Wednesday, 31 July 2013


Hey guys today i am gonna provide you working tricks that How To Bypass Survey There are lot of software and lot of website to bypass survey But not working fine with bypass survey they all are fake website’s won’t work anymore. sometimes when you find some software and some things you need some of f$uker add survey in that links so you need to complete survey and that survey are very bullshit it takes long time to complete and some time you can’t complete that survey after one it said your ip had already complete the survey and some times when you complete survey it don’t let you download the file so that are very irritating and time wasting. there are ShareCash.com ,fileice.com that are survey website that are very irritating survey’s 

So the thing is How To Bypass Survey here is some method’s i gonna provide to bypass a surveys you can bypass any website survey so here we go.

METHOD 1 : 

Here is First How To Bypass Survey you just need to Login to this website surveybypass.com Just Copy that link of survey that you want to bypass and then just click Go then you will get the download  link of that survey link nad you can download the file easily so enjoy the method and if won’t work for you so see the next method How To Bypass Survey.

METHOD 2 :

So here is another website that with the help of it you can bypass the survey so go here how to bypass surveys Go there and you will have to download a 1mb software then just enter the link you want to bypass survey and then go you will get a download link of that site and you can easily download the any software from that site.
   


METHOD 3:

There is Google chrome extension with that you can bypass any survey easily just with one click so download form here Chrome extension just click on the link and download extension in your chrome and it will shown in the upper right corner and when you want to bypass survey just click there and you can bypass survey easily.

METHOD 4 :

Are you tired of surveys on great websites,Don’t want to waste your time on filling forms on surveys, So here are some ways by which you can bypass those surveys
If you are a Mozilla Firefox User then download this plugin Download Link Firefox extension.

METHOD 5 :

Disabling Javascript on Web-Browsers will make surveys never appear:

Google Chrome:

1) Click on Settings’ Wrench on the top right of Google Chrome.
2) Click Options.
3) Scroll down, and Click Advanced system Settings
4) Click on Content Settings to show options of Google Chrome web page content.
5) Under Javascript section check the box: 
Do not allow any site to run Javascript .

6) Done! Now just go the website that asks for surveys and you’ll bypass them. 

METHOD 6 :

1) When you are prompted to take a survey, Right Click the title and Click Inspect Element
 2) Now keep pressing Delete button to delete scripts on Inspect Element tab, until Complete a Survey disappear
3) After the bar disappear, keep deleting until the Page go lighter (whiten) with no dark area.
4) Done! Now you’ll see your full content or download on Sharecash.

SO Here is all How To Bypass Survey just try any of 6 method which worked for you i’ll show you all the method’s to bypass survey so there try and comment down if any works for you and if had any problem will help you. 

How To Bypass Surveys

at 02:36  |  No comments


Hey guys today i am gonna provide you working tricks that How To Bypass Survey There are lot of software and lot of website to bypass survey But not working fine with bypass survey they all are fake website’s won’t work anymore. sometimes when you find some software and some things you need some of f$uker add survey in that links so you need to complete survey and that survey are very bullshit it takes long time to complete and some time you can’t complete that survey after one it said your ip had already complete the survey and some times when you complete survey it don’t let you download the file so that are very irritating and time wasting. there are ShareCash.com ,fileice.com that are survey website that are very irritating survey’s 

So the thing is How To Bypass Survey here is some method’s i gonna provide to bypass a surveys you can bypass any website survey so here we go.

METHOD 1 : 

Here is First How To Bypass Survey you just need to Login to this website surveybypass.com Just Copy that link of survey that you want to bypass and then just click Go then you will get the download  link of that survey link nad you can download the file easily so enjoy the method and if won’t work for you so see the next method How To Bypass Survey.

METHOD 2 :

So here is another website that with the help of it you can bypass the survey so go here how to bypass surveys Go there and you will have to download a 1mb software then just enter the link you want to bypass survey and then go you will get a download link of that site and you can easily download the any software from that site.
   


METHOD 3:

There is Google chrome extension with that you can bypass any survey easily just with one click so download form here Chrome extension just click on the link and download extension in your chrome and it will shown in the upper right corner and when you want to bypass survey just click there and you can bypass survey easily.

METHOD 4 :

Are you tired of surveys on great websites,Don’t want to waste your time on filling forms on surveys, So here are some ways by which you can bypass those surveys
If you are a Mozilla Firefox User then download this plugin Download Link Firefox extension.

METHOD 5 :

Disabling Javascript on Web-Browsers will make surveys never appear:

Google Chrome:

1) Click on Settings’ Wrench on the top right of Google Chrome.
2) Click Options.
3) Scroll down, and Click Advanced system Settings
4) Click on Content Settings to show options of Google Chrome web page content.
5) Under Javascript section check the box: 
Do not allow any site to run Javascript .

6) Done! Now just go the website that asks for surveys and you’ll bypass them. 

METHOD 6 :

1) When you are prompted to take a survey, Right Click the title and Click Inspect Element
 2) Now keep pressing Delete button to delete scripts on Inspect Element tab, until Complete a Survey disappear
3) After the bar disappear, keep deleting until the Page go lighter (whiten) with no dark area.
4) Done! Now you’ll see your full content or download on Sharecash.

SO Here is all How To Bypass Survey just try any of 6 method which worked for you i’ll show you all the method’s to bypass survey so there try and comment down if any works for you and if had any problem will help you. 

