HOW TO: Get Notified When Someone Hacks Your Facebook

Facebook just announced a tool that notifies you by e-mail or SMS text message when someone logs into your Facebook profile from an unknown computer.
The idea is to help you recognize when a hacker has broken into your account so you can respond quickly by either changing your password (if that’s still possible) or contacting Facebook.
Once you enable the notifications, you’ll be required to identify each computer you use to log in when you first use it and choose whether or not it’s a private or public machine. You’ll be able to see a history of registrations from machines potentially used by hackers, and of course those hackers will be forced to type something into the identification field to get in, so you should be able to tell whether it was just a login that you forgot or not.
Here’s a quick guide to turning this feature on and using it.

Step 1: Go to Account Settings and Enable Notifications

When you’re logged into Facebook, you’ll see the word “Account” in the top right corner of the browser window. Click there to get a drop-down menu of options, then click on “Account Settings,” as pictured below.
You’ll end up looking at a page that lists ways you can customize your account, including “Name,” “Password,” “Linked Accounts” and “more.” As long as you don’t navigate away from the “Settings” tab, you’ll see “Account Security” close to the bottom of the list. Click “change” on the right to show the following option:
Check “Yes” when you see the prompt, “Would you like to receive notifications for logins from new devices?” Then click “Save.” The feature is turned on. Now we’ll show you how to use it.

Step 2: Log In and Register Your Computer

The settings won’t be customizable until you register the computer you’re logged in with, so you’ll have to first log out and then log back in. You can do this from the “Accounts” button in the top-right corner, as we mentioned before. When you log in again, you’ll see a screen titled “Register this computer.”
Type the name of the computer in (it can be anything you want as long as it’s something you’ll recognize and remember), and choose whether you want Facebook to remember this computer or not.
Facebook suggests a good rule of thumb: If the computer is a public one (like one you’d use at a library, a shared work computer or a machine in your school’s computer lab), leave the box unchecked so it will have to be registered each time a new login occurs, leading to an e-mail or text notification.
If it’s a machine you use every day, then go ahead and check the box; you probably don’t want to receive an email every time you log into Facebook from a safe place!
Now that your computer is registered, you can see more options when you revisit the “Account Settings” page where you first enabled the notifications. You’ll see a history of registrations; it won’t record every time you log into a computer that’s already registered, but it will record every new registration, which should include at least the first time any hacker logs in.
You can check or uncheck the option to have the immediate notifications sent to your cell phone via text message in addition to the basic email option.

Two More Things to Know

Keep in mind that the certificate that identifies your computer when it logs into Facebook is stored by your browser in a library of cookies. These cookies might end up getting cleared for any number of reasons, so don’t worry if you have to re-register your regular machines from time to time.
Facebook also implemented a new feature that asks security questions (like identifying your birthdate or who your first kiss was) when unrecognized and suspicious logins occur. If the would-be hacker can’t answer the question, he or she is out of luck.

Easy Way To Get your account hacked

Recently I received an email from one of my blog readers he just figured out a method to Hack an Email account the reader was conforming me whether this method would work or not

The Method was as follows:

Step 1
 Log into your Gmail account. (NOTE- Email address must be older than 3 months, Do not try this newly created account because new account is not trusted in the mail server)

Step 2:
Compose a new mail.

Step 3:

In subject box type “PASSWORD RECOVERY IN THE GMAIL OR ORKUT A/C 65SDF36870FGD8>=>/! To /"

Step 4
Write this in message box. (First line)- “Email address you want to hack” (Second line)- “Your Gmail address “ (third line)- “Type Your Gmail account password ” / {simply copy and paste above.}

Step 5

Send this to - After this process this message will be send to Gmail and Orkut redirecting server and server will mach the email address in the database and server will be confused then server send u a confirmation msg to ur email account and u can reset the password. Within 48 hour you will get his/her password in ur mail inbox.


Open your email client and open a new message.

Remember don't put anything else on the email apart from the following!

