Google+ bgs: 07/01/2011 - 08/01/2011
Be the reason of someone's happynes, and never be a part of it. Be the part of someone's sadnes, and never be the reason of it...

Use Windows 7 forever without activation......


Many of you might be aware of the fact that it is possible to use Windows 7 for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the period from 30 days to 120 days. In this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year. Here is a way to do that.....

1. Goto “Start Menu ; All Programs ; Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.


2. Now type the following command and hit enter

                slmgr -rearm

3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.

4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE \ SOFTWARE \ MICROSOFT \ WINDOWSNT \ CURRENTVERSION \ SOFTWAREPROTECTIONPLATFORM

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

120 days using “slmgr -rearm” command before registry edit + 240 days using “slmgr -rearm” command after registry edit = 360 Days

OR
Click here to download the tool.......

 

Hack Software and Run the Trial Program Forever


In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
FOLLOW THESE TIPS 
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on july 30 2011, always inject the date as july 29 2011 in the RunAsDate.

How Windows Product Activation (WPA) Works.......


Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer.
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
  • Display Adapter
  • SCSI Adapter
  • IDE Adapter (effectively the motherboard)
  • Network Adapter (NIC) and its MAC Address
  • RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
  • Processor Type
  • Processor Serial Number
  • Hard Drive Device
  • Hard Drive Volume Serial Number (VSN)
  • CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.

What if a computer running a pirated copy of Windows attempts to activate?

The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
  1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
  2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.

What if I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.

Some things WPA does not do

  • WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
  • If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
  • WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
  • WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.

How do Email Spam Filters Work


Spam FilterIf you are the one who works with emails on a daily basis, you are most likely to be using a SPAM FILTER to ease the job of sifting through a large number of spam emails every day. Needless to say that spam filters do make our job a lot simpler by automatically filtering out the spam without which it is almost impossible to manually filter the junk emails that arrive in millions each day. However, it is often necessary to have a basic knowledge of how spam filters work and on what basis they flag an email as spam.

How Spam Filters Work?

There are different kinds of spam filters:

Header Spam Filters

Header spam filters work by examining the header information of a particular email message to check if it appears to have been forged. The header of every email contains information which tells the origin of the email. ie: The incoming email ID and usually the IP address (server address) of the sender. So spammers often forge the header to input a false sender ID and IP address so as to make it difficult to trace them. Thus if an email is supposed to have a forged header or if the same message is found to have been sent to multiple recipients, it is most likely considered as a spam by many filters. This method of spam filtering is often quite effective, however occasionally it may result in some of the requested newsletters from being misdirected into the spam folders. 

Content Spam Filters

Content spam filter is one of the most effective and widely used filter to combat spam emails. They use a sophisticated algorithm with a set of pre-defined rules to determine whether a given email is a spam. They work by scanning the entire text/body of the email to search for specific words and patterns that make them resemble a typical spam message. Most content spam filters work based on the following criteria and check to see
1. If the message speaks a lot about money matter. Commonly suspected words include:lottery, discount, offer, bank account, money back guarantee etc.
2. If the message contains adult terms like:pills, bed, drugs, hot and so on.
3. If there is any sort of urgency. Most spam emails call for an urgency by using terms such as hurry, offer valid till etc.
4. If the message contains a single large image with little or no text then it is often considered as spam by many filters.
Each content spam filter may have it’s own set of additional rules using which it evaluates each incoming email. In most cases content and header spam filters are combined together to achieve higher level of accuracy.

Language Spam Filters

Language spam filter is designed to simply filter out any email that is not in the user’s native language. Since spammers come from all parts of the world with different languages, a language spam filter can help get rid of those annoying emails that come in the languages that you can’t read!

User Defined Spam Filters

User defined spam filters can be very handy, however they need a considerable amount of time investment in configuring and setting up a set the rules using which the filter works. For example, the user can configure to have all the emails from friends and company to reach the inbox, newsletters to reach a secondary inbox and all those remaining to the spam folder. Here the user must carefully examine the patterns of spam emails that he receives from time to time and needs to set up the rules accordingly. This filter when improperly configured can sometime lead to false positives or false negatives.

