Saturday, December 28, 2019

Never use a debit card for shopping online, and here is why

Never use a debit card for shopping online, and here is why
never use a debit card for shopping online, and here is why
Image result for card cr

Reason #1

Both the debit card and credit card allow you to make purchases using e-transaction. But there is one big difference. The credit card has a limit on how much you can spend. The debit card doesn't come with such a limit. If you have money in your bank account, you can spend that using debit card.

Reason #2

It's not your money that is available to you with a credit card. When you spend money using a credit card, you are spending your bank's money although after you have made the purchase it becomes your liability and you have to pay, along with any fee or interest that the bank may charge you. This offers a sort of protection to you in case of the fraud.
Even if your credit card is compromised and used without your permission, it's the responsibility of the bank to handle and avoid the fraud and not yours. If you card is misused, you can always explain to the bank that how it is a case of fraud and that you are not liable for it. In most cases, the banks will investigate the transactions and when they find that you are speaking truth, will not charge you for the fraudulent transactions.

How to clear WhatsApp cache when you are running low on phone memory

How to clear WhatsApp cache when you are running low on phone memory
How to clear WhatsApp cache when you are running low on phone memory
Image result for whatsapp

hatsApp is arguably one of the most popular social messaging apps in the world. Every day millions of users exchange messages on WhatsApp in the form of text, videos, voice recordings, GIFs, stickers, location, documents and more. These files often end up taking a lot of space on our smartphones. And if you use the Facebook-owned social messaging app frequently and are actively involved in a number of groups, it can also lead to WhatsApp media files and documents increasingly filling up your phone memory.
This problem can be exacerbated if you are already running low on phone memory. Thankfully, WhatsApp offers you an easy technique using which you can delete media files and messages from not just the app's memory but also from the phone memory. This can help you free a lot of space on your smartphone, particularly, if you are running low on phone memory.
But here is a thing. This trick only works in case of Android smartphones and it won't work if you are using an iPhone. So, while you can free app space and iCloud space, you will have to manually delete the videos and messages from the Photos app of your iPhone, if you want to free your iPhone memory.
If you own an Android phone, here are steps you need to follow to clear WhatsApp media cache:
- Tap on three dots on the top right corner of the app.
- Tap on the Settings option.
- Now tap on Storage Usage option.
- Now you will see all your WhatsApp contacts in the order of the memory that they consume on your smartphone.
- Tap on a contact then tap on Free Up Space option.
- Now you will see a breakdown of files that you have shared with that contact along with the space that the contact is consuming.
- Select the data like images, videos and voice messages that you want to delete.
- Tap on Delete Items option.
- Tap on Clear Messages to confirm.
The videos and messages will automatically be deleted from the gallery.

Tech Tips: How to block advertisements on your Android smartphone

Tech Tips: How to block advertisements on your Android smartphone
How to block advertisements on your Android smartphone
Image result for monile

1. Using Google Chrome browser settings
You might be used to seeing a host of ads while browsing the internet - watching videos or reading articles - using Chrome web browser on your smartphone, but these ads are not displayed by Chrome. And there is a simple way using which you can block these ads. Just follow these steps:
- Go to Chrome browser settings.
- Go to Site Settings and tap on it.
- Go to Pop ups and toggle the switch
2. Using ad blocker app
Alternatively, you can use also use Ad Blocker app on your smartphone. This will not only block ads that are served to you while surfing the internet but also the ones that you see while using apps and games. But there is a catch. You might have to make some changes to your device settings to install the ad-blocker APK. You can use AdBlock Plus to block all ads on your smartphones.
To configure your smartphone to download the Adblock Plus APK:
- Go to your device Settings. The go to Security.
- Now, scroll down to Unknown sources option and tap on the checkbox.
- Tap on OK option in the confirmation popup.
To install the Adblock Plus APK:
- Download AdBlock Plus on your smartphone using a mobile browser.
- Open the File Manager and look for the APK of the file. Now tap on install option.
- Once you have installed the app, open the app.
- Tap on OK option to confirm.

Thursday, December 26, 2019

How to Hide SMS Messages with a Third-Party App

How to Hide SMS Messages with a Third-Party App
How to Hide SMS Messages with a Third-Party App...
Image result for How to Hide SMS Messages with a Third-Party App

There are many apps that can help you with this, but for the purpose of this article we’ll show you how to use one in particular, Message Locker (SMS Lock).

