E-BOOK HACKING

Written By thehipsterscoders on Saturday 29 December 2012 | 20:26

Pengen belajar jadi hacker emang susah apalagi masih newbie, kaya ane,  perlu panduan dari yang ahli tuh… Banyak baca artikel tentang hack juga perlu ,,,   Nyari-nyari tutor tentang hack emang gampang-gampang sulit.. Apalagi kalau tutornya yang ada buat yang expert semua, pasti bingung…. Nah ane punya e-book buat kalian yang masih newbie yang mau belajar hacking nih,… Langsung aja download dah…
1. Devilzc0de Ezine #1
Devilzc0de Ezine #1
Download : http://www.4shared.com/file/213073553/4571867f/Devilzc0de_Ezine_1.html
or         http://www.indowebster.com/Devilzc0de_Ezine_1.html
2. Belajar PHP dan MYSQL Bareng Newbie V.1
Belajar PHP dan MYSQL Bareng Newbie V.1
Download :http://www.4shared.com/file/129816287/b542c939/Belajar_PHP_Dan_MySQL_Bareng_Newbie_V1.html


UNLOCK ANY PHONE SECURITY CODE

Written By thehipsterscoders on Thursday 27 December 2012 | 03:35

This will help you to unlock your nokia phone if you forget your security code by giving you a MASTER CODE
1. You can get “Nokia MASTER CODE” for your phone using ur
phone’s IMEI.
2. Visit http://www.nokialockcode.com/calculate.php
3. Enter your IMEI number and click on calculate button.
4.After getting your phone’s master code use it in the place of security code.

For other phones like Samsung , LG, motorola , siemens and so on.
1. First of all for you is to download a 150kb “MASTER CODE UNLOCKER” to your computer and then you can get the master code  which you can use it to unlock phone.
2. Download software from here.
3. Download and extract from Winzip or Winrar
4. Then install it on desktop and Open the installed file.
5. select your phone and enjoy unlocking.

FAKE CALL YOUR FRIENDS USING ANY MOBILE NUMBER


People usually try to bring something new and try them on their friends so that they can impress them and side by side depress them with their funny pranks. So pranking has become a latest fashion in todays world so some people prank physically and some mentally so we have already posted many articles on different pranking methods you can use to depress or make fun of your friends.

Today we are taking it to a new level by revealing you another amazing online fake callingservice called “CrazyCall”. This service is simply unbelievable and works quit perfect, so there is no point of saying that this service is useless as I have tried it and it works perfect. Some of you might have used it but some of you don’t know what is Crazy Call, so okay for all those who do not know what is Crazy Call it’s a simple online service which connects your call through their server to anyone you wanna talk in the world.

Crazy Call is not a free service as it charges with their international call prices but well if someone want to prank with you than some price cost is nothing to matter. So you should check steps below to see how Crazy Call works.

FOLLOW BELOW STEPS-

1. Visit CRAZY CALL WEBSITE

2. Now you will be on their website which looks something like below .:



3. Now you can see that theirs a Green Box above in the image asking you too choose country and than insert numbers you wanna display and make your call too, insert everything like below I have done in the image..

4. Choose the country like I am in India and than the Number you wanna display like I have put 9191919191 you can put any number you wanna display and than put the number you wanna make your call too like 999xxxxxxx and choose in which voice you wanna make your call to, this is the best option and if you do not know about this thing this feature will simply manipulate your voice into female or harsh male really awesome.
5. Now click on GET ME A CODE and you will than navigate to their another page which will give you two numbers to call and a code which you have to enter when your call is connected.


6. So now you can call any one of those numbers above, two numbers are given just in case you are not able to call with one number you can connect your call with another one and than when your call is connected the computer asks you to enter the code you see above just enter that and boom your call will be connected with your friend displaying him the fake number you entered.
7. So now enjoy this fake call and make your friends cry, tell them it’s a call from their college and they have been suspended for not attending lectures or anything you know better than me how to prank them make sure to read the below Warning.
warning
The call costs you with International Prices, it works good but it costs like Rs. 15 for 1 Minute call, and from my experience I tried it out and the service was good there is no advertisement or anything but it charged me like Rs. 30 for 2 Minute so beware of it only use this service if you really want some serious prank else do not use this service.

4 WAYS TO CRACK A FACEBOOK PASSWORD AND HOW TO PROTECT YOURSELF FROM THEM

Despite security issues that have plagued Facebook for several years, people keeping staying around and new people keep on signing up. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives.

But we seemingly forget who's watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's merely with the visible information we purposely give them through our Facebook profile.



