Uncategorized

How To Create an Invisible Folder on PC Guide.



1. Go to Start Menu And Search “Character Map” and open it

2. Scroll Down and choose a blank Box

3. Now click on select and then click on copy

4. Now Right Click on Desktop and create a Folder and rename it and paste the selection

5. then you create a folder without name

6. Then Right Click on the folder and go to properties

7. click on customize and then click on change icon

8. Choose Blank Icon and Click Ok

9. Now Apply the changes

10. Thats All Enjoy

Uncategorized

Samsung announces new 50MP ISOCELL GN2 camera sensor with Dual Pixel Pro.




Samsung has just announced its new 50MP camera sensor, called ISOCELL GN2. It is a follow-up of last year’s GN1 and comes with bigger pixels, better energy consumption and the entirely new PDAF technology called Dual Pixel Pro. The new sensor also offers the capability to take 100MP photos through re-arranging the color pixels using “an intelligent re-mosaic algorithm”, as Samsung puts it. The new sensor is also Samsung’s first to bring Dual Pixel Pro – the company’s most advanced PDAF solution.

Uncategorized

How to Bypass or Unblock Blocked sites



Today everyone of us is a part of any college,office or any organization.

Everywhere we find free open wifi’s , but the major problem with these are there are many websites which are blocked by the servers of college,ofiice or any organization.

There are different type of securities that are implemented in these server to block some sites like Facebook ,Twitter etc.

So In this post i’ll tell you easy and permanent method to access or bypass blocked sites

Steps To Bypass Blocked Sites-

1. Connect your pc or laptop with wifi or your broadband connection in which you want to access blocked websites.

2. Open command prompt by clicking start and the typing “cmd” and then pressing enter.

4. 3. Now a command prompt window will appear.

5. Type ping Websitename (for exp: ping http://facebook.com) and press enter.

6. Now open your browser and enter the site which you had recently ping.

7.You will see the site will get opens

● This is very simple method to easily access blocked sites.

Uncategorized

HOW TO FIND DELETED #YOUTUBE VIDEOS 2021



Step 1: Go to YoutubeThe very first thing to do is head over to the Youtube page. We are not on Youtube’s page to view the video as it is already deleted from the platform. Just log in as usual to Youtube, and go to the section where the deleted Youtube video is listed and which you want to retrieve. Get the link to the deleted youtube video which you want to retrieve.

Step 2: Go to WayBackMachine. WayBackMachine is an internet archive project made to achieve all the good things that existed in the internet. You can find an archive of almost all sites on the very website. You just have to get the URL of the website whose history you want to see and give a simple search on this WayBackMachine site. They consist of more than 531 billion of pages archive. ( at the time I am writing this post). This project was mainly developed for developers or historians or researchers to provide them with the internet archive so they can get information about the past things that existed on this internet.
Now After you get the link to the deleted Youtube video which you want to retrieve. Open a New Tab in your respective browser. After opening the tab, put archive.org in the URL bar. or google search ‘Way Back Machine’ and select the first option. By either way, you will get to the respective website. You will see the WayBackMachine’s website with a lot of icons and shits in it. Just look for the search box with the go button. Now the main show begins lol.

Step 3: Paste the UrlNow you are on the WayBackMachine page. Head over to the search and go part of the page as mentioned in the picture above. Now Paste the Youtube deleted video’s URL that you have got from step 1. or you can go to the next tab where the Youtube page is open to copy-paste the Youtube deleted videos URL. After putting the respective URL in the search box click the go button and see the magic lol.
Step 4: Check Browse HistoryPut the link in the search box which is next to the Waybackmachine. Thoroughly make sure you have a copy and paste the correct URL. Putting the incorrect URL will give you a completely different result than you expected. So make sure you have entered the correct URL and hit the enter button from the keyboard to search for that URL. And now grab popcorn and stay back and let the site find that respective video for you.

Step 5: Enjoy it!

Uncategorized

LARGEST CRACKING PACK EVER FREE DOWNLOAD



WHAT THIS CONTAIN?

SQLi TOOLS
Vulnerable Scanners
Windows Software Releases
Youtube – Twitch – Social TOOLS
Basic Utilities Tools
BlackBullet Versions
Bots – Traffic – Automatic Tools
Checkers
Crypters & Binders
Crypto Bots – Utilities – Btc TOOLS
DDOS – DDOSER Tools
Dorkers Premium
Hacking Software
Keyloggers
Malware – Worms & Stealers
OpenBullet Versions
Proxy Tools and Grabbers
RATS
Remote Hacking Tools
SEO Tools & Utilities

https://mega.nz/file/FJgl1C5L#hvvQGSaP0Egibn_SwhlbQNGpu8ZcDqlCLVNYfFif3LI

Uncategorized

HOW TO BIND FILES AND APPS FOR FREE GREAT FOR HIDING MALWARE [UHQ TUTORIAL]



Download Winrar :

https://www.rarlab.com/download.html
Steps:
Get the 2 files that you want to bind in one file.

Like here : https://prnt.sc/uosj51
next press ctrl and left click both files/applications then right click and press add to archive as seen
 https://prnt.sc/uoskii

Next change the settings to the following as seen
https://prnt.sc/uosnm5

Then select the advanced tab then click on sfx options as seen
https://prnt.sc/uosoa0

Then type %temp% in the path to extract and make sure that “Create in “program file”” is checked as seen
https://prnt.sc/uosoxx

Then go to the setup tab and first enter the name of the program you want to run first. In this case it’s the virus. If you are binding a virus make sure to type the virus’s name first.

The name is case sensitive so make sure to spell it right. In my case it would like 
https://prnt.sc/uosrbe

Next go to the modes tab and have the same settings as
https://prnt.sc/uoss8d

Finally go to the update tab and have the same settings as the one
https://prnt.sc/uossne

Then press ok and press ok again. Now you should see a new file
https://prnt.sc/uosthf

This is the final binded application containing the virus or whatever it is you plan on binding. That’s all hope you enjoyed

Uncategorized

15+ Chrome Extensions To Spice Up Blank New Tabs #Hack #info



In this post, I’ve pull together twenty Chrome tab extensions that can help you be more organized, be more relaxed, learn more things and even a few that will give you a laugh or two. Say goodbye to empty newly opened tabs and say hello to better days with more useful and effective replacements. 

Personal Dashboard – Momentum
https://chrome.google.com/webstore/detail/momentum/laookkfknpbbblfpciffpaejjkokdgca?hl=en

Get greeted with a cool personal dashboard and a stunning background that brightens your day. You can add your main focus for the day, a regular to-do list, a weather widget, quick links, also great quotes.

