Free Spotify Method – Free for 2 Months

Free Spotify Method – Free for 2 Months

Free Spotify Method – Get Spotify Premium Free for 2 Months

Here is a simple and free Spotify method to get 2 months free on Spotify.


  • PSN account (You can make one –
  • Spotify account without premium

Once you meet the prerequisites go to:

Look for where it says “Link accounts to get started”

View post on

Log into Spotify through the Playstation website, and link your accounts and Spotify will give you 2 months of premium for free.


Free Dyndns: Create Free Dynamic DNS with a Free Domain

Free Dyndns: Create Free Dynamic DNS with a Free Domain


Free DynDNS: Create Free Dynamic DNS with a Free Domain

View post on

Need a dynamic IP for a Plex server for media streaming, a personal cloud storage server, NAS box, Remote Desktop or something else but you have a static IP? Then you will need Dynamic DNS, which will route your service through DNS to your IP, even if it changes.

There are a lot of options, free and paid, that will give you a dynamic DNS to use to be fair to the folks at DynDNS, $25/yr isn’t a lot to ask if you have something set up at home that you like to access on the go, like a Plex server for streaming media, a personal cloud with all of your important files, or maybe a small web server you have running in your house.o secure your IP settings even if your IP address changes. Over the years, these services have become more and more commercialized. Something so simple can cost you a lot of money, for what? And address? Some companies will charge you more for a dynamic DNS than an IP address. That is pure insanity. As of the time of writing this, charges $32.95/yr* for their service. Well, there are some benefits to that, like support and not having to really think about it. But if you want free DynDNS, and have some technical knowledge and can follow directions, this article is for you. This will show you another alternative to No-IP and DuckDNS, the first alternative we wrote about here: 

Step 1: Go to Freenom – Freenom lets you register free domains under the TLDs: .tk, .ml, .ga, .cf and .gq and manage the DNS or add the free domain as a pointer to another site like so:

Type in the domain name you want:

View post on

Step 2: Choose your TLD on the next page:

Free DynDNS No-IP Alternative

Free DynDNS No-IP Alternative

Step 3: Click checkout, then you will be able to choose your period (Choose 12 months) and DNS. Add your IP that you want your free DynDNS to be forwarded to.

Free DynDNS No-IP Alternative

Free DynDNS No-IP Alternative

Make sure to add under hostname a subdomain like so:

Free DynDNS No-IP Alternative

Free DynDNS No-IP Alternative


There you have it, that is all you need to do to get free dynDNS, without paying a single penny. When you go through all of these steps you will need to add an email address and create an account. Once you have done that I recommend you edit the default TTL time to a lower value than the default so the DNS records update more frequently. If your IP does change, just log back into Freenom and change the IP address in your settings.

Best Free Antivirus Companion: Zemana Anti-Malware Beta Registration

Best Free Antivirus Companion: Zemana Anti-Malware Beta Registration

Best Free Antivirus Companion: Zemana Anti-Malware

Here is something we stumbled upon, we thought about you and have decided to share with you an easy way to get the best free antivirus companion, Zemana’s anti-malware program. This anti-malware is a secondary anti-malware solution and can work with your current antivirus seamlessly. It is the best free antivirus companion, and it won’t be free forever. During the beta stage companies often need testers, so you are acting as a tester and are getting this software before any consumers.

Here is an except from their website to give you a better idea of the product:

Zemana AntiMalware –

Clean your computer in minutes, no matter how badly infected!

Simple one-click rescue for your computer, no matter how badly infected!
Removes unwanted apps, annoying toolbars or browser add-ons.
Rapidly neutralizes Viruses, Trojans, Rootkits, Worms, Spyware, and Adware!
Works with your existing security software without conflict!
All done in about 5 minutes!
Has a super-fast scan time (Smart Scan or Deep Scan)
  • Has a super-fast scan time (Smart Scan or Deep Scan)
  • Needs less system resource usage
  • Allows for selective scanning
  • Has a smaller installer size
  • Has an easier user interface
  • Needs no Signature File updates

To get this product free for 90 days, which is the length of their beta program, simply follow the instructions below.

First you will need to go to their website to get a key:

Then you will need to join their Google group here:!forum/zemana-beta-program/join

After you have completed this, you can download the program and activate it from the first link.

Once you have followed the above steps, you will see the program and able to activate it.