The scariest part is that as technology advances, we become more susceptible to hacking. As if we didn't already do a great enough job to aid these hackers, they can get into our emails and Facebook accounts and steal every other part of our lives that we intended to keep away from prying eyes.

And you don't have to be a professional hacker to get into someone's Facebook account.

It can be as easy as letting Firesheep run on your computer for a few minutes. In fact, Facebook allows a user to get into their Facebook without knowing their password. All they have to do is choose three friends to send a code to. You type in the three codes and voilร —you're into the account. It's as easy as that.

These are a few other ways that hackers, and even regular folks, can hack into someone's Facebook account and ways to prevent it from happening to you.

Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section. 
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account. 
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these? 
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account. 
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account. 
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends. 



  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password. 




How to Protect Yourself 

  • Use an email address specifically for your Facebook and don't put that email address on your profile. 
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook. 
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account. 
Use a Keylogger

Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.


Hardware Keylogger 

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.



How to Protect Yourself 

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious. 

  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in. 

  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible. 

  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless. 
Phishing
This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type ofphishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.



If you want to know how to do this, follow the detailed instructions onHacker9's website. Users are very careful now with logging into Facebook through other links, though, so that only adds to this already difficult process.

How to Protect Yourself 

Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. Check the URL. If you're still doubtful, go directly to the main website and login the way you always do.
Phishing isn't only done through email. It can be any link on any website. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
Use an anti-virus like Norton or McAfee. 

Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account.



Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.



How to Protect Yourself 

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies on HTTPS, so try to steer away from HTTP. 
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off. 
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it. 
  • Use a VPN. These protect against any sidejacking no matter what website you're on. 
Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn't something you should steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

Images by Digital Trends, Avitricks, eSecurity Planet, Phishing1122, Tech-Glide




HOW TO CREATE A PROGRAM FOR SENDING SPAM AND EMAIL BOMBS IN VISUAL BASIC 2008

Written By TAC Team on Wednesday 26 December 2012 | 23:54

Looking for a program that will let you send out mass emails or spam? Or maybe you're just looking for a way to prank your friends or get revenge by sending them an email bomb? If you have Visual Basic 2008, you can write your own program that will ensure the recipient never forgets what you sent them! This video gives you the basic code to set up the program, and you can tailor it to your own needs quite easily.

VIDEO:


DISCOVERING NETWORK VULNERABILITIES WITH GFI LAN GUARD

AUTHOR: Paul Cunningham

REQUIREMENTS:
•    Windows XP SP2 or Windows Server 2003 SP2 computer
•    .NET Framework 2.0
•     GFI LANguard

INTRODUCTION

A typical business network is made up of many computers each of which represents a potential security hole for the network.  As networks grow the effort to manage these security risks grows as well.  Although different vendors provide management tools specific to their products these do little to reduce the administrative burden of managing all of the different elements of the network.

GFI LANguard offers a single, centralized solution for IT administrators to scan the computers and servers on the network to detect and resolve security threats.  GFI LANguard is available both as a licensed product for larger networks, and also as a free, full featured version for scanning up to 5 IP addresses.

INSTALLING GFI LANGUARD

In this demonstration I will walk through the installation of GFI LANguard on an administrator’s Windows XP desktop.
To install GFI LANguard download the free trial from http://www.gfi.com/lannetscan to the computer.  Launch setup and step through the installation wizard.  If your computer is missing the required .NET Framework 2.0 it will automatically be downloaded and installed by GFI LANguard setup.



SCANNING THE NETWORK FOR VULNERABILITIES
To scan the network for security vulnerabilities launch the GFI LANguard console and click on Full Scan on the start page.



You can choose to scan the local computer, a single remote computer, or the entire domain/workgroup.  In this example I will scan the entire domain/workgroup.  Click the Scan button to begin scanning the network.



When the scan has finished click on Analyze to see details of the vulnerabilities that were discovered.



Examine any of the scanned computers to see a summary and statistics of the vulnerabilities that were discovered.



Scroll to the bottom of the results and click Remediate to begin fixing the security vulnerabilities.

FIXING SECURITY VULNERABILITIES

A remediation task that you can perform is the deployment of missing Microsoft security patches.  Select the computers that you wish to deploy patches to and then click the Start button to launch the deployment.



CUSTOMIZING GFI LANGUARD SETTINGS FOR AUTOMATIC REMEDIATION OF SECURITY VULNERABILITIES

While deploying patches in the previous task you may have noticed that the patch files needed to first be downloaded from Microsoft before they could be deployed to computers on the network.  You may also have noticed that after the patches were deployed nothing else happened, such as the computers restarting.  This is because of the default patch deployment settings in GFI LANguard.

