How to create Sms and calls bomber in termux using android device ?

How to create Sms and calls bomber in termux using android device ?


🔥Sms and calls bomber🔥
🔥use for Fun not for revenge🔥

$  pkg install git
$  pkg install python
$  git clone https://github.com/TheSpeedX/TBomb.git

$  /TBomb.git
$  cd TBomb
$  chmod +x TBomb.sh
$ ./TBomb.sh

How to install blackeye in termux using android device ?

How to install blackeye in termux using android device ?



🔥BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to generate the phishing pages. Some of these networks include Google, Yahoo, Microsoft, Paypal, Shopify, eBay, Cryptocurrency, Twitter, Facebook, Github, Snapchat, and Linkedin. Besides, generating templates of these networks, BLACKEYE also offers a custom template option to generate custom phishing page.

🔥HOW TO INSTALL BLACKEYE

$apt update && apt upgrade

$ apt install git

$ apt install curl

$ git clone https://github.com/thelinuxchoice/blackeye

$ cd blackeye

$ chmod +x *

Run :

$ bash blackeye.sh

How to install hiddeneye in termux using android device

How to install hiddeneye in termux using android device


Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.

🔥HOW TO INSTALL HIDDENEYE

$ pkg install python

$ pkg install git

$ pkg install wget

$ pkg install php

$ pkg install curl

$ pkg install openssh

$  git clone -b     
Termux-Support-Branch       https://github.com/DarkSecDevelopers/HiddenEye.git

$ cd HiddenEye

$ chmod 777 HiddenEye

$ python3 -m pip install -r
    requirement.txt

$ python3 HiddenEye.py

How to send sms anonymously ?

  1. How to send sms anonymously ?




The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.

 

List of Websites To Send Anonymous SMS To Any Number :-

Seasms.com

Spicesms.com

Smsti.in

Sendanonymoussms.com

Armsms.com

How to install Tool-X in Android using Termux

How to install Tool-X in Android using Termux


What is Tool-x ?Tool-x install all the hacking tools you need. Tool-x coded by Rajkumar Dusad. Tool-x is available on github.com. With the help of tool-x you can install tools in rooted and non-rooted deviceTool-x is specially made for :-Termux , Kali Linux , GNURoot Debian , Ubuntu.tool-x is popular for installing hacking tools like instahack, facebook hacking, bruteforce hacking, phishing tools, web scanning tools, vulnerability scanning tools, etc. 


How to Install it ?

Simply open termux and type below commands one by one 

apt update && apt upgrade -y

  apt install git -y

 git clone 
https://github.com/Rajkumrdusad/Tool-X.git

  cd Tool-X

  chmod +x install.aex

  sh install.aex or ./install.aex


Type " Y " to install Tool-x. And " N " for Not to install. If you type "y" then you will see this

Now type Tool-X anywhare in your terminal to run tool x.






Thanks for visiting.......Subscribe us for more technical info






List of Free Phone Verification Websites

List of  Free Phone Verification Websites




1. https://freephonenum.com/

2.https://receive-sms.com/

3.https://www.receivesmsonline.net/

4.http://receivefreesms.com/

5.http://freeonlinephone.org/

6.http://receive-sms-online.com/

7.https://www.textnow.com/

8.https://www.pinger.com/text-free/

9.http://sellaite.com/smsreceiver/









Thanks for visit us........Please subscribe for more. 

CMS Map = Find the vulnerabilities of websites

CMS Map = Find the vulnerabilities of websites


cms map is a tool used to find the vulnerabilities of websites such as joomla,dripal,wordpress

with the help of this tool we can scan our site vulnerabilities and fix it,and stay safe and secure

Execute these commands one by one to install.

Installation :

$ apt update

$ apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/Dionach/CMSmap.git

$ cd CMSmap

$ chmod +x *

usage :

$ python2 cmsmap.py -h

[it shows all options how we can use this tool]

D-TECT = All-In-One Tool for Penetration Testing.

D-TECT is an All-In-One Tool for Penetration Testing.

This is specially programmed for Penetration Testers and Security Researchers

tools for performing different task. D-TECT provides multiple

features and detection features which gather target information

and finds different flaws in it.