Read More

0 comments:

Friday, 19 July 2013


How to Secure Your WiFi Connection

In this Post i am going to tellhow you can secure your PC WiFi Connection in some simple steps.we all know that security of our WiFi Connection is how Important for us. to prevent to your WiFi Signal/Connection to being use by other People.use my Five steps to secure your WiFi Connection.


1. Install a Firewall A firewall helps protect your PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks any information coming from the Internet or a network, and then either blocks the information or allows it to pass through to your computer. 

                                                                                     
2. Change the Administrative Password on your Wireless Routers Each manufacturer ships their wireless routers with a default password for easy initial access. These passwords are easy to find on vendor support sites, and should therefore be changed immediately.
3. Change the Default SSID Name and Turn Off SSID Broadcasting This will require your wireless client computers to manually enter the name of your SSID (Service Set Identifier) before they can connect to your network, greatly minimizing the damage from the casual user whose laptop is configured to connect to any available SSID broadcast it finds. You should also change the SSID name from the factory default, since these are just as well-known as the default passwords

4. Disable DHCP For a SOHO network with only a few computers, consider disabling DHCP (Dynamic Host Configuration Protocol) on your router and assigning IP addresses to your client computers manually. On newer wireless routers, you can even restrict access to the router to specific MAC addresses.

5. Replace WEP with WPA WEP (Wired Equivalent Privacy) is a security protocol that was designed to provide a wireless computer network with a level of security and privacy comparable to what is usually expected of a wired computer network. WEP is a very weak form of security that uses common 60 or 108 bit key shared among all of the devices on the network to encrypt the wireless data. Hackers can access tools freely available on the Internet that can crack a WEP key in as little as 15 minutes. 

Once the WEP key is cracked, the network traffic instantly turns into clear text – making it easy for the hacker to treat the network like any open network. WPA (Wi-Fi Protected Access) is a powerful, standards-based, inter-operable security technology for wireless computer networks. It provides strong data protection by using 128-bit encryption keys and dynamic session keys to ensure a wireless computer network's privacy and security. Many cryptographers are confident that WPA addresses all the known attacks on WEP. It also adds strong user authentication, which was absent in WEP.

Easy Tips To Secure Your WiFi Connection

at 08:04  |  No comments


How to Secure Your WiFi Connection

In this Post i am going to tellhow you can secure your PC WiFi Connection in some simple steps.we all know that security of our WiFi Connection is how Important for us. to prevent to your WiFi Signal/Connection to being use by other People.use my Five steps to secure your WiFi Connection.


1. Install a Firewall A firewall helps protect your PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks any information coming from the Internet or a network, and then either blocks the information or allows it to pass through to your computer. 

                                                                                     
2. Change the Administrative Password on your Wireless Routers Each manufacturer ships their wireless routers with a default password for easy initial access. These passwords are easy to find on vendor support sites, and should therefore be changed immediately.
3. Change the Default SSID Name and Turn Off SSID Broadcasting This will require your wireless client computers to manually enter the name of your SSID (Service Set Identifier) before they can connect to your network, greatly minimizing the damage from the casual user whose laptop is configured to connect to any available SSID broadcast it finds. You should also change the SSID name from the factory default, since these are just as well-known as the default passwords

4. Disable DHCP For a SOHO network with only a few computers, consider disabling DHCP (Dynamic Host Configuration Protocol) on your router and assigning IP addresses to your client computers manually. On newer wireless routers, you can even restrict access to the router to specific MAC addresses.

5. Replace WEP with WPA WEP (Wired Equivalent Privacy) is a security protocol that was designed to provide a wireless computer network with a level of security and privacy comparable to what is usually expected of a wired computer network. WEP is a very weak form of security that uses common 60 or 108 bit key shared among all of the devices on the network to encrypt the wireless data. Hackers can access tools freely available on the Internet that can crack a WEP key in as little as 15 minutes. 

Once the WEP key is cracked, the network traffic instantly turns into clear text – making it easy for the hacker to treat the network like any open network. WPA (Wi-Fi Protected Access) is a powerful, standards-based, inter-operable security technology for wireless computer networks. It provides strong data protection by using 128-bit encryption keys and dynamic session keys to ensure a wireless computer network's privacy and security. Many cryptographers are confident that WPA addresses all the known attacks on WEP. It also adds strong user authentication, which was absent in WEP.

Read More

0 comments:

Saturday, 13 July 2013



How to Test my anti-virus is good or not

If you want to check your Antivirus software, you don't need to download virus or any harmful software to test it. You can test your Antivirus using a NOTEPAD and i will show you how to do it in here.

Open a New Text Document.

 Copy the below code and paste it in the new text document.                   


    Save it as deminto-virus.bat

  After sometime scan your file with your antivirus .If your anti-virus program detect the file a virus,then you sure that your anti-virus program is working properly.

Note: The file that you have created is not going to harm your computer. It was first created by the European Institute for Computer Anti-Virus Research (EICAR) to provide a safe and easy way to test whether or not you’ve got a working antivirus software installed.
If your Antivirus deletes the file immediately, then your Antivirus program is working perfectly and if your Antivirus does nothing, then you should change your Antivirus.

How to Test my anti-virus is good or not

at 23:45  |  No comments



How to Test my anti-virus is good or not

If you want to check your Antivirus software, you don't need to download virus or any harmful software to test it. You can test your Antivirus using a NOTEPAD and i will show you how to do it in here.

