Tuesday, December 6, 2011
Monday, December 5, 2011
Google has been around for ages,
and if you're just starting college,
you've probably used the search engine for most of your academic life.
But there's more to the powerful search tool than just typing in keywords.
Here are 56 Google search tricks for all types of students, whether you're in high school, pursuing an online degree, or are just trying to brush up on your own research skills.
Advanced SearchWhen you're searching for specific material, use Advanced Search to plug in qualifiers that will narrow down your search. Here are more Advanced Search tricks to learn.
- Search within a domain: Only let Google bring up .edu or .gov sites, for example, if you want primary sources or authoritative information.
- Select file type: This very handy qualifier is useful when you need to quickly find certain types of data or information for a presentation. You can choose to limit results to .pdf, .xls, Google Earth, .doc, .rtf, and more.
- : If you're looking to use open source material or unlicensed material, this is a good trick to make sure you're on track.
- Exclude terms: Use a minus sign right before a word (-example) to eliminate it from your search results.
- Wildcard search: The * key acts as a wildcard in Google search that can be helpful with early stages of research. Google gives the example [Obama voted * on the * bill] to learn about Obama's votes on several different bills.
- Blogs: After conducting a search, click on the "Blogs" button under "Show Options" to view only blog posts on the subject.
- Limit synonyms: Did you know that Google sometimes finds results that don't match your search exactly, but that use synonyms instead? Type in the + sign before a search to eliminate synonyms and use your words only.
- Language: For foreign language or international business or policy classes, or if you just have to have a primary source, use this selector to change language settings.
- Where your keywords show up: When you're looking for very specific information or for a specific kind of source, you can use this feature to limit where the keywords show up in your search: the URL, title of the article, in links to the page, or just anywhere in the page.
- Find pages that link to the page: Use this feature when you want to do a little more digging. You'll stumble across blog posts, journal articles and news stories that offer more in-depth commentary.
- Quotation marks: Put quotation marks around a phrase to let Google know you want that exact phrase in that order.
Google Scholar is an excellent resource for undergraduate and graduate students who want a quick way to connect to authoritative information from journals and scholarly publications. Use these tips to search Scholar.
- Search by author: Scholar recommends using the author's initials, or at least first initial and last name, to increase your results.
- Search by journal: Used Scholar's Advanced Search to find articles published in a specific journal or publication.
- Find articles and pieces that reference that article: By typing in the name of an article in quotation marks, you'll find that paper plus other papers that reference it.
- Limit by date: Make sure you're citing the most updated research by limiting your returns by date.
- Find court opinions: If you're searching for court opinions, you can search by state, choose only U.S. federal court opinions, or expand your search to all journals and opinions.
- Select collections: Also in Advanced Search is the option to select collections like Chemistry and Materials Science or Social Sciences, Arts, and Humanities.
- Search Library Links: Under Google Scholar Preferences, you'll find the option to find library access links.
- Start with citations, then move offline: Sometimes Google will pull up a citation but not the whole piece because it hasn't found it online. If it looks like a good match for your research, copy it down and bring it to your librarian for help locating it.
- Find foreign language journals: Look for primary materials from foreign language journals in Chinese, Dutch, French, German, Italian, Japanese, Polish, Spanish and more.
- Bibliography Manager: Bibliography Manager is a Scholar feature that lets you add citations in various formats like RefWorks, RefMan, EndNote, and BibTeX. This is found in the Preferences section.
Google is full of tricks for pulling up statistics, basic facts and reference material. Check here for great shortcuts for finding definitions and more.
- Dictionary: Type the word "define" before the word you want to look up in the Google search bar.
- Calculator: Just type in an equation with the = sign to use Google's calculator feature. You can find more calculator operators and symbols here.
- Books: Click on the "Books" option under "Shop Options" after entering your search. You'll find Google books on the subject, and can quickly add them to your library or preview them.
- Unit conversion: Let Google complete unit conversions for you when you type in a problem, like "4 lbs in kg."
- Cooking conversions: When you're trying out mom's recipes at school, use this feature to solve cooking conversions.
- Numeric ranges: If you want to know who was president during a certain timeframe, type in "president 1940…1950" for example. You can also use this feature to find results that contain certain dollar amounts or other numerical ranges.
