Thursday, February 27, 2014

How to Unblock Hack bypass Websense to Access Sites

1. Cached Copy Hack
Note: This hack doesn't work on Websites blocked by second Websense Technology. But all the websites blocked by first category can be easily accessed.
When you search anything using google In the each search result there are two things in blue color prior to URL i.e Cached and Similar. To view that blocked Website You have to click on Cached as Shown on the snapshot..
How to Unblock Hack bypass Websense to Access Sites
Most Websites can be opened using this Technique but some websites require some more efforts. You have to do some more ting like you have to remove certain codes from the Cached URL as shown below...
How to Unblock Hack bypass Websense to Access Sites
Hope this will help you to access almost all blocked websites except social networking one's.


2. Finding a Good Proxy
You can also bypass Websense using several proxy sites. Note: Most of the proxy sites will be blocked after one or two days. So you have to search for proxies regularly. But  I have an easy method to find proxies..
you have to use the cached copy hack to find the daily proxy websites...
Method to Find Proxy:
Open the Google and In search Query column type "tech-faq Proxy" without quotes. Now open the Cached copy of the website. Here you will find daily new proxy list now you have to copy the proxy URL's and check for working Proxies.
Now using proxy you can unblock any Website but I will advice don't open Social Networking sites and Emails using these.

3. Using Cloud Computing (Virtual Operating System)
For Opening Gmail ,gtalk,Yahoo,hotmail means all email clients you can use virtual operating system. For this you have to register on cloud computing website. After that you will get Virtual computer online which you can use anywhere in the world just you need a internet connection.
Some Virtual Operating Websites are:
1. www.icloud.com
2. www.startforce.com/os/

4. Bypass or Unblock Downloading RESTRICTION
In most corporate offices you have download restrictions. I will tell you the basic simple method to bypass all downloading restrictions. Just follow the following instructions.
Open the Internet Explorer then go to Tools then to Internet Options and Then Click on Security Tab. Now Click on internet Icon and then on default level and then click on Local Internet and then again on default level and then on Trusted Sites and Again on default level then click On apply.

Now you will be able to download anything without any restriction. Enjoy happy downloading...

Top 7 Android Security Apps Ever by Hackingloops

Hacking App

1. Lookout Security & Anti-Virus
Lookout Security & Anti-virus app for Android is an application that secures Android users from threats such as bugs, Trojans and viruses that may enter the device through local networks or online. Lookout Security & Anti-virus allows users to protect their vital data and find their phone if they misplace it, and backup their important files and documents in a safer place.

Use the Lookout Security & Anti-virus app to scan every individual app you download to make sure the apps are safe from malware, spyware and Trojans. A great feature found in the application is the “Routine Check” feature that allows users to schedule daily or weekly scans of the apps you download. You can also get automatic, over-the-air protection against the latest threats.

2. AVG Antivirus
AVG Antivirus is the Android based application of the much renowned antivirus software for personal computers with the same name. AVG Antivirus app allow users to scan apps, setting files and media card in real-time allowing you to find any threats such as malware, Trojans and spyware in any of them that may put your privacy and vital information at risk of being exposed. Not only applications, but also the AVG Antivirus application for Android allows users to screen incoming SMS to detect any harmful threats.

The AVG Antivirus also ensures maximum speed of your phone by giving users a task manager to kill off any apps and tasks that slow the device down.
 
3. McAfee WaveSecure
McAfee WaveSecure is an award winning mobile protection app for your Android devices and systems. McAfee WaveSecure gives users the option to secure their personal data on mobile device, in the event that the mobile may be lost or stolen. In such a case, McAfee WaveSecure can be used to track your device and even wipe all data on the Android device saving it from any prying eyes. An easy to use web portal allows users to backup and restore their personal data.
  
4. Norton Antivirus & Security
Norton Antivirus & Security is a security application for Android devices with iOS 2.1 and up. The Norton Antivirus & Security allows users to protect their devices from loss of data, in case of theft and malware attacks. One of the best antivirus companies in the world, Norton Antivirus, backs Norton Antivirus & Security. Norton Antivirus & Security provides all the features that will be required by an Android user to keep themselves save and secure from malware, Trojans, spyware and other incidents such as theft. The antivirus protection automatically scans the downloaded apps and app updates against any potential harmful threats. It also searches for and removes mobile security threats that may tamper with your phone in order to achieve your personal information. Norton Antivirus & Security allows users to scan the SD card for any harmful threats if any. Norton Antivirus & Security also allows users to lock their devices and remote wipe any confidential data found on the device if their devices are misplaced or stolen.
  
