Is Hacking Facebook Really Possible?

hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers, is facebook is secure
Did you ever try to hack someone'e facebook account. So is it possible to hack a facebook account either from software or with another method?
Today I am going to share a experience of hacking facebook in tricky engineers blog which tells you hacking of facebook is possible or not.
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? Today, we'll take a look at this topic in detail with some example websites and software and get answers to some common related questions.

Back in 2005, I came across a mechanism that reportedly hacked Yahoo mail password for a user using some simple tricks. It didn't work for me for obvious reasons but I didn't stop believing the possibility until I grew up to realize how helpless I am here. One of the major concerns of large organizations like Facebook and Yahoo is security because of the super sensitive information about people they have. Several hundred million dollars are spend yearly by these organizations to ensure security and then there's these websites that claim to undo all that protection in less than a minute.

The Facebook password cracking Websites and Software

Let's start with some examples here. I googled the subject and picked the top results without order. Didn't care to search harder because there are thousands such and I know that all are FAKE.

So let's look at this
hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers
Their FREE Facebook hacker program is said to be capable of cracking the password of any Facebook user within a day. Sounds cool, I could try it out, but my Norton Antivirus rejected the file straight away.

I also picked up another one. This Hack-Fbook-Password asks me to enter the profile ID of a user and it will crack the password. I said Okay and began the process.
hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers
It ran certain algorithms to determine the password and finally landed me on a page that said I could DOWNLOAD the password IF I fill an online survey first. Those of you who've been redirected to surveys would know they don't work and are put just so to get traffic and earn money.

I said maybe I should leave the website now but hey, they gave me a prize!
hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers

So I just became the luckiest person in my city just like that!

Now tell me, how can a sane person believe in all this?

The truth!

Let me get this straight to you, these websites do nothing at all just waste your time and are never able to do the job. In fact, downloaded programs just make the situation worse when you run them. I had my Norton Antivirus to guard me otherwise I could be in severe danger currently.

These software are mostly keyloggers and tracking programs that record your keystrokes and action and steal personal information from your computer in the background and send it to their master servers. So ultimately a hacker wannabe gets hacked, how ironic!

From now on in the post, I'll be using the word 'Hacker' for these websites and software since you're no more in the position to be called that.

Why do these 'Hackers' do all that?

hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers
Setting up websites, maintaining them and developing software is not an easy task. It requires some money. So why do these 'hackers' do all the hassle? It's because they get equivalent or more money in return. They can extract your credit card details and other banking info from your system and use it for their advantage. They can hack your account and use it for wrong purposes. Give me one reason why one wouldn't steal money and hack accounts for no loss.

Why people fall in their webs?

hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers
Why do people try to use such unreal hacking procedures? It's because it's unreal to me, it's unreal to you but not to those who are not much familiar with the working of a software. They get in the web of these hackers and eventually get screwed up pretty bad without consent.

The websites give guarantees and also portray their 'imaginary' happy customers so as to trick a reader. Such tactics are simple but really powerful and serves to their advantage in most cases. This is also why there are thousands of such websites available.

So is Facebook account an 'unbreakable fortress'?

hack a facebook password, hack facbook, facebook hack, tricky engineers, trickyengineers
Well, NO. Facebook accounts can be hacked. No online service is foolproof and that is because of the flaws and bugs in their software. There are several ACTUAL hackers in the world who can analyse a website's security and use that against it thus making hacking a reality.

But I'm 100% sure none of them uses these scam and fake websites that claim to do the impossible. You can check out our hacking section to know more.

