Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
Kindly be informed that as per SMW4 BNOC, due to delay faced in clearance and inspection of repair ship at Chennai Port, the planned activity of repeater replacement on SMW4 Cable System has been postponed and now expected to commence as per below schedule:
Date and Time Duration of Outage:
23-02-2016 to 28-02-2016 ( 05 days)
CRO: Yes sir How can i help u?
Me: internet is down since yesterday
CRO: Same here sir
Me: Phr wahan امب lainy bethy ho BC
Giving details of your DSL problem.
and When PTCL Numaainda says
“Mam your Complaint no is “83”.
Internet kal tak theek hoga”
In this article I will introduce you step into the world of Hacking. If you are starting full, there is absolutely no problem, everyone is a day and I hope you will learn a lot here!😉
I have prepared a list of blog posts that will help you properly start:
- The course detailing what a hacker monitoring the types of hackers and 7 qualities of a powerful hackerand the steps to follow to start with hacking.
- The course on the ethics of a hacker to be followed in this blog, the 5 mistakes beginners hacking, the 10 récurentes issues in hacking and how to become a hacker.
- The tutorial detailing the methods to track a hacker, how to become anonymous and how to recover a hacked account.
- The Top 10 programs useful to have on hand and the best sites to learn programming.
- The tutorials on Internet safety the passwords of security, how to secure their Facebook account, how tocreate a secure email address, and finally how to secure his blog.
- The different web vulnerabilities including XSS, the SQL injection, the BIA fault and even a space simulation exercise to see the flaws as true.
- I will also ask you to read the DISCLAIMER and the following article before asking questions: Asking for help efficiently.
What’s Blog From Hacker is not
In order to clarify the aim of the website as quickly as possible, know that Blog From Hacker is not a site that will help you hack into a system that is not yours or someone who has not given you permission .
This is not because-I do not care about your problem, but it’s because-I adhere to the ethics of a hacker. The purpose of which, I repeat, is not to hack others but to protect themselves.
Moreover I am subject, just like you, the laws regarding piracy. And “unfortunately” the laws do not provide for a “revenge” part allowing piracy because your spouse has cheated you.
From here on The Hacker Blog, we seek to understand the attacks and malicious techniques used by hackers for the purpose of our defense, and we protect.
Many of you have noticed: Indeed you will not get to pirate the content published here, and this isnormal.
It is for this reason that I am not anonymous, I do not publish from Panama using encrypted messaging systems … etc. I have nothing to hide, computer security is a passion for me and I think that the lessons shared here have already helped a lot of users to secure their systems and their privacy.
Finally, note that you will get help if you are a victim of piracy. But that often when the damage is done, it’s already too late. The blog will therefore also an object preventive. Believe my word as testimonies indicating that the police could not do anything there, I’ve had many. Take your safety seriously.
I have prepared a list of questions that are most often asked me. I will respond in full transparency and I will of course update this page as needed.
How did you learn computers?
It’s a very good question, I learned self-taught computing to 70/100%, according to what we are talking.
In fact, this is for me a story of motivation and passion.
For example, for hacking, I can not say that “I leave that for tomorrow” or that “I did not need to know that.”
Rather, I want to know as much as possible and the biggest obstacle suddenly becomes the timejust. This same time that I use to write articles or help. In this regard, I apologize to her kind teacher who saw my empty chair 2.9 times of 3 because I was drying to take care of my site in the room just above theirs.😉
Somewhere some kind of sacrifice is dedicated to his passion sometimes forgetting other things.
So I learned by practice, wanting to know everything. It reminds me of the math and what I was told at school: “We must do exercises. “Though I hate math and I think the only problem with this statement is the word” should “from the moment you are forced, or when you feel forced, you aremore motivated or passionate, conversely .
Thus, practicing the pleasure and the desire to practice is the best solution.
Of course, if you have before you a course of action to follow, everything is easy, that is why I can help (see end of article).
Writing tutorials and participation in forums also helps a lot to learn. And if you knew everything that I learned just by writing articles of this blog, you do not even believe me!
What do you advise me to do to be good with computers?
I will not allow me to give advice to be “very good”, the qualification is relatively subjective. I do not know everything about everything, even if the domain name might suggest otherwise. Otherwise I think I summarized how to learn the answer to the previous question.
