Step summarize the steps to use the system without problems, the first thing to do is get the URL of the person, What is a URL? "Click here and learn what is a URL" once we have the url of the person the only thing we do is go to the section, record or whatever you call that is on the top, and the url hand, write or paste (Ctrl + C = Copy, Ctrl + V = Paste, or underline text, right click and copy, and the same process without giving emphasis and paste) in the space that says "Example", after making Click to making this "hack" the system started and begin to generate a series of code ultimately a process which once finished will "DATA OBTAINED WITH SUCCESS!" and down appear the data of the victim, the victim, but encrypted, ie they can not see with the naked eye, to do that and to access Facebook just have to click Download Password and complete the measure security is required, we will do that after the data offered by our system instantly.