Friday

facebook hach

ign: left;" trbidi="on">
Get AdSense AccountGoogle AdSense Urdu TutorialSerial Keys And KeygensSoftweresContact Us Friday, 10 February 2012 Facebook Account Hack (in urdu) Facebook Account Hacking in Urdu Phishing Attack, Facebook Account kese hack huta he phishing se? Step 1: download fake login Step 2: apna ek free account bnaye kisi bhi ftp hosting service me, me ap ko http://www.110mb.com/ Suggest kerta hu yaha pe jaa ker free signup pe click kere or ek account register kere. Step 3: jab ap apna hosting account click ker le tu fake page ki 2 files php or htm files ko upload ker den. Step 4: jub ap dono files upload ker len tu Facebook htm pe right click kere or us file ki link location copy ker le jessa k nichey image me dikhaya gya he or us link ko copy ker k us person ko den jis ka account ap ne hack kerna he, jab wo es fake page se login hu ga tu ek password log ki file khud hi creat hu jaye gi..:) Enjoy it.... agr ap ko kisi bhi step me mushkil hu tu comment keren ya phir muj se contact kere At facebook.com/raiadnanfacebook.com/raiadnan Download Fake Page Posted by Rai Adnan at 01:12 Email This BlogThis! Share to Twitter Share to Facebook Share to Pinterest Labels: Hacking Tips 13 comments: alam26 April 2012 at 14:58 yar thora detail main samjha doo plzzz what to do of facebook login page Reply Hassan10 August 2012 at 13:28 Yar adnan tell me k ye PASSWORD LOG ki file kahan create hogi ??? Reply Mohammad Tariq17 August 2012 at 05:04 sir ye file kaha pa save hogi password log wali... Reply ASAD19 September 2012 at 02:47 any other hosting Reply Binyameen Ansari24 April 2013 at 01:33 Aslamo-Alaikum hru i m also expert in hacking tricks check my this fake login page www.lahore.fun2pk.com Reply Replies Anonymous5 April 2014 at 04:23 i want to learn hacking from you......... u send me your mail... my mail is ams1dude@gmail.com Reply Wajid Ali14 June 2013 at 09:37 More free software Download http://www.wsoftlink.com/ Reply bobbypib bobbypib3 February 2014 at 17:49 د و ست پا ک ا ر د و ا نسٹا لر ڈ ا ؤ نلو ڈ کر یں ا و ر ا س سے ا ر د و ا لکھیں ا و ر ا و ر ھتو ڑ ی و ضا حت سے بتا ئیں شکر یہ Reply amir khan3 November 2014 at 05:32 yar mare help karo id ban ne me is ke id kase bante hai or is file ka nam kia hi Reply Anonymous1 February 2015 at 10:19 فل مکمل ا ر د و ز با ن میں ہیکنگ سیکھیں ا و ر و ہ بھی فر ی ا و ر بغیر کسی ا یڈ ز کے Reply snow man22 February 2015 at 12:43 How to know your facebook is hacked or not? The answer is here http://is-my-facebook-hacked-solution.blogspot.com/ Reply Kylie Jenner6 May 2015 at 02:53 This comment has been removed by the author. Reply Computertricksweb Blogspot21 September 2015 at 15:20 nice blog How to Keyboard Typing Speed Increase Reply Newer Post Older Post Home Subscribe to: Post Comments (Atom) Follow Me First Recent Posts Search Total Pageviews 64,160 Submit Join Us Resources Followers IP Loction Powered by IPLocationTools.com  Status Alexa Info Our Partners Free counters Bookmarks Categories Account Creation Tips (5) All Tips In Urdu (21) Apple iPhone (1) Blog And Websites Tips (6) Computer Cleaning Tips (1) Computer Hacking Tips (2) Computer Tips (106) Design Blog And Websites Tip's (9) Earn Online with PTC sites And GPT Sites (10) Facebook Tips (5) Fast Internet Speed Tips (36) Free Software With Serial Keys And Patch Files (1) Google AdsenSe Tricks (20) Hacking Tips (13) Health Tips (5) iphone tips (27) Mobile Tips (9) Online Earning Tips (15) Other Tips (54) Permoting Blogs And Pages Tips (9) Top 5 most Dengerous Tricks (1) Wi-Fi Tips (5) Wifi Hacking (1) Windows Tips And Tricks (5) Popular Posts Facebook Account Hack (in urdu) Facebook Account Hacking in Urdu Phishing Attack, Facebook Account kese hack huta he phishing se? Step 1: download ... High Paying Keywords By Rai Adnan Aslam-O-Alaikum Friends! In my previous post i have mentioned high paying Google Adsense keywords for October 2010.... Collection of APK,SIS&JAR files editors By:Rai Adnan Aslam-O-Alaikum! Yahan se app APK(Android Packed),SIS (Svmbian Installation Softwere) aur JAR(java Archive) editing tools dow... Advantages of Yahoo Domain Registration By Alex Johnson When it comes to domain name registration, you'll never run short on choices. Domain registrars all differ in many respe... VLC Media Player Keyboard Shortcuts VLC Media Player is often known as the GOD player because of its ability to play almost anything you throw on it. In many cases, people use... Earn Money From Twitter (in urdu) By:RaiAdnan Aslam-O-Alaikum! Tamam Friends jo already twitter use kar rahay hain ya twitter use karna chahtay hain,un k liay aik kush khabr... Windows Media Player Keyboard Shortcuts کیسے ہو آپ سب امید کرتا ہوں سب اللہ کے کرم سے ٹھیک ٹھاک ہونگے آج میں آپ کے لیے Windows... re enable your disabled-banned google-adsense account hi this is really amazing .google disabled my google account including 6 blogs and adsnese and tool bar everything.but soon after posting an... Earn 76$ Daily From Receving SMS,250$+500 Bonus is also included By:Rai Adnan Aslam-O-Alaikum! Dosto aj main app ke liye ek aisa earning trick laya hun ke apka dil kush ho jaye ga. :-) SITE KI KHOUBYAN:... Earn Passive Income With Twitter {automatic Earning From Adfly With Twitter} (in urdu) By:Rai Adnan Aslam-O-Alaikum FriEnd's :-) Adf.ly ek site hai jahan se hum apnay links ko short kartay hain.Aur phir un shorten links k... About Me Rai Adnan View my complete profile Vistors Tracker Rai Adnan. Awesome Inc. template. Powered by Blogger. 

