awaits the egg to hatch. Once the egg hatches, the wasp larva will live inside the roach until it emerges from it as an adult. Good luck getting to sleep tonight…

In the movie Alien, The extraterrestrial species featured lives out a larvae stage inside a host until it reaches another stage and bursts free from the host. What if I told you that Alien is based on a true story and the true story is a bit more horrifying than what was featured in the movie?

05

LINK

Glyptapanteles is a species of wasp that lays its eggs, sometimes as many as 80 at a time, inside a caterpillar, and to ensure that the caterpillar’s red blood cells does not kill the larvae, the mother wasp also injects a virus that occurs naturally in their bodies into the caterpillar, disabling its immune system. The larvae are then free to grow and they eventually chew their way out of the caterpillar. It gets better.

The caterpillar does not die. Instead it spins a coocoon over the wasp larvae to protect them so they can finish developing. The caterpillar also sticks around and protects the cocoon from danger. It’s as if the larvae are somehow controlling the caterpillar’s actions. Even more eerie is that the caterpillar dies at almost the same exact time the adult wasps emerge.

06

LINK

I don’t mean metaphorical human zombies like in the sense that we are all zombies because we lumber about our daily routines, go to our nine-five jobs, come home, go to bed, and repete. Even though that is a great subject for a poem, I mean literal human zombies!

Clairvius Narcisse was a Haitian man who was declared dead on May 2, 1962. His two sisters, Marie Claire and Angelina, buried him in a small cemetery near his hometown. 18 years pass and his family has carried on with their lives. Angelina is in the marketplace of her village when her deceased brother approaches her and introduces himself. How is this possible?

Certain kinds of poisons, like the secretion of a Japanese blowfish, can put someone in a comatose state and make them appear dead even to a doctor. Narcisse had ingested some poison like this and when he slipped into his death-like state was buried. Then someone came and dug him up. Upon awakening he was giving doses of a “zombie powder” which contained the drug Datura stramonium. The drug puts the user in an emotionless, trance-like state, but the user can still perform menial tasks. In Narcisse’s case he was used as slave labor on a sugar plantation. He was a zombie-slave for 18 years.

You don’t like zombies of the voodoo variety? Are you disappointed because when you read “Zombie Humans” you were hoping for overly aggressive, mindless killing machine as seen in almost every zombie movie since Night Of The Living Dead (1968)? Well don’t worry because human zombies like that are not out of the realm of possibility.

Seretonin is a chemical in our brain that helps keep us calm, but according to one scientific study done with mice, it also keeps us from being aggressive killing machines. A group of scientists created a group of mutant mice whose brains lacked the receptors to process seratonin and this resulted in the mice acting overly aggressive toward other organisms. Now Imagine a virus with the ability to prevent human brains from processing seratonin.

07

LINK

You could also imagine a parasite that takes control of our brain and makes us do unimaginable things. Not possible you say? Evolution tells us otherwise. Spinochordodes tellinii is a parasite that gets inside grasshoppers and releases a protein that interferes with their brain and makes them commit suicide by downing. Euhaplorchis californiensis gets inside the brain of killi fish and makes them swim and flop around on the surface of the water so it is more likely for it to get eaten by a bird. There is also a parasite that some scientists believe already changes human behavior.

Toxoplasma gondii is a parasite that is normally found in cats. It gets there by getting into rats through the filth they eat. It affects the rat’s behavior by making them friendlier toward cats so they are more likely to be eaten by said cats. Once inside the cats it begins reproducing (sounds like a morbid Dr. Seuss book). The parasite also gets inside humans and causes no physically harmful effects, but according to one psychological study it does change our personality. The study found that people tend to get more insecure when infected with the parasite (perhaps this explains emo kids). It also changed the personalities of men and women differently. It made men more jealous and suspicious and made women more affectionate.

10 Steps to Master Twitter

I  know that many of people who read AndFarAway are not only very active on Twitter, but use it much more effectively than I do.  The reason I’m writing this post because I am really, really tired of people giving up on Twitter after half a second and then deciding to claim that those who know how to use it are “dumb” and “narcissistic”.

Seriously. It’s easy. Just follow these awesomely easy 10 steps to use Twitter like a rockstar. I mean if all those lame celebrities can do it, I’m sure you can too.

10 Ways to Learn Twitter

1. Download the HootSuite Firefox pluginTweetDeck application, or Echofon Firefox plugin.
Maybe even all three, because the truth is: the twitter.com interface sucks, and you won’t be enjoying Twitter if you’re stuck in your browser window.