5. Mobile Security & Antivirus
The Mobile Security & Antivirus provides the users with two basic functions that keep vital information safe and secure from all kinds of threats. These two functions are that of – Antivirus protection and security. The Mobile Security & Antivirus protects your Android device free from viruses and saves your battery life, an essentially helpful feature where you require battery life and have only a little left. Use the Mobile Security & Antivirus’s malware scanner feature to scan apps as you download them to scan for any harmful threats that may put your privacy at risk, including your confidential data such as passwords, e-mails, etc.

One of the best features present in Mobile Security & Antivirus is the “Application Audit” feature that can be used to ensure that apps do not take more permission then they should and thus allow you to safeguard your private data, and even access to unwanted Internet updates or so.
 
6. Avast! Mobile Security
Avast! Mobile Security provides Android users with OS 2.1 and up with protection from viruses and theft security issues. Use the Avast! Mobile Security to protect private data with automatic virus scans and find infected URLs before they infect your mobile with malware and spyware. Use the SMS commands to wipe, lock and GPS track your Android device in case if it is stolen or misplaced somewhere outside home. You can also use the “Activate Siren” feature to turn on a loud siren allowing you to locate your mobile phone – a helpful feature if phone is misplaced somewhere inside home.

Avast! Mobile Security application also allows users to screen incoming SMS and phone calls. Use parameters to direct specific unwanted calls to voice mail.
 
7. NQ Mobile Security & Antivirus
The NQ Mobile Security & Antivirus is a total mobile security solution for Android devices, protecting them from harmful threats such as malware, spyware and Trojans while also allowing users to monitor their devices to ensure maximum speeds. Use the NQ Mobile Security & Antivirus app to browse the Internet safely without having to worry about phishing, fraud sites and malware that lurks the Internet. The app is updated regularly keeping in track with all the latest viruses and threats discovered.

Use the Network Manager to track your traffic consumption over a period of 30 days and keep a track on the trend and statistics as well. Use the Backup & Restore feature present in the NQ Mobile Security & Antivirus app to backup and retrieve contacts and messages found on any of your mobile device – iOS, Android, Blackberry or Nokia.

Secret Hack Codes for iPhone 4 or 4S



Hello friends, today i am going to share all the available secret hack codes for iPhone 4 or iPhone 4S. These secret hack codes will help you to hack the iPhone and helps you to explore the internal settings of your iPhone.

Secret codes are actually those codes which are not known(hidden) to general users, usually Geeks use these codes as their shortcuts to browse the internal settings and perform their exploits. As we all know iPhone is quite secured and there are very less hack codes available for the same but don't worry Guys i come up with all the available hacking codes that works on iPhone 4 or 4S.  You can also try these hack codes on previous models as i have tested them only of iPhone 4 and iPhone 4S. Some of them works on iPhone 4 and some on iPhone 4S and some are specific to operator. So please don't complain if any of them didn't work for you.. All codes are tested personally and are 100% working..

hack codes for iPhone 4, iPhone hacking codes
Hack Code for iPhone 4 or iPhone 4S
Note: Some of codes will require tapping of call key on your iPhone, actually most of them require call button + tap(means slide it). So if any code doesn't work just by dialing, you just need to tap the call key and it will work. Infact except the IMEI number one hack code all require call + tap.

Secret Hack Codes for iPhone 4 or iPhone 4S

*#43#  
Use to verify if call waiting is enabled

*#61# 
Verify the number for unanswered calls

*#62#  
Verify the number for call forwarding if no service is available.

*#67#  
Verify the number for call forwarding if phone is busy

*#33# 
To verify whether barring is enabled or disabled for outgoing

*#21#  
To display the settings for your call forwarding

*3001#12345#*
Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone.

*#06#    
Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#   
Displays the account balance for postpaid contracts.

*777#    
Displays the account balance for prepaid accounts.

*646#    
Displays the remaining minutes available.

*3282#    
Get your data usage information.

*729    
Options to make payments. Its operator specific.

611    
Dials customer service, (114 in RSA for Vodacom). Its operator specific.

*#30#   
This shows whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76#   
State whether the connected line presentation is enabled or disabled. Similar to the calling line presentation.

Note: This is the list of all iPhone codes available till now in market. If hope i haven't even missed the one. If still you are able to find any extra hack code for iPhone 4 or iPhone 4S then don't hesitate in sharing, as Sharing is Caring.

So friends, that's all for today, I hope you all have like it.
If you have any issues or concerns please share it in form of comments below. If you like our articles so don't forget to subscribe our articles, its just for you only so that you will not miss any of our articles...
Thanks for reading...:)

Tuesday, February 11, 2014

5 Steps Wifi Hacking – Cracking WPA2 Password

                                                                Wifi Hacking Tools


1. Open our terminal (CTRL+ALT+T) and type airmon-ng

this command will lists our wireless card that attached with our system.

