Wednesday 29 November 2017

Tips On How To Protect Facebook Accounts From Hacking

Hacking is a regular occurrence over the internet around the world. Email, social networking and other online accounts are at risk from being hacked into if care is not taken to keep secure information safe. And, one of the most popular targets for hackers is Facebook. Even where users have chosen strong passwords and taken extra security measures, their Facebook accounts are not safe from hackers.
So, what can you do to prevent your Facebook accounts from being hacked? In this article, we make you aware of all attacks carried out by hackers and also offer security tips to keep your Facebook account safe from hackers.
Note: This article is for security purpose only and should not be used as it is illegal. Techworm shall not be responsible for any consequences. 
  1. Hack Facebook Account Password By Phishing
Phishing is one of the most popular attack route used by attackers for hacking Facebook accounts. While there are many methods to carry out phishing attack, a hacker in a simple phishing attack creates a fake login page, which looks similar to the original Facebook page. It then asks the victim to log in the fake Facebook page. The victim’s “Email Address” and “Password” is stored into a text file the moment the victim logs in through the fake page. The hacker then downloads the text file and is now able to view the victim’s credentials.
How To Avoid Phishing Attacks
  • Never log into your Facebook account on other devices
  • Avoid emails that ask you to log into your Facebook account
  • Always use Chrome, as it identifies the phishing page
  1. Saved Passwords From Browser
The browser always asks us to save the username and passwords on the computer whenever we log in with any account in our browser. Therefore, anyone can hack your Facebook account from your browser Password Manager.
You can visit this URL and can see username and passwords you saved in your browser:
chrome://settings/passwords
Tips To Protect Yourself
  • Never save login credentials on your browser.
  • Always use the strong password on your computer.
  1. Email ID Hacking
One of the old time favourite to hack Facebook account is email ID hacking. All the hacker needs to do is access the connected email id of any Facebook account and manually reset your Facebook password.
Tips To Protect Yourself
Use Strong passwords for your email account
Enable 2 step authentication in your Gmail account
Never enter email account on unnecessary sites
  1. Mobile Phone Hacking
Smartphones these days have made it easy for millions of Facebook users to access their accounts through their devices. If the hacker can gain access to the victim’s mobile phone, then he can possibly gain access to his/her Facebook account. While there are several mobile spying softwares used to monitor a mobile phone, the most popular are Spy Phone Gold and Mobile Spy.
Tips To Protect Yourself
  • Use a trustworthy mobile security and Antivirus program on your mobile phone
  • Never install apps from unknown sources
  • Uninstall suspicious apps once you notice
  1. Viewing Masked Passwords
Any hacker can view your masked passwords (****), if your browser has saved your Facebook login credentials. All the hacker needs to do is to make some changes from inspect element in your browser. Therefore, never leave your PC when it is on the signup page. It is recommended to never save your Facebook or other Login credentials in your browser.
6. Hack Facebook Account Password By Session Hijacking
If you are accessing Facebook on an HTTP (non-secure) connection, session hijacking can be very unsafe. A hacker steals the victim’s browser cookie in a session hijacking attack, which is used to validate the user on a website and access the victim’s account. Session hijacking is extensively used on LAN and Wi-Fi connections.
  1. USB Hacking
An attacker who has physical access to your computer can just insert a USB programmed with a function to mechanically extract saved passwords in the Internet browser.
How To Protect Yourself
  • Insert trusted USB devices into your computer
  • Scan for USB devices once you plugged in
  • Don’t purchase second-hand USB devices
  1. Social Engineering
If you are using simple passwords like mobile number, DOB etc., then a good hacker can without any effort guess the password and hack into your account and collect your personal information.
Tips To Protect Yourself
  • Never share your personal information via email, phone, chat messenger
  • To avoid the risk of Baiting, block USB devices
  • Avoid links from suspicious or unknown sites
  1. Hacking Wi-Fi Network
Any hacker can hack your Wi-Fi router, if you use a weak password to setup your router security. The hacker can hack your Wi-Fi network and hijack all your internet traffic, which can let hackers hack your Facebook account.
Tips To Protect Yourself
  • Don’t use Free Wi-Fi or public Wi-Fi
  • Change your Wi-Fi password on a regular basis
  • If you are using public Wi-Fi, always use VPN (virtual private network)
  1. Logout
Leaving your computer unattended while being logged into your Facebook account is one of the biggest mistakes most people do, as it can give easy access to hackers. Therefore, ensure that you log out from your Facebook account every time you log in.
Get in touch with me to get latest updates ,for more info whatsapp me +919953576449.



