Showing posts sorted by relevance for query windows. Sort by date Show all posts
Showing posts sorted by relevance for query windows. Sort by date Show all posts

Monday 4 July 2016

Hack WhatsApp Account – Method 2

Leave a Comment

#1. Go and install the WhatsApp on your android phone.
#2. Get your victim’s mobile and find the MAC address of your victims' phone. i.e. 34:3f:4a:46:a5:34 etc.See how to find MAC Address Of Android Phone.
#3.In Android Go to Settings > About phone > Status > Wi-Fi MAC address.
In iPhone Go to Settings > General > About > Wi-Fi Address.
In Windows phone Go to Settings > About > More info > MAC address.
In BlackBerry Phone Go to Options > Device > Device and Status info > WLAN MAC.
#4. Now find your own MAC address and replace your MAC with your victim's MAC Address.
Read- How To Use WhatsApp Without Mobile No.
For example, if your victim’s MAC address is like 34:3f:4a:46:a5:34, then you also have to replace your MAC address with victims MAC Address.
#5. Replacement of MAC address is not possible so you have to use MacDaddy X or WifiSpoof on iPhone. OR
For Android –
Install BusyBox – Download BusyBox.
Terminal Emulator – Download Emulator.
#6. Install WhatsApp on your phone as you install normally and enter your victim’s phone number. As u enter the verification code the WhatsApp will run.
#7. Now delete that verification message from your victim’s phone.
#8. Now you can receive your victim’s all messages not only receive you can also send messages from your phone.

Read More

Sunday 6 March 2016

WHAT IS TROJAN HORSE VIRUS AND HOW TO REMOVE IT.

Leave a Comment

Are you facing virus threats on your computer? Is your computer behaving abruptly or are you the victim of a disk crash?  Is your computer hacked by a Trojan horse virus attack? A Trojan horse virus attack is one of the most dangerous threats to your computer and needs to be fixed immediately. If it is not protected on time, then the virus can lead to failures in connecting to the IRC network or even worse can lead to your computer hacking and then your computer might be used by some anti-social elements in shaping some criminal attacks.



ABOUT TROJAN HORSE VIRUS


Before knowing how to remove this evil threat first one should know what actually a trojan horse is? It is a security breaking program, also malicious to your computer and is disguised in some benign object. It can be downloaded unknowingly through any document, executable, zip, movie or music file and unleashes a dangerous malware into your drive on executing the files.
This malware can completely wipe your disk or can even send your credit card details and passwords to any stranger on the web. It is not at all operating system specific. It can affect any operating system but affects windows more promptly due to its popularity and weaknesses. This is a silent attacker and many people come to know about its attack after it has infected other connections.

HOW TO REMOVE TROJAN HORSE VIRUS


  • There are many ways one can avoid itself from being a victim of this malicious virus but the best is to be attentive in downloading and executing files from an unknown source or person and also doing a background check of it if downloading from a known source. But if you have already been a victim of it then you need to take immediate steps to remove it from your drive before it creates some major problem. You need to repair and then reformat your system completely to remove all malware which may take from several hours to several days.
It is quite possible that the removal has not been done properly and may lead to the coming back of the virus again and again in such cases you must take stronger measures to curb this problem.
  • Firstly you need to have anti-virus software installed in your system and that too an updated one or else they will miss the latest species of Trojan horse. Anti-virus software helps prevent the system from many Trojan viruses. Then make sure you have updated your operating system as well with all new security patches.
  • One may also have to install Anti-trojan programs like The Cleaner which specializes in Trojans. Once it is installed reboot your computer in safe mode and use the cleaner to clean all registries and drives for any Trojan suspected. Make sure the internet is unplugged while cleaning. Once cleaning is complete reboot the system again.
  • After using the cleaner make sure that you have updated your operating system and have changed all the passwords. Once the system is repaired make sure to take a backup of every data and reformat the system completely.

Read More

Sunday 31 July 2016

How to Remove Computer Virus Using Command Prompt (CMD)

Leave a Comment



Each file and folder have the following attributes:

1).  Archive A
2).  Read Only R
3).  Hidden H
4).  System S
-(minus) sign before an attribute it means removing attributes and +(plus) sign mean giving attributes to the file or folder.
example ) attrib -r -a -s -h file.txt  this will remove all attributes from file.txt  and attrib +r +a +s +h file.txt  will give all attributes to file.txt .
If pen drive or other hard drive is infected by virus ,Command prompt is the best option.Follow the steps given below.

1).  Go to the command prompt by start>all programs>accessories>command prompt or press windows key+r and enter cmd .

2).  Go to the drive where you want to delete virus example write d: to go to D drive .

3).  Type “attrib -r -s -h *.* /s /d” without quotations  and press enter .

4)press dir /a .