Open a New Text Document.

 Copy the below code and paste it in the new text document.                   


    Save it as deminto-virus.bat

  After sometime scan your file with your antivirus .If your anti-virus program detect the file a virus,then you sure that your anti-virus program is working properly.

Note: The file that you have created is not going to harm your computer. It was first created by the European Institute for Computer Anti-Virus Research (EICAR) to provide a safe and easy way to test whether or not you’ve got a working antivirus software installed.
If your Antivirus deletes the file immediately, then your Antivirus program is working perfectly and if your Antivirus does nothing, then you should change your Antivirus.

Read More

0 comments:

Thursday, 11 July 2013



Flux - Software For Your Eye Protection - Your Eyes Will Thank You


Are you a over time or late night computer user.. ?? Then Here is a Old news but good for you.. 

       This is my First post  of this blog! The reason for this post is if you are a over time or late time computer user you must be aware of your eyes too..


F.lux :

 

  F.lux is a small genius bit of software which changes the color of your screen from natural looking to artificial looking during the right hours, in order to help you sleep better. F.lux even helps you get the exact settings for your location in the world!
Fixes : 

 It makes the color of your computer's display adapt to the time of day, warm at night and like sunlight during the day.

  • It's even possible that you're staying up too late because of your computer. You could use f.lux because it makes you sleep better, or you could just use it just because it makes your computer look better. 
  • f.lux makes your computer screen look like the room you're in, all the time. When the sun sets, it makes your computer look like your indoor lights. In the morning, it makes things look like sunlight again.


You change the setting by going to Change Settings  or Go to official home page of F.lux..


Its not only Available for Windows OS, Mac OS and Linux OS ..also for iPad and iPhones Also..

 Direct Download Link:

                                                For Windows User    :    Click Here
                                               For Mac User            :    Click Here 
                                              For Linux User          :    Click Here  
                                             For iPAD/iPhone User : Click Here

Flux - Software For Your Eye Protection - Your Eyes Will Thank You

at 22:14  |  No comments



Flux - Software For Your Eye Protection - Your Eyes Will Thank You


Are you a over time or late night computer user.. ?? Then Here is a Old news but good for you.. 

       This is my First post  of this blog! The reason for this post is if you are a over time or late time computer user you must be aware of your eyes too..


F.lux :

 

  F.lux is a small genius bit of software which changes the color of your screen from natural looking to artificial looking during the right hours, in order to help you sleep better. F.lux even helps you get the exact settings for your location in the world!
Fixes : 

 It makes the color of your computer's display adapt to the time of day, warm at night and like sunlight during the day.

  • It's even possible that you're staying up too late because of your computer. You could use f.lux because it makes you sleep better, or you could just use it just because it makes your computer look better. 
  • f.lux makes your computer screen look like the room you're in, all the time. When the sun sets, it makes your computer look like your indoor lights. In the morning, it makes things look like sunlight again.


You change the setting by going to Change Settings  or Go to official home page of F.lux..


Its not only Available for Windows OS, Mac OS and Linux OS ..also for iPad and iPhones Also..

 Direct Download Link:

                                                For Windows User    :    Click Here
                                               For Mac User            :    Click Here 
                                              For Linux User          :    Click Here  
                                             For iPAD/iPhone User : Click Here

Read More

0 comments:


How To Safe When Your Phone Drop In Toilet Infographic:

Hi Phone lovers! Today We are sharing a interesting Article regarding your wet phone safety. It is not very uncommon that you suddenly drop your mobile phone in Toilet. Its quite usual. But these days mobile are actually an useful and also handful. A lot of data and personal things are stored there. Moreover if it is a Smart phone, then the cost also high.
So you cant just ignore the possibility of dropping your phone to Toilet. This info graphic could be extremely helpful to you if you are going to drop your phone into the Toilet., But who knows ! When it’s going to happen. So you better see this Infographics and get yourself familiar about What to do when you drop your phone in toilet. The Original title of the Infographic was How to Fix a Phone Dropped in the Toilet – Cool Infographic. Betterbathrooms gives a detailed plan of action about what you can do to minimize damage to your phone if you drop it in the toilet.


According to Betterbathrooms “As a nation of multi-taskers we use any moment that our hands are free to send a cheeky text or check the latest facebook updates, so we weren’t surprised when a recent polled revealed that 75% of people admitted to toilet tweeting, emailing and even making a cheeky call whilst sat on the loo. (Tweeting we get, but calling someone?!)
Horror stories of dropping your phone down the loo are increasingly common, with a slip of the hand being all it takes to see your shiny smart phone lying in the deep dark abyss of the toilet bowl. As inevitable is this is, we decided to delve deeper into how exactly your phone can survive this gloomy fate, with a handy info graphic revealing all the steps needed to recover a loo ridden device.”
Check Out Below infograpich 

How To Safe When Your Phone Drop In Toilet Infographic

at 21:48  |  No comments


How To Safe When Your Phone Drop In Toilet Infographic:

Hi Phone lovers! Today We are sharing a interesting Article regarding your wet phone safety. It is not very uncommon that you suddenly drop your mobile phone in Toilet. Its quite usual. But these days mobile are actually an useful and also handful. A lot of data and personal things are stored there. Moreover if it is a Smart phone, then the cost also high.
So you cant just ignore the possibility of dropping your phone to Toilet. This info graphic could be extremely helpful to you if you are going to drop your phone into the Toilet., But who knows ! When it’s going to happen. So you better see this Infographics and get yourself familiar about What to do when you drop your phone in toilet. The Original title of the Infographic was How to Fix a Phone Dropped in the Toilet – Cool Infographic. Betterbathrooms gives a detailed plan of action about what you can do to minimize damage to your phone if you drop it in the toilet.


