Tuesday, 12 June 2018

Internet security: 10 ways to keep your personal data safe from online snoopers

We are those insects. The only way of escaping our predicament is to renounce the world in the way that Trappist monks once did. Since we're not going to do that, we have to face the reality: we're trapped in a system in which everything we do is monitored and logged and in which privacy is a thing of the past. Everything that you do with modern communications equipment leaves a digital trail. And this trail is followed assiduously not just by giant corporations, but also by governments and their security services – as vividly illustrated by the revelations of Edward Snowden.

What's astonishing is how unconcerned many people appear to be about this. Is it because they are unaware of the extent and comprehensiveness of the surveillance? Or is it some weird manifestation of Stockholm syndrome – that strange condition in which prisoners exhibit positive feelings towards their captors? What we've learned above all from the Snowden leaks is that the scale and capability of the NSA surveillance are much greater than anyone imagined. Most people had assumed that most non-encrypted communications were vulnerable and some speculated that some encrypted communications (eg Skype) had a hidden backdoor for the NSA. But nobody realised that, as the latest revelations showed, all the encryption technologies routinely used to protect online transactions (https, SSL, VPN and 4G encryption), plus anything going through Google, Microsoft, Facebook and Yahoo, have been cracked.

What this means is that no form of electronic communication handled by commercial companies can now be assumed to be secure. In that sense, the NSA has really fouled the nest of the US internet industry . And it is even suspected that about 90% of communications routed through the TOR network are using encryption that may also have been hacked by the NSA. What can you do if you're someone who feels uneasy about being caught in this web? The honest answer is that there's no comprehensive solution: if you are going to use telephones (mobile or landline) and the internet then you are going to leave a trail. But there are things you can do to make your communications less insecure and your trail harder to follow. Here are 10 ideas you might consider.

1 Email

Rethink your email setup. Assume that all "free" email and webmail services (Gmail etc) are suspect. Be prepared to pay for a service, such as Fastmail,that is not based in the US – though some of its servers are in New York with backups in Norway. (My hunch is that more non-US email services will appear as entrepreneurs spot the business opportunity created by the Snowden revelations.) It would also be worth checking that your organisation has not quietly outsourced its email and IT systems to Google or Microsoft – as many UK organisations (including newspapers and universities) have.

The real difficulty with email is that while there are ways of keeping the content of messages private (see encryption), the "metadata" that goes with the message (the "envelope", as it were) can be very revealing, and there's no way of encrypting that because its needed by the internet routing system and is available to most security services without a warrant.

2 Encryption

Encryption used to be the sole province of geeks and mathematicians, but a lot has changed in recent years. In particular, various publicly available tools have taken the rocket science out of encrypting (and decrypting) email and files. GPG for Mail, for example, is an open source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard. And for protecting files, newer versions of Apple's OS X operating system come with FileVault, a program that encrypts the hard drive of a computer. Those running Microsoft Windows have a similar program. This software will scramble your data, but won't protect you from government authorities demanding your encryption key under the Regulation of Investigatory Powers Act (2000), which is why some aficionados recommend TrueCrypt, a program with some very interesting facilities, which might have been useful to David Miranda.

3 Web browsing

Since browsing is probably what internet users do most, it's worth taking browser security and privacy seriously. If you're unhappy that your clickstream (the log of the sites you visit) is in effect public property as far as the security services are concerned, you might consider using freely available tools such as Tor Browser to obscure your clickstream. And to protect yourself against the amazingly brazen efforts by commercial companies to track your online behaviour you should, at the very minimum, configure your browser so that it repels many of these would-be boarders.

4 Cloud services

The message of the Snowden revelations is that you should avoid all cloud services (Dropbox, iCloud, Evernote, etc) that are based in the US, the UK, France and other jurisdictions known to be tolerant of NSA-style snooping. Your working assumption should be that anything stored on such systems is potentially accessible by others. And if you must entrust data to them, make sure it's encrypted.

5 File storage and archiving

An option that an increasing numbers of people are exploring is running their own personal cloud service using products such as PogoPlug and Transporter that provide Dropbox-type facilities, but on internet connected drives that you own and control. And if you carry around confidential data on a USB stick, make sure it's encrypted using TrueCrypt.

6 Social networking

Delete your Facebook account. Why do the CIA's work for it? And if you must use it, don't put your date of birth on your profile. Why give identity thieves an even break? And remember that, no matter what your privacy settings, you don't have control over information about you that is posted by your "friends".

