Posts

Showing posts from 2017

HOW TO BE ANONYMOUS DURING HACKING

Image
If you wish to start your career in the hacking domain, then the main thing you need to consider about is anonymity. So, what you need be concerned is how to be anonymous. The basic techniques of anonymous will be discussed. Let’s discuss A. VPN VPN is known as Virtual Private Network. 1) VPN The mobile or computer will get connected to a new network; we will be accessing the internet in the name of IP address provided by VPN provider. The VPN that your getting connected should be so secure enough or reputed one. Or else you’re in a vulnerability point of action. So always be cautious on connecting to any network. Let me tell you something about IP address. If you connected to the internet, then google “what is my IP” you will get your dynamic IP address which is given by your mobile network service provider which may change by an hour, a day no longer than that. Static Public IP is costly. If you are a broadband provider then you can have a one public static IP address, E...

HOW TO BE ANONYMOUS DURING HACKING

Image
If you wish to start your career in the hacking domain, then the main thing you need to consider about is anonymity. So, what you need be concerned is how to be anonymous. The basic techniques of anonymous will be discussed. Let’s discuss A. VPN VPN is known as Virtual Private Network. 1) VPN The mobile or computer will get connected to a new network; we will be accessing the internet in the name of IP address provided by VPN provider. The VPN that your getting connected should be so secure enough or reputed one. Or else you’re in a vulnerability point of action. So always be cautious on connecting to any network. Let me tell you something about IP address. If you connected to the internet, then google “what is my IP” you will get your dynamic IP address which is given by your mobile network service provider which may change by an hour, a day no longer than that. Static Public IP is costly. If you are a broadband provider then you can have a one public static IP address, E...

WOW!!!! ETISALAT INTRODUCED "TIME BASED BROWSING" FOR DEVICES/PC

Image
In spite of all the gross amount of money hanging on their neck, Etisalat is still trying their best to manage the company, so as for them not to loose their precious customers. Etisalat has punch the clock with their own time based data plan called Blaze On, powered by Comptel’s FWD solution. I can tell you that there is nothing as good as a timely based unlimited data plan in an environment of good network reception. Timely based data plan was firstly introduced by Airtel in 2015, by then, you can get 1hour with just N180 to download unlimited, but Airtel later increased the price and that was how the Airtel timely based data plan was beried alive. Etisalat is now took over from where Airtel stopped. Etisalat Blaze on is the fastest and easiest way for Etisalat customers to connect to the internet. You get connected no matter where you are, simply by choosing the most suitable time plan for you. With BlazeOn Data Plans, you can get 10min for N50, 15min for N70, 30min for N120 or ...

How To Create A Hacking Pendrive That Can Steal Passwords From Victims Computer

In this tutorial as Steal Passwords I am going to show you that how to make a Portable Hacking device with a Pendrive that can hack most of the online passwords from victims computer and with the help of this program you can also help your friends and relatives to recover their forgotten passwords or you can say as Steal Passwords, Yes you heard it right after following this tutorial you can hack like a pro and the tutorial is very easy. Anyone who has a basic computer knowledge can do this tutorial Easily. During the time of tutorial if you find any queries then please feel free to ask us by simply commenting in the comment box and we will get to you asap.  How To Create A Hacking Pendrive That Can Steal Computer Passwords Things You Need:   1. Pen Drive  2. Computer/Laptop  3. Web Browser Pass View()  Step 1 : Download Web Browser Pass views Zip file from the above link  Step 2 : Insert your Pendrive to your Computer and then Quic...

HOW TO HACK A WIFI NETWORK USING CMD IN WINDOWS

Image
Windows command prompt is a great tool for the people who love command interface rather than Graphical UI. There are a lot of features which are still not implemented in Graphical User Interface can be accessed via CMD. In my previous articles, I’ve talked about a lot of CMD commands. In this article, I am going to share how to find out the password of all connected devices using CMD along with suitable screenshots for clear understanding. Before going further, you should know one thing that whenever you connect to a Wi-Fi network and enter the password, Windows creates a WLAN profile of that Wi-Fi network. These WLAN profiles are stored in the computer alongside other required details of the Wi-Fi profile. We can uncover these WLAN profiles later by simply using Windows CMD. You can find out all the connected networks and their passwords by using simple commands. These commands can also uncover the Wi-Fi passwords of  the networks which are not connected at the moment but were c...

TYPES OF HACKING ( "BEGINNER LEVEL" )

Image
Types of Hacking Computer Terminals (Servers): The method of taking control of terminals or completely make it is useless or crash it. These are the common types of hacking used from ancient times of hacking. 1. Denial of Service Types of Hacking The most common methodology of attack is DoS attack which is also called as Denial-of-Service. This method of hacking may crash your system completely or make your computer or server entirely busy without allowing to access. There is also an important point to be noted in the DoS attack; your computer will become a participant to be DoS attacker from another server or computer if your system is attacked in this method. 2. Distributed DoS Types of Hacking Distributed DoSs are the coordinated DoS which have the multiple sources.A DDoS is extremely difficult to block because it will be multiple, changing and they have the multiple Pubic addresses. 3. Sniffing Types of Hacking TCP is the packet which is the pr...

