Home » » Hacking For Facebook | Facebook Hack

Hacking For Facebook | Facebook Hack

How to Hack Facebook
Actually a lot or How to Hack Facebook Password Hack Facebook, this time there are 3 ways I will try to hack a friend share for dofollow blogs, I hope the tips below useful yes.
Here is the latest 3 How to hack Facebook:- Using FacebooZ- Using a Keylogger- Using Social Attack
- Using FacebooZHack facebook using FacebooZ is how to hack facebook is quite complicated, for how to hack facebook using FacebooZ, you must have Internet programs in the form of Java software from Sun Microsystems and minimal edition Framework 2.0, if your computer is not installed this software, try to

do how to hackfacebook using this FacebooZ in the cafe, if still no java and Frameworknya facility, then follow the steps listed below for how to hack facebook using FacebooZ.
For Java:
1. Open the Web address http://jdl.sun.com/webapps/getjava/BrowserRedirect?locale=en&host=www.java.com:80
2. Download Penginstall Java to your computer, but if you find writing like this, it means you do not need to install it again:
Verifying Java VersionCongratulations!You have the recommended Java installed (Version - Update -).
If you want to download Java for another computer or Operating System, see all Java downloads here.
To find out if Java is working on your system please visit:Test your Java Virtual Machine (JVM)
3. Install the Java program on your computer.
For the Framework:
1. Go to Web Address
2. Download Framework
3. Install the program on your computer
After preparing all the preparations before, it's time for a coffee run to hack facebook how to use: D FacebooZ. To use FacebooZ, please follow the steps below.
1. Download Facebook
http://www.ziddu.com/download/6202817/Groundfacebook.rar.htmlandhttp://www.ziddu.com/download/6202880/Document1.pdf.html
2. Use it wisely FacebooZ extract the zip file, if you do not have WinZip please search on google with keywords "free WinZip WinZip or Free". Sorry for the link to download WinZip is not provided because I'm tired: D
3. Click the file named facebooZ.jar, when it meets two conditions of use how to hack facebook using facebooZ, see above
4. Then it will appear FacebooZ program, then you think about yourself, open notepad, filled with keywords from Indonesia-English dictionary and the data in the victim data, for example in notepad filled date of birth, address, hobbies, and others, see text below .
August 17, 1945 (free!)In Hack Road No. 666, Housing Gile Ajib Hack!Fishing, Hack People, nungging Do not imitate, Danger!
FoodDrinksRunWorkPlayEatingDrinkingRunningPlaying
Then save the name password.txt
5. Wait a result, the result is rather long but try to be patient with how to hack facebook this one: D
- Using a KeyloggerHow to hack facebook this one also includes difficult to operate but how to hack facebook is highly effective and can give you a lot of passwords other than facebook, hack facebook how to run this just follow the steps below:
Download Perfect Keylogger in blazingtools.com. Perfect Keylogger can run on Windows 95, NT4, 98, Me, 2000, XP, Server 2003/2008, Vista. And Internet Explorer 5.0 or newer.
To prove the greatness of perfect keylogger, the following steps:
1. Run the setup file
2. When the installation process you will be prompted to enter a nickname for perfect keylogger, perfect keylogger is also excess.In this way, perfect keylogger more can be obscured its existence.
3. After that you are required to determine the existence of perfect keylogger install this program, if you put in places deeper in the WINDOWS folder then this is perfect keylogger can also avoid getting caught. And in the process of installing this type of installation are perfect keylogger, if you want to install a regular or stealth. If you install the Stealth then that will be installed only program the machine without the Help file and Uninstaller.
4. Because this is softwae trial version, so it applies only 5 days.To be able to use in the long run, you must purchase a serial number. However, all features in the trial version is already open, and insufficient to prove its sophistication.
5. Click Continue to proceed with the Evaluation version of this demo. Then the program will open. To view the properties and settings of this keylogger you can see at the bottom right corner of your monitor.
6. Right-click the logo and it will pop up menu of perfect keylogger. Select the Options menu to view and download its keylogger settings.
7. First we set hotkeys to call in advance Perfect Keylogger, default key combination Ctrl + Alt + L is used to call the Perfect Keylogger. To further secure your own set kombinsai key. Then adjust the settings for vagueness keylogger invisibility.
8. Then we see the Logging menu, here you can set the object / thing whatever you want to record in this keylogger. Then you can set the keylogger is password so no one else can access this keylogger than you.
9. Logging on can be seen pounding the keyboard to access the pop-up menu earlier in the Log Viewer window.
10. Then in the Screenshots menu, you can set the setting Perfect Keylogger to record the victim's computer screenshots.Here can be in setting time, image quality, image size and screenshots when the pounding on the mouse button.
11. In E-mail menu, you can set Perfect Keylogger log reports to be sent to your email. Here you can set the time of delivery, any logs to be sent, and other large file limit.
12. In the Delivery tab you are required to fill out the form provided as a condition for sending the file to your email. Perfect Keylogger can only send files to an email that has SMTP and POP3 facility so hotmail and yahoo can not be used. For more convenience, you should use email or the plaza because telkomnet pop3 and smtp settings for both are very easy. At the prompt smtp, fill it with "smtp.telkom.net" without the quotes.
13. FTP access also necessary if the port 80 or 25 is closed, so in case your files are not sent. On the Delivery tab you should set the FTP address and user password and the FTP directory.
14. Remote Installation. This menu is another advantage of the Perfect Keylogger, Perfect Keylogger because it will form an executable file that combined with any file. So more like a trojan that wrapped the image file. Need to be reminded of the remote executable file that has formed the settings had been formed with Perfect Keylogger you at the beginning was.
15. When you get to the menu where you are prompted to select a file to combine with Perfect Keylogger is a remote exe.anda can set also the date uninstalisasi if you want to remove the keylogger on the victim's computer at any given time. For a combination of better use of the image files to unsuspecting victims. And fill in the installation folder location is also a keylogger on the victim's computer later.
16. Remote file was established. Please test remote file earlier.Testing should dilakuan on Vmware or Virtual PC so you do not become victims. Need to be reminded of the remote executable file that has formed the settings had been formed with Perfect Keylogger you at the beginning was.
17. Perfect Keylogger undetectable Remove programs and Windows Task Manager. This means Perfect Keylogger is completely undetectable and should be said PERFECT.
If Perfect Keylogger works well, all user activity on the computer will terpantu well include their email passwords. More unfortunately again, jik auser conducts transactions online using a credit card or e-banking. Then everything will be monitored.
- Using Social AttackHow to hack facebook that is most simple and easy to do all the people, to capitalize familiarity, you can mengatahui password by asking the person alone. For that you must have a rather high social status so that you can get the password to attack social