Sunday, May 17, 2015

Download Free Collection of 50 Hacking ebooks in PDF

Learn Computer Ethical Hacking is not so easy as Talking. Hacker is learn lot of book about Ethical Hacking. Hackers knowledge is more than a simple guy because he is not a simple guy.Here we provide you free hacking ebooks to learn hacking tricks for free online and Offline.These all hacking books are free for downloads.In this book list you learn about how to hack,cracking password,wifi hack and website hacking etc.These all books are a best guide for beginners.

Download Free Collection of 50 Hacking ebooks in PDF

These all books based on ethical hacking tutorials not for hacking.

Download Free Collection of  Hacking ebook in pdf format

All Hacking books in PDF format 

Download Prophet Hacker Blog Book for All type of Hacking (updated android hacking Edition) 

Download Link from Mediafire (10MB)

Black Belt Hacking & Complete Hacking Book
Hackers High School 13 Complete Hacking E-books
Penentration Testing With Backtrack 5
A Beginners Guide To Hacking Computer Systems
Black Book of Viruses and Hacking
Secrets of Super and Professional Hackers
Dangerours Google Hacking Database and Attacks


For Whatsapp Hacking ,Facebook Tricks Secrets, Android Apps browser our website.  
Read more ...

Thursday, May 14, 2015

How to Get Your Hacked Facebook Account Back.

If your facebook account was hacked by someone and you really want it back this tutorial would help you get it back.

Step 1:

First goto this link. https://www.facebook.com/hacked
Click the button "Your account has been Compromised".
Then type in your email address, Login name , Full Name or your specified Phone No.
Then facebook would search for matching users. If you still don't see your account, try entering something else other than the one you entered.
( for example if you entered your phone number and it didn't work try entering your email or Login name.) Most of the time using your email would be the wisest choice.)
And hit Search. :)

Step 2:

Well now the kind of difficult part begins. But I don't think it would be for you.
Now for this step you got to enter your account's password. Well if you knew the password you won't be here anyway, cause you don't know your new password the Hacker's changed, enter your old password. The password that you use, to enter into your account before you got HACKED :<

Step 3:

Then cause you entered an old actually now wrong password this page will come up.
Well no need to be down yet. Just click the reset my password button.

Step 4:

Your primary email would be changed so well of course you don't want to send your reset your password link to the hacker's account so, Click "no longer have access to these?" link.

Step 5:

Well now you almost got your account back.
Now write your new email address that you want to send the change password link as well set as your primary email.

Step 6:

Well now, follow the next steps and you would have your account back in 24 hours. XD
Read more ...

Images You Won't Believe Aren't Photoshopped

Email

#19. The Demon Cloud Awakens

Somewhere down on the ground, Brendan Fraser is running like hell away from that thing.
If you're one of the few people who don't see the face of a gigantic terror demon scowling at some poor soul out of frame to the left, congratulations, you have one of those brains that don't project gargantuan horror onto everyday things. For the rest of you: Yes, that's an unaltered photo and not bad CGI -- the picture was taken during an eruption of Cordon Caulle, which as far as we know didn't awaken a mountain-sized devil that then slowly swallowed all of creation.
And only slightly more terrifying ...

#18. Doppelganger Hasselhoff

This is the type of thing you see in your room when you're suffering from sleep paralysis. David Hasselhoff either constructed a manifestation of his own ego or is about to be eaten by a giant Steve Guttenberg.
Actually, that monstrosity is an oversized double of the Hoff created for that scene in The SpongeBob SquarePants Movie where SpongeBob and Patrick ride on David Hasselhoff's back and make everyone in the theater uncomfortable. But don't worry, we're sure that as soon as the Hoff and his double were alone together, he didn't stick his cock into its waiting mouth.

#17. Man With a Freaking Hole in His Head

Jesus! Are these all going to be horrifying?
If this one isn't Photoshop, then it's clearly a man who just underwent hours of makeup to be in a horror film. That's Eli Roth standing next to him -- of course this is for a movie.
Wrong! The fun-loving Cyclops in the picture is named Billy Owen, and he really lost his eye and part of his skull to cancer (notice the artificial palate in his hand). He saw the loss as an opportunity, though, so now he acts in horror movies and haunted houses, like Eli Roth's Goretorium in Las Vegas.
LasVegascitylife.com
Honestly, the makeup guys don't have to do much.
That's ... kind of a cool story, actually. If cancer eats part of your face, just embrace it. There's a market out there for everything.