I would add that we must be curious, so now I hear about fault XSS and I do not know what it is, I head to Google, and I have my answer, my lesson. Then I write what I learned as a guide and I put into practice and I did my exercises. It remains for me to push my research to make my duty perfect home. Ok I stop the analogy with the school.
I would also add that in addition to wanting to know everything, you have to be persistent. I could give you tons of examples of things I thought finishing in 10 minutes and took me two days tounderstand. For nothing in the end, apart from switching to another method that it took me this timethree days. (And I still rage this function ToUnicode which uses the same keyboard buffer for all applications!).
For any programming language begin?
The famous question.
Know that I did not question. Simply because, as I said above, seeking to know everything, I have not always order of preference.
Also note that the first language has little importance, on the contrary if you are lost on this, it may be that you have not defined your learning plan.
I do not find that it is risky to learn several languages at the same time, I find them sufficiently different not to confuse them.
I started with the Visual Basic .NET, the successor to VB6.
It happened by doing so as it alone in wanting to program a calculator, a monitoring software, etc …
It is a language easy to learn, very powerful, according to what one wants to do with. (I see you laugh, you who are anti-Microsoft and / or pro-C bottom).
Disadvantages: Not portable, gives not the cleanest programming habits given the ease of programming and ways to do so in the event programming.
I then continued with the C and C ++.
I also learned C # in parallel with Visual Basic .NET (usually when you know one, you know the other).
I learned SQL and Java in college … well I learned all defects in Java and how it is inefficient (it is not me who invented it is my teacher who said eh;)).
I learned many web languages on the job by doing, including the creation of websites, including this one.
So come to the right answer to this question:
Learn what you want, depending on your GOAL. If you want to program for the system / network start with C. If you wish to schedule
Should I use Linux?
Yes, understanding the functioning of this system is a plus, but you do not have to replace your oldWindows either.
Know that I do not like those who defend Linux for the wrong reason: “Windows sucks”.
I would say the reasons are: The performance (one feels closer to the system and really hands on it) and security (the updates and community contributions are numerous excluding programs Malicious which are in turn less numerous BUT NOT NON-EXISTENT).
PC What do you advise me?
I had two computers in my life that a laptop. The only hardware (hardware) that I made was to change my graphics card. I’m not so oriented hardware, if you ask me questions about it, I can not advise you better than my grandmother.
Or I would use Google, thus actually finding the answer you are looking for and you would have found yourself asking your question to Google.
What websites do you advise me?
Maybe if you ask me this question is that you do not find what you like here. If that’s the case, tell me rather what kinds of articles you would like to read here!
I do not visit specific sites, I have not learned everything on one site and so I have nothing to advise you personally. By cons I can warn you about these little pirated sites that promise mountains and marvels while these are themselves pirates.
Can you hack a Facebook account for me please?(URGENT!!!)
No. See why above.
What is your vision of hacking?
A sense of knowledge that nobody else can do.
A sentiment to flourish in an unknown discipline, taught little and yet so important.
A feeling of being able to do everything with a computer.
A sense of power to help and protect millions of people.
The hacking is just a hack life, it is not limited to computers. This is a reorganization of knowledge, tools and procedures, in order to improve everything we use, mainly for security reasons. The authority therefore has no place and that information wants to be free.
The image of hacking however tarnished by fraudulent use that may result from the reorganization of knowledge.
Where to start in the hacking?
For me it all started with a search like “how to create a virus.” Always curious, I once asked the question, “but who create viruses, how and why? ”
So I did not follow up the learning plan, I learned where my seeking guided me.
So I started by learning what a virus is and how the program, how it is possible to make it undetectable, how we protect, how to send it via a website, how to find a flaw in a site, how secure a site, how to attack a server, how to secure a server etc …
You see that all knowledge are linked from viruses to web vulnerabilities. This is just an example to demonstrate the links between knowledge. And I am confident that the advice in the first questions, you can from any place and you will arrive at one time or another to cover more or less detail.
So now I had to start to learn everything from the beginning, I think I would follow a plan, a method, a training in hacking, which simply saves a lot of time, and remember the beginning when I said that my only problem was the weather.
I want to finish this page thanking you just for visiting. It is you who are great!
You are more likely to visit the site and join the pages on social networks (Twitter, Facebook, GooglePlus).
I’m here for you help in this area. I receive many emails every day and I do my best to answer you, I do not think I’m someone superior, I just love what I do.
If you want to ask me more questions, you are welcome!
To be honest, I was not a fan password managers, especially knowing that if we find the master password, all other passwords are at hand.