Timezone Checks – Figure it Out
https://chrome.google.com/webstore/detail/figure-it-out/lialghmkggocekkpjbnoacohodmckfke

FIO lets you see the current time of locations around the world based on your choices. It works best for teams that work remotely and across continents, and who may need help figuring out the timezones of their colleagues.

Task Manager – Taco
https://chrome.google.com/webstore/detail/taco/aogabobfbepcehdkbfagdflinolncebh?hl=en

Get access to all your tasks from multiple task management tools, all in one spot using Taco. It will bring your tasks from Asana, Basecamp, GitHub, Gmail, OmniFocus, Trello, Zendesk and 40+ others, all on the new tab you open.

Personal Dashboard – iChrome New Tab
https://chrome.google.com/webstore/detail/ichrome-new-tab/iccjgbbjckehppnpajnmplcccjcgbdep

iChrome allows you to customize a new tab with stunning themes and dozens of useful widgets. There are available widgets for weather, stock, news, to-do list, quotes, and many others. It’s easy to install and customize, and you need only drag-and-drop to reorder them.

To-Do List – Prioritab
https://chrome.google.com/webstore/detail/prioritab/napbejkndjhcciibiglkimmgdlfjcbnp?

For the disorganized soul or for those who really love organizing things, Prioritab is for you guys. Every new tab page is a reminder of your priorities. You can add things you need to finish today, this week or this month.

Personal Dashboard – Speed Dial 2
https://chrome.google.com/webstore/detail/speed-dial-2/jpfpebmajhhopeonhlcgidhclcccjcik

With Speed Dial 2 you are easily access your most visited pages, bookmarks and browsing history. The design is clean, intuitive and customizable, it’s easy to change the column, size, and others, as well as to customize the themes. You even can browse all the bookmarks via mobile by going to this link.

Inspiration Background – Wandertab
http://www.hitlistapp.com/wandertab/

Whenever you open a new tab, Wandertab shows you a stunning picture from an amazing place as well as how much it costs to go there. Probably not the best tab to get if you hate being cooped up in the office though.

Content Curator – Panda 4
https://usepanda.com/

Panda 4 lets you stay up to date with the latest or most popular content from top sites for designer, developers, and entrepreneurs e.g. the best shots from Dribbble or Awwwards. You can change the layouts to match your style. Browsing everything worth reading in one place.

Content Curator – Muzli
https://chrome.google.com/webstore/detail/muzli-2-stay-inspired/glcipcfhmopcgidicgdociohdoicpdfc

Muzli gives you all the design inspiration that you need. It give you the freshest and the best shots in design from around the Web. You can easily filter from the source site, found on the left sidebar, or just browse Muzli picks.

Inspiration Background – Exposure New Tab
https://chrome.google.com/webstore/detail/exposure-new-tab/onfocbngcbpfnfdmnhleidllhleaiokn?authuser=1

Exposure is a site that allows its users to create or upload beautiful photos with narratives. This cool extension will show you a beautiful photo from Exposure every time you open a new Chrome tab. If you want more stories about the photo shown just click the link to the rest of the photo narrative.

Inspiration Background – Ritual
http://nbashaw.github.io/ritual

Uncategorized

All you need to know about spoofing. #cyber #hacks #termux



What is spoofing?
Ans:-Text message spoofing or SMSspoofing is sending a text message with someone else’s phone number or sender ID.
Types of spoofing

Lets start deep knowledge about spoofing

Email spoofing.
Website and/or URL spoofing.
Caller ID spoofing.
Text message spoofing.
GPS spoofing.
Man-in-the-middle attacks.
Extension spoofing.
IP spoofing.
Facial spoofing.


Email spoofing is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the message


Website spoofing is all about making a malicious website look like a legitimate one. The spoofed site will look like the login page for a website you frequent—down to the branding, user interface, and even a spoofed domain name that looks the same at first glance. Cybercriminals use spoofed websites to capture your username and password (aka login spoofing)

Caller ID spoofing happens when scammers fool your caller ID by making the call appear to be coming from somewhere it isn’t. Scammers have learned that you’re more likely to answer the phone if the caller ID shows an area code the same or near your own. In some cases, scammers will even spoof the first few digits of your phone number in addition to the area code to create the impression that the call is originating from your neighborhood (aka neighbor spoofing)

Text message spoofing or SMS spoofing is sending a text message with someone else’s phone number or sender ID. If you’ve ever sent a text message from your laptop, you’ve spoofed your own phone number in order to send the text, because the text did not actually originate from your phone.

GPS spoofing definition

GPS spoofing is an attack in which a radio transmitter located near the target is used to interfere with a legitimate GPS signals. The attacker can transmit no data at all or could transmit inaccurate coordinates

Man-in-the-middle (MitM) attack. You like that free Wi-Fi at your local coffee shop? Have you considered what would happen if a cybercriminal hacked the Wi-Fi or created another fraudulent Wi-Fi network in the same location? In either case, you have a perfect setup for a man-in-the-middle attack, so named because cybercriminals are able to intercept web traffic between two parties. The spoof comes into play when the criminals alter the communication between the parties to reroute funds or solicit sensitive personal information like credit card numbers or logins.

IP spoofing is used when someone wants to hide or disguise the location from which they’re sending or requesting data online. As it applies to cyberthreats, IP address spoofing is used in distributed denial of service attacks (DDoS) to prevent malicious traffic from being filtered out and to hide the attacker’s location.

A face spoof attack is an attempt to deceive a facerecognition system using a substitute for another’s person’s face – usually their photo, video recording or a 3D mask. If thespoofing attack succeeds, the fraudster acquires privileges or access rights of another person.

