facebook invite all script

This is really a powerful tool, because clicking every friends one by one is a really tedious job.
1.In Mozilla Firefox, go to your Event, Group or page and click “Invite People”.

2.Once the page has loaded you should see all of your friends, but they are not selected.
3.At this point, copy and paste the java script code below into your Web browser’s address bar, then hit “Enter”.
javascript:elms=document.getElementById(‘friends’).getElementsByTagName(‘li’);for(var fid in elms){if(typeof elms[fid] === ‘object’){fs.click(elms[fid]);}}
OR
javascript:fs.select_all();return false;  
4.If all goes well, it selects all of your friends! Now Click Send Invitations, and you’re done!
Easy as that, and it just took 1 second to invite all your friends. Wow!
I had test this JavaScript with Google Chrome and it works.

Seven dangerous new computer hacks that will change the future

Last week the high tech world got just a bit more dangerous - or a bit safer, depending on your perspective. And it was all because of research presented at computer security conferences Black Hat and Defcon. Here's the lowdown.

[Image above by Dave Bullock/Wired]
Every year computer security experts, from garage hackers to intelligence agents, descend on Las Vegas to attend Black Hat and Defcon. At these events, you can learn highly technical details about the Android operating system and Microsoft's internal network - or you can learn how to fool biometric locks and crank call BP. These are the premiere conferences for exchanging information about keeping data secure. But they're also where concerned geeks stand up in front of thousands of people to whistleblow about bad privacy and security practices at major companies (or governments).
For all those reasons and more, announcements from last week's conferences are certain to change the future. At least, if you own a computer that's attached to the internet. (And by computer, I mean phone.) Without further ado, here are seven hacks (and one goof) announced at Black Hat and Defcon that you should know about.

1. You can tap into an ATM machine and make it spit out passwords and money.

This was certainly the flashiest news to come out of DefCon. Hacker Barnaby Jack bought some used ATMs on eBay, and managed to figure out a quick way to do what John Connor did in Terminator 2: Use a cheap computer to riffle through ATM passwords and get some quick cash. It's a scary little trick, and we posted a video of the hack earlier this week:

2. Remember how your mom taught you that HTTPS means the website you're visiting is secure? Well, she was wrong.

When you log into your bank, or enter your credit card information in a form, you're always supposed to check to be sure that the URL of the page starts with HTTPS. When it does, that means you're using a secure information-exchange protocol called SSL, which prevents online bad guys from snarfing your password and credit card numbers. But it turns out there's a simple, non-technical trick that you can use to undermine SSL. You see, the security of SSL relies on "certificate authorities," (CAs) companies that hand out authentication certificates to website owners that verify, for example, that Bank of America is who it says it is online. Which means that your security is only as trustworthy as these CAs, which are only flimsily regulated. It turns out that a lot of them will hand out certs to pretty much anybody with cash.
Technologists Peter Eckersley (Electronic Frontier Foundation) and Jesse Burns (iSec Partners) explained in their Defcon presentation that they spent months scanning the entire internet, looking for who is giving out certs and to whom. (Slides for their presentation are here.) They discovered something disturbing: There are actually over 1,000 entities online, including Google and the DHS, who own what are called "subordinate CAs," special certs that allow them to hand out other certs to anybody they want.
Seven dangerous new computer hacks (and one silly one) that will change the future
Because these subordinate CA owners are poorly regulated, their power is potentially quite dangerous. If I have a subordinate CA, I can literally make any computer look like any other one online: I can turn my mob buddy's server Evilintentions.com into Yourbank.com. So you go to visit your bank, you wind up at "https://www.yourbank.com," and everything looks secure, right? Hell, anybody would give it their password and credit card number. But actually you were at evilintentions.com, who got a cert from me saying it was yourbank.com. Now you're screwed.
Using a subordinate CA, you could even make a US government computer look like it's a Chinese government computer online. There's no evidence that anyone has done this, but Eckersley and Burns proved that it's very possible someone could be doing it right now. (Caveat: Some of the research for this project was done in my house.)

3. You can eavesdrop on GSM phone calls with your computer.

Several researchers are working on how to hack into people's phone conversations on the commonly-used GSM network. The Financial Times reports:
Speaking at the second day of the Black Hat technology security conference in Las Vegas, researcher Karsten Nohl, who had previously reported that he had cracked GSM encryption, said he was distributing the tools free in order to pressure carriers to make fairly simple changes to fix the vulnerability.The industry association asked for the same software changes in 2008, but Mr Nohl said he hadn't found any carrier that had adopted them.
The tools include shortcuts for crunching vast amounts of data in order to identify the key on each mobile phone that encrypts calls. Using the techniques Mr Nohl outlined in his presentation, hackers could listen in on one side of a conversation from miles away and from both sides if they were within 100 to 300 meters, he said. The method only works over 2G networks, but many 3G phones drop back to 2G in areas where there is no 3G service.


