On the left side of this blog you see a common messenger : AIM ,Gtalk etc
Select the option from top : enter id pass etc .... start chatting !
No installation needed !
save my blog link...have fun!
Get link
Facebook
X
Pinterest
Email
Other Apps
Comments
Popular posts from this blog
schematic Quickpost this image to Myspace, Digg, Facebook, and others! code working: If you press any button in the matrix keyboard it controller will scan the corresponding ascii code that will send serially to the port pin specified . Corresponding ascii code we can see in LED blinkings. #include /* add the headers here */ #define COL P2 #define ROW P1 void msdelay(unsigned int value); void sertx(unsigned char); unsigned char keyboard[4][4]={ '7','8','9','/', '4','5','6','*', '1','2','3','-', 'a','0','=','+' }; void main() { unsigned char colloc,rowloc; TMOD=0x20; TH1=-24; SCON=0x50; TR1=1; COL=0xff; while(1) { do { ROW=0x00; colloc=COL; colloc&=0x0f; } while(colloc!=0x0f); do { do { msdelay(20); colloc=COL; colloc&=0x0f; }while(colloc==0x0f); msdelay(20); colloc=COL; colloc&=0x0f; } while(colloc==0x0f); while(1) { ROW=0xfe; colloc=COL; colloc...
There are many face book hack methods Computer Trojan, Virus, and Worm 1. Phishing Phishing is like sending a wrong email link looking like facebook, or click here for playing the game with facebook sign in , when yyou log in with that , people will take ur password 2. Keylogging Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. The key loggers spy what u type and sends to hacker server 3. Stealer's Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient,The stealer software like getting card maker / crack exe will access the memory and hack 4. Session Hijacking Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a...
Comments
Post a Comment