Uncategorized

New Parts, New Hacks

The biggest news this week is that Raspberry Pi is no longer synonymous with single-board Linux computers: they’re dipping their toes into the microcontroller business with their first chip: the RP2040, and the supporting breakout board, the Pico. It’s an affordable, capable microcontroller being made by a firm that’s never made microcontrollers before, so that’s newsy. The Hackaday comments lit on fire about this chip, with some fraction of the commenters lamenting the lack of wireless radios onboard. It’s a glass-half-full thing, I guess, but the RP2040 isn’t an ESP32, folks. It’s something else. And it’s got a hardware trick up its sleeve that really tickles my fancy — the programmable input/output (PIO) units. The other half of the commenters were, like me, salivating about getting to try out some of the new features. The PIO, of course, was high on that list, but this chip also caters to folks who are doing high-speed DSP, with fast multiplication routines burnt into ROM and a nice accumulator. (You know you’re a microcontroller nerd when you’re reading through a 663-page datasheet and thinking about all the funny ways you can use and/or abuse the hardware peripherals.) All chip designs are compromises. Nothing can do everything. The new peripherals, novel combinations of old elements, and just pleasant design decisions, open up new opportunities if you’re willing to seek them out. When the ESP32 was new, I was looking at their oddball parallel-I2S hardware and thinking what kind of crazy hacks that would enable, and clever hackers have proven me right. I’d put my money on the PIO being similar. New chips open up new possibilities for hacks. What are you going to do with them? [do_widget id=custom_html-4]

New Parts, New Hacks
Uncategorized

Common Social Engineering Techniques #Social #Engineering #Hacks

sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴛᴇᴄʜɴɪϙᴜᴇs ᴄᴀɴ ᴛᴀᴋᴇ ᴍᴀɴʏ ғᴏʀᴍs. ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ɪs ᴛʜᴇ ʟɪsᴛ ᴏғ ᴛʜᴇ ᴄᴏᴍᴍᴏɴʟʏ ᴜsᴇᴅ ᴛᴇᴄʜɴɪϙᴜᴇs.

ғᴀᴍɪʟɪᴀʀɪᴛʏ ᴇxᴘʟᴏɪᴛ: ᴜsᴇʀs ᴀʀᴇ ʟᴇss sᴜsᴘɪᴄɪᴏᴜs ᴏғ ᴘᴇᴏᴘʟᴇ ᴛʜᴇʏ ᴀʀᴇ ғᴀᴍɪʟɪᴀʀ ᴡɪᴛʜ. ᴀɴ ᴀᴛᴛᴀᴄᴋᴇʀ ᴄᴀɴ ғᴀᴍɪʟɪᴀʀɪᴢᴇ ʜɪᴍ/ʜᴇʀsᴇʟғ ᴡɪᴛʜ ᴛʜᴇ ᴜsᴇʀs ᴏғ ᴛʜᴇ ᴛᴀʀɢᴇᴛ sʏsᴛᴇᴍ ᴘʀɪᴏʀ ᴛᴏ ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴀᴛᴛᴀᴄᴋ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ɪɴᴛᴇʀᴀᴄᴛ ᴡɪᴛʜ ᴜsᴇʀs ᴅᴜʀɪɴɢ ᴍᴇᴀʟs, ᴡʜᴇɴ ᴜsᴇʀs ᴀʀᴇ sᴍᴏᴋɪɴɢ ʜᴇ ᴍᴀʏ ᴊᴏɪɴ, ᴏɴ sᴏᴄɪᴀʟ ᴇᴠᴇɴᴛs, ᴇᴛᴄ. ᴛʜɪs ᴍᴀᴋᴇs ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ғᴀᴍɪʟɪᴀʀ ᴛᴏ ᴛʜᴇ ᴜsᴇʀs. ʟᴇᴛ’s sᴜᴘᴘᴏsᴇ ᴛʜᴀᴛ ᴛʜᴇ ᴜsᴇʀ ᴡᴏʀᴋs ɪɴ ᴀ ʙᴜɪʟᴅɪɴɢ ᴛʜᴀᴛ ʀᴇϙᴜɪʀᴇs ᴀɴ ᴀᴄᴄᴇss ᴄᴏᴅᴇ ᴏʀ ᴄᴀʀᴅ ᴛᴏ ɢᴀɪɴ ᴀᴄᴄᴇss; ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ғᴏʟʟᴏᴡ ᴛʜᴇ ᴜsᴇʀs ᴀs ᴛʜᴇʏ ᴇɴᴛᴇʀ sᴜᴄʜ ᴘʟᴀᴄᴇs. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇ ᴛᴏ ʜᴏʟᴅ ᴛʜᴇ ᴅᴏᴏʀ ᴏᴘᴇɴ ғᴏʀ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴛᴏ ɢᴏ ɪɴ ᴀs ᴛʜᴇʏ ᴀʀᴇ ғᴀᴍɪʟɪᴀʀ ᴡɪᴛʜ ᴛʜᴇᴍ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴄᴀɴ ᴀʟsᴏ ᴀsᴋ ғᴏʀ ᴀɴsᴡᴇʀs ᴛᴏ ϙᴜᴇsᴛɪᴏɴs sᴜᴄʜ ᴀs ᴡʜᴇʀᴇ ʏᴏᴜ ᴍᴇᴛ ʏᴏᴜʀ sᴘᴏᴜsᴇ, ᴛʜᴇ ɴᴀᴍᴇ ᴏғ ʏᴏᴜʀ ʜɪɢʜ sᴄʜᴏᴏʟ ᴍᴀᴛʜ ᴛᴇᴀᴄʜᴇʀ, ᴇᴛᴄ. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴛᴏ ʀᴇᴠᴇᴀʟ ᴀɴsᴡᴇʀs ᴀs ᴛʜᴇʏ ᴛʀᴜsᴛ ᴛʜᴇ ғᴀᴍɪʟɪᴀʀ ғᴀᴄᴇ. ᴛʜɪs ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴄᴏᴜʟᴅ ʙᴇ ᴜsᴇᴅ ᴛᴏ ʜᴀᴄᴋ ᴇᴍᴀɪʟ ᴀᴄᴄᴏᴜɴᴛs ᴀɴᴅ ᴏᴛʜᴇʀ ᴀᴄᴄᴏᴜɴᴛs ᴛʜᴀᴛ ᴀsᴋ sɪᴍɪʟᴀʀ ϙᴜᴇsᴛɪᴏɴs ɪғ ᴏɴᴇ ғᴏʀɢᴇᴛs ᴛʜᴇɪʀ ᴘᴀssᴡᴏʀᴅ.

