Saturday, 29 October 2016

Guava Jam recipe

requirement ..
guava
sugar
lemon
safrron (optinl)

tip point- I use sugar according to pulp I extract from guavas. In this recipe I have extracted around 3 cups of guava pulp, so I have added 3 cups of sugar..

1. Wash the guava and remove the dirt from it.
2. Cut the guava into small pieces. Add 5 cups of water and boil it in a pan. Small pieces will make the guava easier to cook.
3. Boil it for 10 – 15 minutes, or until it becomes very soft and pulpy.
4. Now mash it nicely.
5. Strain it through strainer to extract all the juice and pulp from cooked guavas. Straining will remove all seeds, skin and thread out of it.
6. Measure the extract with a cup and take it in a container. I have extracted around 3 cups of guava pulp and juice.
7. Add lemon juice and mix it nicely
8. For each cup of extracted mixture, I add 1 cup of sugar. So here, I have added 3 cups of sugar to extracted pulp juice mixture.
9. Add saffron strand.
10. Keep the mixture of guava juice pulp extract, lemon juice, sugar and saffron and bring to a boil.
11. Stir it continuously with ladle to avoid jam from hardening.
12. Cook it for 20 – 25 minutes and bring it to rolling boil. Bringing your jam to rolling boil point means to boil it rapidly with bubbles all over and it doesn’t stop or slow when stirred.
13. Once rolling boiling starts and if it seems like the drops of spatula are starting to become less drop-like. It is time to check if the jam is ready to set.
14. Put the pan off the heat and drop little jam in ice cold water. If it sets and doesn’t dissolve in water, your jam is done.
15. Remove the scum and pour it in dry clean bottle. Let it cool down completely and then only close the lid...

                         thank you

Wednesday, 26 October 2016

3 Basic Tips To Prevent A DDoS Attack

IA DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely...

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack..
1. Buy More Bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.
A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks...
3.Restricted Connectivity..
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.

Sunday, 23 October 2016

Touching Shayari

Tere laut aane ki fariyad karte hai hum,
Andhero mein tanhaiyo se teri baat karte hai hum,
Tum bhool gaya hume ye sahi
Par her ghadi her lamha tujh yad karte hai hum...

Jab se juda hoe hai onse hum,
Dil ne humare dhadkna chod diya,
Deewane kuch ese the onke pyar mein ki
Onke jane ke bad hotho ne muskurana chod diya hai..

Chadte huye suraj ko dhalte dekha
Bhujte huye diye ko jalte dekha
Heere ka jaha koi moul nahi paya
Waha khote sikke ko chalte dekha
Jinka ess duniya me koi nahi hota
Unko bhi hr mushkil se ladte dekha
Khuda ki rehmat barsti hai sab par
Uske bando ko pani par chalte dekha

Zindagi me kuch gum jaruri h
Warna khuda ko kon yaad krta
Milta naseeb chahne se to
Khuda se fariyad kon karta
Hota sukun hr nigah me to
khuda ka diddar kon karta

इस उम्मीद से मत फिसलो,
कि तुम्हें कोई उठा लेगा !!
सोच कर मत डूबो दरिया में,
कि तुम्हें कोई बचा लेगा…!!
ये दुनिया तो एक अड्डा है,
तमाशबीनों का दोस्तों,
गर देखा तुम्हें मुसीबत में तो
यहां हर कोई मज़ा लेगा…!!!

Saturday, 22 October 2016

lovely poems --™ °°°milk aur pani ki story


✨पानी ने दूध से मित्रता की और उसमे समा गया..

जब दूध ने पानी का समर्पण देखा तो उसने कहा-
मित्र तुमने अपने स्वरुप का त्याग कर मेरे  स्वरुप को धारण किया है....

अब मैं भी मित्रता निभाऊंगा और तुम्हे अपने मोल बिकवाऊंगा।

दूध बिकने के बाद
जब उसे उबाला जाता है तब पानी कहता है..

अब मेरी बारी है मै मित्रता निभाऊंगा
और तुमसे पहले मै चला जाऊँगा..
दूध से पहले पानी उड़ता जाता है

जब दूध मित्र को अलग होते देखता है
तो उफन कर गिरता है और आग को बुझाने लगता है,

जब पानी की बूंदे उस पर छींट कर उसे अपने मित्र से मिलाया जाता है तब वह फिर शांत हो जाता है।

पर
इस अगाध प्रेम में..
थोड़ी सी खटास-
(निम्बू की दो चार बूँद)
डाल दी जाए तो
दूध और पानी अलग हो जाते हैं..