But at the end I want to tell just one line "data is secure if and only if it is not connected to internet."
 In case of any queries or confusions head over to the comments section. Cheers :)


Learn Octro Teen Patti

Teen Patti is a popular Indian gambling card game just like poker. It is normally played in a group of 3 to 6 persons and uses a 52-card pack without jokers. Each player is dealt three cards face down. Before the cards are dealt, the boot amount is decided and collected from each player. The boot amount is the minimum stake amount put in the pot, which is the money kept in the centre of the table. As the game progresses the pot money grows and is won by the winner of that hand. Winner is the player who remains in the game till the completion of the hand and has the best hand or the highest hand based on the cards ranking shown below.
Ranking of the cards from high to low is:
1. Trail or Set (three of same rank),
2. Pure sequence,
3. Sequence (or run),
4. Color,
5. Pair (two cards of same rank), and
6. High Card.
The figure below shows highest to lowest cards of each rank. It should be noted that in a sequence A-K-Q is the highest ranked sequence while A-2-3 is the second highest ranked sequence.
Octro teen patti variation rules, teen patti play, trickyengineers, tricky engineers
Playing Teen Patti. Each player contributes the boot money and gets three cards facedown. Now it is the turn of the player next to the dealer in clockwise direction. The player has option to place a bet without seeing the cards (blind) or see the card. When the player sees his card, he/she can play chaal or may have other options depending upon the progress of the game. A player who places a blind bet is referred to as the blind player. A player who places his bet after seeing the cards is referred to as the seen player.
Blind Player. To be blind player, you must not see your cards. You have options to play Pack,Blind and Show if available. To play Blind put the bet amount in the pot. The Blind bet amount is equal to the current stake amount or twice the current stake amount.  The current stake amount, in case of the first player, is the boot amount. Thus if the first player is a blind player, the player must bet amount equal to the boot amount or twice the boot amount.
Stake Amount. The bet placed by a blind player becomes the stake amount for the next player while half of the bet placed by a seen player becomes the stake amount for the next player. In case of the next blind players, the bet amount can be equal to the stake amount or twice the stake amount.
A blind player can ask for a Show only when there is one opponent remaining in the game. This is a blind show. After asking for show, the cards of both the players become visible and the winner gets the pot.
Seen Player. A seen player can play ChaalPack or may have other options. The other options that may be available to the seen player are Show and Side Show. Once you have seen your cards, to remain in the game, you must play chaal unless you select any other available option.
(a) Chaal. To remain in the game, a seen player must play Chaal or Side Show if available. For chaal the player must put the bet amount in the bot. The bet amount for a seen player is equal to twice or four times the current stake amount. If the previous player is a blind player, the stake amount for next player is amount bet by the player. If the previous player is a seen player, the stake amount for next player is half the amount bet by the player.
(b) Side Show. A seen player can ask for a Side Show. Side Show means that you wish to compare your cards with the cards of the previous player. You can do this only if the previous  player is also a seen player and there are one or more other players still in the game. For Side Show you put amount equal to twice the current stake in the pot. Your request for the Side Show is conveyed to the previous player. The previous player has option to accept or deny your Side Show request.
If your Side Show request is accepted and the previous player has better cards than you, you must pack. If your cards are better than the previous player, the previous player must pack. After one of you have packed, the turn passes on to the next player.
If your Side Show request is denied, you do not see each other’s cards and both of you remain in the game and the turn passes on to the next player.
Octro Teen Patti Variations:
a) Joker. A Joker card is shown on the table. All the cards of the rank of the Joker regardless of the suit can be used as as a substitute for any other card. A player with highest rank cards is a winner. For example, 4 is a joker. Then 4, 4, 4 and 4 are Jokers. Your cards are Ace-3-4. Then you can treat 4 as 2 and your cards become A-2-3

b) Muflis. It is just like the normal game except a person with lowest rank cards is a winner. For example, you have K-2-3 while other person has K-K-9, then you are the winner.

c) AK47.  You can treat all the Ace, King, 4 and 7 as jokers. Use these cards as replacement for any card. A player with highest rank cards is a winner.

d) Highest Joker. You can treat your highest value card as a Joker. For example, if you have 6-9-K, then you can treat K as a joker and your cards become 6-9-9. You have a pair of 9.