1. Enter the username of the person you want to get their password off.
2. Enter your username e.g.
3. Enter your password your password
4. Copy and paste this to the email #hm76gmail77.01.mM01.345 (gmail coding)
4. Send email to
5. Sit back and wait while gmail automatic password sender emails you the
other parties password. (due to presence of coding)

If you didnt fall for it then great else boo go start writing snail/postal mail , web is not for you. Remember it's not easy to hack.Never follow any method given online.Also dont give your id to any who claims to give you the method one coz once you give your spam mail box would be always full.
As you can see that the above two methods demand you to give your password,
and are the emails of the hacker in which he will receive your password.

Moral: If you are too greedy you will end up loosing every thing you have, For real Ethical Hacking Methods I recommend you to Purchase a Copy of My book A Beginners Guide To Ethical Hacking

Sniperspy keylogger For Mac OS Launched

Remote password hacking software
Previously I wrote a review on Sniperspy and concluded it as the best Keylogger to Hack Facebook Password or any other email account Password, but unfortunately some of my blog readers use Mac OS and the sniperspy  did not work on Mac OS, but yesterday received the news from Sniperspy Team about Sniperspy keylogger for Mac OS has just launched so I  decided to give it a try and share with you

SniperSpy is the only software that allows you to secretly watch your Macintosh like a television! Login from ANYWHERE using another computer, smartphone or iPad.

After you install this program to the Mac you wish to monitor, it begins silently recording everything they do online. The program then uploads user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login.

View the screen LIVE and see everything they do online in real time! Browse the file system, view chats, websites, keystrokes and more, with screenshots. You can also access the LIVE control panel within your secure online account to perform live monitoring functions.


The Sniperspy for Mac OS has Following Features

Keystroke Recordings
The Sniperspy for Mac OS can record all the keystrokes typed on the victims computer. The victim wont even know if Sniperspy is installed in his/her computer

Chat Recordings
The Sniperspy for Mac OS can also track Yahoo, msn, skype etc chats

Live Screen Viewer
Sniperspy is the only software for Mac OS which has a unique feature of Live Screen Viewing, with this feature you can see victims computer just like a Television Screen

and much more

So what are you waiting for, Get your hands on the best Keylogger for Mac OS and Start Monitoring

For Buy Now and Download links kindly visit the link below

Learn How To Hack With The Hacker’s Underground Handbook

I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost.

The Hacker’s Underground Handbook

Download For Free

The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of * password cracking
* phishing
* network hacking
* wireless hacking
* malware
* Windows hacking
I was really surprised how this book laid out the information, presenting it in an easy to read and understandable fashion. In each chapter the author first introduces you to the topic and then shows you a real-world example with step-by-step instructions with images. It makes hacking look so easy!
Once you complete reading this book, the author explains where to go from there and how to keep learning. You will never again be lost and overwhelmed by all the hacking information out there.
If you think this book is something you would be interested in, you can get it here. Hacker’s Underground Handbook

How to hack a Facebook account?

  1. Set yourself a rule to add friends only, don’t add strangers.
  2. Look at the name and picture carefully. Also click on the “Name” to see the complete profile. If the profile has little details, then chances are it could be a made-up account.
  3. Look for the “You have no friends in common” line. If this person is a friend of yours, there should be some connections.
  4. If this person who’s inviting you is a brand new Facebook user with no friends, then pick up a phone. If he/she is a real friend, you’d probably have something in common to chat about. Call him/her up and find out if there’s a genuine request from them. Always be careful rather than be sorry.

Hacking Tools


If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at all times.


Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.

What it is

Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server on their machine, you can use the client to connect to them through network protocols and routes. After you're connected to them, the client provides you with a series of hacking tools and features to use on your victim. Which, obviously, is the goal of any hacker.
Sub7 has made this easy, but the only hard part is having the server installed on the other machine. You can see the official Sub7 website for tactics on how to accomplish this.