Monday 16 October 2017

HOW TO VIEW FACEBOOK LOCKED PROFILE PICTURE?

1. Open the facebook profile of person whose profile picture is locked or is set to private.
2. Right click on the profile picture and click on Copy
Image Url as shown in image below.
Facebook Private Profile Photo
3.Open that image in new tab by right clicking and
selecting Paste (CTRL + V)
4. Now change the value of image size highlighted
below which might be s160x160 to s720x720 (If
its not clear try (s320x320)
Facebook Private Profile Photo
5. The image will enlarge in size.
This trick does not
always work!!!

HOW TO KNOW ADMIN PASSWORD THROUGH GUEST ACCOUNT

1) Go to C:/windows/system32.
2) Copy cmd.exe and paste it on
desktop.
3) Rename cmd.exe to sethc.exe.
4) Copy the new sethc.exe to system
32,when windows asks for overwriting
the file,then click yes.
5) Now Log out from your guest
account and at the user select
window,press shift key 5 times.
6) Instead of Sticky Key confirmation
dialog,command prompt with full
administrator privileges will open.
7) Now type “ NET USER
ADMINISTRATOR “zzz” where “zzz”
can be any password you like and press enter.
8) You will see “ The Command
completed successfully” and then exit
the command prompt and login into
administrator with your new
password.
9) Bravo !! Now You have hacked admin
through guest account.

