Wellcome To Bangladesh Cyber Army
Bangladesh Cyber Army is Non-profit knowladgebase in Bangladesh. Lets We make a new world,A true World .
Security is the Big Challenge.
Security is your own Right.Everywhere Needs Security.Stay Connected With us.Get Bangladesh Cyber Army Update Tools and Keep secure your System.
Who is secure in Online You,Me,Everyone?
Security yourself.
Networking is Easiest way to stay connected each other.
Get our Latest Tutorial and Get more knowledge about Networking .
Get Our Unique Program.All feature is Updated.!
Get Up Hacker Every one Don't takes our Glory . We must Won The True Race.
Monday, March 25, 2019
Tuesday, June 24, 2014
How to Bypass 2 step mobile phone verification Google,Facebook,Ebay,Twitter Etc easily.
There is simple tricks for Bypass 2 step mobile phone verification Google,Facebook,Ebay,Twitter Etc
easily.
so i'll share it for enjoy.
http://receive-sms-online.com/
http://pinger.com
http://lleida.net/uk/
http://www.k7.net/
http://www.receivesmsonline.net/
http://sms.itz.hu/
http://slidesms.net/receive.php
easily.
so i'll share it for enjoy.
http://receive-sms-online.com/
http://pinger.com
http://lleida.net/uk/
http://www.k7.net/
http://www.receivesmsonline.net/
http://sms.itz.hu/
http://slidesms.net/receive.php
Thursday, April 11, 2013
How to Activate your Payonner MasterCard.
Hello Visitor,Today I"ll Explain how to activate your Payonner MasterCard. Ok Lets Flow simple Step.My Account / Confirmation
Your card has been activated successfully.
Note: If your new card replaces a previously active card, funds and services will be transferred from the previous card to the new one. Please allow 2 hours for the transfer to complete.
Do not use it unless funds are loaded. Don't Use Empty ATM Card in any ATM Buth.
Thank you,
Customer Support.
card number
5314455012429XXX
Get A MasterCard 100% Free With 25$ For Digital Money Transfer.
Hello Visitor,Today i"ll Explain how to get a MasterCard Free and Easily from everywhere.
Maximum time we need online marketing or money transaction .Let's go Easy and simple Step.
Step 1:Go to Payonner
See The Image Bellow
Maximum time we need online marketing or money transaction .Let's go Easy and simple Step.
Step 1:Go to Payonner
See The Image Bellow
Items marked with a * are mandatory. Step 2: Click Start Hare and give your Card holder Detail (Ex:First name on your ID*,Last name on your ID*, Date of birth:*Email address:*,Retype Email address:*,Country:*,Home Address*,City:*,Zip/Postal Code*, Phone Number*Etc.
| |||||||||
I agree to the Electronic Disclosures and Privacy Policy | |||||||||
I agree to the Pricing & Fees | |||||||||
I agree to the Terms and Conditions Step 3:Click Finish . That's It.Thanks for reading.No More today. |
Tuesday, March 12, 2013
Backtrack Setup Manually For Hacking !
The Linux (Backtrack) of all the problems that will be tried.If you do not yet have just added Join us.So go ahead and download it backtrack part by part. (Brand new, please do not disturb)
However, more One
What is Backtrack?
=> Backtrack a Linux-based operating system.
Why backtrack?
=> We mainly use Linux for hacking. And backtrack the hacking tools available to all. So we have to choose Backtrack action.
How do I set up backtrack / no harm will PC 's / ......?
=> No. We Done setup that is fully secure and that any problem that you are.
I do not say we'll use Backtrack for hacking Windows, so we'll keep this as our main pichira with the moves to create a PC Backtrack install it.
Therefore, we use the Backtrack VirtualBox installed so that we do the same with Windows and Backtrack use.
I hope you understand.
• Go to the first page to Download the Backtrack. Here
• The download on the right side of the press.
1.Release Backtrack : Backtrack 5 R3
2.Window Manager: : Gnome....
3.Architecture : 32..........
4.Image Type: : ISO
5.Download Type : Direct or torrent
6.We'll Direct Download then click No Thanks
Please wait for download to finish it up.
• we installed virtualbox can be installed, but it is much more System hacking is no longer good for
• virtualbox's website and go to the bottom download
No More Today This file are too large
Friday, March 1, 2013
World Wide Web Top Secret !