1- Download and Install the App

2- The app is free, with in-app purchases available.

3- Create and Confirm Your PIN

4- This will be necessary to access your hidden SMS messages. You will also have the opportunity to create a pattern, if you are more comfortable with that.

5- Create a PIN

6- Set-Up Recovery

7- This is necessary in case you forget your PIN. If you have a really bad memory, we suggest you check out our list of Best Password Managers.

8- Recovery Email.Choose Apps to Hide

9- You now have the chance to select what apps you want to hide, so if you want to hide your SMS messages, you should select your stock messaging app (or any messaging apps that you use and want to make private). If you’re looking for other messaging app

10- Hide Your Apps.Explore Other Options

11- By pressing the menu bar in the upper left-hand corner (three vertical lines) you can lock photos, clear junk, upgrade, or learn more about the app.
Side Menu. if u have any doubts dm me @dnr_here

Thanx For Reading...

Sunday, December 22, 2019

Top Ten Password Cracking Techniques

Top Ten Password Cracking Techniques

Top Ten Password Cracking Techniques

Image result for password hacking tricks

1. Dictionary attack

The dictionary attack uses a simple file containing words that can be found in a dictionary, hence its rather straightforward name. In other words, this attack uses exactly the kind of words that many people use as their password.

2. Brute force attack

Similar to the dictionary attack, the brute force attack comes with an added bonus for the hacker. Instead of simply using words, a brute force attack lets them detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10.
It's not quick, provided your password is over a handful of characters long, but it will uncover your password eventually. Brute force attacks can be shortened by throwing additional computing horsepower, in terms of both processing power including harnessing the power of your video card GPU and machine numbers, such as using distributed computing models like online bitcoin miners.

3. Rainbow table attack

Rainbow tables aren't as colourful as their name may imply but, for a hacker, your password could well be at the end of it. In the most straightforward way possible, you can boil a rainbow table down into a list of pre-computed hashes the numerical value used when encrypting a password. This table contains hashes of all possible password combinations for any given hashing algorithm. Rainbow tables are attractive as it reduces the time needed to crack a password hash to simply just looking something up in a list.
However, rainbow tables are huge, unwieldy things. They require serious computing power to run and a table becomes useless if the hash it's trying to find has been "salted" by the addition of random characters to its password ahead of hashing the algorithm.
There is talk of salted rainbow tables existing, but these would be so large as to be difficult to use in practice. They would likely only work with a predefined "random character" set and password strings below 12 characters as the size of the table would be prohibitive to even state-level hackers otherwise.

4. Phishing

There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked log in page associated with whatever service it is the hacker wants to access, requesting the user to put right some terrible problem with their security. That page then skims their password and the hacker can go use it for their own purpose.
Why bother going to the trouble of cracking the password when the user will happily give it to you anyway?

5. Social engineering

Social engineering takes the whole "ask the user" concept outside of the inbox that phishing tends to stick with and into the real world.
A favourite of the social engineer is to call an office posing as an IT security tech guy and simply ask for the network access password. You'd be amazed at how often this works. Some even have the gall to don a suit and name badge before walking into a business to ask the receptionist the same question face to face.

6. Malware

A keylogger, or screen scraper, can be installed by malware which records everything you type or takes screenshots during a login process, and then forwards a copy of this file to hacker central
Some malware will look for the existence of a web browser client password file and copy this which, unless properly encrypted, will contain easily accessible saved passwords from the user's browsing history.

7. Offline cracking

It's easy to imagine that passwords are safe when the systems they protect lock out users after three or four wrong guesses, blocking automated guessing applications. Well, that would be true if it were not for the fact that most password hacking takes place offline, using a set of hashes in a password file that has been obtained' from a compromised system.
Often the target in question has been compromised via a hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user.

8. Shoulder surfing

The most confident of hackers will take the guise of a parcel courier, aircon service technician or anything else that gets them access to an office building.
Once they are in, the service personnel "uniform" provides a kind of free pass to wander around unhindered, giving them the opportunity to snoop literally over the shoulders of genuine members of staff to glimpse passwords being entered, or spot passwords that less security-conscious workers have written down on post-it notes or in notepads. 

9. Spidering

Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack.
Really savvy hackers have automated the process and let a spidering application, similar to those employed by leading search engines to identify keywords, collect and collate the lists for them.