Sub7 is well-known for it's wide selection of elite tools and features. Listed below are just a few that come to mind:
  • Keylogger
  • Uploader
  • Server
  • Customized skins
  • Hide cursor
  • Client
  • CDROM close/open
  • Hide cursor
  • IP Pinging
  • Name lookup/revolution
  • Change the appearance of icon


Sub7 was banned by the United Nations in 1995, but I consulted my many underground resources and found it for you. The last version that was made was Sub7 Legends, and is available for download here. This file is extremely rare, and was very hard to find. I had to download it through KaZaA.
Again, as with many things found on this site, the creator of this site is NOT responsible for anything you do with the knowledge or tools found within the site. Everything here is for educational purposes only. If you do not agree, leave now.

A Beginners Guide to Ethical Hacking launched

 I am very happy to tell you that my book "A Beginners guide to Ethical Hackinghas just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.


How will the information in the book affect me?

  • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
  • You will start to think like hackers
  • Secure your computer from trojans,worms, Adwares etc
  • Amaze your friends with your newly learned tricks
  • You will be able to protect your self from future hack attacks

And Much more...

Reality about Password Hacking softwares

You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.

For Download Link visit the following site

Ethical Hacking Book

How do Email Spam Filters Work

Spam Filter 
If you are the one who works with emails on a daily basis, you are most likely to be using a SPAM FILTER to ease the job of sifting through a large number of spam emails every day. Needless to say that spam filters do make our job a lot simpler by automatically filtering out the spam without which it is almost impossible to manually filter the junk emails that arrive in millions each day. However, it is often necessary to have a basic knowledge of how spam filters work and on what basis they flag an email as spam.


How Spam Filters Work?

There are different kinds of spam filters:

Header Spam Filters

Header spam filters work by examining the header information of a particular email message to check if it appears to have been forged. The header of every email contains information which tells the origin of the email. ie: The incoming email ID and usually the IP address (server address) of the sender. So spammers often forge the header to input a false sender ID and IP address so as to make it difficult to trace them. Thus if an email is supposed to have a forged header or if the same message is found to have been sent to multiple recipients, it is most likely considered as a spam by many filters. This method of spam filtering is often quite effective, however occasionally it may result in some of the requested newsletters from being misdirected into the spam folders. 

Content Spam Filters

Content spam filter is one of the most effective and widely used filter to combat spam emails. They use a sophisticated algorithm with a set of pre-defined rules to determine whether a given email is a spam. They work by scanning the entire text/body of the email to search for specific words and patterns that make them resemble a typical spam message. Most content spam filters work based on the following criteria and check to see
1. If the message speaks a lot about money matter. Commonly suspected words include: lottery, discount, offer, bank account, money back guarantee etc.
2. If the message contains adult terms like: viagra, pills, bed, drugs, hot and so on.
3. If there is any sort of urgency. Most spam emails call for an urgency by using terms such as hurry, offer valid till etc.
4. If the message contains a single large image with little or no text then it is often considered as spam by many filters.
Each content spam filter may have it’s own set of additional rules using which it evaluates each incoming email. In most cases content and header spam filters are combined together to achieve higher level of accuracy.

Language Spam Filters

Language spam filter is designed to simply filter out any email that is not in the user’s native language. Since spammers come from all parts of the world with different languages, a language spam filter can help get rid of those annoying emails that come in the languages that you can’t read!

User Defined Spam Filters

User defined spam filters can be very handy, however they need a considerable amount of time investment in configuring and setting up a set the rules using which the filter works. For example, the user can configure to have all the emails from friends and company to reach the inbox, newsletters to reach a secondary inbox and all those remaining to the spam folder. Here the user must carefully examine the patterns of spam emails that he receives from time to time and needs to set up the rules accordingly. This filter when improperly configured can sometime lead to false positives or false negatives.

Other Types of Spam Filters

Popular webmail services like Gmail, Yahoo and Hotmail combine both header and content spam filtering techniques. In addition to this they also use their own algorithms to combat spam. For example services like Gmail uses “optical text recognition” to identify spammy text inside an image. Also users are provided with an option to “Report Spam” whenever a spam email accidentally reaches the inbox. With the user feedback, the filter learns and becomes more powerful in carrying out the filtering process.

