Blog Hijau

BLACK CAT HACKS ORGANIZATION

BLACK CAT ORGANIZATION was built in 2006,with 2 hackers and now we have more than 2000 Hackers and Crackers.

WE ARE ANNONYMOUS

BLACK CAT HACKS ORGANIZATION is annonymous for all over the world.We are annonymous..

WE ARE HACKERS AND CRACKERS

In our Organization,many hackers are work for us.We also have lot of Crackers who crack sites,softwares and much more...

MISSION

We are PAKISTANIES and work against enimies of Pakistan.

RANKS

COMMAND > Diamond Lion > Gold Lion > Silver Lion > 8* > 7* > 6* > 5* > 4* > 3* > 2* > 1* > 3 Dot > 2 Dot > 1 Dot > Begginer

Tuesday, 25 February 2014

Build Your Own Games, Become A Programmer

game programming

Video games are a blast to play!  Wouldn�t it be great to have a part in creating them?  But where do you start?  For a gamer, being able to take part in creating games would be like a dream come true. Let�s look at a few facts about the gaming industry.  In 2012, the gaming industry accounted for $20.77 billion in revenue including hardware, software and accessories.  Most of these companies were based in the United States.  More detailed information can be found here.

So, we have an enormously large industry and most of it is located right here in the United States.  There is no reason why a person with the desire and discipline cannot make their dream job a reality!

The following are some steps to help get you out on the path to your future in gaming.  The best part is that most of these options are free.  But do require some discipline and effort... and practice, practice, practice!

Be informed, educate yourself

educate yourself
There are some major sources of information online regarding the gaming industry.  Become involved with these websites. join in on discussions in the forums and even try to contact individuals from the forums that seem willing to be helpful to newcomers.  These sources can be invaluable in learning what trainings and skills are a must for someone to become a professional.  A few industry online publications are Gameslice and Gamasutra.

Determine what skills and knowledge you now possess

GATHER INFORMATION
Begin gathering information about the types of games you wish to program.  Having a firm grasp on the games you like to play and programming languages that were used to make those games will begin to steer you in the direction you need to go.  Programming, also known as coding, can be difficult in the beginning.  Luckily there are many web sites on the internet that offer free learning tutorials for beginners in any language you can imagine.  It is recommended to start with some of these free tutorials just to get your feet wet and get you used to the vocabulary of the industry. Check out below article to learn programming.

Get to know commercially available game engines

game engines
Most games have a game engine.  The game engine is kind of like the foundation that the code works with to create the desired effect within the game.  Most of these are available freely either with a game or can be downloaded.  You may have heard of some of them:  Unreal, Crysis, Source, FrostBite and Creation are just a few of the larger ones.  Discover which game engine your favorite games run on and play with the engine yourself.

Take a Coding Class

This is where it all begins to get real.  You need some official coding classes.  As a starter, consider a course in DarkBasic.  DarkBasic is one of the most recommended beginner languages.  At this point you should also consider taking a course in Microsoft Visual Basic.  A good knowledge of Visual Basic will provide you with the understanding of how code works with Windows operating systems.  There are numerous schools whose sole focus is coding.  Research the ones who are interested in and to go back to the forums, or individuals you met there and ask their opinions.  Then make your decision and register for the classes.

Develop a problem-solving attitude

problem solving
It cannot be stated more strongly how important a problem-solving attitude can be in game development.  You really have to love solving problems.  The larger part of coding is developing the code itself.  The second largest part of coding is solving all of the problems with the initial code that you developed.  You will be spending a large portion of your time resolving problems in your code...  So having a problem-solving attitude is crucial to your future career.

About Guest Blogger
Robert Cordray is a freelance writer and expert in business and technology. He has received many accolades for his work in teaching solid entrepreneur advice.