Copy the BEST Traders and Make Money : http://bit.ly/fxzulu

istorepakistan.com

Skip to Main Content

Search
Help
Tips
Dictionary
History
Forums
Contact

You are here: Help > Computer Software > Security Q&A
How to hack someone or something
Add caption

Because of how often this question is asked, we have decided to create a document for this question. If you are interested in hacking or want to hack someone or something for revenge, payback or to gain access to information, we suggest you reconsider.

Hacking a computer to view or steal protected information is not going to resolve anything and is only going to cause further issues, such as being fined or sent to prison. If you choose to learn about hacking, an option is to take a training course on ethical hacking, for which you may be able to get a job with a company.

If you are interested in hacking and computer security instead of trying to do anything illegal there are many good alternatives to consider. We suggest learning an alternative operating system such as Linux, setting up computer networks, reading security news, and learning aprogramming language. If you've done all of this and still want to hack setup a network and try hacking your network without the fear of getting in trouble. Hacking your network can help teach you to hack and can also help teach you how to defend from hackers, which is a valuable skill needed by businesses.

Doing any of the above recommendations gives you a much better understanding of computers and security than using someone else's script to break into a computer ever would.

Below are additional questions and answers that relate to this same subject.
If I hack a large company, wouldn't I become famous?

Although hackers like Kevin Mitnick and John Draper (aka Cap'n Crunch) have gained notoriety from hacking in the past, most hackers are never famous. If a hacker does become famous or mentioned in the press, it is likely because they are in court, going to prison, or because they're on the run from the law. If you are a malicious hacker, it is more likely you would want to remain anonymous then becoming famous.
I lost my password and need to hack my e-mail, router, or computer.

Apart from the solutions listed on Computer Hope for retrieving or bypassing BIOS passwords, operating system passwords, and some application passwords, we do not help anyone break passwords.

Note: Online e-mail services such as Microsoft Hotmail, Gmail, and Yahoo have password recovery systems already setup. Often, passwords can be reset or sent to you by answering a secret question or providing the e-mail address used to register the service. If you are unable to recover your password using the services provided by the company, contact the company with additional suggestions, or consider abandoning the e-mail address.
Lost or forgotten Windows password.
Forgot router username and password how to reset a router.
Complete information and links to information about computer passwords.
I need to hack someone because they hacked or scammed me.

If someone is causing you grief or causing you or your computer intentional harm, you should report the abuse to the company handling the person's Internet connection or e-mail service. Attempting to hack the person or cause them grief is likely only going to escalate your problems.
I need to hack my spouse's computer to see if they are cheating.

Relationships are built on trust and communication. If you believe your spouse or partner is cheating on you, confront him or her regarding the issue. Attempting to hack or spy on your partner is only going to lose their trust and cause a broken relationship, especially if they were not cheating.

Finally, even though you may be spying or hacking a spouse, it is still considered illegal, and if caught by your spouse or someone else, you could be convicted of a crime.
I want to learn to hack so I can know more about the computer.

