Tuesday 31 January 2012

Rajnikant’s Website:Runs without Internet



 


Welcome to Hackers World!!!!!


Hi friends, its serious if you do not believe than you have too because I just saw it it and enjoyed it a lot, means what ever you say Rajni-Kant properly means that there’s nothing which Rajnikant cannot do. So when I just saw this website I was just amazed than how it can run without internet but the thing is that its really running without as it will only be accessible if you will disconnect your internet.

So now if you wanna access Rajnikant’s website than visit http://www.desimartini.com/allaboutrajni.htm
 and you will see page like above so now disconnect your internet to access it further and than enjoy this funny website swell I think its just on something like Biography type of website and than if you connect again to your Internet than this website will give you an error than disconnect your Internet again to access this website.
So here we go with another funny website which used Rajni’s Power to access website online, well I hope this is another creative concepts brought by South Designers for their GOD.


Thanks For Reading this Article. Hope you will like……

Be a Good Hacker and Save The Nation!!!!!



Thanks & Regards
Tarun Arora




Friday 27 January 2012

Important Security Tips for Ensuring Safety on Facebook


Welcome to Hackers World!!!!!

 

The social networking site Facebook has become a phenomenon in the modern world. People of every age group nowadays seem to have a Facebook account and besides connecting with friends, it has also become a medium for expressing their thoughts over various social matters.
Though it is a very useful medium to remain connected with friends and with the world, but it is not entirely devoid of the disadvantages. Hackers are the worst enemies of Facebook and since more and more people are joining this site, so it has become a great medium for the hackers to obtain personal information of the users by hacking their accounts. However, the user can ensure their safety of their private information by adopting the precautions described below -

Enabling SSL Encryption – Earlier, Hypertext Transfer Protocol Secure or HTTP was only used for keeping secure the password of the user but now with the increasing sophistication of attacking tactics of the hackers, Facebook has switched to SSL encryption to ensure complete security for the user. In order to enable this security feature, the user is just required to visit the Accounts Settings page and click the edit symbol after which the option of SSL Encryption appears.
Be careful about the information you are going to share – Some information shared by the user in their profile seems harmless but in some cases this small information could be used to hack the entire account. In most of the cases, the date of birth is used for hacking the account as majority of people use their birth date as the answer to certain security questions. Hence, one needs to think carefully before sharing any personal information with the public or even with friends and must choose the security questions cleverly.
.
Always Log Out of Facebook after finishing browsing – Logging out of Facebook after browsing is important to ensure safety from the hackers. It prevents the act of Likejacking which is a form of clickjacking that helps the hackers to update a status for a site that the user would not approve. There are many incidents of likejacking only because some users just forget to log out of Facebook after browsing. It is even highly recommended for the Facebook users who browse through public computers or access points.
Just as I mentioned when I started, Facebook is a highly useful medium, both for online marketing and engaging with potential prospects or making friends. But if one is ignorant about the safety issues there, things can become messy.

Thanks for Reading this Article, Hope you will like…..

Be A Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora
Tarora89@gmail.com


Sunday 22 January 2012

How to send password protected Email


Welcome to Hackers World!!!!!

 

Now a days, Email is the most common media for information interchange. It is used by most of the working person. Most of the popular email servers such as GMail, Yahoo mail, Hotmail and many other provide this email service for free. Users need to create a free account and then they can use their account for sending and receiving emails.

But Cyber criminals are always try to hack passwords of users email account to read emails and misuse the account. Do you know? you can also protect each mail sent by you with a password for better information security. If some one managed to get into the account, he would not be able to read the email without knowing the password. To send the password protect email, you have to use a third party service named as LockBin


  • Fill the form and send the mail. And also inform receiver that you have sent the mail and password as well

  • Recipient will get the email with a link. To read the email, he will have to go the link and verifiy the password which you have entered while sending the email.

  • After submitting password Receiver can view message.

Thanks for Reading this article. Hope you will like……...
                                                                               
Be a Good Hacker and Save the Nation!!!!!
Thanks & Regards
Tarun Arora




Friday 20 January 2012

MegaUpload Site Shut down by FBI



Welcome to Hackers World!!!!!

The worlds one of the most popular file sharing websites — Megaupload — has been shut down by federal prosecutors in the United States.

