round minus
round plus

A Telepresence Robot!


It's here folks.

A telepresence bot ... or one giant leap toward the Singularity? Dock an iPad on this rover and it uses the tablet's camera and display to serve as your eyes and avatar at far-flung meetings, Little League games, ballet recitals, or anywhere else you can't—or don't want to—be.Also it's the same one used by our beloved Sheldon from the fuck somi he Big bang theory!

Windows 7 GOD MODE!

Did you know that windows 7 has a GOD Mode?
Yes ! you heard me God mode! And it is aptly named because when you enable it you can access virtually all of the configurable settings present in windows 7.

To enable it simply  create a new folder on your desktop--or anywhere you'd like--and name it: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}. Don't include the final period. The resulting folder will contain 270 items, representing virtually every configurable option in Windows 7.

Easy as that!

 

Mini Bluetooth Wireless Keyboard Keypad For iPhone iPad PS3

  • Weight

    250.00g
  • Description

    The Bluetooth wireless keyboard makes typing easy on your iPhone, iPad, Playstation 3, smart phone, PDA, Tablet, etc. It is light weight and compact design, good for travelers. Easy to charge and the battery lasts for long time use.
  • Features

    - Bluetooth Version Bluetooth V2.0
    - 49 keys mini keyboard
    - 2.4GHz band wireless frequency
    - Built in rechargeable Li-ion battery
    - Micro USB port charging
    - Color LED for working status indication
    - Working wireless range: 10m
    - Charging time: 3- 4 hours
    - Palm-size compact design.
  • Specification

    Compatible With:
    - Computers with Windows/Mac Linux OS
    - Handhelds with Android/Windows Mobile( 6. 0 &later) / Nokia Symbian S60
    - Sony Playstation3
    - HTPC with built- in Bluetooth
    - Apple iPad, iPhone/ Touch in 4. 0 OS

    Mobile System Requirements:
    - The device must built in Bluetooth function
    - The mobile Operating System should be one of following:
    - Google Android OS
    - Windows Mobile (6. 0 & above) OS
    - Nokia Symbian S60(V3. 0 & above) OS
    - iPhone 4.0 OS
  • Package include

    - Mini Bluetooth Keyboard
    - Installation CD Incl User Manual
    - Power USB2.0 Cable
  • Compatible Brand

    Apple
  • Interface

    Bluetooth
  • Type

    Wireless


12 Very Helpful Facebook shortcuts





Facebook has very become a necessity these days. It is the number one Social networking site in the world! Undoubtedly so awesome that it surpasses over a billion users!  
To navigate around Facebook easily and more conveniently, here are some neat little shortcuts that can improve your Facebook experience!

 

 


Send a New Message Shortcut


  • If Firefox is being used, to send a new message press the key combination Shift + Alt + m
  • In Google Chrome use Alt + m and you can compose a new message.
  • For Internet Explorer the shortcut Alt + m + Enter has to be pressed to send a new message.

 

Facebook Help Center Shortcut


Wherever you're on Facebook, to go to Help Center straight away, Firefox users type Shift + Alt + 0. Chrome users Alt + 0 and using Internet Explorer press Alt + 0 + Enter

Facebook Home Shortcut

From wherever to reach Home page, Firefox users press the shortcut Shift + Alt + 1, chrome users Alt + 1 and when IE is being used Alt + 1 + Enter

Facebook Profile Page Shortcut

To view your Profile page in Facebook, Firefox users have to press Shift + Alt + 2 where as the key combination is Alt + 2 for Google Chrome users and Explorer users can press Alt + 2 + Enter

Shortcut to Find Friends, Send Friend Requests

To send friend request, Firefox users press Shift + Alt + 3. Chrome users Alt + 3 and IE users Alt + 3 + Enter

Shortcut to View Messages in Facebook

To view the messages press Shift + Alt + 4 in Firefox and while using Chrome press Alt + 4 and Internet Explorer users press Alt + 4 + Enter