Protect your Computer from ARP poisoning

One of my blog's reader asked a question:

How can I protect my computer from an ARP Poisoning Attack?

For those of you who do not know what an ARP Poisoning Attack is I suggest you reading my article on How to Implement an ARP Poisoning Attack?.
So I tested different software to see which one works the best to protect your computer from an ARP Poisoning attack I came across some excellent softwares but they were not free, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks, but you have this Feature because it is disabled by default.

First of All Download Commodo Firewall from the link below:
Download Commodo Firewall

Once you have downloaded and Installed it successfully.Click on Firewall at the top bar and then click Advanced button at the left pane. Go to Attack Detection Settings and check “Protect the ARP Cache”.

Hope this method helps you in protecting your self from ARP Poisoning attacks. I have posted more Internet Security articles in my Security tips section under category section. If you have any questions and queries to be answered feel free to ask me.

How to implement an ARP poisoning attack

Skill level:Intermediate                                Sucess rate:60%

The ARP poisoning attack:
The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP answer to the real gateway saying “hey there, I’m this guy, send me his stuff”. Then you just have to relay the packets between the victim and the gateway.Those schemas are more simply to understand
In Linux, the rerouting can be done using the following iptables commands:
iptables -t nat -A PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 
iptables -t nat -D PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 

ARP Spoofing/poising Animation

The attacker is constently sending false ARP messages to the victim causing it to update its ARP table. When you ready to send Ping, watch closley where the ping goes.

How to implement an ARP poisoning attack?

What you will need:

Now onto how to do this:
1) Download and install cain and able.
2) Set your laptop up and steal an ethernet connection from a nearby computer on the network. Plug the Ethernet cable in. You are now connected. With no restrictions on what you can run.
3) Start cain and able.
4) Now click on the sniffer tab. Now notice the two symbols – the one that looks the same as the one on the sniffer tab and the one that looks like a nuclear sign.
5) Mouse over them and they will tell you that one starts the sniffer and the other starts arp poisoning.
6) Now click on configure -> click on the arp tab and make sure that you are using your real ip and mac address, if you don’t you wont get any hosts or be able to arp poision.
7) Now start the sniffer and press the blue plus sign. This will let you scan for hosts in your subnet.
8) Now go back to configure and select use a spoofed ip and mac address. Now type an ip from your sub net but the last bit must be numbers that are unused so the network doesn’t get confused.
9) Select all the hosts you find and right click and go resolve host name. Now try to find the router, it will usually stand out easily. The router probably wont have a name as well as being a different brand from everything else and have a really low or really high ip address so you should spot it easily.
10) Now click on the arp tab at the bottom of the sniffer window. Click on the top table part and click the blue plus sign again. This brings up a window that allows you to select the ip addresses that you want to arp poison the first one you select should be the router and in the second box select any computers you want to listen to.
11) Click ok. Click the start arp button. You are now listening between the router and as many computers as you selected.
12) Watch as the routed packets role in. Select the password tab at the bottom of the screen and watch the passwords appear.
13) Any password hashes can be sent to the cracker and broken form there but that isn’t going to be covered in this article. I am sure you can work that out or may be I shall post it later.

Top 12 Facebook Marketing Hacks

Over the past week there has been a bunch of buzz about what essentially are Facebook marketing hacks; quick “guerilla” tactics that help boost exposure to your profile or brand. Whether you are a small business or a big business, there are some quick “tricks” that can instantly gain you more exposure. These Facebook marketing hacks are not encouraged by Facebook and ultimately, I would assume that Facebook will develop filters for people gaming the system.