And, reporting on another presentation (excerpted in the video above - check out those antennae on the stage) Wired's Kim Zetter writes:
The low-cost, home-brewed device, developed by researcher Chris Paget, mimics more expensive devices already used by intelligence and law enforcement agencies – called IMSI catchers – that can capture phone ID data and content. The devices essentially spoof a legitimate GSM tower and entice cell phones to send them data by emitting a signal that's stronger than legitimate towers in the area.
"If you have the ability to deliver a reasonably strong signal, then those around are owned," Paget said.
Computerworld's Robert McMillan adds that Paget had the best luck fooling iPhones:
"In my experience it's generally the iPhones that connect most easily," he said. "It's actually been the bane of my existence trying to keep the damned iPhones away."
People connected to Paget's system would get a warning message, but they could dial out as normal, but anyone trying to call them would go straight to voicemail. Paget didn't record or play back any calls, but he could have.
Oh, iPhone - you are such an unfaithful device.

4. You can shut down the power to people's homes with a computer and cheap radio equipment.

With so many homes being controlled by computerized meters hooked into smart grids, it's suddenly possible for computer experts to hack into your utilities, like water and electricity. Technology Review's Erica Naoni writes:
Shawn Moyer, who practices network security for Agura Digital Security, says he's concerned that utilities don't have expertise in network security. For example, he says, many advertise that they offer encryption in their smart-grid products, but on further inspection, there are problems with how that encryption is implemented.
Moyer and Keltner revealed a proof-of-concept smart-grid attack at Black Hat. They used a customizable piece of radio equipment and some freely available software to find smart meters on a network and circumvent the encryption used to protect them. If an attacker were to do the same, they say, it would be possible to issue commands that could misreport data to the utility or shut off power to some users.
Imagine a utility virus that could spread from house to house on the smart grid, shutting down everybody's electricity along the way. You are looking down the barrel of your own future.

5. An army of bots just turned you into a money mule in their counterfeit check scheme.

Seven dangerous new computer hacks (and one silly one) that will change the future
Russian criminals have automated their money-making scams in ways that boggle the mind. According to The Register:
The highly automated scheme starts by infiltrating online check archiving and verification services that store huge numbers of previously cashed checks, Joe Stewart, director of malware research for Atlanta-based SecureWorks, told The Register. It then scrapes online job sites for email addresses of people looking for work and sends personalized messages offering them positions performing financial transactions for an international company. The scammers then use stolen credit card data to ship near exact replicas of the checks to those who respond . . . Ironically, many of the check images were downloaded from services that merchants use to prevent check fraud. One of the sites was breached using a SQL injection attack. In other cases, they were accessed using account credentials from legitimate users that were stolen using the Zeus and Gozi password-stealing trojans.
"They're actually abusing anti-fraud systems in order to commit fraud," Stewart said. "The systems that are designed to prevent check fraud are actually being used to help the bad guys commit check fraud."
I love the idea that people are being swindled via an automated system. I welcome our botnet overlords, and all that.
Seven dangerous new computer hacks (and one silly one) that will change the future [Image by Atomic Fireball]

6. The free wallpapers you downloaded for your phone are stealing all your data.

Should you really trust every app you install on your phone? Nope - some of them are plundering your personal information and beaming it to potential bad guys. Two researchers revealed that they'd researched one seemingly benign wallpaper app for Android, and found that it was sending phone numbers and subscriber information (like names and addresses) to a remote computer. Venture Beat's Dean Takahashi summed up the threat:
Apps that seem good but are really stealing your personal information are a big risk at a time when mobile apps are exploding on smartphones, said John Hering, chief executive, and Kevin MaHaffey, chief technology officer at Lookout, in their talk at the Black Hat security conference in Las Vegas . . . "Even good apps can be modified to turn bad after a lot of people download it," MaHaffey said. "Users absolutely have to pay attention to what they download. And developers have to be responsible about the data that they collect and how they use it."
The app in question came from Jackeey Wallpaper, and it was uploaded to the Android Market, where users can download it and use it to decorate their phones that run the Google Android operating system. It includes branded wallpapers from My Little Pony and Star Wars, to name just a couple.
Lookout notes it . . . collects your phone number, subscriber identification, and even your voicemail phone number, as long as they are programmed automatically into your phone. It sends the data to a web site, www.imnet.us. That site is evidently owned by someone in Shenzhen, China. The app has been downloaded anywhere from 1.1 million to 4.6 million times.
Google has responded by saying that it has investigated these wallpapers, and that they are not threats. Regardless of whether this particular app has now been sanitized, these researchers still demonstrated that My Little Pony could be stealing your data.