1 ɪɴᴛɪᴍɪᴅᴀᴛɪɴɢ ᴄɪʀᴄᴜᴍsᴛᴀɴᴄᴇs: ᴘᴇᴏᴘʟᴇ ᴛᴇɴᴅ ᴛᴏ ᴀᴠᴏɪᴅ ᴘᴇᴏᴘʟᴇ ᴡʜᴏ ɪɴᴛɪᴍɪᴅᴀᴛᴇ ᴏᴛʜᴇʀs ᴀʀᴏᴜɴᴅ ᴛʜᴇᴍ. ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ᴘʀᴇᴛᴇɴᴅ ᴛᴏ ʜᴀᴠᴇ ᴀ ʜᴇᴀᴛᴇᴅ ᴀʀɢᴜᴍᴇɴᴛ ᴏɴ ᴛʜᴇ ᴘʜᴏɴᴇ ᴏʀ ᴡɪᴛʜ ᴀɴ ᴀᴄᴄᴏᴍᴘʟɪᴄᴇ ɪɴ ᴛʜᴇ sᴄʜᴇᴍᴇ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ᴛʜᴇɴ ᴀsᴋ ᴜsᴇʀs ғᴏʀ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴡʜɪᴄʜ ᴡᴏᴜʟᴅ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴄᴏᴍᴘʀᴏᴍɪsᴇ ᴛʜᴇ sᴇᴄᴜʀɪᴛʏ ᴏғ ᴛʜᴇ ᴜsᴇʀs’ sʏsᴛᴇᴍ. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ɢɪᴠᴇ ᴛʜᴇ ᴄᴏʀʀᴇᴄᴛ ᴀɴsᴡᴇʀs ᴊᴜsᴛ ᴛᴏ ᴀᴠᴏɪᴅ ʜᴀᴠɪɴɢ ᴀ ᴄᴏɴғʀᴏɴᴛᴀᴛɪᴏɴ ᴡɪᴛʜ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ. ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴄᴀɴ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴀᴠᴏɪᴅ ʙᴇᴇɴ ᴄʜᴇᴄᴋᴇᴅ ᴀᴛ ᴀ sᴇᴄᴜʀɪᴛʏ ᴄʜᴇᴄᴋ ᴘᴏɪɴᴛ.

2 ᴘʜɪsʜɪɴɢ: ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴜsᴇs ᴛʀɪᴄᴋᴇʀʏ ᴀɴᴅ ᴅᴇᴄᴇɪᴛ ᴛᴏ ᴏʙᴛᴀɪɴ ᴘʀɪᴠᴀᴛᴇ ᴅᴀᴛᴀ ғʀᴏᴍ ᴜsᴇʀs. ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ᴛʀʏ ᴛᴏ ɪᴍᴘᴇʀsᴏɴᴀᴛᴇ ᴀ ɢᴇɴᴜɪɴᴇ ᴡᴇʙsɪᴛᴇ sᴜᴄʜ ᴀs ʏᴀʜᴏᴏ ᴀɴᴅ ᴛʜᴇɴ ᴀsᴋ ᴛʜᴇ ᴜɴsᴜsᴘᴇᴄᴛɪɴɢ ᴜsᴇʀ ᴛᴏ ᴄᴏɴғɪʀᴍ ᴛʜᴇɪʀ ᴀᴄᴄᴏᴜɴᴛ ɴᴀᴍᴇ ᴀɴᴅ ᴘᴀssᴡᴏʀᴅ. ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴄᴏᴜʟᴅ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ɢᴇᴛ ᴄʀᴇᴅɪᴛ ᴄᴀʀᴅ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴠᴀʟᴜᴀʙʟᴇ ᴘᴇʀsᴏɴᴀʟ ᴅᴀᴛᴀ.

3 ᴛᴀɪʟɢᴀᴛɪɴɢ: ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ɪɴᴠᴏʟᴠᴇs ғᴏʟʟᴏᴡɪɴɢ ᴜsᴇʀs ʙᴇʜɪɴᴅ ᴀs ᴛʜᴇʏ ᴇɴᴛᴇʀ ʀᴇsᴛʀɪᴄᴛᴇᴅ ᴀʀᴇᴀs. ᴀs ᴀ ʜᴜᴍᴀɴ ᴄᴏᴜʀᴛᴇsʏ, ᴛʜᴇ ᴜsᴇʀ ɪs ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴛᴏ ʟᴇᴛ ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ɪɴsɪᴅᴇ ᴛʜᴇ ʀᴇsᴛʀɪᴄᴛᴇᴅ ᴀʀᴇᴀ.

4 ᴇxᴘʟᴏɪᴛɪɴɢ ʜᴜᴍᴀɴ ᴄᴜʀɪᴏsɪᴛʏ: ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ᴅᴇʟɪʙᴇʀᴀᴛᴇʟʏ ᴅʀᴏᴘ ᴀ ᴠɪʀᴜs ɪɴғᴇᴄᴛᴇᴅ ғʟᴀsʜ ᴅɪsᴋ ɪɴ ᴀɴ ᴀʀᴇᴀ ᴡʜᴇʀᴇ ᴛʜᴇ ᴜsᴇʀs ᴄᴀɴ ᴇᴀsɪʟʏ ᴘɪᴄᴋ ɪᴛ ᴜᴘ. ᴛʜᴇ ᴜsᴇʀ ᴡɪʟʟ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴘʟᴜɢ ᴛʜᴇ ғʟᴀsʜ ᴅɪsᴋ ɪɴᴛᴏ ᴛʜᴇ ᴄᴏᴍᴘᴜᴛᴇʀ. ᴛʜᴇ ғʟᴀsʜ ᴅɪsᴋ ᴍᴀʏ ᴀᴜᴛᴏ ʀᴜɴ ᴛʜᴇ ᴠɪʀᴜs, ᴏʀ ᴛʜᴇ ᴜsᴇʀ ᴍᴀʏ ʙᴇ ᴛᴇᴍᴘᴛᴇᴅ ᴛᴏ ᴏᴘᴇɴ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴀ ɴᴀᴍᴇ sᴜᴄʜ ᴀs ᴇᴍᴘʟᴏʏᴇᴇs ʀᴇᴠᴀʟᴜᴀᴛɪᴏɴ ʀᴇᴘᴏʀᴛ 2013.ᴅᴏᴄx ᴡʜɪᴄʜ ᴍᴀʏ ᴀᴄᴛᴜᴀʟʟʏ ʙᴇ ᴀɴ ɪɴғᴇᴄᴛᴇᴅ ғɪʟᴇ.

5 ᴇxᴘʟᴏɪᴛɪɴɢ ʜᴜᴍᴀɴ ɢʀᴇᴇᴅ: ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ʟᴜʀᴇ ᴛʜᴇ ᴜsᴇʀ ᴡɪᴛʜ ᴘʀᴏᴍɪsᴇs ᴏғ ᴍᴀᴋɪɴɢ ᴀ ʟᴏᴛ ᴏғ ᴍᴏɴᴇʏ ᴏɴʟɪɴᴇ ʙʏ ғɪʟʟɪɴɢ ɪɴ ᴀ ғᴏʀᴍ ᴀɴᴅ ᴄᴏɴғɪʀᴍ ᴛʜᴇɪʀ ᴅᴇᴛᴀɪʟs ᴜsɪɴɢ ᴄʀᴇᴅɪᴛ ᴄᴀʀᴅ ᴅᴇᴛᴀɪʟs, ᴇᴛᴄ.