#16. The City in the Clouds

This looks like a place where intergalactic smugglers go to hide from Boba Fett. Clearly someone just set a bucket of dry ice near a bunch of Puzz-3Ds and took a picture.
However, this CGI-esque photo is actually the city skyline of Dubai (which contains 22 skyscrapers that exceed 75 floors) jutting up through some fog. We imagine that the view you're seeing here can really revolutionize weather forecasting, seeing as how you can measure the altitude of cloud cover simply by leaning out the window.
Speaking of completely fake-looking weather ...

#15. The Happiest Tornado on Earth

Either someone on the ground is Care Bear Staring the hell out of that tornado, or a leprechaun is locked in an intense battle with a weather witch.
In reality, this a photo from the NASA website, of all places. The tornado seemingly colliding with a rainbow is the result of pure coincidence. Are we the only ones who'd pay money to hear the "Double Rainbow!" guy's reaction to this?

#14. Black-and-White Woman Badly Cropped into Fashion Shoot

WireImage/Getty Images
OK, somebody obviously just pasted a character from The Addams Family TV show into a picture of one of the strippers from Rock of Love. It doesn't even look like a good crop-and-paste job, look at her feet!
But this is exactly what you'd have seen if you were there -- the monochromatic woman in the picture is a contestant from RuPaul's Drag Race named Detox, who had herself dramatically painted by a makeup artist to create the illusion of a haunted photograph from the 1930s (similar to the black-and-white Santa we saw back in one of our previous installments).

#13. The Guy Sitting in This Chair Fell to His Death Long Ago

Via YouTube
This picture is so obviously fake, we probably immediately dismissed it the first time we saw it. You can see the strings, for crying out loud! The chair is clearly being hung in the air in front of a big photo of the Earth.
Actually, this is a still frame from a Toshiba commercial. Those strings are connected to a weather balloon, which they used to hoist the chair into space befuckingcause.
Via YouTube
Too bad the balloon hauling the TV popped 20,000 feet back.
The commercial was inspired by an art piece called "Escape Vehicle No. 6," and as you can imagine, some pretty awesome things happen when the balloon pops.

#12. Beached Cruise Ship

Either this is a scene from an upcoming Roland Emmerich movie, or that cruise ship was improbably placed on that cliff by the gentlest tsunami in history.
Actually, neither is true -- what you're looking at is the Sun Cruise Resort and Yacht in South Korea, a hotel that was deliberately built to look like a maritime disaster. Some designer looked at a luxury cruise liner and thought, "Man, that is great, but what if someone could build one of those on land?" without realizing that we already have those (they're called "hotels"). Then again, we'll all be apologizing when this thing springs its gigantic wheels and goes rumbling through the city, crushing everything in its wake.

#11. College Dorm Collage

This looks like four different Target ads pasted together in a flier to let the neighborhood know how terrible your personal taste is.
However, look at the spoon coming out of the coffee mug, and trace the arm of that desk lamp -- this is actually just a single photograph. Move the camera slightly and ...
Bela Borsodi
Ow! Right in the spatial awareness.
The "edges" of the seemingly different pictures were all created using perspective tricks -- you can see the artist setting the whole thing up in this video, although they seem to have edited out the portion where Jimmy bumped into the table and they had to beat him to death.

#10. Don't Walk Too Close, It'll Bite Your Head Off

Clement Briend
At best, this looks like the spirit guide that appears in our plucky main character's cul-de-sac toward the end of the movie to tell him that if he doesn't ask Jennifer Love Hewitt to prom or whatever, he'll regret it for the rest of his life. At worst, this is the lazy Photoshop you are rewarded with when you click on one of those "REAL EVIDENCE OF GHOSTS?" links.
It's actually the benevolent face of Buddha, part of an art installation in Cambodia where several images of cultural significance are being projected onto trees and such with 3D projectors.
Really, no religious artwork has done its job until it has terrified a drunk person trying to walk home at three in the morning.
Read more ...

