Skip to main content

Posts

Showing posts from January, 2017

How to track an email?!

Email tracking allow you to track an email and extract information like such as sender’s identity,mail server,sender’s IP address,etc. You can use the extracted information to attack the target’s organization system by sending malicious emails. Here is the detailed guide how to trace an email: 1) Go to Google and search for www.cyberforensics.in 2) Here go to E-mail Tracer .Here you will require the E-mail Header                   Extracting Email Headers Email header is the information contained in every mail message which is used by mail programs to provide the user with a summary of the origin and contents of each message. Outlook.com Log into Outlook.com. Click on the message that you are getting the headers for. Click on the down arrow adjacent to the Reply link in the upper-right corner of the email message. Click View message source. Yahoo Mail Log into your Yahoo! Mail and go to the message. Click the “More” icon above the message near the Delete

How To Find Wi-Fi Password Using CMD Of All Connected Networks

It is very easy to find WiFi password using few cmd commands. This command works even when you are offline or you are connected to some other WiFi network. Using this command, we can further optimize our particular WiFi network like turning on some features such as mac randomization, changing the radio type of your WiFi etc.            Whenever we connect to a WiFi network and enter the password to connect to that network, we actually make a WLAN profile of that WiFi network. That profile is stored inside our computer along with the other required details of the WiFi profile.                                     Instead of using a GUI to find the individual passwords, we can also look for the WiFi password of that particular WiFi network using cmd.These steps work even when you are totally offline or you are not connected to the particular wifi you are looking the password for. How to know the WiFi password using cmd: Open the command prompt and run it as administrato

HIDE DRIVE USING CMD

НОW TО HIDE DRIVES WITH CMD ? Тоdау i am going to share the meethod  tо Hide Drives with CMD wіthout any thіrd раrtу расkаgе. Тhеrе аrеа sеvеrаl frее аnd duе sоftwаrе’s ассеssіblе tо hide local  drіvеs, hоwеvеr і аm nоt gоnnа mеntіоn to hіdе а local drіvе еmрlоуіng а расkаgе. In  thіs tutоrіаl і wіll shоw уоu an еаsіеst mеthоd tо hide nаtіvе drіvе with CMD. thіs mау sаvе уоur еасh саsh аnd tіmе.                           Step 1. Сlісk оn Start – Run , or just hold down windows key and press   ” R “. Step 2. Run bох will appear, kіndly type ” сmd ” аnd hіt Еntеr. Step 3. Now you will see Command promt windows, Type ” Dіskраrt ” аnd hіt Еntеr.. Step 4. Now you have to type   ” lіst vоlumе ” аnd Hit Enter to see the list of all drives details Step 5. Now i have some personal data in my drive E which i dont want any other person to peep in, So i want to hide it, For that i will type ” Select volume E ”  and hit Enter. Іf уоu wіsh tо hide  vоlumе D , Then you will

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING.

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking. Types of Hackers Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. 1.Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. 2.Cracker (Black hat): A hacker who gains unauthorized access to

How to Email Hacking can be possible?

          Email Hacking can be possible                                                Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong... Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's.. Email Hacking can be possible to many ways like:- 1. Social Engineering 2.Phishing Attacks 3. Cookie Hijacking 4. Keyloggers 1.Social Engineering:  This Process is defined as Hack the human mind without any tools...This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits,etc. It just deals with simple Psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.We are all talking about network security and fixing the v

What Is Keylogger And How To Be Safe From Keyloggers?

                               In this tutorial i am going to talk about the most use piece of software besides from RAT(remote access Trojan) by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.  1. What is keylogger ? You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes

What is "USB Stealer" ? & How it is Work?

                              Windows allows the storage of the passwords, as do modern browsers. While this feature is convenient for users, it has imposed itself as a big security risk among organizations. We know that browsers store most passwords on daily basis, like MSN messenger, Yahoo, Facebook passwords, etc. Most people lack time and ask their browsers to save their passwords. As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to make a USB password stealer and steal saved passwords. Just to explain the concept, we are going to collect some password stealing tools, tools that are freely available on the internet and capable of stealing the passwords stored in the browsers or other windows files. Then, we create a batch program that will execute these combined programs and store the stolen usernames and passwords in a text file. To further spice up the penetration testing demonstration, we will also make

10 Different Methods To Make Money Online from your website or blogs

1. Cost Per Click ( CPC )                                                                                 3d illustration of acronym cpc cost per click box. This method is based on earning from click on ads published on your site, web pages, forum or any apps. I have already discuss about cpc in my article about ads. If you want to learn more in details about cpc must read my article about ways to make money from ads. The following best cost per click networks which offers best rates for every click are Google Adsense:-                         It one of biggest and popular trusted network by everyone. Google Adsense Offers Highest CPC and CPM rates. But its earning is totally depend on your visitors location and CTR also. It not so easy to get approval of adsense. Media.net:-   This is new network form by partnership of yahoo and bing with media.net. It is good competitor of adsense. It offers good CPC rates as compare to others. Chitika:-   It

6 Websites To learn Coding

           The below Websites will help you to learn CSS, HTML, PHP, JavaScript, CSS3, HTML5, Ruby, etc and it doesn’t require any skills . #1. w3schools #2. Codecademy #3. Code avengers #4. CodeSchool #5.TeamtreeHouse #6.Dreamincode

5 BEST WEBSITES TO LEARN FAST TYPING

         1-> www.goodtyping.com 2-> www.10-fast-fingers.com 3-> www.typingweb.com 4-> www.typeracer.com 5-> www.typeonline.co.uk

HOW TO PUBLISH EMPTY STATUS AND COMMENTS ON FACEBOOK

You Must Have seen your Friends Who Knows This Trick Publishing Empty Status And Comments On Facebook, But When Ask Them How they Do it? They Won’t Answer You. Now its Time to Show Your Friends That Even you Know the Trick To Publish Empty Comments and Statuses. Steps: Step 1: Login To Your Facebook Account. Step 2: Copy This Code > @+[0:0: ] and Paste it in Status Box and Click on Post.(Please remove                   “+”sign before posting)                                                                    OR Click On Status Box, Press and Hold ” Alt ” and Press 0173. Leave Alt key and click on Post. See the magic. (Please remove “+”sign before posting) Update: Recently On Facebook I Noticed That if You Comment “0? In any posts, then it shows Blank That means You have posted Blank Comment. enjoye

How To Block Websties Without Software?

How To Block Websties Without Software Steps: 1] Browse C:\WINDOWS\system32\drivers\etc 2] Find the file named “HOSTS” 3] Open it in notepad 4] Under “127.0.0.1 localhost” Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will     no longer be accessable. 5] Done! -So- 127.0.0.1 localhost 127.0.0.2 www.blockedsite.com –>www.blockedsite.com is now unaccessable<– For every site after that you want to add, just add “1” to the last number in the internal ip (127.0.0.2) and then the addy like before. IE: 127.0.0.3 www.blablabla.com 127.0.0.4 www.blablabla.com 127.0.0.5 www.blablabla.com etc... Thanking You & Enjoy...