Thursday, 20 February 2014

Throwing fireballs with the Kinect and Oculus Rift in Unity 3D

I decided I wanted to make a small game where you were a viking and you threw fireballs at enemy vikings on Unity 3D. The catch is, I wanted to actually throw the fireballs, so I wanted to use the Kinect, and I wanted to actually see if I was the character, so I wanted to use the Oculus Rift.

Here is a quick video of the results before we get on to the discussion:



Basically this started because a colleague at Georgia Tech, Alex Trevor (soon to be Dr,), had an Oculus Rift and mounted a camera on top of it to see the Kinect output with the Oculus Rift. I thought that was really cool and had previously worked on a game that used the Kinect Skeleton to throw fireballs (though I lost all the source code for the first version). I really wanted to combine those ideas and had to start over.

Luckily, Dr. Brian Peasley (now at Microsoft) came to my rescue as always and gifted me an Oculus Rift. 


To explain a bit, the Oculus Rift is an immersive virtual reality headset. The two images are displayed on the screen above because one is projected to the left eye and one to the right eye. As you rotate your head, the images change and it feels like you are looking at a real environment (it is pretty amazing). This is why there are two images in the video (and pretty much all Oculus Rift demos). To appreciate it fully, I recommend wearing an Oculus Rift while watching the video.



The Kinect everyone should know by now. It can yield a really good skeletal estimation of a person's joints from the depth data, which can then be used to represent gestures.

I had some time this week so I grabbed the Unity third person MMO example, added the Kinect scripts provided by CMU here, created my own fireball and fireball related prefabs and scripts, added the Oculus package, changed all the camera stuff to make it first person, and tweaked a lot of stuff. Daniel Castro (also at Georgia Tech) was nice enough to help me film me making a fool of myself.
It was obviously a bit more complicated than that. Lots of tinkering and scripting was involved to get things working but that is the output. Here at RIM, we are working on lots of other cool things and if you are interested, check out some of my other projects.

I've uploaded the source for public use and you can find it here (just make sure to please cite me):

The fireball script just takes two Game objects (the Viking's left hand normalized by your hip) and uses a velocity measurement to determine if you want to throw the fireball, then it creates a fireball and set's its velocity to your hand's velocity whenever you throw. This can be done easily with a small amount of code as below:
void Update () {
Vector3 norm_hand = HandPosition.transform.position - HipPosition.transform.position;
Vector3 velocity = (norm_hand - lastPos) / Time.deltaTime;
float dist = velocity.magnitude;
if (Input.GetButtonDown("Fire1") || (dist > THRESH && dist < MAX_THRESH)) {
                        Rigidbody clone;
Vector3 pos = HandPosition.transform.position;
pos.z += 1;
                        clone = (Rigidbody)Instantiate(Projectile, pos, transform.rotation);
clone.velocity = velocity * SPEED;
                }
lastPos = norm_hand;
}

And that's it for the fireball. Then there are some scripts destroying the fireball and vikings when they collide.
For the mapping of the joints to the main Viking, each joint position of the Viking is mapped to the corresponding Kinect Skeleton joints with GameObjects in the KinectControllerScript.
Then the Oculus SDK is used to create the camera and player control mapped to the main viking.
For all the code, see the Github project

I'm using a friend's version of Unity Pro because I'm a poor graduate student. So please donate if you liked this work so I can continue doing it. All of these gadgets are expensive and I do all this and post it for free.

So please consider donating to further my tinkering!!



Places you can find me

Wednesday, 19 February 2014

Downloading Torrent Using Internet Download Manager

Downloading Torrent Using Internet Download Manager
Hello friends, today i will show you the way to download torrents with Internet Download Manager. Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website.  The transfer speed for torrents depends on seeds it has. It will make difficult for you to download files with very low or no seed counts. However with the assistance of this trick you'll be able to download torrent file with IDM. This tool can be really helpfull when you want to download file that has very low seeds. IDM is the quickest file transfer manager on the internet market. So lets begin!