Android Apps Lock

Smart AppLock is the best privacy protector with applock features, free to use and no ads, keep safe of everything! Use Privacy Lock to secure your photo, video, incoming call, contacts, SMS (messenger message), email, important files, games, apps, anything you want to lock & keep safe. Protect your privacy easy with Privacy Lock-AppLock&keep safe!
Smart AppLock 2 (App Protect) - screenshot thumbnailPrivacy security is our No. 1 concern when using smart phone! Privacy Lock aims to develop the best privacy protecting app and applock which can secure your privacy easy within one free & no-ad app. It is free, no ad , no purchase, absolutely clean, light and small size.
***free& no-ad Privacy Lock Features***

1) free protection for your android phone privacy;
2) Lock apps: protect any of your apps;
3) Lock Photo/Video: secure them in the safe vault;
Support preview;
4) Lock files: lock important files up in vault;
5) Lock/Unlock: Use password to secure apps, personal information;
6) Lock your photo, video, incoming call, contacts, SMS (messenger message), email, gallery, important files, games, apps, anything you want to secure;
7) Themes: Beautiful themes for your choice;
8) Profile : set your own profile, easy to lock/unlock;
9) Settings: more features in setting list
10) Advance protection: enable advance protection to protect uninstall
11) Hide Apps: hide the app icon from the screen


Download 
Read more ...

Wednesday, May 13, 2015

Simple Trick To Convert A Webpage To PDF File



webpage as pdf
In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started.



How To Save Web Page To PDF File ?

1. Open the Google Chrome Browser on your PC or MAC 
2. Then go to the web page that you want to convert as a PDF. 
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser. 
4. Now Change the destination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document. 
Read more ...

How To Open Banned Websites WIth Proxy Sites ?

How To Open Banned Websites WIth Proxy Sites ?

Open Banned Websites WIth Proxy Sites
There are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.



How To Open Banned Site ?

1. Open www.incloak.com in your browser.
You can also use any proxy site from list below
2. After that enter the URL of the site which you want to open like below.
Open Banned Websites WIth Proxy Sites
3. Now click the Hide Me button and enjoy.
Read more ...

12 Simple Steps To Become A Hacker

12 Simple Steps To Become A Hacker

Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look


1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.



2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
Read more ...

How To Reveal The Password Hidden Behind Asterisks




Features:
◦Reveals hidden passwords in dialog boxes and web pages
◦Cutting-edge recovery engine - passwords are instantly recovered
◦Full support for multilingual passwords
◦Easy to use
◦Easy to set up ◦Full install and uninstall support



- DOWNLOAD - FULL FREE
Read more ...

Tuesday, May 12, 2015

Make your Computer Welcome You

Make your Computer Welcome You

Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome.

Then you are at the right place, this article describes exactly how you can make your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."

Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-

  1. Click on Start. Navigate to All Programs, Accessories and Notepad.
  2. Copy and paste the exact code given below.
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
     3.  Replace Username with your own name.
     4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs".
     5.  Copy the saved file.
     6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
     7.  Paste the file.



 Make your Computer Welcome you at startup

Now when the next time you start your computer, Windows will welcome you in its own computerized voice.

Note: For best results, it is recommended to change sound scheme to No Sounds.
You can change the sound scheme to No Sounds by following the steps given below:-
  1. Go to Control Panel.
  2. Then click on Switch to Classic View.
  3. Then Click on Sounds and Audio Devices.
  4. Then Click on the Sounds Tab.
  5. Select No Sounds from the Sound Scheme option.
  6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu.
  7. Click on OK.
Change Sound Scheme to No Sounds

Try it yourself to see how it works. In my personal opinion, this is an excellent trick. Whenever I start my PC in front of anybody and the PC welcomes me, the fellow is left wondering how brilliant a computer do I have.
Read more ...

How hackers hack Facebook Account & How to stop them?

How hackers hack Facebook Account & How to stop them?

Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account.

hack facebook account
Facebook is one of the prime target of hackers!