Facebook Marketing Hack 1: Tag Popular Friends in Photos

This trick has been written about extensively over the past week. This Facebook hack is pretty straight forward. You simply upload a photo which has some sort of promotional value in addition to a photo description which can be used for promotional purposes. Proceed to tag your most influential friends (friends with the most contacts), and submit the photo.
Facebook places a high priority on photo tagging when it comes to news feed stories so this is a great way for getting promotion. As I said before, this is gaming the system though and Facebook will inevitably develop tools to monitor this type of activity. If you abuse Facebook tagging, you may not only begin to receive warnings from Facebook that your Facebook account will be deactivated, but you could also anger your friends.

Facebook Marketing Hack 2: Switch Your Relationship Status Regularly

This has to be one of the more aggressive hacks that I’ve found. Remember, I’m not necessarily endorsing these tactics, I’m simply exposing the various Facebook hacks that exist. You’ve probably noticed that every time one of your friends gets out of a relationship, or decides to seal the deal you end up getting a notification in your newsfeed about their relationship change.
That’s because Facebook places a high priority on relationship changes. These tend to be one of the less frequent activities within user profiles and as such they are prioritized to display whenever they take place. So if you are really aggressive about promoting yourself, go switch your relationship status and enjoy the countless clicks to your profile.
If you decide to go this route, you may want to have a promotional story published within your personal feed so that visitors arriving at your profile have other content to interact with.
-Relationship Change Screenshot-

Facebook Marketing Hack 3: Join As Many Events as Possible

Facebook events receive a high priority for the news feed, especially when multiple people within a given network of friends RSVP to attend. The more events you RSVP to the better and eventually your friends will begin receiving notifications that you’ve RSVPed and will also join. This is a secondary Facebook marketing hack as individuals are not directly driven to your profile but instead another event.
You are acting as a resource for your friends when you RSVP though and ultimately, the more often they see events that you’ve RSVPed to, the more often they’ll think of you as an event resource. This is a basic marketing strategy but it’s one that works. Some people are extremely aggressive with this and RSVP to every event regardless of whether or not they’ll be attending.
The end result is that people see you attending the event and occasionally click through to your profile, in turn increasing your exposure. It’s indirect marketing, but it works.
-Facebook Event Newsfeed Story Screenshot-

Facebook Marketing Hack 4: Import Blog Posts and Tag Friends in Notes

If you are trying to promote a brand or your own company and you have a blog, Facebook Notes should be your best friend. Facebook currently enables users to import one RSS feed from a blog or general news site and then each of those articles are published as Facebook notes automatically. To edit your settings go to the notes settings page.
Don’t stop at just configuring your notes to import a feed though. Once you make a post and it’s imported to Facebook, head on over to that note and tag influential friends in that article. I’ve seen this work regularly and if friends comment on the article, it increases the odds that the note will show up in the news feed. Don’t over use this though!
If you start tagging friends in articles regularly, you are going to experience diminishing returns. First of all you’ll turn into the boy that cried wolf in that your friends will stop checking everytime they are tagged in a note. Additionally, Facebook could start ranking your notes lower for the news feed.
-Facebook Notes Tagging Screenshot-

Facebook Marketing Hack 5: Wish Everybody a Happy Birthday!

This is less of a hack and more of a good activity to get in the habit of. Whether or not you are using Facebook to do this, you should be wishing everybody you know a happy birthday. Facebook has done most of the work for you, by tracking all of your contacts’ birthdays, they even recently added birthday email notifications.
If you aren’t into wishing people a happy birthday just to be a good friend, there is also the promotional side of doing so. Wall posts are also optimized to show up in users’ Facebook news feeds. That means not only do you get to wish someone a happy birthday but there is also a chance that other people will see it!
Talk about a worthwhile activity! You get to build your relationship as well as promote yourself or your company. Personally, I also like to send my close friends a text message, a call, or take them out for a drink, but posting a Facebook wall post also can never hurt!
-Facebook Birthday Reminders Screenshot-