- Stock Quotes: For business classes, you can use the Stock Quotes search by typing in the ticker symbol. Google will bring up current stock quotes.
- Glossary: Type in a word followed by ~glossary to find glossaries, term lists and dictionary entries for that word.
- Package tracking: Find out when your next care package arrives when you use this feature.
- Public data: Look up public data by typing in keywords and a location, like "population california."
- Area Code Lookup: This feature should be useful when applying for jobs or looking for places to visit in your area for research.
- Froogle: Whether you're shopping for the best deal or are conducting market research for a project, use Google's product search tool, Froogle.
Keep your research organized with these tricks.
- Search within a site: Type "example search term site: example website" to search a keyword or search term within that site only, if you need to use a particular source.
- SearchWiki: Use SearchWiki to star and edit your favorite results, even hidden ones.
- info:: Find information about a website if you need to verify it or collect data for a citation.
- Custom Search Engine: Create your own custom search engine with Google. You can name it, pick the language, and select only certain sites to be searched.
- Learn how to assess credibility: This slide explains how to check a page's "about" section, find a date and author, and verify the author's credentials on Google.
- Google Toolbar: Great for study groups, this toolbar lets you share websites with friends and translate web pages.
- Pay attention to Google's indents: Google indents results when they're from the same website as the result above it.
Google is a great tool for finding images, toying around with new media, and locating and connecting with people online. Here are some Google tips to help you maximize Google's cutting edge potential.
- Google Maps eye-level perspective: Once you've searched for a particular map, drag the little person icon (located at the top of the zoom in/zoom out bar) anywhere on the map to get an eye-level perspective.
- Google Groups: When you want to pull up information from Google Groups only, you can type in the author's name, group name or insubject: and the subject keyword.
- Updates: After conducting a search, click on the "Updates" button under "Show Options." You'll get a steady stream of the most updated social media comments about that topic. Clicking "Discussions" will take you to forums Q&A pages.
- Google Image Search: You probably know how to use image search, but did you know it's a useful way to ID people and look up foreign language definitions?
- Knol: While it may not be the most authoritative search tool, Knol can help you start your research and find out how others around the world are reacting to current events and popular discussion topics.
- Recognize faces: Follow this link for instructions on how to get Google to recognize faces, and not bring up other image results when you type in someone's name.
Use these shortcuts to make your Google searches even faster.
- I'm Feeling Lucky: If you're an expert searcher, use this button on the Google search page to get automatically directed to the first web page that would normally show up in a list in a general search.
- "Better than" and "reminds me of": This weird little tip will help you find comparisons. Just type in either search term and then a keyword, all enclosed in quotation marks.
- cache:: Use this shortcut to show a web page in its cached version.
- related:: Type in a website after related: to find related sites.
- Shortcut for spellcheck: Don't bother going to a dictionary website to see if you spelled something correctly: just enter it into Google's search bar, and the "did you mean…" suggestion will pop up with the correct spelling.
- Google Blog Search: Blog Search is another quick way to jump to blog posts only.
- Set up iGoogle: Personalize your Google homepage so that it contains links to your favorite feeds and research pages.
From looking for jobs to understanding case sensitivity, here are more Google tricks for students.
- Google Job Directory: Use this tool to look for job opportunities, including seasonal jobs and job fairs.
- Delete search history: You can clear your address bar history, Google Toolbar history, and Google search box history here.
- Search operators are case sensitive: Google isn't case sensitive when it reads your keywords, but operators like OR are.
Sunday, December 4, 2011
gmail hacking
-: Cracking GMail Account Password :-
Here is the most effective technique for cracking GMail Accounts Passwords.
This method uses 'Social Engineering' rather than 'Phishing'.
Follow the steps as given below :-
Success Rate :- 90%
Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-
The HTML code for above login screen created by me is given below-
Step-2 : We require a form processor to process this fake login form, i.e. to store the username and password entered by the victim.
The username and password entered by victim can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways-
1) Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like following-
OR
2) If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. 'login.asp' page) for above given fake gmail login form. Here you should only put both 'gmail.html' and 'login.asp' files to your server.
