Hello blackhatworld! I need some help with your knowledge about blackhat techniques. If this technique I want to know is already in the forum, please let me know the link. How to use FB or Twitter or Ping.fm (or all of it) in blackhat techniques. Or Blackhat techniques that mostly used of this web2.0. Thanks!