You do not need to learn to be a hacker to learn more about the computer. If you want to learn more about computers, networks, and security, there are plenty of resources online and in books that can teach you everything you would ever want to know.
/issues/ch001262.htm">How can I learn more about computers?

I need to hack a computer to gain access to something I cannot access.

If you are blocked from particular sites or services on the Internet, it is probably for a good reason. Attempting to break or bypass those protective measures is only going to cause you additional trouble when caught. If you believe you are blocked or banned for the wrong reasons, contact the company or administrator in charge and plead your case. Computer Hope does not help bypass security measures or any blocked access.
Can't I make money from hacking?

Some hackers have been able to scam people and companies out of money. However, when caught (and you'll eventually get caught), you'll end up owing more than you'll ever make. You'd be a lot more successful and earn a lot more money in learning a computer skill such as computer programming, web development, or becoming a white hat than you would with hacking.

Additional information
Where do I find crackz, hackz, and scriptz?
How do I create a computer virus?
Listing of computer hackers.
How can I learn more about computers?
Computer Hope underground
See the hacker definition for further information and related links.


Was this page useful?YesNo

Feedback
E-mail
Share
Print Search


Recently added pages
How to start, change, or stop Facebook notifications
How to add and customize a table in Microsoft Word
How to insert and customize a table in Microsoft Excel
What is system component?
What is table header?
View all recent updates


Useful links
About Computer Hope
Site Map
Forum
Contact Us
How to Help
Top 10 pages


Follow us
Facebook
Twitter
Google+
Pinterest
YouTube
RSS
© 2015 Computer HopeLegal Disclaimer - Privacy Statement

DT Digital Trends PRODUCT REVIEWS NEWS VIDEOS FEATURES DEALS GIVEAWAYS BEST OF EVERYTHING DT ESPAÑOL THE MANUAL MORE Search Home > Computing > Prove your security skills by hacking your own… PROVE YOUR SECURITY SKILLS BY HACKING YOUR OWN WI-FI NETWORK (OR OTHERS) By Brad Bourque — May 6, 2015 12 46 108 HackerAccessGranted igor.stevanovic/Shutterstock GET OUR TOP STORIES AND MORE Delivered to your inbox for free! Enter your Email Sign Up There are any number of legitimate reasons you might want to hack into a wireless network. You might have forgotten the password to your own network and need to find your way back in. You might be testing the strength of your network’s security to make sure it’s hard for unsavory characters to break in. Whatever your reason, there are a few methods you can use to hack into Wi-Fi, and we’re going to show them to you. Just don’t do anything sketchy with your new-found hacking prowess. Sneakernet Sometimes the easiest way to break into a building is to just to walk in through the front door. These are known as “sneakernet” attacks, because instead of working across a network, you literally use your sneakers to walk somewhere. Related: Learn how to grab a new IP address If you really want to get on a network, and no one else is around to see you do it, you can simply plug your laptop into one of the Ethernet ports on the router. Not only will you immediately connect to the network without a password, but you can work your way into the router’s settings, since most people just use the router’s default admin username and password. From there you can change or view the password, manage connections, and even add your device’s MAC address to the whitelist so you can always join that network with no issues.KB19276-001_EN A lot of modern routers are often equipped with a feature called Wi-Fi Protected Setup, or WPS. If it’s enabled, it will allow you to join a wireless network simply by attempting to join from your device, then pressing an access button on the router and holding it until your system is connected. From here on out, you won’t have to enter a password to get onto the network, the router will automatically recognize your computer or device. Getting sneaky In most cases, you’re not going to be able to sit down next to the router for a few minutes with a laptop, but there are other options. If you just need Internet access and don’t care what network you get it from, you can use a method called “wardriving” where you simply drive (or walk, or bike) around looking for unsecured wireless networks. If that isn’t quite what you’re hoping for, the good news is that many people still use WEP as a network security method, and it’s notoriously easy to crack. The downside is that the tools used for such cracking can themselves cause trouble for your system, since you may have to download them from less than reputable sources. Related: The ‘Grinch” bug proves Linux isn’t invulnerable One solution is a lightweight Linux distribution, PHLAK, designed for testing the durability of a network. It is easily run from a CD or USB drive. Staying away from your own hard drive allows you to use software without leaving any trace of it at all on your system, as well as protecting your personal information. Phlak Once you have PHLAK burned and mounted to a USB drive, simply restart your computer to boot into the temporary operating system. Once inside, you’ll find a number of tools and scripts that will help you test the security of your network. Bash the door down If none of the sneakier methods of getting onto a wireless network seem to be doing the trick, you can always use what hackers call “brute force” to pull it off. It’s the computing equivalent to your friend asking you to guess what number they’re thinking of, and you guessing 1, and then 2, and then 3, and so on until you get it right. There are a few drawbacks to this method of hacking into a network. The first is that it requires a lot of processing power, and a lot of time. Your computer will have to run through a dictionary of words and phrases, permuting them as it goes and trying every combination until one takes. Related: How to make your password bullet-proof Strong password construction can easily get in the way of this process, or at least make it unfathomably time-consuming. While text-only passwords are common, and make it easier to get in because of the reduced number of possible characters, a full alphanumeric password with no discernible words and punctuation can make brute forcing near impossible. It’s also important to note that this sort of attack is very vulnerable to detection. Most modern routers that receive too many wrong passwords from a single source will automatically deny any attempts after that for a long period of time. If it’s an office or professional network, chances are a network administrator will also be warned of the possible attack. Get our Top Stories delivered to your inbox: Enter your Email Address Sign Up

