Wellcome To Bangladesh Cyber Army

Bangladesh Cyber Army is Non-profit knowladgebase in Bangladesh. Lets We make a new world,A true World .

Security is the Big Challenge.

Security is your own Right.Everywhere Needs Security.Stay Connected With us.Get Bangladesh Cyber Army Update Tools and Keep secure your System.

Networking is Easiest way to stay connected each other.

Get our Latest Tutorial and Get more knowledge about Networking .

Get Our Unique Program.All feature is Updated.!

Get Up Hacker Every one Don't takes our Glory . We must Won The True Race.

Tuesday, June 24, 2014

How to Bypass 2 step mobile phone verification Google,Facebook,Ebay,Twitter Etc easily.

There is simple tricks for Bypass 2 step mobile phone verification Google,Facebook,Ebay,Twitter Etc
easily.
so i'll share it for enjoy.
http://receive-sms-online.com/
http://pinger.com
http://lleida.net/uk/
http://www.k7.net/
http://www.receivesmsonline.net/
http://sms.itz.hu/
http://slidesms.net/receive.php

Thursday, April 11, 2013

How to Activate your Payonner MasterCard.


Hello Visitor,Today I"ll Explain how to activate your Payonner MasterCard. Ok Lets Flow simple  Step.My Account / Confirmation
Your card has been activated successfully. 
Note: If your new card replaces a previously active card, funds and services will be transferred from the previous card to the new one. Please allow 2 hours for the transfer to complete.
Do not use it unless funds are loaded. Don't Use Empty ATM Card in any ATM Buth.

Thank you,
Customer Support.
  card number

5314455012429XXX

Get A MasterCard 100% Free With 25$ For Digital Money Transfer.

Hello Visitor,Today i"ll Explain how to get a MasterCard Free and Easily from everywhere.
Maximum time we need online marketing or money transaction .Let's go Easy and simple Step.
Step 1:Go to Payonner
See The Image Bellow 
Items marked with a * are mandatory.
Step 2: Click Start Hare
and give your Card holder Detail (Ex:First name on your ID*,Last name on your ID*,
Date of birth:*Email address:*,Retype Email address:*,Country:*,Home Address*,City:*,Zip/Postal Code*,
Phone Number*Etc.
Your User Name is:
)
Give Card Account Information (Ex:Choose your password,Retype your Password,Security question and answer.
Registration Verification (Ex:Your National Id Number)
Tiks those field bellow
Please read and check off these boxes to complete your registration:
I agree to the Electronic Disclosures and Privacy Policy
I agree to the Pricing & Fees
I agree to the Terms and Conditions
Step 3:Click Finish .
That's It.Thanks for reading.No More today.

Tuesday, March 12, 2013

Backtrack Setup Manually For Hacking !


The Linux (Backtrack) of all the problems that will be tried.If you do not yet have just added Join us.So go ahead and download it backtrack part by part. (Brand new, please do not disturb)
However, more One
What is Backtrack?
=> Backtrack a Linux-based operating system.
Why backtrack?
=> We mainly use Linux for hacking. And backtrack the hacking tools available to all. So we have to choose Backtrack action.
How do I set up backtrack / no harm will PC 's / ......?
=> No. We Done setup that is fully secure and that any problem that you are.
I do not say we'll use Backtrack for hacking Windows, so we'll keep this as our main pichira with the moves to create a PC Backtrack install it.
Therefore, we use the Backtrack VirtualBox installed so that we do the same with Windows and Backtrack use.
I hope you understand.
• Go to the first page to Download the Backtrack. Here
• The download on the right side of the press.

1.Release Backtrack   :  Backtrack 5 R3

    2.Window Manager:  :    Gnome....

    3.Architecture             :    32..........

    4.Image Type:             :   ISO      

    5.Download Type       :   Direct or torrent

    6.We'll Direct Download then click No Thanks            

  Please wait for download to finish it up.