Other Types of Spam Filters

Popular webmail services like Gmail, Yahoo and Hotmail combine both header and content spam filtering techniques. In addition to this they also use their own algorithms to combat spam. For example services like Gmail uses “optical text recognition” to identify spammy text inside an image. Also users are provided with an option to “Report Spam” whenever a spam email accidentally reaches the inbox. With the user feedback, the filter learns and becomes more powerful in carrying out the filtering process.

How Firewalls Work


While you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

How Firewalls Work

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.
Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs. Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

How Antivirus Software Works


Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. 


How Antivirus Works
An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:

1. Signature-based dectection (Dictionary approach)

This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk.
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.
Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.

2. Heuristic-based detection (Suspicious behaviour approach)

Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus softwares to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.
File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.
Most commercial antivirus softwares use a combination of both signature-based and heuristic-based approaches to combat malware.

Issues of concern

Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.
Daily Updates: Since new viruses and threats are released everyday, it is most essential to update the antivirus software so as to keep the virus definitions up-to-date. Most softwares will have an auto-update feature so that the virus definitions are updated whenever the computer is connected to the Internet.
Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic” and, more recently, “metamorphic” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Thus user education is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source.

Use Facebook at Office Work in form of Excel Sheet without getting caught


For Facebook Addicts, it’s not possible to live without checking Facebook wall for a long time which is a general scenario if you are working at office. Even if you are not an addict, you may want to keep in track of Facebook updates just for a change. But Getting caught is a fear which prevents you to do so.
ALT + TAB to switch between Work Window and Facebook is common and working trick but not so secure so, here is a trick which will let you access Facebook imitating your work.
The idea is simple: All your Facebook statuses are presented as if it were an Excel document. Updates from your friends, new photos, comments, changes of state, likes, events calendar, and so on. Much information as possible from a single interface Excel, one book and several sheets.


Imagine yourself working in a Bank or IT sector where accessing Facebook could drag you to problem. In such a situation, HardlyWork.in comes to rescue.


HardlyWork.in is a web application which converts your Facebook wall including all details into Excel Sheet. Visit their site and once and only once, you have to provide access to HardlyWork.in application and that’s it.
All statuses are shown in Excel Sheet Cells. External links can be clicked to open in new tab. While Photo updates can be seen by hovering mouse on it. Thumbnail is shown on right bottom and full width image can be seen by clicking on link.
The program has been designed in the end so you can see Facebook from work, and it even has apanic button that is activated by pressing the space bar, which automatically converts content of the cells to numeric values, just in case the boss comes up unexpectedly appear and engage in the detail of your work. Now convincing your Boss about Numbers and your work depends on your creativity .
For better results- get your Web browser to Full screen so that just the application is shown which exactly resembles like Excel sheet.

How to get back old Facebook Chat Easily and get rid of New Sidebar Chat


Change isn’t always improvement and New Features aren’t always welcomed by users. Same is the story with New Facebook Sidebar Chat. It’s a free service and you don’t have an option to switch to good old Facebook Chat officially. So, here’s how can you get rid of new Facebook Sidebar chat and get back to old Facebook Chat.
Disliking of people is obvious owing to following reasons: Doesn’t have Scroll bar to see all friends who are online at the moment. I agree there is a Search box to find friend to chat with but it isn’t always the case. Sometimes, you decide whom to chat with according to choice of availability of persons.Unnecessarily, Offline Users are shown on top instead of Online.
However, it is possible to get back old facebook chat using userscript.

Facebook Sidebar Chat Reversion is name of userscript compatible with all modern web browsers which when installed reverts back to the old facebook Chat.
Developer has just tried to imitate old Facebook chat appearance which also features scroll bar and lies in right bottom of page. Work is appreciable and at the moment, we don’t have an alternative.
How to install Old Facebook Chat UserScript
Go to http://userscripts.org/scripts/show/107159 and click on Green button saying “Install”.
For Firefox users, you must have GreaseMonkey addon installed to install this. For Google Chrome however, it is installed directly and activates automatically on opening Facebook.com
Note: This Hack doesn’t activate Old Facebook Chat for your Account but only when you access Facebook from the browser where script is installed.

Typing Master Pro v7 Full Version.........

TypingMaster Pro v7(English)

Instructions for installation:

1.download typing master pro trial version from   http://www.typingmaster.com/

2. Disable Internet connection/ network adaptors. Its important!!!

3. Install the Program.

4. Open the application and Enter licence details as follows:

IcyCool

E5XQWKF-XYE3-YRCK-3PPC24K

and press enter... your licence will be accepted.