Nice to meat all of them, I can not write I'm still a good
bn. Forgiveness perspective view.
I
remember the scene where the Godfather holliwood photo with her pet murderer never face to
face not meet the mandate through the network on the go with a very secret, or
what are anjelina starring Julie 'Hacker' do not know the name of the movie is
where the perpetrators of the crime within the network law and Order --- where
they could not force the nose throat?
At first sight, the silver screen, but these movies are
saiphai just false unknown networks like the Internet is one of our known darkness ...
Promote excellence in information technology with the
Internet, it has become the most mahasamudrera gets a big one. Keeping with the
increased ability to search Engines. In particular, Google's name will be
balatei, which is now one of the most trusted bryande been parinita. I think
what we can suggest a net session without? Impossible!
But Google's ability to get this?
You'll be surprised to know that when you are no longer in
the Google search results for hundreds of thousands of information you up
before putting it on the Internet, only 10 per cent from! The Google of online
information, 90 percent do not know! Eleme only 10 percent of the time within
the search results that appear in front of the customer. The remaining 90
percent are unfamiliar to you always.
A survey has shown that the amount of data stored on the web
than 500 times higher than the data stored in the invisible web. In fact, this
is one part of the glacier is visible on the net is popped Ocean Deep Web is
the real ocean itself!
Our topic today is unknown Black web
Black Web can be divided into two, which are
• 1. The Deep Web
• 2. The Dark Web
They are all part of the Deep Web is the Internet search
engine to find, but if you know their address, you can go to this section.
The Dark Web is the part where conventional ways the
Internet can not let you, you can not enter common Browsers. The software's
help, you can enter here.
What is the origin of this part of the internet? It is
impossible to correct it.
In fact, neither you nor I am not alone internet! Your every
action, every glance watching your Internet Service provider download. They are
no longer any need for your whole profile of the Secret Agency’s they Supply .
This means you do not have freedom of movement no!
In the world of the Internet, the group felt the need for a
system where they can secretly manage their activities. Army, the
revolutionary, hackers, Actually real Administration wanted a system where the
exchange of information between the Office of confidence or stolen information
can get back to you chaffer with offenders. The world of online censorship many
countries are very strict, Equally Antiparty been thinking about a system where the
government can not administer. It would have been the origin of this is
unknown. It all offenders who lure them with the fear of being caught in the
nets do not dare discuss.
Now the question is why the Deep Web, search engines can not read?
This is because search Engines their search for the supervision of virtual robots with the Crawler. The Crawler is recorded on the website Websites the HTML tag. Moreover, some of the requests are recorded from the site in search engines. Now that the site admin does not want to find that their site is not search engine rather, they use the Robot Exclusion Protocol, which entered Crawler or prevent them from existing sites to find. Some sites have a certain dynamic that is subject to the requirements of this type of site can be found to exist, the Crawler's possible this is not all. There are some sites that have links from other sites. The isolated site, also in the search.
Moreover, it could not leave the house search engine technology is still in its old. Text search Engines apart from the other formats (such as Flash format) webpage not find!
The Deep Web data from the web surface quality of the information. These are very ornate and relevant. Understand what you are searching Engines!
The most interesting part of the Dark goodbye on the web ...
Your current web browser can not access these sites. They all practice outside of the Internet, it does not take into account any protocol. And they are so odd addresses (such as sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that lay people are very difficult to remember. This site is the invisible part of the internet. Special knowledge (such as programming, networking, proxy) if you can not access this network. Another peculiarity of this part of the World Wide Web sites, such as top-level(TLD) domains (such as. Com) rather than using the "Pseudo Top Level Domain" using the original World Wide Web from a second network under. I have a domain of Bitnet, Onion, Freenet, and more.
Most of the world! I can not imagine life which is what you get here. I did not ever imagine that it can be taken apart Secret Agency's site, so you are always here. The issue that you can get into your head. This year, WikiLeaks has announced that they will release more new data, but you might be able to post Surprised this all data from the Dark Web has a number of years ago. Any book is the latest edition to the surface of the web of copyright law, it's not because you are being transferred dedarase.
