Posts

Featured post

12 Best Android Hacking Apps 2016

Image
1.Hackode The hacker's Toolbox is an application for penetration tester, Ethical Hackers, IT administrator and Cybersecurity The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cybersecurity professional to perform different tasks like reconnaissance, scanning performing exploits etc. Download: Hackode 2. Androrat Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server. Download: Androrat 3. APKInspector APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aid analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. Download: APKinspector 4. DroidBox DroidBox is developed to offer dynamic analysis of Android applications. Download: Droidbox 5. Burp Suite Burp Suite is an

5 Common Mistakes That Fresh Hackers Make

Image
Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker. 1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work. 2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these. 3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker. 4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by th

Potential Security Threats To Your Computer Systems

Image
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters. In this article, we will introduce you to the common computer system threats and how you can protect systems against them. What is threat ? The ISO 27005 defines a threat asa potential cause of an incident that may result in harm of systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system. What are Physical Threats? A physical threat is a potential cause of an incident that may result in loss or

Indroduction to Hacking

Image
What is hacking? There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking. Types of Hackers Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. Ethical Hacker (White hat) A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. Cracker (Black hat) A hacker who ga

Android's SECRET Codes

Image
Android's SECRET Codes These Android Secret codes are mostly universal, and should work on Android devices, no matter the manufacturer. There might still be carrier restrictions on certain codes though, so they're not all guaranteed to work. *#06# - IMEI (International Mobile Station Equipment Identity) number - essential in case your device is stolen and you want to block the thief from accessing your network *#*#7594#*#* - Make Power button turn off your device without displaying menu *#*#4636#*#* - Display information about phone, battery, usage and WiFi *#*#7780#*#* - Factory reset (deletes app data and apps, not firmware) *2767*3855# - Complete phone wipe, including firmware (not to be used lightly!) *#*#273283*255*663282*#*#* - Back up all your photos and videos *#*#1472365#*#* - Test your GPS *#*#1234#*#* - Display phone firmware and PDA info You can access the above screen on most Android devices by entering*#*#4636#*#* on the dial

Best Hackers The World Has Ever Known

Image
In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity. 1. Gary McKinnon Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the effort

Track Your Facebook Login Location

Image
Facebook provide a feature in which you can easily track the last login locations of your account and you can easily check they weather you have log in at that location or not and ensure your security. Steps To Track Facebook Login Location Of Your Account 1.First of all  login in your facebook account  in browser of your computer system. 2.Now click on the arrow sign at the right side and a drop down menu will get open. 3.Click on the settings option from there. 4.Now click on  security section  at right menu there. 5.Now click on edit at the right of  Where You?re Logged in. 6.Now there you will see all the location of your previous login and you can easily check that the login location is your or not. And you will check if you was there are not and if not then you By using these method you can make sure that your facebook account is not getting access by any other unauthorized person and by which you can ensure your account security