How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB 

More Awesome Tutorial

About Guest Blogger
Vikrant Thakur is a computer science student from Himachal Pradesh in India. He loves to share his knowledge of computer and web technology with other. Connect with him on Facebook

Friday, 14 February 2014

Fraudsters Shall Not Pass - Simple Advices On How To Avoid Scammers In Social Networks

Advices On  Avoiding Scammers In Social Networks

Social networks are always great for communicative people; they make you closer to your friends, relatives and hackers. Social networks are very attractive for such kind of people. You can ask me: �Why do they need that?� All they need is your account. The fraud schemes may be different. But the main aim of them is money. They can ask your relatives for help, especially when you�re far away. Why shouldn�t they believe their own child, when he needs money?

Fraudsters do not disdain playing on the heartstrings. They can write everything, that there�s an accident, you�re in a hospital, etc. So today we�ll study to confront fraudsters and keep our nerves and money safe.

Consequences

social media hacking scams
The most people don�t think about possible risks when creating their profile on social networks. The more personal and professional information you give, the easier it is for fraudsters to rob you. Let us discuss the easiest scheme. Some criminals are simply searching for people living in the same city to plunder their houses. Why does it happen? Different people are writing perfect information, like �We�re going to visit California next weekends. Hoping it�ll be great� Of course it will be great. For the robber, because now he knows that the house will be empty during weekends and it�s the perfect opportunity for him.

The second thing is the photos. When you�re downloading images and photos on social networks not only your friends like them. It�s also the perfect resource for burglars. From home-made photos, they can receive information about your welfare and house structure. When you have a dog, the robber will be prepared, because everyone has photos with their home pets. That�s why we earnestly advise you not to put in the Internet photos of your house, and some things that can attract robbers, for instance your new car or a brilliant ring.

Advice

The next our advice � create a complicated password. We�ve just discussed what fraudsters can do with the access to your account, so try to protect yourself, your friends, and relatives as good as you can. Don�t make a password consisting of just your birth date. Remember, that it�s the first combination fraudsters try. Also, don�t put your birth date as the answer to the test question if it�s mail. Check out below article on password cracking.
Let us imagine that you have a complicated password, you don�t download the �rob-attractive� photos and one day you receive the link from your friend where he asks you to vote for him. Stop now. This can be a trap. If you�ll link, the fraudsters receive your personal data, such as login and password. Such scheme is called �fishing�. So, in this case, ask your friend something personal. The other variant is just to make him a call and ask about this. If you�ll receive the answer like �What are you talking about?� you should explain him that he was hacked and offer to change the password. Check out below tutorial to know about popular hacking method used to acquire sensitive information about oneself.
Phones are really helpful things. Explain to your friends and relatives that you can be hacked and if they receive messages with money requests, they must call you at first and ask about that. Remember that your security is in your hands and be careful.

Melisa Marzett is the professional blog-writer. Her works are presented at Essay Review. She�s interested in computers and different computer software. If you want to ask Melisa about something, write at

Thursday, 6 February 2014

Controlling music with your mind

Last year I bought an EEG headset (the Mindwave Mobile) to play with my Raspberry Pi and then ended up putting it down for a while. Luckily, this semester I started doing some more machine learning and decided to try it back out. I thought it might be possible to have it recognize when you dislike music and then switch the song on Pandora for you. This would be great for when you are working on something or moving around away from your computer.

So using the EEG headset, a Raspberry Pi, and a bluetooth module, I set to work on recording some data. I listened to a couple songs I liked and then a couple songs I didn't like with labeled data. The Mindwave gives you the delta, theta, high alpha, low alpha, high beta, low beta, high gamma, and mid gamma brainwaves. It also approximates your attention level and meditation level using the FFT (Fast Fourier Transform) and gives you a skin contact signal level (with 0 being the best and 200 being the worst).