10. Guess

The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user-generated random' password is unlikely to be anything of the sort.
Instead, thanks to our brains' emotional attachment to things we like, the chances are those random passwords are based upon our interests, hobbies, pets, family and so on. In fact, passwords tend to be based on all the things we like to chat about on social networks and even include in our profiles. Password crackers are very likely to look at this information and make a few – often correct – educated guesses when attempting to crack a consumer-level password without resorting to dictionary or brute force attacks.

Thanx For Supporting....

Thursday, December 19, 2019

Basic Linux Commands You Should Know About

Basic Linux Commands You Should Know About

Basic Linux Commands You Should Know About

I have listed here some Common Linux Commands list :

Image result for basic commands linux
cd (Change Directory) – If you want to get into another folder, then this command is used like cd /Desktop is used to get into the Desktop Folder.

ls (List Directory Content) – This command lists all the directories which are present in a particular folder.

mkdir (Make Directory) – This command is used to create a new directory in the system.

pwd (Present Working Directory) – This command displays the folder in which you are working presently.


rmdir (Remove Directory) – This command is used to remove a particular directory.
clear – This command is used to clear the page like if you use clear command in your terminal then the terminal page will clear.
locate – It’s meaning is clear from its name to find any file. If you type locate ‘file name’ then it will show all the locations where this file name directory is present.
man – This command is used to opening a manual page of a particular command.
rm (Remove Directories) – This command is used to remove a particular file/directory
w (Who) – This command is used to see who is logged on and what they are using on the system.
top (Linux Task Manager) – This command will open the Linux Task Manager.

Thanks For Reading...

Sunday, December 15, 2019

COMPUTER VIRUS

COMPUTER VIRUS
COMPUTER VIRUS
Image result for virus computer
A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge. A Computer virus can be spread from one host to another by sharing infected file or by downloading infected files from un-trusted sources. All computer viruses are man-made, they spread only with human assistance and support.
Possible ways to get virus into Computers
Virus can be installed in a computer by downloading applications from un-trusted sites, by a removable medium like USB, CD, DVD’s and sharing files from one infected computer to another also virus comes through attachments with e-mails.
  1. Opening a e-mail attachments: Whenever you download files with extension .exe, vbs, shs, pif, bat, cmd etc received via email attachment. There is a chance of virus getting into your system. Sometimes the attachments contain an executable code with double extension like hi.doc.exe. If you open such types of files, virus will enter into your system.
  1. Downloading files from un-trusted sites: Generally, virus is hidden in the files or program and enters your system whenever you download softwares or applications from untrusted websites.
  1. Removable Medium: Whenever you copy files or download files from an infected removable medium like USB, CD, DVD drives then the virus may enter into your system.
  1. Downloading games: Virus and worms may enter into a system when you try to download or install a game on your computer. The malicious program may be hidden in the files you download.
  1. Sharing files: Virus will install into your system whenever you share files from one infected computer to another computer.
Signs of Computer Virus
  • Computer runs more slowly than normal
  • Computer stops responding or locks up often
  • Computer crashes and restarts every few minutes
  • Computer restarts on its own and then fails to run normally
  • Applications on your computer don’t work correctly
  • Disks or disk drives are inaccessible
  • Can’t print correctly
  • Unusual error messages
  • Distorted menus and dialog boxes
How to prevent virus?
Check for attachments: Always check the attachments by scanning before you open them and make sure that the attachments are received from the known user.
Check for Extensions: Always check the file extension before you download and avoid downloading the files with double extension.
Browser settings: Always set the browser settings to allow the sites only from trusted websites.
Ignore e-mails from unknown users: Avoid downloading the files from unknown user, and it is always better to ignore or delete the files from unknown users.
Anti-Virus Software: Always use anti-virus software and update with latest patches and scan the files before you download.

Thanx For Reading & supporting..