ᴇᴛʜᴇʀᴘᴇᴇᴋ

ᴇᴛʜᴇʀᴘᴇᴇᴋ ɪs ᴀ ᴡᴏɴᴅᴇʀғᴜʟ ᴛᴏᴏʟ ᴛʜᴀᴛ sɪᴍᴘʟɪғɪᴇs ɴᴇᴛᴡᴏʀᴋ ᴀɴᴀʟʏsɪs ɪɴ ᴀ ᴍᴜʟᴛɪᴘʀᴏᴛᴏᴄᴏʟ ʜᴇᴛᴇʀᴏɢᴇɴᴇᴏᴜs ɴᴇᴛᴡᴏʀᴋ ᴇɴᴠɪʀᴏɴᴍᴇɴᴛ. ᴇᴛʜᴇʀᴘᴇᴇᴋ ɪs ᴀ sᴍᴀʟʟ ᴛᴏᴏʟ (ʟᴇss ᴛʜᴀɴ 2 ᴍʙ) ᴛʜᴀᴛ ᴄᴀɴ ʙᴇ ᴇᴀsɪʟʏ ɪɴsᴛᴀʟʟᴇᴅ ɪɴ ᴀ ᴍᴀᴛᴛᴇʀ ᴏғ ғᴇᴡ ᴍɪɴᴜᴛᴇs.

ᴇᴛʜᴇʀᴘᴇᴇᴋ ᴘʀᴏᴀᴄᴛɪᴠᴇʟʏ sɴɪғғs ᴛʀᴀғғɪᴄ ᴘᴀᴄᴋᴇᴛs ᴏɴ ᴀ ɴᴇᴛᴡᴏʀᴋ. ʙʏ ᴅᴇғᴀᴜʟᴛ, ᴇᴛʜᴇʀᴘᴇᴇᴋ sᴜᴘᴘᴏʀᴛs ᴘʀᴏᴛᴏᴄᴏʟs sᴜᴄʜ ᴀs ᴀᴘᴘʟᴇᴛᴀʟᴋ, ɪᴘ, ɪᴘ ᴀᴅᴅʀᴇss ʀᴇsᴏʟᴜᴛɪᴏɴ ᴘʀᴏᴛᴏᴄᴏʟ (ᴀʀᴘ), ɴᴇᴛᴡᴀʀᴇ, ᴛᴄᴘ, ᴜᴅᴘ, ɴᴇᴛʙᴇᴜɪ, ᴀɴᴅ ɴʙᴛ ᴘᴀᴄᴋᴇᴛs.

sᴜᴘᴇʀsᴄᴀɴ

sᴜᴘᴇʀsᴄᴀɴ ɪs ᴀ ᴘᴏᴡᴇʀғᴜʟ ᴛᴏᴏʟ ғᴏʀ ɴᴇᴛᴡᴏʀᴋ ᴀᴅᴍɪɴɪsᴛʀᴀᴛᴏʀs ᴛᴏ sᴄᴀɴ ᴛᴄᴘ ᴘᴏʀᴛs ᴀɴᴅ ʀᴇsᴏʟᴠᴇ ʜᴏsᴛɴᴀᴍᴇs. ɪᴛ ʜᴀs ᴀ ᴜsᴇʀ ғʀɪᴇɴᴅʟʏ ɪɴᴛᴇʀғᴀᴄᴇ ᴛʜᴀᴛ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ᴛᴏ −

ᴘᴇʀғᴏʀᴍ ᴘɪɴɢ sᴄᴀɴs ᴀɴᴅ ᴘᴏʀᴛ sᴄᴀɴs ᴜsɪɴɢ ᴀɴʏ ɪᴘ ʀᴀɴɢᴇ.

sᴄᴀɴ ᴀɴʏ ᴘᴏʀᴛ ʀᴀɴɢᴇ ғʀᴏᴍ ᴀ ʙᴜɪʟᴛ-ɪɴ ʟɪsᴛ ᴏʀ ᴀɴʏ ɢɪᴠᴇɴ ʀᴀɴɢᴇ.

ᴠɪᴇᴡ ʀᴇsᴘᴏɴsᴇs ғʀᴏᴍ ᴄᴏɴɴᴇᴄᴛᴇᴅ ʜᴏsᴛs.

ᴍᴏᴅɪғʏ ᴛʜᴇ ᴘᴏʀᴛ ʟɪsᴛ ᴀɴᴅ ᴘᴏʀᴛ ᴅᴇsᴄʀɪᴘᴛɪᴏɴs ᴜsɪɴɢ ᴛʜᴇ ʙᴜɪʟᴛ ɪɴ ᴇᴅɪᴛᴏʀ.

ᴍᴇʀɢᴇ ᴘᴏʀᴛ ʟɪsᴛs ᴛᴏ ʙᴜɪʟᴅ ɴᴇᴡ ᴏɴᴇs.

ᴄᴏɴɴᴇᴄᴛ ᴛᴏ ᴀɴʏ ᴅɪsᴄᴏᴠᴇʀᴇᴅ ᴏᴘᴇɴ ᴘᴏʀᴛ.

ᴀssɪɢɴ ᴀ ᴄᴜsᴛᴏᴍ ʜᴇʟᴘᴇʀ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ ᴛᴏ ᴀɴʏ ᴘᴏʀᴛ.

ϙᴜᴀʟʏsɢᴜᴀʀᴅ

ϙᴜᴀʟʏsɢᴜᴀʀᴅ ɪs ᴀɴ ɪɴᴛᴇɢʀᴀᴛᴇᴅ sᴜɪᴛᴇ ᴏғ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴄᴀɴ ʙᴇ ᴜᴛɪʟɪᴢᴇᴅ ᴛᴏ sɪᴍᴘʟɪғʏ sᴇᴄᴜʀɪᴛʏ ᴏᴘᴇʀᴀᴛɪᴏɴs ᴀɴᴅ ʟᴏᴡᴇʀ ᴛʜᴇ ᴄᴏsᴛ ᴏғ ᴄᴏᴍᴘʟɪᴀɴᴄᴇ. ɪᴛ ᴅᴇʟɪᴠᴇʀs ᴄʀɪᴛɪᴄᴀʟ sᴇᴄᴜʀɪᴛʏ ɪɴᴛᴇʟʟɪɢᴇɴᴄᴇ ᴏɴ ᴅᴇᴍᴀɴᴅ ᴀɴᴅ ᴀᴜᴛᴏᴍᴀᴛᴇs ᴛʜᴇ ғᴜʟʟ sᴘᴇᴄᴛʀᴜᴍ ᴏғ ᴀᴜᴅɪᴛɪɴɢ, ᴄᴏᴍᴘʟɪᴀɴᴄᴇ ᴀɴᴅ ᴘʀᴏᴛᴇᴄᴛɪᴏɴ ғᴏʀ ɪᴛ sʏsᴛᴇᴍs ᴀɴᴅ



ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴs.