 The site was hit by a major federal indictment against piracy. The founders of the site were accused of causing copyright holders to lose $500 million in revenue. Although the site is based in Hong Kong, it operated on some servers that were located in Virginia, in the United States. Arrests were made of Kim Dotcom, a Dutch citizen and three other employees in New Zealand at the request of the United States officials.
The timing of the takedown comes after websites across the internet, such as Wikipedia and Reddit went down for up to 24 hours in protest of SOPA/PIPA.
Just before the site was taken down today, it posted a statement on its homepage saying that claims they facilitated copyright infringement were ”grotesquely overblown” and went on to say ”The fact is that the vast majority of Mega’s Internet traffic is legitimate, and we are here to stay. If the content industry would like to take advantage of our popularity, we are happy to enter into a dialogue. We have some good ideas. Please get in touch.”

Thanks for Reading this article. Hope you will like…..


Be a Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora

Monday 16 January 2012

All Windows Password Breaking Tool


Welcome to Hackers world!!!!!

Hello friends I have found for you a very easy and effective method for Breaking windows Password. With this software you can easily break Administrator password , user account passwords .you can also break advance level of passwords like SYSKEY password , Facial Expression Password , and Thumb Recognition passwords. the Syskey password is very strong password if you forget the password there is no option to recover this password .you will have to install new windows. But now there is no need to install windows .you can easily break any password of windows in any OS. If you have forgotten your password, or your computer is locked out, or you do not have access to the password of the system, you only need to boot from this software from CD/DVD/USB to reset your lost password. Then you can get back into your system in a minute. No need to call a technician, no need to re-install anything, and you certainly don't need to reformat.

Click the link below to download the ISO file of windows password recovery tool.

http://www.ziddu.com/download/18266312/passwordremoverbytarunarora.zip.html


Thanks for reading this article. Hope you will like……..

Be a Good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora

Tarora89@gmail.com

Friday 13 January 2012

WHAT IS TROJAN HORSE

Welcome to Hackers World!!!!!


Hi Friends today I am going to tell you about Trojan horse. but First of all I would like to tell you the Difference between Trojan , Viruses and Worm. Some people think that Trojan and virus both are same but I will tell you what the differences between them are.


Trojan horse- It is a program, using this program it will make the victim system to make listen on particular port, so that attacker can do anything on your system, i.e. he can tamper with, steal, and destroy the data etc...., a Trojan horse won’t spread in to the system like a virus so it won't effect the system performance.


virus- It is a malicious program, using this program it will damage your system, by injecting the virus in to another programs are files, so that it will regrade your system performance. Virus will come to the system with user interaction only.


worm- It is also one type of virus, using this program it will damage your system like virus, not only system it will spread through out the network and checks for honey pot of your os, and enter into the os, it will regrade your system performance and also it will eat your network bandwidth.


Trojans are executable programs, which mean that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like "exe", "vbs", "com", "bat", etcTrojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan. Some Trojan horse viruses will simply be annoying and will not necessarily harm your computer in any way, while others can and will be able to cause serious damage to your computer by deleting files and destroying vital information on your system

How to protect from Trojans
There are several steps that you can take to protect your computer from viruses such as Trojan horses. You should always make sure that your operating system is up to date. You should never go without antivirus software on your computer, and you need to remember to use this frequently, about once or twice a week. You must make sure that you are consistently getting updates on these programs. You will also want to make sure that the antivirus program which you have has the ability to scan emails and other files which are downloaded from the Internet, as this is the primary resource where computers are attacked by viruses.

Thanks for Reading this article. Hope you will like……….

Be a Good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora
Tarora89@gmail.com

Thursday 12 January 2012

World’s Top Most Renowned Hackers


Welcome to Hackers World!!!!!



Kevin Mitnick

Kevin David Mitnick (born on August 6, 1963) is a computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.

Computer hacking

At age 12, Mitnick used social engineering to bypass the punchcard system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering became his primary method of obtaining information, including user names and passwords and modem phone numbers.

Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended on Valentine's Day, 1995 in Raleigh, North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification.


Gary McKinnon


Gary McKinnon, a Scottish systems administrator has been accused of the biggest military computer hacking exercise of all times by the US government. McKinnon is also accused of copying data, account files and passwords into his own computer. US authorities pegged the cost of tracking and rectifying the problems caused by his hacking at over $700,000.


Gary McKinnon (born 10 February 1966) is a Scottish  systems administrator and hacker who has been accused of what one U.S. prosecutor claims is the "biggest military computer hack of all time,"  although McKinnon himself states that he was merely looking for evidence of free energy suppression and a cover-up  of UFO activity and other technologies potentially useful to the public. After a series of legal proceedings in England, McKinnon is currently fighting extradition  to the United States.


Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage.



 Pranav Mistry

Pranav Mistry is a PhD student in the Fluid Interfaces Group at MIT's Media Lab. Before his studies at MIT, he worked with Microsoft as a UX researcher; he's a graduate of IIT. Mistry is passionate about integrating the digital informational experience with our real-world interactions.