e) Lowest Joker. You can treat your lowest value card as a Joker. For example, if you have 6-9-K, then you can treat 6 as a joker and your cards become K-9-K. You have a pair of K.
Limited Stake and Unlimited Stake Tables. When you play Teen Patti for the first time, you play on a limited stake table. On the first limited stake table that you play, the boot amount is 2, you can play maximum 4 blinds, the maximum Chaal that you can play is 256 and the Pot limit is 2048. When the Pot limit is reached, all players still in the game are forced to show their cards and the winner gets the Pot.
In the next level limited table, the the boot amount is 4, you can play maximum 4 blinds, the maximum Chaal that you can play is 512 and the Pot limit is 4096. Players who have played many hands and have many chips play on higher level tables.
Legality. Teen Patti is a gambling card game. In many countries it is illegal to play Teen Patti with real money at stake. In Teen Patti by Octro you play only with virtual money.

Sign Up Numerous Times To A Site With Single Gmail Account

Multiple sign up with same email, multiple gmail account, tricky engineers, Multiple Email addresses with One gmail account
 Sometimes you want to create multiple accounts in a website like facebook, twitter, linkedin, or any other website but you require different email id. There is very simple trick that I am going to share with you in tricky engineers blog which describe you to sign up numerous times to a website with a single gmail account.
This feature is only for gmail users This trick is only for gmail accounts and will not work on yahoo and hotmail etc. The basic logic behind the trick is some websites treats .(dot) as different email id but gmail treats them same because gmail ignores .(dot) from your email id. 

There are three main methods for expanding the number of usable Google email addresses that you can have from a single Gmail account:

  • Using the domain. 
Let’s start with the use of the domain name. With every Gmail account you actually get a second email address – one is the regular address while the second address has as the domain. So Gmail will actually see as the same as All email messages that are sent to will be delivered to your

  • Using the plus sign “+” at the end of your name and adding extra characters.
You can use the "+" sign in your Gmail address to generate an unlimited number of email address variations for your same account, but some online services won't accept the "+" symbol, or ignore it entirely. But you can use this in facebook, twitter, linkedin,,etc.

 for examle:-

  • Using the “dot” or period in your email name.
Another interesting facet of Gmail addresses is what is sometimes referred to as “Dot Blindness”. In an interesting twist Gmail does not recognize dots, ”.”or periods as characters in Google email address user names. This means that Gmail “sees” or as the same address as You can also use multiple “dots” in the username such as

 for examle:-

Multiple sign up with same email, multiple gmail account, tricky engineers, Multiple Email addresses with One gmail account

Some benefits of this trick
  • Multiple Email addresses with One gmail account
  • No need to sign up gmail every time when you want to create new profile on other site.
  • No need to remember multiple gmail account email ID and password.
  • No need to login multiple gmail account for each time when you need other website account updates. All account updates will be in a same gmail inbox.

By Tricky Engineers

Find lost phone using imei find your lost phone by tricky engineers
Did you ever lost your mobile and you want to find it out. I had also searching for this option from last month. But I do not have that much permission to track my phone. 
Today I am going to share a post in tricky engineers blog to find your lost mobile phone using IMEI number. Before I start let me provide a little info on IMEI number. IMEI number is short form of international manufacturer equipment identity. It is 15 digit unique number. If you are using call , SMS or gprs services on your mobile handset then IMEI number is helping you in this. Without IMEI number you can’t use these services. Single sim mobile having single IMEI, dual sim mobile having two IMEI no and so on.  I hope it is enough info about IMEI number but still you want to know more then Google is alive just use it. 


First of all you need 15 digit IMEI number of that mobile phone which you have lost sadly. You can find your phone IMEI number on your phone bill as well as box of your phone.


Now note down that IMEI number and go to your email id because we are going to send an email.


