Skip to main content

How to Identify Fake Facebook Account Within Seconds.

Easily Identify the Fake FaceBook Account.

Whether it is Facebook or Fakebook ? 

trickntools.blogspot.com
 


How can you detect the Fake FB Profile. Now a days we are getting so many friend request specially by girls, but there is no way to find that account is fake or original. So don't worry I am  going to tell you simple method to detect fake Facebook account with in Seconds.


trickntools.blogspot.com

 This is a Facebook account which named by Sarikha Agarwal. Now we need to verify this account real or fake, so our first step is going to the images.google.com and click on camera image.




  So when you click on search by image you will get popup like below image.




 Now go to that profile, right click on image and click on copy image URL




 
After profile pic URL copied.. now again go to images.google.com Tab and paste image URL 


          
When you enter then you get related images search...



Now you can  see that this profile is real or fake..So here is a proof that this profile is fake. Enjoy the trick..

Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.
This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs..  

Be Safe Online.. And Have FUN..........

Comments

Popular posts from this blog

About Basic Networking Topology

           Basic Networking Topology This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies. Introduction The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server. If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star...

Check Your Mother Board Model Number ,Serial Number, Version, And Many More.

How to Check Your Motherboard Model Number on Your Windows PC Whether you need to update drivers, want to check hardware compatibility, or you’re just curious , it’s way easier to check your motherboard model number with these simple tricks than it is to crack open your computer case to check the board itself . Read on as we show you how to check your motherboard model number from the comfort of your keyboard. Why Do I Want To Do This? There are a variety of situations where knowing your motherboard’s model number is important: upgrading your drivers, buying new hardware (you’ll need the proper expansion slots for card-based upgrades and the right memory DIMMS for memory upgrades, etc.), and checking the capabilities of your board if you’re considering upgrading the entire thing.  First Way (SIMPLEST WAY):- In this way there is only two step :- Step 1:- Go to Run(By Pressing Win+R) . Step 2:- Type dxdiag in Run and hit enter . ...

How to Block Unwanted Websites Using HOSTS FILE and hack HOST file

Block or Redirect Unwanted Websites Using HOSTS File The hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the hosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another . In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.  Let's take some knowledge about host file. What is a hosts File? The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses . In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present i...