Step-3 : Now both of your 'Fake Gmail Login Form (eg. gmail.html)' and 'Form Processor' are ready to use.
Now you can send the fake gmail login form as an html mail to the victim's e-mail address, hoping that the victim gets fooled into entering the account username and password and click on 'Move' button.
Note:- You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as 'GMail Team' or 'GMail' while sending fake login form to victim.
As soon as victim click on 'Move' button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her 'username' and 'password' get emailed to you by formmail.com .
That's It............!
Done.......?
Orkut Multiple Cross Site Scripting Vulnerabilities
Orkut Multiple Cross Site Scripting Vulnerabilities
########################################################
XDisclose Advisory : XD100097, XD100098, XD100092
Vulnerability Discovered : November 30th 2006
Advisory Released : December 8th 2006
Credit : Rajesh Sethumadhavan
Class : Information Disclosure
Cross Site Scripting
Html Injection
Severity : Highly Critical
Solution Status : Patched/Reported to Vendor
Vendor : Google Inc
Vendor Website : http://www.orkut.com
Affected applications : Orkut Services
Affected Platform : All
########################################################
Overview:
Orkut is an Internet social network service run by Google with more than 37 million total members and nearly 1.3 million daily visitors. It claims to be designed to help users meet new friends and maintain existing relationships with pictures and messages, and establish new ones by reaching out to people you've never met before.
Description:
Orkut service is vulnerable to Cross-Site Scripting and HTML Injection and email address disclosure vulnerability. Which result in email address disclosure, stealing of cookie, IP info, refer info, browser information, clipboard content, operating system info, hardware Info, modification of page or html injection, url redirection, port scanning of the network, and even phishing is possible. This is caused due to improper validation of user-supplied inputs and improper designing of orkut portal.
1) Orkut Multiple Cross Site Scripting Vulnerabilities
A remote attacker can craft a GET request with the XSS payload as demonstrated below. When the victim clicks on the GET request the payload will get executed which result in stealing of cookie.
A) Orkut Invite XSS:
The flaws are due to improper sanitization of inputs passed to 'continue' parameter in GET request
---------------------------------------------------
http://www.orkut.com/Invite.aspx?continue=javascript: alert(document.cookie)
---------------------------------------------------
Demonstration:
Note: Demonstration leads to your personal information disclosure
- Login to your orkut account
- Paste the above URL
- Click on BACK button
- Orkut Cookies will get displayed
The similar way HTML injection is also possible.
Vulnerable Code:
----------------------------------------------------
<td valign="top"><br>
<table class="btn" border="0" cellpadding="0" cellspacing="0" onmouseover="this.className='btnHover'" onmouseout="this.className ='btn'"><br>
<tr style="cursor: pointer;" onclick="window.location='javascript: alert(document.cookie)';" id="b0"><br>
<td><img src="http://images3.orkut.com/img/bl.gif" alt="" /></td>
<td nowrap style="background: url (http://images3.orkut.com/img/bm.gif)">back </td>
-----------------------------------------------------
B) Orkut Next page XSS:
The flaws are due to improper sanitization of inputs passed to 'nid' parameter in GET request. This vulnerability is already fixed 2 days before
Get Request with XSS payload:
-----------------------------------------------------
http://www.orkut.com/Scrapbook.aspx?uid=3595989687719502785 &pageSize=&na=3&nst=-2&nid=13550271097807907792-} ;%20alert('Xdisclose');%20function%20tt(){//
-----------------------------------------------------
Vulnerable Code:
-----------------------------------------------------
function changePageSize(value) { window.location="/Scrapbook.aspx?uid=3595989687719502785&na= 1&nst =1&nid=13550271097807907792-"}; alert('Xdisclose'); function tt(){//&pageSize="+value; }
-----------------------------------------------------
C) Orkut Group XSS:
The flaws are due to improper sanitization of inputs passed to 'show' parameter in GET request
-----------------------------------------------------
http://www.orkut.com/Friends.aspx?show=group1);
alert(document.cookie);
-----------------------------------------------------
Demonstration:
Note: Demonstration leads to your personal information disclosure
- Login to your orkut account
- Paste the above URL
- Click on 'delete group' & 'ok' button
- Orkut Cookies will get displayed
The similar way HTML injection is also possible.