2. RT. RT. RT.
RT stands for “retweet”, and you RT a tweet when you want to share something interesting said by someone else with your followers. An RT is like a personal recommendation. It’s very important to RT only interesting stuff, because it defeats the purpose otherwise. Be social. Support tweeps who said something useful or have an event they want to publicize.

3. Reply.
I don’t practice this point as much as I should, but as is the case with blogs, replying to tweets that you were tagged in is really very important.

4. Play Twitter Games.
Twitter games like FollowFriday and MusicMonday can make Twitter more fun and introduce you to interesting tweeps.

5. Share interesting links.
I mean, we all read stuff online all day, and there are so many awesome links that should be shared. Your followers would appreciate a great link, trust me.

6. Keep it simple, stupid.
There’s so much beauty in 140 characters. Mainly that people who shouldn’t blab can’t blab. Anything can be said in such a short format if it’s worth it.

7. Brand yourself consistently.
Choose one Twitter profile image and stick to it, for god’s sake. People who keep changing their Twitter profile pictures are so annoying, because when you’re looking at the stream, you are looking at icons, not names.

8. Schedule tweets.
Use HootSuite or any other similar tool to schedule tweets to assure that your account is constantly updated. Even if it’s a weekend.

9. It’s actually okay to tell your followers what you had for lunch.
As long as that’s not the only thing you say all week.

10. Notice the time pattern.
Depending on where you are in the world, you’ll notice that there are different time patterns. In Jordan, for example, tweeps are most active early in the morning (9:30 AM), around 12:00 PM, and around 4:00 PM. Target your coolest tweets at these times.

I hope this answers the question I am always being asked, “Why the hell do you like Twitter?”

ANY QUESTIONS? OR JUST WANNA TALK OR KNOW INTERESTING STUFF? Then http://bit.ly/ThisIsMyTwitter\

Keep Your Facebook Account Safe From Hackers

Imagine you get up in the morning and login to your Facebook account to check the message and status of your near and dear friends. But surprisingly it is saying your have entered an invalid password even though you have not changed the password. That means your account has been a victim of phishing.

This is really a nightmare as all of your friends, pages and information has been compromised. Facebook has given some guidelines so that people can keep the account safe and secure. Here are some of the main points described below,

  • Always login to Facebook using https i.e. https://www.facebook.com/ as it is more secure. When you use the https option, all your activity on Facebook is encrypted which makes harder for anyone to access your Facebook information without your permission.
  • Do not open the Facebook login link from any unfamiliar sources like from any email, website.
  • Never store password in browsers, especially if you are accessing from any local computer.
  • Always use Lastpass for all passwords and set it up for multi-factor authentication.
  • For protecting your password always give complex password like combination of character, number and punctuations and should be more than six characters long.Do not use the same password which you use for other accounts.
  • If you are using a public computer never check the ‘Remember Me’ box as it stores the log even after you logged out. After you log out from Facebook always close the browser.
  • Add a secondary email address to Facebook and your valid mobile phone number. It will help you to get recovery of your account in case your Facebook account is hacked or compromised.

Six Easy Ways to Prank Your Friends and Family

Whether you’re just in the spirit of April Fools Day or looking for a good prank to pull on your brother or friend, here are six economical pranks that are sure to be fun.

 

If you are looking for a prank but don’t know what to do I have compiled a list that should help you. These are 6 fun pranks to pull on family or friends and all are either free or very cheap and shouldn’t get you in trouble.

  1. Put yellow (or really any color) dye in their water though yellow seems to work the best. This usually results in an amusing outcome and is fairly simple.
  2. Give them a prank call. A classic prank call is always fun but there are also several online sites such as  http://wakerupper.com/  or http://www.prankdial.com/ where you can enter in a text message and they convert it to a voice message. It seems fairly simple but I have not tried any of them so I am not completely sure that they work.
  3. Ask them if they can roll a quarter up and down their nose. Before you give them the quarter cover the edge in some sort of black in, from a marker is usually easiest, so that when they roll it up and down their nose it leaves a black line. This prank is also fairly simple, especially since they’re usually not expecting it and you can have tons of fun with it.
  4. Mess with they’re computer when they’re away. There’s several things you can do such as install the blue screen of death screensaver or flip everything upside down. My favorite one is installing a certain firefox add-on at http://www.instructables.com/id/Firefox-Pranks/?utm_source=rss&utm_medium=rss. I have yet to try it but it looks like it should work very well. The only downside is that it will only work on people that use firefox.
  5. Bake a batch or two of cookies. Probably make about a quarter normal and the rest put spicy peppers in them but be sure to remember which are which. When you and maybe a couple friends are eating your cookies (the normal ones) you give the spicy ones to whoever you want to prank. The result is hilarious.
  6. This one requires advanced planning and a cool teacher but it sure to work on your friends. Once everyone arrives at school, or at some random point in the day, have the teacher tell everybody that there is a fire in the building and they have to evacuate immediately. If you can, arrange for fire alarms and the whole shebang as they will definitely make it more believable. As I said, make sure you talk to your teacher and plan in advance for this one to work.