There are more depraved Entertainment! Child pornography from the surface of the Genital Mutilation's video on the web, and it is here Hot Topics.
There are some sites where marjuyana, Heroine from all kinds of home delivery of the drug. Dark web users Are Adictted.
There are some sites where Criminal groups with education on how to make the pudding powder, some site arms are sold canned. It started from the rocket Luncer, martar AK 47 like to buy the weapon.
Arabian - Democrate this spring darkweb join them. Darkweb range of mail services, chat services, there is nothing much you can keep a secret identity.
Like, there's more! Several days ago I was visit on a site under equivalent kilar where the money is available to rent! What's terrible, is not it? I was not. The site is the work of his own about the way I kilar On says
"I would call you up in slyat. I would not be able to offer the professional end way. I know that I was not interested. You just give me the money and I will pay him that. Target age must be at least 18,
The target is male or girl that I can not come
I do not pregnant women as a target
I do not torture the target
If you're a member of a political personality or law enforcement agencies target the additional charge.
There is no extra charges for the fact that I am the sort of suicide or accident can.
After down pemment done within four weeks.
Outside the U.S. for target 5000 dollars extra travel charge applicable.
I work, I'll send you pictures of targets "
Black forest is the word you enter where you think twice before you take each step. Surface hacking technique that you see on the web is the dark part of the information from the web write by 1%. The hacker is terrible and Programming in a pair of them, and you can hack mail. Moreover, the government has Agents.
The question is how this all works with Network Law enforcement agencies continues to front of nose?
It is our understanding that such a network can be a little ...
The Network had become popular in the web dark web Surface Network is a onion Network. Pseudo-top-level-domain is onion.Onion. It's spooky sites address! Originally created for the U.S. Navy, but this was masked by the net users first choose Network. onion can not let your browser, you can download the Tor browser.
Torr to hide your identity, so this is what it will be almost impossible to identify your location. When you access a site with torr torr when you go through onion authenticated encryption difficult to send this request. The data you send to the proxy onion data, it becomes complicate the script.
The data in the original proxy onion like internet in which the members of Serve onion rautars waiting. Before entering the data again gateway onion networks get & IPsec encryption through it. Network time out once more through the encryption. onion way through several routers in IPsec encryption, encryption is where the output of one to one and a router knows that the data is coming from a router. Finally, when the data arrives in the recipient's hands go through the process dicription return to the original position. This is why many of the Network Layer, or Xhosa name onion Network.
Now, if this data is stolen during this data calacalira can not find it in his behalf or that of its sender or as receiver! I do not know it themselves onion rautar. But yes, there are two parts may be monitoring Sender-Receiver's location where he or she can understand.
This is why these kinds of mystical system of Law and Order List from the network all the time. Black is the most popular marketplace networks onion inside Silkroad, Forbes million sold as of last year there - was purchased. In currency trading is not common here, traffic is kind of virtual currency called Bitcoin. Microsoft, Apple products are found in 80% of discount.
This irregularities inside this kind of support system, why?
I really do not need to have an open platform. Child pornography that was created to lead this Network arekabhabe his work. And I always step ahead of cyber-terrorists from Service agencies. For example, we can say that Internet Protocol ^ 6 but have yet to surface on the web, the Internet Protocol ^ 4 at very old period. But probably the most under using IP ^ 6.
Since internet user's people like Bad have all the time to adapt to it, it continues to be so. Once in a while I say that Dark web Visit on the web, but if you miss part of ice shelled sailer taste like the ocean.
If yes, do not go too far. I got, the plentiful money, so they need thousands of talented web Hacker Dark Dark hire people on the web, I was able to keep wait.
Some tips
• # The Dark web access on the Web, Flash, shock wave to spend about. Anonymity You can easily overturn them.
• # paid proxy service use. They are using military agencies and their services grating.
• # Destination Website if you are easily hacked, you could not leave a likely cause. What was your original data in the Dark Do not use the web.
Remember, you are not alone on web Dark of the Surface Web, the walls have ears ...... Welcome to the Dark on the web.
Now the question is why the Deep Web, search engines can not read?
