O Bijuria

update is done    .......   all viewers  watch      video  


 

Zamane Ki Buraai Mujh Mein Hai Sanam . AKASH .lllll


WELCOME to AKASH network !

akashpilu@gmail.com   .akashnet@usa.com 

 


Mr


how to real hack

   Welcome to the  Hacker World  Hello!Learn Real Hacking Tricks On Hacking with Our site online.Keep in touch with the Latest Hacking Tools Provided in the Tab.Be the member of Our Site To be a Smart innocent Hacker.
                         
  We like hacking and security.If You Have  new Hacking Tricks  Which You Want To publish 


   Don't Tease The Hacker
               
                                          
          
   
                      

                       Our Slogan: Hack the Cracker
                  

.Outstanding lyrics

Beqabu Ho Gaya

786


Blue Screen Error- How to Fix it.

Blue Screen = The Most Irritating Error Face by Windows Users. Did you ever got stuck with this type of Error ?
Most of will answer it YES.

What is Blue Screen of Death (BSOD) ?

Blue screen of death is nothing but an error Shown in Microsoft Windows Operating Systems which Stops Further Operations.

Why BSOD Error is Caused ?

This error is Generally Hardware or Drivers Related.causing the Computer To stop Responding And prevents Damage to the Hardware And data.
BSOD Looks Like the Below Picture. Manny Windows Users Must be Familiar With This.




Img src= google


How To Fix BSOD :
As I said There are several Reasons For BSOD, Unfortunately There is no Particular solution but The Following Tips And tricks Can Help you To get Rid Of it.


1. Remove Startup Programs That Starts Will System Booting.

What happens is when you System Boots, Many Other apps try To load at the same time whill may result in to BSOD. so Remove Unwanted Programs On startup.

How To Remove :
Press Windows Key +R
Run Box will appear. Type "msconfig" and Hit Enter,

Click on Startup Tab and remove all Unwanted Programs and click on apply.
It may ask you to restart your syste, So restart it .


Removing programs at startup will fix your problem.

2.Uninstall Softwares:
Many Times while installing a softare A blue screen occors with a message that says, The Software that you are installing is Culprit . Verify all the changes that you made to your system and reset Them. Uninstall the installed Application it will help you to a great extent.

3. Resetting your Hardwares And Drivers :
In some cases Due to Faulty Hardware connection it show the blue error screen. You can prevent this by ensuring you all hardware connection such as external ports,motherboard pins are set correctly.Bad drivers may also cause the same problem.Keep your drivers up to date.

 Above tips will definately help you to get rid of Bluescreens.


Windows 8 users May have Experienced a New Blue screen:
In windows 8 it will Tell you About the error and sad Emoticon At the top of the text .
Same as below pic.


akash ............Use Whatsapp on PC for Windows and also Mac .......akash


Whatsapp is the most Popular Messanger available in the Market for Mobile Phones.

Unfortunately if you dont own a Smart phone then you might not be able to use whatsapp. But don't worry today we Will learn How to use Whatsapp On PC as well.
You can Use it On both Windows and Mac.

Let us See How to Use Whatsapp On Windows and Mac PC.

To Run Whatsapp on Pc, We will Require Android Emulator, Android Emulator Helps us to Run Whatsapp on PC. 


Step 1: Youwave And Bluestack Are the Two Android Emulator which enable us to Run Whatsapp or any other Android App on PC.


Step 2: If you Go for Bluestack then Download and install it, then run the Bluestack and Click                
on " Apps "
Then Click on the Tab " Social " and select " Whatsapp " and Install it.




Step 3: If you Go for Youwave which I am Using On My PC then just download  and install.
Now download Whatsapp.apk and move the downloaded file to PC directory.

To Check PC's Directory, Open Youwave click on help > Instruction. Now move your 

whatsapp.apk file in to that directory . Then Click on View then Redraw Icons. 

Now You will see Whatsapp icon .
After Installing Whatsapp on Youwave or Bluestack you have to enter Mobile number which is not used earlier For Whatsapp account.  Then they will take 5 Minutes to verify and will send you Code.
Enter that code and thats all.

dand]ce of ................


Bhojpuri Video Song


The Sony Wrist Computer Concept for the Year 2020

Considering the rate at which technology is developing by leaps and bounds, the proposition of having a mini computer strapped to your wrist does not seem to be a distant probability.  However, there is one concept design of a wrist band converting into a PC which has completely caught the imagination of the avid gadget aficionado- the Sony Nextep Computer that has been designed by Hiromi Kiriki.  Although, this fabulous design is in its concept stage, nevertheless its entire form, idea and features have made it one of the most awaited gadgets to come out nearly seven years from now!