Now compose a new email by providing following info. email body for tracking lost phone by tricky engineers
and send this email to this email id:
Now just wait for reply from If your phone in use then they will trace it out and inform you shortly
BY Tricky Engineers

LinkedIn Profile Tips and Tricks

If you want to build your business and your career then these LinkedIn tips must be part of the mix! With more than 170 million professionals worldwide and 3 million in India alone LinkedIn is the best place to start!

1. The Secret Backdoor To Adding Connections
If you want to connect with someone on LinkedIn, you’ve always had to say how you know them in your connection request. If you’re trying to meet new people on LinkedIn, selecting a group you share in common was previously an option for saying how you know that person when connecting. That option has recently vanished.

Fear not. Brynne Tillman recently shared an excellent article showing you a backdoor trick for getting past it:

Visit the profile of the person you are looking to connect with
Click the star (relationship) button to save them as a connection
Copy their name
Click on Connections on the top bar
Paste their name in the search bar in the middle of the page
Hover below their location and click connect
Type your note and send
LinkedIn Profile Tips and Tricks--

2. Free InMails To LinkedIn Group Members

That’s right, you can send FREE messages instead of expensive InMails to people that share the same LinkedIn Groups as you.

Go to any LinkedIn group you are a member of. Click the “No of Members” .

LinkedIn Profile Tips and Tricks--

Look at your 2nd level connections inside the group’s member list and you’ll see an option that says “Send Message”.

LinkedIn Profile Tips and Tricks--

When you select “Send message”, You will redirected to a new page that gives you a direct line to that individual’s inbox.

3. Boolean Search

Similar to Google, most people have no idea that LinkedIn search allows the usage of modifiers to help you get even more targeted results.


If you want to find results containing an exact phrase, use quotation marks to enclose the phrase. For example, “HR manager” or "softare developer".
LinkedIn Profile Tips and Tricks--


If you want to search for LinkedIn profiles that include two separate terms, use the word AND in capital letters between both terms when doing your search.
LinkedIn Profile Tips and Tricks--


If you want to combine results of two separate search terms, type OR in all upper-case letters between one or more terms."sofwtare developer or hr manager"
LinkedIn Profile Tips and Tricks--


This is where things get interesting. You can combine multiple modifiers to get even more complex search results. For example, “software AND (engineer OR architect)”.
LinkedIn Profile Tips and Tricks--


Want to exclude results that contain a specific term? Use the word NOT in upper-case letters between terms you want excluded from results. For example, NOT “customer service”.
LinkedIn Profile Tips and Tricks--


View Or Hack Unprotected Live Cameras Using Google

In this tutorial i will teach you to hack or view unprotected cam using a simple google trick. Using this trick you can see live view of streets in china or america. Inner view of some office and lot more. Lets dive into it.

How To View Unprotected Cam ?       

     1. Go to Google and search for "inurl:view/view.shtml" (without quote).
           2. Now open any of the link from the search result and enjoy.
             3. Below is the list of google dork you can use to see more cams.