Since I know very little about brainwaves, I can't make an educated decision on what changes to look at to detect this; that's where machine learning comes in. I can use Bayesian Estimation to construct two multivariate Gaussian models, one that represents good music and one that represents bad music.



----TECHNICAL DETAILS BELOW----
We construct the model using the parameters below (where ? is the mean of the data and ? is the standard deviation of the data):










Now that we have the model above for both good music and bad music, we can use a decision boundary to detect what kind of music you are listening to at each data point.





where:






The boundary will be some sort of quadratic (hyper ellipsoid, hyper parabola, etc) and it might look something like below (though ours is a 10 dimensional function):
 

----END TECHNICAL DETAILS----

The result is an algorithm that is accurate about 70% of the time, which isn't reliable enough. However, since we have temporal data, we can utilize that information, and we wait until we get 4 bad music estimations in a row, then we skip the song.

I've created a short video (don't worry, I skip around so you don't have to watch me listen to music forever) as a proof of concept. Then end result is a way to control what song is playing with only your brainwaves.


This is an extremely experimental system and only works because there are only two classes to choose and it is not even close to good accuracy. I just thought it was cool. I'm curious to see if training using my brainwaves will work for other people as well but I haven't tested it yet. There is a lot still to refine but it's cool to have a proof of concept. You can't buy one of these off the shelf and expect it to change your life. It's uncomfortable and not as accurate as an expensive EEG but it is fun to play with. Now I need to attach one to Google Glass.

NOTE: This was done as a toybox example as fun. You probably aren't going to see EEG controlled headphones in the next couple years. Eventually maybe, but not due to work like this.

How to get it working


HERE IS THE SOURCE CODE

I use pianobar to stream Pandora and have a modified version of the control-pianobar.sh control scripts I have put in the github repository below.
I have put the code on Github here but first you need to make sure you have python >= 3.0, bluez, pybluez, and pianobar installed to use it. You will also need to change the home directory information, copy the control-pianobar.sh script to /usr/bin, change the MAC address (mindwaveMobileAddress) in  mindwavemobile/MindwaveMobileRawReader.py to the MAC address of your mindwave mobile device (which I got the python code from here), and run sudo python setup.py install.

I start pianobar with control-pianobar.sh p then I start the EEG program with python control_music.py, it will tell you what it thinks the song is in real time and then will skip it if it detects 4 bad signals in a row. It will also tell you whether the headset is on well enough with a low signal warning.

Thanks to Dr. Aaron Bobick (whose pictures and equations I used), robintibor (whose python code I used), and Daniel Castro (who showed me his code for Bayesian Estimation in python since my implementation was in Matlab).


Consider donating to further my tinkering.


Places you can find me

Launching my first website AllBlogThings.com

Hello friends! as you all know I am a part time blogger but now I want to be a professional blogger with help of my first website, luckily I found a best domain name for my website my best friends suggested me the domain of ABT (All Blog Things),  I'm very exited to launch my first website on my official blog, Its a blogging niche website, you can easily get some awesome tips for blogging and like templates, tips & tricks, news, widgets etc, come and visit if once All Blog Things If you like it then share it with your friends....:)

Wednesday, 5 February 2014

Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't!

facebook hacking
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? Today, we'll take a look at this topic in detail with some example websites and software and get answers to some common related questions.

Back in 2005, I came across a mechanism that reportedly hacked Yahoo mail password for a user using some simple tricks. It didn't work for me for obvious reasons but I didn't stop believing the possibility until I grew up to realize how helpless I am here. One of the major concerns of large organizations like Facebook and Yahoo is security because of the super sensitive information about people they have. Several hundred million dollars are spend yearly by these organizations to ensure security and then there's these websites that claim to undo all that protection in less than a minute.

The Facebook password cracking Websites and Software

Let's start with some examples here. I googled the subject and picked the top results without order. Didn't care to search harder because there are thousands such and I know that all are FAKE.