Pranav Mistry (b. 1981 in Palanpur, India) is one of the inventors of SixthSense. He is a research assistant and a PhD candidate at MIT Media Lab. Before joining MIT he worked as a UX Researcher with Microsoft. He received Master in Media Arts and Sciences from MIT and Master of Design from IIT Bombay. He has completed bachelors’ degree in Computer Science and Engineering. He is from Palanpur, which is situated in northern Gujarat in India. SixthSense has recently attracted global attention. Among some of his previous work, Pranav has invented Mouseless - an invisible computer mouse; intelligent sticky notes that can be searched, located and can send reminders and messages; a pen that can draw in 3D; and a public map that can act as Google of physical world. Pranav holds a Master in Media Arts and Sciences from MITIndustrial Design Center, IIT and Master of Design from Bombay besides his Bachelor degree in Computer Engineering from Nirma Institute Of Technology, Ahmedabad. Pranav’s research interests include Ubiquitous computing, Gestural and Tangible Interaction, AI, Augmented reality, Machine vision, Collective intelligence and Robotics.

SixthSense was awarded the 2009 Invention Award by Popular Science. He was also named to the MIT Technology Review TR35 as one of the top 35 innovators in the world under the age of 35. In 2010, he was named to Creativity Magazine's Creativity 50. Mistry has been called "one of ten, best inventors in the world right now" by Chris Anderson. Mistry has been listed as one of the 15 Asian Scientists To Watch by Asian Scientist Magazine on 15 May 2011.


 

Operation AntiSec



Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of  hacking group LulzSec, the group Anonymous, and others inspired by the announcement of the operation. LulzSec performed the earliest attacks of the operation, with the first against the Serious Organised Crime Agency on 20 June 2011.

Soon after, the group released information taken from the servers of the Arizona Department of Public Safety; Anonymous would later release information from the same agency two more times. An offshoot of the group calling themselves LulzSec Brazil launched attacks on numerous websites belonging to the Government of Brazil and the energy company Petrobras. LulzSec claimed to retire as a group, but on 22 June they reconvened to hack into the websites of British newspapers The Sun and The Times, posting a fake news story of the death of their owner Rupert Murdoch.

Anonymous released their first cache of the operation on 27 June 2011, taken from an anti-cyberterrorism program run by the United States Department of Homeland Security and Federal Emergency Management Agency. They continued attacks on the Arizona government. They also launched attacks against the Brazilian government, Government of Zimbabwe, the Municipality of Mosman, and the Government of Tunisia. Their most recent attacks have been against large corporations, NATO, and various United States law enforcement websites. Anonymous has used the stolen credit card numbers of police officers to make unauthorized donations to various causes. Others have also committed hacks in the name of the operation, including a hack into the Fox News Twitter account to post a false news story about the assassination of President of the United States Barack Obama and attacks on the websites of government entities in various countries. The groups involved have published sensitive government and corporate information, as well as the email addresses, names, and social security numbers, and credit card numbers of website users.

Law enforcement has launched investigations into many of the attacks committed as part of Operation AntiSec. At least seven arrests have been made in connection to activities related to the operation, including the arrests of two purported LulzSec members, a man who provided LulzSec with security vulnerability information, and four alleged members of AntiSec NL, a group inspired by the operation.



Ankit Fadia



ANKIT FADIA, 24 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 14 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 10 million copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions around the world.


Books and Publications

  • Fadia, Ankit. The Unofficial Guide to Ethical Hacking, Course Technology
  • Fadia, Ankit. Network Security: A Hacker's Perspective, Course Technology
  • Fadia, Ankit. Hacking Mobile Phones, Course Technology
  • Fadia, Ankit. Tips and Tricks on Linux, Centro Atlantico, 2002.
  • Fadia, Ankit. Email Hacking, Vikas Publishing, 2020.
  • Fadia, Ankit. Windows Hacking, Vikas Publishing, 2020.
  • Fadia, Ankit; Jaya Bhattacharjee. Encryption Protecting your Data, Vikas Publishing, 2020.
  • Fadia, Ankit; Zacharia, Manu. Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection, Course Technology PTR, 2020
  • Ankit, Fadia; Diwakar, Goel. Google Hacking - An Ethical Guide, Vikas Publications, 2020
  • Das Patnaik, Nishant; Ankit, Fadia. Software Hacking, Vikas Publications, 2008.
  • Ankit, Fadia; Boonlia, Prince. System Forensics, Vikas Publications, 2020.
  • Ankit, Fadia; Singh, Aditya. Cracking Admissions in Colleges Abroad, Vikas Publications, 2020.
 Ankit Fadia Official Website



Thanks for Reading this article. Hope you will like…..