• we installed virtualbox can be installed, but it is much more System hacking is no longer good for
• virtualbox's website and go to the bottom download

No More Today This file are too large


Friday, March 1, 2013

World Wide Web Top Secret !



Nice to meat all of them, I can not write I'm still a good bn. Forgiveness perspective view.
              I remember the scene where the Godfather holliwood  photo with her ​​pet murderer never face to face not meet the mandate through the network on the go with a very secret, or what are anjelina starring Julie 'Hacker' do not know the name of the movie is where the perpetrators of the crime within the network law and Order --- where they could not force the nose throat?
At first sight, the silver screen, but these movies are saiphai just false unknown networks like the Internet  is one of our known darkness ...
Promote excellence in information technology with the Internet, it has become the most mahasamudrera gets a big one. Keeping with the increased ability to search Engines. In particular, Google's name will be balatei, which is now one of the most trusted bryande been parinita. I think what we can suggest a net session without? Impossible!
But Google's ability to get this?
You'll be surprised to know that when you are no longer in the Google search results for hundreds of thousands of information you up before putting it on the Internet, only 10 per cent from! The Google of online information, 90 percent do not know! Eleme only 10 percent of the time within the search results that appear in front of the customer. The remaining 90 percent are unfamiliar to you always.
A survey has shown that the amount of data stored on the web than 500 times higher than the data stored in the invisible web. In fact, this is one part of the glacier is visible on the net is popped Ocean Deep Web is the real ocean itself!
Our topic today is unknown Black web
Black Web can be divided into two, which are
• 1. The Deep Web
• 2. The Dark Web
They are all part of the Deep Web is the Internet search engine to find, but if you know their address, you can go to this section.
The Dark Web is the part where conventional ways the Internet can not let you, you can not enter common Browsers. The software's help, you can enter here.
What is the origin of this part of the internet? It is impossible to correct it.
In fact, neither you nor I am not alone internet! Your every action, every glance watching your Internet Service provider download. They are no longer any need for your whole profile of the Secret Agency’s they Supply . This means you do not have freedom of movement no!
In the world of the Internet, the group felt the need for a system where they can secretly manage their activities. Army, the revolutionary, hackers, Actually real Administration wanted a system where the exchange of information between the Office of confidence or stolen information can get back to you chaffer with offenders. The world of online censorship many countries are very strict, Equally   Antiparty  been thinking about a system where the government can not administer. It would have been the origin of this is unknown. It all offenders who lure them with the fear of being caught in the nets do not dare discuss.

Now the question is why the Deep Web, search engines can not read?
This is because search Engines their search for the supervision of virtual robots with the Crawler. The Crawler is recorded on the website Websites  the HTML tag. Moreover, some of the requests are recorded from the site in search engines. Now that the site admin does not want to find that their site is not search engine rather, they use the Robot Exclusion Protocol, which entered Crawler or prevent them from existing sites to find. Some sites have a certain dynamic that is subject to the requirements of this type of site can be found to exist, the Crawler's possible this is not all. There are some sites that have links from other sites. The isolated site, also in the search.

Moreover, it could not leave the house search engine technology is still in its old. Text search Engines apart from the other formats (such as Flash format) webpage  not find!
The Deep Web data from the web surface quality of the information. These are very ornate and relevant. Understand what you are searching Engines!

The most interesting part of the Dark goodbye on the web ...
Your current web browser can not access these sites. They all practice outside of the Internet, it does not take into account any protocol. And they are so odd addresses (such as sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that lay people are very difficult to remember. This site is the invisible part of the internet. Special knowledge (such as programming, networking, proxy) if you can not access this network. Another peculiarity of this part of the World Wide Web sites, such as top-level(TLD) domains (such as. Com) rather than using the "Pseudo Top Level Domain" using the original World Wide Web from a second network under. I have a domain of Bitnet, Onion, Freenet, and more.
Most of the world! I can not imagine life  which is what you get here. I did not ever imagine that it can be taken apart Secret Agency's site, so you are always here. The issue that you can get into your head. This year, WikiLeaks has announced that they will release more new data, but you might be able to post Surprised this all data from the Dark Web has a number of years ago. Any book is the latest edition to the surface of the web of copyright law, it's not because you are being transferred dedarase.