Your Notifications Shortcut

To view all the notifications reached to your profile, in Firefox use shortcut Shift + Alt + 5, in Chrome it is Alt + 5 and for IE users the shortcut is Alt + 5 + Enter


Account Setting Shortcut


To view your Facebook account settings:
  • In Firefox Shift + Alt + 6
  • Chrome users Alt + 6
  • Explorer users Alt + 6 + Enter

Privacy Settings Shortcut

For reaching your privacy settings:
  • While in Firefox press Shift + Alt + 7
  • Chrome users press Alt + 7 and
  • IE users press Alt + 7 + Enter

Official Facebook Page Shortcut

To go to Facebook official home page,
  • In Firefox type Shift + Alt + 8
  • Chrome users Alt + 8
  • Internet Explorer users Alt + 8 + Enter

Service Agreement Shortcut

To view the Facebook rules and regulations, shortcut Shift + Alt + 9 is for Firefox users, Chrome users Alt + 9 and IE users Alt + 9 + Enter

Like/Unlike Photos, Previous Post, Next Post Shortcuts

  • To like or unlike a photo, shortcut key L is used which works in all windows browsers. Whatever may be the browser press L key for Like/Unlike, for the first time appears dialogue box and it is enough that you check the 'Don't ask me again' option.
  • To go to the previous post in the news feed use shortcut K
  • Useful shortcut for next post in news feed is J



Will you be checking in.....?




Phishing over a WAN

Phishing Over A Wide Area Network



(Disclaimer: This tutorial is for educational purposes ONLY and is not intended to be put into practise unless you have authorised access to the system you are trying to break into. The authors of Zettaflops DO NOT claim any responsibility for the actions of their viewers. )
In this tutorial, you will learn how to perform a phishing attack on a wide area network (WAN), meaning that you can target victims worldwide. For those of you who are unfamiliar with what a phishing attack is, here's a brief explanation. Phishing is a method that is utilized to capture usernames and passwords through the use of a fake or cloned login page. 
Prerequisites
BackTrack 5
An internet connection
A router
Your router's login info
Before we begin, let's take a quick look at our agenda.
Learn our network's external IP address
Configure an inbound service on our router
Configure the phishing attack
Clone Facebook's login page
Create a link to our phishing page
Lure a victim
Now that you've met the prerequisites and you understand the agenda, let's get started.
1. Boot BackTrack 5 and login
First, we need to learn our network's external IP address.
2. Open a web browser and navigate to "http://whatismyip.org"
3. Make note of your external IP address
Now we need to learn our computer's local IP address.
4. Open the Wicd network manager
5. Make note of your computer's IP address
You can find your IP address in the bottom status bar of the Wicd network manager
Now we need to log into our router and configure an inbound service. I'm using a Netgear DGN1000 N150 wireless router. If your router's web interface is different than mine and you are having trouble following along, you can Google "how to setup inbound services on [your router here]"
6. Open a web browser and navigate to your router's web-based control center
This is done by entering your router's local IP address in the URL bar
If you don't know your router's IP address, you can find it by navigating to "http://findmyrouter.net"
7. Navigate to your router's Firewall Preferences or Rules
8. Select the option that allows you to add an inbound service
9. For the service type, select "any service" or "all services"
If your router will only allow you to select a single service, select the option for HTTP or port 80
10. For action, select "allow always"
11. Set you LAN server to your computer's local IP address
This is telling your router to send traffic from your phishing page to your computer
12. For WAN users, select "any" or "all"
Once you've finished configuring your inbound service, save it and log out of your router. Now, it's time to configure our phishing attack and launch it. 
13. Open a terminal
14. Type "cd /pentest/exploits/set"
15. Type "./set"
16. Select option 1- Social Engineering Attacks
17. Select option 2- Website Attack Vectors
18. Select option 3- Credential Harvester Attack Method
19. Select option 2- Site Cloner
20. When prompted to enter the IP address of the POST back machine, enter your network's external IP address
Example: "71.142.91.56"
21. When prompted to enter the URL of the website to clone, enter the URL for Facebook's login page
Example: "https://www.facebook.com"
Now your phishing attack is active and running. If you want to test your phishing page, you can open a web browser and enter your network's external IP address in the URL bar. This is the same page that your victim(s) will see; however, you don't want to send your victim(s) your IP address as a link because it would be suspicious. So, to disguise our IP address, we are going to use Google's URL shortener service.
22. Open your web browser and navigate to "http://goo.gl"
23. Enter your computer's local IP address and click "Shorten URL"
Example: "http:71.142.91.56"
24. Make note of your shortened URL
Now it's time to lure a victim to our phishing page.
25. Send the shortened URL to your victim
When your victim clicks the link, he or she will be taken to your phishing page. Then, when your victim attempts to login, his or her username and password will be returned to you.
Recommended Lure Methods
Email
SMS Text Message
Facebook Comment
Instant Message
Tweet
Email Lure Tips
Hyperlink your shortened URL to an image or another piece of text
Include enticing text and images
Check for spelling and punctuation errors
Change your email display name
Change your reply-to email address