Information Gathering Tool || Online

Information  Gathering Tool || Online
Information  Gathering Tool || Online
Image result for inf gathering online
intoDNS checks the health and configuration of DNS and mail servers.
Web technology information profiler tool. Find out what a website is built with.
Domain information, whois & dns report
Research domain ownership with Whois Lookup: Get ownership info, IP address history, rank, traffic, SEO & more. Find available domains & domains for sale.
Find information on any domain name or website. Large database of whois information, DNS, domain names, name servers, IPs, and tools for searching and monitoring domain names
Secure Domain Name Searches, Registration & Availability. Use Our Free Whois Lookup Database to Search for & Reserve
online tools for the daily administration of networks.
Free online network tools, including traceroute, nslookup, dig, whois, ping, and our own Domain Dossier and Email Dossier. Works with IPv6. Some source code included.
DNS tools, Network tools, Email tools, DNS reporting and IP information gathering. Explore monitoring products and free DNS tools at DNSstuff.
Research domain ownership with Whois Lookup: Get ownership info, IP address history, rank, traffic, SEO & more. Find available domains & domains for sale.
View IP information
Internet Archive is a non-profit digital library offering free universal access to books, movies & music, as well as 436 billion archived web pages.
The most comprehensive people search on the web. Pipl finds high-quality results in pages that cannot be found on regular search engines. Free People Search.
Find people free with Zabasearch directory engine that includes free people search, reverse phone number lookup, address lookup, and more.
TinEye is a reverse image search engine. Search by image: Give it an image and it will tell you where the image appears on the web.
Find search engines from the UK, USA, and many other countries.
Zuula is an innovative Internet search service that gives its users quick access to web, image, news blog and job search results from all the major search engines.With Zuula, users have the ability to get search results from their favorite search engine, such as Google or Yahoo!, but they also have one-click access to search results from a number of other search engines.
Reverse IP Lookup & Domain Check DNS Tool by myIPneighbors to find all domains hosted on an IP address by domain or IP address.

Batch File Programming..

Batch File Programming..

Batch File Programming..
Image result for batch file programing
What is a batch file?
A batch file is a collection of instructions that are used to run multiple commands at a time. It is basically a bundle of packages that are written In a sequence so that user does not have to put commands and instructions again and again. These files contain .bat extension. This means that you have to save the batch files by using .bat extension at the end of file name. These are basically DOS commands and also can run on command prompt.

How to write a batch file?
To write a batch file, first open a text editor (i.e, Notepad or Notepad++).
In Notepad, type the commands which you want to execute.
Example –
@echo off
echo Hi Techammer!
pause

Save them with .bat extension.
The output will be shown in command prompt as –
Hi Techammer!

Thanks For Supporting......

TOP HACKING APPS FOR ANDROID SMART PHONES AND TABLETS

TOP HACKING APPS FOR ANDROID SMART PHONES AND TABLETS

TOP HACKING APPS FOR ANDROID SMART PHONES AND TABLETS

Image result for android
AnDOSid
AnDOSid tag’s posts with two unique numbers which relate to the Android device that sent the request. AnDOSid allows security professionals to simulate a DOS attack.
AndroRAT
Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server. The name Androrat is a mix of Android and RAT (Remote Access Tool)
APKInspector
APKinspector is another open source project that comes to reverse and analyze Android applications. project owners have created a graphical interface to allow visualizing the structure of the application modules this will make security analysts select the good Android application that is safe to use.
dSploit
dSploit is an advance toolkit to perform network security assesments on mobile phones. It is a complete toolkit so you can perform various attacks like password sniffing, real time traffic manipulation, etc
DroidSheep
DroidSheep [Root] is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounts.
Faceniff
FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
Hackode
Hackode is an android app developed by Ravi Kumar for penetration testers, ethical hackers and cyber security professionals. It contains various modules including Reconnaissance, Scanning, Exploits and Security Feed.
Nmap for Android
Nmap is a popular network security scanner which is also available for android devices. It is used by professionals for network exploration. It works on both non-rooted and rooted phones, But if your device is rooted then you have access to some more features.
Penetrate Pro
Penetrate Pro is an excellent Android app that calculates WEP / WPA keys for some wireless routers. Also, no advertising and 3G routers search based on Thomson.
 SpoofApp
SpoofApp is a Revolutionary iPhone Caller ID Spoofing, Voice Changing, and Call Recording Application.
Network Spoofer
Network Spoofer lets you change websites on other people’s computers from an Android phone.
WhatsApp Sniffer
WhatsApp Sniffer Android APK is a Android Application that lets you see anyone’s WhatsApp Conversations as long as you know their phone number
 Wi-Fi Killer
this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber video clips you could just kill their connection and stay happy with a full bandwidth just for yourself.


Thanks For Reading............