GFI LANguard can be configured to perform scheduled scans and automatic remediation of missing security patches, including restarting computers to complete the installation of security updates.  To achieve this we must first modify some of the default settings for GFI LANguard.

In the GFI LANguard console click the Configuration tab and navigate to Patch Auto-Deployment.  Click on the link marked “To automatically approve patches and/or service packs click here”.



Tick the box to enable automatic approval of all patches.  Service packs can also be auto-approved but many administrators prefer to manually approve service packs so as to better manage the deployment of such a significant update.  Click OK when you are done.



Next we change the patch auto-download setting.  Navigate to Patch Auto-Download and click the link to modify the settings.



Tick the box to enable patch auto-download.  To save on disk space choose “Only needed patches” so that only those patches that a GFI LANguard scan has determined are needed for the network will be downloaded from the internet.  Click OK when you are done.



The final step is to configure a scheduled scan.  On the Network Audit tab of the GFI LANguard console click Set Up a Scheduled Scan.  Choose a scan type appropriate for the network.  In some environments it is more suitable to configure different scheduled scans for different subnets on the network.  For smaller environments scanning the entire domain or workgroup at once is preferable.



Tick the box for each domain or workgroup that you wish to include in the scan, and click Next to continue.



Choose a recurrence for the scheduled scan, such as daily or every 4 hours, and click Next to continue.  You can also choose to wait for offline machines to be connected to the network.  This allows GFI LANguard to maintain a list of machines were not online and scan them as soon as they are back on the network.



Choose the scan profile that you want this scheduled scan to use.   A Full Scan may be suitable for weekly scans whereas other more specific scans such as open firewall ports or missing security patches can be scheduled more frequently.



Specify any special credentials that are required for this scheduled scan.  In this case the GFI LANguard service account used has administrative access to all Windows computers targeted by this scan and so it can be used as the credentials.



Configure auto-remediation settings by ticking the box to automatically download and deploy missing patches.  Then click the link to configure auto-remediation options.



Change the “After deployment” settings to reboot the target machines, but to let logged in users decide when to reboot.



At the final step review your scan summary.  You can also configure alerting options to automatically receive email reports for scheduled scans.  Click Finish when you are done.



CONCLUSION

In this demonstration we looked at using GFI LANguard to proactively scan your computer network for vulnerabilities, and to automatically remediate those vulnerabilities by downloading and installing missing security patches.  A free 30 day trial of GFI LANguard can be downloaded from http://www.gfi.com/lannetscan.

INSTALLING GOOGLE CHROME IN BACKTRACK 5

Written By TAC Team on Monday 24 December 2012 | 03:40









Friends ,

Many asking how to install the Google chrome browser in the backtrack 5, today we will be seeing how to install that



Let us see the steps

1.In the root type as

apt-get install chromium-browser



2.change to chrome-browser directory

 cd /usr/lib/chromium-browser



3.Type the following command

 hexedit chromium-browser



4.You will be getting the hex-code ,


Here you have to search for geteuid and replace with getppid

press TAB and search (CTRL+S) for geteuid and change it to getppid and press CTRL+X ,

it will ask to save or not press 'Y' and close the terminal

and go to the Applications --> Internet --> Chromium Browser

and check whether the browser installed properly or not and enjoy the Backtrack.

INSTALLING NESSUS ON BACKTRACK 5R3

Hello Friends,

Today i am showing how to install Nessus on Backtrack 5 R3

First go to the Nessus Website and register by clicking here

the Activation code will be send to your e-mail ID, Now take the Activation code

Open an new terminal in Backtrack 5R3  and type the following command to download the Nessus

apt-get install nessus

after complete download next type this command

root@bt:/opt/nessus/bin/nessus-fetch --register xxxx-xxxx-xxxx-xxxx-xxxx

it will take some time so that the plugins will be updated

Now add an user to the Nessus by using this command,

root@bt:/opt/nessus/sbin/nessus-adduser

now it will ask for username and password,after entering the username and password you have to start the nessus by typing the following command.

root@bt:/etc/init.d/nessusd start

it will start the nessus, now open the browser and type the following command in the URL of the browser

https://localhost:8834/

The nessus will run on the secure channel https and on the port number 8834

Bydefault the nessus will run on port number 8834

after installing you just have to run


Thank you.