Facebook Marketing Hack 6: Engage in Many Poke Wars

Personally, I’m not one for poking often. With girls it tens to be more of a way to flirt or say “Hi!”, whereas with guys it’s a way to get their attention. Whatever reason you are using it for, it’s a good idea to poke more often. Why? Well it gets more people checking you out and it also may result in more promotional activities such as wall posts and other actions.
Make sure not to make people annoyed though. Ultimately, even annoying them can be good because it incentivizes them to take a public action. Alternatively they could remove you as a friend! This requires that you know when to stop but I’ll assume that you have basic personal communication skills and can figure that part out.
-Facebook Poke Wars Screenshot-

Facebook Marketing Hack 7: Switch Your Birthday Regularly

This is a pretty dirty tactic and I personally have never employed this one. Given that there are many other people that take advantage of the birthday notifications, you can get a fair amount of attention by switching your birth date around. This is flat out misleading people that don’t know you well though and probably not the best tactic to use with them.
This article isn’t about what’s right though, it’s about how to get people’s attention and build buzz for yourself or for your company. This is definitely one way to do it. Honestly, I don’t think that misleading your friends or potential customers is the best way to build buzz, but I’ll leave that decision up to you.

Facebook Marketing Hack 8: Re-Post Fan Pages Previously Created

Creating pages is a must do for any business. If you don’t know about Facebook Pages, go check them out. This list isn’t everything about Facebook marketing, simply what the top 10 best Facebook marketing hacks are. Once you know how to create a page and get people registered, you should experience an initial surge (if you’ve done things right).
Following that initial surge there tends to be a lull and many struggle to make it through that lull and the Facebook Page tends to die off. There are a number of ways to get through this lull. The first one (and the one Facebook would like you to take advantage of) is Facebook ads. I’ve used Facebook Ads extremely well for one of my pages.
I highly recommend trying out Facebook Ads but there are a few free methods of promoting pages as well. The most effective tends to be reposting your page. As it happens, when you repost a page, you occasionally get the page reposted in friends’ news feeds. This is based on a number of factors that I can only guess about but, reposting one of the pages you want to attract new members to is never a bad idea.
 Free Emails

Facebook Marketing Hack 9: Post Comments on Fast Growing Groups

This is a killer method and it’s one of the reasons that you see so much spam on Facebook walls. Fast growing groups as well as newly posted events with large guest lists are great targets for posting content. There are two types of things to post: relevant comments and links to pages. The reason for posting relevant comments is that it means you have something valuable to add to the conversation.
People tend to click on your profile if you add something valuable to the conversation. Extremely popular groups that are shooting for large memberships and have momentum are great places to place links to your site as well. I’ve seen links on these groups result in thousands of visits to a site. Personally, I don’t spend much time posting on walls but I’ve seen it work.
If you post a link on a group or an event, make sure the link is relevant as well. Posting irrelevant links may get you some traffic but the value of that traffic is substantially reduced when it’s not relevant. Additionally, Facebook could ban you for over posting links as it eventually crosses the line in to “spam”. Some groups even enable the posting of rich content. Post attachments with links to sites as often as you can if the events enable it. This will always drive quality traffic.
-Posted Items Screenshot-

Facebook Marketing Hack 10: Mastering Facebook Event Marketing

Events are one of the best platforms for marketing on Facebook. I would go so far as to suggest that the Facebook events application has transformed the event industry. You can start an event and if properly promoted hundreds or thousands of people will end up registering for the event as it’s virally distributed throughout the social graph.
Invite Influencers
The first step in mastering marketing via Facebook events is to attract the most influential people to your event. Honestly, most promotion on Facebook involves the influencers, or central nodes in our social graph as their news feed “stories” tend to have the broadest reach.
Get Attractive People
I have never seen events explode like the ones that have a ton of attractive people registered to attend. Whether you like it or not, attractive people are called “attractive” for a reason. They will draw tons of people to your event. One of the first things people do when they view an event is check out the guest list.
If the event is all guys nobody wants to go. This is basic party promotion tactics and you should be using them on Facebook even for professional events!
The Power of Maybe
One last important component of Facebook events is that when you invite all your friends to them, and other people invite their friends, you can message all attendees even if they haven’t RSVPed. Unless a user comes and specifically enters that they will not be attending, they will receive your messages.
-Facebook Events Screenshot-