There are more depraved Entertainment! Child pornography from the surface of the Genital Mutilation's video on the web, and it is here Hot Topics.
There are some sites where marjuyana, Heroine from all kinds of home delivery of the drug. Dark web  users Are Adictted.
There are some sites where Criminal groups with education on how to make the pudding powder, some site arms are sold canned. It started from the rocket  Luncer, martar AK 47 like to buy the weapon.
Arabian - Democrate this spring darkweb join  them. Darkweb range of mail services, chat services, there is nothing much you can keep a secret identity.

Like, there's more! Several days ago I was visit on a site under equivalent kilar  where the money is available to rent! What's terrible, is not it? I was not. The site is the work of his own about the way I kilar On says
"I would call you up in slyat. I would not be able to offer the professional  end way. I know that I was not interested. You just give me the money and I will pay him that. Target age must be at least 18,
The target is male or girl that I can not come
I do not pregnant women as a target
I do not torture the target
If you're a member of a political personality or law enforcement agencies target the additional charge.
There is no extra charges for the fact that I am the sort of suicide or accident can.
After down pemment done within four weeks.
Outside the U.S. for target 5000 dollars extra travel charge applicable.
I work, I'll send you pictures of targets "
Black forest is the word you enter where you think twice before you take each step. Surface hacking technique that you see on the web is the dark part of the information from the web write by 1%. The hacker is terrible and Programming in a pair of them, and you can hack mail. Moreover, the government has Agents.

The question is how this all works with Network Law enforcement agencies continues to front of nose?
It is our understanding that such a network can be a little ...
The Network had become popular in the web dark web Surface Network is a onion Network. Pseudo-top-level-domain is onion.Onion. It's spooky sites address! Originally created for the U.S. Navy, but this was masked by the net users first choose Network. onion can not let your browser, you can download the Tor browser.
Torr to hide your identity, so this is what it will be almost impossible to identify your location. When you access a site with torr torr when you go through onion authenticated encryption difficult to send this request. The data you send to the proxy onion data, it becomes complicate the script.

The data in the original proxy onion like internet in which the members of Serve onion rautars waiting. Before entering the data again gateway onion networks get & IPsec encryption through it. Network time out once more through the encryption. onion way through several routers in IPsec encryption, encryption is where the output of one to one and a router knows that the data is coming from a router. Finally, when the data arrives in the recipient's hands go through the process dicription return to the original position. This is why many of the Network Layer, or Xhosa name onion Network.
Now, if this data is stolen during this data calacalira can not find it in his behalf or that of its sender or as receiver! I do not know it themselves onion rautar. But yes, there are two parts may be monitoring Sender-Receiver's location where he or she can understand.
This is why these kinds of mystical system of Law and Order List from the network all the time. Black is the most popular marketplace networks onion inside Silkroad, Forbes million sold as of last year there - was purchased. In currency trading is not common here, traffic is kind of virtual currency called Bitcoin. Microsoft, Apple products are found in 80% of discount.

