Pages

Search

Thursday 22 May 2014

GODMode Find All Settings Quickly on Computer



Thursday 15 May 2014

A Basic Guide to the Internet



INTERNET

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.


The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.



--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface.

Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may

also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.


E-MAIL

Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent.

Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages.

These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program.

Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.


TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.


FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.


E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.


USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.


FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup.

Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.


CHAT & INSTANT MESSAGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Firefox Speed Tweaks



Yes dear friends, 
Firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settings and put in the numbers below - for the true / false booleans - they’ll change when you double click.
Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300



One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!

Saturday 19 April 2014

Code to Invite All Friends to FaceBook Page At Same Time

 
WORKING AND VERY EFFICIENT!
Instructions:
1. Click Invite Friends on whatever you are inviting people to
2. In the dropdown next to the search box, click Search All Friends
3. Scroll ALL the way down until names stop loading (I found it easy to click the first name and then hold down the spacebar or Page Down button)


4. For EVENTS Copy this code:
javascript:elms=document.getElementsByName("checkableitems[]");for (i=0;i<elms.length;i++){if (elms[i].type="checkbox")elms[i].click()}

For PAGES Copy this code:
javascript:var inputs = document.getElementsByClassName('uiButton _1sm');
for(var i=0; i<inputs.length;i++) {
inputs[i].click();
}

For Chrome:
5. Press (CTRL+Shift+J) for WINDOWS or (Command+ Option+J) for MAC on your keyboard.
6. Paste the code into the box at the bottom and press enter (next to the blue ">")
7. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

For Firefox:
5. Press (CTRL+Shift+K) for WINDOWS or (Command+Option+K) for MAC on your keyboard
6. Paste the code into the box at the bottom and press enter (next to the blue ">>").
7. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

For Safari:
5. Go to Preferences - Advanced - check "Show Develop menu in menu bar" and close the preferences window.
6. Go to Develop - Show Error Console (or Command + Option + C)
5. Paste the code into the box at the bottom and press enter (next to the blue ">").

For Internet Explorer:
5. Press F12 on your keyboard
6. Click the "Console" tab
7. Paste the code into the box at the bottom and press enter.
8. For large friends list, this may utilize all your resources and will cause the page to freeze and be unresponsive. Just wait a few minutes until all the names get selected.

Sunday 13 April 2014

How to Hide | Change Your IP Address


Changing or Hiding the IP address is one of the biggest concerns of all Hackers as the IP Address can reveal the identity if the Hacker. Its just like your online address. If anyone can find your actual online address (IP Address), tracing you back won’t be that difficult.

Thus it is very important to hide or change your IP address before doing any kind of hacking attack or even think of doing so.



We can use the proxy service called Hide my Ass (pro VPN).

http://www.hidemyass.com/vpn/


What’s that? Let me explain in detail.  We all know about proxy servers. They help us to hide your ip address or change ip address but there are many things you guys don’t know.

1) Free proxies are not completely anonymous – Your up can be disclosed by the website owner to the concerned authorities if needed.

2) Companies limit the maximum speed of browsing in free proxies – Say your internet speed is 8 Mbps, still using free proxies you can browse internet with a speed of only 265 kbps. This is irritating, isn’t it.

3) Many Webmasters can block users accessing free proxies.

There are different type of proxies. Read Types of Proxy | How to Hide IP Address for more. Even I wanted a reliable and Elite Proxy which can help me completely hide my Online Identity and what else could be better than changing my IP address every minute. I looked for many solutions online and then I found the PRO VPN of Hide My Ass.

HideMyAss.com

To be very honest, in the beginning I was a bit confused when I saw the software. I was not very sure if it would work the way I wanted to but then I gave it a try. I thought of jiving it a try just for 1 month. It was just for $11.52 then , not it costs $9.99 only. I could actually think of spending $11.52 for my only if it gave me the kind on anonymity I wanted on internet. It helped me secure my online Identity online.


You can also download its trail version for testing it.

Here are benefits I got after using the PRO VPN of Hide My Ass.
  • Super fast, high speed elite / anonymous proxies. Elite proxies are 100 times more secure than free proxies
  • I could select the country whose IP address I wanted in just 1 click. It offers over 38000+ unique IP Address from 53 different countries.
  • I can set the timer to automatically change the IP Address. This way my IP Address gets changed every minute without me bothering to do so. If I am implementing a hacking attack, no-one could actually find my actual IP Address so I am always on the safer side.
  • It anonymously encrypts all the traffic and works with all kind of platforms. Unlike free proxies the PRO VPN of Hide My Ass is not blocked by the websites. The traffic seems to be of legitimate human users, not proxies so on one can catch you using them.

I am giving away some screenshots for you guys so that you can have a look at what

the software looks like.

Here is what the homescreen of the VPN looks like:


We can select the IP Address of the country we want. There are 53+ countries and

38,000+ IP Address to chose from. We also get the provision to set the IP timeout ie we can select the time after which each IP Address should change and we get a new IP Address. It is a simple one click setting. Hiding / Changing your IP Address automatically was never so simple.