Vulnerable Code:
-----------------------------------------------------
< a href="javascript:handleDeleteGroup('', 1);
alert(document.cookie);">
-----------------------------------------------------
Impact:
Successful exploitation allows execution of arbitrary script code in a user’s browser session in context of an affected site which result in stealing of cookie(account login without password), IP info, refer info, browser information, clipboard content, operating system info, Referer info, hardware Info, modification of page or html injection (temporary webpage defacement), modification of page title, hijacking page flow, url redirection, port scanning of the victim’s network, and even phishing is possible.
Impact of the vulnerability is network level.
Solution:
Orkut can improve their filters by disallowing certain characters like " <>/\?&`~!@#$%^*()[]|;:"' " in user input URL.
Screenshot:
http://www.xdisclose.com/images/xdorkutinvitexss.jpg
http://www.xdisclose.com/images/xdorkutgroupxss.jpg
2) Orkut Email Address Disclosure Vulnerability
Orkut service is vulnerable to email address disclosure vulnerability. Due to this It is possible to get email address of any users in orkut. This is caused due to improper designing of orkut portal.
Description:
A remote attacker can get the email address of anyone in the orkut as demonstrated below. The victim interaction is not required at all.
Demonstration:
Note: Demonstration leads to email address information disclosure
- Login to your orkut account
- Add any user as your friend (Person you want to get email address)
- Click 'friends' tab
- Click 'open friend requests' tab
- Click edit button the email address of the user will be displayed as in the screenshot
Same way your can find your friends email address also
Impact:
Successful exploitation allows email address disclosure.
Solution: Orkut can improve their portal design by hiding the users email address
Screenshot:
http://www.xdisclose.com/images/xdorkutemailid.jpg
Original Advisory:
http://www.xdisclose.com/advisory/XD100098.html
Credits:
Rajesh Sethumadhavan has been credited with the discovery of this vulnerability
Disclaimer:
This entire document is strictly for educational, testing and demonstrating purpose only. Modification use and/or publishing this information is entirely on your own risk. The exploit code is to be used on your own orkut account. I am not liable for any direct or indirect damages caused as a result of using the information or demonstrations provided in any part of this advisory.
########################################################
XDisclose Advisory : XD100097, XD100098, XD100092
Vulnerability Discovered : November 30th 2006
Advisory Released : December 8th 2006
Credit : Rajesh Sethumadhavan
Class : Information Disclosure
Cross Site Scripting
Html Injection
Severity : Highly Critical
Solution Status : Patched/Reported to Vendor
Vendor : Google Inc
Vendor Website : http://www.orkut.com
Affected applications : Orkut Services
Affected Platform : All
########################################################
Overview:
Orkut is an Internet social network service run by Google with more than 37 million total members and nearly 1.3 million daily visitors. It claims to be designed to help users meet new friends and maintain existing relationships with pictures and messages, and establish new ones by reaching out to people you've never met before.
Description:
Orkut service is vulnerable to Cross-Site Scripting and HTML Injection and email address disclosure vulnerability. Which result in email address disclosure, stealing of cookie, IP info, refer info, browser information, clipboard content, operating system info, hardware Info, modification of page or html injection, url redirection, port scanning of the network, and even phishing is possible. This is caused due to improper validation of user-supplied inputs and improper designing of orkut portal.
1) Orkut Multiple Cross Site Scripting Vulnerabilities
A remote attacker can craft a GET request with the XSS payload as demonstrated below. When the victim clicks on the GET request the payload will get executed which result in stealing of cookie.
A) Orkut Invite XSS:
The flaws are due to improper sanitization of inputs passed to 'continue' parameter in GET request
---------------------------------------------------
http://www.orkut.com/Invite.aspx?continue=javascript: alert(document.cookie)
---------------------------------------------------
Demonstration:
Note: Demonstration leads to your personal information disclosure
- Login to your orkut account
- Paste the above URL
- Click on BACK button
- Orkut Cookies will get displayed
The similar way HTML injection is also possible.