View post on

How to Remove a Dox: Footprint Removal

How to Remove a Dox: Footprint Removal

If you are here that means you want to remove a dox. Someone found some information on you and used it against you, or you just want to have privacy. You want your information erased. This simple guide will show you some easy ways to remove a dox, and it will also show you footprint removal to prevent a dox in the first place. This guide is meant to serve as a resource as we have many places you can use to find and delete data on yourself or others.

Searching for Footprints

The first thing you must do to remove footprints is to find them. You can find information on yourself by name, email, username or phone number.

Here is a list of sites you can use:

View post on

After you have found your target, your footprints, you can now move onto the removal phase.

Footprint Removal: Remove a Dox

Whatever information you find, you will need to log in to it and delete as much information as possible if not the entire account. Do you have a Facebook account you forgot about with your real name and family names attached? Find it, and delete it. Forums, blogs, social media etc can all be dangerous, but it can also be altered in most cases. The real problem arises when you don’t have access to the site you want to delete information from.

Pastebin is a popular place to post doxes, and they are easy to remove just by reporting them here:

Any other sites just contact the owner and see if they will remove the information for you. In most cases they will. Especially if you say the information can be used to harm you, who wants their members harmed? No one, no one I know at least.

Footprint Removal: False Foot Prints

Now, you will want to bury what you couldn’t delete and make a really hard to follow trail of false information. Better to make it somewhat believable: A few days off from your birthday, a city away from your actual house etc. You can use to make false footprints, just find and edit your information with fake info.

Removing Cached Content

Now you want to get rid of the cache from what you already got rid of. You can do so with the links below.




Removal Sites:


Beware: A Dangerous Windows 10 Ransomware Scam Is Spreading Online

Beware: A Dangerous Windows 10 Ransomware Scam Is Spreading Online

Beware: A Dangerous Windows 10 Ransomware Scam

So we saw this article and wanted to spread the message with you all. Please do not fall for this trick and stay safe online.  Source:

Windows 10 is now released and people are installing it on their PCs in huge numbers. According to the media reports, more than 67 million people have installed Windows 10 on their PCs. For those who were left behind in the upgrade process, Microsoft even decided to help them out with Windows 10 media creation tool. Unfortunately, scammers are taking the advantage of the desperation of Windows users- that has resulted in a newly reported Windows 10 ransomware scam.

According to the Cisco’s security team, they have found a new scamming campaign that spreads CTB-Locker ransomware. This trouble comes in the form of a fake Microsoft email, telling Windows users that their Windows 10 download is ready.

These messages in Windows 10 ransomware scam mimic the emails sent by Microsoft, along with some text mistakes and changes. However, scammers have managed to spoof the address of origin as To make the messages look more authentic, attackers are using the same color scheme used by Microsoft to fool the users. Thus, these emails look more legitimate.

The mail is also coupled with a Microsoft disclaimer and a message that files are virus-free. The origin of these emails has been traced back to Thailand.

What will happen if you run the CTB-Locker file?

Falling into this Windows 10 Ransomware trap, users download the .zip attachment. After extracting the files and run the executable program, your computer will be immediately locked by CTB-Locker ransomware. This ransomware tells the users to submit the payment within 96 hours, and failing to do so will result in the permanent encryption of PC files.


CTB-Locker uses elliptical curve encryption which provides same private/public key encryption with a different kind of algorithm. This new algorithm results in lower overhead and same security at a smaller key space.

Cisco’s security blog has written that this Windows 10 ransomware threat will increase until the attackers find new ways to monetize the compromised PCs. It advises the users to store their data as an offline backup. This Windows 10 ransomware phishing attack shows that such launches and events are targeted to trap users.

How to Port Forward Without Router Access

How to Port Forward Without Router Access

How to Port Forward Without Router Access

So you want to port forward without router access? Router restrictions sometimes make this hard, or even impossible. There are many methods to port forward without router access. Some methods are better than others at allowing you to port forward without router access. Some people use VPNs with Port Forwarding such as 143VPN, some people prefer the uTorrent method, which is much less stable than this method and the VPN method. By far, the most secure is the VPN method, but if you are not concerned about security and just want to connect to your Mine Craft server, this will work for you.Requirements:

Step 1:
Download the program and the prerequisites above. You will need these tools to port forward without router access.

Step 2:
When it is done, open it and it’ll look like this:

Step 3:
Press the button with “Connect”, you will be asked to allow your firewall to work with Java. Press allow.