7. There is a network of spies and counterspies on the internet, and they really are out to get you.

Two troubling pieces of information came out during the conference, both related to how human intelligence gathering has changed (or hasn't) in the information age. Technologist Jacob Appelbaum, who works with the nonprofit Tor Project and volunteers with Wikileaks, was detained at the US border before being allowed to continue to Las Vegas to give his talk at Defcon. C|Net's Elinor Mills reports:
Appelbaum, a U.S. citizen, was taken into a room and frisked, and his bag was searched. Receipts from his bag were photocopied, and his laptop was inspected, the sources said. Officials from Immigration and Customs Enforcement, and from the U.S. Army then told him that he was not under arrest but was being detained, the sources said. The officials asked questions about Wikileaks, asked for his opinions about the wars in Iraq and Afghanistan, and asked where Wikileaks founder Julian Assange could be found, but Appelbaum declined to comment without a lawyer present, according to the sources. Appelbaum was not permitted to make a phone call, the sources said. After about three hours, Appelbaum was given his laptop back, but the agents kept his three mobile phones, sources said.
Intelligence agents tried to question him again during the conference. His crime? Being associated with projects devoted to information transparency (Wikileaks) and anonymity (Tor, which incidentally has received funding from the US Navy, so go figure). It seems that the US government wanted to send the message that supporting the efforts of whistleblowers online is beyond the pale. Below, you can see Appelbaum (right) with Electronic Frontier Foundation technologist Seth Schoen, along with some of their dangerous hacker tools (including soy milk).
Seven dangerous new computer hacks (and one silly one) that will change the future
But other kinds of online whistleblowing are being encouraged by the government. At least that's one way to interpret the announcements from an internet surveillance nonprofit called Project Vigilant, which is apparently monitoring internet traffic at 12 ISPs, and claims it has hundreds of "volunteers" reporting "human intelligence" which Vigilant gives to the US government. Project Vigilant founder Chet Uber says hacker Adrian Lamo is one of their "volunteers" and announced at Defcon that they are actively recruiting more. It's like crowdsourcing, but for spies!
Seven dangerous new computer hacks (and one silly one) that will change the future [Image by Dave Bullock/Wired]

BONUS: You can now sneak into exclusive parties by hacking the invitation.

This may be a silly hack, but that doesn't mean it isn't futuristic.
Every year, Defcon badges and party invitations get more and more elaborate. This year, hardware hacker Joe Grand, who has designed the programmable Defcon badges for several years running, finally managed to add a tiny persistent display screen (as he explains in the video below, prices came down enough to make it cost-effective). The badge is a completely hackable development environment, and Defcon participants are invited to do the most creative things possible with their badges.


Also this year, the exclusive Ninja Networks party gave out pricey programmable invites, which attendees hacked the hell out of in order to get into the shinding - which was lubricated with a rumored $150 thousand worth of Facebook-sponsored booze. I think we all look forward to a future when getting into exclusive nightclubs and parties requires fancy hacking skills, rather than fancy designer clothes.

HIGH SPEED GPRS PROXY FOR RELIANCE

reliance 3g network free settings
Many of the Reliance free net GPRS 3G users know that reliance RIM has banned all of its free GPRS tricks.But still some tricks are working,going to post it here.Be sure you have read our Disclaimer before getting into this post.
First make the GPRS or 3G as like listed below:
Access point of the settings is rcomnet (very important)
Proxy or IP address is 80.239.242.253
Port address should be 80
You can use this trick in Opera Mini Labs 4.2 Handler or Opera Mini 6 Modded version.
Download the Opera 4.2 Handler and Opera Mini 6.0 modded version with resume link from mobile.The password for the file is www.tricksnew.blogspot.com
Now open the anyone above application and select proxy server type HTTP and enter the proxy server address as wap.mauj.com .
If  you down all the above steps correctly you will get wap.mauj.com homepage.From the homepage enter the URL which you want to browse and download free.
You must turn your Network mode to UMTS if you want 3G speed.The 3G enabled mobile is required for getting 3G access.
This tricks called as reverse IP trick.You can also use this trick for Airtel Network for accessing free GPRS or 3G by changing the settings to Mobile Office.