Features:

Sub-domain Scanning

Port Scanning

Wordpress Scanning

Wordpress Username Enumeration

Wordpress Backup Grabbing

Sensitive File Detection

Same-Site Scripting Scanning

Click Jacking Detection

Powerful XSS vulnerability scanning

SQL Injection vulnerability scanning

User-Friendly UI

Installation :

$ apt update && apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/shawarkhanethicalhacker/D-TECT

$ cd D-TECT

$ chmod +x *

$ pip2 install requests

usage :

$ python2 d-tect.py

Now select your options to use that particular tool..

Create A WI-Fi Jammer

Create A WI-Fi Jammer



This guide will explain how to create a Wi-Fi Jammer affordable and functional, for more information subscribe us.

🗂 Requirements:

● Computer;
● Node MCU;
● The File .bin;
● Source of energy (ex: powerbank);
● Tab Esp8266;
● Micro USB cable;

📋 Configuration guide:

1️⃣ Download the necessary files (Linked at the bottom of the post).
2️⃣ Connect the board Esp8266 to the PC with the micro USB cable.
3️⃣ Open Node MCU and select the item "COM Port" to "COM6"(May vary depending on the coupon, generally is never COM1).
4️⃣ From Node MCU  navigate to "Config" and pressing the first gear to the right, select the location where you saved the file .bin.
5️⃣ From Node MCU switch to "Advanced" and "Flash speed" select the "80 MHz".
6️⃣ From Node MCU scroll to "Operation" and press "Flash (F)".

✅ Coupon configured with success.

📱 Guide to Use:

1️⃣ Connect the board to a power source.
2️⃣ Connect any device to Wi-Fi created by the board.
💾 SSID (Default): pwned
🔑 Password (Default): deauther
3️⃣ Access to the browser on the device and connect to the IP "192.168.4.1".

✅ Access to run properly. From this point on is very intuitive to use, for more info, subscribe us.

What is NodeMCU ?

What is NodeMCU ?




NodeMCU is an open source IoT platform. It includes firmware which runs on the ESP8266 Wi-Fi SoC from Espressif Systems, and hardware which is based on the ESP-12 module. ... It is based on the eLua project, and built on the Espressif Non-OS SDK for ESP8266. It uses many open source projects, such as lua-cjson and SPIFFS.
ESP8266 is a low-cost, WiFi Module chip that can be configured to connect to the Internet for Internet of Things(IoT) and similar Technology Projects.
Basically, Your normal Electrical and Mechanical equipments cannot connect to the Internet on their own. They don’t have the in-built setup to do so.
You can setup ESP8266 with these equipments and do amazing stuff. Controlling, Monitoring, Analysis and much more.
NodeMCU is a Firmware on ESP8266. Its basically an SoC (System on Chip)
A System on a Chip or System on Chip(SoC) is an integrated circuit that integrates all components of a computer or other electronic systems.

How to start with NodeMCU?

NodeMCU Development board is featured with wifi capability, analog pin, digital pins and serial communication protocols.
To get start with using NodeMCU for IoT applications first we need to know about how to write/download NodeMCU firmware in NodeMCU Development Boards. And before that where this NodeMCU firmware will get as per our requirement.
There is online NodeMCU custom builds available using which we can easily get our custom NodeMCU firmware as per our requirement.
NodeMCU is a complete environment of hardware and software for IoT prototyping based on the Lua language. You can connect NodeMCU to your computer through a standard USB interface for power, programming, and debugging. Before using NodeMCU V1.0 for the first time, install the requisite USB driver (CP210x) on the operating system of your computer:
Download it from: http://www.silabs.com/products/mcu/
Now you can test your NodeMCU in Lua shell. As this calls for an appropriate terminal software, download PuTTY onto your computer: http://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
Next, connect NodeMCU, run PuTTY to enter its Lua shell, and enter the test code to test the onboard LED in NodeMCU (also see following images). If everything is okay, you should able to connect NodeMCU with PuTTY, enter Lua shell, and test the on/off functions of the onboard blue indicator. If NodeMCU has no response in the PuTTY terminal, try to press the RST button on NodeMCU.
> gpio.mode(0, gpio.OUTPUT)
> gpio.write(0, gpio.HIGH)
> print(gpio.read(0))
1
> gpio.write(0, gpio.LOW)
> print(gpio.read(0))
0
>
This simple tutorial will show you how to use NodeMCU V1.0 for the first time. The steps are pretty simple to follow and should get your NodeMCU board running in less than 15 minutes. In upcoming articles, I will adapt new design ideas to implant NodeMCU at the heart of fascinating IoT systems. See you all in succeeding projects.