This concept of a wrist computer would be having an OLED touch screen which would be extremely flexible and that would be accompanied with a holographic projector that would do away with the screen and make it very high-tech.  You can pull out additional keyboard panels from the device and the features would also connect you to your preferred social networking sites.

This wearable PC might sound a little geeky, but that is the way things have always been imagined.  Think of how we might have sounded back in the days before laptops and mobile phones existed!   We have now come to an age which is predominantly dependent and run by technology and communication.  Hence, our need for internet connectivity is at all times and this is the reason why technology needs to evolve further and provide us more profound devices that enable us to remain ‘connected’ at every step of the way- this is why Nextep Computers would bring about a new revolution in technology.

The design is super cool as it looks like a bracelet and is worn like one too.  This potential computer by Sony raises a lot of hopes as its design is very capable of supporting various apps along with other user friendly features like the holographic screen and the retractable keyboard- which combines both the qualities of a high-end PC as well as a mobile phone.  The bracelet device can be converted into a tablet with three display units and two additional keyboard panels, however, it is not ascertained whether it would also double up as a mobile device, although there is a high probability that it might.
This should be the next big thing in technology that is being brought about by the electronics giant Sony which has risen hopes of the Sony Nextep as being the next big thing in the technology market!

Saari Raat Teri Yaad Mujhe Aati Rahi - Footpath

akash song video

 

                                                        

akashpilu@gmail.com

akashnet@usa.com
akashnet@zmail.com
......................................................... 




        

10 Internet Security Tips for Complete Protection


10 Tips for Online SecurityWith the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, the security has become a questionable factor for the most Internet users.
However, it is still possible to effectively combat insecurity on the Internet provided that, the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91 percent of the Internet users are unaware of the online scams and are therefore worried about their security. If you are one among those 91 percent, then this post is just for you!

10 Tips for Internet Security:

Here is a list of 10 simple Internet security tips to maximize your online protection:
  1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep spyware away from your computer.
  2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on those untrusted links and banners.
  3. Perform a virus scan on the files/email attachments that you download before executing them.
  4. Regularly update your operating system and browser software. For a better security, it is recommended that you surf the Internet through the latest version of your browser program.
  5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
  6. Always type the URL of the website in your browser’s address bar to enter the login pages.
  7. Before you enter your password on any login page, ensure that you see https instead of http in your browser’s address bar. Example. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
  8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer How to Identify and Avoid Phishing Scam. Also refer my other post on How to Protect an Email Account.
  9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also, clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
  10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also, avoid such computers to log in to your email/bank accounts. On a public computer, there is every chance of spyware and malware infections to be present.
By following the above 10 tips, your Internet security can be guaranteed up to 90 percent. I hope this information will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

Beware of Common Internet Scams and Frauds

INTERNET SECURITY

Beware of Common Internet Scams and FraudsThe term Internet Scam or Internet Fraud refers to any type of fraud scheme that uses one or more online services to conduct fraudulent activities. Internet frauds can be conducted using online programs such as chat rooms, e-mails, message boards or Web sites. In this post, I will discuss about some of the commonly conducted scams and frauds across the Internet.

1. Phishing Scam:

This is one of the most commonly used scam to steal bank logins and other types of passwords on the Internet. Phishing is fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging.
Example: You may receive an email which claims to have come from your bank/financial institution/online service provider that asks you to click a link and update your account information. When you click on such a link, it may take you to a fake page which exactly resembles the original one. Here, you’ll be asked to enter your personal details such as username and password. Once you enter your personal details on this page, they will be stolen away.
Such an email is more than likely to be the type of Internet scam known as “phishing”. Phishing is said to be highly effective and has proved to have more success rate. This is because, most Internet users are unaware of this type of attack and hence fail to identify the scam.
Most legitimate companies never request for any kind of personal/sensitive information via email. So, it is highly recommended that you DO NOT respond to such fraudulent emails. For more information on phishing visit my detailed post on How to identify and avoid phishing scams?