Phishing attack over a LAN

Phishing Over A Local Area Network
(Disclaimer: This tutorial is for educational purposes ONLY and is not intended to be put into practise unless you have authorised access to the system you are trying to break into. The authors of Zettaflops DO NOT claim any responsibility for the actions of their viewers. )
In this tutorial, you will learn how to perform a phishing attack on a local area network (LAN). For those of you who are unfamiliar with what a phishing attack is, here's a brief explanation. Phishing is a method that is utilized to capture usernames and passwords through the use of a fake or cloned login page.
NOTE: When phishing on a local area network (LAN), you must be connected to the same network as your victim. Although this isn't very practical for real-world applications, it is a good place to begin for practice. If you want to target victims outside of your local area network, refer to "Phishing On A Wide Area Network." 
Prerequisites
BackTrack 5
An internet connection
Before we begin, let's take a quick look at our agenda.
Configure the phishing attack
Clone Facebook's login page
Create a link to our phishing page
Lure a victim
Now that you've met the prerequisites and you understand the agenda, let's get started. First, make sure you are connected to the same network as your victim.
1. Boot BackTrack 5 and login
2. Open a terminal
3. Type "cd /pentest/exploits/set"
4. Type "./set"
5. Select option 1- Social Engineering Attacks
6. Select option 2- Website Attack Vectors
7. Select option 3- Credential Harvester Attack Method
8. Select option 2- Site Cloner
9. When prompted to enter the IP address of the POST back machine, enter your computer's local IP address
If you don't know your IP address, you can find it in the bottom status bar of your Wicd network manager
Example: "192.168.0.5"
10. When prompted, enter the URL of the website that you want to clone. For this tutorial, we are going to use "https://www.facebook.com"
Now your phishing attack is active and running. If you want to test your phishing page, you can open a web browser and enter your local IP address in the URL bar. This is the same page that your victim(s) will see; however, you don't want to send your victim(s) your IP address as a link because it would be suspicious. So, to disguise our IP address, we are going to use Google's URL shortener service.
11. Open your web browser and navigate to "http://goo.gl"
12. Enter your computer's local IP address and click "Shorten URL"
Example: "http:192.168.0.5"
13. Make note of your shortened URL
Now it's time to lure a victim to our phishing page.
14. Send the shortened URL to your victim
When your victim clicks the link, he or she will be taken to your phishing page. Then, when your victim attempts to login, his or her username and password will be returned to you.
Recommended Lure Methods
Email
SMS Text Message
Facebook Comment
Instant Message
Tweet
Email Lure Tips
Hyperlink your shortened URL to an image or another piece of text
Include enticing text and images
Check for spelling and punctuation errors
Change your email display name
Change your reply-to email address