This is because search Engines their search for the supervision of virtual robots with the Crawler. The Crawler is recorded on the website Websites the HTML tag. Moreover, some of the requests are recorded from the site in search engines. Now that the site admin does not want to find that their site is not search engine rather, they use the Robot Exclusion Protocol, which entered Crawler or prevent them from existing sites to find. Some sites have a certain dynamic that is subject to the requirements of this type of site can be found to exist, the Crawler's possible this is not all. There are some sites that have links from other sites. The isolated site, also in the search.
Moreover, it could not leave the house search engine technology is still in its old. Text search Engines apart from the other formats (such as Flash format) webpage not find!
The Deep Web data from the web surface quality of the information. These are very ornate and relevant. Understand what you are searching Engines!
The most interesting part of the Dark goodbye on the web ...
Your current web browser can not access these sites. They all practice outside of the Internet, it does not take into account any protocol. And they are so odd addresses (such as sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that lay people are very difficult to remember. This site is the invisible part of the internet. Special knowledge (such as programming, networking, proxy) if you can not access this network. Another peculiarity of this part of the World Wide Web sites, such as top-level(TLD) domains (such as. Com) rather than using the "Pseudo Top Level Domain" using the original World Wide Web from a second network under. I have a domain of Bitnet, Onion, Freenet, and more.
Most of the world! I can not imagine life which is what you get here. I did not ever imagine that it can be taken apart Secret Agency's site, so you are always here. The issue that you can get into your head. This year, WikiLeaks has announced that they will release more new data, but you might be able to post Surprised this all data from the Dark Web has a number of years ago. Any book is the latest edition to the surface of the web of copyright law, it's not because you are being transferred dedarase.
There are more depraved Entertainment! Child pornography from the surface of the Genital Mutilation's video on the web, and it is here Hot Topics.
There are some sites where marjuyana, Heroine from all kinds of home delivery of the drug. Dark web users Are Adictted.
There are some sites where Criminal groups with education on how to make the pudding powder, some site arms are sold canned. It started from the rocket Luncer, martar AK 47 like to buy the weapon.
Arabian - Democrate this spring darkweb join them. Darkweb range of mail services, chat services, there is nothing much you can keep a secret identity.
Like, there's more! Several days ago I was visit on a site under equivalent kilar where the money is available to rent! What's terrible, is not it? I was not. The site is the work of his own about the way I kilar On says
"I would call you up in slyat. I would not be able to offer the professional end way. I know that I was not interested. You just give me the money and I will pay him that. Target age must be at least 18,
The target is male or girl that I can not come
I do not pregnant women as a target
I do not torture the target
If you're a member of a political personality or law enforcement agencies target the additional charge.
There is no extra charges for the fact that I am the sort of suicide or accident can.
After down pemment done within four weeks.
Outside the U.S. for target 5000 dollars extra travel charge applicable.
I work, I'll send you pictures of targets "
Black forest is the word you enter where you think twice before you take each step. Surface hacking technique that you see on the web is the dark part of the information from the web write by 1%. The hacker is terrible and Programming in a pair of them, and you can hack mail. Moreover, the government has Agents.
The question is how this all works with Network Law enforcement agencies continues to front of nose?
It is our understanding that such a network can be a little ...
The Network had become popular in the web dark web Surface Network is a onion Network. Pseudo-top-level-domain is onion.Onion. It's spooky sites address! Originally created for the U.S. Navy, but this was masked by the net users first choose Network. onion can not let your browser, you can download the Tor browser.
Torr to hide your identity, so this is what it will be almost impossible to identify your location. When you access a site with torr torr when you go through onion authenticated encryption difficult to send this request. The data you send to the proxy onion data, it becomes complicate the script.
The data in the original proxy onion like internet in which the members of Serve onion rautars waiting. Before entering the data again gateway onion networks get & IPsec encryption through it. Network time out once more through the encryption. onion way through several routers in IPsec encryption, encryption is where the output of one to one and a router knows that the data is coming from a router. Finally, when the data arrives in the recipient's hands go through the process dicription return to the original position. This is why many of the Network Layer, or Xhosa name onion Network.
Now, if this data is stolen during this data calacalira can not find it in his behalf or that of its sender or as receiver! I do not know it themselves onion rautar. But yes, there are two parts may be monitoring Sender-Receiver's location where he or she can understand.