HOW TO HACK LEVEL 1

Introduction Welcome to how to hack, hacking course. In a computerized world, technical effort to enter the virtual world called networks and get access to anything on particular network is called hacking.The hacker is who is the one who is personally and totally engaged in hacking activities.The terms hacking is the historical word which is not a necessity for the computer system.The malicious programming attacks over the internet at a specific network. If the hacker involved in attacking the network without the knowledge of host then they are called black hats, if someone testify a hackable network for vulnerability then they are called as white hat hackers. Let us make your way easier to get into topic, dont skip the detailes.We concered about your time, we made everything little shorter. Origins of Hackers M.I.T. engineers in the 1950s and 1960s first spreading hacking all over the world first time. In beginning it was started as a fun and testing activi...

TYPES OF HACKERS

Image
Types of Hackers:-    These are the following types of a hacker who rule the virtual world.It would be so interesting to know about the cultures of hacking.Their life style is entirely different from ordinary people.They have extraordinary talents and skill in technology.A domain expert will always contribute to the domain he is working on.But hackers are the personalities who play roles on all the field by nature.Hacker cannot be the only male; they are well performing female pirate too.The black hats call them Anonymous because they don’t want that reputation to be valid for a single person or group. Script Kiddies types of hackers Script Kiddies are those don’t have proper knowledge of technology without which they just try to do some fun tricks. They use to hack games, create an impression of other they are the best hackers. They just steal data from the weakest network by attacking the system. They us...

How To Use Airtel Live 0.00kb Free browsing Cheat on PC With Psiphon For PC

Image
If you are really interested in using the airtel 0.00kb cheat on PC, count yourself lucky as the solution and settings are right here for you to setup and enjoy. I guess some people are unaware that Psiphon also has PC versions. In other words, there are Psiphon VPN for PC and we would be making use of it on this tutorial. So follow me along as I reveal the settings. REQUIREMENTS Modem/MiFI or Smartphone Hotspot A laptop, or desktop PC Your Airtel SIM card with 0.00kb balance Stable 3G or 4G network PC web browser (Chrome preferrable) Then, download Psiphon handler exe for PC PSIPHON SETTINGS FOR AIRTEL LIVE FREE BROWSING ON PC First of all, download psiphon handler for PC from the link above and install it on your computer After that, connect your PC to the internet via modem/MiFi or use your android phone Hotspot (ensure sure no VPN is not connected on the phone while you share hotspot ) Then, launch the installed Psiphon on your PC Go to setting...

How to use MTN 0.00kb Free Psiphon Settings for Browsing Cheat 2017 Via DataReset

Image
How to use MTN 0.00kb Free Psiphon Settings for Browsing Cheat 2017 Lately, I posted a lot of Airtel Psiphon Cheats, well today, with so much excitement I can tell you all that MTN 0.0KB free browsing cheat (DATARESET) is back. This time you can connect and browse via Psiphon VPN. Before now, it looked as if it was only Glo and Etisalat cheat are currently blazing after the Airtel Live 0.00 browsing cheat stopped working last week. The good news is that MTN Data reset that blazed last year is back again this year. I am here to show you the settings and configurations on how to use it to browse and download on your Android phone and PC. Due to the popularity of the MTN network it, therefore, means a wider range of coverage in the country. So expect a blazing fast Internet coverage while using this cheat. Let’s we proceed to the configuration and settings for this MTN DATARESET cheat REQUIREMENTS Psiphon  or  here  for PC...

Glo subscription and Glo data plan for Android, Iphone and Blackberry

Image
Glo Subscription  – Here are the Glo subscription codes for Glo Bundle Plan, Glo Internet Bundle and Glo Data Plans For Android 2017 . If you are in need of cheap internet subscription for your device, then the Glo subscription is for you. Because it is currently the cheapest internet package in Nigeria as compared to their counterpart MTN , Airtel and Etisalat . Way back 2013 would you believe that you could ever get a 3.2GB for N1,000 or 10GB for just N2,500. This is just insane. This article will give an in-depth looked into the Glo Data Plans, how much they cost, the Glo Subscription Codes and how to check the data balance. The Glo 4G Data Plans (4G LTE) The 4G LTE Glo Subscription plan was recently rolled out for the 4G device users. And here is how to subscribe to the Glo 4G Data plans Dial *777# and select 2 for the 4G plan Weekly Glo Subscription for 4G Data Plan, Price and how to subscribe 1.6GB for N500 the data is valid fo...
Related Posts Plugin for WordPress, Blogger...