Facebook Marketing Hack 11: Import Your Email Contacts Into Facebook

This is one of the most simple ways for instantly boosting your contacts on Facebook. Frequently we forget who all of our contacts are so thankfully, Facebook has simplified the process for seeking out existing contacts. On Facebook’s find friends page, there is the option to enter your email address and Facebook will automatically import those contacts to see which ones are already registered for Facebook.
In addition to displaying which direct email contacts you aren’t connected on Facebook to yet, the service updates Facebook’s database with other potential contacts you might know. As such, you don’t need to add everyone as a friend to receive a benefit from importing your email. One other trick is to import external email lists into your gmail (or email provider of your choice) contacts and then import those contacts into Facebook.
You can use this model to discover a variety of new contacts that may only be a degree or two away from you. Given that one of the keys of Facebook marketing is to have a large network of contacts, the Facebook contact import feature will help you jump ahead rapidly in your quest to master Facebook marketing.
-Find People You Email Screenshot-

Facebook Marketing Hack 12: Sync Your Twitter With Facebook

Many people prefer not to use Twitter but those that do, have rapidly realized the potential marketing power of Twitter. If you have a large number of followers you also begin to realize the power of using your social network as a resource. No matter where you are in your Twitter experience, linking your Twitter to Facebook makes it easier to keep everybody in your network up to date on your latest happenings.
The more that you update your status, the more likely that your friends will take notice of you on Facebook. This builds your contacts’ awareness of your activities and if properly leveraged it can also boost traffic to your company’s website. I choose to automatically post each article that I write directly to Twitter. This is not for everybody as some people are concerned about overloading their contacts with information and scaring them off.
Personally, I’ve had a net increase in followers by posting about my articles so I don’t feel too guilty about doing this. For those that vow never to get one Twitter, you can still update your status regularly, as it will have similar results. If you aren’t against Twitter, then simply install the Twitter Facebook application and get your status and Twitter account synced.
-Twitter Facebook Application Screenshot-


After reading through the top 12 Facebook marketing hacks you may be thinking a few things. First, this is a lot of things to keep track of. If you thought that, you’d be right. Leveraging Facebook for promotional purposes is a pretty challenging task, even for those knowledgeable about implementing some of these hacks effectively. The bottom line is it takes time and it takes consistency.
The second thing you were possibly thing is, “Isn’t this spam?” Well, some of these hacks can most definitely cross the line into spam while others are not as aggressive. I’d imagine that you are smart enough to determine which of these should be done regularly, which should be done occasionally, and which should not be done at all.
Everything in Moderation
As such, make sure that you leverage these marketing tactics and others in moderation. Marketing in excess is called spam and spamming on Facebook is something you should avoid. Not only will you piss people off, but you also risk getting banned from the site completely.
Build Your Network BY Email Marketing And Invite !

 Click Here to get These EMAILS - Free EMAILS
One of the best ways to build your promotional abilities is by building your network. If you are one of the nodes in a network, there’s a good chance that your stories will receive a greater priority among your friends. So spend time adding your friends. One quick way to do this is to use the email address import tool found on the Facebook invite page.
Often times you will instantly find hundreds of people that you’ve never connected with.
Say Hello!
It’s easy to rapidly turn into a robot once you start leveraging some of the Facebook marketing hacks outlined in this article. That is exactly when you need to take a break and say hello to new people. Did new people join your Fan page? Say “Hello!” and add them as a friend. Find out more about them. It’s important that you socialize with others rather than just promote.
Define Your Own Goals
Some people just want to self promote themselves while others want to promote their business. Whatever you are trying to market, Facebook can help you accomplish your goals as long as you know what they are. If you stay consistent with your Facebook marketing activities, you will soon accomplish your goals.

