2 October 2014

How To Access Google USA From Other Countries?

Do you know how to access Google.com from outside of USA? Yes, there is a “switch” to stop Google.com redirects to the country domain where you access the Google Web Search service.




Suppose you’re at UK so when you type Google.com on web browser, it is automatically redirected to Google.co.uk.

1 October 2014

Step by Step guide of How to download youtube videos without internet download manager or any downloader

Hi friends,
here is the best tutorial to show you 'How to download youtube videos without internet download manager or any downloader' ..
Its very simple and interesting, So let's start.
Steps to download youtube videos.

1- Go to youtube.com and find any video you want to download, to illustrate this i am using an example ' iPhone 6 Plus Bend Test' . 
2- Now every video on youtube has a unique link, copy that link.as shown below.

Step by Step: How to hack Facebook account with phishing page 2015 new method


How to hack Facebook with phishing page.

As we all want to hack our friend facebook account,and want to read all his personal things..
Today i m gonna teach you how to hack a facebook account with a phishing page..
What is phishing?
Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.