Showing posts with label Social Media. Show all posts
Showing posts with label Social Media. Show all posts

ARM becoming a tough rival for Intel

ARM is now becoming a rival for Intel and Intel has also failed many times to crack lock assembled by British company on smartphone chip.




SoftBank Group Corp. of Japan has announced to buy ARM for $32 billion and has also shown plans to double the workforce of ARM within 5 years of takeover. This extra money for ARM's chip sways can also be used to cause a major revolution in the market, causing Intel a major threat.


Thus, ARM has become a major threat for the Silicon Valley giant, Intel. Rumors were also heard that Intel might try buying ARM so that they won't have to face the war coming in near future if SoftBank goes with the idea of buying ARM. Some analysts have also suggested that this idea is highly unlikely because of the design that Intel technologies have developed over the years and the user's reliability image of Intel.


Intel is a strong company, invented microprocessor, a well known chip maker, a major provider of personal computer and server system chips. In 2015, Intel generated a revenue of $55.4 billion.

Create redirect link to your page from Google

Need a redirect link? Worried about getting traffic?
Its not ethical to steal traffic. But, it isn't crime to learn how to (Not until you actually go for it).


Step 1:
 Go to google.com

Step 2:
 In google's search bar, type the following search:
            'sitein:ctechtricks.blogspot.com'

Note: In Step 2 given above, ctechtricks.blogspot.com is the site you want to redirect to.

Step 3:
 Right click on any address which contains the webpage you want link for.

Step 4:
 Click copy link address.

Step 5:
 Now this link can be pasted anywhere to redirect to your page.

Fired From Facebook, Noah Kagan Speaks About His Most Important Lesson

Noah Kagan was only 24 years of age when he was hired at Facebook. According to the news, Noah Kagan was Facebook’s 30th Employee and joined Facebook when it was about one year old. At that time Facebook was only getting few millions new signups per day.
Noah Kagan worked as a product manager. However, due to some fair reasons, he got fired after 9 months. According to Noah Kagan, he made four mistakes and one of the major mistakes was leaking Facebook’s internal developments to TechCrunch.
Noah Kagan is now a founder of the marketing company which is known as AppSumo. AppSumo is a daily deals website for digitally distributed goods and online services. AppSumo was founded in March 2010 by Noah Kagan. Today the company has over 700,000 active subscribers.
During an interview, Noah Kagan recalls the incidence when he used to approach Mark Zuckerberg which his ideas and Mark Zuckerberg used to reply something like “Will it help Facebook Grow?”
During an interview with Ramit Sethi who is an American personal finance advisor and entrepreneur throws a light on what Noah Kagan actually learned during the 8-month period of his Facebook life.
Noah Kagan in an interview said that “I think that’s the biggest takeaway that may be the most successful in the most money is one thing and that one thing is when you are running your business have one goal. That’s it”
Noah Kagan learned an important business lesson to have one goal at a time and also helped Ramit Sethi to build his personal finance book “I will teach you to be Rich” which became a New York Times bestseller.
During an interview with Ramit Sethi, Ramit Sethi told us how Noah Kagan helped him to trim the 37 pages book down to only 5 Page. When Noah Kagan ask Ramit Sethi what his goal was? Ramit answered that he want his book to be in the New york times bestsellers list. Now Ramit Sethi’s book is on New York times bestseller list.
Watch The Interview:
So what we can learn from Noah Kagan! Actually, Multiple goals will always create different thoughts on mind making you unable to focus and will distract you with different thoughts which will hamper your main focus towards achieving what you desire.

How do I convert my personal account to a Facebook Page?

Converting your personal account to a Page creates a new Facebook Page that's based on your personal account. We'll transfer your current profile picture and cover photo to the Page, the name on your personal account will become the Page's name, and you'll have the option to add friends as people who like the Page and to transfer photos you've shared from your personal account to the Page.
To convert your personal account to a Facebook Page:
  1. Go to Create a Facebook Page Based on Your Profile
  2. Click Get Started and follow the on-screen instructions
Please keep in mind that:
  • You can only convert your profile to a Page once.
  • You'll have a personal account and a Page after completing the conversion, and you'll be able to manage the Page from your personal account.
  • The tools to help you move info from your profile to your Page will only be available for 14 days after you complete the conversion.