7 Location data

Avoid using services such as FourSquare that require location information.

8 Wireless services

Have Bluetooth off by default in all your mobile devices. Only switch it on when you explicitly need to use it. Otherwise you'll find that even a dustbin can snoop on it. Similarly, beware of using open wifi in public places. At the very minimum, make sure that any site you interact with uses HTTPS rather than unencrypted HTTP connections. If you don't then anyone nearby can use Firesheep to see everything you're doing.

9 Personal security

Forget password, think passphrase – ie a meaningless sentence that you will remember – and do some transformations on it (first and third letters of every word maybe) so that you can generate a stronger password from it every time. Or use a password-management app like LastPass or 1Password. And if a service offers multi-factor authentication, make use of it.

10 Search engines

All the big search engines track your search history and build profiles on you to serve you personalised results based on your search history. if you want to escape from this "filter bubble" you need to switch to a search engine that does not track your inquiries. The most obvious one is the bizarrely named but quite effective DuckDuckGo.

Tuesday, 15 December 2015

Windows 10 Product Keys 100% Working Serial Keys (Ethical Hacking Tricks 2018)

Serial Keys, win10 key, window 10 keys download, Windows, Windows 10, windows 10 activation key, windows 10 product keys
                                                                    Ethical Hacking Tricks 2018

Just after the release of windows 10 Microsoft has received very positive response from the users all around world and more than 14 million copies of the newly launched windows 10 has been downloaded or upgraded on the first day of its availability.

What Make Window 10 Special?

Windows 10 beautifully combines the elegant start menu of windows 7 and unique features of windows 8. Windows 10 is user friendly and quite easy to use it also boosts Microsoft advance security feature that makes windows 10 special as compare to any other version of Microsoft windows.

Within few days of its launch, Windows 10 has created a real buzz in the digital market. Microsoft also released Technical preview of Windows 10 on various intervals on 30th September 2014 and on 21st January 2015 respectively. Technical preview of the Microsoft Windows 10 was catchy enough to capture the attention of many IT professionals and technical experts to upgrade their version of Windows 7 or 8.1

windows 10 product keys serial keys

How to Download Windows 10

The users who have genuine version of windows 7 and windows 8 can easily upgrade their older version of windows to windows 10. You can also download the ISO image copy of Windows 10 32 bits and 64 bits with media creation tool.

Window 10 Product Keys:

For those who don’t have genuine version of windows 7 and 8 they need window 10 product key or serial key to activate the full and premium features of windows 10. After the launch of windows 10 people sharing windows 10 keys but most them showing error or not working.

So we spent many hours and put our efforts to find out and share with you 100% working windows 10 product keys, serial keys. These window 10 keys can be used to activate all versions of window 10 editions including pro and enterprise. All the keys given below are genuine and original that let you activated almost any version of window 10. Enjoy and don’t forget to share your thoughts with us in the comment section.

Windows 10 Product Code and Serial Key:

Windows 10 Serial Key:


Windows 10 OS key Professional Edition:


Windows 10 product key: Technical Preview for Consumer:


Windows 10 Product key all Editions:


Windows 10 key Enterprise Edition:


Windows 10 product number:



New Product Keys Windows 10 || 2018



Windows 8 Product Keys 100% Working Serial Keys (Ethical Hacking Tricks 2016)

 Serial Keys, win8 key, window 8 keys download, Windows, Windows 8, windows 8 activation key, windows 8 product keys
                                                       Ethical Hacking Tricks 2016   

 What Make Window 8 Special?

The new start menu feature, elegant and advance user interface makes window 8 special and unique as compared to any other operating system. Most importantly window 8 is an evolution of all previous windows released so far by the Microsoft.

 Window 8 Product Keys:

As it is a latest and premium version of windows so in order to avail the full and premium features of windows 8 you need a product key so you may enable the full version of window 8 working for you. As it has become the most popular window operating system there are hundreds of thousands of free serial keys for windows available online but most of them are not working properly.

But you need not to be worried about that because today we have find out 100% working windows 8 product keys, serial keys. The good thing about the window 8 keys is that you can use these keys in different versions and language of window 8th edition. All these keys below are genuine, original and you can use the keys in any version of window 8. Enjoy!
Note: If any of the following keys not working for you please download our latest windows 7, windows 8, windows 8.1 pro all activator free.