5).  Delete all the .inf, .exe , .dll, .log extension file if they are not your files by using dos del command .

Example:
del autorun.inf
if any file is not deleting rename that file by rename command
Example:  rename dst.exe ms.bak this will rename dst.exe to ms.bak

Now Your pen drive is virus free .

Read More

Sunday 7 August 2016

How To Access Unlimited Internet Without Entering Username And Password In Universities,Colleges And Schools

1 comment







Hello Friends Today I am going to show you how to access unlimited internet at universities, colleges, and Schools without entering username and password
Here I will give you software which enables us to access the internet without entering username and password, this will mostly be helpful for students


THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY 

ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY


In this software you can access VPN, SSH, SSH+  And You Can Enjoy Surfing Speed To The Max 


What is VPN:: 

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or Wi-Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network while benefiting from the functionality, security and management policies of the private network.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. Major implementations of VPNs include OpenVPN and IPsec.



What is SSH::

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. The protocol specification distinguishes between two major versions that are referred to as SSH-1 and   SSH-2. The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used similarly for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysisThe encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.





There are some limitations for this software

1) You can use a VPN unless you log in and you can not use both VPN And SSH at a time

2) You can not get 100% Speed By using this software 

3) While Downloading your Downloading Speed Decreases By 25%-30%


Download It from Here




            Thank You for Reading My Post, I Hope It Will Be Useful For You


Read More

Sunday 17 September 2017

How to Find And Remove Duplicate Files In Computer

1 comment

How to Find And Remove Duplicate Files In Computer

You must be aware of the fact that duplicate files in your computer can waste your precious space. There are very limited options out there to find and remove duplicate files from your computer and today we are going to share three easy methods by which you can find and easily delete duplicate files from a computer. Go through the post to know about it.


Today we perform lots of copy and paste tasks on our computer, and sometimes we copy some of the files that previously exist on our computer in some other directory. For example, if we have any duplicate movie on our computer, then it is wasting around 2-4 GB memory space on our computer. So better is to remove the duplicate files on a computer to save a lot of memory. Therefore, we are here to resolve the issue of finding and removing Duplicate Files on Computer.

How to Find And Remove Duplicate Files In Computer


By this method, you can find the files that have more than one copy and the actual path of the file to delete them. Just read out the below steps to proceed.

Step 1. First of all, download and install the Duplicate File Finder from here. Now launch the software in your operating system.

Step 2. You have to select there the folder that you want to check for duplicate files on your PC. Now on the right side, there will be an “add” button click on it and select the path to scan that file over the directory and click on OK.

find-duplicate-files-1

Step 3. Now it will start scanning files that you have selected and also there will be a message box that appeared there along.

find-duplicate-files-2-649x420

Step 4. Now if it finds any duplicate file, then it will display the path in a message box. Open that file and delete it to save memory.

find-duplicate-files

Using Digital Volcano Duplicate Cleaner


Duplicate Cleaner is a useful program to help you organize the contents of your home hard drive or corporate network. You’d be surprised just how many redundant or duplicate files you could find forgotten in an obscure documents folder.

Duplicate Cleaner will deep scan for all types of files – photos, music, films, video, Word documents, PowerPoint presentations, text files – you name it, if it appears twice on your computer then Duplicate Cleaner will find it. Once these files are found you are provided with helpful tools to enable you to select which copies to delete or move. These files can be deleted to the recycle bin or moved elsewhere. Let’s know how to use it.

Step 1. First of all, download and install Duplicate cleaner on your computer and open the app you need to set the scan criteria and click on Start Scan to perform a scan.

duplicate-cleaner-696x497

Step 2. Now you have to wait for a few minutes to complete the scan.

How to Find And Delete Duplicate Files In Computer

Step 3. After the scan completes, you can see the files marked as duplicate as well as the total size of duplicate files.

How to Find And Delete Duplicate Files In Computer

You can now delete it by selecting all your duplicate files.

Using VisiPics


If you get too many pictures on your hard drive, downloaded or photographed, from several different sources, you may have many duplicates. In that case, you need a quick and easy to use program that finds and deletes all your duplicates.

VisiPics does more than just looking for identical files, it goes beyond checksums to look for similar pictures and does it all with a simple user interface. First, you will need to select the root folder or folders to find and catalog all of your pictures. It then applies five image comparison filters to measure how close pairs of images on the hard drive are.

Step 1. First of all, You need to download VisiPics on your Windows operating system from here.

Step 2. Now open the app, and you will see the screen like below.

Using VisiPics

Step 3. Now you need to select the folder that you want to scan for the duplicate pictures.

Using VisiPics

Step 4. Now hit the ‘Start’ button

Visipic-3

Step 5. Now if the folder has any duplicate image stored, it will show you and you will get the option to delete those files from there.