Different ways to download videos from Facebook


For Android Phones:


1.Open Google chrome or internet browser

2. Write on address bar m.facebook.com


3. click on video you want to download open and play it


4. While it is playing right click on video and select "save video as" option and save it! Now you can watch saved video in your phone and enjoy.


Here you can watch video how to download fb videos in your phone:





For Pc:

There are 2 ways to download videos:

First way:

1. Open video you want to download 

2. Click right on playing video select copy URL option 

3. open new tab and paste the copied URL 

4. Replace on starting" www" to "m" and press enter .Now click right while playing the video and select "save video as" option and save into your PC and enjoy it! Thank you!

Video:




Second way:

1. Add extension of FVD in to your google chrome 

Click here to add extension

2. play the video you want to download then open FVD extension right top of google chrome .

3. you will show the option of found media and click download option and you can see the downloaded video.

Video:



Make Fake FB Account in 1 Min Without Mobile and email

Facebook is most popular Social Networking Website in world. Facebook signup process is most secure now those days. You need one mobile number or email for create user account on Facebook Website. 
Make Fake FB Account in 1 Min Without Mobile and email
But in this post I give you a trick , make fake account without email and mobile number  in just 1 min. This trick is awesome guyz because you don't need any email and mobile number for facebook sign up process.
Also Read: 




This facebook trick is done my disposal email service.

SocialSafe Make Backup of All Social Network Activity like Facebook,Twitter and More





Make Fake FB Account without email and Mobile Number in Just 1 Min


1. ) Open 10minutemail.com (10 min is disposal email website)

2.  ) In 10min website,this website give you a temporary email, copy this email.
fake fb acccount

3. ) Open facebook.com ,fill up the form and paste email in email section.
4. ) Click on Sign Up ,your account will we created on facebook.
fake fb acccount

5. ) Go to 10minutemail.com (step 1) tab and refresh the page ,now you see a mail come from facebook ,open that email click on confirm now button and your fake facebook account process is completed.
fake fb acccount


Now with this trick you make verified fake facebook account without and email and Number.

Note:

Do not use this trick for any illegal purpose.
Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark 2016

Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark 2016

Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark
Wireshark Software to capture cookies:
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.





hack-facebook-password-735x400
Requirements:
Cain and Abel : http://www.oxid.it/cain.html
Wireshark : http://www.wireshark.org/
Firefox 3 (or one compatable with add n edit) : http://www.oldapps.com/firefox.php?old_firefox=59
Add n Edit (cookie editor for firefox) : https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/
Acess to the network with user you want to hack
Network traffic
Prerequisites: Download and install all above programs. To add “Add n Edit” to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.
Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies.
First: Gain acess to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain acess using Backtrack.
Tip: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.
Second: Right click Cain and choose ‘run as administrator.’ on the top bar go to ‘configure’ and be sure to select your wireless card/adapter. now click where it says ‘Sniffer’ then this litte button towards the top left:
2c516-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay
should look like this:
23534-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
These are all the devices it was able to detect.
Now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It’s easiest to just go one by one and choose all possibilities.
3b606-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this:
b9b36-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
we are done here, just minimize Cain for now.
Third: Run wireshark as administrator. On the top bar choose ‘Capture’ then ‘Interfaces.’ Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.
b46a1-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type “http.cookie” in the filter. (Something to consider is to just filter to “http” and scroll through the entries looking for ones that start with the word “POST” this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them:http://www.md5decrypter.co.uk/ )

Here is an image:
b1dc4-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forumfreerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put ‘facebook’ there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).
a9806-facebook2bhacking2busing2bcookies2bstealing2bwildhacker


What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts.
ed87e-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Copy the cookies as value and save them into a notepad (shown in pic above). I would suggest to seperate everywhere you see a “;” bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.
Final: Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like this:
cd34b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is “/” and my domain is “.freerainbowtables.com
mine looks like this:
b645b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!