2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0

3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.

From the picture above, we can see many available access point with all the information. In the green box is our victim access point which is my own access point :-)

Information:

BSSID (Basic Service Set Identification): the MAC address of access point

PWR: Signal level reported by the card.

Beacons: Number of announcements packets sent by the AP

#Data: Number of captured data packets (if WEP, unique IV count), including data broadcast packets.

#/s: Number of data packets per second measure over the last 10 seconds.

CH: Channel number (taken from beacon packets).

MB: Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g.

ENC: Encryption algorithm in use.

CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2.

AUTH: The authentication protocol used.

ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID hiding is activated.

4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now we will find out whether target AP has WPS enabled or not.

wash -i wlan0 -c 8 -C -s

If the WPS Locked status is No, then we ready to crack and move to step 5.

5. The last step is cracking the WPA2 password using reaver.

reaver -i <your_interface> -b <wi-fi victim MAC address> –fail-wait=360

Because we already get the information from step 3 above, so my command look like this:

reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360

it took about 5 hours to crack 19 characters WPA2 password  from my Kali virtual Box, but it depend with our hardware and wireless card.

Hacking Tutorials Log in Windows Without Password with Kon Boot


                                                             Kon boot

1. First, we will make the bootable Kon Boot by using the default kon-boot installer that already provided when we buy this program, but if we use the free version, we can create the image by following the tutorial how to create bootable usb.

Choose the USB we want to use to install kon-boot from the "available USB drives" drop down list and click "Install to USB stick" when finished.

The installation process will take approximately 1 minute.

note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.

2. The Kon-boot USB now ready, we need to configure the BIOS settings to change the boot order to boot from USB. You can view our previous tutorial about changing BIOS boot order.

3. This is the preview when we successfully boot from Kon-boot USB.

4. After the Kon-boot initialization screen, it will normally boot the Windows. When we press the SHIFT key 5 times (sticky keys), we can see the command prompt pooped out with system role.

5. We can enter Windows without a password, just click the arrow and we already inside the system.


Tuesday, January 21, 2014

Top 10 Proxy WebSites To Unblock Any Site


If you do not want to go through installation of Proxy softwares then anonymous browsing with proxy websites is the best option for you.
best free Proxy websites of 2014 that will let you surf internet anonymously and securely.


1. 000FreeProxy => 000freeproxy

2. kkProxy => kkproxy

3. MyAddr => myaddr

4. RX Proxy => RX Proxy

5. AnonyMouse =>anonymouse

6. Zend2 => zend2

7. NewIPNow =>newipnow

8. KProxy => kproxy

9. Mega Proxy => megaproxy

10. AD Free Proxy => adfreeproxy

Protect Your Computer,Laptop,Mobile Phones From Hacker viruses and Trojans


1) Windows Updates: Even the best offerings from computer giants have not been able to completely fight off the attempts of rouge developers to break in. In this situation, it has become almost a necessity for users to update their Windows-based system, on a regular basis. An update daily, weekly or even monthly is going to speed up the system and help it counter attacks on its security thereby decreasing the probability of  it, being infected by worms and viruses. Desktop monitoring by hackers is indeed a grand problem.

2) Software updates: Like the Windows, applications also have to be updated with the latest version. You need to check regularly for wear and tear in the software that your system runs. Web browsers and web-based programs have to be upgraded constantly so hackers do not get their hands on the private and confidential data, stored in your system.

3) Antivirus Software: If your system is being connected to the internet regularly and you run without antivirus software on it, it is almost impossible for hackers not to get attracted to it. In case you do not have antivirus software, get your hands on one as soon as possible. If you already have one, upgrade it to its latest version and check if the settings are properly defined.

4) Anti-spyware Software: Even though the digital situation looks pretty grim, it still isn’t as bad as the days when Bonzi Buddy and Cool Websearch made PC users have nightmares. This is because of anti-spyware software that have shielded the tech world from malicious attacks on the security.

5) Swap your Windows-based system for a Macintosh: The whole tech world knows that Mac’s OS X has the largest number of limitations as compared to other computer operating systems. The truth is that most hackers do not bother breaking into a Mac. This is the reason Mac still makes space for itself in the list of secure computer operating systems, despite its shortcomings.

6) Hacker-Controlled websites: Usually sites that offer free downloads,online games etc. are operated by hackers. It is almost given that you avoid dangerous places especially if you have valuables on your PC. The same goes for the mechanical world. Steer clear of sites that look suspicious or require you to download something which is not needed.

7) Data Backup: Create a backup for all the important data that you have on your system. Apart from hackers and system crashers, other mishaps may spell out death for your hard drives. A tech storm can easily sweep away every bit of data in your system. It’s always better to be safe than sorry.