first get a hacking tool no need to worry where to find just go to http://www.youtube.com and search "Runescape Hacker" or "Runescape Hacker Download Link"
you will get the downloading link in comments zone
now you have downloaded the hacker tool but -Don't open the Runescape Hacker Tool, It may be Backd00red Instead place it in a Safe area!
download and install hexworkshop now dont ask for link...google is your friend
now right click on tool ,,you will see "Edit this with HexWorkshop"...click it
you will see a mess of words and alphabets symbols....dont worry dont get confused believe me its easy to do!
now press ctrl+f... a boz will appear
-Now Before start Finding Anything Make sure you change the "Hex" to "String" value.
-Now Enter "Gmail" to the Box and Hit "Find".
-You will Get Popping Up a Black area. Don't touch it. Instead see on your Right for the Texts.
-Copy the Highlighted text and Paste it in a Text document (Newly Created).
-Remove the [.]>DOTs and You will see The Email ID + the Passwd.
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.
Today, we are announcing an experimental new vulnerability reward program that applies to Google web properties. We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on our credits page. As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.
In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:
Q) What applications are in scope?
A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:
For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.
Q) What classes of bug are in scope?
A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded, however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:
* XSS
* XSRF / CSRF
* XSSI (cross-site script inclusion)
* Bypassing authorization controls (e.g. User A can access User B's private data)
* Server side code execution or command injection
Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.
These categories of bugs are definitively excluded:
* attacks against Google’s corporate infrastructure
* social engineering and physical attacks
* denial of service bugs
* non-web application vulnerabilities, including vulnerabilities in client applications
* SEO blackhat techniques
* vulnerabilities in Google-branded websites hosted by third parties
* bugs in technologies recently acquired by Google
Q) How far should I go to demonstrate a vulnerability?
A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.
Q) I've found a vulnerability — how do I report it?
A) Contact details are listed here. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the Google Help Centers.
Q) What reward might I get?
A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.
We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.
Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.
Superstar performers will continue to be acknowledged under the "We Thank You" section of this page.
Q) How do I find out if my bug qualified for a reward?
A) You will receive a comment to this effect in an emailed response from the Google Security Team.
Q) What if someone else also found the same bug?
A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.
Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?
A) We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.
Q) Do I still qualify if I disclose the problem publicly once fixed?
A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.
Q) Who determines whether a given bug is eligible?
A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.
Q) Are you going to list my name on a public web page?
A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.
Q) No doubt you wanted to make some legal points?
A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.
This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.
Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.
Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.
The emerging mobile company ‘Spice’ has become the first mobile company to launch 3D display mobile handsets in India. The new mobile hand set is lashed with several peculiar functions with the stunning function of 3D display screen named “View D”.
As per report of sources, View D makes user capable of experiencing images, videos and even the interface in 3D. The mobile hand set is laced with a specific kind of display screen know as auto-stereoscopic display and it will make the users to experience the 3D view without polarizer glasses(3D glasses).
Apart from the 3D display the handset is equipped with many other attractive features. The display of the mobile is designed in such a way that user can have its choice whether to enjoy the 2D or 3D view. The mobile has also an eccentric characteristic know as ‘remote wipe’ which deletes the mobile data remotely. This is done by sending a unique sms (the sms works as a command to delete the data) to the mobile phone.
Sleek and gorgeous looking View D is equipped with 2.4-inch screen; fine sound quality integrated speakers, 2MP camera, FM radio, MP3 player, GPRS, WAP and 16 GB expandable memory. The price of the stylish is Rs 4299.
At a press conference, the CEO of Spice Mobiles Mr. Kunal Ahuja said that the Spice View D would fulfill the latest demands of smart mobile phone users. He further added that they were very keen to bring something innovative, something technically cool and the latest launch satisfied their eagerness
Overview Body Type Bar
Battery Life/Talk time 4.5 Hours
Standby Talktime 260 Hours
Dimensions Width 51 mm
Depth 13 mm
Length 115 mm
Weight 70 g
Camera Camera Yes
Camera Resolution 2 MP
Display Display Size 2.3 inches
Display Resolution 240 x 320 pixels
Dispaly Type TFT LCD
Memory
Card Slot Yes
Complimentary Card N/A
Multimedia Features FM Radio Yes
MMS Yes
MP3 Player Yes
Connectivity Options
Bluetooth Yes
USB Connector Yes
GPRS Yes
WAP Yes
Technology Cellular Network GSM
SIM Type Dual SIM
Features Input Type Alphanumeric Keypad
Handsfree Speaker Yes