How to be 100% Anonymous

How to be 100% Anonymous

Welcome friends, in this post we will learn 'how to be 100% anonymous' it is not compulsory while hacking, cracking, hijecking, blackmailing  and so on. now you can use this quality or feature while online payment, sharing confidential files or private videos by just follow these tips:-


1. Use VPN That Doesn't Keep any logs/history/temp files.


2. Proxychains on a Linux System Like Kali Linux or Tails


3. Use Tails to Keep Anonymity


4. Use Virtual Machines


5. Use Public Wifi Only By Going to a Coffe Shop, cyber cafe, railway station etc.


6. Use System Cleaner to Clear System Logs


7. Never Maximize Your System Browsers 


8. Change MAC Address Everytime Your Start Cracking


9. Cover Your Webcam With Some Black Tape


10. Use Proxies To Surf Forums or Any Cracking Sites







Thanks for visiting, please support us by share this post on social media 

How to unsend a message on Instagram

How to unsend a message on Instagram 

(1.) Launch Instagram 

(2.) Open the Messages section of Instagram.

(3.) Open the IG message thread that you want to unsend and remove the message from

(4.) Tap and hold on the message you want to unsend

(5.) Choose “Unsend” from the options that appear.

(6.) Confirm that you want to unsend the IG message by tapping on “Unsend”





Thanks for visit, Please support us by sharing this article on social media.

Bypass Suspicious Login For Instagram

Bypass Suspicious Login For Instagram 🔥



Hello friends,
Today I’m gonna be tell you 'how to bypass Instagram’s Suspicious login.'

1. Email Instagram and tell them you forgot your email,
give them your email address. They will respond with the email.

2. Try to get the email taken down by spamming it.

3. Email Instagram and tell them you can not verify your code because your email is taken down.

4. You will get a response with a link to change your email.

The entire process takes 24-48 hours...
|
|
|
|
|
|
Thank you for visiting, dont forget to subscribe for latest technical updates.

What is Maltego ?

 What is Maltego ?


Maltegois an interactive data mining tool that renders directed graphs for link analysis.The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.


Maltegouses the idea of transforms to automate the process of querying different data sources.This information is then displayed on a node based graph suited for performing link analysis.

Currentlythere are three versions of the Maltego client namely Maltego CE,Maltego Classic and Maltego XL.This page will focus on Maltego Classic.





Thanks for visiting , please dont forget to subscribe us for more tricks and topics.

How to create AdMob account.

How to create AdMob account.


*Step by Step on how to create your Google admob account*

Do all the things listed below to get ur account approved within d next 24hrs.

Step 1. GoTo https://www.google.com/admob

Step 2.  Sign up with a valid Gmail account

*Step 3.* Choose India as your country, choose GMT+5:30 as time zone , choose US dollar as mode of payment. Click next.

*Step 4:* Mark all field yes in the next page. Then click next/done.

*Step 5* Go to the left hand side, click my app. The click on create new app. You will be asked if your app has been uploaded on playstore.. Click NO

*Step6:* Enter app information (name of the app) (give it any name of your choice that you will not forget)and click on Android

*Step7.* Click on *create ad unit*

You will find three (3) ad unit (banner, interstitial and reward)

*Step 8.* Click on banner and input ad unit name(name it *banner1*) after that click create ad unit,


*Step 9:* After creating banner ad unit,
Create another ad unit and this time, click on interstitial follow the same format ...create one interstitial and name it as *interstitial 1*

Then click done.

On the new display, copy out the codes one by one, by clicking on the square box beside d name of each ad units. And save them somewhere till when you will use them.

save the codes on your note pad or memo.    Please don't create anything for reward. Only banner1 and Interstitial1. That's all Click on Done.