So let's look at this GETFBHACK.com.
hacking facebook password
Their FREE Facebook hacker program is said to be capable of cracking the password of any Facebook user within a day. Sounds cool, I could try it out, but my Norton Antivirus rejected the file straight away.

I also picked up another one. This Hack-Fbook-Password asks me to enter the profile ID of a user and it will crack the password. I said Okay and began the process.
facebook hacking
It ran certain algorithms to determine the password and finally landed me on a page that said I could DOWNLOAD the password IF I fill an online survey first. Those of you who've been redirected to surveys would know they don't work and are put just so to get traffic and earn money.

I said maybe I should leave the website now but hey, they gave me a prize!
hacking facebook

So I just became the luckiest person in my city just like that!

Now tell me, how can a sane person believe in all this?

The truth!

Let me get this straight to you, these websites do nothing at all just waste your time and are never able to do the job. In fact, downloaded programs just make the situation worse when you run them. I had my Norton Antivirus to guard me otherwise I could be in severe danger currently.

These software are mostly keyloggers and tracking programs that record your keystrokes and action and steal personal information from your computer in the background and send it to their master servers. So ultimately a hacker wannabe gets hacked, how ironic!

From now on in the post, I'll be using the word 'Hacker' for these websites and software since you're no more in the position to be called that.

Why do these 'Hackers' do all that?

facebook hack
Setting up websites, maintaining them and developing software is not an easy task. It requires some money. So why do these 'hackers' do all the hassle? It's because they get equivalent or more money in return. They can extract your credit card details and other banking info from your system and use it for their advantage. They can hack your account and use it for wrong purposes. Give me one reason why one wouldn't steal money and hack accounts for no loss.

Why people fall in their webs?

facebook hack
Why do people try to use such unreal hacking procedures? It's because it's unreal to me, it's unreal to you but not to those who are not much familiar with the working of a software. They get in the web of these hackers and eventually get screwed up pretty bad without consent.

The websites give guarantees and also portray their 'imaginary' happy customers so as to trick a reader. Such tactics are simple but really powerful and serves to their advantage in most cases. This is also why there are thousands of such websites available.

So is Facebook account an 'unbreakable fortress'?

facebook hacking
Well, NO. Facebook accounts can be hacked. No online service is foolproof and that is because of the flaws and bugs in their software. There are several ACTUAL hackers in the world who can analyse a website's security and use that against it thus making hacking a reality.

But I'm 100% sure none of them uses these scam and fake websites that claim to do the impossible. You can check out our hacking section to know more.

I'll end the 'lesson' with an idiom, "look before you leap". Focus, think and then follow. In case of any queries or confusions head over to the comments section. Cheers :)

Monday, 3 February 2014

Opening Number Of Websites Using Python

Opening Number Of Websites Using Python
So you just started in python programming, and want to prank your arch nemesis. Here i will teach you how to open any website on his computer using python.

Before you begin download and install python from Here

Step 1:
open notepad and type

import webbrowser

In python the "import" statement is used to add a module to your project. In this case we want to add the webbrowser module.

Step 2:

webbrowser.open('http://SITE HERE!.com')

This is calling the open function on your default web browser. You pass it an url in the form of a string.

Possible usages:
You can add as many websites as you want like show below

webbrowser.open('http://coolhackingtrick.com')
webbrowser.open('http://google.com')
url = "http://coolhackingtrick.com";
webbrowser.open(url)

The complete code will look something like below
import webbrowser
webbrowser.open('http://coolhackingtrick.com')
webbrowser.open('http://google.com')
webbrowser.open('http://yahoo.com')
webbrowser.open('http://facebook.com')

Step 3

Save the file as visus.py
Enjoy pranking your friends and if you wish to learn more programming then check out our article below.


About Guest Blogger
Cordell Wildermuth is a young blogger. He loves Blogging on high quality secutiy and hacking tutorial. He is currently running his security blog infosmuggler