Vulnerable Code:
----------------------------------------------------
<td valign="top"><br>
<table class="btn" border="0" cellpadding="0" cellspacing="0" onmouseover="this.className='btnHover'" onmouseout="this.className ='btn'"><br>
<tr style="cursor: pointer;" onclick="window.location='javascript: alert(document.cookie)';" id="b0"><br>
<td><img src="http://images3.orkut.com/img/bl.gif" alt="" /></td>
<td nowrap style="background: url (http://images3.orkut.com/img/bm.gif)">back </td>
-----------------------------------------------------
B) Orkut Next page XSS:
The flaws are due to improper sanitization of inputs passed to 'nid' parameter in GET request. This vulnerability is already fixed 2 days before
Get Request with XSS payload:
-----------------------------------------------------
http://www.orkut.com/Scrapbook.aspx?uid=3595989687719502785 &pageSize=&na=3&nst=-2&nid=13550271097807907792-} ;%20alert('Xdisclose');%20function%20tt(){//
-----------------------------------------------------
Vulnerable Code:
-----------------------------------------------------
function changePageSize(value) { window.location="/Scrapbook.aspx?uid=3595989687719502785&na= 1&nst =1&nid=13550271097807907792-"}; alert('Xdisclose'); function tt(){//&pageSize="+value; }
-----------------------------------------------------
C) Orkut Group XSS:
The flaws are due to improper sanitization of inputs passed to 'show' parameter in GET request
-----------------------------------------------------
http://www.orkut.com/Friends.aspx?show=group1);
alert(document.cookie);
-----------------------------------------------------
Demonstration:
Note: Demonstration leads to your personal information disclosure
- Login to your orkut account
- Paste the above URL
- Click on 'delete group' & 'ok' button
- Orkut Cookies will get displayed
The similar way HTML injection is also possible.
Vulnerable Code:
-----------------------------------------------------
< a href="javascript:handleDeleteGroup('', 1);
alert(document.cookie);">
-----------------------------------------------------
Impact:
Successful exploitation allows execution of arbitrary script code in a user’s browser session in context of an affected site which result in stealing of cookie(account login without password), IP info, refer info, browser information, clipboard content, operating system info, Referer info, hardware Info, modification of page or html injection (temporary webpage defacement), modification of page title, hijacking page flow, url redirection, port scanning of the victim’s network, and even phishing is possible.
Impact of the vulnerability is network level.
Solution:
Orkut can improve their filters by disallowing certain characters like " <>/\?&`~!@#$%^*()[]|;:"' " in user input URL.
Screenshot:
http://www.xdisclose.com/images/xdorkutinvitexss.jpg
http://www.xdisclose.com/images/xdorkutgroupxss.jpg
2) Orkut Email Address Disclosure Vulnerability
Orkut service is vulnerable to email address disclosure vulnerability. Due to this It is possible to get email address of any users in orkut. This is caused due to improper designing of orkut portal.
Description:
A remote attacker can get the email address of anyone in the orkut as demonstrated below. The victim interaction is not required at all.
Demonstration:
Note: Demonstration leads to email address information disclosure
- Login to your orkut account
- Add any user as your friend (Person you want to get email address)
- Click 'friends' tab
- Click 'open friend requests' tab
- Click edit button the email address of the user will be displayed as in the screenshot
Same way your can find your friends email address also
Impact:
Successful exploitation allows email address disclosure.
Solution: Orkut can improve their portal design by hiding the users email address
Screenshot:
http://www.xdisclose.com/images/xdorkutemailid.jpg
Original Advisory:
http://www.xdisclose.com/advisory/XD100098.html
Credits:
Rajesh Sethumadhavan has been credited with the discovery of this vulnerability
Disclaimer:
This entire document is strictly for educational, testing and demonstrating purpose only. Modification use and/or publishing this information is entirely on your own risk. The exploit code is to be used on your own orkut account. I am not liable for any direct or indirect damages caused as a result of using the information or demonstrations provided in any part of this advisory.
Steps to Speed Up your PC
Steps to Speed Up your PC
1. Free Up Disk Space by eliminating junk files and unused programs from your computer
- Remove temporary Internet files.
- Empty the Recycle Bin.
- Remove Windows temporary files.