ϙᴜᴀʟʏsɢᴜᴀʀᴅ ɪɴᴄʟᴜᴅᴇs ᴀ sᴇᴛ ᴏғ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴄᴀɴ ᴍᴏɴɪᴛᴏʀ, ᴅᴇᴛᴇᴄᴛ, ᴀɴᴅ ᴘʀᴏᴛᴇᴄᴛ ʏᴏᴜʀ ɢʟᴏʙᴀʟ ɴᴇᴛᴡᴏʀᴋ.

ᴡᴇʙɪɴsᴘᴇᴄᴛ

ᴡᴇʙɪɴsᴘᴇᴄᴛ ɪs ᴀ ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ sᴇᴄᴜʀɪᴛʏ ᴀssᴇssᴍᴇɴᴛ ᴛᴏᴏʟ ᴛʜᴀᴛ ʜᴇʟᴘs ɪᴅᴇɴᴛɪғʏ ᴋɴᴏᴡɴ ᴀɴᴅ ᴜɴᴋɴᴏᴡɴ ᴠᴜʟɴᴇʀᴀʙɪʟɪᴛɪᴇs ᴡɪᴛʜɪɴ ᴛʜᴇ ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ ʟᴀʏᴇʀ.

ɪᴛ ᴄᴀɴ ᴀʟsᴏ ʜᴇʟᴘ ᴄʜᴇᴄᴋ ᴛʜᴀᴛ ᴀ ᴡᴇʙ sᴇʀᴠᴇʀ ɪs ᴄᴏɴғɪɢᴜʀᴇᴅ ᴘʀᴏᴘᴇʀʟʏ, ᴀɴᴅ ᴀᴛᴛᴇᴍᴘᴛs ᴄᴏᴍᴍᴏɴ ᴡᴇʙ ᴀᴛᴛᴀᴄᴋs sᴜᴄʜ ᴀs ᴘᴀʀᴀᴍᴇᴛᴇʀ ɪɴᴊᴇᴄᴛɪᴏɴ, ᴄʀᴏss-sɪᴛᴇ sᴄʀɪᴘᴛɪɴɢ, ᴅɪʀᴇᴄᴛᴏʀʏ ᴛʀᴀᴠᴇʀsᴀʟ, ᴀɴᴅ ᴍᴏʀᴇ.

ʟᴄ4

ʟᴄ4 ᴡᴀs ғᴏʀᴍᴇʀʟʏ ᴋɴᴏᴡɴ ᴀs ʟ0ᴘʜᴛᴄʀᴀᴄᴋ. ɪᴛ ɪs ᴀ ᴘᴀssᴡᴏʀᴅ ᴀᴜᴅɪᴛɪɴɢ ᴀɴᴅ ʀᴇᴄᴏᴠᴇʀʏ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ. ɪᴛ ɪs ᴜsᴇᴅ ᴛᴏ ᴛᴇsᴛ ᴘᴀssᴡᴏʀᴅ sᴛʀᴇɴɢᴛʜ ᴀɴᴅ sᴏᴍᴇᴛɪᴍᴇs ᴛᴏ ʀᴇᴄᴏᴠᴇʀ ʟᴏsᴛ ᴍɪᴄʀᴏsᴏғᴛ ᴡɪɴᴅᴏᴡs ᴘᴀssᴡᴏʀᴅs, ʙʏ ᴜsɪɴɢ ᴅɪᴄᴛɪᴏɴᴀʀʏ, ʙʀᴜᴛᴇ-ғᴏʀᴄᴇ, ᴀɴᴅ ʜʏʙʀɪᴅ ᴀᴛᴛᴀᴄᴋs.

ʟᴄ4 ʀᴇᴄᴏᴠᴇʀs ᴡɪɴᴅᴏᴡs ᴜsᴇʀ ᴀᴄᴄᴏᴜɴᴛ ᴘᴀssᴡᴏʀᴅs ᴛᴏ sᴛʀᴇᴀᴍʟɪɴᴇ ᴍɪɢʀᴀᴛɪᴏɴ ᴏғ ᴜsᴇʀs ᴛᴏ ᴀɴᴏᴛʜᴇʀ ᴀᴜᴛʜᴇɴᴛɪᴄᴀᴛɪᴏɴ sʏsᴛᴇᴍ ᴏʀ ᴛᴏ ᴀᴄᴄᴇss ᴀᴄᴄᴏᴜɴᴛs ᴡʜᴏsᴇ ᴘᴀssᴡᴏʀᴅs ᴀʀᴇ ʟᴏsᴛ.

ʟᴀɴɢᴜᴀʀᴅ ɴᴇᴛᴡᴏʀᴋ sᴇᴄᴜʀɪᴛʏ sᴄᴀɴɴᴇʀ

ʟᴀɴɢᴜᴀʀᴅ ɴᴇᴛᴡᴏʀᴋ sᴄᴀɴɴᴇʀ ᴍᴏɴɪᴛᴏʀs ᴀ ɴᴇᴛᴡᴏʀᴋ ʙʏ sᴄᴀɴɴɪɴɢ ᴄᴏɴɴᴇᴄᴛᴇᴅ ᴍᴀᴄʜɪɴᴇs ᴀɴᴅ ᴘʀᴏᴠɪᴅɪɴɢ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴀʙᴏᴜᴛ ᴇᴀᴄʜ ɴᴏᴅᴇ. ʏᴏᴜ ᴄᴀɴ ᴏʙᴛᴀɪɴ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴀʙᴏᴜᴛ ᴇᴀᴄʜ ɪɴᴅɪᴠɪᴅᴜᴀʟ ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ.