Be a Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora

Tuesday 10 January 2012

How file recovery software works


Welcome to Hackers World!!!!!

 

Hi Friends you very well know about how to recover your data through Recovery software’s after deleting from Recycle bin. Today I will discuss how file recovery software actually works.

Files in a computer have a volume table (directory table) that contains, among other things, an entry for each file in the hard disk along with the address of the location where the file is stored. When a file is deleted, a small part of the table for that entry is modified marking the space as free. The data still remain in the disk until it is overwritten at some later time. Now two possibilities arise:

1) The table entry for a deleted file is intact. In this case, it will still contain the pointer to the file. A quick reading of volume table by the file recovery software followed by looking at the location for the file may recover data if it is not overwritten by that time.

2) The table entry itself is overwritten, i.e. some other file entry has replaced the free'd file's entry. In this case, the file recovery software uses Advance mode. In this mode, it scans the whole disk reading each block and matches the files there with entries in the table. That is the reason this option takes a long time. If the file in any block has an associated entry in the table, it means the file is still alive i.e. not deleted, and it skips to next file and its entry. If a file has no corresponding entry in the table, it means this file has been deleted and so the tool marks this as "Found".

The most important step in data recovery after a file is accidentally deleted is to make sure that the disk is immediately detached if one wants to recover the file. Otherwise, the data might get overwritten and not recoverable by such tools. It also means that just deleting a file doesn't ensure the data is gone. One needs a proper tool to erase data. Such tools overwrite the whole data in the disk with random bit patterns many times over rendering it pattern-less and non-recoverable. Hardware techniques also exist to erase data such as degaussing which basically erases data in a disc magnetically.



Thanks for Reading this article, Hope you will like……


Be a Good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora


Sunday 8 January 2012

How to Remove Ramnit Virus Manual


Welcome to Hackers World!!!!!


first of all if you don't know about Ramnit Worm see my previous blog http://hackersworld-tarunarora.blogspot.com/2012/01/facebook-hacked-worm-steals-more-than.html.
W32.Ramnit is a worm that infects .exe, .dll and .html files to reproduce and infect other systems. After infection, W32.Ramnit will hijack your browser to redirect you to a malicious domain. W32.Ramnit may also make contact with an anonymous third party through Internet Explorer exploits, allowing the remote attacker to violate your privacy and exert control over your computer. Many anti-malware programs have been unable to detect W32.Ramnit in some instances; severe infections can necessitate a complete system wipe to remedy the situation. Be cautious about worms like W32.Ramnit when on large networks or using removable media, and strive to delete W32.Ramnit quickly before it becomes too difficult to remove.

first things W32.Ramnit does is infect any .exe, .dll, or .html files W32.Ramnit can find. If you open these infected files, congratulations - now you've got W32.Ramnit, too! W32.Ramnit may also create concealed Autorun.inf files that are placed on various drives, including removable ones. Any computer that then accesses these drives will also get the W32.Ramnit worm.

Different versions of W32.Ramnit have been identified as a threat since January of 2010, and the worm is far from exterminated yet. Fortunately, indicators of W32.Ramnit's presence are sufficiently plain that you ought to see W32.Ramnit before it's been on your system too long. Deleting W32.Ramnit with sufficient quickness can mean the difference between your computer surviving without damage and your computer needing a complete hard drive wipe.

W32.Ramnit may also be detected under the slight variant names of W32.Ramnit.A and W32.Ramnit.B.

Backup Reminder: Always be sure to back up your PC before making any changes.


To remove W32.Ramnit, you must first stop any W32.Ramnit processes that are running in your computer'ds memory. To stop all W32.Ramnit processes, press CTRL+ALT+DELETE to open the Windows Task Manager. Click on the "Processes" tab, search for W32.Ramnit, then right-click it and select "End Process" key.

To delete W32.Ramnit registry keys, open the Windows Registry Editor by clicking on the Windows "Start" button and selecting "Run." Type "regedit" into the box and click "OK." Once the Registry Editor is open, search for the registry key "HKEY_LOCAL_MACHINE\Software\W32.Ramnit." Right-click this registry key and select "Delete."

Finally, to completely get rid of W32.Ramnit, you must manually remove other W32.Ramnit files. These W32.Ramnit files can be in the form of EXE, DLL, LSP, TOOLBAR, BROWSER HIJACK, and/or BROWSER PLUGIN. For example, W32.Ramnit might create a file like
%PROGRAM_FILES%\W32.Ramnit\W32.Ramnit.exe. Locate and remove these files.


Thanks for Reading this article,Hope you will like…….


Be a good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora

Facebook Hacked: A Worm Steals More Than 45000 Passwords


Welcome to Hackers World!!!!!

A famous worm called Ramnit worm has been actively found in the facebook environment. It is reported by Symantec that this worm is responsible for the theft of more than 45k passwords.


According to Cyberthreat management site Seculert, most of the stolen credentials were from US,
UK and France, Furthermore they have added that over the of these stolen logins were invalid and many of them have reacted correctly by changing their username and passwords.

Bypass two-factor authentication and transaction signing systems, gain remote access to financial institutions, compromise online banking sessions and penetrate several corporate networks

Recently, our research lab identified a completely new 'financial' Ramnit variant aimed at stealing Facebook login credentials. Since the Ramnit Facebook C&C URL is visible and accessible it was fairly straightforward to detect that over 45,000 Facebook login credentials have been stolen worldwide, mostly from users in the United Kingdom and France"

Countermeasures:

1. Avoid clicking on any kind of suspicious links.
2. Update your Antivirus Right away.



Thanks for reading this article. Hope you will like…...

Be a Good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora

Thursday 5 January 2012

30 Pakistan government Sites hacked by Indian hackers


Welcome to Hackers World!!!!!

In the month of December more than 150 websites were hacked and defaced by pakistani hacker group “Pak Cyber Combact Squad.” Now indian hackers have started to take some action against that. This time Indian hacker group “IndiShell” has hacked 30 pakistani government websites. List of hacked websites:
  • http://www.privatisation.gov.pk/index.html
  • http://www.benazir.pk/index.html
  • http://www.dfp.gov.pk/index.html
  • http://www.dgto.gov.pk/index.htm
  • http://www.mofa.gov.pk/index.html
  • http://www.mopw.gov.pk/index.html
  • http://www.msa.org.pk/
  • http://pak.gov.pk/
  • http://www.niopk.gov.pk/index.html
  • http://www.paknavy.gov.pk/index.html
  • http://www.szab.pk/index.html
  • http://www.pbm.gov.pk/
  • http://www.pcb.gov.pk/index.html
  • http://thenucleuspak.org.pk/
  • http://www.pcret.gov.pk/index.htm
  • http://www.pcrwr.gov.pk/index.html
  • http://www.pcsir.gov.pk/index.htm
  • http://www.pha.gov.pk/index.htm
  • http://www.pifra.gov.pk/
  • http://www.pmad.gov.pk/index.html
  • http://www.pmnh.gov.pk/index.html
  • http://www.radp.gov.pk/index.htm
  • http://www.sindh.gov.pk/
  • http://www.sindhpolice.gov.pk/
  • http://www.topians.edu.pk/
  • http://www.usc.com.pk/
  • http://www.savings.gov.pk/Tender/
  • http://infopak.gov.pk/
  • http://www.pasdec.com.pk/index.htm
  • http://hmc-3.com.pk/default.htm
 Thanks for Reading this article. hope you will like………

Be a good Hacker and Save the Nation!!!!!

Thanks & Regards
Tarun Arora

Tuesday 3 January 2012

HOW TO BLOCK FACEBOOK AND YOUTUBE ACCORDING TO YOUR TIME, DAY OR HOUR

Welcome to Hackers World!!!!!


Hello friends, today I found a new and awesome tool for you now you can block for websites on your own will especially facebook or youtube. This tool will very helpful for parents whose children addicted to facebook..Today facebook is very famous and everybody keeps engage on facebook whole day long. Sometimes children go out of their way to surf on facebook. This software is called facebook blocker and used for block facebook and youtube.this is very good tool. You can block facebook according to your time. after installation this tool you will be asked to enter password .type password which you want to give and enter secret answer which you can write and remember your password and secret anser.after entering this information you are able to run this software. in left hand there is option to chose website which you want to block according to your will. and there are four buttons

1         Normal Lock
      2    Time Lock (you can block site according to your time)
      3    Duration lock (you can choose at what time facebook or you tube will open   
            in a ay. (Example Monday 10 AM to 12 AM, Tuesday 1 PM to 2 PM etc)
4          Total Block (the site will not open until the time for blockage expires.


NOTE: you will have to remember your password because if you want to open facebook before expiration of time you will need password .without password you will not be able to open facebook blocker. you will have to wait for expiration of time. and it will ask password when you uninstall the software otherwise software will not uninstall.

 You can download this software from below link:




Thanks for reading this article I hope you will like………….


Be a Good Hacker and Save the Nation!!!!!


Thanks & Regards
Tarun Arora