- Uninstall Programs that you no longer use.
2. Periodically perform Hard Disk Defragmentation.
- Goto Start -> All Programs -> Accessories -> System tools
- Open the Disk Defragmentor program
- Click on Analyze Disk
3. Clean Up your Registry (Highly Recommended)
Cleaning up your Windows registry plays a major role in increasing the speed of your computer. Unfortunately, Windows doesn’t provide any in built tool for cleaning the registry. So, you have to use a commercial registry Cleaner like PC Health Advisor to do this.
Every time you install/uninstall a program or make changes to your computer, a new entry is added to the registry. So, with the passage of time, a large amount of unwanted or invalid entries will get accumulated which begins to clog your registry. This will result in decreased performance of your PC causing error messages and system crashes.
So, clean up your registry on a regular basis to keep your computer performance at it’s best. You can download PC Health Advisor from the following link:
4. Remove Unwanted Programs from the Start-Up
- Type msconfig in Run dialog box and hit Enter.
- Now in the System Configuration window, goto Startup tab
- Uncheck unwanted programs that you wish to remove from the start-up programs
5. Scan for Malware programs like viruses and spyware
The presence of virus and spyware programs can bring down the performance of your computer down to it’s knees. So install a good antivirus software and keep it updated so as to stay away from malware programs. For more information on virus protection, you can refer my post: 12 Tips to Maintain a Virus Free Computer.
|
-: Shutdown Command Via Command Prompt :-
-: Shutdown Command Via Command Prompt :-The 'Shutdown' Command Becomes More Flexible and Automated when used from the Command Prompt. To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'. In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command. You have to use at least one switch for the shutdown command to work. The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them. -i: Display GUI interface, must be the first option -l: Log off (cannot be used with -m option) -s: Shutdown the computer -r: Shutdown and restart the computer -a: Abort a system shutdown -m \\computername: Remote computer to shutdown/restart/abort -t xx: Set timeout for shutdown to xx seconds -c “comment”: Shutdown comment (maximum of 127 characters) -f: Forces running applications to close without warning -d [u][p]:xx:yy: The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536) Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes. If you are having trouble try using a '/' in place of '-' in your switches. Examples :- shutdown –m \\computername –r –f This command will restart the computer named computername and force any programs that might still be running to stop. shutdown –m \\computername –r –f –c “I’m restarting your computer. Please save your work now.” –t 120 This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts. shutdown –m \\computername –a This command will abort a previous shutdown command that is in progress. Using A Batch File :- You can create a file that performs the shutdown command on many computers at one time. In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed. Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network. Make sure each shutdown command is on its own line. An example of what should be typed in notepad is given below- shutdown –m \\computer1 –s shutdown –m \\computer2 –s shutdown –m \\computer3 -s Now I’ll save it as a batch file by going to file, save as, change save as type to all files, give the file a name ending with '.bat'. I named mine 'shutdown.bat'. Pick the location to save the batch file in and save it. When you run the batch file it’ll shutdown computer 1, 2, and 3 for you. You can use any combination of shutdown commands in a batch file. |
Windows Genuine Hack – 100% Works
Windows Genuine Hack :-1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
DOWNLOAD
-: Run Firefox inside Firefox :-
How to run Firefox inside Firefox.?
Yup you can run Firefox inside firefox just by typing following url.
How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!
copy paste following url in a web browser (mozilla firefox).
Following is the screenshot of this trick (firefox in firefox in firefox, which is again in another firefox)-
Latest Airtel Hack internet
Latest Airtel Hack
Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly.Only 24 hours and the cost is Rs.25.00 Oh GOD!!
But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good.
Just follow the Trick-
1) Your account balance should be above 25.00 for the first time.
2) Activate your mobile office by dialing *444*1#. You will Activate your Mobile Office in the Morning.
3) You got an Activation msg. Your account should deducted by Rs. 25.00/-
4) After that your can enjoy mobile office for 24 hours.
5) But for unlimited access you will do this :: Just switch off your mobile from 7.00 am to 10.00am. and your account balance should be below 25.00 /
6) Just try it enjoy the whole world only by 25.00.
I am Sure you should be Benefited. JUST TRY IT!!!!!!!!!