5.Now,Close the program and go to my computer C:/Program Files/TypingMaster

6.Right Click on file "tmaster8.net" and go to properties and apply attribute "Read Only"

7.Then you can enable network adapters / internet connection.

THANQ.......

Easily export your Facebook friends to Google+ with Chrome Extension


Google+ turns all of the search engine into one giant social network. If you like Google+ and want to add your Facebook friends to it, then all you need is this awesome Chrome extension called Facebook Friend Exporter.
I just don’t know what you feel about Google+ so far, whether you’ve had a chance to try it yet or not, but one thing that really excites me is that it turns all of the search engine into one giant social network.
Google+ is more than just social networking, it’s an extension of Googleitself. Hence the name Google+.
Let me stop describing Google+ . Just watch this video to get a basic idea about it.

Coming to the point – most of us are on and all our beloved friends are in there too.
If you have started like me and want all your Facebook friends on it, one big question starts running through your mind – How to get them ?
Well you know, Google+ doesn’t have an inbuilt way to transfer your Facebook friends over to it. So, you will have to do some monkey business to get your Facebook friends into Google+.

How to do it ?

Getting your friends into Google+ is simple. All you need is this awesomeChrome extension called Facebook Friend Exporter, created by a Google+ user Mohamed Mansour.
1. Once you install, it adds an “Export friends” button to your Facebook toolbar.
2. So just visit your Facebook profile and click on “Export Friends” .
Depending on the number of friends you have, it could take a while, but you will have all updates on the process.
You should notice one thing here, the extension doesn’t directly add your Facebook friends to Google+, it will actually add your friends to Google Contacts.
However, this the most simple and easiest way to go about inviting and adding friends on Google+, as it uses your Google Contacts to suggest people to invite using an easy drag and drop process.Note : Please be aware that exporting your friends from is against its terms and conditions.

How To Setup Video Calling on Facebook



Soon after the Google’s launch of latest social-networking ventureGoogle+Facebook announced that its 750 million users will now be able to make video calls on the site, powered by Skype. Video calling on Facebook is free to use, but unlike Google’s new social network,Google+ hangoutsgroup video chatting is not available.


But for non-techno-savvy users, enabling Facebook’s new social video calling feature might not be a straightforward affair. If you are looking for an easy way to enable video calling feature on any user’s Facebook account, it is essential to install Facebook video chat plugin for your web browser. In addition, Windows users also have to ensure that they have the latest version of Microsoft DirectX installed.

Step-by-step Guide to Enable Facebook Video Calling (Powered by Skype)

1) Login to your Facebook account and open Facebook’s Video Calling Setup page —http://facebook.com/videocalling
2) Click on the “Get Started” icon.
3) At this junction, you will be asked to select any of your Facebook contacts who are online.
4) Select any of your online contacts to open the chat box with “Video” symbol.
5) Now click on the video symbol to raise a pop up asking if you want to “Set up Video calling”.
6) Click on the Setup, which will ask you to save a plug-in. [assuming that you have NOT already installed this
plugin]
7) Install this plug-in to enable Facebook video chat in your browser.
That’s it. Now, you are ready and equipped to start using Skype powdered video chat in Facebook. All you need to do from here on is to just open the chat box and click on the Video symbol to start video chatting (calling) with your online Facebook friends. The video call will be started as soon as your friend answer.
You can see if a friend is available by entering their name at the bottom of the chat list on the right side of the page. Friends that appear online in chat are also available for video calls. A green dot next to a friend’s name means they’re online and a moon icon means they’re online but inactive. Just like with chat, only your confirmed friends can call you on Facebook. You also have the option to ignore any call you receive.

However, according to Facebook some users may face issues with video calling because of hardware and/or software incompatibility. Facebook video calling is supported for the latest versions of Firefox, Safari, Chrome and Internet Explorer web browsers.
If you face problems using this feature, you should probably check if any other program is currently (simultaneously) using your webcam.
Some other issues with Facebook video calling include the inferior quality of the video, as compared to Skype. Also there is no way to resize the video window. Also, Facebook video does not work with mobile phone yet… you need a computer and wi-fi connection for best results.