How to hack facebook passwords(educational purposes only)

Hack Facebook PasswordWondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!

Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.

With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.

Possible Ways to Hack Facebook Password

 

1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer.

Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.

Easily Access any Email
SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!

Why SniperSpy is the best?

Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.

Here is a summary of benefits that you will receive with Sniperspy software:

1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.

2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.

3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.

4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.

5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.

6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.

7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.

So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!

2. Phishing – The Difficult Way

The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofeed webpage) which will exactly resemble the original one. Say for example, a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.

Most Internet users would easily fall prey to such online phishing scams. Thus phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Hence it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers to hack Facebook password since it is the easiest and the safest way.

 

Facebook Hacking Methods that Do Not Work!

 

Today, there are hundreds of scam websites out there that are waiting to rip off your pockets by making false promises. These websites claim to be the experts in the field of hacking and boast to instantly obtain any password for you. Most people fall victim to these websites and lose their hard earned money. Thus the idea behind this post is to expose the truth behind hacking the Facebook (or any email password) so that you can learn how to do it for yourself and stay away from all those scam websites. The following are some of the hacking methods that actually do not work:

1. Many scam websites claim to exploit a certain vulnerability of Facebook website as a means to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. I advise you to stay away from such scam websites.

2. There is no ready-made software program that is available to hack Facebook password except the keylogger (spy software). In fact, keyloggers are pretty generic and meant to record the keystrokes of a computer which obviously includes the password also. Keep in mind that apart from the keylogger, there is no such program that is specifically designed to gain access to Facebook accounts. Stay away from any website that claim to sell such program.

3. Beware! On many websites and Internet forums you will often see fake articles about Facebook hacking. Most of them will tell you something like this: “you need to send an email to passwordretrieve@facebook.com along with your username and password” (or something similar). Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.

I hope this post will help you avoid scams and choose the right approach to accomplish your goal. 

Best ways to get followers on twitter that i personally use

1. Okay so firstly u need a quick to read short BIO about yourself that tells about your work , your personality , and most important…About YOU!!! So that people know who they are following and for what they are following you!!!

2. Secondy, I suggest you to use hashtags in about each and every post of yours ( If you dont know what a Hashtag actually is then just search it on google and u ‘ll get to know!) For eg. Check out my new #blog post at my #new blog sahil.wordpress.com(sahil.us.pn) #blogging !! …well acutally this is a disgusting post dont use hashtags so often that your followers get bored!! at least u got the idea !!

3.Organize contests on your twitter account if you can because this way you can gain lots of followers as they will be interested in your contests! and follow you for more!

4.Interact with your followers as this is the best way to make them keep following you and you can make new friends this way!!

5.Tweet daily!! if you dont then your followers may get bored because of you inactiveness and unfollow you!!

6.Use twitter tools(google search!) . For eg. i use a tool that tells me the people whom i am following but they are not following me back and I unfollow them ! as simple as that.

7 Be Patient! use these methods and u will surely get more followers on daily basis. If you want to check your stats go to this URL http://bit.ly/SahilWP   

ANYTHING YOU NEED TO ASK FEEL FREE TO CONTACT ME ON TWITTER , GMAIL , FACEBOOK

http://bit.ly/ThisIsMyTwitter

http://on.fb.me/ThisisMyFacebook

My Gmail is sahil23singh@gmail.com

JAN 27 IS MY BIRTHDAY DO WISH ME IF YOU CAN I WILL FEEL HAPPY

Hack Your Own Super Fridge

Be warned: Should you choose to follow the instructions set forth, your hands may be dirtied and your patience may be tried. You may void the occasional warranty or risk having your friends call you “eccentric.” But in the end, you will know the incomparable satisfaction of greenhacking.