Windows 8.1 2015 new keys



Windows 8 Cracked Keys(Activation/Product Keys)




Windows 8.1 serial key : ultimate edition


Windows 8 OS key : Professional edition


Windows 8 product key : Release preview


Windows 8 product number : Consumer preview


Windows 8 OS key : Developer’s preview


Windows 8 product key : Developer’s version







Windows 8 serial key : English


Windows 8 software key : Chinese


Windows 8 serial number : German


Windows 8 unique serial number : French


Windows 8 product key : Japanese


Window 8 Serial Keys 100 % Working



































































Tuesday, 8 December 2015

How To Track Freinds Loation On Iphone/Ipad (Best Hacking Tricks 2016)

How To Track Freinds Loation On Iphone/Ipad
                                                               Best Hacking Tricks 2016

Track the location of your friends in your iPhone with the apps for tracking users using your iPhone and iPad.
Do You Wanna Know Where Your Friends Are?


GPS stands Geo-Location Technology which is a great technology.It helps finding where we are and the location where we want to go among other stuffs what is nearby and where is where!!

Today we are going to discuss about how we can track our friend’s location with our smartphones and web based applications.
APPS – that will hep us


LOCiMOBILE has a great apps and tools for location based apps.

GPS Tracking Lite –

The free version of this app can have 6 users and the paid version can have unlimited users.It can integrates with facebook and twitter.You can share or request your friends lo cation which you have opt-in and have given access to which i think is great feature.You can also post your location to social profiles and let your location known to others.

iLOCi2 Lite is a great app.You can also request the location of your freinds/family in the notification form.Just add your freinds to your contacts and you can request their location.It is a very simple tool and have very simple GUI.

Mobcast –

Mobcast is available on iPhone & Web Browser.it works with the help of facebook so you don’t have to add friends in this app,it automatically gets freind’s list from facebook.You can view your friend’s location on this app and can also get them via push notification.Post your location and let your friend’s know about your location.

Friends Around Me –

It is a great location based app.You can also chat and create groups with your friend’s.You can also integrate with your social profiles like facebook and twitter.It also have a reward system.

HeyWAY –

HeyWAY stands for ‘Hey Where Are You’.It emphasize on privacy which is great by the way.Only you can give access to your friend’s with whom you want to share your location.

Find My Friend –

Find My Friend is a facebook based app.You can surprise your friend’s by getting to know their location and by meeting them there.You have the ability to request or give access to your friend’s.

GeoTwitts –

GeoTwitts – With this app you can post your location to twitter and let your friend’s know about your location.It cal also read your friend’s GeoTwitts and show the route to get to your friend’s easily.It uses google maps which is great.

With these apps you can easily know your frined’s/family location and surprise them.These apps can also help in emergency times which i think is the best use of these apps!! :)

Best Facebook Account Hacking Tricks 2016 – Security Tips

                                                 HOW TO HACK FACEBOOK ACCOUNT 2016

Here is discussion on Facebook account security tips and methods by which someone can hack into your Facebook account. And guide that help you to keep in mind some important factors that are responsible of Facebook hacking. For that you must read the complete post and get aware of FB Hacking Tricks.


Mainly its because of three reason with hackers can hack Facebook Account that are:-

1.Virus or Keylogger.

2.Phishing Attack.

3.Guessing your security answers.

1.A Virus/Keylogger –

We can have our account hacked,if your computer/mobile device have a virus.A virus/keylogger will record all the keystrokes,even your passwords when you type and then it will send it to hacker.And then the hacker can access your account and will use it for the wrongful purposes.

A virus can also hack your browser,getting the cookies and remembered passwords from it and use those cookies for hacking your account.

2. Phishing Attack To Hack Facebook Account

A hacker will create a similar page like facebook,which appear exactly like facebook by looks and when you login on that page it will then forward your credentials to the hacker.

3..By Guessing –

Its not necessary that its always the hacker from outside,sometimes it could be an inside job.

Sometimes,it could be your friends/family – backstabbing you!! :'(

They can simply select the option “Forgot Your Password” on facebook account or email and try to access your account through answering the security questions as they are your friends/family they can easily guess those security questions.Most of the time,people don’t choose to have complex question & answers.Sometimes,people choose it as simple as –

    Whats your phone number?
    Whats your parents name?
    Whats your favourite food?

And these type of passwords are easily guessed since they know you so well.

If this process doesn’t work on facebook account,then they may also try this process on your email account or on your recovery email account

So always remember to choose the complex & strong password on all of your accounts.
Prevention For Safe Your Account To Be Hacked By Hackers

Steps to prevent our account from getting hacked?