This is why these kinds of mystical system of Law and Order List from the network all the time. Black is the most popular marketplace networks onion inside Silkroad, Forbes million sold as of last year there - was purchased. In currency trading is not common here, traffic is kind of virtual currency called Bitcoin. Microsoft, Apple products are found in 80% of discount.
This irregularities inside this kind of support system, why?
I really do not need to have an open platform. Child pornography that was created to lead this Network arekabhabe his work. And I always step ahead of cyber-terrorists from Service agencies. For example, we can say that Internet Protocol ^ 6 but have yet to surface on the web, the Internet Protocol ^ 4 at very old period. But probably the most under using IP ^ 6.
Since internet user's people like Bad have all the time to adapt to it, it continues to be so. Once in a while I say that Dark web Visit on the web, but if you miss part of ice shelled sailer taste like the ocean.
If yes, do not go too far. I got, the plentiful money, so they need thousands of talented web Hacker Dark Dark hire people on the web, I was able to keep wait.
Some tips
• # The Dark web access on the Web, Flash, shock wave to spend about. Anonymity You can easily overturn them.
• # paid proxy service use. They are using military agencies and their services grating.
• # Destination Website if you are easily hacked, you could not leave a likely cause. What was your original data in the Dark Do not use the web.
Remember, you are not alone on web Dark of the Surface Web, the walls have ears ...... Welcome to the Dark on the web.
Thursday, February 28, 2013
Facebook Fan page ID Find Numerically !
Hello Visitor today i'll tell a simple tricks that give you any Facebook fan page id numerically.
Tuesday, February 5, 2013
oDesk Slideshow Product Test 2013
Slideshow
Product Test
Top 10 Percent
All-time 1st Place
Score: 5.0
Question:
By editing the translation,
slideshow will automatically update the LQE tool.
a. True
b. False
Answer: b
Question:
Every project has a unique
slideshow URL.
a. True
b. False
Answer: a
Question:
How do you review strings
that have no screenshots in the slideshow?
a. You can’t, they don’t appear anywhere in slideshow
b. Click on the show message button
c. Navigate to the last slide of the slideshow
d. All of the above
e. None of the above
Answer: b
Question:
Which browser is the most
optional to run slideshow on?
a. Internet Explorer
b. Firefox
c. Safari
d. Chrome
e. None of the above
Answer: b
Question:
What are the prerequisites
required to being able to view a slideshow?
a. GCRT extension installed
b. Access to the external tc
c. A link to the slideshow
d. All of the above
e. None of the above
Answer: d
Question:
What is the correct order
for leaving comments?
a. Reason for change, LQE code
b. LQE code, reason for change
c. Either order would work
d. All of the above
e. None of the above
Answer: b
Question:
Which of the following is
not true of approving/reviewing suggestions?
a. You can select multiple suggestions at a time to
approve or reject
b. You can’t approve two of the same suggestions at
the same time
c. A blank page of suggestions means you have hit an
error
d. They all are not true
e. None of the above
Answer: c
Question:
If you’re unable to edit a
translation after you’ve been able to highlight it, it’s likely that:
a. You didn’t hit the escape key to lock the
translation
b. You don’t have GCRT installed
c. The system feels the translation should not be
edited
d. All of the above
e. None of the above
Answer: a
Question:
How do you get to the
language you want to review?
a. The system automatically redirects to your
language
b. Click on the link with your language
c. Select from the drop-down box
d. All of the above
e. None of the above
Answer: c
Question:
What basic information is provided
in each slideshow?
a. Number of message to be reviewed
b. Number of screenshots to be reviewed
c. Number of message approved and rejected
d. All of the above
e. None of the above
Answer: a,b
Question:
What do you need to add the
comments of slideshow when changes to translations?
a. LQE code
b. Your user email
c. Whether it is a major/minor error
d. All of the above
e. None of the above
Answer: a
Question:
Editing the strings
automatically updates it to the TC (translation console).
a. True
b. False
Answer: b
Question:
How do you navigate to an
entry to edit its translation?
a. Clicking on the arrow buttons for the messages
b. Clicking on the message directly scrolling through
messages with the arrow keys on your keyboard
c. All of the above
d. None of the above
Answer: a, b
Thursday, January 31, 2013
ODesk Readiness Test for Independent Contractors and Staffing Managers – Test 2013
Question: Which of the
following actions are NOT allowed when applying to job openings?