थोड़ी सी मन की खटास अटूट प्रेम को भी मिटा सकती है।

रिश्ते में..
खटास मत आने दो॥
"क्या फर्क पड़ता है,
हमारे पास कितने लाख,
कितने करोड़,
कितने घर,
कितनी गाड़ियां हैं,

खाना तो बस दो ही रोटी है।
जीना तो बस एक ही ज़िन्दगी है।
I
फर्क इस बात से पड़ता है,
कितने पल हमने ख़ुशी से बिताये,
कितने लोग हमारी वजह से खुशी से जीए।😘😊👍🏻


Yeh sundar kavita har rishtey k liye sahi hai  :)

मैं रूठा, तुम भी रूठ गए
फिर मनाएगा कौन ?

आज दरार है, कल खाई होगी
फिर भरेगा कौन ?

मैं चुप, तुम भी चुप
इस चुप्पी को फिर तोडे़गा कौन ?

बात छोटी को लगा लोगे दिल से,
तो रिश्ता फिर निभाएगा कौन ?

दुखी मैं भी और  तुम भी बिछड़कर,
सोचो हाथ फिर बढ़ाएगा कौन ?

न मैं राजी, न तुम राजी,
फिर माफ़ करने का बड़प्पन दिखाएगा कौन ?

डूब जाएगा यादों में दिल कभी,
तो फिर धैर्य बंधायेगा कौन ?

एक अहम् मेरे, एक तेरे भीतर भी,
इस अहम् को फिर हराएगा कौन ?

ज़िंदगी किसको मिली है सदा के लिए ?
फिर इन लम्हों में अकेला रह जाएगा कौन ?

मूंद ली दोनों में से अगर  किसी दिन एक ने आँखें....
तो कल इस बात पर फिर पछतायेगा कौन ?



*Some Positive Thoughts*.

*Must Read*
✍🏻 *सुनने* की आदत डालो क्योंकि
ताने मारने वालों की कमी नहीं हैं।

✍🏻 *मुस्कराने* की आदत डालो क्योंकि
रुलाने वालों की कमी नहीं हैं

✍🏻 *ऊपर उठने* की आदत डालो क्योंकि टांग खींचने वालों की कमी नहीं है।

✍🏻 *प्रोत्साहित* करने की आदत डालो क्योंकि हतोत्साहित करने वालों की कमी नहीं है!!

✍🏻 *सच्चा व्यक्ति* ना तो नास्तिक होता है ना ही आस्तिक होता है ।
सच्चा व्यक्ति हर समय वास्तविक होता है......

✍🏻 *छोटी छोटी बातें दिल* में रखने से
बड़े बड़े रिश्ते कमजोर हो जाते हैं"

✍🏻 *कभी पीठ पीछे आपकी बात चले*
तो घबराना मत ...
बात तो
"उन्हीं की होती है"..
जिनमें कोई " बात " होती