15 CMD COMMANDS EVERY WINDOWS USER SHOULD KNOW

Microsoft has slowly but surely pushed the command line aside in the Windows interface. This is not without reason, as it’s an antiquated and mostly unnecessary tool from an era of text-based input that has long passed.
But there still are some commands that remain useful, and Windows 8 even added new features. Here are the commands every Windows user needs to know.
In case you’re not sure how to access the command prompt, forgot basic commands, or would like to know how to see a list of  switches for each command, you can refer to our beginners guide to the Windows command line for instructions.
ASSOC
Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command “assoc” to display a full list of file extensions and the programs they’re connected with.
You can also extend the command to change file associations. For example, “assoc .txt=” will change the file association for text files to whatever program you enter after the equal sign. The ASSOC command itself will reveal both the extension names and program names, which will help you properly use this command. You can probably do this more easily in the GUI, but the command line interface is a perfectly functional alternative.
Cipher
Deleting files on a mechanical hard drive doesn’t really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until they’re overwritten with new data, which can take some time.
The cipher command, however, can be used to wipe a directory by writing random data to it. To wipe your C drive, for example, you’d use the command “cipher /w:c”, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out files you need by running this command.
There’s also a host of other cipher commands, however, they are generally redundant with Bitlocker enabled versions of Windows.
Driverquery
Drivers remain among the most important software installed on a PC. Improperly configured or missing drivers can cause all sorts of trouble, so its good to have access to a list of what’s on your PC. That’s exactly what the “driverquery” command does. You can extend it to “driverquery -v” to obtain more information including the directory in which the driver is installed.
File Compare
This command can be used to identify differences in text between two files, and is particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type “fc” and then the directory path and file name of the two files you want to compare.
You can also extend the command in several ways. Typing “/b” compares only binary output, “/c” disregards the case of text in the comparison, and “/l” only compares ASCII text.
So, for example, you could use the following:
fc /l “C:\Program Files (x86)\example1.doc” “C:\Program Files (x86)\example2.doc”
to compare ASCII text in two word documents.
Ipconfig
This command relays the IP address that your computer is currently using. However, if you’re behind a router (like most computers today), you’ll instead receive the local network address of the router.
Still, ipconfig is useful because of its extensions. “ipconfig /release” followed by “ipconfig /renew” can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn’t available. You can also use “ipconfig /flushdns” to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.
Netstat
Entering the command “netstat -an” will provide you with a list of currently open ports and related IP addresses. You’ll also be told what state the port is in – listening, established or closed. This is a great command if you’re trying to troubleshoot the devices your PC is connected to or you’re afraid you’re infected with a Trojan and are trying to locate a malicious connection.
Ping
Sometimes, you need to know whether or not packets are making it to a specific networked device. That’s where ping comes in handy. Typing “ping” followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there’s something blocking communication between the device and your computer. This can help you decide if an issue is caused by improper configuration or a failure of network hardware.
Pathping
This is a more advanced version of ping that’s useful if there are multiple routers between your PC and the device you’re testing. Like ping, you use this command by typing “pathping” followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.
Tracert
The “tracert” command is similar to pathping. Once again, type “tracert” followed by the IP address or domain you’d like to trace. You’ll receive information about each step in the route between your PC and the target. Unlike pathping, however, tracert also tracks how much time (in milliseconds) each hop between servers or devices takes.
Powercfg
Powercfg is a very powerful command for managing and tracking how your computer uses energy. You can use the command “powercfg /hibernate on” and “powercfg /hibernate off” to manage hibernation, and you can also use the command “powercfg /a” to view the power-saving states currently available on your PC.
Another useful command is “powercfg /devicequery s1_supported” which displays a list of devices on your computer that support connected standby. When enabled, these devices can be used to bring your computer out of standby – even remotely. You can enable this by selecting the device in Device Manager, opening its properties, going to the Power Management tab and then checking the “Allow this device to wake the computer” box.
“Powercfg /lastwake” will show you what device last woke your PC from a sleep state. You can use this command to troubleshoot your PC if it seems to wake from sleep at random.
The “powercfg /energy” command can be used to build a detailed power consumption report for your PC, which is output to a directory indicated after the command finishes. This report will let you know of any system faults that might increase power consumption, like devices that are blocking certain sleep modes, or which aren’t properly configured to respond to your power management settings.
Windows 8 added “powercfg /batteryreport”, which provides a detailed analysis of battery use, if applicable. Normally output to your Windows user directory, the report provides details about the time and length of charge and discharge cycles, lifetime average battery life, and estimated battery capacity.
Shutdown
As of Windows 8/8.1 there is now a shutdown command that – you guessed it! – shuts down your computer. This is of course redundant with the already easily accessed shutdown button, but what’s not redundant is the “shutdown /r /o” command, which restarts your PC and launches the Advanced Start Options menu, which is where you can access Safe Mode and Windows recovery utilities. This is useful if you want to restart your computer for troubleshooting purposes.
System File Checker
System File Checker is an automatic scan and repair tool that focuses on Windows system files. You will need to run the command prompt with administrator privileges and enter the command “sfc /scannow”. If any corrupt or missing files are found, they’ll be automatically replaced using cached copies kept by Windows for just that purpose. The command can require a half-hour to run on older notebooks.
Recovery Image
Virtually all Windows 8/8.1 computers ship from the factory with a recovery image, but the image may include bloatware you’d rather not have re-installed. Once you’ve un-installed the software you can create a new image using the “recimg” command. Entering this command presents a very detailed explanation of how to use it. You must have administrator privileges to use the recimg command, and you can only access the custom recovery image you create via the Windows 8 “refresh” feature.
Tasklist
The “tasklist” command can be used to provide a current list of all tasks running on your PC. Though somewhat redundant with Task Manager, the command may sometimes find tasks hidden from view in that utility.
There’s also a wide range of modifiers. “Tasklist -svc” shows services related to each task, “tasklist -v” can be used to obtain more detail on each task, and “tasklist -m” can be used to locate .dll files associated with active tasks. These commands are useful for advanced troubleshooting.
Taskkill
Tasks that appear in the “tasklist” command will have an executable and process ID (a four-digit number) associated with them. You can force stop a program using “taskkill -im” followed by the executable’s name, or “taskkill -pid” followed by the process ID. Again, this is a bit redundant with Task Manager, but may be used to kill otherwise unresponsive or hidden programs.
Conclusion
This article doesn’t cover every Windows command available. There are literally hundreds of them when all variables are included. Most, however, are no longer useful because they’ve been replaced by more convenient menus in the Windows GUI or simply aren’t commonly used (telnet, for example).
You can check out our Windows command cheat sheet for an expanded list or download Microsoft’s command line reference guide for advanced support and troubleshooting.


Do you want to hack and play with skype ?
Don't worry ,here you are....!!!!
soon we are  going to release this hack technique with videos and good content (step by step).
keep sharing us.

Tips On How To Protect Facebook Accounts From Hacking Hacking is a regular occurrence over the internet around the world. Email, socia...