This week’s hack: Turn a chest freezer into a hyper-efficient refrigerator

Items needed: 1 chest freezer, 1 external thermostat (available at hoptech.com), 1 very understanding spouse who doesn’t mind pawing through a chest freezer to find the leftover lasagna.

Why this hack: We begin with this hack because it is simple and because the green return on money and time invested is impressive. Utilizing an inexpensive Energy Star chest freezer (about $400 for a 15-cubic foot model) and the aforementioned thermostat ($60), you can save more than half a kilowatt hour per day (and possibly much more: When I implemented this trick on a used Vestfrost freezer I picked up for $200, it consumed less than 1/8th of a kilowatt-hour per day).

If you’re paying $.16/kilowatt hour, that’s a savings of… ah, forget it. Repeat after me: “I hack for the hack, not the payback.”

Why it works: Well, for one, freezers tend to be better insulated than refrigerators. And for another, cold air settles. Every time you open the door to your fridge, cold air is essentially falling out of it; when you lift the lid on a chest freezer, the cold stays where it belongs: In the freezer.

Heart of the hack: Plug in external thermostat. Stick thermostat sensor in freezer (just run the capillary tube between the sensor and the thermostat over the lid gasket; the gasket will protect it from damage when opening and closing your freez… er, fridge), and set thermostat at 40-degrees or so. Plug the freezer into the thermostat and voila! You are a greenhacker.

Handy tips: If this is going to be a long-term arrangement, get some internal dividers for your new chest fridge to minimize the cluster factor. It also helps to elevate the freezer on some sort of base to ease the strain on your back.

How to Ditch Big Brother and Disappear Forever

How to Ditch Big Brother and Disappear Forever

So you’ve decided you want to drop off the map and leave Big Brother behind. It’s harder than ever in our always-connected world, but if you’re ready to plan your big vanishing act, here are a few tips to get you started.

If this looks familiar, you’re not crazy. Our guide to dropping off the map is a perennial Evil Week favorite.

Who hasn’t thought about how nice it would be to start fresh somewhere new, preferably with nicer weather and cheaper drinks? Whatever your reasons for wanting to disappear—maybe you just want to get The Man off your back—with enough diligence and planning you can vanish and start anew somewhere else.

For the low down on disappearing and starting your life over, we turned to the book How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank M. Ahearn and Eileen C. Horan. Frank Ahearn is the grizzled grandfather of the vanishing act. After 20 odd years working as a skip tracer—an investigator who specializes in finding people who don’t want to be found—he realized he could make just as much money and incur a lot less risk helping people avoid investigators like himself. We’ve culled a few of Ahearn’s tips below, but if you’re really serious, his book is a great pocket guide to getting lost. Photoadapted from the Australia edition of How to Disappear.

How Not to Disappear

 

The cardinal sin in any serious disappearance is drama. You don’t successfully vanish by staging an elaborate disappearing act that ultimately involves a tri-state search, police dogs, and your home town believing that you were mauled by a bear and dragged off into the dark night. Ahearn stresses the importance of disappearing in a legal fashion. You shouldn’t, for example, try and secure false papers: It’s a felony to use false identification, and you have no idea if the papers you secured are legitimate. (What if your new social security number belongs to a dead guy or a criminal? What if the passport you bought is bogus and now you’re staring down a customs agent?). Instead, you want to obfuscate your identity in a way that it’s so difficult for people to follow you that anything short of a government task force will lack for the patience or funding to keep doggedly trying to find you. Here’s a little about how that might work. Photo by David McDermott.

 

Minimize Your Social Connections

 

People who hurriedly throw all their crap in a suitcase and run out the back door are the ones who fail at disappearing. Instead, one of your most important jobs, prior to your successful disappearance, is to slowly cut the fat from your social life. Stop using Facebook—ditch all social networks—maybe under the pretense that you’re spending too much time online (or any other pretense that people around you will accept besides “I’m going to torch my crappy life and move to Belize”).

 

You want to minimize the social footprint you occupy so that when suddenly you’re not standing in it anymore, few people will notice or care. If you’re the most prominent member of the local social scene and you vanish tomorrow, people will notice. Minimizing your virtual trail is more important than minimizing your real life trail. It takes mere minutes for an investigator to comb through social networks and search results, but hours and additional expenses to investigate on foot and by phone. Photo by Luis Perez.