But given that about 1 in 2 uses the same password for several different sites, although remember multiple passwords we understand it is not easy for everyone.
We also know that 60% of French people do not change their passwords very rarely, and in a few years, a visitor will on average 200 different online accounts.
The problem is that if a hacker finds a single password, it will potentially have access to dozens of accounts. The fact the testing of stolen credentials on multiple sites to hack the accounts using the same password is also a wholly technique called the Credential stuffing.
To summarize: it is not easy to remember 100 different passwords if in addition they should be changed regularly, but it is not secure to have the same password for multiple sites.
I would add that some sites create passwords automatically, it is inevitably difficult to retain because it is only characters, random letters and symbols.
The solution ? Use a password manager.
What is a password manager?
Have you ever forgotten a password if only once? If so, such a program affects you. But it does much more than remembering passwords.
As its name suggests, this is software that takes care of your passwords automatically. It helps you manage, organize, make them strong and store.
Recent passwords managers are even complete identity management, because they facilitate several tasks. You will not need to type your e-mail address, date of birth, address … etc. Once you enter your information and the program will automatically fill fields on sites every time.
There are two other advantages in the fact of using a password manager:
It typically retains a site and connection data associated with this site. Thus, if an attack by Phishingis initiated, the program will not propose to pre-fill the fields, because the site will be different from the original site.
Protection is also effective against keyloggers: you no longer have to type your password at the keyboard, so you avoid the same time to provide a spy program.
What is the best manager free password?
I will not allow myself to judge since I tested one and I am satisfied. This is Dashlane, a Franco-American company.
I invite you also to test your turn (it’s free) to judge yourself following in this article.
Dashlane is one password managers among the most popular, it allows to:
- Save and manage all passwords in one place
- Login automatically on websites
- Generate and replace passwords in one click
- Auto filling out fields in forms
- Making online shopping easier by backing up data and payment receipts
I will ascend in a moment how to install and use Dashlane, but of course you can use another password manager if the heart tells you. The main competitors are Dashlane KeePass and LastPass, I may occasionally testerais😉
EDIT: Just after the publication of the article, Dashlane happened to version 4 with a simpler usability and new features (while remaining free):
Is a password manager secure?
Excellent question, Dashlane not backup your data remotely if you use synchronization. That is to say that if you do not synchronize your passwords between multiple devices, only one encrypted file will be present on your computer and only your password “master” selected during installation will ensure you get its contents.
In the case where the synchronization is used, the file is still stored on their way servers encryptedagain and again. It would thus not only hack Dashlane servers to find your file, but more successfully decrypt it. And given that AES-256 is highly secure (1.1 x 10 ^ 77 possibilities), it would take millions of years to decrypt a file, so good luck to those who would like to try.
Dashlane does not save either your master password (which is only used locally), but backup your email address.
Download and install Dashlane
I will now guide you step by step to download, install and use Dashlane.
To download Dashlane go here and run the installer. Dashlane exists on Windows and Mac, and is compatible with Google Chrome, Mozilla Firefox and Internet Explorer.
You will have to provide the famous master password during installation. This is a very important password, as I recall, this is the one that will provide access to all others. So it must not already be used elsewhere and be complicated enough not to be guessed. Note, however, that you must hold it well (you worry there will be that one to remember!), Because no one can find it for you.
Dashlane then offer you a mini-tutorial very convenient (I personally like to be guided when installing new software):
Once the extension added to your browser and a created identity, you can automatically log into websites:
Let’s move to the interface of Dashlane program.
In the first tab called “Passwords” you can see all the passwords Dashlane automatically retrieved from the browser (and that you just saved in the following):
In the “Security” tab, Dashlane takes all your passwords and displays a security score for each. It also displays an overall safety score that depends in particular on the complexity of your passwords and the fact that they are not reused for several different sites:
Dashlane also stores various information and payment receipts of the transactions:
You can then define trusted contacts who can access your data and thus help you out in case of problems:
And finally, you can naturally create and manage identities for use on websites. You can include add your names, date of birth, email addresses, phone numbers, addresses … etc.
Notice that you can always switch to premium version. This allows you to synchronize your particular data between devices and save them automatically.
If you want to manage your passwords easily and saves a lot of time online, this software is for you.
While knowing that a program manages our passwords do pretty scared, he also defended well against various popular cyber attacks (phishing, keyloggers).
If you have ever used (and still use) a password manager, feel free to share what you think.
