Skip to main content

How to Create Friend Circles on Facebook Like Google Plus - CircleHack



    Create Circles (Friends, Family..etc..etc..) Like Google Plus on Facebook. Yes! This is Possible Friends, I am not Joking. Today I came through a very Intresting website where you can Make Circles of your friends on Facebook Like Google Plus. As you know Google Plus introduced the Concept of Circles to Organise the Friend List. But it is yet to be introduced by Facebook Officially So what if we want the Circles like Google Plus in Facebook. Don't worry there is a Trick to make Facebook Account Like Google Plus through which we can make Circles in Facebook and can organise the Friend List like Google Plus easily. So why Late?

To use this Trick just follow these Simple Steps:

  • Login into your Facebook Account.
  • Now Open a new Browser Window or Tab and visit this Link
  • Now Click on the Login Button and then it will ask to Grant Permissions.
  • Then after Granting Permissions, click on Allow button to see all your Friends in the Upper Half and Circles in the Bottom Half of the Screen.
  • Now it is Done. and Now you can Create New Groups by Clicking on the Create List in the First Circle and after Creating a Group Drag and Drop Friends from the Upper Half of the Screen to Circles just similarly to Google Plus.
    So it is Very Simple Trick to make Facebook Account Like Google Plus.
    If you have any doubts in this Trick then Please feel free to ask in the comment section below. Enjoy..!!

Comments

Popular posts from this blog

SESSION HIJACKING

What is Session Hijacking ? Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web application session while that session is still in progress. TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine. Techniques : There are mainly three methods used to perpetrate a session hijack. These are: 1. Session Fixation: The session fixation attack is a class of Session Hijacking, which steals the established session between the client and the Web Server after the user logs in. Instead, the Session Fixation attack fixes an established session on the victim's browser, so the attack starts...

Cookie Stealing Attack:Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail , Hotmail , Skype and yahoo etc. Using this method you can hack Any Account like Facebook , Twitter , Gmail ,Hotmail ,Skype and yahoo etc. this works At LAN( local Area Network ) . its best place to hack at university, cafe , public place where computer are on one LAN simple Example WI-Fi. What is Cookies And how the use of stealing cookies? Cookies are file’s that stored on Any computer’s By any website when a you visits them . the cookie used by the web server to check the authenticate the Real user . like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file . both are matched when you open a Account. so then finally we will start .  Step 1: Download the Wire Shark and install it.  Step 2: Next open the wire shark and then click on interface.  Step 3: Next choose a interface w...

How to Hack a Website ?

How to Hack a website First find a Vulnerable Website? Common Methods used for Website Hacking There are lots of methods that can be used to hack a website but most common ones are as follows: 1.SQL Injection 2.XSS(Cross Site Scripting) 3.Remote File Inclusion(RFI) 4.Directory Traversal attack 5.Local File inclusion(LFI) 6.DDOS attack Tools: Acunetix: Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities. Nessus: Nessus is the best unix venerability testing tool and among the best to run on windows . Key features of this software include Remote and local file security checks a client/server architecture with a GTK graphical interface etc. Retina: Retina is another Vulnerability Assessment tool,It scans all the hosts on a network and report on any vulnerabilities found. Metasploit Framework: The Metasploit Framework is the open source penetration...