ɪᴛ ᴄᴀɴ ᴀʟsᴏ ᴅᴇᴛᴇᴄᴛ ʀᴇɢɪsᴛʀʏ ɪssᴜᴇs ᴀɴᴅ ʜᴀᴠᴇ ᴀ ʀᴇᴘᴏʀᴛ sᴇᴛ ᴜᴘ ɪɴ ʜᴛᴍʟ ғᴏʀᴍᴀᴛ. ғᴏʀ ᴇᴀᴄʜ ᴄᴏᴍᴘᴜᴛᴇʀ, ʏᴏᴜ ᴄᴀɴ ʟɪsᴛ ᴛʜᴇ ɴᴇᴛʙɪᴏs ɴᴀᴍᴇ ᴛᴀʙʟᴇ, ᴄᴜʀʀᴇɴᴛ ʟᴏɢɢᴇᴅ-ᴏɴ ᴜsᴇʀ, ᴀɴᴅ ᴍᴀᴄ ᴀᴅᴅʀᴇss.

ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ

ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ ɪs ᴀ ᴡɪғɪ sᴄᴀɴɴᴇʀ ᴀɴᴅ ᴍᴏɴɪᴛᴏʀɪɴɢ ᴛᴏᴏʟ ғᴏʀ ᴡɪɴᴅᴏᴡs. ɪᴛ ᴀʟʟᴏᴡs ɴᴇᴛᴡᴏʀᴋ ᴘʀᴏғᴇssɪᴏɴᴀʟs ᴛᴏ ᴅᴇᴛᴇᴄᴛ ᴡʟᴀɴs. ɪᴛ ɪs ᴡɪᴅᴇʟʏ ᴜsᴇᴅ ʙʏ ɴᴇᴛᴡᴏʀᴋɪɴɢ ᴇɴᴛʜᴜsɪᴀsᴛs ᴀɴᴅ ʜᴀᴄᴋᴇʀs ʙᴇᴄᴀᴜsᴇ ɪᴛ ʜᴇʟᴘs ʏᴏᴜ ғɪɴᴅ ɴᴏɴ-ʙʀᴏᴀᴅᴄᴀsᴛɪɴɢ ᴡɪʀᴇʟᴇss ɴᴇᴛᴡᴏʀᴋs.

ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ ᴄᴀɴ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴠᴇʀɪғʏ ɪғ ᴀ ɴᴇᴛᴡᴏʀᴋ ɪs ᴡᴇʟʟ ᴄᴏɴғɪɢᴜʀᴇᴅ, ɪᴛs sɪɢɴᴀʟ sᴛʀᴇɴɢᴛʜ ᴏʀ ᴄᴏᴠᴇʀᴀɢᴇ, ᴀɴᴅ ᴅᴇᴛᴇᴄᴛ ɪɴᴛᴇʀғᴇʀᴇɴᴄᴇ ʙᴇᴛᴡᴇᴇɴ ᴏɴᴇ ᴏʀ ᴍᴏʀᴇ ᴡɪʀᴇʟᴇss ɴᴇᴛᴡᴏʀᴋs. ɪᴛ ᴄᴀɴ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ɴᴏɴ-ᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏɴɴᴇᴄᴛɪᴏɴs.

ᴛᴏɴᴇʟᴏᴄ

ᴛᴏɴᴇʟᴏᴄ sᴛᴀɴᴅs ғᴏʀ ᴛᴏɴᴇ ʟᴏᴄᴀᴛᴏʀ. ɪᴛ ᴡᴀs ᴀ ᴘᴏᴘᴜʟᴀʀ ᴡᴀʀ ᴅɪᴀʟʟɪɴɢ ᴄᴏᴍᴘᴜᴛᴇʀ ᴘʀᴏɢʀᴀᴍ ᴡʀɪᴛᴛᴇɴ ғᴏʀ ᴍs-ᴅᴏs ɪɴ ᴛʜᴇ ᴇᴀʀʟʏ 90’s. ᴡᴀʀ ᴅɪᴀʟʟɪɴɢ ɪs ᴀ ᴛᴇᴄʜɴɪϙᴜᴇ ᴏғ ᴜsɪɴɢ ᴀ ᴍᴏᴅᴇᴍ ᴛᴏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ sᴄᴀɴ ᴀ ʟɪsᴛ ᴏғ ᴛᴇʟᴇᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀs, ᴜsᴜᴀʟʟʏ ᴅɪᴀʟʟɪɴɢ ᴇᴠᴇʀʏ ɴᴜᴍʙᴇʀ ɪɴ ᴀ ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏᴅᴇ.

ᴍᴀʟɪᴄɪᴏᴜs ʜᴀᴄᴋᴇʀs ᴜsᴇ ᴛʜᴇ ʀᴇsᴜʟᴛɪɴɢ ʟɪsᴛs ɪɴ ʙʀᴇᴀᴄʜɪɴɢ ᴄᴏᴍᴘᴜᴛᴇʀ sᴇᴄᴜʀɪᴛʏ – ғᴏʀ ɢᴜᴇssɪɴɢ ᴜsᴇʀ ᴀᴄᴄᴏᴜɴᴛs, ᴏʀ ʟᴏᴄᴀᴛɪɴɢ ᴍᴏᴅᴇᴍs ᴛʜᴀᴛ ᴍɪɢʜᴛ ᴘʀᴏᴠɪᴅᴇ ᴀɴ ᴇɴᴛʀʏ-ᴘᴏɪɴᴛ ɪɴᴛᴏ ᴄᴏᴍᴘᴜᴛᴇʀ ᴏʀ ᴏᴛʜᴇʀ ᴇʟᴇᴄᴛʀᴏɴɪᴄ sʏsᴛᴇᴍs.

ɪᴛ ᴄᴀɴ ʙᴇ ᴜsᴇᴅ ʙʏ sᴇᴄᴜʀɪᴛʏ ᴘᴇʀsᴏɴɴᴇʟ ᴛᴏ ᴅᴇᴛᴇᴄᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴅᴇᴠɪᴄᴇs ᴏɴ ᴀ ᴄᴏᴍᴘᴀɴʏ’s ᴛᴇʟᴇᴘʜᴏɴᴇ ɴᴇᴛᴡᴏʀᴋ.

Uncategorized

How to Get Rid of 5 of The Most Dangerous Android Viruses #Software #Virus

The virus is such kind of infectious or malware content in the system of any computing device or smart device that can turn out the whole behavior of the system go in the wrong way.

This can also harm up to the hardware of the device too but only if the type of virus is extremely dangerous, and this is possible although it happens very rarely.

Android is one of the most stable OS which is said to be the safest configuration from the virus attacks and most probably the users of Android does not pay any chance for Antivirus software as they never get any contact with any form of virus related issues.

Although rare still there are some very dangerous viruses that can harm up to the Android

1 Godless

This one is the most dangerous virus that can be actually found patched even with the apps from the Google Play store, this means that you cannot be sure that how you can prevent from it as you will be finding up no such place more secure than Google Play Store.