Being anonymous on the Internet has become a luxury, and there are many willing to pay for Internet connection and anonymize their Internet tracks.
Specifically, what do the anonymity?
Being anonymous means remain unknown, unidentifiable. The anonymity guarantees respect for his own privacy. Being anonymous helps to feel safe, to surf without consequence, bypass blockages. Finally, anonymity allows in some cases to bypass censorship and laws.
Why be anonymous on the Internet?
After all, if not illegally downloaded, if one person pirate, there he has a real reason to be anonymous?
The problem with the internet is that various data about us are recovered without anyone noticing.This seems trivial, but the importance of this data can quickly tip the balance.
What data are collected?
Did you know that :
- Facebook robots literally read your private messages in order to better target advertisements?
- Facebook robots still can recognize on photos or you’re back.
- Your IP address, cookies, information about your browser, your surfing habits, your transmitted unencrypted data can be recovered or intercepted easily?
- The SpyWare destroy anything on your system but retrieve all kinds of information on your computer and especially YOU for various purposes (especially marketing)?
- The revelation by a British newspaper called the existence of the surveillance program PRISM conducted by the National Security Agency (NSA) shows that Google, Facebook, Yahoo etc … are associated with the program to monitor the Internet?
- Google knows more about you than your mother. For example, Google knows and retains all the terms you searched for, see here: https://history.google.com/history/ (provided they are connected to an account)
- The data you think you have deleted a website, blog, forum … etc are still online and visible to everyone?
This is only a barely visible part of the iceberg.
How to be completely anonymous on the Internet?
Format your computer, turn it off, unplug it and move.
Well, it works, but we will try to find a way to stay home and keep our data.
3 options are available to surf anonymously, but not worth all.
1st option: Use a proxy
A proxy server is also called a server proxy, it allows to connect to a site for you then transfer your data. The site visited by proxy is not visited by yourself and you do not know.
Proxies often embark numerous options such as disabling cookies, applets, Java … etc.
There is however a problem concerning the data retransmission time. If you connect to a proxy Indonesian, you certainly good wait seconds more than from your own connection to each link clicked.
We also are several types of proxies, proxies so-called “elite” guarantee anonymity optimal while others base proxies still allow to find your IP address, therefore, end up (simply because these proxies in question share your IP address).
To configure a proxy server for Firefox is simple enough, the addons are made to, here FoxyProxy:https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/
With Chrome like, here Proxy Switchy: https://chrome.google.com/webstore/detail/proxy-switchy/caehdcpeofiiigpdhbabniblemipncjj
I pass the technical details for the installation because I believe that the above websites inform you sufficiently. 😉
There are also web proxies, it’s websites to make navigation for you and show you the result without setting directly.
(Caution, many sites like Facebook using Ajax technology do not really work with web proxies)
Proxies does not guarantee 100% anonymity, it is possible from them to find your IP address on demand, for example from the justice and free proxies have a bad reputation because the owners could spy on your activities without discomfort and without you guessed.
2nd option: Use Virtual Private Networks (VPN)
The VPN based on a tunneling protocol. This is a protocol to encapsulate and encrypt data transferred from one machine to another. We are talking of the tunnel because the information can not be read during the transfer.
Specifically, the data is encrypted from the device using the VPN (computer, smartphone, tablet, router … etc) to ISP (who does not know what is in your data). Then the ISP automatically returns data always encrypted to the VPN server over the Internet. The data is then decrypted to reach their destination (the final service). No one can read your data and your anonymity is guaranteed by IP address and location change. We still recommend to use HTTPS and other encryption protocols as soon as possible.
A VPN is also not only browse anonymously, companies often use VPN to place multiple geographical sites on the same network LAN. The censorship, geolocation, blocking access to sites, protection of address IP are other reasons given and make the VPN absolutely necessary.
The VPN service can also be used to encrypt protocols other than HTTP, such as FTP or IMAP.
To talk about the connection speed, you should know that it is best for proxies because the connection is direct between the user and the VPN server.
The problem again is that everything depends on the provider. If there is confidence, anonymity isguaranteed, as is the case for HideMyAss.
HideMyAss was translated into French (except the GUI for the moment), I prepared so you here an article to show you how to install and use.
Already know that:
- You will be completely anonymous on the Internet, the traffic will be encrypted regardless of where you are.
- You’ll get anonymous IP addresses free in over 180 countries.