Now that you guys have everything infront you you, you can imaging how easy it is to change the IP Address automatically using the Hide My Ass Pro VPN. This surely is the best proxy service out there. I was so overwhelmed by its response that I decided to write a detailed review about its performance.

If you are still in doubt just go and give it a try. It surely is worth it. I am sure you can spend $9.99 for your online security. It can actually have you from $$$$ loss and at the same time secure your online identity by making you anonymous.


There are many other benefits of using this service. This post has already become too long so will not stretch it more, maybe I will soon write another blog post for you guys describing how this Best Proxy Service can help you from getting hacked and increase your online security by continuously changing your IP Address.

Thursday 10 April 2014

What is IP Address | Its Classes



Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this:
216.27.61.137

What is the use of IP Address?

Let me clear this concept with the help of an example, if you want someone to visit your place what do you do? Tell that person your address don’t you. Similarly what will you do if you want to reach someone over a similar or different network over a computer system. You need some mechanism to address difference computers so that they can communicate with each other or information sharing is possible between two computers. To make this information sharing over computers possible, we need IP Address.
An IP address is just like an online address of a computer. It is used to refer to a computer over a network which makes it possible to address that computer uniquely over the network

To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a “dotted decimal number” like the one above. But computers communicate in binary form. Look at the same IP address in binary:

11011000.00011011.00111101.10001001

The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!

Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.

Now you might be thinking – What is my Ip Address.
Finding your IP address is really simple, just visit http://whatismyip.com and it will display your IP address along with the other important information like your geographic location, Internet provider etc.

Classes of IP Address

The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses

Default Network – The IP address of 0.0.0.0 is used for the default network.

Class A –
This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.
Net     Host or Node
115.     24.53.107


Loopback – The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.
 
Class B – Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Net     Host or Node
145.24.     53.107


Class C – Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Net     Host or Node
195.24.53.     107


Class D –
Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net     Host or Node
224.     24.53.107


Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net     Host or Node
240.     24.53.107


Broadcast – Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255

Monday 7 April 2014

6 Ways to Hack a Facebook Account | Secure Your Facebook Account



6 Ways to hack a Facebook account, something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .

1) Phishing :

The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.

Drawbacks :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.

Prevention :
  • Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
  • Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.  Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.

2) Keylogging :

This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.

Drawbacks :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

3) Trojans/backdoors :

This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .

Drawbacks :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

4) Sniffing:

It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.

Drawbacks :
  • If user is logged out then attacker is also logged out and the session is lost.
  • It is difficult to sniff on SSL protected networks.

Prevention :
  • Always use SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

5) Social Engineering :

This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.

Drawbacks :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).

Prevention :
  • Never give your password to anyone.
  • Don’t believe in any sort of emails which asks for your password.

6) Session Hijacking:

In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.

Drawbacks :
  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.
Prevention :
  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

Sunday 6 April 2014

What is a Hardware Keylogger | How Hardware Keylogger works

A Hardware Keylogger is nothing but a programmed chip (Mostly in assembly Language), so as to capture all the keystrokes and save them in its internal memory. The keylogger can then be taken out and all the stored information can easily be assessed by the hacker. Hardware Keylogger are most commonly used in cyber cafe’s and other public places where a lot of people come and access the internet. Beware of such places.

Always check the keyboard connectors before accessing internet at such places. Hardware Keylogger are extremely powerful and effective and if they are actually installed on any machine and you use it, there is 99.9% chance of you getting hacked.

How can it affect you. Imagine you going to a cyber cafe and make a bank transaction just to pay your bills. No sooner you enter your login detail, the hardware keylogger will save the keystrokes. Some advance hardware keyloggers might also take screenshots at regular interval so that the hacker knows the login details are for which website or webpage.

Once the hacker has all this information in the Hardware Keylogger, imaging what all can he do when he access that information.

And this is just a small example. There is much more damage one can do with a hardware keylogger.

Prevention: To secure yourself from such attack, there is only one way. Check the hardware of the computer you use at public places and even your personal computer if your friends come to your place often. Who knows who might attach the hardware keylogger in your machine.

How to Hack WhatsApp Account





About Whatsapp

Whatsapp Messenger is a cross platform quick messaging application. Whatsapp is assured really the foremost fashionable quick electronic messaging for smartphones. Whatsapp Messenger is accessible for iPhone, Android, Windows Phone, Blackberry and
Nokia and yes, those phones can all message each other. And you all have heard of it if you are not using it. Given below are the several WhatsApp hacks or tricks you should know if you are using WhatsApp.

WhatsApp hack to spy on some other account

So if all of you have noticed you cannot have your whatsapp account logged in two devices. Means session is given to only one MAC address. If the MAC (Media Access Control) address of the device seeking access changes then whatsapp asks you to again verify your account.

How to Hack Whatsapp Account

All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or  mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • Whatsapp hack to use it by not using your number
  • This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.

Now that you know How to Hack Whatsapp account, you are good to protect yours.