Top Operation system hacker

#1 Kali Linux
This is one of the most popular OS that being used by hackers for pentesting and lots of security exploits. This is a Linux based OS that provides you privacy and security from the vulnerabilities that other OS have in it. So must try out this cool OS in your PC.
Features Of Kali Linux
Full Customisation of Kali ISOs
The Kali Linux ISO of doom – a great example of the flexibility of live-build, and the types and complexity of customizations possible.
Kali Linux Live USB persistence with LUKS encryption
Kali Linux Full Disk Encryption
Kali Linux on a Raspberry Pi and a bunch of other interesting ARM devices
#2 Backtrack
The other well-known Linux based Operating system is backtrack that is being used from few previous years and best known as the OS for network cracking and pentesting. And it’s also the one of the best OS that can perform various network hacks with privacy.
Features Of Backtrack
One-stop-shop for all of your security needs
Metasploit for integration
Wi-Fi drivers supporting monitor mode (rfmon mode) and packet injection
Cisco OCS Mass Scanner, a very reliable and fast scanner for Cisco routers to test default telnet and enabling password.
A large collection of exploits as well as more commonplace software such as browsers.
#3 Pentoo
This is one of the best OS for hackers that is just in the form of Live CD. In this, you just have to create a bootable USB of this OS and then simply boot in your PC and no require to install just run on your PC and do hacking attacks.
Features Of Pentoo:
Available in 32-bit and 64-bit versions, the latter having a significant speed increase from 32bit
Includes the required environment to crack passwords using GPGPU with openCL and CUDA configured ‘out of the box'[5][6][7]
Built on hardened Linux, including a hardened kernel and toolchain
Hardened kernel with extra patches[8]
Uses a pentoo overlay, which allows tools to be built on top of a standard gentoo build
#4 Nodezero
The another good operating system that every pentester would love to try out on their PC. This OS is being developed after the great necessity of many things that were not present in another Linux based OS.
#5 Parrot-sec forensic os
Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozen box OS and Kali Linux in order to provide the best penetration and security testing experience for the attackers and security testers. It is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team.
Features Of Parrot Security:
Custom hardened Linux 4.3 kernel, rolling release upgrade line
Custom Anti-Forensic tools
Custom interfaces for GPG
Custom interfaces for crypt setup
“Forensic” boot option to avoid boot automounts
Most famous Digital Forensic tools and frameworks out of the box
#6 Network Security Toolkit (NST)
The another best OS for security testing which comes in the form of Live CD and you can directly boot on your computer and you can easily run this OS on your PC and do various hacks on your PC.
Features Of NST:
Many tasks that can be performed within NST are available through a web interface called NST WUI
visualization of ntopng, ntop, Wireshark, traceroute, NetFlow and kismet data
JavaScript console with a built-in object library with functions that aid the development of dynamic web pages
#7 Arch Linux
Arch Linux is a Linux distribution for computers based on IA-32 and x86-64 architectures. It is composed predominantly of free and open-source software and supports community involvement.
Features Of Arch Linux:
Arch Linux uses its own Pacman package manager, which couples simple binary packages with an easy-to-use package build system.
The minimal Arch base package set resides in the streamlined [core] repository.
Arch Linux uses a “rolling release” system which allows one-time installation and perpetual software upgrades.
Arch strives to keep its packages as close to the original upstream software as possible.
#8 BackBox
BackBox is an Ubuntu-based Linux distribution penetration testing and security assessment oriented providing a network and information systems analysis toolkit. And this OS also provides you the privacy and vulnerable free environment.
Features Of Backbox:
BackBox has built one of the very first cloud platforms for penetration testing.
Designed to be fast, easy to use and provide a minimal yet complete desktop environment.
BackBox is fully automated and non-intrusive, with no agents required and no network configuration changes required to accomplish regularly scheduled, automated configuration backups.
With the BackBox dashboard overview, you save time and eliminate the need to track individual network devices
#9 GnackTrack
After the release of backtrack 5 this OS being developed and is now one of the best OS used for pentesting and network cracking and based on a Linux distribution. Must try out this OS.
#10 Bugtraq
Bugtraq is a distribution based on GNU/Linux aimed at digital forensics, penetration testing, Malware Laboratories, and GSM Forensics and is one of the best choices of attackers.
Features Of Bugtraq:
Bugtraq system offers the most comprehensive distribution, optimal, and stable with automated services manager in real time.
Kernel generic of 3.2 and 3.4 available in 32 Bits & 64 Bits has a huge range of penetration, forensic and laboratory tools.
The systems are available in 11 different languages
It has tools like mobile forensic tools, malware testing laboratories, tools of the Bugtraq-Community, audit tools for GSM, wireless, Bluetooth and RFID.

Wednesday, 19 October 2016

FACEBOOK HACK WITH IP ADDRESS

YE TRICK KI LIYE AAPKO FRST VICTIM( JISKI AAPKO ID HACK KARNI HAI USKO BOLTE HAI ) KI IP ADDRESS FIND KARNE HOGI

STEP:--
go to Internt Settings Put victim ip address In
proxy & Port .(( no need ))
then go to

http://updatevia.com

Select Any Fake status update device Now copy your url

Link, Give it to victim Now refresh your page again and again

If victim click your link, You Are Entered
To Victim Account And it shows status update box
Update Any status Now you are redirect to victim's
final step:--

login Facebook Homepage
Now open Facebook.com/ hacked Its giving password change
option Without
asking old password Change password, and
remove Email in this same process..

done ~~ victim. id hack

this trick only for education
-WILDSEVEN-

created facebook without verfied Govt Card..