Using VisiPics

That’s it! You are done. This is the easiest way to find out if any duplicate image files are present inside the folder.

Using CCleaner


CCleaner is the number-one tool for cleaning your PC. It protects your privacy and makes your computer faster and more secure! CCleaner cleans up these files and makes it faster instantly.

Step 1. First of all, you need to download and install CCleaner on your desktop computer. Once installed, you need to click on “Run CCleaner”

Using CCleaner

Step 2. Now you will see the screen like below. Here you can analyze and clean your computer.

Using CCleaner2

Step 3. Now from the left panel, you need to click on “Tools”. Then you will see the screen like below.

CCLEANER-3

Step 4. Now you need to select the option “Duplicate Finder”

CCLEANER-4

Step 5. Now you need to select the drive or folder that you want to scan for the duplicate files. If you want to search for a specific folder, you need to click on “Add”

CCLEANER-5

Step 6. After selecting the file you need to click on “Search” as shown in the image below.

CCLEANER-6

That’s it! You are done, CCleaner will scan for duplicate files and will let you know if you have any duplicate files. You can delete it from the CCleaner itself.

So above is all about finding and removing duplicate files from Computer. By this, you can easily locate the duplicate files and remove them. Hope you like the post, don’t forget to share it with your friends and leave a comment below if you still need any help.
Read More

Sunday 6 March 2016

BOOST YOUR PC PERFORMANCE-HOW TO GUIDE

Leave a Comment

It is frustrating, when you sit down to work, doing something important, and your computer takes long processing time for every possible instruction you give. A great amount of dissatisfaction is felt when these electronic devices work slow. The mobile phones and the computers are the two devices where the user wants results with the click of a button and in a fraction of a second.
Over some time the speed of these devices especially computers go very slow. A variety of reasons that can be traced for Poor performance are:
  • Hard drive space not enough
  • Too many unused programs on the disk
  • Outdated versions of the operating system
  • The outdated version of the drivers installed



TIPS TO BOOST YOUR PC PERFORMANCE


1)There are lots of ways to Boost Your PC performance and improve performance even without changing the hardware. One of the biggest and the common reason for a slow PC is the presence of a virus, a malicious program that affects your PC speed. The virus eats your PC speed by using the computer resources and it also corrupts the system hardware and its software. Installing a good antivirus or even installing some basic antivirus would surely improve the speed and would accelerate the speed.
2)Having lots of load on your hard disk drive also slows the speed of your PC. The PC needs 5GB of free space to work and if you do not have then the speed is affected. The solution in such a scenario is simple which is either to remove the unwanted files or transfer them to any other external hard disk especially the audio, video and the image files that occupy a lot of space.
3)Having too many shortcuts or having too many unused icons on the desktop or unused files all are substantial reasons for a slow PC. It is essential to reduce this clutter by deleting it. There is always a set of junk files created when you work on the internet especially when you download files, install programs or even when you uninstall programs. It is extremely essential to remove these junk files once the task is done to ensure better performance.
4)Disk defragmentation utility in the Windows operating system is one of the best ways to improve your system performance. It is seen that over some time you perform certain activities like creating a file, modifying a file or deleting a file due to which your files get scattered on the disk. It becomes time-consuming for the system to retrieve such files so the disk defragmentation utility enables to fragment of the scattered file. It can be used once in a week for better performance
5)The disk cleanup utility can also be used to clean all the unused and unwanted temporary files created at the time of using the internet. Also, it cleans all the files in the trash that are no longer required. So implementing some of the few tips mentioned above can surely give you a better PC performance.
Read More

Tuesday 30 August 2016

How to become a Hacker

Leave a Comment



how to become hacker 1


Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

learn linix/linux

UNIX/LINUX is an open-source operating system that provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot to the world of security. You should install LINUX freely available open-source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

  • Start Learning Linux

2. Code in C language 

C programming

C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in the late 1970s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

3. Learn to code in more than one Programming Language

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

  • Top 6 Websites To Learn Computer Programming Languages

4. Learn Networking Concepts

computer networking
Another important and essential step to becoming a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loopholes) in the system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning, etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX, etc. Every system has a loophole, the hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality, and integrity of data. Information on a network is in an encrypted form such as passwords. While hacking a system, these encrypted codes need to be broken, which is called decryption.

  • Decrypting Window 7 Password Using Ophcrack

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never-ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Set up your own lab for experimental purposes. You need a good computer system to start with as some tools may require powerful processor, RAM, etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loophole program)

hacking vulnerability

Vulnerability is the weakness, loophole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network, etc. Try to write your own and exploit the system.
  • 6 Most Common Password Cracking Methods And Their Countermeasures

10. Contribute To Open Source Security Projects

open source software
An open-source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

Read More