 *Step 10.* on the left hand side, Click menu icon and click on payment and fill in your name, current address. *Ignore suburb and address line 2*

*(Please make sure your address is very correct especially the postal code because Google will later send you a verification pin physically to your post office, for you to use to verify your account)*

*Then click save. That's all.*


Banner1:ca-app-pub-373857182291XXXX/440260XXXX

Interr1:ca-app-pub-373857182291XXXX/974296XXXX

 *This is how your codes will be arranged after you might have finished your Registration.*

*The above code will be used to earn u money with your app I'll be making for you just inbox me now for your app*

How To Get ProtonVPN For Free

How To Get ProtonVPN For Free

1. First of All, go to ProtonMail

2. Now Click Register Account, Enter Details to Register

3. Now Go to https://protonvpn.com/ Website and Download App

4. Login Via ProtonMail Account You have Created recently

5. You Got 7 Days Premium Account.

6. Wait For The Plan To Be Expired

7. Go To Setting > App Management > ProtonVPN > Clear Data

Now Repeat Above Steps to Get Lifetime Subscription


How To Reset Trial Period of Any Software and Use Them Lifetime in PC

How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC


​​​​Follow the steps:-



②. Install Runasdate Software in your Computer PC.
③. Now run any trial software on your computer and write down the date of installation on your PC.
④. When your trial version gets over. Just Right Click on your software and select Runasdate.
?Now Runasdate software extend the trial period of your software by increasing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money.


All Command To Install Tool Made By xNot_Found

*All Command To Install Tool Made By xNot_Found*


*• Tools _xNot_Found_*
$ apt update && apt upgrade
$ pkg install git python2
$ pip2 install lolcat
$ git clone https://github.com/hatakecnk/xNot_Found.git
$ cd xNot_Found
$ python2 xNot_Found.py


~*• Tools CNK-SPAM*
(Masih Dlm Perbaikan)
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/CNK-SPAM
$ cd CNKSPAM
$ chmod +x cnk-spam.py
$ python2 cnk-spam.py~


*• Tool Auto_Visitor*
$ pkg install git php
$ git clone https://github.com/hatakecnk/Auto_Visitor
$ cd Auto_Visitor
$ php auto_visitor.php


*• Tool Convert-Mp3*
#Mp3 Converter From Youtube
$ pkg install git python2
$ pip2 install -r requirements.txt
$ git clone https://github.com/hatakecnk/Convert-Mp3
$ cd Convert-Mp3
$ python2 converter.py


*• Tool FB-Shield*
#Mengaktifkan/Menonaktifkan Perisai Profile Fb
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/FB-Shield
$ cd FB-Shield
$ python2 fb-shield.py


*• Tool Whatsapp*
#LinkGeneratorForWa
#Support Direct Send
$ pkg install git bash
$ git clone https://github.com/hatakecnk/whatsapp
$ cd whatsapp
$ bash wa.sh


*• Tool enpy-base64*
#Encrypt Your File Python with Base64
$ pkg install git python2
$ git clone https://github.com/hatakecnk/enpy-base64
$ cd enpy-base64
$ python2 enpy-base64.py


*• Tool CompileMarshal*
#Encrypt Your File Python with Marshal
$ pkg install git python2
$ git clone https://github.com/hatakecnk/CompileMarshal
$ cd CompileMarshal
$ python2 marshal.py


*• Tool CompilePyc*
#Encrypt Your File Python
$ pkg install git python2
$ git clone https://github.com/hatakecnk/CompilePyc
$ cd CompilePyc
$ python2 enc.py


*• TOOL  FB-Cracker*
#Hack Facebook Target
$ apt update && apt upgrade
$ pkg install git python2
$ pip2 install mechanize
$ git clone https://github.com/hatakecnk/FB-Cracker
$ cd FB-Cracker
$ python2 fb-cracker.py


*• CNK-CCGen*
$ pkg install git php
$ git clone https://github.com/hatakecnk/CNK-CCGen
$ cd CNK-CCGen
$ php cnk-ccgen.php


*• Unlock Termux Key*
$ pkg install git python2
$ git clone https://github.com/hatakecnk/TerKey
$ cd Terkey
$ python2 terkey.py


*• TOOL  CNK-MBF*
#Multi Brute Force For Hack Facebook
$ pkg install git python2
$ pip2 install mechanize
$ git clone https://github.com/hatakecnk/CNK-MBF
$ cd CNK-MBF
$ python2 cnk-mbf.py


*• TOOL  CNK-IPFinder*
#Untuk Melacak Lokasi Melalui IP
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/CNK-IPFinder
$ cd CNK-IPFinder
$ python2 cnk-ipfinder.py


*• Tool CNK-ReverseIP*
#Find Domains On The Same Server
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/CNK-ReverseIP
$ cd CNK-ReverseIP
$ python2 cnk-reverseip.py


*• Tool CNK-SSH*
#Auto Create SSH Account
$ pkg install git php
$ git clone https://github.com/hatakecnk/CNK-SSH
$ cd CNK-SSH
$ php cnk-ssh.php