e. All
of the above (Answer)
Question: Which of the
following is FALSE about weekly limits on hourly contracts?
a.Hours in excess of the weekly limit will not
be billed to the employer
b.You should discuss any need to work beyond
your limit with your employer
c. The
weekly limit can be changed by the contractor (Answer)
d.The weekly limit can be changed by the
employer
e. Hours in excess of the weekly limit
are not guaranteed payment
Question: Which of the following statements about the oDesk Team application
are true?
e. All
of the above (Answer)
Question: Which of the
following are TRUE about the oDesk dispute process?
a.The dispute process only applies to Hourly
contracts
b. If you fail to respond, oDesk will
refund the employer and suspend your account
c. If you reject the dispute, oDesk
specialists will review your Work Diary and evaluate it against the criteria of
the payment guarantee
d. Disputed hours ruled in the
employers favor are refunded
e. All
of the above (Answer)
Question: Which of the
following are TRUE about your oDesk Work Diary?
a. Allows employers to see
when and what their contractors are working on
b. Enables automatic billing for hourly
contracts
c.The oDesk Team application auto-tracks time which
can be reviewed in the Work Diary
d. Manual time can be added, but isn’t
guaranteed payment
e.
All of the above (Answer)
Question: What happens when
a contract ends?
a. You lose access to the Work Diary
b. Both users can leave feedback
c. The feedback system is double blind,
so your employer cannot see the feedback you left them until after they have
left feedback for you
d. Hours will be billed (and disputes
may be filed) according to the usual weekly payment schedule
e. All
of the above (Answer)
Question: Can I start my
own agency on oDesk?
a. Yes!
You can create an agency and earn money by selling the services of your agency
contractors. (Answer)
b. No, oDesk is for
independent contractors only
Question: Which of the following is true of your oDesk timelog?
e. All
of the above (Answer)
Question: Which of the following
are required to qualify for guaranteed payment?
a. An hourly contract
b. Tracking your time with the oDesk
Team application
c. Entering relevant memos
d. An employer with a verified payment
method
e. All
of the above (Answer)
Question: Which of the following statements are correct about oDesk fees?
e. All
of the above (Answer)
Question: Which of the
following actions are NOT allowed when applying to job postings?
a. Misrepresenting your skills,
experiences, portfolio, etc.
b. Submitting boilerplate, placeholder or
generic bids or other spam
c. Disclosing direct contact information
d. Applying when you are not truly
qualified
e. All
of the above (Answer)
Question: Which of the
following are NOT permitted on oDesk?
a. Sharing a single account between
multiple people
b. Opening more than one account on oDesk
c. Using a logo or clip art as
your profile portrait
d. Using a fake name
e. All
of the above (Answer)
Question: What do you need to do to ensure guaranteed payment on hourly
jobs?
e. All
of the above (Answer)
Question: Which of the following break the oDesk user agreement?
e. All
of the above (Answer)
Question: Which of the
following statements about oDesk fees is FALSE?
a. The oDesk fee is 10% of the
employer’s payment to oDesk
b. oDesk is free to join
c. oDesk is free
for contractors to apply and work on jobs
d. The
oDesk fee is $2/hour for hourly contracts (Answer)
e. All of the above
Question: Buyers set weekly limits on hourly assignments, how do these work?
e. All
of the above (Answer)
Question: The oDesk Team
application Time Tracker records which of the following
a. Screenshot of the active
screen once per billing segment
b. Number of keystrokes
c. Number of mouse clicks
d. Memo entered by the contractor
e. All
of the above (Answer)
Question: Can I start my own company on oDesk?
a.
Yes! oDesk allows you to build and manage a team of workers, colleagues and
collaborators. You can even subcontract other workers on oDesk to other
customers oDesk (and take a cut). (Answer)
b. No
Question: How does feedback
work on oDesk?
e. All
of the above (Answer)
Question: Which of the following is TRUE about fixed-price contracts?
a.
Employer billed automatically each week
b.
How much to pay and when to pay is at the employer’s discretion (Answer)
c. Hours worked will show on your profile
d. Time-tracking required
e. Qualify for the
oDesk payment guarantee
Subscribe to:
Posts (Atom)