According to Betterbathrooms “As a nation of multi-taskers we use any moment that our hands are free to send a cheeky text or check the latest facebook updates, so we weren’t surprised when a recent polled revealed that 75% of people admitted to toilet tweeting, emailing and even making a cheeky call whilst sat on the loo. (Tweeting we get, but calling someone?!)
Horror stories of dropping your phone down the loo are increasingly common, with a slip of the hand being all it takes to see your shiny smart phone lying in the deep dark abyss of the toilet bowl. As inevitable is this is, we decided to delve deeper into how exactly your phone can survive this gloomy fate, with a handy info graphic revealing all the steps needed to recover a loo ridden device.”
Check Out Below infograpich 

Read More

0 comments:

Tuesday, 9 July 2013




Today’s mobile belongs to android. It is always a big question for the users to choose right application for their tablets and Smartphones. When we talk about android browser, we found that there are so many options of browsers are available in Google Play Store. But choosing a right one is always a difficult task. While selecting a browser for your gadget, some features raise in our mind like speed, cache, downloader, scrolling, zooming, tabbed browsing and so on. Well! We are trying to shorten your list in this post, suggesting you some most popular and worthy android browsers.

Goggle Chrome:

Google Chrome browser is really on top of choice of users today. It will enhance you browsing experience on Android Phones and Tablets. It helps you to search and browse faster. Google Chrome has so many ultimate features like multi-tabbed browsing, easily manageable bookmarks , history and many more. Average rating of this browser is 4.1 on Google Play.

UC Browser for Android:

UC Browser for Android is another good browser for android. It provides you both mobile and desktop modes of browsing experience. You can open pages in different tabs, manage your downloads, bookmarks and history. Negative point about this browser is that the cache of this browser becomes very large, so it crashes sometimes. Try this browser only if you have enough internal memory in your android phone or tablet.

Opera Mobile web browser:

This is another browser for android phones and tablets. Opera Mobile web browser offers you fast and simple browsing experience. This is also a tabbed browser for android which easily manages your downloads, bookmarks and history. It has both versions of mobile and full mode browsing. Light version of this browser is also available on Google Play Store. Average rating of this browser is 4.5on Google Play.

Firefox Browser for Android:

Yet another option of good browser for android is Firefox Browser for Android. Having some smart features this browser is giving tough fight to other available android browsers. You can install many add on features for this browser. It also gives you option to retrieve passwords and bookmarks from the desktop version of Firefox Browser for Android. Average rating of this browser is 4.2 on Google Play.

The Best Browsers For Android Smartphones And Tablets

at 20:59  |  No comments




Today’s mobile belongs to android. It is always a big question for the users to choose right application for their tablets and Smartphones. When we talk about android browser, we found that there are so many options of browsers are available in Google Play Store. But choosing a right one is always a difficult task. While selecting a browser for your gadget, some features raise in our mind like speed, cache, downloader, scrolling, zooming, tabbed browsing and so on. Well! We are trying to shorten your list in this post, suggesting you some most popular and worthy android browsers.

Goggle Chrome:

Google Chrome browser is really on top of choice of users today. It will enhance you browsing experience on Android Phones and Tablets. It helps you to search and browse faster. Google Chrome has so many ultimate features like multi-tabbed browsing, easily manageable bookmarks , history and many more. Average rating of this browser is 4.1 on Google Play.

UC Browser for Android:

UC Browser for Android is another good browser for android. It provides you both mobile and desktop modes of browsing experience. You can open pages in different tabs, manage your downloads, bookmarks and history. Negative point about this browser is that the cache of this browser becomes very large, so it crashes sometimes. Try this browser only if you have enough internal memory in your android phone or tablet.

Opera Mobile web browser:

This is another browser for android phones and tablets. Opera Mobile web browser offers you fast and simple browsing experience. This is also a tabbed browser for android which easily manages your downloads, bookmarks and history. It has both versions of mobile and full mode browsing. Light version of this browser is also available on Google Play Store. Average rating of this browser is 4.5on Google Play.

Firefox Browser for Android:

Yet another option of good browser for android is Firefox Browser for Android. Having some smart features this browser is giving tough fight to other available android browsers. You can install many add on features for this browser. It also gives you option to retrieve passwords and bookmarks from the desktop version of Firefox Browser for Android. Average rating of this browser is 4.2 on Google Play.

Read More

0 comments:




Spying Software is all about monitoring people on their cell phone activities, and mostly they are used by employers and parents.

Employers are always at danger

Organizations need to keep an eye on their employees to make sure they do not waste time on their cell phones during work hours, and for the purpose of catching employee’s gone rogue.
Information leaks are another thing organizations have to take care of and by using mobile spying software they can make sure that if any employee tries to do something of that nature they can be caught well before time. Interestingly the average time before employee theft is realized is 2 years, and this time can be reduced close to real-time with the help of such software.