Email Address Hack

I have always been puzzled by Facebook's leniency in this matter. All a hacker needs to do is know your email address and he will be displayed  a confirmation showing your name even if he enters the wrong password. How easily a hacker can then hack your Facebook account if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly. Until Facebook does so, here are some tricks you can use to protect yourself from this vulnerability.

How to safeguard your Email Address?
Just follow these steps:-

  1. Hide your Email Address from everyone by going to Edit Profile>Contact Information>Clicking on the icon beside your email address> checking 'Only Me'.
  2. Change your primary email address to a one that is only known to you by going to Account Settings>Email> and changing your primary email to the new one (known only to you) and removing your previous email address.
  3. For additional security, when in Account Settings, check 'Secure browsing' and 'Send me an email when a new computer or mobile device logs into this account' and click Save.

hack facebook
A hacker at work!

Phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebook and giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

How to prevent yourself from being phished?
At all costs, avoid clicking on suspicious links. Moreover, always check the URL in the address bar before signing in. Avoid logging in through various "Facebook widgets" offered by websites and blogs. Instead, use Facebook's homepage to sign in. Always try to use Safe Search while searching. If you do manage to get phished, report the website so that others may get a warning before visiting it.


hack facebook password

Keylogging through Keyloggers

Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

How to stop keyloggers?
Install a good antivirus and update it frequently. Do not click on suspicious links and avoid downloading illegal software. Also, avoid installing free toolbars and other such spam software. Always scan third-person's flash and pen drives before using them on your computer.



Social Engineering

Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your Security Question in a friendly chat or discussion.

How to prevent yourself from being socially engineered?
Stay aware during chats and discussions. Use a tough security question, preferably one whose answer you would never disclose to anyone. Moreover, Facebook, or any other company for that matter, will never ask you to change your password to 12345678 or do something as silly as asking you to send out your login details to prove that you are an active user. Always think before taking actions and your e-life on Facebook will be safe from hackers looking to hack Facebook accounts.
Read more ...

Google Tricks & Secrets

Google's engineers love to hide some pretty cool tricks at the most unexpected places. Add to that Google's policy of giving 20% of working time to its engineers to do what they want, and you have a search engine filled with lots of entertaining Easter eggs and tricks.

Sadly, most of these tricks are still a secret, but every now and then, Google employees leak these cool insider pranks and the whole world gets to know about them. Here, I have created a list of all such known Google tricks and Easter eggs that are still "working."
Google Tricks

Google in 1998
Search Google for "Google in 1998" and you will be taken to the past to a search results page that shows how Google looked in 1998.

Kerning
Kerning means adjusting the spacing between characters. So, how would you expect Google to describe it? Literally, off course. When you search Google for Kerning, the spacing of the word Kerning is changed as compared to that of other words. This only works with personalized results disabled.

Conway's Game Of Life
Conway's Game Of Life is a game that indicates how cellular life evolves based on the initial configuration. If you search Google for Conway's Game of Life, you will get a results page with the game running in the background.

Jason Isaacs
Just search for Jason Isaacs and Google will return a page saying Hello to him. This only works on Google UK. This is a reference to Kermode and Mayo's Film reviews which greets Jason with hello every week.

Bacon Number {Actor Name}
Kevin Bacon is a famous hollywood actor who was quoted as saying that he has worked with everybody in hollywood or somebody who has worked with them in 1994. This led to many websites being launched about his claim in 2007. Bacon seeing this immense response launched a charitable website called Six Degrees, which is based on a theory that everyone in hollywood has worked with Kevin Bacon through a chain of six acquaintances or less. An actor gets as many degrees as he is distant from Kevin Bacon's movies in terms of people in the chain of acquaintances.

Google too has now involved Six Degrees of Bacon in its search results. For example, searching Google for Bacon Number Johnny Depp gives Depp's Bacon number to be 2.

Google knows how to celebrate the holidays
Searching Google for a holiday will make Google return a page decorated with items representing that holiday. For example, searching Google for Christmas returns a page decorated with Christmas lights. This also works for Kwanzaa, Hanukkah, Halloween and Festivus. These Easter Eggs based on a festival are only activated when that festival is near.