Nmap BASIC IN BACKTRACK 5

Written By TAC Team on Friday 21 December 2012 | 23:40

backtrack has its nmap installed inside, the use of nmap it to scan other computer ports. it is the part of penetration testing. after we know what ports opened and what application possibly installed on computer, we can go further by trying to attack the application.

nmap logo
nmap basic, taken from http://nmap.org/bennieston-tutorial/
nmap has some basic options :
1. -sT : TCP Connect, using method connect(), we can determine wheter the port opened or not, but it is easily to detect by firewall/intrusion detection software.
2. -sS : SYN stealth scan, using syn to begin connection then sending rst to stop initiation connection, so that no connection will be made. it results in harder detection.
3. -sF, -sN, -sX : FIN, NULL, Xmass Tree Scan. FIN will send Fin Flag, Null will set no flag and Xmass Tree sets the FIN, URG and PUSH flags. It is used to avoid system detection.
4. -sP : Ping Scan , scan with ping command to determine whether the target online or not
5. -sU : UDP Scan , scan port with UDP packet.
6. -sO : IP Protocol Scan, scan port using ip raw packet.
7. -sI : Idle Scanning, more advanced scanning mode
8. -sV : Version Detection,
9. -sA : ACK Scan,
10. -sW, -sR, -sL : Window Scan, RPC Scan, List Scan,
using those basic options we can determine the ports opened in target.
example command
1 open terminal
2 enter the command
nmap -sS 127.0.01
so it will look like this
#rootbt: nmap -sS 127.0.0.1
Host is up (0.0021s latency).
Not shown: 991 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
143/tcp open imap
445/tcp open microsoft-ds
3306/tcp open mysql
10000/tcp open snet-sensor-mgmt
Nmap done: 1 IP address (1 host up) scanned in 7.06 seconds

HOW TO BOOST FIREFOX BROWSING SPEED USING SPEEDYFOX

Written By arunkumar on Monday 10 December 2012 | 08:35


HOW TO INCREASE SPEED
 1. First You Need To Download Speedyfox So Click Here For Download Speedyfox.

2. Now Run It

3. Now Firefox Should Be Closed .



4. Now it will run it's process will complete within few seconds and give you sucess Message Like Above  Images in 3rd step.





5. That's It Now Just Enjoy Faster Firefox Speed :)

INSTALLING WINDOWS AND LINUX ON THE SAME COMPUTER

Written By TAC Team on Tuesday 4 December 2012 | 06:38


SabrinaSouza asked the 
Answer Line forum how to install Linux onto a PC without losing Windows.
You can pick from many versions of Linux, but I'll confine my instructions here to Ubuntu. It's popular, it's powerful, and it plays well with Windows.
There are other versions that I'll recommend for specific jobs (such as diagnosing an unbootable PC), but for learning Linux and possibly using it for productive work, Ubuntu is the best choice I know.
You download Ubuntu in the form of an .iso file, which is an image file of a CD--in this case a bootable one. Double-click the file, and a program will likely come up and walk you through the process of burning the disc.
If no such program pops up, download and install the Active@ ISO Burner, then try again.
Another option: Use the Universal USB Installer to create a bootable flash drive out of that same .iso file. I actually prefer the flash drive; it's faster.
So what can you do with this CD or flash drive? Plenty, but I'll give you three options:
Just Boot It
Ubuntu is a live version of Linux. You don't have to install it. You can simply boot it from the CD or flash drive, and, when asked, say you want to run rather than install Ubuntu.
This works for getting a feel for the operating system, but not for actual work. For instance, the contents of Ubuntu's Document folder disappears when you reboot.
Install Ubuntu Within Windows
You can actually install Ubuntu as a Windows program, although you can't launch it as one.
Insert the CD or flash drive. If nothing starts up automatically, open the drive in Windows Explorer and run wubi.exe. Select the option Install inside Windows, and follow the prompts.
When you reboot after the install, your PC will boot Linux and start setting it up. This can take a long time--especially if you're using a CD. Be patient.
The next time you boot, and with every boot afterwards, you'll get to pick between Windows and Ubuntu. And you can uninstall Ubuntu like any other Windows program.
Install Ubuntu in a Virtual Machine
You can run both OSes simultaneously by installing Ubuntu inside a virtual machine (VM). In a VM, software imitates hardware so that you effectively run one computer inside another.
I can recommend two free VM programs: VMware Player and Oracle VM VirtualBox. Ubuntu installs just fine in either of them. VirtualBox is more powerful, but I find VMware Player easier for the virtual machine novice. (Yes, I know that I recommended VirtualBox just last week, but that was for a Windows 8-specific job.)
By the way, you don't actually need to burn a CD or prepare a flash drive to install Ubuntu inside a virtual machine. Both VMware Player and Oracle VM VirtualBox can install directly from the .iso file.