A matter of Parental Guidance

Parents on the other hand need to monitor their children as these days’ children as young as 11 are getting cell phones. This opens up a whole world of new threats for them and hence can be dangerous. Parents can use monitoring apps to ensure that their children stay within the guidelines of using cell phones, and it also helps them to get an insight into whether or not their children have fallen into the wrong crowd or if there is anything that is troubling them.

Keeping Privacy Intact

However, there is one major concern when it comes to using mobile spying software; privacy. That’s a big issue especially in organizations as sensitive information can be misused. Likewise it is important to give children a level of privacy as well; it helps them grow and helps them develop character. Stealth Genie is that mobile spying software that enables monitoring by ensuring that privacy is maintained.
The reason for this is because SG allows you to set triggers and alerts. This makes the entire monitoring process a more automated affair. All you have to do is set the keywords and let SG do all the work for you. If the targeted person uses those keywords in any SMS or Email you will be instantly notified and you can then look into the matter to see if it requires any action. Likewise you can even set contact and email address triggers that work the same way.

Works without Fail

Stealth Genie can be a great monitoring tool as it has all those features that are required to ensure that you are able to get the most out of the device. It even allows users to monitor Apps such as Gmail and WhatsApp. You can chose a subscription package that suits you best as they have a number of options depending on your needs. They start from just $8 a month so go ahead and have a look.

The Automated Mobile Spying Software

at 20:39  |  No comments




Spying Software is all about monitoring people on their cell phone activities, and mostly they are used by employers and parents.

Employers are always at danger

Organizations need to keep an eye on their employees to make sure they do not waste time on their cell phones during work hours, and for the purpose of catching employee’s gone rogue.
Information leaks are another thing organizations have to take care of and by using mobile spying software they can make sure that if any employee tries to do something of that nature they can be caught well before time. Interestingly the average time before employee theft is realized is 2 years, and this time can be reduced close to real-time with the help of such software.

A matter of Parental Guidance

Parents on the other hand need to monitor their children as these days’ children as young as 11 are getting cell phones. This opens up a whole world of new threats for them and hence can be dangerous. Parents can use monitoring apps to ensure that their children stay within the guidelines of using cell phones, and it also helps them to get an insight into whether or not their children have fallen into the wrong crowd or if there is anything that is troubling them.

Keeping Privacy Intact

However, there is one major concern when it comes to using mobile spying software; privacy. That’s a big issue especially in organizations as sensitive information can be misused. Likewise it is important to give children a level of privacy as well; it helps them grow and helps them develop character. Stealth Genie is that mobile spying software that enables monitoring by ensuring that privacy is maintained.
The reason for this is because SG allows you to set triggers and alerts. This makes the entire monitoring process a more automated affair. All you have to do is set the keywords and let SG do all the work for you. If the targeted person uses those keywords in any SMS or Email you will be instantly notified and you can then look into the matter to see if it requires any action. Likewise you can even set contact and email address triggers that work the same way.

Works without Fail

Stealth Genie can be a great monitoring tool as it has all those features that are required to ensure that you are able to get the most out of the device. It even allows users to monitor Apps such as Gmail and WhatsApp. You can chose a subscription package that suits you best as they have a number of options depending on your needs. They start from just $8 a month so go ahead and have a look.

Read More

0 comments:


I am asked at least 5 or more times a day by young, beginning "hackers", "How can I hack?" or "Is there a way to hack a web site?" Well there is. There are, in fact, literally hundreds of ways to do this. I will discuss a few in this text to get you started. Every hacker has to start somehow and hacking web servers and ftp servers is one of the easiest ways. If you are reading this I am assuming that you already have a basic knowledge of how web servers work and how to use some form of UNIX. But I am going to explain that stuff anyway for those of you who don't know.





Part 1: Simple UNIX Commands
 
Most DOS commands have UNIX and Linux equivalents. Listed below are some of the main commands you will need to know to use a shell account.
HELP = HELP
COPY = CP
MOVE = MV
DIR = LS
DEL = RM
CD = CD
To see who else is on the system you can type WHO. To get information about a specific user on the system type FINGER <username>. Using those basic UNIX commands you can learn all you need to know about the system you are using.




Part 2: Cracking Passwords
 
On UNIX systems the file that contains the passwords for all the users on the system is located in the /etc directory. The filename is passwd. I bet your thinking...."Great. All I have to do is get the file called /etc/passwd and I'll be a hacker." If that is what you are thinking then you are dead wrong. All the accounts in the passwd file have encrypted passwords. These passwords are one-way encrypted which means that there is no way to decrypt them.



However, there are programs that can be used to obtain passwords from the file. The name of the program that I have found to be the best password cracker is called "Cracker Jack." This program uses a dictionary file composed of thousands of words. It compares the encrypted forms of the words in the list to the encrypted passwords in the passwd file and it notifies you when it finds a match. Cracker Jack can be found at my web site which is at http://www.geocities.com/SiliconValley/9185 Some wordlists can be found at the following ftp site: sable.ox.ac.uk/ pub/wordlists. To get to the wordlist that I usually use goto that ftp site then goto the American directory. Once you are there download the file called dic-0294.tar.Z which is about 4 MB. To use that file it must be uncompressed
using a program like Gzip for DOS or Winzip for Windows. After uncompressing the file it should be a text file around 8 MB and it is best to put it in the same directory as your cracking program. To find out how to use Cracker Jack just read the documentation that is included with it. 