Zerg Rush
Search Google for Zerg Rush and you will see the O's of Google attacking the search results page. They will attacking every result one by one. There is a health bar which indicates how injured a search result is. You can also kill these O's by clicking on them. They also have health bars which indicates their health. You get points on the basis of how many O's you kill. The aim of this game is to beat as many O's as possible.

Zerg Rush Google Easter Egg

Askew or Tilt
Ever had the chance of searching Google for Askew or Tilt? If you have, then you already know what comes up. If you haven't, do it now and you will see the search results page literally tilt to give you a better idea of what these words mean. This will work only if you use latest browsers which support HTML5 and CSS3. So, Internet Explorer users, use Firefox, Google Chrome or Safari for a while to use this.

Do a barrel roll
Google Tricks & Easter Eggs
'Do a barrel roll' in its true sense means to do a 360 degree spin. Google takes practical demonstrations way too seriously for this one and literally spins the search results page to give you a clearer idea of the meaning of this phrase. Don't believe me? Go search Google for Do a barrel roll now and see your world turn around.

This Easter egg is apparently a tribute to Star Fox, a video game series developed by Nintendo, because searching Google for Z or R Twice also does the barrel roll, just like in Star Fox. Many bloggers interpreted a lot of different things from this, but Google clarified that this fun trick was created by a Google Engineer solely for the purpose of entertaining users along with showing the power of new HTML5 and CSS3 technologies. Like the previous Easter egg, this will only work in modern browsers.

Binary, Octal and Hexadecimal Number systems
Another one of those literal Google Easter eggs. If you search Google for "Binary", "Octal" or "Hexadecimal" (without quotes) with Search Plus Your World disabled, Google will show the number of results in the same number system. For example, searching Google for hexadecimal will return the number of results like in the image below.

Octal, Binary & Hexadecimal

Recursion
The "Did you mean?" feature of Google often helps many users to get to the right results when they type something different from what they intended to search. If you search Google for recursion, the same feature takes you to an endless loop of clicks all linking to the same results page thereby completing recursion, which occurs when something calls itself. Seriously geeky.

Recursion Google Easter egg

Anagram
Another one of those "Did you mean?" Easter eggs. Search Google for Anagram and Google will instantly ask whether you meant "Nag A Ram" which is one of the anagrams of the word "anagram." Google really shows their word-playing skills with this one.

Asking Google to define Anagram makes Google ask if you meant nerd fame again.

ASCII Art
Are you a fan of ASCII art? Google surely is. Search Google for ASCII art and Google will greet you with a search results page having an ASCII version of the Google logo at the place where normal logo should have been. This Easter egg does not work anymore. When it did work, it looked like the image given below.
ASCII art Google Easter Egg

Google Calculator Easter Eggs: The loneliest number
Google Secrets
Do you know which is the loneliest number? Ask Google Calculator. Search Google for the loneliest number and the in-search Google Calculator will give one as the answer, which apparently is a tribute to the Harry Nilsson's song "One."

Once in a Blue Moon
Google Tricks Easter Eggs
Ever wondered how much is 'once in a blue moon'? You must have heard this phrase often but Google calculator will give you the exact value of this phrase and surprisingly, it denotes frequency rather than time. Go search Google for this to get "1.16699016 × 10-8 hertz" as the answer.

The number of horns on a unicorn
Want to know the number of horns on a unicorn? Google calculator can help. Searching Google for the number of horns on a unicorn will give 1 as the answer.

Answer to the Ultimate Question of Life, the universe and everything
Google Easter eggs
Google is omniscient. Even the "answer to the ultimate question of life, the universe and everything" is known to Google. Just search Google for the above phrase and Google calculator will give you an answer. What are you waiting for? Just go to Google and find the true meaning of life.

[Pause to give you the time to search]

Surprised by the answer (42)? This is a reference to The Hitchhiker's Guide to the Galaxy, a popular novel based on a radio show (by the same name) of the late seventies. Google engineers surprised you with these tricks, didn't they?

Recommended: Google : I'm feeling lucky tricks and jokes.
Read more ...