This irregularities inside this kind of support system, why?
I really do not need to have an open platform. Child pornography that was created to lead this Network arekabhabe his work. And I always step ahead of cyber-terrorists from Service agencies. For example, we can say that Internet Protocol ^ 6 but have yet to surface on the web, the Internet Protocol ^ 4 at very old period. But probably the most under  using IP ^ 6.
Since internet user's people like Bad have all the time to adapt to it, it continues to be so. Once in a while I say that Dark web Visit on the web, but if you miss part of ice shelled sailer taste like the ocean.
If yes, do not go too far. I got, the plentiful money, so they need thousands of talented web Hacker Dark Dark hire people on the web, I was able to keep wait.
Some tips
• # The Dark web access on the Web, Flash, shock wave to spend about. Anonymity You can easily overturn them.
• # paid proxy service use. They are using military agencies and their services grating.
• # Destination Website if you are easily hacked, you could not leave a likely cause. What was your original data in the Dark Do not use the web.
Remember, you are not alone on web Dark of the Surface Web, the walls have ears ...... Welcome to the Dark on the web.


Thursday, February 28, 2013

Facebook Fan page ID Find Numerically !

Hello Visitor today i'll tell a simple tricks that give you any Facebook fan page id numerically.  

Tuesday, February 5, 2013

oDesk Slideshow Product Test 2013


Slideshow Product Test
Top 10 Percent All-time 1st Place
Score: 5.0

Question:
By editing the translation, slideshow will automatically update the LQE tool.
a. True 
b. False
Answer: b

Question:
Every project has a unique slideshow URL.
a. True
b. False
Answer: a

Question:
How do you review strings that have no screenshots in the slideshow?
a. You can’t, they don’t appear anywhere in slideshow
b. Click on the show message button
c. Navigate to the last slide of the slideshow
d. All of the above
e. None of the above
Answer: b

Question:
Which browser is the most optional to run slideshow on?
a. Internet Explorer
b. Firefox
c. Safari
d. Chrome 
e. None of the above
Answer: b
Question: 
What are the prerequisites required to being able to view a slideshow? 
a. GCRT extension installed
b. Access to the external tc
c. A link to the slideshow
d. All of the above
e. None of the above
Answer: d

Question:
What is the correct order for leaving comments? 
a. Reason for change, LQE code
b. LQE code, reason for change
c. Either order would work 
d. All of the above
e. None of the above
Answer: b

Question:
Which of the following is not true of approving/reviewing suggestions? 
a. You can select multiple suggestions at a time to approve or reject
b. You can’t approve two of the same suggestions at the same time
c. A blank page of suggestions means you have hit an error
d. They all are not true
e. None of the above
Answer: c

Question:
If you’re unable to edit a translation after you’ve been able to highlight it, it’s likely that:
a. You didn’t hit the escape key to lock the translation 
b. You don’t have GCRT installed
c. The system feels the translation should not be edited
d. All of the above
e. None of the above
Answer: a

Question:
How do you get to the language you want to review?
a. The system automatically redirects to your language
b. Click on the link with your language
c. Select from the drop-down box
d. All of the above
e. None of the above
Answer: c

Question:
What basic information is provided in each slideshow? 
a. Number of message to be reviewed 
b. Number of screenshots to be reviewed 
c. Number of message approved and rejected
d. All of the above
e. None of the above
Answer: a,b

Question:
What do you need to add the comments of slideshow when changes to translations?
a. LQE code
b. Your user email
c. Whether it is a major/minor error
d. All of the above
e. None of the above
Answer: a

Question:
Editing the strings automatically updates it to the TC (translation console).
a. True
b. False
Answer: b
Question:
How do you navigate to an entry to edit its translation? 
a. Clicking on the arrow buttons for the messages
b. Clicking on the message directly scrolling through messages with the arrow keys on your keyboard
c. All of the above
d. None of the above
Answer: a, b

Thursday, January 31, 2013

ODesk Readiness Test for Independent Contractors and Staffing Managers – Test 2013

oDesk Readiness Test for Independent Contractors and Staffing Managers – Test 2013


