Skip to main content

Privacy Policy

At www.amarhelloween.com , the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by www.amarhelloween.com and how it is used (this includes IP Tracking and Linking ) .

Log Files :

Like many other Blog, www.amarhelloween.com makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administrator the site, track user's movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons :

www.amarhelloween.com does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.
www.amarhelloween.com has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Our privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers’ respective websites.

Comments

Popular posts from this blog

Fast Proxy List with their Ports

TESTED : 115.248.206.187     Port 8080  INDIA 65.49.73.192           Port 8080  USA 50.22.206.179         Port 8080   USA 149.6.5.2                  Port 8080   USA 72.64.146.136         Port 8080   USA 64.37.63.106            Port 8080   USA 118.91.234.81           Port 8080  INDIA 125.16.69.114           Port 8080  INDIA 115.252.111.214       Port 8080  INDIA 114.143.12.28           Port 8080  INDIA 27.124.48.34             Port 8080  INDIA ANONYMOUS US PROXY SERVER : 12.235.183.190:443 12.68.37.35:8080 128.2.211.115:3127 129.105.15.38:3124 130.245.191.59:3124 130.245.191.59:3128 130.245.191.60:3128 131.247.2.247:3127 131.247.2.247:3128 146.57.249.98:3128 166.122.68.249:8080 170.140.119.69:3127 173.14.5.140:80 173.15.162.73:80 173.19.200.137:8080 173.203.109.119:80 173.203.206.233:80 173.203.215.116:80 174.51.152.145:29005 184.106.129.168:8081 184.106.228.14:80 184.72.36.101:80 184.73.34.31:80 199.26.254.66:3128 199.3.183.160:80 199.3.18

How to hack VP-ASP Shopping websites and get all the Database details

Hello Friends, Today we are going to learn how to hack VP-ASP cart of a Shopping website and download all their Database details like Customer details, Credit card details, Product details etc. So some basic idea before starting the Tutorial,  What we are going to do here? Firstly we will hack a shopadmin website then we will download the database file which will be in the form of *.mdb. This database file contains all the client details like credit card information and also login name and passwords. How to do this ? Note : This tutorial is tested on "VP-ASP Shopping Cart Version:5.00" Step 1 : First thing to do is to find VP-ASP 5.00 Sites, to do this -> Go to Google.com -> Type "VP-ASP Shopping Cart 5.00"[ Without Quotes ] . See the image for reference  Step 2 : In this tutorial, we are going to target www.surfstats.com  You can also select your website which is having "shopdisplaycategories.asp","sho

Hacking Facebook or any Email Account using IP Tab napping Method

Hi guyz, Today we r going to learn how to hack any Facebook or Email accounts using IP Tabnapping method. IP Tabnapping is similar to "Phishing technique" but here instead of using a web hosting site we will use own system IP address to get he email id and password. So for this you will require : 1. BackTrack OS ( We are using Backtrack5 R2 version, download it frm  www.backtrack-linux.org ) 2. Some social engineering tricks + Brain (most important thing) okay so lets begin : Step 1 : Open Backtrack, Click on  Applications  >  BackTrack  >  Exploiting Tools  >  Social Engineering Tools  >  Social Engineering Toolkit  >  Set Step 2 :  Now u are in the set console, you can see several options there like Social Engineering attack, Fast track penetration testing etc. Just type 1 and press Enter . This will open " Social Engineering attack ".  Step 3 : Now another window will appear Just type "2" i.e.  Website Attack Vectors  .

How to make your SmartPhone work as Mouse and Keyboard

Hello friends, today we will learn how to make our Smartphone work as a Mouse and Keyboard remotely. We can also perform the below activities through this : 1. You can Manage your System Drives 2. Play Music of System 3. Restart, Log off, Shutdown and Lock the System Remotely 4. Control Youtube, VLC media player etc. Okay so lets begin, for performing this you will require : Unified Remote Server -> Click here to download Unified Remote App( To be installed on your SmartPhone) -> Click here to download Step 1 : Download the Unified Remote Server file from the link provided above and Install it. Step 2 : While Installing it, remember to check the "Windows Firewall Exception". After Installing it, Double click on the icon of Unified Remote Server. It will look like this : If you want to see what all things we can do remotely then check the Remotes tab. Step 3 : Since now our Server is up we are ready to make a connection with the App. D

Resolution Airmon-ng showing No Interface

Today we are going to show you all a solution for the most common Error people face while performing Airmon-ng i.e. there will be no interface as shown below : So how to fix this issue? Step 1 : Before starting Make sure that you have Internet connection on your Backtrack or Kali Linux machine.If you are using  VM then make sure your VM network adapter is Bridged with the Physical Network. Step 2 : Next Click here : http://linuxwireless.org/download/compat-wireless-2.6/  and Download  compat-wireless-2010-06-26-p.tar.bz2  file on your Backtrack or Kali Machine. Step 3 : After downloading we have to extract the file since its in compressed form(*.tar).so to extract it Go to the path where you have saved that file and then give the command : tar -jxvf compat-wireless-2010-06-26-p.tar.bz2 Step 4 : After extracting go to that folder that is created after extraction, and give the command > make unload  and then make load   (for loading the new interface) and now you

How to Bypass SMS Verification send by any email Provider

In most of the websites, it asks to enter your phone number for verification. Sometimes you don't want to give it because of your privacy reasons. Even when we register in websites like Gmail, Yahoo , hotmail, rediffmail etc. they asks for SMS Verification. So today we will learn how to bypass this SMS Verification method using external number. For this method u can use the below mentioned website : 1.  http://receive-sms-online.com/ 2.  http://sms-verification.com So how it works. This websites will provide you with some numbers . For example we are using  http://receive-sms-online.com/  , In the below image u can see it is providing with some numbers. we will use this number to verify our account. Now give any of this number where it asking for number and for the verification click on the Number u gave, and refresh the page. You will get your code as shown on the image below : For any clarification do comment below. CREDITS :- Amar Helloween