Follow these procedures to securing your account :

1.A Good ANTIVIRUS – You should always have a good Antivirus Program installed on your computer & on your mobile device to protect you against the threats & viruses.

My top recommendations would be –

            Bitdefender Total Security.
            Kaspersky PURE.
            Norton Antivirus.

Click on the Software Name to download it from their website’s.

2.Beware of the Links –

People always clicks links very carelessly,the links you click may be phishing page and when you login please make sure you are logging on official facebook site.Check the URL that its https://www.facebook.com not something like this – www.fac.ebook.com,www.face–book.com etc!!

3.Always Remember to Choose Strong Security Answers.

Choose a good security question,Make sure to choose the opposite answer of the question.

Example –

Q:Whose your favourite villain?

A:Instead of using a villain name,use a superhero name – that you love or hates the most.

In this way you will remember it easily!!

Read all steps and prevent your Facebook being Hacked By Hackers..

Sunday, 6 December 2015

20 Best Hacking Tools For Windows And Linux PC 2016

                                                 Best Hacking Tools2016

Here we discussing 20 Best Hacking Tools For Windows And Linux PC the best hacking software 2016 to do hacking and used by hackers and for beginners. Tools are the best things that you use to do hacking easily. Coding is a tough work and tool make work easier. So look the best tools below that i have mentioned.

Best Hacking Tools For Windows

A) OphCrack

ophcrack is a password cracking software which are based on rainbow tables.It runs on various operating systems like MAC OS, Unix/Linux, Windows.It is also comes with the graphical user interface and runs on as you know multiple platforms.It is easily to crack LM and NTLM hashes in this software.For analyzing the passwords real time graphs are used in this.Basically is an open source.

B) RainbowCrack

RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes with the hash to be cracked. Once a match is found, the plaintext is found. If all possible plaintexts are tested and no match is found, the plaintext is not found. With this type of hash cracking, all intermediate computation results are discarded.
C) AirCrack

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Aircrack-ng is a set of tools for auditing wireless networks. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

D) IKE Crack

IKECrack is an open source IKE/IPSec authentication crack tool. This tool is designed to bruteforce or dictionary attack the key/password used with Pre-Shared-Key [PSK] IKE authentication. The open source version of this tool is to demonstrate proof-of-concept, and will work with RFC 2409 based aggressive mode PSK authentication.

E) Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting  hidden networks, and infering the presence of nonbeaconing networks via data traffic. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic.
KisMAC is a wireless network discovery tool for Mac OS X. Data can also be saved in pcap format and loaded into programs such as Wireshark. The program is geared toward network security professionals, and is not as novice-friendly as similar applications. Distributed under the GNU General Public License,KisMAC is free software.KisMAC will scan for networks passively on supported card and many third-party cards, and actively on any card supported by Mac OS X itself.

G) FireSheep

Firesheep has a packet sniffer which can intercept the cookies which are encrypted from Social Media sites like Twitter and Facebook and comes with the Firefox web browser. Firesheep is available for both the Windows and Mac OS X operating system. It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries.

H) AirJack
AirJack is a device driver (or suit of device drivers) for 802.11(a/b/g) raw frame injection and reception. It is ment as a development tool for all manor of 802.11 applications that need to access the raw protoco

I) WepLab
Weplab is a tool designed to teach how the Wired Equivalent Privacy (WEP) wireless encryption protocol works, explain the security vulnerabilities in the protocol, and demonstrate attacks that can be used to compromise a WEP protected wireless network. Weplab is designed not only to crack WEP keys but to analyze the wireless security of a network from an educational point of view.

J) WireShark
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.Wireshark is cross-platform, using the GTK+ widget toolkit in current releases, and Qt in the development version, to implement its user interface, and using pcap to capture packets; it runs on Linux, OS X, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows.

Hacking Tools For Linux

Nmap is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.


It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.


The best software to use in linux for hacking wifi channels. Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.


Netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.
Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list.


Tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.


Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force.

Use these apps and do only leggal activities as Hacking is illegal and i am not responsible for anything.

Top 3 apps for finding your lost Android smartphone 2016 (Hacking Tricks 2016)

 Top 3 apps for finding your lost Android smartphone
                                                                   Ethical Hacking Tricks 2016

Learn how you can recover your phone quickly and easily.

Some apps crush cartoon candies, deliver gifts to a friend’s doorstep or even deposit your check. But the most valuable apps are the ones that come to the rescue when your phone is missing.

Here are some phone locator apps that can help you easily recover your prized device fast.