This one roots up the device silently and then cause various troubles to the functioning of the device.

Removing it is also very much difficult, to tell you this virus is just the god of all another virus in case of harming up the device.

2 Schedun

A well known android malware that can cause your Android to root itself automatically without the user being known of that and then it makes up the pathway for the live streaming of the Ads all here and there.

You cannot find it alone but it comes patched with viral apps that you might install from the third party stores or websites.

The main thing that disturbs the affected device user is that it cannot be removed easily and there is a need to reflash the whole OS so as to get rid of it.

3 Gunpoder

This virus gets installed with the third-party emulators of Nintendo consoles found outside the Google Play Store.

It means that this patched virus can just come on your device with the third party apps and can cause up the device and can hack up the games i.e most popular online games.

To get rid of this virus you can reset your device but this isn’t proved to be fully effective all the time.

4 Hummingbad

The device affected with this virus can download and install apps to the device by itself, steal up the information without your permission and hence left you to feel snubbed from inside as if you have lost up the control of your data as well as the device.

5 Cloned and Copied Apps

The apps related to some popular apps or any such clone of the app that you could download through the third party stores can push you in trouble as it can cause up your device to retrieve all the information and send it to the hackers or the spammers.

To be secure always you should not use up the third party sources or install clone apps of any such popular apps which could be a planned idea of the hackers.

Uncategorized

Few tips to staying safe online and preventing identify theft

#Hacks #hackers

▪️Share documents while at home

▪️Stay clear of sending sensitive data across public Wi-Fi networks

▪️Use double verification systems

▪️Do not share your passwords or leave them lying around

▪️Keep an eye on your credit score

▪️Watch out for phishing websites and fake campaigns

▪️Use an antivirus program on desktop and mobile

▪️Shop only at reputable websites

▪️Keep data divulging on social networks to a minimum

▪️Only download software from reputable sources

▪️Be wary of social media-spread fake contests and links

Uncategorized

Network Protocol Terminologies Part 1

LAN: LAN stands for “Local Area Network” and refers to a network that is not publicly accessible by the internet. Examples of this are home or office network.

WAN: WAN stands for “Wide Area Network” and generally refers to large dispersed networks and, more broadly, the internet.

ISP: ISP stands for “Internet Service Provider” and refers to the company responsible for providing you access to the internet.

NAT: Network Address Translation allows requests from outside your local network to be mapped to devices within your local network.

Firewall: A firewall is a piece of hardware or software that enforces what type of network traffic is and is not allowed. This is generally done by establishing rules for which ports should be externally accessible.

Uncategorized

Network Protocol Terminologies Part 1

Network Protocol Terminologies Part 1

LAN: LAN stands for “Local Area Network” and refers to a network that is not publicly accessible by the internet. Examples of this are home or office network.
WAN: WAN stands for “Wide Area Network” and generally refers to large dispersed networks and, more broadly, the internet.
ISP: ISP stands for “Internet Service Provider” and refers to the company responsible for providing you access to the internet.
NAT: Network Address Translation allows requests from outside your local network to be mapped to devices within your local network.
Firewall: A firewall is a piece of hardware or software that enforces what type of network traffic is and is not allowed. This is generally done by establishing rules for which ports should be externally accessible.
Uncategorized

HOW I HACKED INTO MY FRIEND’S CCTV CAMERA WITH JUST MOBILE?

HOW I HACKED INTO MY FRIEND’S CCTV CAMERA WITH JUST MOBILE?

Let’s Begin
Note that all the CCTV cameras are operated and connected to the Wi-Fi network. so if I wanted to hack into CCTV camera system I must get into the Wi-Fi network. Now there are a lot of easy ways and articles with which you can find on how to hack Wi-Fi networks.
So I will skip this step. After getting access to a Wi-Fi network the first thing I did is I typed the router address into the browsers URL.
   192.168.1.1 
If you are not sure about whats the IP address for the specific router you can simply look for a router, it’s brand and just simply Google it. Like if I want to know the IP address [Admin Panel address] of a TP-link router I will Google “TP Link admin panel IP address” that’s it and you will get it. !
Now moving towards all I have to do is to get into the router setting now most of the time people don’t change the default username and password for the router so you can always try for simple configuration like :
AUsername: password Admin:admin Admin:12345
And there are a lot of things! you can get the list on the internet just simply Google “the router name brand and the default username and password”. if your friend is smart enough to change the username and password you can still get into it refer to this article: You want password cracking then you seaech my name on search bar and learn
,
Since he was using the default username and password I got into its routers admin panel
then I remember that he had few webcams and few devices connected to it. Luckily in the admin table, I configure and figure out all the devices with hostname. Like if you are using a Lenovo PC then it’s name should be there likeLenovo laptop if you are using a mobile of Samsung the it should display etc and you can just assume that rest of the devices are printer or webcam for CCTV cameras. etc.
So instead of searching to all the connected devices and looking for the open port I decided to use a smart way I decided an app to view the stream of the webcam that automatically find all the CCTV cameras connected to the network with the same Wi-Fi
Now I know that what was the company of the CCTV cameras so I search the company name model and its vulnerability it had one vulnerability and I took advantage of it.
I examine the vulnerable code and I found that there is a vulnerability which can be exploited to get into the webcam so I open the termux app on my cell phone and started to hack into a system
wget http://192.168.1.99//proc/kcore | strings | nano
checking the memory leak I couldn’t find the password so I search forward with exactly words like admin because I thought that admin is the default username and password is usually near the username and it was a lucky guess! I was able to find the username and password so I took the advantage of this vulnerability and easily hack into the system
The very next thing I did was to report the vulnerability to the company’s office and my friend I also advised him to change the default username and password and give him a tip that the username and password should be difficult which includes hexadecimal character and a combination of capital and small alphabets with also some special characters and numeric values!
This way you can hack into any CCTV camera if it has a vulnerability.
With just some googling and basic knowledge you can do this very easily. Share this article and I will soon share more awesome Hacking related and pentesting related articles.
Get in touch with us on every social platform!
  
Uncategorized

30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMING

​​

30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMING

Today I\’m sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.
 DOWNLOAD PHISHING PAGES
Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.
SETUP PHISHING PAGES
Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
    000webhost
Step 2 – After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name. 
• Email – Your any Email.
• Password – What you like 
• Website Name – link name for your phishing site.
Step 4 – After successful Registration, You MAY see the dialog box 
Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)
Step 7 – Now You need to open file manager of your website on webhost and then just find html folder or public html.
Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.
if victim will enter details you will get it on same folder in your file manager of 000webhost account