Part 3: The Hard Part (Finding Password Files)
 
Up till now I have been telling you the easy parts of hacking a server. Now we get to the more difficult part. It's common sense. If the system administrator has a file that has passwords for everyone on his or her system they are not going to just give it to you. You have to have a way to retrieve the /etc/passwd file without logging into the system. There are 2 simple ways that this can sometimes be accomplished. Often the /etc directory is not blocked from FTP. To get the passwd file this way try using an FTP client to access the site anonymously then check the /etc directory to see if access to the passwd file is restricted. If it is not restricted then download the file and run Cracker Jack on it. If it is restricted then try plan B. On some systems there is a file called PHF in the /cgi-bin directory. If there is then you are in luck. PHF allows users to gain remote access to files (including the /etc/passwd file) over the world wide web. To try this method goto your web browser and type in this URL: http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
Then substitute the site you are trying to hack for the xxx.xxx.xxx.
For example, if I wanted to hack St. Louis University (and I have already) I
would type in http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

Don't bother trying www.slu.edu because I have already done it and told them about their security flaw.
Here's a hint: try www.spawn.com and
www.garply.comIf the preceding to methods fail then try any way you can think of to get that file. If you do get the file and all the items in the second field are X or ! or * then the password file is shadowed. Shadowing is just a method of adding extra security to prevent hackers and other unwanted people from using the password file. Unfortunately there is no way to "unshadow" a password file but sometimes there are backup password files that aren't shadowed. Try looking for files such as /etc/shadow and other stuff like that. 

Part 4: Logging In To "Your" New Shell

OK....This is where you use what you found using Cracker Jack. Usernames and passwords. Run your telnet client and telent to the server that you cracked the passwords for, such as www.slu.edu. When you are connected it will give a login screen that asks for a login names and password and usually information on the operating system that the server is using (usually UNIX,
linux, aix, irix, ultrix, bsd, or sometimes even DOS or Vax / Vms). Just type in the information you got after cracking the passwd file and whatever you know about UNIX to do whatever you feel like doing. But remember that hacking isn't spreading viruses or causing damage to other computer systems. It is using your knowledge to increase your knowledge. 

Part 5: Newbie Info

If you feel that you have what it takes to be a serious hacker then you must first know a clear definition of hacking and how to be an ethical hacker. Become familiar with unix environments and if you are only just starting to learn to hack, visit a local library and find some books on various operating systems on the internet and how they work. Or you could go to a book store and buy a couple internet security books. They often explain how hackers penetrate systems and that is something a beginner could use as an advantage. 

Hacking A Servers: A Beginner's Guide

at 20:15  |  No comments


I am asked at least 5 or more times a day by young, beginning "hackers", "How can I hack?" or "Is there a way to hack a web site?" Well there is. There are, in fact, literally hundreds of ways to do this. I will discuss a few in this text to get you started. Every hacker has to start somehow and hacking web servers and ftp servers is one of the easiest ways. If you are reading this I am assuming that you already have a basic knowledge of how web servers work and how to use some form of UNIX. But I am going to explain that stuff anyway for those of you who don't know.





Part 1: Simple UNIX Commands
 
Most DOS commands have UNIX and Linux equivalents. Listed below are some of the main commands you will need to know to use a shell account.
HELP = HELP
COPY = CP
MOVE = MV
DIR = LS
DEL = RM
CD = CD
To see who else is on the system you can type WHO. To get information about a specific user on the system type FINGER <username>. Using those basic UNIX commands you can learn all you need to know about the system you are using.




Part 2: Cracking Passwords
 
On UNIX systems the file that contains the passwords for all the users on the system is located in the /etc directory. The filename is passwd. I bet your thinking...."Great. All I have to do is get the file called /etc/passwd and I'll be a hacker." If that is what you are thinking then you are dead wrong. All the accounts in the passwd file have encrypted passwords. These passwords are one-way encrypted which means that there is no way to decrypt them.



However, there are programs that can be used to obtain passwords from the file. The name of the program that I have found to be the best password cracker is called "Cracker Jack." This program uses a dictionary file composed of thousands of words. It compares the encrypted forms of the words in the list to the encrypted passwords in the passwd file and it notifies you when it finds a match. Cracker Jack can be found at my web site which is at http://www.geocities.com/SiliconValley/9185 Some wordlists can be found at the following ftp site: sable.ox.ac.uk/ pub/wordlists. To get to the wordlist that I usually use goto that ftp site then goto the American directory. Once you are there download the file called dic-0294.tar.Z which is about 4 MB. To use that file it must be uncompressed
using a program like Gzip for DOS or Winzip for Windows. After uncompressing the file it should be a text file around 8 MB and it is best to put it in the same directory as your cracking program. To find out how to use Cracker Jack just read the documentation that is included with it. 

