Wednesday 3 October 2012

How to Edit Text Style in FaceBook Chat


Hey guyz, this time Learn Hacking has brought some Facebook Hacks for you.

In this post I will teach you how to do the following in FaceBook Chat : make text Bold , Italics Underline.

The code to do all this is given below.

For making the text Bold
  • type your words between * *(two stars ) will automatically turns into bold.
  • Example : You write
    Learn to *hack*
    will turns to
    Learn to hack

For underlined Text

  • type between _ _(two underscores) will automatically turns into underlined text
  • Example:
Hacking Talent _rocks_ .
Turns to
Hacking Talent rocks.

For writing Bold+Underline

  • Whatever you type between *_ _* will automatically turns into Bold+Underline
  • Example:
You *_love_* hacking?
Turns to

You 
love hacking?

If so then make sure you subscribe to Hacking Talent and get regular updates on your email id..:)

Benefits of using BCC while sending Email


 Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!


What is BCC?


BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in theTo: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, theBCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:,  the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?


Here are the reasons for using BCC:
Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends.  If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.
Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients.  As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses.  This makes it easy for the spammers to collect and target those emails for spamming.
In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC:while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers. You may also refer How to Protect an Email Account from SPAM for more information on spamming.

How to BCC an email message?


Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To:field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.
The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.

Top 5 Anonymous Tools


Tor Browser

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. And the good thing about tor browser is that you don’t want to install it in your machine.



HOT SPOT SHIED

The Internet connection protector Hotspot Shield encrypts your traffic to protect you from all kinds of spying while your computer communicates with the rest of the world. It's a must-have utility for anybody who uses public Wi-Fi networks, but it's also an excellent tool for ensuring on any network connection that you can access sites and data according to your tastes, and nobody else's. Hotspot Shield's Virtual Private Network services are used by more than 10 million people at the time this review was written, according to the software publisher AnchorFree, making it the largest VPN in the world.


JONDO – THE IP CHANGER


JonDo, formerly JAP, is the ip changer proxy tool you have to install on your computer. It acts as a proxy and will forward the traffic of your internet applications multible encrypted to the mix cascades and so it will hide your ip address.JonDo will provide an anonymisation proxy for you, but it does NOT change your system setting. You have to configure the proxy setting of each internet application you want to use anonymous with JonDonym by self.




ULTRASURF

UltraSurf is a very useful application when you are browsing the web. Basically it doesn't allow the Internet browser to save information such as cookies or the history of visited sites. To be able to run UltraSurf you just need to download it and then start the program.

The reason for this is that it doesn't require an installation process. When launching the program a Internet Explorer window will appear to confirm that the proxy server has been enabled. Despite having a very small size, this is a very efficient application.

It allows you to have complete freedom on the web and to access all the available information. The program is extremely useful especially in countries with heavy Internet censorship and also in places such as universities or companies where normally you can't access social sites like Facebook, Youtube, Myspace, Hi5 etc.


HIDE MY IP


Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, and playing games. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other Internet application to use a proxy server from our private network. Change your IP address automatically every few minutes and cloak your browser's User Agent and Referrer headers. Select from hundreds of our private network IPs or public proxies from all over the world.


How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. 
Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
That's why Anchor Free is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.



100% Security Through a VPN


Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use.

Hotspot Shield runs on:
  • Windows 7
  • Windows XP
  • Windows 2000
  • Windows Vista
  • Mac OS X (10.5 Leopard)
  • Mac OS X (10.6 Snow Leopard)
  • Mac OS X (10.7 Lion)

You will be able to download this software on given link DOWNLOAD NOW


NOTE: - This tutorial is only for learning purpose and i am not responsible for any type of harm.