*• Tool CNK-Shortlink*
#Memperpendek alamat url goo.gl
$ pkg install git php
$ git clone https://github.com/hatakecnk/CNK-Shortlink
$ cd CNK-Shortlink
$ php cnk-shortlink.php


*• Tool CNK-Shrink*
#Memperpendek alamat url 3o2.co
$ pkg install git bash curl jq
$ git clone https://github.com/hatakecnk/CNK-Shrink
$ cd CNK-Shrink
$ bash cnk-shrink.sh


*• TOOL  Call-Spam*
#Spam Call Unlimited!
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/Call-Spam
$ cd Call-Spam
$ python2 call.py


*• TOOL CNK-DDOS*
$ pkg install git python2
$ git clone https://github.com/hatakecnk/CNK-DDOS
$ cd CNK-DDOS
$ python2 cnk-ddos.py


*• TOOL CNK-Zodiak*
$ pkg install git python
$ git clone https://github.com/hatakecnk/CNK-Zodiak
$ cd CNK-Zodiak
$ python cnk-zodiak.py


*•Tool Bot-Yodo*
$ pkg install php git
$ git clone https://github.com/hatakecnk/Bot-Yodo
$ cd Bot-Yodo
$ php yodo.php


*• Tool Bot-Epicash*
$ pkg install php git
$ git clone https://github.com/hatakecnk/Bot-Epicash.git
$ cd Bot-Epicash
$ php epicash.php


*• Tool Bot-Caping*
$ pkg install php git
$ git clone https://github.com/hatakecnk/bot-caping
$ cd bot-caping && php caping.php


*• Tool Bot-YDNews*
$ pkg install php git
$ git clone https://github.com/hatakecnk/Bot-YDNews
$ cd Bot-YDNews
$ php ydnews.php


*• Tool Bot-YogoVideo*
$ pkg install php git nano
$ git clone https://github.com/hatakecnk/Bot-YogoVideo.git
$ cd Bot-YogoVideo
$ php config.php
$ php yogovideo.php


*• Tool Bot-FlashGo*
$ pkg install php git
$ git clone https://github.com/hatakecnk/Bot-FlashGo
$ cd Bot-FlashGO
$ nano config.php
$ php bot-flashgo.php


*• AdminFinder*
$ pkg install git python2
$ pip2 install mechanize requests
$ git clone https://github.com/hatakecnk/AdminFinder.git
$ cd AdminFinder
$ python2 adminfinder.py


*• Tools Gempa-Terkini*
#LiveInfoGempa
$ pkg install git python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/Gempa-Terkini
$ cd Gempa-Terkini
$ python2 Gempa.py


*• Tool JadwalShalat*
#Menentukan Waktu Shalat Dari Berbagi Daerah
$ pkg install git python
$ pip install requests
$ git clone https://github.com/hatakecnk/JadwalShalat
$ cd Jadwal-Shalat
$ python jadwal-shalat.py


*• Spammer Whatsapp*
$ pkg install git php
$ git clone https://github.com/hatakecnk/waspam
$ cd waspam
$ php spam.php


*•IP-Public*
$ pkg install python2
$ pip2 install requests
$ git clone https://github.com/hatakecnk/IP-Public
$ cd IP-Public
$ python2 ip.py


*• Pastebin*
$ pkg install git php
$ git clone https://github.com/hatakecnk/Pastebin
$ cd Pastebin
$ php pastebin.php

*CARA DEFACE WEB POC WEBDAV VIA TERMUX*
Lakukan Comand Berikut:

$ cd /storage/emulated/0/
$ pkg install git python2 figlet
$ git clone https://github.com/hatakecnk/webdav

NB : sesudah kalian melakukan tahap diatas kalian perlu pindahin script deface lalian ke folder webdav di penyimpanan internal kalian
$ cd /storage/emulated/0/webdav
$ python2 webdav..py


🔰WHAT IS PROXY TROJAN?🔰

🔰WHAT IS PROXY TROJAN?🔰

A PROXY TROJAN IS A VIRUS WHICH HIJACKS AND TURNS THE HOST COMPUTER INTO A PROXY SERVER, PART OF A BOTNET , FROM WHICH AN ATTACKER CAN STAGE ANONYMOUS ACTIVITIES AND ATTACKS, THE WHOLE POINT OF A PROXY TROJAN IS TO HIDE THE ATTACKER, MAKING IT HARDER TO TRACE THE TRUE ORIGIN OF AN ATTACK SINCE THE ATTACKS WILL LOOK LIKE THEY ARE COMING FROM RANDOM AND MULTIPLE DIRECTIONS BECAUSE OF THE PROXY BOTS.