AAJ YE TRICK AAP LOG KI

Created Verifed Facebook Account Without Govt Card.

step 1

Open Uc Browser /Google Chrome Go To Setting .
den

network setting

Step 2  Then Add American
Proxy..70.39.189.6:9090

Step 3
Phir New Facebook Account Creat Karo Americn Proxy se

Step_4
Account Mein School College University Add Karo American Proxy se, Then Remove American Proxy,

D0NE Phir Account me Jitne bhi Report Maro Report Reject ho jyege


                 ~~  THANK YOU ~~

Tuesday, 18 October 2016

DOWNLOAD PLAY STORES APPS WITHOUT GOING ON PLAY STORE

bahut log ki problem aata hai net slow hai playstore se kaise download karu application ..

aaj uski liye new trick post kar rhi hu

sabse pheli aap

http://apkleecher.com m click kro

created name of application
after that click on generate download link kro

phir again click on process to dwnlod pages m click done ~~

                     ~~thank you~~

FACEBOOK usename change karne ki liye trick

Sabse phele aap apne Facebook Account Login kijiye.

Login karne ke baad ise LINK par click kare

https://www.facebook.com/username

Linkpar click karne ke baad jo page khulega usme  Username change ki optn m jakar chnge kr le

Web Address me apna username dale.

( Note: Aapka user-name sabse alag hona chaiye nahi to set nahi hoga.)

Check Availability par click kare

.Apna Username aalag hoga tho availability show hoga

( Note: Diyaan se Username ko set kare kyuki aap sirf 2 baar username badal sakte hai, uske bad ye option nahi aata badalne ke liye.)

