Sunday 8 May 2016

How to Search for Opponents Faster

Hello guys, In this small post, I am going to show you how to search for opponents much faster, which helps me saving a lot of time while farming!
How to Search for Opponents Faster
I know that a lot of players have known this trick and have been using it for years but I really want to share it with others and I hope it’s not too late!
Normally while farming, we keep pressing the Next button and the screen “Searching for Opponents” keeps showing up. Normally it takes from 3 to 5 seconds to show a target. Let’s assume that you need to “next” 20 times before raiding, which is approximately 80 seconds. How many time do you spend everyday to see these pointless clouds? This is also a big waste of Gem when you are boosting your Barracks.
I have a trick which helps you search for opponents much faster and most of the time they will show up immediately! Let’s take a look at this small gif I made today:
Video Player
Yes, you got it!
While searching for opponents, just wait until the timer is at 28s-26s and press Next, the new opponent will show up much faster and you can make a lot of more loot, especially when you are farming with boosted Barracks.
Although this is just a small tip but I hope you have found it helpful guys! Thanks for reading, you rock!

TH8 Base – The Mighty – Excellent Anti 3 Star Clan War Base

Hello guys, Today I’d love to show you a brand new TH8 Base which was designed by CoC Black Hat. It’s such a long time since the last TH8 War Base I posted a few months ago. I hope you guys will like this base!
TH8 Base Clash of Clans
Before going in detail, I want to give you some features of this Town Hall 8 Base:
  • Anti-Dragon; Anti-DragLoon.
  • Anti-GoWiPe; Anti-GoVaPe;
  • Anti-Hogs
Pros and Cons
ProsCons
Unlurable Clan CastleEasy to 2 Star
Well placed Traps
Well placed Air Defenses and Teslas
Centralized King
Since this is an anti-3 star base, I don’t recommend using it If you are not it a hardcore War Clan!

How this TH8 Base Works

Anti-Dragon and Anti-Dragloon
Since the update with 1 Spell slot in Clan Castle, most Town Hall 8 players have been using myZapQuake strategy (using 2 Lightning Spells + 1 Earthquake Spell to destroy Air Defenses). The remaining troops will be either Dragons or Dragons + Balloons coming with Rage Spell. I am going to show you how this base works against this strategy. I very like this feature since most Town Hall 8 players using ZapQuake strategy in Clan Wars now.
  • All Air Defenses are protected by high HP buildings (Storages and Town Hall).
  • Well placed Air Defenses.
  • Well placed Air Bombs and Seeking Air Mines.
But the point is where attacker stars raiding, right? Most experienced attackers would start raiding from either left/right or behind of the Air Sweeper. The best choice for attackers is to ZapQuake the rightmost Air Defnese then start the raid from the top-left side of this TH8 Base, where 2 Seeking Air Mines are strategically placed to immediately weaken 2 Dragons. 2 Gold Storages and 1 Dark Elixir Storage which are protecting ADs inside give them a lot of time to deal with Dragons.
Air Bombs and Skeleton Traps are utilized to deal with Balloons. Attackers have to send their Balloons through this arena If they want to get the ADs.
Anti-Hogs and Anti-GoHo
Hogs and GoHo are definitely the most overpowered attack strategies at Town Hall 8 and here are 2 main features of this base which help you effectively defend against them:
  • Extremely hard to trigger Double Giant Bomb.
  • Well placed Spring Traps.
th8-base-clash-of-clans-4
Additionally, the Barbarian King is placed in the core as he effectively covers the Double Giant Bomb location. If somehow Hog Riders can trigger only 1 Giant Bomb, Barbarian King still can 1 hit Hog.
Anti-GoWiPe
Last but not least, GoWiPe is still one of the most popular strategies at Town Hall 8. Here are some features of this base which help it successfully defends against GoWiPe attacks:
  • This base has a lot of compartments with different sizes.
  • Well placed single point defenses which help you deal with GoWiPe easier.
  • Teslas are separated into different compartments.
  • Teslas are placed by high HP buildings.

Defense Logs

This is one of my favorite part when showing Clash of Clans layouts, it’s showing Defense Logs!
Below are some recent defense logs of this TH8 Base! Let’s take a look!
Ok guys thank you very much for reading this! I hope you like this Town Hall 8 Base! Don’t hesitate to comment If you need any help. Also, please share your defense logs and help me improve this base!

How to Hack an Ethernet ADSL Router

Hack adsl ethernet router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet. However, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer. In this post, I will show you how to hack an Ethernet ADSL router by exploiting the common vulnerability that lies in it.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later.
This makes it possible for the attackers to gain unauthorized access to the router and modify its settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process:
http://sh.st/OLHHh

Hacking the ADSL Router:

Here is a detailed information on how to exploit the vulnerability of an ADSL router:
  1. Go to whatismyipaddress.com. Once the page is loaded, you will find your IP address. Note it down.
  2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
  3. Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists at least 200-300 IP addresses in the range.
  4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
    1. [alert-alert]I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools[/alert-alert]
    2. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image:Angry IP Scanner
      1. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the defaultusername-password pair will be admin-admin or admin-password.
      Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below:Router Settings Page Hacked!
    3. If you do not succeed to gain access, select another IP from the list and repeat the step-5. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

      What can a Hacker do by Gaining Access to the Router Settings?