Question: Which of the following actions are NOT allowed when applying to job openings?
e.  All of the above (Answer)
 Question: Which of the following is FALSE about weekly limits on hourly contracts?
a.Hours in excess of the weekly limit will not be billed to the employer
b.You should discuss any need to work beyond your limit with your employer
c. The weekly limit can be changed by the contractor (Answer)
d.The weekly limit can be changed by the employer
e. Hours in excess of the weekly limit are not guaranteed payment
 Question: Which of the following statements about the oDesk Team application are true?
e.  All of the above (Answer)
 Question: Which of the following are TRUE about the oDesk dispute process?
a.The dispute process only applies to Hourly contracts
b. If you fail to respond, oDesk will refund the employer and suspend your account
c. If you reject the dispute, oDesk specialists will review your Work Diary and evaluate it against the criteria of the payment guarantee
d.  Disputed hours ruled in the employers favor are refunded
e.  All of the above (Answer)
 Question: Which of the following are TRUE about your oDesk Work Diary?
 a.  Allows employers to see when and what their contractors are working on
b. Enables automatic billing for hourly contracts
c.The oDesk Team application auto-tracks time which can be reviewed in the Work Diary
d. Manual time can be added, but isn’t guaranteed payment
e. All of the above (Answer)
 Question: What happens when a contract ends?
a. You lose access to the Work Diary
b. Both users can leave feedback
c. The feedback system is double blind, so your employer cannot see the feedback you left them until after they have left feedback for you
d.  Hours will be billed (and disputes may be filed) according to the usual weekly payment schedule
e.   All of the above (Answer)
 Question: Can I start my own agency on oDesk?
 a.     Yes! You can create an agency and earn money by selling the services of your agency contractors. (Answer)
b.     No, oDesk is for independent contractors only
 Question: Which of the following is true of your oDesk timelog?
e.  All of the above (Answer)
 Question: Which of the following are required to qualify for guaranteed payment?
a. An hourly contract
b. Tracking your time with the oDesk Team application
c. Entering relevant memos
d. An employer with a verified payment method
e. All of the above (Answer)
 Question: Which of the following statements are correct about oDesk fees?
e.  All of the above (Answer)
 Question: Which of the following actions are NOT allowed when applying to job postings?
a. Misrepresenting your skills, experiences, portfolio, etc.
b. Submitting boilerplate, placeholder or generic bids or other spam
c. Disclosing direct contact information
d. Applying when you are not truly qualified
e.  All of the above (Answer)
 Question: Which of the following are NOT permitted on oDesk?
a.  Sharing a single account between multiple people
b. Opening more than one account on oDesk
c. Using a logo or clip art as your profile portrait
d.  Using a fake name
e.  All of the above (Answer)
 Question: What do you need to do to ensure guaranteed payment on hourly jobs?
e.  All of the above (Answer)
 Question: Which of the following break the oDesk user agreement?
e.  All of the above (Answer)
 Question: Which of the following statements about oDesk fees is FALSE?
a.  The oDesk fee is 10% of the employer’s payment to oDesk
b.  oDesk is free to join
c.  oDesk is free for contractors to apply and work on jobs
d.  The oDesk fee is $2/hour for hourly contracts (Answer)
e.  All of the above
 Question: Buyers set weekly limits on hourly assignments, how do these work?
e.  All of the above (Answer)
 Question: The oDesk Team application Time Tracker records which of the following
 a.  Screenshot of the active screen once per billing segment
b. Number of keystrokes
c.  Number of mouse clicks
d.  Memo entered by the contractor
e.  All of the above (Answer)
 Question: Can I start my own company on oDesk?
a. Yes! oDesk allows you to build and manage a team of workers, colleagues and collaborators. You can even subcontract other workers on oDesk to other customers oDesk (and take a cut). (Answer)
b. No
Question: How does feedback work on oDesk?
e.  All of the above (Answer)

Question: Which of the following is TRUE about fixed-price contracts?
a. Employer billed automatically each week 
b. How much to pay and when to pay is at the employer’s discretion (Answer)
c. Hours worked will show on your profile
d. Time-tracking required
e. Qualify for the oDesk payment guarantee

Related Posts Plugin for WordPress, Blogger...