Part 3: The Hard Part (Finding Password Files)
 
Up till now I have been telling you the easy parts of hacking a server. Now we get to the more difficult part. It's common sense. If the system administrator has a file that has passwords for everyone on his or her system they are not going to just give it to you. You have to have a way to retrieve the /etc/passwd file without logging into the system. There are 2 simple ways that this can sometimes be accomplished. Often the /etc directory is not blocked from FTP. To get the passwd file this way try using an FTP client to access the site anonymously then check the /etc directory to see if access to the passwd file is restricted. If it is not restricted then download the file and run Cracker Jack on it. If it is restricted then try plan B. On some systems there is a file called PHF in the /cgi-bin directory. If there is then you are in luck. PHF allows users to gain remote access to files (including the /etc/passwd file) over the world wide web. To try this method goto your web browser and type in this URL: http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
Then substitute the site you are trying to hack for the xxx.xxx.xxx.
For example, if I wanted to hack St. Louis University (and I have already) I
would type in http://www.slu.edu/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

Don't bother trying www.slu.edu because I have already done it and told them about their security flaw.
Here's a hint: try www.spawn.com and
www.garply.comIf the preceding to methods fail then try any way you can think of to get that file. If you do get the file and all the items in the second field are X or ! or * then the password file is shadowed. Shadowing is just a method of adding extra security to prevent hackers and other unwanted people from using the password file. Unfortunately there is no way to "unshadow" a password file but sometimes there are backup password files that aren't shadowed. Try looking for files such as /etc/shadow and other stuff like that. 

Part 4: Logging In To "Your" New Shell

OK....This is where you use what you found using Cracker Jack. Usernames and passwords. Run your telnet client and telent to the server that you cracked the passwords for, such as www.slu.edu. When you are connected it will give a login screen that asks for a login names and password and usually information on the operating system that the server is using (usually UNIX,
linux, aix, irix, ultrix, bsd, or sometimes even DOS or Vax / Vms). Just type in the information you got after cracking the passwd file and whatever you know about UNIX to do whatever you feel like doing. But remember that hacking isn't spreading viruses or causing damage to other computer systems. It is using your knowledge to increase your knowledge. 

Part 5: Newbie Info

If you feel that you have what it takes to be a serious hacker then you must first know a clear definition of hacking and how to be an ethical hacker. Become familiar with unix environments and if you are only just starting to learn to hack, visit a local library and find some books on various operating systems on the internet and how they work. Or you could go to a book store and buy a couple internet security books. They often explain how hackers penetrate systems and that is something a beginner could use as an advantage. 

Read More

0 comments:

Saturday, 6 July 2013

In this post, I’ll explain how to login to windows 8 using built in administrator account. In windows, administrator account access is required to access important files and folders. Also this account allows users to make changes in registry, group policies and other system files. See the rest of the post to find out how you can enable the built in administrator account.


In Windows 8, the built in  administrator account is disabled by default. So you will require to enable it first before using that account. Here’s how to do it.


How to Enable Admin account in Windows 8

Click Start Menu, Right Click Computer and select Manage. (If ‘Computer’ option doesn’t come in start menu, just type computer after pressing start)

It will ask for UAC, click yes to continue.

Now Computer Management console will open up. Click System tools folder and from there select Local users and Groups.

Next, click on Users folder.

Now if you see the right pane of the computer management window, you can see the list of accounts created on your computer. From there you’ll be able to see the administrator account.

Now right click on the administrator account and select properties.

In the properties tab, uncheck the option “Account is disabled”.



Click Ok and close the computer management window.

With these steps the administrator account is active in your computer. Create a very strong password for this account so that this account is not misused by any other users of your computer. Login to Windows 8 using this administrator account and do the changes which are required. Disable this account if you’re not planning to use it in near future.

How to Login Window 8 Using Hidden Administrator Account

at 05:50  |  No comments

In this post, I’ll explain how to login to windows 8 using built in administrator account. In windows, administrator account access is required to access important files and folders. Also this account allows users to make changes in registry, group policies and other system files. See the rest of the post to find out how you can enable the built in administrator account.


In Windows 8, the built in  administrator account is disabled by default. So you will require to enable it first before using that account. Here’s how to do it.


How to Enable Admin account in Windows 8

Click Start Menu, Right Click Computer and select Manage. (If ‘Computer’ option doesn’t come in start menu, just type computer after pressing start)

It will ask for UAC, click yes to continue.

Now Computer Management console will open up. Click System tools folder and from there select Local users and Groups.

Next, click on Users folder.

Now if you see the right pane of the computer management window, you can see the list of accounts created on your computer. From there you’ll be able to see the administrator account.

Now right click on the administrator account and select properties.

In the properties tab, uncheck the option “Account is disabled”.



Click Ok and close the computer management window.

With these steps the administrator account is active in your computer. Create a very strong password for this account so that this account is not misused by any other users of your computer. Login to Windows 8 using this administrator account and do the changes which are required. Disable this account if you’re not planning to use it in near future.

Read More

0 comments:

 
Want to the calculate the time needed for an average PC to crack your password? Checkout some online tools which will check the strength of a password and tell how much time it takes for a hacker to crack it.





1) How Secure is my Password
This online tool will tell you how long it would take an average computer to crack your password using brute force method.


As per this site, it would take a hacker 28 million years to crack my Google account password. Good enough, eh?

2) Password Meter
Password meter shows how strong your password is based on variety of parameters like number of characters, symbols, upper cases, consecutiveness, sequences etc.



More complex the password is, more points you get. And for every repeating and consecutive chars, you obviously get deductions.

3) Microsoft Password strength checker

This tool from Microsoft just calculates the strength of your password and classifies them as weak, medium, strong and best.


If you are finding it hard to remember complex passwords, grab a password manager which can take care of your passwords across all the browsers.

Note: The online tools mentioned above calculates the strength of the password you enter within your computer and is not send over the internet.

Calculate the Time Needed to Crack your Password

at 05:37  |  No comments

 
Want to the calculate the time needed for an average PC to crack your password? Checkout some online tools which will check the strength of a password and tell how much time it takes for a hacker to crack it.