SEVEN PREVIEW SECRETS YOU NEED TO KNOW (MAC)


preview-logoApple has made it easy for its users to enjoy amazing quality applications already on-board the computers from day one. From creating high quality movies in iMovie to hit songs in GarageBand, you don’t have to pay a boatload (or anything at all) for a great experience on Mac. However, one aspect that has been ignored is high quality document management on Mac. Many individuals would just go out to purchase Microsoft Word or iWork. While for heavy document management, that is a must still, Preview for Mac has taken document viewing to a whole new level. Today, we will take a look on how Preview makes document interaction much more productive.

Lock it in

preview secrets: lock it in
When you are sharing documents, there are times when you want to ensure that nothing in the document is changed. Even when you are viewing the document yourself, the same may apply. For example, to prevent an accidental change or mistake.
To receive a prompt before making a change to a document, or to prevent such from being possible with a shared document, it may be best for you to lock it up. This is very simple to do with Preview. Simply click the drop down options arrow next to the document name, and click “Lock”. To unlock, perform the same steps but this time clicking “Unlock”.
It’s a simple feature that is easily overlooked, but super helpful.

Going Back in Time

preview secrets: back in time
Looking more into document changes, there can be times when you make a change to a document in Preview, but find it difficult, impossible, or slightly repetitive to continue to click “Command + Z”. If this is the case for you, Preview has a sort of Expose-like feature that allows you to go back in time through your document, viewing the different versions automatically saved, to see an older version.
This is helpful in many ways. First off, it’s a perfect way to retrieve a document during an unexpected closure due to a shut down or an unresponsive application. It also allows you to show off a previous change, for example, when comparing a before and after version of a document.

A Study Companion

preview secrets: study companion
While reading a PDF document in Preview, you can annotate the reading by highlighting, adding text, putting in a couple of sticky notes, and even a few thought bubbles.
The annotation features are available all in one area, at the top that has a highlighter symbol. When clicked, you can choose a color (Yellow, Green, Purple, Blue, or Pink), and get going. To underline or strike through, when clicking the same section that you choose colors, you have the options for both right under the color options.
To create a sticky note, add a speech bubble, or a comment, simply click the button immediately to the left of the search box. This reveals more editing options. You can create a box, oval, line, arrow, annotate with text, add a comment or thought bubble, add a sticky note, and others.

Merge and Rearrange

preview secrets: Merge and rearrange
If you find yourself with a document that is a bit out of order or in need of grouping, Preview allows you to do so. The program also allows you to merge more than one PDF document into one central, multi-paged one. Further more, if you have a document with too many unneeded pages, it is very simple to delete pages as well.
To merge PDFs, simply drag in the PDF into an existing opened PDF window in Preview. To delete a page in a PDF document, simply tap + delete. To reorder a PDF document in Preview, simply click and move down or up to either order you’d love it to be. Lastly, to merge pages (for better grouping), simply drag a page over a second page.

A Bit of Photoshop

preview secrets: A bit of photoshop
Preview, by no means, is a bona fide photography editing software. However, there are some features in Preview that allow you to make minor adjustments. You can make use of tools like lasso, magic wand to touch up your images.
Another photo editing feature is the color enhance tool. Found in “Adjust Colors” under the “Tools” menu option, color enhance and adjustments allow you to make iPhoto-light photo changes to your image. This is useful if you are looking to make the same adjustments in iPhoto, but don’t have the time to wait for it to load, import, and process.
preview secrets: Color enhance

Signed, Sealed, and Delivered (signatures for Preview)

preview secrets: Signed, Sealed and delivered
The ancient way of signing a digital document is to scan your signature, hope it’s clear enough, and then paste it into the document. Preview has a feature that makes this a bit easier and seamless. Using the iSight camera, simply take a one-time photo and save it to your Signatures queue. When you need a signature, it’ll be there.
To find your signature or add new ones, simply reveal the “more options” tab. This is revealed by clicking the button found directly to the left of the search box. Then click the signature button (the ninth option from the left) that is shown with an “S” graphic above a line.

Share a Doc

preview secrets: Share a doc
The last feature of Preview is the sharing feature. In Preview, you have the ability to share a document through email, Messages, Airdrop, Twitter, Facebook, Flickr, or by exporting it to iPhoto. Sharing options are revealed by choosing the share button on the left side, next to the zoom options.
Let us know in the comment section how the Preview secrets (or lesser known features) above help you with your productivity.

Popular Posts