2. Nigerian Scams:

This type of scam involves sending emails (spam) to people in bulk seeking their help to access a large amount of money that is held up in a foreign bank account. This email claims that, in return for the help you’ll be rewarded a percentage of the fund that involves in the transaction. Never respond to these emails as it’s none other than a scam.
In case if you respond to these emails you will be asked to deposit a small amount of money (say 1-2% of the whole fund) as an insurance or as an advance payment for the initialization of the deal. However, once you deposit the amount to the scammer’s account you’ll not get any further response from them and you lose your money. In fact, “The large amount of money” never exists and the whole story is a trap for innocent people who are likely to become victims. The scammers use a variety of stories to explain why they need your help to access the funds. The following are some of the examples of them:
Examples:
  • They may claim that political climate or legal issues preclude them from accessing funds in a foreign bank account.
  • They may claim that the person is a minor and hence needs your help to access the funds.
  • They may claim that your last name is the same as that of the deceased person who owned the account and suggest that you act as the next of Kin of this person in order to gain access to the funds.

3. Lottery Scams:

This type of scam is similar to the one discussed above. In this type, you may receive an email saying that you have won a large sum of money in an online lottery scheme (ex. UK Lottery) even though you have not participated in any such schemes. The message claims that your email ID was selected randomly from a lagre pool of IDs.
When you respond to such emails they initially ask for your complete name and address so that they can mail the cheque accross to you. After getting those details they may also send you an image of the cheque drawn in your name and address so as to confirm the deal. But in order to mail this cheque they demand a small amount of money as insurance/shipping charge/tax in return.
However, if you send the money in a hope to receive the cheque, all you get is nothing. You’re just trapped in a wonderful scam scheme. That’s it.

4. Other General Scams and Frauds:

The following are some of the other types of scams that you should be aware of:
In general, be aware of unsolicited emails that:
  1. Promise you money, jobs or prizes.
  2. Ask you to provide sensitive personal information.
  3. Ask you to follow a link to a website and log on to an account.
  4. Propose lucrative business deals.
It may seem to be a difficult task for the novice Internet user to identify such online scams. So, here are some of the common signs of such scam emails. By knowing them it may help you to stay away:
  • All these scam emails never address you by your name. In turn they commonly address you something like “Dear User” or “Dear Customer” etc. This is a clear indication that the email is a fraudulent one.
  • When you observe the email header you may notice in the “TO:” Field that, the same email is forwarded to a large group of people or the “TO:” field appears blank. So, this confirms that the email was not intended particularly for you. It was forwarded for a large group of people and you are one among them.
I hope this post helps. Express your opinion through comments.

How to Test the Working of Your Antivirus: EICAR Test


Test the Working of Your AntivirusHave you ever wondered how to test your antivirus software so as to ensure that it is working properly? Well, here is a quick and easy way to safely test your antivirus without having to deal with the real virus. The process is called EICAR test. This test is designed to work on any antivirus software and was developed by European Institute of Computer Antivirus Research.
This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer.

How to Test Your Antivirus?

Here is a step-by-step procedure to test your antivirus functionality:
  1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
    EICAR Test code
    X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  2. Rename the file from “New Text Document.TXT” to “virus-sample.com”.
  3. Now run the antivirus scan on this “virus-sample.com” file.
If the antivirus is working properly on your computer, then it should generate a warning message and immediately delete the file upon scanning. Otherwise, you may have to re-install your antivirus.
NOTE: Most antivirus (with auto-detect feature) will pop-out a warning message in the Step-1 itself.
You can also place the “virus-sample.com” file in a ZIP or RAR file and run a scan on it so as to ensure that your antivirus can detect the test string even in the compressed archive. Any antivirus while scanning this file should respond exactly as it will do for a genuine virus/malicious code.
This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence, it is the safest method to test the proper functioning of any antivirus software.

How EICAR Antivirus Test Works?

During the development of the antivirus software, the AV programmers flag the EICAR test code/string as a verified virus. This is a standard adopted by every antivirus company so as to make the testing process simple and risk-free. Therefore, every antivirus will respond to EICAR string in the same way it does for a genuine malicious code.

ayegi wo ayegi .............

Top 25 People Who Changed the Internet Forever ---


1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape</div>

AK@SH NETWORK



internet service :

will start   AFTER  2 

 




OLD FLAM ........... OLD JUT GOLD

AKASH ......

song is 90 but nearly 2000 mix ..............

music video -------------------


google serch . akashpilu ............

                                   
Google  song 

who search Ur Facebook account

its very to simply track . who search Ur Facebook account
 ............................
normal  coding and find who serch ur facebook account

toggleTargetClosed="rfloat"><h3 class="accessible_elem">Privacy Shortcuts</h3><a class="_d1r uiHeaderActions" href="#" role="button"><i class="sp_6g6kqu sx_d4fbdb"><u>Search</uef="#" role="button" id="u_0_6"><i class="default sp_6g6kqu><div class="clearfix"><div class="lfloa