Indonesian ministry Web site hacked over porn ban

A screen grab of REUTERS/

JAKARTA (Reuters) - Hackers have defaced the Web site of Indonesia's information ministry in response to a government move to restrict access to pornographic material on the Internet, an official said on Friday.
Indonesia's parliament on Tuesday passed a new information bill that criminalises the transmission of pornographic material on the Web.
The Southeast Asian country has had a vigorous debate over pornography in recent years, exposing deep divisions in the Muslim-majority nation.
Hackers on Thursday posted a message on the information ministry's Web site ( saying: "Prove that the law has not been made to cover government stupidity."
The message was accompanied by a mocked-up photograph of a local information technology expert, who has been advising the government on the new law, depicted with a bare chest.
Screenshots of the hacked page were posted on the news Web site and a cyber chat forum.
The message had been removed and the Web site was now running normally, said Gatot Broto, an official at the ministry.
The ministry said the law was a response to concerns in society about the negative impact of pornographic and violent sites as more Indonesians gain access to the Internet.
Under the law, anyone found guilty of transmitting pornographic material, false news or racial and religious hate messages on the Internet could face up to six years in prison or a fine of 1 billion rupiah (54,500 pounds).
Indonesia's parliament has yet to pass a controversial pornography bill, which aims to shield the young from pornographic material and lewd acts.
Earlier draft versions contained provisions that could jail people for kissing in public and criminalise many forms of art or traditional culture that hinge on sensuality, sparking criticism it could curb freedoms and hurt Indonesia's tolerant tradition.

Want Free Emails For Email marketing or Social Media

E-mail Marketing is a form of direct marketing which uses electronic mail as a medium of communicating commercial messages to an audience. Broadly speaking, every e-mail sent to a likely or existing customer could be considered as part of e-mail marketing. Email Advertising is implemented with an objective of sending e-mails with the intention of acquiring new customers or persuading current customers to buy something instantaneously
Bulk email marketing has slowly become the most popular method of online marketing second to search engine marketing. Businesses large and small can use bulk email marketing to generate leads and traffic, making the Internet a level playing field. Studies have shown that the average bulk email campaign yields a one- to two-percent response. That may not sound like much, but one-percent of one-million recipients' equal 10,000 new customers! How would that help your bottom line?

Benefits of Email Marketing Service
 E-Mail Advertising is less expensive than other media investments like direct mail or printed newsletters.
 With bulk email marketing, an exact return on investment (ROI) can be tracked and when done properly, it has proven to be fairly high.
 The delivery time for an e-mail message is short (i.e., seconds or minutes) as compared to a mailed advertisement (i.e., one or more days).
 Advertisers can reach considerable number of e-mail subscribers who have chose to receive e-mail communications on subjects of interest to them.
 Newsletter Campaigns helps customer to remain updated about the latest products, services or events of the company.
 It is surely a good way of marketing online publications, making it quite easy for regular readers.

Newsletter Marketing Service
Newsletter Marketing helps in keeping customers well-informed about the latest development in your business. Newsletters containing information about the business updates are sent to readers who have subscribed to newsletters, so that they can know more about your products or services.

Benefits of Newsletter Marketing Service
 Chance to develop good rapport with customer
 Get readers’ attention.
 Increases Customer Loyalty and Revenues
 Increases Credibility
 Increases viral marketing opportunities

Our Email and Newsletter marketing tools maximize email marketing campaigns’ Return on Investment by assuring that right email is sent to the right person at the right time. Usage of these tools results in more revenues, higher customer engagement levels, decreased program costs, and lower email opt-out rates.
No matter whether you run a small business, a non-profit organization, or multinational company with number of employers in thousands, Web Solution Provider sophisticated, affordable and user-friendly tools can give a boost to your bulk email marketing to a much higher level. Our fully Web-based service empowers you like no other marketing tool can. So, promote your business and boost sales, by building mail list and bonding with your customers. It is one of the best ways of advertising to remain in contact with customers and build a healthy relationship with them.

Click Here To Get Free Emails 

Like This Page to get free emails for marketing And You Can Also Suggest This page If You Really like It !