How To Hack Accounts Passwords -Password Breaking Tools 2016

How To Hack Accounts Passwords -Password Breaking Tools 2016

Password-cracking-tricks-2016


Here are some popular tricks to hack accounts and get their passwords:

How To Hack Accounts Passwords -Password Breaking Tools 2016

1.Password hashes:

Passwords that you type in your computer operating systems are stored somewhere on the disc in the form of hashes.These hashes are not in clear text therefore to access these hashes root/sysadmin privilages are required.In windows operating system these hashes are stored on the local disc in the SAM file,while in linux stores these hashes in /etc/shadow file.Hence to encrypt out the password out of these hashes the root access is required and therefore the password can only be cracked by this process only if the operating system can be in your control for some time or you can use the system by your own.





a)Dictionary:

Using dictionary attack to find the password out of hashes is the simplest and fastest method.It just runs through dictionary of words and tries each one of them to check whether it works or not.It could seem to be impossible if it has to be done manually as one cannot try so many passwords at a time but the best thing is that your computer can do so in just a minute or even less to find up the password.Use this trick and find out the password from the hashes where some programs available on internet will help you find the correct password out of the bundle of text of hashes.

b)Rainbow table:

Most systems now a days uses hashes to store the password but as we know these hashes are encrypted files.To crack up the encryption is to take the dictionary file that we has found in above step and hash it again and then compare it with the hash file that was accessed previously from the system.That takes a lot of time and uses intense CPU but this process checks the password that we got through dictionary of hash file to be correct.

2.Using Software to hack:

There are many softwares available on the internet that do help you to crack the various accounts.These softwares uses some commands and some information to find the encrypted pasword and then crack it.Some softwares can even hack the accounts in few minutes which is great but every password cannot be cracked by this method.Still this method is used mostly to crack the accounts as it the easiest method to do so.You just has to provide the required information and the rest of process will be done by softwares only.

Here are some of the best hacking software used till date:

a)John The Ripper:

The world’s best known tool to crack up the passwords that can crack up the password for linux operating system strictly using the command line.It uses built in default password cracking technology and attempts to crack password first by dictionary attack and if that fails it then tries combined dictionary words and still if that does not works it tries the hybrid attack of dictionary words with special characters and words.At last if that all does nothing then it uses its special brute force feature that will be enough to find the required account password.

b) Ophcrack:

It’s a free rainbow table-based password cracking tool for Windows and is among the most popular password cracking tools and can also be used on linux and mac systems.It crackes LM and NTLM hashes.Although this program can crack the password only if you have the hash file of the operating system without that it is of no use.Still it can probably crack most accounts.


How To Hack Accounts Passwords -Password Breaking Tools 2016

3.Online account hacking:

Accounts can be hacked using online hacking tools that uses some information about the account and using that it can crack up the accounts.Online tools are pre programed to do so and can be the easiest way to hack passwords if you are familier with some of the information of account.Following are some of the best online hacking tools that you can use:

a)Brutus:

Many consider it to be the fastest online password hacking tool and is also free and available for both Linux and Windows.It supports password cracking in HTTP,POP3,FTP,SMB,Telnet and other types such as IMAP,NNTP,Netbus,etc.Brutus is open source tool and is best for doing online hacking of many types of accounts.

b) THC-Hydra:

Probably the most widely used online hacking tool that is capable of hacking web form authentication and when it is used with other tools like Tamper Data,it can become a powerful and effective tool for cracking nearly every type of online password authentication mechanism.

4.Password cracking Hardware:

These are special type of machines designed only to perform some type of operation to hack up the data or the accounts of the system when connected to it.These machines or these type of hardware is amazingly powerful and can perform any task in about 1 million of time that general hardware may take.These hardwares can be available on rent for hacking systems or accounts.Some of the best password cracking hardware are:

a)Botnet:

These machines are simply a function of brute force computing power and these machines are basically used for cracking the passwords in very very less time than that of general computers.The same can be done to network also and it can access about network of one million machines.

b)ASIC:

These are application specific devices that can work about to hack any system or account.These machines can work faster than over 100 CPU working togather.