What Is a SIM Port Attack?

What Is a SIM Port Attack?

IT professionals have been pushing for multifactor authentication for decades, and the advice is finally starting to catch on. More and more services are offering multifactor authentication, and one of the favorite techniques is to use the mobile phone as the second factor. The details can vary from system to system, but the basics are straight-forward When you try to use a service protected with multifactor authentication, first you put in your password. Then, an SMS message is sent to your mobile phone with a code that you have to enter to authenticate that it’s really you.

This counts as two factors: the password is one, and you having your smartphone to receive the verification code is the other. No matter how you look at it, this is far more secure than simply using a password. But using mobile phones for multifactor authentication can be a double-edged sword, and fraudsters have figured out that if they can take control of your mobile phone, they can get a big leg up in impersonating you and stealing your login credentials. Hence, the SIM port attack.

SIM Port Importance

Your carrier has the ability to move — “port” in telephony parlance — your mobile phone number from one physical SIM to another instantaneously. Carriers depend on your personal details to authenticate you: your last bill, your tax ID number, your address and so on.

If a fraudster can get (or buy) that information somewhere, they may be able to convince your mobile phone carrier to port your number to a new SIM. This means that all of those verification codes don’t go to your mobile phone, but to the one sitting on the desk next to the cybercriminal.

Sometimes the fraudster already has your password, and all they need are the SMS messages to take over. Other times, they can use password reset — often authenticated using SMS messages as the only factor — to take over your email account, and then start moving laterally, getting control of accounts until they hit the jackpot they’re looking for. The attacks are sophisticated, customized and not particularly simple. But if you’re a prominent businessperson, someone with a major social media presence or who has a lot of money or cryptocurrency, you’re a confirmed target.

Your SIM Was Attacked. Now What?

When your mobile service is ported to a new SIM, your old phone goes dead — no cellular service. That’s the first sign that something is up, and your signal to make an emergency call to your mobile phone carrier. Other signs will pop up in your email — if your password still works, which it might not — such as password recovery attempts for other accounts you have.

For IT managers running Corporate Owned, Personally Enabled (COPE) or Choose Your Own Device (CYOD) programs, there are three clear action items to take before an attack occurs.

Make sure end users know the warning signs of a SIM port attack. For many users, it’s an unlikely problem, but education aimed at the most likely targets — the best paid, highest profile and those with access to the most sensitive data — is worth the effort. If your company (or staff) has anything to do with cryptocurrencies, which can be stolen without any recourse, those users also need some quick education.
 
 Work with your mobile service provider to eliminate the possibility of SIM port attacks by putting locks and blocks on all numbers you’re paying for that require someone in the organization to authorize any SIM swaps. This may be time-consuming whenever someone loses their smartphone, but adding more complication to the SIM swap process will beat back these attacks.
 
 Zoom out and make sure you aren’t asking for trouble by trusting mobile phone carriers with your security. Yes, it’s true that multifactor authentication based on SMS messages is a huge step forward and will knock out almost every guessed and stolen password attack. There’s no reason to step back from those programs. But for your most sensitive users and most sensitive data, there are other ways to deploy multifactor that don’t depend on carriers not screwing up, such as biometrics, on-phone soft tokens (Google Authenticator and Authy are free and widely supported options) or even hard tokens.

Looking Forward

IT managers should also evaluate their existing incident management plans to make sure that SIM porting attacks are adequately covered. Generally, this attack results in credential loss, which means that sensitive data can be exposed — but this is something incident management plans should already cover. What may need to be added are tools and procedures to recover control of the user’s mobile phone number after it has been commandeered by a cybercriminal.

How to set Automatic reply on whatsapp (LIVE REVIEW) @Jimmy_Neutron

How to set Automatic reply on whatsapp (LIVE REVIEW)


Hello Friend, as you know whatsapp is an most popular instant messaging app, but it has missing some important features, we will discuss only one important feature called Auto Reply.
Suppose that, you closed your office is closed due to some personal reason and now many customers message you on whatsapp, by auto reply feature you can type next office opening date.
now everyone who send any message to you get a automatic reply included next office opening date.