LATEST AIRTEL SECRET MOBILE OFFICE 3G MOVIE DOWNLOAD

  Since from two months you mightn't seen any free download MO tricks in Airtel.But now it has been revealed.Currently there are two Block Buster Hollywood movies available in airtel to download free.


  1. Mission Impossible 3 Movie.
  2. Avatar Movie in Hindi.
Before getting into the Movie,make the settings as listed below:
  1.  Access point must be airtelgprs.com,You should activate the Zero Rental Mobile Office plan in Airtel in-order to download the movies.
  2. You must have Download Manager in your PC,i would recommend IDM.
  3. Install it if you don't have one,then run it.
  4. In IDM set the proxy as 78.129.232.26 and set port address as 8080.
Now go-to Add URL option in IDM and enter movie address given below:
    Download link for Mission Impossible 3 movie in airtel:
     Download Link for Avatar Movie in Hindi:
      
The above two movies are suitable for PC format.
  You may also use other free servers those gives free Access.In Previous Post i have listed some Proxy to get free Access In Airtel. You may also try this one:

122.170.122.214
       You must have low balance Rs 0.30 to download them with free of cost and to avoid further Balance deduction.

AIRCEL 3G HACK (100%) WORKING!!!


Hi Everyone...

Hope u r doing well.......

Enjoying the Downloads in this site......

I want to share something about AIRCEL 3G Hacking!!!

First of all u need one AIRCEL SIM and 3G enabled Phone......

Then Buy any Pocket Internet Recharge Card Worth of 14rs or 27rs whatever the price may be in ur city...

Remember do not Easy recharge on ur mobile number.....

Then recharge ur mobile with that Card!

After one hour send a Message to "121" as "START 3G"!!!

After Two Hours the 3G services r activated in ur mobile......

Here Comes the AIRCEL 3G HACK trick......

Connect ur mobile to PC or Laptop with the 2G signal......

Go to Settings --> Phone --> Network Mode --> GSM !!!

After that Browse the internet for 10 min. or so...

Now change the Network Mode to "UMTS" or "DUAL MODE"......

Thats it! U can Enjoy 3G services(Only INTERNET) with broadband Speed!!!

Those who already Activated 3G services can also Enjoy these services by simply messaging "STOP 3G" to "121" !!!
After one Hour ur 3G services will be De-Activated!!!
After that u can Proceed with the Above Steps..........

Enjoy Unlimited Downloads with AIRCEL 3G!!!

Explore Unlimited Possiblities with AIRCEL.......

If u have any Doubts Please PM me.....

DON'T INSTALL TWO ANTIVIRUS IN A SINGLE PC,IT LEADS TO HARM.

I HAVE SEEN MANY FELLOW TO INSTALL TWICE ANTIVIRUS,THEY SAID THAT TWO ANTIVIRUS MAY PROTECT OUR PC EVEN BETTER,BUT IT CAN BE MORE EFFECTIVE IN THIS WAY.
THREE KIND OF DISADVANTAGE ARE THERE.
 

1. YOUR PC WILL BE SLOW IN THIS WAY.
 

2.YOUR NET SPEED WILL BE SLOW(UPDATING PROCESS IN ONE TIME)
 

3.IT INCREASE THE TIME FOR RESTART AND SHUT DOWN OF PC,
MANY MORE THINGS THAT ADVERTS THROUGH TWO ANTIVIRUS.
SO BE ALERT DON'T INSTALL TWO ANTIVIRUS.



Garmin nüvi 1350LMT 4.3-Inch Portable GPS Navigator with Lifetime Map & Traffic UpdatesAutel MaxiScan MS300 CAN OBD-II Scan ToolInCarCables Car Stereo Ipod/mp3 Auxiliary Aux-in Input Cable 3.5mm (4ft/1.2m)