Step 4:
Once you are connected you will be able to see all of your open ports.

How to Port Forward Without Router Access

How to Port Forward Without Router Access

Step 5:
Now we want to open a port, press “Create”.
Once you push create, it will look like this:

How to Port Forward Without Router Access

How to Port Forward Without Router Access

How to Port Forward Without Router Access

How to Port Forward Without Router Access

Now press “Add” and you will get this:

Now you write down your desired port in both boxes and press save.
For this tutorial I will use 25565 (Minecraft). Also make sure to write a description to your desire.

Step 6:
We have our portmapping present now, just press the preset we created, then press “Use”. You have now successfully port forwarded!


Why You Need a Private VPN Service

Why You Need a Private VPN Service

Do you want privacy from prying eyes online? Perhaps your parents are logging the traffic that goes through the router, or your school is (Which all schools and colleges log data.) Then you will need a Private VPN Service or a Private Virtual Private Network. What does a VPN do anyways? What is it used for?

Well, businesses, schools and any business setting uses a VPN for data encryption. This means they do not want people having access to the data being transmitted from their systems online, so they encrypt it through a VPN; A group of servers that are protected with several layers of security. A VPN will also protect you from your ISP seeing your internet traffic, so it is ideal to use a VPN for torrent or downloading anything your ISP could be interested in, that they really shouldn’t be.

For security we recommend 143VPN. They have servers that are logless, DDoS protected and offer port forwarding. They have locations all over the world. They do not allow torrenting, though. We recommend Torguard, specifically the proxy, for torrenting.

143VPN comes with a user-friendly Windows client for OpenVPN that connects via UDP and TCP. There are also many other options for other Operating Systems such as Mac, Android and iOS.

Securing your internet and being anonymous has never been easier

Use 143VPN to protect your Internet traffic from prying eyes, to protect yourself from DDoS attacks, to stream content worldwide and to unlock access to your favorite sites. Here is what they advertise on their site:


Netflix and Movie StreamingHave a small Netflix selection in your country? Connect to 143VPN to get access to various regions so that your Netflix experience is unlimited.


Spotify and Music Steaming

  • Bypass Geo-blocks, Access the World
  • Protection From DDoS Attacks
  • Multiple Protocols UDP and TCP
  • World Wide Locations
  • Custom Client
  • Port Forwarding
  • Logless Servers
  • Unblock websites
  • Bypass Censorship

Know your data is encrypted and cannot be seen by your ISP, wifi snoopers or Governments. Keep spying eyes out with 143VPN.

The best torrent VPN we highly recommend is Torguard , here is what they advertise on their website
  • Unlimited Speeds
  • Unlimited Bandwidth
  • x5 Connections Allowed
  • OpenVPN – PPTP – L2TP
  • StealthVPN – SSTP – IKEv2
  • 1200+ Servers in 42+ Countries
  • FREE 24/7 365 Support encryption
  • Anonymous VPN IP
  • Your IP address is considered your digital fingerprint. Prevent websites from identifying you or your location from your personal IP.
  •  Unblock Any Website
  • Unblock any website regardless of geographical location or firewall. Setup the anonymous VPN software in minutes, on any device.
  •  Stay Private Online
  • Stop snooping governments, ISP’s, hackers and employers from controlling or sniffing your online activities. Don’t let the web browse YOU!
  • Stealth VPN Service
  • TorGuard VPN can tunnel through even the most strict DPI firewalls in countries like China or UAE. Go Stealth with OpenVPN, SSTP & SSH Tunnels.
  • Private VPN Encryption
  • Encryption works. Be discreet when conducting business online with military-grade encryption. Your web history is no one’s business but your own.
  • World Class Support
  • Leave support to the pro’s. TorGuard helpdesk is made of qualified & dedicated individuals. We’re here 24/7 so you can get back to what’s important.


You need a Private VPN Service because you want peace of mind. You want to make sure no one is listening to your network, stealing your bank information and logging your data behind your back. If you ever connect to a Public Wifi Hotspot you are very susceptible to this kind of attack, so definitely use a VPN over this kind of internet connection.

Verizon LG G4 Rooted Available + T-Mobile, Sprint and AT&T

Verizon LG G4 Rooted Available + T-Mobile, Sprint and AT&T

The Verizon LG G4 Rooted, finally!