1. Where’s My Droid

It was here five minutes ago. It’s probably at the coffee shop (or the bank, maybe?). Actually, the phone bounced out of your briefcase and into the thick, spiky shrubbery just outside the office door. But you don’t know that yet; you’re just in a panic right now.

How it works: Put the coffee down, find a laptop or tablet and log on to the app’s Commander—its online command center for phones. Select one of five options: Ring the phone, take a photo, lock the phone, wipe data or select location for a precise GPS-pinned map.

Killer feature: Rings even if the phone is set to silent.

Pro tip: If a laptop isn’t available, ask a friend to send a special text message to your phone to activate one of the aforementioned options.

Best for: People who manage a family or small fleet of phones. The free version tracks the whereabouts of up to three devices and the pro can manage ten.
Google it. Seriously.

This is the Hail Mary shot before the buzzer. When your Android phone is gone and there is no app locator on the device, just Google it. It turns out, you really can find anything on the Internet.

How it works: If you have a Google account, and your phone is also connected to that account, use the search term “Find my phone” using the web browser on your tablet or computer. You’ll then see a GPS map showing the phone’s location.

Killer feature: Still can’t find it but it’s nearby? Hit the map’s phone icon and make it ring.

Pro tip: Android Device Manager makes it easy to find, ring or wipe your device from the web.

Best for: People who lose their phones and don’t have a device-location app.

2. Find my Phone Android™ Wear

This app is “The Clapper” of lost phones. Made for smart watches and connected devices, finding a lost phone is always within (pun alert) arm’s reach.

How it works: Open the app on your smart watch, tap, and the phone starts ringing.

Killer feature: Forget your phone at home a lot? As soon as you go far enough for the smart watch to lose its Bluetooth® connection, a reminder message pops up while there’s still time to turn around and get it.

Pro tip: Download Wear Mini Launcher for fast access to all wearable apps and nix the swiping and scrolling.

Best for: People with smart watches who are lost even when the phone’s close by.

3. Verizon Support and Protection

New phone? Even better, new insured phone? Good for you. Able to replace damaged phones in a single bound, Verizon’s Total Mobile Protection also includes the premium version of this app that helps track lost or stolen phones.

How it works: When you first get your phone outfitted with Total Mobile Protection, activate the app. If you lose your phone, you can log on to myverizon.com from any computer or tablet to get the phone’s location, wipe its memory remotely or lock its screen.

Killer feature: Fast access to Verizon’s Customer Service chat with the Premium version of the app.

Pro tip: With insurance, the Premium version of the app is free. Basic is free for all phones.

Best for: People who want 360-degree protection in a phone locator app—such as insurance, anti-spam and virus safeguards.

Monday, 30 November 2015

How To Remove Memory Card Password ( Ethical Hacking Tricks 2016)

How To Remove Memory Card Password                                                                     Hacking Tricks 2016

 Today we are here with a trick for Remove Password Of Memory Card. Today every mobile user weather it is android,ios or any other use memory card in their devices. And this small chip is a device that can store million bytes of data. Sometime we protect our memory card with password, but forgot that. In that case you will have trouble to access your memory card or copy paste anything in it. So in this post i will tell you a trick which will remove memory card password. Just follow the below to proceed.

How To Remove Memory Card Password

The method to remove password from memory card is very simple and easy and this can be done by two ways, either from Pc or from android device. Also you can even view your current password too. Just follow the below steps to proceed.

Steps To View & Remove Password Of Memory Card Using Android

First of all insert your password protected memory card in your android device.

Now download the ES file Explorer in your android and open it.

Now there go to system folder and locate the file mmcstore.

Now rename it as mmcstore.txt and open it.

Now there you can see the current password of your memory card,note it down.

Now in memory card option click on remove password and then paste the password that you have noted.
Thats it you are done.

Steps To Remove Password Of Memory Card Using PC

With this method all your data will get lost as you will be going to format your memory card in this method, 
so i recommend to use above method and if it doesn’t work then go for this method.

First of all insert your memory card in any of smartphone.

Now connect the phone with computer using USB cable.

Now right click on memory card drive in your Pc and click on format(It will not ask any password to format).

Thats it by formatting your memory card password will also get removed and you can now access your memory card completely.

So above are the two ways for How To Remove Password Of Memory Card. By these ways you can easily view or remove password from memory card and can easily share data from it. And this method is such a simple that even non tech person can also do this by just following the simple steps discussed above. Hope you like the post, don’t forget to share it with your friends and leave a comment below if you facing any trouble at any step.