      By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or even hijack the DNS by pointing it at a rouge DNS server. If this happens, the victim will have to reconfigure/reset the router settings in order to bring it back to normal.

      The Verdict:

      If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
      Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.
      All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

How to Create a Virus to Block Websites

Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.
As usual I am using my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.
I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:http://sh.st/OLG3V

How Virus Program Works?

The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:
%windir%\system32\drivers\etc (Usually: C:\windows\system32\drivers\etc)
So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.
For more information on HOSTS file, I recommend reading my other post on How to use HOSTS file to block websites.
Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:
Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.
Navigate to: %windir% -> system32 -> drivers -> etc
Open/Load the HOSTS file.
Copy a list of those websites that are mentioned in the ARRAY to the END of the file.
Save the file and Exit.

How to Compile the Source Code?

For a step-by-step compilation guide, refer my post: How to compile C Programs?

Testing the Virus:

  1. To test, run the compiled module. It will block the sites that are listed in the source code.
  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
  3. To remove the virus type the following command in the Run.
    %windir%\system32\drivers\etc
  4. There, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:
    127.0.0.1 google.com
  5. Delete all such entries which contain the names of blocked sites.

How to Trace Mobile Numbers Back to the Caller

Trace mobile number back to caller

With the rapid growth of mobile phone usage in recent years, it is often observed that it has also become a part of many illegal and criminal activities. So, in most cases tracing the mobile number becomes a vital part of the investigation process. Also, sometimes we just want to trace a mobile numberback to the caller for reasons like annoying prank calls, blackmails, unknown number in a missed call list and so on.

How to Trace Any Mobile Number?

Well, there are several ways to do this. The easiest way to gain access to the details of any mobile number is by using a reliable paid service that has records of over millions of mobile and landline users in its database. If you’re really serious to find out the name and address of the person behind the mobile number, then this is the right choice. You can use the following service to get the details of any phone number (mobile and landline):
http://sh.st/OLGOK

Other Possible Ways to Trace a Mobile Number:

Now let us look at some of the free options that are available. Even though it is not possible to trace the number back to the caller using the free services, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller.
All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link fromNumbering Plans. With this, you can trace any number in the world.
UPDATE: After the introduction of Mobile Number Portability (MNP) in India, methods discussed above are not found to be very much accurate.
By using the above free services, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you “who” the caller is. Unfortunately in India, there is no such paid service that gives you more accurate details about the caller. So, if you are in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of the police. I hope this information has helped you!

How to Download YouTube Videos: Easy Way

Download youtube video

YouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me would like to download them so that they can be saved and retained. Well, if you are one among those few who would like to download the videos from YouTube, then here is a way to do that.
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to share with you one of the easiest way to do that. This can be done as follows:
  1. Download and install the latest version of Internet Download Manager.
    Internet Download Manager is a great add-on for your web browser which increases the download speed by 5 times. It also helps you to pause/resume and schedule your downloads. It has got a great interface and is user friendly. It works with most of the browsers including IE, Firefox, Chrome, Safari and Opera.
  2. After you complete the installation, just open your browser and start searching for your favorite YouTube video. You will see the download buttonon top of the video using which you can download it instantly.
  3. Download YouTube Videos
Download YouTube Videos
  1. Click on the “Download this Video” button to download the video onto your computer. The downloaded video will be in the flash video format (.flv).
  2. You can use VLC Player to play the downloaded video or use SUPER to convert it to your desired format.
By using this trick, along with the YouTube videos, you can even download almost any buffering content on the Internet including videos from MySpace and Google. I hope you like this small post. Don’t forget to pass your comments. Enjoy :)

How to hack Yahoo messanger



Yahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to its users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacksusing which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-Busing the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click on Messenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settings as shown below. From there, click on the link which says: “Manage your Yahoo! aliases”. Create Aliases in Yahoo
    1. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
    2. You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
      Yahoo Chat with Multiple Names
    3. To chat with multiple names with a single person, just follow the steps below:
      • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
      • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!
    4. Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
    5. Double-click on the name of the person in the chat room or contact list.
    Before you try this hack, make sure that you have not set any display image for your profile. If not, there are chances of other person identifying your prank.
    To disable the display image, just click on Messenger -> My Display Image from the top menu of your YM window and set the option to “Don’t share a display image”.
    I hope you like this hack. Now let us move forward to our next hack that is even more exciting!

Spy on text messages complete guide

 
     


Using a SIM Card Reader to Recover Text Messages

If you can’t really afford a spying app, you can buy a cheap SIM card reader from the market and use the target person’s SIM to recover text messages, phone contacts and email addresses stored on it. This can be done using the following steps:
  1. Switch Off the target phone and remove the SIM card from it.
  2. Insert the SIM card into the SIM card reader and plug-in the SIM card reader to the USB port on your personal computer.
  3. If your SIM card comes with a software CD/DVD, install it on your computer. This will help you recover any of the stored text messages from the SIM and store it on your PC for later review.
It is needless to mention that this method has clear drawbacks as there are chances of text messages from being deleted from the SIM before you get access to it. Also this method can only recover SMS (stored on SIM) and not other text messages from messaging apps like as WhatsApp, Viber, Snapchat etc.
Therefore to overcome this drawback I still recommend the usage of spying app like mSpy to spy on text messages.