5)Hidden Softwares:

Look like if you are using someone else computer or smartphone and your account was found to be hacked after some days but you remember to log out all the sessions on that system.You could be amazed to know that your login could be recorded on the computer or smartphone by some sort of software or application that remains hidden to other people and can record their passwords and account data also.Here are some softwares that can do up the same trick:

a)Keyloggers:

Keyloggers is a specifically designed software that can record the account logins and send it to a file at a particular location in your storage.That records contain the account details and their passwords also.This software is very popular to hack the accounts if your device is used by others to access their accounts.

b)KeyCounter:

Similar software that also uses the recorded information like Keyloggers.This also is another popular software that is used to hack the accounts using hidden recording of the login details and password.

Conclusion: Hacking accounts is a no easy task even the professional hackers do fail sometimes to hack the accounts.Here in this article are the most accurate and easy ways that are even used by pro hackers also.These

ways are also mostly used ones to hack the accounts of almost any type.
[WhatsApp Hacks] Crash Your Friend’s WhatsApp

[WhatsApp Hacks] Crash Your Friend’s WhatsApp


[How To] Crash Your Friend’s WhatsApp
[How To] Crash Your Friend’s WhatsApp
[Whatsapp Hacks] How To Crash Your Friend’s WhatsApp – A Vulnerability has been discovered in the wildly popular messaging app WhatsApp, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message. If this exploit catches on, we’re likely looking at around 500 million users who could be affected by this vulnerability unless WhatsApp patches it up in haste.
Note : This post is meant for educational purposes only

[WhatsApp Hacks] Crash Your Friend’s WhatsApp

Make Someone Leave a WhatsApp Group / Force them to Delete your old WhatsApp Conversation / Crash their WhatsApp
Just copy this Message and Send it to that Person/Group :
㊰ߘ
㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ
㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠
ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰
ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊
ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㰟
Ѝ
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊊ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ
The exploit even works for group chats, forcing participants to exit the thread. And the exploit seems to be working on most versions of the Android OS, including Jelly Bean, KitKat and below as tested by the duo. It is yet to be tested on the iOS version of WhatsApp, but given the earlier 7MB message fiasco holding true for Android and iOS, it may affect Apple’s mobile OS as well, but there are reports that it does not affect the platform at all. Similarly, the Windows Phone 8.1 version of the app remains unaffected too.
You can follow us on Facebook , add us to your circle on Google+ or like our Facebook page to get more latest technology tricks and hacks.

How to Hack Facebook, WhatsApp, and Telegram Using SS7 Flaw



How to Hack Facebook, WhatsApp, and Telegram Using SS7 Flaw
How to Hack Facebook, WhatsApp, and Telegram Using SS7 Flaw

Hackers can now use SS7 flaws to hack WhatsApp, Telegram, and Facebook. According to the news, Researchers are intelligent enough to hack WhatsApp, Telegram and Facebook using the telecom flaw.

How to Hack Facebook, WhatsApp, and Telegram Using SS7 Flaw

As we keep receiving questions from our readers about “How can we hack Facebook?” “Tell me the method to hack whatsApp”. Recently Researchers mentioned that we can use the very recognized Telecom Flaw, to hack WhatsApp, Telegram, and Facebook.
If we talk about WhatsApp and Telegram it recently enabled 256-bit encryption. For those who don’t know about this type of encryption then let me tell you this encryption could take months to decode a sentence.
WhatsApp and Telegram both the apps are end-to-end encrypted and both suffer from same hardware vulnerability which can be hacked to seize control of both WhatsApp and Telegram.
If we talk about your Facebook accounts that it can also be hacked, it doesn’t matter how strong is your password. Hackers just need your phone number to hack your Facebook account.
The Flaw rests in Signaling protocol SS7 (Signalling system 7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world’s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.
SS7 has long been known to be defenseless to hacking since 2008. According to the sources, the protocol vulnerability of SS7 can be used by government agencies to track the movements of cell phone users from anywhere in the world.
Here are the three videos that will show you how researchers managed to hack Telegram, WhatsApp and Facebook accounts using the SS7 flaws.

Facebook Hack

Telegram Hack

WhatsApp Hack



So from the above videos, you can see how easily your Telegram, Facebook, and WhatsApp account can be hacked. The worst part is the hackers can see and alter the messages according to their wish.