what are you looking for?

Monday, October 31, 2016

How to track profile visitors?

Guys these are some steps to trace the people who visit your profile#

  1. Log in your Facebook Account.
  2. By Default you are on Facebook Home Page But If you are not Go to Facebook Home.
  3. Press CTRL+U and a New Window Open Where you see the Source Code of Facebook Page or You can also Do it By Right Click >> Open Source Code.
  4. Now Press CTRL+F and Search for this InitialChatFriendsList and You will see that Many Profile ID’s starting with 1000 is the Facebook Profile ids. You can Pick up any ID to see who is visit your Profile. In Below Picture You see that there are many People who View Facebook Profiles Secretly.These are the Facebook Profile IDs that Visit on your Profile
  5. Use These Profile ID’s like www.facebook.com/ID and Paste in Browser URL and See People who Watching you.
  6. These all are Facebook Profile IDs who is Visiting your Facebook Profile.
  7. Now you need to Pick Each of Profile Code and use this Process Again and Again. This is Little Complicated but 100% Working Trick.

How To Become Certified Ethical Hacker ?

A hacker is basically someone who breaks into computer networks or standalone personal computer systems for the challenge of it or because they want to profit from their innate hacking capabilities. The hacker subculture that has developed among these new-age outlaws is often defined as the computer underground, although as of late it has evolved into a more open society of sorts.

How To Become Certified Ethical Hacker ?

Today many businesses and government-related organizations that are serious about their network security, so they hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud from that black hat and other hackers.  So you can earn through it by learning the ethical hacking.



There are many ways to become an ethical hacker to get certified for that, we have listed the ways below acknowledge you about how the things actually works so you are able to hack it.

Programming

Programming

A programmer or developer knows how to build software and websites and these software or websites may be very important and require better security researches. Role of hacker will be as a security analyst who should find the flaws on the programs or websites and help programmer to make it more secure by testing different attacks on it . Also it is not possible if the hacker don’t have the knowledge of programming . We have already posted some articles that will help you to understand programming and development of certain live projects.


Networking
Networking
Today the knowledge of networking is very essential as we daily share a lot of stuff on internet and some data may be shared publicly but some data must be secured like your passwords, Bank information etc. And an ethical hacker must have ability to find out any flaw on the network security and vulnerabilities. And if you are well aware about the working of internet, he/she can figure out most of the problem on network securities.


Encryption & DecryptionEncryption & Decryption
Encryption & Decryption
This mainly refers to cryptography, which means how you secure something that is with what methods, like when you want to login in some site you enter the passwords there . Similarly you can use many other ways to encrypt something like OTP (one time password), Fingerprints, Face Detection etc. And when you the best way to encrypt a thing then you must know the decryption method to bypass that securities to become a ethical hacker.


DBMS (Database Management System)dbms

dbms

This is the another most important thing that you must know as if you know how to create and manage different databases then only you can learn how they can be easily hacked like SQL injection knowledge can’t be get without knowing the SQL.


Linux/UNIXlinux unix
linux unix
Linux is very much powerful and It’s also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time . So this is the best operating system that can choose while learning hacking. And note that most of the hacker use this OS.


Code in C Programming Language
C Programming
C Programming
C programming is the base of learning UNIX/LINUX as this OS is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker, starts beginning with learn C language.


 

Learn More Than One Programming Language
Learn More Than One Programming Language
Learn More Than One Programming Language
It is important for a person in the hacking field to learn more than one programming language. There are number of programming language courses available online like C++, Java, Python, Free Hacking eBooks and tutorials etc are easily available online. 



Learn More Than One OS (Operating Systems)
Learn More Than One OS (Operating Systems)
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from LINUX/UNIX, Windows, MAC OS, Android, JAVA, Cent  etc. Every system has a loop hole, hacker needs to exploit it.



Experiment
After learning some concepts of hacking/cracking, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.


Continue Learning
Continue Hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.

The World’s Most Advanced Ethical Hacking and Penetration Testing Program – Certified Ethical Hacker (CEH)

Today this is the world’s most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization over the internet and the main goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation on any security. There you will walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification.


Where is my Windows Product key ?

Where is my Windows Product key ?

Windows 8, 8.1 and 10 PCs now embed their product keys in the BIOS, a move that offers both pros and cons.
In the past, a new Windows PC would display its product key on a sticker, usually on the side of a desktop and on the base or the bottom of the battery compartment on a laptop. But with Windows 8 8.1 and 10, Microsoft has switched gears and now stores and encrypts the key in the BIOS instead.

Here’s how to recover and view it:

Here are four utilities, all of which will may display your product keys if they are still there: Belarc Advisor:http://www.belarc.com/free_download.html (It does a good job of providing a wealth of information.)

Saturday, October 29, 2016

How to download videos directly from YouTube

How to download videos directly from YouTube

Hello whatsup guys! 

     Guys today I'm going to show you that how can you download videos directly from YouTube . So guys to download follow the following steps:

1. First of all you just open the video to download in YouTube.
 
2. Then go to link address of the video an add "ss" in between "www." and "youtube" such as www.ssyoutube.com/watch?v=PyrtS_iotpM


3. Then press enter and new page will appear like below:

4. Choose the video quality and size then click download.

5. Then check the "Downloads", You will see the video being downloaded there and enjoy:

So guys these are the steps to download any youtube video for free. Now try these steps and download anything from youtube.

###

How to make Gif animation from an android without using any application

How to make Gif animation from an android without using any application?

So guys today I'm going to tell you some steps so that you can make Gif animations from your
Android having Marshmallow version easily.

STEPS:
1. Go to your gallery and select photos whose Gif animation is to be made.
2. Click on "More" in the Upper right  corner.
3. Then click on animate button.
4. Arrange the photos in the order in which you want to look animation.
4. You can also Increase or decrease the speed of animation.
5. Then click in Save.
6. Open new file which looks like an image but when you open it, It will run.And that will be your Gif animation there.

IF YOU DONT UNDERSTOOD WATCH THE VIDEO BELOW AND ENJOY

How to make Gif animation from an android without using any application

13 worst things only seen in india