Free Live Mobile Tv Streaming Links for all mobiles 2011

Here is the list of Mobile Live Tv Streaming Links…
Just Goto with your mobile browser then Start watch the Live tv’s in 3g speed or In 2G Speed
  • SAB TV : rtsp://115.248.246.156:554/SABTV_QVGA.sdp
  • SONY : rtsp://115.248.246.156:554/SONYTV_QVGA.sdp
  • STAR PLUS : rtsp://115.248.246.156:554/STARPLUS_QVGA.sdp
  • STAR ONE : rtsp://115.248.246.156:554/STARONE_QVGA.sdp
  • CARTOON NETWORK : rtsp://115.248.246.156:554/CARTOONNETWORK_QVGA.sdp
  • AAJTAK : rtsp://115.248.246.156:554/AAJTAK_QVGA.sdp
  • STAR NEWS : rtsp://115.248.246.156:554/STARNEWS_QVGA.sdp
  • TIMES NOW : rtsp://115.248.246.156:554/TIMESNOW_QVGA.sdp
  • NDTV PROFIT : rtsp://115.248.246.156:554/NDTVPROFIT_QVGA.sdp
  • NETV : rtsp://115.248.246.156:554/NETV_QVGA.sdp
  • INDIA TV : rtsp://115.248.246.156:554/INDIATV_QVGA.sdp
  • INDIA NEWS : rtsp://115.248.246.156:554/INDIANEWS_QVGA.sdp
  • BBC WORLD : rtsp://115.248.246.156:554/BBCWORLD_QVGA.sdp
  • STAR NEWS : rtsp://115.248.246.156:554/STARNEWS_QVGA.sdp
  • BLOOMBERG : rtsp://115.248.246.156:554/2G/LIVE/BLOOMBERGUTV_QCIF.sdp
  • CNN : rtsp://115.248.246.156:554/CNN_QVGA.sdp
  • ETNOW : rtsp://115.248.246.156:554/ETNOW_QVGA.sdp
  • HEADLINES : rtsp://115.248.246.156:554/HEADLINES_QVGA.sdp
  • NDTV 24×7 : rtsp://115.248.246.156:554/NDTV24X7_QVGA.sdp
  • NDTV INDIA : rtsp://115.248.246.156:554/NDTVINDIA_QVGA.sdp
  • DISCOVERY CHANNEL : rtsp://115.248.246.156:554/DISCOVERYCHANNEL_QVGA.sdp
  • DISCOVERY SCIENCE : rtsp://115.248.246.156:554/DISCOVERYSCINCE_QVGA.sdp
  • DISCOVERY TURBO : rtsp://115.248.246.156:554/DISCOVERYTURBO_QVGA.sdp
  • DISNEY ENGLISH : rtsp://115.248.246.156:554/DISNEYENGLISH_QVGA.sdp
  • DISNEY HINDI : rtsp://115.248.246.156:554/DISNEYHINDI_QVGA.sdp
  • ANIMAL PLANET : rtsp://115.248.246.156:554/ANIMALPLANET_QVGA.sdp
  • FTV : rtsp://115.248.246.156:554/FTV_QVGA.sdp
  • ZOOM : rtsp://115.248.246.156:554/ZOOM_QVGA.sdp
  • UTV BINDAAS : rtsp://115.248.246.156:554/UTVBINDASS_QVGA.sdp
  • UTV MOVIES : rtsp://115.248.246.156:554/UTVMOVIES_QVGA.sdp
  • UNKNOWN CHANNEL : rtsp://79.125.95.101/rtpencoder/zenga007.sdp
  • UNKNOWN CHANNEL : rtsp://79.125.95.101/rtpencoder/zenga003.sdp
  • ZEE TV : rtsp://121.244.145.226:554/prf0/cid_41.sdp
  • ZEE SMILE : rtsp://121.244.145.226:554/prf0/cid_58.sdp
  • TEN ACTION PLUS : rtsp://121.244.145.226:554/prf0/cid_61.sdp
  • ETV BANGLA : rtsp://115.248.246.156:554/ETVBANGLA_QVGA.sdp
  • ETV GUJARATHI : rtsp://115.248.246.156:554/ETVGUJARATHI_QVGA.sdp
  • ETV KANNADA : rtsp://115.248.246.156:554/ETVKANNADA_QVGA.sdp
  • ETV MADHYA PRADESH : rtsp://115.248.246.156:554/ETVMADHYAPRADESH_QVGA.sdp
  • ETV ORIYA : rtsp://115.248.246.156:554/ETVORIYA_QVGA.sdp
  • ETV RAJASTHAN : rtsp://115.248.246.156:554/ETVRAJASTHAN_QVGA.sdp
  • ETV 2 : rtsp://115.248.246.156:554/ETV2_QVGA.sdp
  • ETV : rtsp://115.248.246.156:554/ETV_QVGA.sdp
  • HAMAR TV : rtsp://115.248.246.156:554/HAMARTV_QVGA.sdp
  • HY TV : rtsp://115.248.246.156:554/HYTV_QVGA.sdp
  • INDIAN NEWS HARYANA : rtsp://115.248.246.156:554/INDIANEWSHARYANA_QVGA.sdp