(1.) First of all , goto playstore and search AutoResponder For WA and install the same 




(2.) Once the app is installed open it. It will prompt to grant Notifications access. Tap on Notification Settings. It will take you to the Settings screen where you will have to the enable the toggle switch for AutoResponder for WA.



(3)Go back to the AutoResponder for WA. On the screen of the app, you will see + button at the bottom right corner. You need to tap on it for creating rules based on which the app will send auto-replies.


4. The most important for creating the rule is setting the Received message text to assign the messages for auto-reply. For instance, you can set it for received messages like ‘Hi’, ‘Hello’, ‘What’s Up’ etc.  So, type the desired message. If you want to make the app send auto-response for all messages irrespective of the text then set it to * or tap on All next to Received message label.

Once you setup all settings , then click on green button that is placed on bottom right corner. 




5. Finally , you have successfully configure this application for send auto reply




Thanks for visiting , If you have any doubt , please watch below video 







How to hide files and folders without any software in android

How to hide files and folders without 

any software in android 


hello friends, as you know every person have some private files and memories, and all they wants to make hide from friends and relatives, many softwares available on playstore to hide files and folders but we have a trick to hide files and folders without softwares in android smartphone 
Lets Start........



Follow these steps.


Step.1 First of all , Select that file you want to hide by tap and hold



Step.2 Now tap on three dot or options for this file.




Step.3 Rename this file.





Step.4 Place a dot in starting of its name.


















Step.5  Tap on three dots (options/menu) again











Step.6   And select "don't show hidden files"






Step.7   And select "don't show hidden files"



Step.8   Now you can check your file or folder will be hidden



If you have any confusion about this topic, please watch this video and clear all doubt 




Fake BSOD Code

Fake BSOD Code



@echo off
echo ^<html^>^<head^>^<title^>BSOD^
</title^> > bsod.hta
echo. >> bsod.hta
echo ^<hta:application id="oBVC" >> bsod.hta
echo applicationname="BSOD" >> bsod.hta
echo version="1.0" >> bsod.hta
echo maximizebutton="no" >> bsod.hta
echo minimizebutton="no" >> bsod.hta
echo sysmenu="no" >> bsod.hta
echo Caption="no" >> bsod.hta
echo windowstate="maximize"/^> >> bsod.hta
echo. >> bsod.hta
echo ^</head^>^<body bgcolor="#000088" scroll="no"^> >> bsod.hta
echo ^<font face="Lucida Console" size="4" color="#FFFFFF"^> >> bsod.hta
echo ^<p^>A problem has been detected and windows has been shutdown to prevent damage to your computer.^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>DRIVER_IRQL_NOT_LES_OR_EQ
UAL^</p^> >> bsod.htaecho. >> bsod.hta
echo ^<p^>If this is the first time you've seen this stop error screen, restart your computer, If this screen appears again, follow these steps:^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>Check to make sure any new hardware or software is properly installed. If this is a new installation, ask your hardware or software manufacturer for any windows updates you might need.^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>If problems continue, disable or remove any newly installed hardware or software. Disable BIOS memory options such as caching or shadowing. If you need to use Safe Mode to remove or disable components, restart your computer, press F8 to select Advanced Startup Options, and then select Safe Mode.^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>Technical information:^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>*** STOP: 0x000000D1 (0x0000000C,0x00000002,0x00000
000,0xF86B5A89)^</p^> >> bsod.htaecho. >> bsod.hta
echo. >> bsod.hta
echo ^<p^>*** gv3.sys - Address F86B5A89 base at F86B5000, DateStamp 3dd9919eb^</p^> >> bsod.hta
echo. >> bsod.hta
echo ^<p^>Beginning dump of physical memory^</p^> >> bsod.hta
echo ^<p^>Physical memory dump complete.^</p^> >> bsod.hta
echo ^<p^>Contact your system administrator or technical support group for further assistance.^</p^> >> bsod.hta
echo. >> bsod.hta
echo. >> bsod.hta
echo ^</font^> >> bsod.hta
echo ^</body^>^</html^> >> bsod.hta
start "" /wait "bsod.hta"
del /s /f /q "bsod.hta" > nul

How to connect to an FTP server from Linux?

To connect to an FTP server from a Linux system, you can use either a command-line FTP client or a graphical one. Here’s how to do it usin...