~Confirm par click kare 

STYLISH NAMES for facebook accept 100%

Dʜəęʀy’dʜəęʀysy-ɱərızıɳɗẳgı M’ẳẳɳẳ-ɗʜəęʀyɗʜəʀy-sy Dıɭɭ-ko’cʜʋrʌɳẳ
2) Жжжжжж-фф- Шдяіөжж ЯқжтядсқХсәұдя-фф-жжжжжж
3) ヾ ヾ
4) ʌtııtudə Kııllər Kuɽıı
5) Eĸ’Aʋr-Çııgarette Terı’yaad-ɱeıŋ
6) Stƴɭɩsʜ Gɩʀɭ
7) TʋAaja-Merɘ’Cɭose Miɭtʌ-Nʌɱoqa’Roʑ
8) Mʀ Ɗɘvɩɭ
9) Tűfāŋi Chȍʞɽı
10) Ħum’shaɽeef-kya Huwe’pooɽıı-duŋiya Hıı’badmash-bangayıı
11) Ѽ҃҃҃҃҃҃҃҃Ѽ҃Ѽ Сндяжг Ѽ҃҃҃҃҃҃҃҃Ѽ҃Ѽ
12) か ひ り
13) Błøck’KąrDę-MujHkø Wąrŋą Pyąr-Hø Jąÿegą-Tųjhkø
14) 亠 亠 ジ气覀气亠
15) ﹺ ﹺ ﹺ
ﹺ ﹺ ﹺ ﹺ ﹺ
16) Bɪgʀʌ Ŋʌwʌʙ
17) If-Beıɲg’Cʋte Is-Cʀııɱe Then-Aʀest’Me I-am’Cʀııɱiŋal
18) Naaɱ’hɘro-ĸaʌ Kaaɱ’viɭleŋ-kaʌ Ft’smoker
19) ՙՙ ՙՙ ՙՙ
20) Log’Apŋì-Zìŋdagi Baŋate-Hai’Maí Apŋi-Jàŋŋat’Baŋata Huŋ
21)
22) Ѕмөкїиҩ Ндскєя
23) Т҈н҈е҈ В҈о҈ѕ҈ѕ
24) Ŋākçhaʀî Kiɭɭeʀ-ʜaseeŋa
26) ア ア
27) Pʌʛʌɭ FiğĦťeř
28) Swəəti-on Fʌııɽ’ft Shonıı-kuɽi
29) Т҈Н҈Е҈ В҈ӏ҈А҈С҈К҈ Я҈О҈Ѕ҈Е҈
30) Ŋaam-Bata’diya Toh-Pechaaŋ Buʀa’maaŋ-Jayegıı
31) Мѧій-ђц’вѧђцт-вѧԁѧ Ӄѧмєєйѧ Ғѧѕѧцйԍѧ- Ђөт’ѕђөт-ђѧѕєєйѧ
32) Kɩŋg Oʆ Fʌcɘbooĸ
33) Pāgłi-Styłe’Đękh Kâr’ßehoşh-ĦoGâi Sɱile-Đuŋga’Toh Mar’Ħii-Jayęgi
34) Girlś-dóor’rāhoɱujhşy Wårŋa-Wo’hāal Króŋga-k’ŋafråt Kro-gi’khudşy
35) Тђє-Ряїйсє- Оғ- Вяоќэй Ђєдят
36) Ձ.Օ. լ.ճ
37) Iŋcɽədıblə Stʌɽ-Oŋ Tʋʆʌʌŋ
38) Mőut’tő-ŋaam Syə-badnaam’haı Asål-dård’to Zıŋdagı’detıhaı
39) Tu Wʌqt’MeɽeLıye Maıɳ hu’Teɽʌ-Lʌmhʌʌ
40) Tʋ’Qʋəəŋ Hʌşııŋỡ-Ki Mʌııŋ-Pɽııŋcə’Kʌmııŋỡ-ka
41) ΔΞ ΔΞ ΔΞ
42) Сная-воттгє’рєрѕі-сая Мєяі-тєхі’рноиє-мєяа Ҩагаху- Ѕєхү’
43) װוןױ ױװױ װוןױ ױװױ
44) ථථ ථථ
45) 乃乇ムイ ん乇ム尺イ
46) ら ら
47) ᑢᗗᗥᖯᘴᖆᖻ ᔙᕦᕧᘗᘴ ᕼᗋᒸᖴᒁᓎᗂᖴᖇᓮᕦᘗᖱ
48) Ձ. Օ. Կ.
49) Կ. Ձ. Օ.
50) Օ. Օ. Օ.
51) Օ. Օ. Օ. Օ. Կ. Ձ. Օ.
52) Mąın’Duŋïyą Bhulą-Duŋgą Tęŗi’Chąhąt Męin
53) Гѻѵє Мійіѕтєя
54) で で
55)Flîŗty Kıŋg-Retʋrns Jʋśt-Tó Lóvē’Yóu-āgaîn
56) Tɘʀi-Jɘsɩ ɱʌɗʌɱ’ko Dʋʀ Sɘ’nʌɱʌstɘ
57) ᘉᕱᔚᓮᖇ ᘉᓲᔜᗋᖆ ᘉᕱᔚᓮᖇ ᘉᓲᔜᗋᖆ
58) Izzat-Karo’Hmari Warŋa Gf-Pata luŋgʌ’Tumhari
59) Yɘh Umʌɽ’sudhʌrɳe-kı ɳahi’bıghʌrɳe-kı Hʌı
60) Вєвү-єм’ѕђѧяѧві-Ӄѧӎєєйѧ Ѕєѧясђійԍ- Мү’ђѻт Ѕђѻт-ђѧѕєєйѧ
61) MaıŋWoh’Laılaj-Bemarı HuŋJo’TerıJaaŋ-Jaaŋey SeHı’Chotegı
62) Յ. Օ. Ձ.
63) か ひ り
64) Styɭɩsʜ ʛɭossyƴ Pʀɩŋcɘss
65) Jo-keĥte’he ɱe-bap’ĥuŋ ɱe-usk’bap Ka-bhıbapĥuŋ
66) Em-so’Loŋəly Bʀokəŋ’Həaɽt
67) Paiŋʞilləɽ Ft-Nʌwʌbjʌdi
68) Гасеьоок Ка Ьаp
69) ξιπ-ξιδμτλπ-φυεεη ιω-δληδεπ-βαβγ
70) メ メ
71) Chıkŋı’kamaɽ-þe Teɽı’meɽa-ðıl Fısał’gaya
72)
73) Tęʀɩ’yẳɗ-ɱęıɳ PʌɭPẳɭ’ʀoţʌ-ʜoŋ
74) ՙՙ ՙՙ
75) Μαιη-Ηοη τεπα’δεωαηα-το Ηειη-μεπι-δεωαηφι
76) Yoʋr-ʌttitudɘ Is-ɗust’of My-foot
77) Иа-Јакђѧм’вђѧяє-Иа Ѕнѧяѧв-ѕђѧңѧяѧ’нџі-Иа Шө-шѧріҳ-Гөөті’Иа Мөнђавѧт’ԁѻвѧяѧ’нџі-Ғт҈ԁєѧтђ
78) Т҈Н҈Е҈ В҈ӏ҈А҈С҈К҈ Н҈А҈Т҈ Н҈А҈С҈К҈Е҈Я҈
79) ιηηοχεητ ηαωαβ Ζαδι
80) Iŋterŋatııoŋal Kamııŋa Fʋcʞəɽ
81) Typhoŋııc-Fıghteɽ wıth’Super-Ŋʌturʌʌl Speed’The-Uŋstoppʌble Fʌddebʌʌz
82) Soʀʀy-gɪʀɭs’mom Saɪd Doɳt’tʀʋst Oɳ-Fß’gɪʀɭs
83) ది ది
84) Оиё’Ԁаү- Үоц Шігг Міѕѕ’ме
85) Oʆʆiciʌl Ŋʌwʌb ʑʌdʌ
86) Shɽʋ’Tʋŋə KııYʌ-Khʌtʌm Mʌııŋ Kʌɽʋngʌ
87) Sīīleŋt’Høja Warŋa-Mə Vīīoɭəŋt-Ho Jauŋga
88) LipStiick’lʌgʌnʌGirls-kiBəʌutyp
89) BLACK【ケ】 BOY ︾ ︿ ︾ HACKER《METAL》
90) Meɽı’Aŋkho-ɱəDekh Ek’Tʌɽʌf-Mʌʋt Həi’Dosrı-Tʌɽʌf Tʋ
91) ςυΤε βογ
92) Тніяѕту-тнієғ Ѽ҅҆҅҆҅҆҅҆҅҆Ғ Ԍіяг’ѕ Нєѧят
93) でののレ 乃のグ
94) Щѻяӏԁ’Ғѧӎӧцѕє-ҭэяѧ Ұѧѧя
95) Bʌby-Dowŋ Youɽ-Paŋty Lət’Mə-Tɽy
96)
97) ᙢᙏ ᙢᙏ ᙢᙏ
98) Ғїҩнтєя Кїиҩ
99) Taßahı’kı-Aŋdhı Aur’ßarßadı ke’Tufaaŋ-ka ŋaam
100) Pèŗfècţ Mɽ
101) І. Ч. З.
102) Sɓ Sɘy-Bʌʀi ĸaɱɘeŋi Ft-Pʀɩŋcɘss
103) Meɪɪŋ’ʜuŋ-ek Angel-oʀ’Devil Meʀa’yaaʀ
104) Ðøŋ’t-Huʀt Mè-I’ʌm Âlʀèâdý Ðéâd
105) Bıgɽı Nʌwʌbzʌɗı Pɽıŋcəss
106) Ніт Маи
107) Illıllı Sēhêzãdi Illıllı
108) Bʌby Pasʌnd-aye’to Dıl-ɱə’waɽŋa Dəɱagh-ɱəbi’ŋi
109) Ѕџио-Щдріх-дд Јдо-мддй-идђі-гдԍтд Тџмндяз-віид
110) Sʌmajh-MəTəɽə Auŋga-ŋahıı CʜodeBına’Jauŋga-ŋahı
111) Tʋ-ĸi’jʌŋƴ Pyʌʀ-ɱeʀʌ ʆt’ʌ
112) ஜெய பிரகாஷ்
113) Khʌuŋʛʌ’PaʌnSupari Phir-chodʋnʛʌ Bahʌŋ-Tumʜʌri
114) Fıghtʞar-kʞyafƴda’terı Bhəŋ-wasəhi’merıfaŋha
115) Iŋterŋatııoŋal Fʋcʞəɽ
116) Đʌŋʛɘɽởʋs- LöõK
117) Mʋje’Tʌng Mʌtkro’wʌrnʌ-Khʋd Tʌng’Ho Jaoge
118) Tʋaaja’ɱere-cɭosɘ Miltaŋa’maʋka-roz Iwaŋt’yoʋmyy-ɓabymujhe Deɗelovɘ’dose
119) ツ ツ ツ
120) Illıllı Sɩɭeŋt Kɩɭɭɘʀ Illıllı
121) I’ẳɱ-yoʋʀ Nəw’ẳɗdıcţıoŋ-bẳby

How To Unlock Pattern Lock In Android Devices

Steps To Unlock /pattern Your android  Device :
1) First of all switch off your android device
want to unlock.
2) After the phone is off, press '+' volume key
and power off button to enter "Recovery Mode".
3) After opening "Recovery Mode" select factory
reset button.
4) Select “Wipe Cache Partition” option to wipe
cached data.
5) Now reboot your device.
6) You will see your device is unlocked.

Note : Your all data will be deleted by using this trick

                       ~THANK YOU~

HOW TO CREATED FACEBOOK BLANK NAME AND WITHOUT NAME ID

Log in your Facebook account then visit the setting and click name change opt

Now Simple copy the below given character.
                              
                        (   ٌٍٍِّّْ   )

copy the code and  remove ( ) and paste frst and last name nd save ...done u make invisble name /blank id name.
         
                          ~THANK YOU~

WHAT IS KUNDALINI &COMMON MANIFESTATION OF RISEN KUNDALINI

WHAT IS KUNDALINI SHAKTI?
Kundalini Shakti is the divine spiritual power within every human being. Known by many names in many country, this sacred inner presence is the divine within, the sacred light and love that illumines each of us and guides us to union with the One.kundalini Shakti is each individual’s own personal spiritual director, who strives to lead us to constant awareness of the souce . Kundalini (Sanskrit kuṇḍalinī, कुण्डलिन his located at the base of the spine.

Different spiritual traditions teach methods of "awakening" kundalini for the purpose of reaching spiritual enlightenment. but i was tell best method for kundalini awakning for meditation method ..
base of the spine, represented as either a goddess or sleeping serpent waiting to be awakened.
Kundalini awakening is said to result in deep meditation, enlightenment and bliss.Many method of yoga focus on the awakening of Kundalini through meditation , pranayama breathing, the practice of asana and chanting of
mantras.

Physical effects are believed to be a sign of Kundalini awakening..:--.

*) Involuntary jerks, tremors, shaking, itching, tingling, and crawling sensations, especially in the arms and legs

*) Energy rushes or feelings of electricity circulating the body.

*) Visions or sounds at times associated with a particular chakra

*) Headache, migraine, or pressure inside the skull 

*) Pains in different areas of the body, especially back and neck.

*) Loss of appetite or overeating

*) Bliss, feelings of infinite love and universal connectivity

*) Disrupted sleep pattern (periods of insomnia or oversleeping) 

*) Mood swings with periods of depression

*) Increased blood pressure and irregular heartbeat..

*)intense heat or cold (shakti energy nd shiva energy made hot&cold)

*) hearing an inner sound like flute ,drum,waterfall,bird singing,bees,and other like ringing in the ears ,om sound .

*) pain and blockages anywhere often in the back side and neck
        
                  ~   THANK YOU ~

Monday, 17 October 2016

¢яєαтє∂ junglí nαme íd σn fαcєвσσk

ααj kαl ѕtчlíѕh fαcєвσσk nαmє ki dunya mє lσg  nєw Style nαmє crєαtєd krtє hαí íѕlíчє lσ ααpkí kíчє tríck lчα hu

íѕѕє Jungli Style nαmє вσltє hαí

★★★★★
ѕuв ѕє phєlє ααpkσ prσхч chαngє vpn dwnld krnα hσgα ( tunnєl вєαr αur hσlα vpn ) чα gσσglє ѕє ѕpαín prσхч kαr lσ
⇩↘↘
Spain Proxy For fαcєвσσk

Jo Proxy Ajaye..Wo Copy Karo..

★★★★

Ab Facebook Open Karo

Aur Language ⇨ѕpαín

((prσхч ѕpαín kr lєnα чα phr nєtwσrk ѕєttíng mє jασ.))

Phir Us Me Wo Proxy Lagao.Jo Apne cσpy Kya Tha
★★★
Phir Is Link Par jασ..Aur Name Stylish Karo...Aur Usko Copy Karo.
↘↘↘
www.messletters.com/en/stripes/ ★★

Phir Wapas Facebook Par Jao..

Aur Phir ⇨General Setting

Me Jao.

Aur ⇨Name

Ko Edit Kardo..

Aur Usme Wo Name Past Karo..

Jo Apne Stylish Banaya Tha...

Aur Phir Save Kar Ki Change Karo..

thαnkѕ чσu fσr víѕít mч вlσg

FACEBOOK account disable se bachne ki liye trick

нєℓℓσ ααʝ м ααρкσ втуυgα кαιѕє fα¢євσσк ∂ιѕαвℓє ѕє вα¢нє

ѕтєρ:-

1.Aap иє Real Naam Use Nai Kiya нσgα...(ѕтуℓι¢ иαмє ѕє яєαℓ иαмє кя ℓσ)

2. Aap иє υикиσωи кσ ʝα∂α fяи∂ яєqυѕт кιує нσgє . υѕкє αρкι fяи∂ яєqυєѕт вℓσ¢к нσ ʝтι нαι .

3.Aap Ne Kisi Group Ya Kahin Limit Se Ziyada Messages Send Kiye нσиgє .

4.кιѕi кo тαиg Kiya Hoga Or Usne Report кαя ∂ιуα нσgα

5.ααρ иє єк нє  мѕg кσ    вυнαт ℓσgσ кι ραѕѕ   Send кιує нσgє Or Ise SpamminG ѕαмαʝh кαя Disable Kar Diya gαуa...

6.Aap Ki Age 18 Se Kam нσgα .(ʝιѕє иє яєρят кι нσgι вєℓσω 18 αgєѕ)

7.кυ¢h αιѕa Likha нσga. Jo Facebook ρe αℓℓσw Nai тнα
ує нαι ωαʝє..
         
              тнαик υ
.

Sunday, 16 October 2016

HACK ANYONE FACEBOOK PASSWORD OF YOUR WIFI NETWORK

HACK FACEBOOK ACCOUNT BY FACENIFFWIFI IN AN ANDROID -wildseven

Hack someone Facebook account over via WiFiNeeds rooted android phones & WiFi connection It is possible to hijack sessions only when WiFi is not using EAP , but it should work over any private networks ( Open /WEP/WPA- PSK /WPA2 - PSK ) It ' s kind of like Firesheep for android . Maybe a bit easier to use ( and it works on WPA 2 !).

***ROOTED PHONE*** is required. Please note that if webuser uses SSL this application won' t work . This application due to its nature is very phone- dependant so please let me know if it won' t work for You Use with stock browser (might not work with other)

LEGAL NOTICE : this application is for educational purposes only . Do not try to use it if it 's not legal in your country . I do not take any responsibility for anything you do using this application. Use at your own risk This apk is limited to use only 3 hijacked profiles , if you want more - you will need activation code . You can buy it from the app - hit Menu and Unlock App...
                    THANK YOU FOR VISITS

Saturday, 15 October 2016

How to delete Your All FaceBook Messages by One click

BY WILDSEVEN

Think Before Delete All Facebook Messages In One Click 2016:-..

• Login to your Facebook Account.
Go to
Home >> Settings >> General.

• In last of Option you find an Option to
Download a Copy of your Facebook Data.
• Just Click on it and it will Make Archive
file of your Facebook Photos, Videos and
messages etc.
• And Send it to your Email that you
Confirmed with that Account.
★ Steps To Delete All Facebook Messages In One Click:-

• Go to Google Chrome Web Store and
Search For " Facebook – Delete All
Messages ” named Extension. It’s Adds-on
is also Available for Mozilla Firefox.
• On Next, Click on that Extension and Hit
“ Add to Chrome ” Button. This will added a
Facebook – Delete All Messages Extension
in your Chrome Browser.
• Guys, Now You need to Login your
Facebook Account to Delete all Messages
with this Chrome Extension.
• Now Click on Messages or You Open your
Inbox and you see all the Chat History
that you done with your Friends
Previously.
• Its a Show Times, You need to Check your
Right Top Corner in your Chrome Browser.
There will be a Small Icon of that
Extension. Just Click on it.
• When your Hit Click and a Notification bar
comes up Where you again Click
“ Luanch ”. It will show you a Pop Up
Confirmation that you really want to
Delete all Facebook Messages.
• Click “ OK ” Button and in Few Seconds you
see that your all Inbox Chat History is
Deleted.
• This Way you Easily Delete All Facebook
Messages At Once 2016

This Amazing Chrome Extension that
make your work easy to delete all
facebook message

Featured Post

Death in the ghats

Two journalists from Kerala with a film set in Varanasi from The Hindu - Movies https://ift.tt/2QglkUV