- Encryption standards are those used by governments.
- All sites will be censored the most for you.
- All applications will be anonymised (for all your connection go through a tunnel).
- You have 30 days to test the service, if you are not satisfied (e) you are refunded (e)
Using a VPN is a very good solution but also a cost.
A cost justified given that a VPN protects you about a public Wi-Fi network, to read your mail, sharing private data, play online … etc.
A VPN is not useful for visiting banned websites or become anonymous, so this is a very good investment.
Option 3: Use the TOR network
TOR (The Onion Router) is a global network of routers. The connection of a user passes throughseveral computers in the world called nodes.
Connections between nodes are encrypted, in fact it is not possible to recover the original user.
The site that the user tries to visit therefore see that the IP address of the last node.
TOR is distributed as free software open source and each user can become a node. However TOR (very) slow since the connection just goes through several nodes.
Although digital is recommended to be anonymous on the Internet, you must know that the cyber police has no other means than the infiltration. Agents therefore also use TOR (or server-node) to see what happens to it and saw the number of arrests we can wonder if digital is still safe for anonymous surfing.
In summary, TOR is not so recommended.
Surf anonymously in an Internet cafe?
We often speak to connect in a cybercafé or a company computer or the school to surf anonymously and prevent anyone from finding us.
It is an affirmation not necessarily just because it would have to assume that no other spy program is placed on the computers in question and that no other method would allow us to follow the trace (whose connection logs). If you do not think a cafe at the base is secure, no need to think that it will make you anonymous. This is not to mention the CCTV cameras and other left fingerprints, although there are moves in extreme cases …
We saw that being anonymous on the Internet is not very obvious, ideally will already start with a VPN, take advantage of immediately reducing HideMyAss here.
That said, we’ll push a little explanation:
The truth about the logs!
Most VPN record the real IP addresses of users (at least those used to visit their site) for some time.This is not to track you but to react to the problem serious and demand from justice (what is called in France a legal requisition).
Because if you are part of an organization of cyber-terrorists to hack into banks or whatever, there is still a chance that the VPN service is required to provide your information if it has and if the authorities come ask.
And not only the VPN service will give this information but Facebook, Google, Microsoft, your boss and others will also do without problems.
Therefore a perspective anonymity on the Internet for 99.99% of the tasks, you are anonymous with a VPN.
If you are an Internet user wishing to simply mask its identity here and there, while enjoying enhanced security, a release of the censored sites and all the benefits of VPN, the NSA will not go pick you … or anyone else.
It is also interesting to read the terms of the contract, since many VPNs (I will not mention) to promise an anonymous surfing at 100%, while in the terms one can read that the connection data are saved for a period not determined and disclosed in the event of concern. HideMyAss deletes logs every 2/3 months, NordVPN not logs (see below).
No effective VPN log
If instead you prefer to use a VPN service said “no logs” which therefore saves any information about you (100% anonymous surfing).
Between HideMyAss or NordVPN, which to choose?
This is a question that asked me recently. In fact, I recommend both and that is why they are both cited.
It is ultimately largely a matter of preference depending on what you want:
Do you prefer a graphical interface filled with lots of features (HideMyAss) or a simple and easy to use interface (NordVPN)?
Do you prefer a high flow rate and a large network (HideMyAss), or rather a strengthened anonymity (NordVPN)?
If you have the means to test both, you’ll make an idea more precise.
Everything about your anonymity
To learn even more and push away all the explanations we have just seen, I invite you to download the guide Secrets on our Anonymity.
I will teach you things as amazing qu’effrayantes, particularly in relation to the fact that data you supposedly deleted are still visible on the Internet, and everyone can find them. That even though you initiated legal proceedings or delete data, especially via the famous form of “suppression” of Google.
We will see how to find the data and how to establish a virtual identity card of a person with just an email address.
If the results you get are consistently below expectations, the cause is more likely to look on the side of your provider.
While you use a dedicated line to connect up to your ISP, it uses bundled lines to connect all Internet subscribers. In most cases, these shared connections display less capacity than the addition of all client connections they serve. And if the airline overbooking example is limited to a few dozen seats per plane, the Internet service providers themselves can easily overbook their internet connectivity ten, twenty or even fifty!
Between your computer and the server that sent this web page, there are probably dozens of routers, communications links and other network components through which this page had to go.
The test results may be affected by any network congestion between you and our servers. If you have downloads in progress, it may also influence the results.