The geniuses at have outdone themselves once again, they have found a way to get the Verizon LG G4 Rooted , as well T-Mobile, Spring and AT&T. I emphasize the Verizon variant as it is usually the last one to get root and updates from the community, so I am double impressed.  Also a few other carriers were able to get root before. Yesterday they posted to XDA that they found an easy way to get the Verizon LG G4 Rooted, but if done wrong, even one step missed…you would have a paper weight. But if you are a risk taker, and can follow pretty straight forward instructions then you will have a Verizon LG G4 root

What is this?

Low Effort Root is a root for your LG G4, named such because this is a root we really weren’t too interested in releasing, but the phone is gaining critical mass so we figured waiting any longer would be a disservice to the community.
(We also don’t like that the root ends up being ~4GB, since we’re flashing whole new system partitions.)
We had originally planned on releasing an in-android root app, however time constraints on all the team members has prevented us from devoting the necessary time to it.

This root will root any LG G4, provided we have a pre-rooted system image for it. This is akin to ‘flashing a rooted odin’ image on a Samsung phone, as we’re simply writing a system partition that contains Superuser.
No exploits here, no trickery, just a plain and simple flash and be on your merry way.

Thank you XDA, we all love you for this.

Special thanks to: (Copied from XDA, but I thank them as well)

  • @thecubed – Paypal Donate -Thread OP
  • @IllegalArgument – Paypal Donate – “As usual, IllegalArgument is a genius. He also might be a mad scientist, it won’t surprise me when he achieves cold fusion somehow.”
  • @autoprime – Paypal Donate – “99.92% of testing for this root and pretty much all our other goodies get tested by autoprime – he’s awesome — he even wrote up the instructions for this root for me
  • @jcase
Get More Followers – Mass Follow Twitter –  Auto Follow Twitter

Get More Followers – Mass Follow Twitter – Auto Follow Twitter

Are you looking for ways to get more followers on Twitter? Besides relevant content and activity, one of the best ways to get followers on Twitter is by following people within your interest group. In the following guide, you will learn how to quickly follow 500 users who are relevant to a particular niche, or brand. You will be able to follow someone else’s followers. This is an excellent idea if you are a company looking to expand in social media and you have a competitor who is already relevant in the social media space. The best and easiest way to get Twitter followers is to mass follow Twitter accounts or auto follow Twitter accounts that are in your niche.

What you will need:

  1. A Twitter account
  2. Google Chrome Browser

If you have both of the prerequisites, please continue reading.

  1. First, you will sign up at for the free account with your Twitter handle. With the free account, you can follow up to 500 Twitter users per day. Tweepi also allows you to weed out and unfollow users.


Next thing you need to do is downloading and installing this addon: Tweepi Bulk Default Action

Once you are finished installing, you will see this in the top right-hand corner of Chrome with your other extensions if you have any.

Once Tweepi Bulk Default Action is installed, go to Tweepi and choose By @User’s followers and type the name of a  Twitter user that you wish to follow their followers. Of course, it’s best if you decide someone in your niche, such as Yahoo following Google’s Twitter followers to reach their demographic.

  1. Click Follow Followers

View post on


Usually, you would need to click every button to follow. However, the chrome extension you added earlier would mass follow Twitter accounts automatically. To auto follow Twitter accounts, simply push the button and check the next page when you have bulk followed the accounts.

View post on


The first time you can only follow 20 per page, but you can extend it to 40 if you post a tweet. The option is at the bottom.


Ashley Madison Hacked – Infidelity Dating Website Hacked

Ashley Madison Hacked – Infidelity Dating Website Hacked

Ashley Madison Hacked it has been reported, their private customer databases have been breached, and a small portion of the breach has already been leaked online. The website is a niche dating site, the niche, however, is far from okay for people to discover you on. It is advertised as a way to cheat on your spouse. Many people, after learning of the breach, are worried that their marriages are going to be ruined by this hack.


View post on

What was included in the hack was credit card information, names, addresses and more personal information on their clients. Even people who have paid to have their profiles removed had their data stolen as the company lied about deleting the data and still retained all of their information. They simply hid the information from the public eye. The hack was done by hacktivists who claim the company is a fraud, a scam and if they do not take down their websites that they will lose even more. “We are not opportunistic skids with DDoS or SQLi scanners or defacements. We are dedicated, focused, skilled, and we’re never going away. If you profit off the pain of others, whatever it takes, we will completely own you.”

Their message can be found here: