Monday 5 September 2016

7 Right Ways To Sleep During Pregnancy

You should be extremely careful about your sleeping habits while pregnancy. Number 1 is the best one

#The Art Of Sleeping During Pregnancy 

It is extremely important to balance your sleep when you're pregnant. You should not be worried about anything while you're sleeping. So, eliminate the stress to get a good and peaceful sleep.

#Wear Loose Clothes 

Don't wear anything that is tight on your body especially while sleeping. So make sure your whole body is free while on bed.

Trimester-wise position 

 

 Each trimester needs a different sleeping position. Look out for the best position to sleep.

Avoid Drinking water

 

 Yes, you should not consume water or anything liquid atleast 2 hours before sleeping. This will save your frequent trips to washroom in the night and ensure that you have a long uninterrupted and beautiful sleep. 

Pregnancy Pillow

 

 Buy yourself a comfy pregnancy pillow and always take a nap on it to get a cozy sleep.


Avoid Sleeping on stomach 

 

 You might have this sleeping position before and we bet, it is comfortable as well. But, when you're pregnant a lot of things change, so should your sleeping position. Avoid sleeping on your stomach while you're pregnant. 

Sleep on Left

 

 This is the best position for pregnant women. So try them out and let us know which one suits you best!

Scientist Warns Of A Mega Earthquake That Will Split Two Continents And Kill Over 40 Million People

Thanks to the global warming, all of us knew that our planet is going to get destroyed. But the destruction is going to be so bad that it will actually split 2 continents and take millions of lives away. Checkout how...

# Dr. Keshe's Prediction

 

 Dr. Mehran Keshe is a nuclear scientist who completed his Nuclear engineering from the University of London. He is the main face behind and NGO called Keshe foundation in Netherlands and Belgium.

Last September, Dr Mehran Keshe released a video predicting a mega earthquake that will destroy our earth completely. According to his prediction, not one but number of countries are likely to get effected by this Mega earthquake. Is your country one of them? 

Splitting Of Continents

 

 Dr. Keshe described this mega earthquake. According to him, North and South America will "split" followed by mega tsunamis that will hit America and Asia, killing almost 40 million people. He also said that mega earthquake will strike soon that will leave upto 20 million people dead on the west coast in North and South America.

He very clearly took the names of all the countries that will get effected by this mega earthquake. For starters, North China is likely to witness a series of earthquakes in the following months. 

What's The Largest Number You Can Represent With 3 digits? Nope. It's Not 999

Yes, technically, any Maths genius would say that it isn't 999. Checkout how...


#The Maths Genius 

 

 

How many real life Maths geniuses do you know? Well, you are about to know one. Recently, a guy revealed some funny incidents involving him and his genius daughter. The incidents belonged to her Maths class. This girl once proved that not every triangle needs to form a total of 180 degrees.

All she had to do was stare at the globe in the corner of the classroom. When the teacher said it was "impossible" to have a triangle add up to 270 degrees, she corrected him with an incredible example. If you draw a triangle on globe, each angle being 90 degrees, you can connect the north pole to the equator, the equator line can go 90 degrees around the globe perpendicular to the first one, then north pole can drop a 90 degree line to meet this line at the equator to complete the triangle. Triangles on curves can have more, or less, than 180 degrees, depending on convexity or concavity of the surfaces. 

 https://youtu.be/dTrP8629vs0

The Favorite Incident 

 

 But ask this proud Dad and he'll say that this wasn't his favorite incident. His favorite incident was the one where his daughter proved that the largest number represented by 3 digits isn't 999.
The question was, what was the largest number that can be represented with 3 digits and the teacher said it was 999, the girl disagreed. And believe it or not but her answer was correct.


The Answer

 

 Before telling you what she answered, we want you to read the question properly again. The question was, what was the largest number that can be represented with 3 digits? Everyone answered 999.



That's when this girl in her thin kiddish voice said, "Oh yeah? Tell me what 9 raised to the 9th power raised to the 9th power is then??" Technically, The question is asking you to represent a number using 3 digits, so exponentiation cannot be ruled out. And mind you, when this incident happened, she was so small that she actually was in a grade school. GENIUS!

The Way We Use Escalators Is Not How They Were Originally Made To Be Used...

Checkout the correct way to use Escalators. This is how you use it!

# Escalator 

 

 Escalators are definitely real soothers when it comes to displacing yourself from one floor to another with heavy bags in hand thanks to the already shopped material.

We really can't climb stairs after the tiresome session of intense selection process between the products of different brands. Not only that, escalators are installed in possibly every single public place to help your cause. But are we really using it correctly?

 

# Very Wrong 

 

 Well, you'll be surprised to know that we use escalator in a very wrong way. That's because there are some people who step on an escalator and just stop dead.

 

The Correct Way

 

 The escalator when originally invented was built to cut down on human labor, yes but not completely. It was made to help us. It was originally designed to facilitate a smooth walk over the stairs (which explains the escalator moving at a speed facilitating climbing).

10 amazing facts 

Saturday 16 January 2016

Hacking Facebook using Facebook Scam Method


Requirements:

1. Facebook Scam source code

2. HTML and javascript knowledge

How to Hacking Facebook using Facebook Scam Method:
1. Download the facebook scam file above and extract it.

2. Open the file using your favourite text editor.

3. We will start from the meta tag.


Information:

og:title –> this will be used for the post title on facebook

og:url –> your website address

og:site_name –> the name of the website how you call it

og:description –> the description to display the short information in the facebook post

og:image –> image will be displayed as a thumbnail on facebook post

You can check the result with help from facebook tools to debug webpage https://developers.facebook.com/tools/debug

4. The next step we need to edit is the redirector after user successfully input the comments.

we can change the window.location from google.com to another website. The website will be loaded after users submit the comment.

5. Wait, where is the facebook hacking according to the post title Hacking Facebook using Facebook Scam Method? We've already posted many simple hacking tutorials and if combined you can create something more useful.

View the last hacking tutorial about hacking facebook scam.

Conclusion:

1. If you don't know about legality of links that shown on facebook, don't directly open it from your browser where your facebook account was logged in, instead open a new browser and open the link from the new browser to prevent and minimize the facebook scam.

2. This tutorial is for education use only!, malicious use will lead you to be banned by facebook or even banned by your hosting or they will send you to the court. We hope you already know about this.


15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5


What is Social Engineering Toolkit?
“The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.”

Actually this hacking method will works perfectly with DNS spoofing or Man in the Middle Attack method. Here in this tutorial I’m only write how-to and step-by-step to perform the basic attack, but for the rest you can modified it with your own imagination  .

In this tutorial we will see how this attack methods can owned your computer in just a few steps….

FYI : The success possibility of this attack depend on victim browser. If the victim never update their browser, the possibility can be 85% or more.

Requirement :
1.  Backtrack 5 (or Backtrack 4)

15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5 :
1. Change your work directory into /pentest/exploits/set/



2. Open Social Engineering Toolkit(SET) ./set and then choose "Website Attack Vectors" because we will attack victim via internet browser. Also in this attack we will attack via website generated by Social Engineering Toolkit to open by victim, so choose "Website Attack Vectors" for this options.



3. Usually when user open a website, sometimes they don’t think that they are opening suspicious website that including malicious script to harm their computer. In this option we will choose "The Metasploit Browser Exploit Method" because we will attack via victim browser.



4. The next step just choose "Web Templates", because we will use the most famous website around the world that already provided by this Social Engineering Toolkit tools.

5. There are 4 website templates Ready To Use for this attack methods, such as GMail, Google, Facebook, and Twitter. In this tutorial I will use Google, but if you think Facebook or Twitter more better because it’s the most accessed website, just change into what do you want.



6. For the next step…because we didn’t know what kind of vulnerability that successfully attack the victim and what type of browser, etc, in this option we just choose "Metasploit Browser Autopwn" to load all vulnerability Social Engineering Toolkit known. This tools will launch all exploit in Social Engineering Toolkit database.



7. For payload options selection I prefer the most use Windows Shell Reverse_TCP, but you also can choose the other payload that most comfortable for you.

8. The next step is set up the Connect back port to attacker computer. In this example I use port 4444, but you can change to 1234, 4321, etc



9. The next step just wait until all process completed and also wait until the server running.





10. When the link given to user, the victim will see looks-a-like Google(fake website). When the page loads it also load all malicious script to attack victim computer.



12. In attacker computer if there’s any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named "Notepad.exe".
13. To view active sessions that already opened by the exploit type "sessions -l" for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.



14. To interract and connect to victim computer use command "sessions -i ID". ID is numerical value that given when you do sessions -l. For example you can see example in picture below.



15. Victim computer already owned.





Monday 11 May 2015

Chinese HospitalIntroduces AutomaticSperm Extractor ToMake Sperm DonationEasier

Sperm donation might be considered
taboo in a number of places the world
over but scientists seem to be making
the process easier.

 A hospital in Nanjing, China now has an automatic
sperm extractor at its disposal.

So much
for a hands-free device, huh? Let’s dive
into the more interesting details.


This piece of technology comes with a
massage pipe that the user can adjust
to suit his height.

 Upon setting the
desired amplitude, frequency and
temperature on the machine, the user is
good to go.

 A small display on the top
is featured for those who like some
‘visual’ assistance.

Director of urology
department feels it’s just to have the
machine in the hospital considering
many individuals have issues retrieving
sperm by the old conventional methods.


Arguably, standing and delivering like
that in a room full of other men is likely
to make many individuals feel awkward.


It depends what sort of slant you put on
it, I suppose.