      List Of Google Dork

      • inurl:/view.shtml
      • intitle:”Live View / - AXIS” | inurl:view/view.shtml^
      • inurl:ViewerFrame?Mode=
      • inurl:ViewerFrame?Mode=Refresh
      • inurl:axis-cgi/jpg
      • inurl:axis-cgi/mjpg (motion-JPEG)
      • inurl:view/indexFrame.shtml
      • inurl:view/index.shtml
      • inurl:view/view.shtml
      • intitle:start inurl:cgistart
      • intitle:”live view” intitle:axis
      • liveapplet
      • intitle:snc-z20 inurl:home/
      • intitle:liveapplet
      • intitle:”i-Catcher Console - Web Monitor”
      • intitle:axis intitle:”video server”
      • intitle:liveapplet inurl:LvAppl
      • intitle:”EvoCam” inurl:”webcam.html”
      • intitle:”Live NetSnap Cam-Server feed”
      • intitle:”Live View / - AXIS”
      • intitle:”Live View / - AXIS 206W”
      • intitle:”Live View / - AXIS 210″
      • inurl:indexFrame.shtml Axis
      • intitle:”Live View / - AXIS 206M”
      • inurl:”MultiCameraFrame?Mode=Motion”
      • allintitle:”Network Camera NetworkCamera”
      • intitle:”WJ-NT104 Main Page”
      • intext:”MOBOTIX M1″ intext:”Open Menu”
      • intext:”MOBOTIX M10″ intext:”Open Menu”
      • intext:”MOBOTIX D10″ intext:”Open Menu”
      • intitle:”netcam live image”
      • intitle:snc-cs3 inurl:home/
      • intitle:snc-rz30 inurl:home/
      • intitle:”sony network camera snc-p1″
      • intitle:”sony network camera snc-m1″
      • intitle:”Toshiba Network Camera” user login

      Turn Your Webcam into a Spy Cam for Free

       Turn Your Webcam into a Spy Cam for Free

       Turn Your Webcam into a Spy Cam for FreeYou can now easily monitor your room, office or workplace for activities going on during your absence without having to invest on expensive hidden cameras. If you’ve ever wondered to find a way to turn your PC webcam into a spy camera, here is a simple and effective solution. This can be really handy to monitor your children and pets in home or even catch a cheating spouse red handed! For this, all you need is a computer with an Internet connection and a webcam attached to it.
      If your computer meets the above simple requirements, then you are all set to go. The site provides a free solution to simply transform your webcam into a powerful spy camera in just a few steps. You can sign-up for a free account and start using the service immediately.
      Since UGOlog service runs as a web application from within the browser, there is no need to install any additional software on your computer. That means, when your spouse or children look through the installed programs, they don’t find anything that arouses suspicion.
      Turn Your Webcam into a Spy Cam for Free
      The following are some of the advantages of using UGOlog service over other software programs or a conventional spy camera:
      • Firstly, the service comes for free, so that you don’t need to buy anything to start with.
      • Unlike software programs such as “Webcam Monitor” which is complicated to configure and lacks stealth operation, UGOlog needs no installation and is simple to setup.
      • UGOlog comes with powerful features such as as motion detection, email alerts, and interval snapshots.
      • You have the option to view the camera remotely from anywhere just by logging into your UGOlog account.
      Turn Your Webcam into a Spy Cam for Free
      Once you’ve created your account, you can take up a quick tour and browse through the configuration guide to begin using the service. The free version of UGOlog limits the service for only 1 webcam and 50 MB of storage space. If you wish to setup more than one camera and need additional space for recording more videos, you can easily switch for paid plans as per your convenience.
      Win-7-home-key-sale  buy-Win-7-key  windows-7-key  windows-7-product-key  windows-7-pro-key  windows-7-activation-key  windows-7-ultimate-product-key  windows-7-professional-product-key  windows-8-product-key-sale  windows-8-activation-key  windows-8-pro-product-key-sale  windows-8-professional-product-key  Windows-8-Enterprise-key  Windows-8.1-Professional-key  windows-8.1-pro-key-sale  windows-8.1-kms-activation-key  buy-win8.1-key  windows-10-pro-product-key  buy-windows-10-product-key  activation-windows-10-key  Windows-10-key-sale  Windows-10-key  windows-10-product-key  Windows-Server-2012-R2-key  Windows-Server-2008-key  Eset-Nod32-Key-sale  Norton-360-key-sale  Microsoft-Office-2016-key  Office-2016-Key  Microsoft-Office-2007-key  Office-2010-product-key  Office-2013-pro-key  Office-2013-prouct-key  
      Windows 10 home key Office 2016 Product Key Windows 7 Professional Product Key Windows 10 Pro Key Windows 7 Ultimate Key Microsoft Office Professional Plus 2013 Activation Key