1) How Secure is my Password
This online tool will tell you how long it would take an average computer to crack your password using brute force method.


As per this site, it would take a hacker 28 million years to crack my Google account password. Good enough, eh?

2) Password Meter
Password meter shows how strong your password is based on variety of parameters like number of characters, symbols, upper cases, consecutiveness, sequences etc.



More complex the password is, more points you get. And for every repeating and consecutive chars, you obviously get deductions.

3) Microsoft Password strength checker

This tool from Microsoft just calculates the strength of your password and classifies them as weak, medium, strong and best.


If you are finding it hard to remember complex passwords, grab a password manager which can take care of your passwords across all the browsers.

Note: The online tools mentioned above calculates the strength of the password you enter within your computer and is not send over the internet.

Read More

0 comments:

Tuesday, 2 July 2013


In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.





 

                             Reset the Password

                                      Use a Keylogger

                                                Phishing

                                                          Stealing Cookies


Method 1: Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.


  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.

  
It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
Method 2: Use a Keylogger

Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.


Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it

 

How to Protect Yourself
  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.
Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.




If you want to know how to do this, follow the detailed instructions on  my topic "Hack Facebook using Phishing Method". Users are very careful now with logging into Facebook through other links, though, so that only adds to this already difficult process.

How to Protect Yourself
  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary.  If you're still doubtful, go directly to the main website and login the way you always do.
  • Phishing isn't only done through email. It can be any link on any website. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use an anti-virus like Norton or McAfee.
Method 4: Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account.




Firesheepis a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.
How to Protect Yourself
  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies on HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking no matter what website you're on.
Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you should steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

at 06:18  |  No comments


In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.





 

                             Reset the Password

                                      Use a Keylogger

                                                Phishing

                                                          Stealing Cookies


Method 1: Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.


  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.

  
It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
Method 2: Use a Keylogger

Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.


Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it

 

How to Protect Yourself
  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.
Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.




If you want to know how to do this, follow the detailed instructions on  my topic "Hack Facebook using Phishing Method". Users are very careful now with logging into Facebook through other links, though, so that only adds to this already difficult process.

How to Protect Yourself
  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary.  If you're still doubtful, go directly to the main website and login the way you always do.
  • Phishing isn't only done through email. It can be any link on any website. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use an anti-virus like Norton or McAfee.
Method 4: Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account.




Firesheepis a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.
How to Protect Yourself
  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies on HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking no matter what website you're on.
Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you should steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

Read More

0 comments:

Monday, 1 July 2013



If you ever wanted to see if someone could hack your skype, or pull a prank on a friend, this tutorial is for you. Keep in mind doing this without the account owner's permission is illegal. This hack is accomplished through simple

Step 1: Get Information

For this tutorial, you need to know the Skype username, e-mail address associated with it, the country the user is from, and 3 contacts the user has. If you don't know the e-mail, that's okay.

Step 2: Let's Get the Party Started

Head on over to the link below to go on Skype live chat. If you don't have the victim's email, use your own.

Step 3: Social Engineer

Say to the support rep that you forgot your Skype password and no longer have access to your email. They will say sorry, and ask you to answer four questions to verify your account.

Step 4: The Questions

They will ask you:
  • The country the account was registered in.
  • The year and month the victim made there account (sometimes they only ask for year), if you don't know, say sometime in 201
  • The email registered (Just say that you have forgotten it)
  • 3 Friends on there contact list (Just find them out it can be pretty easy)
Step 5: Answer

Answer the questions as best as possible, and don't act suspicious. After you answer, they'll ask you for a new email address for the account. Tell them your own email.

Step 6: Done

When you receive an email on your email saying they have linked your account. Then go to the password reset page and put in your email that you just told them to change it to, you will receive a password reset link and there you go. You have hacked the Skype account. Well done. Please give Kudos if this helped you.

How to HACK ANY SKYPE ACCOUNT in 10 Minutes or Less!

at 10:12  |  No comments



If you ever wanted to see if someone could hack your skype, or pull a prank on a friend, this tutorial is for you. Keep in mind doing this without the account owner's permission is illegal. This hack is accomplished through simple

Step 1: Get Information

For this tutorial, you need to know the Skype username, e-mail address associated with it, the country the user is from, and 3 contacts the user has. If you don't know the e-mail, that's okay.

Step 2: Let's Get the Party Started

Head on over to the link below to go on Skype live chat. If you don't have the victim's email, use your own.

Step 3: Social Engineer

Say to the support rep that you forgot your Skype password and no longer have access to your email. They will say sorry, and ask you to answer four questions to verify your account.

Step 4: The Questions

They will ask you:
  • The country the account was registered in.
  • The year and month the victim made there account (sometimes they only ask for year), if you don't know, say sometime in 201
  • The email registered (Just say that you have forgotten it)
  • 3 Friends on there contact list (Just find them out it can be pretty easy)
Step 5: Answer

Answer the questions as best as possible, and don't act suspicious. After you answer, they'll ask you for a new email address for the account. Tell them your own email.

Step 6: Done

When you receive an email on your email saying they have linked your account. Then go to the password reset page and put in your email that you just told them to change it to, you will receive a password reset link and there you go. You have hacked the Skype account. Well done. Please give Kudos if this helped you.

Read More

0 comments:

Text Widget

Blogger templates. Proudly Powered by Blogger.