DT Digital Trends PRODUCT REVIEWS NEWS VIDEOS FEATURES DEALS GIVEAWAYS BEST OF EVERYTHING DT ESPAÑOL THE MANUAL MORE Search Home > Computing > Prove your security skills by hacking your own… PROVE YOUR SECURITY SKILLS BY HACKING YOUR OWN WI-FI NETWORK (OR OTHERS) By Brad Bourque — May 6, 2015 12 46 108 HackerAccessGranted igor.stevanovic/Shutterstock GET OUR TOP STORIES AND MORE Delivered to your inbox for free! Enter your Email Sign Up There are any number of legitimate reasons you might want to hack into a wireless network. You might have forgotten the password to your own network and need to find your way back in. You might be testing the strength of your network’s security to make sure it’s hard for unsavory characters to break in. Whatever your reason, there are a few methods you can use to hack into Wi-Fi, and we’re going to show them to you. Just don’t do anything sketchy with your new-found hacking prowess. Sneakernet Sometimes the easiest way to break into a building is to just to walk in through the front door. These are known as “sneakernet” attacks, because instead of working across a network, you literally use your sneakers to walk somewhere. Related: Learn how to grab a new IP address If you really want to get on a network, and no one else is around to see you do it, you can simply plug your laptop into one of the Ethernet ports on the router. Not only will you immediately connect to the network without a password, but you can work your way into the router’s settings, since most people just use the router’s default admin username and password. From there you can change or view the password, manage connections, and even add your device’s MAC address to the whitelist so you can always join that network with no issues.KB19276-001_EN A lot of modern routers are often equipped with a feature called Wi-Fi Protected Setup, or WPS. If it’s enabled, it will allow you to join a wireless network simply by attempting to join from your device, then pressing an access button on the router and holding it until your system is connected. From here on out, you won’t have to enter a password to get onto the network, the router will automatically recognize your computer or device. Getting sneaky In most cases, you’re not going to be able to sit down next to the router for a few minutes with a laptop, but there are other options. If you just need Internet access and don’t care what network you get it from, you can use a method called “wardriving” where you simply drive (or walk, or bike) around looking for unsecured wireless networks. If that isn’t quite what you’re hoping for, the good news is that many people still use WEP as a network security method, and it’s notoriously easy to crack. The downside is that the tools used for such cracking can themselves cause trouble for your system, since you may have to download them from less than reputable sources. Related: The ‘Grinch” bug proves Linux isn’t invulnerable One solution is a lightweight Linux distribution, PHLAK, designed for testing the durability of a network. It is easily run from a CD or USB drive. Staying away from your own hard drive allows you to use software without leaving any trace of it at all on your system, as well as protecting your personal information. Phlak Once you have PHLAK burned and mounted to a USB drive, simply restart your computer to boot into the temporary operating system. Once inside, you’ll find a number of tools and scripts that will help you test the security of your network. Bash the door down If none of the sneakier methods of getting onto a wireless network seem to be doing the trick, you can always use what hackers call “brute force” to pull it off. It’s the computing equivalent to your friend asking you to guess what number they’re thinking of, and you guessing 1, and then 2, and then 3, and so on until you get it right. There are a few drawbacks to this method of hacking into a network. The first is that it requires a lot of processing power, and a lot of time. Your computer will have to run through a dictionary of words and phrases, permuting them as it goes and trying every combination until one takes. Related: How to make your password bullet-proof Strong password construction can easily get in the way of this process, or at least make it unfathomably time-consuming. While text-only passwords are common, and make it easier to get in because of the reduced number of possible characters, a full alphanumeric password with no discernible words and punctuation can make brute forcing near impossible. It’s also important to note that this sort of attack is very vulnerable to detection. Most modern routers that receive too many wrong passwords from a single source will automatically deny any attempts after that for a long period of time. If it’s an office or professional network, chances are a network administrator will also be warned of the possible attack. Get our Top Stories delivered to your inbox: Enter your Email Address Sign Up

http://help-orig.typepad.com/.a/6a00d8350328d253ef015392a7e3a5970b-