The one social connection most people are unwilling to ditch is communication with their immediate family. Unless your immediate family is the reason you’re pulling a vanishing act, chances are you’ll still want to talk to your parents or siblings. This can the toughest communication to break, and it’s where almost everyone fails. All the planning in the world is worthless if you call your relatives from your new location and a skip tracer gets her hands on the phone records. If you want to communicate with your family or best friend after you’ve vanished from the less desirable people in your life, then you need to figure out, well in advance, how you will do so. Never communicate with them directly from any account linked to your new life or new residence. Anonymous email accounts and prepaid phone cards and cellphones are the only way you’re going to be finding out if Grandma’s hip surgery went well.

Ditch the Plastic; Cash Is King

 

Get used to the idea of ditching the luxuries you had in your former life. Gone are the credit cards, the convenience cards and loyalty cards, even simple things like a video rental card. Pay cash for everything and don’t use anything that could link your new life and your plans to your old life. Don’t check out books about Chile from your local library or buy them with a credit card. Don’t use a credit card or frequent flier miles to book a flight out of the country. Your goal in everything you do is to minimize the number of connections between your old life and your new life. Whenever you undertake an interaction with another person or business, ask yourself “Is this the least traceable method I could use?” Paying cash for a cup of coffee at an old coffee shop? Obscure. Paying with a credit card for a cup of coffee at an airport kiosk under the eye of four different security cameras? Not stealthy in the least. Cash is king. Photo by Andrew Magill.

 

Lie, Lie, and Lie Some More

 

Ahearn goes into intense detail on the topic of disinformation and its importance in disappearing. He notes that the thing skip tracers hope for most is just enoughinformation—too little and they’ll never find their prey, too much and they’ll waste all their time and funding looking in the wrong places. Your goal is to create disinformation.

 

As you prepare to disappear, slowly but surely start fudging the information companies have on you. “Correct” the spelling of your name on file with the local utility company, tell them they have the wrong social security number and offer a correction, change your mailing address for your bills to a fake mail drop you set up through a private mailing company. If people come looking for you, you want them to waste their time looking in the wrong places. Chapters 7, 8, and 9 of Ahearn’s book are all devoted entirely to disinformation, creating false leads (with examples from his work that are so clever you’ll want to hire him just to see him in action), and establishing yourself securely in a new locale. Photo by Anonymous9000.

Incorporation, The Binding Glue

 

At this point you might be nodding your head, thinking that the plan sounds great so far, save for the one glaring detail. If you can’t use anything but cash how on earth are you going to establish a new identity in your new location? Since you don’t want to lead the life of an illegal alien in your new locale, you’re going to need some way to have a legal presence that isn’t intimately tied back to your old identity.

 

Creating a corporation to manage your assets is one way many people handle their affairs once they have disappeared. Your corporation, only vaguely linked to you and not in the way that is readily identifiable to skip tracers, will be the entity that leases your apartment, pays your utility bills, and otherwise delegates your money out while serving as a shield between you and those looking for you. The details of this are best discussed between you and a lawyer or after careful research into what kind of corporation (and where) would be the best fit for you. Photo byDiana.

Lastly: Don’t Bother If You’re Not Committed

 

Disappearing is not easy. You don’t just fake your own death, buy some false papers in an alley from a guy with an indiscernible accent, and then retire to a life of leisure on a small island nation. Disappearing, and doing so legally and without incurring a bigger headache than the one you’re running away from, takes careful planning. You need to be willing to cut contact with nearly everyone you know (if not everyone), change how you shop, and even ditch your hobbies. Disappearing means beginning a game of chase with people who want to find you and being willing and strong enough to outlive them at that game. If you can’t do that, you’ll waste a lot of time and money trying to disappear but failing. Photo by Bohari Adventures.

 

Further Reading

 

The total planning and execution of your disappearance is well beyond the scope of this article. If you’re seriously entertaining the idea of disappearing, we highly recommend checking out Ahearn’s bookHow to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace. If you’re serious about vanishing, it offers insights and tips you likely never even thought about. If, like most of us, you’re not serious about vanishing, it’s still packed with fascinating stories culled from the hundreds of clients Frank has helped vanish from their old life and start a fresh one more to their liking. Either way you’ll end up a little more paranoid about your privacy and security and a lot more knowledgeable about the ways people abuse both.

 

Post Navigation