Monday 12 December 2016

HOW YOU CAN GET A JOB AT "GOOGLE" JUST BY ITS SECRET SEARCH
GOOGLE is master of creativity and it shows in its methods of recruitment as well.Google looks out for people whose search habit fits in Google's code book.Once assured of that,the company will ask you to apply for a job at Google.Check it out how this person landed a job at Google just by entering a secret search.
GOOGLE has one of the most rigious and byzatine processes of recruitment.it is not that you dont know of,you might at some point at your life wished or even prapered for a job atGoogle.But,here is something you dont know on Google's door to get a job there.

Google looks out for people whose search habbits fits for google search code book.Once assured of that ,the company's algorithm will ask you to apply for a job at Google.Sounds wildd,right?Nevertheless,There were spectulations that in the near future we would get hired by algorithm,but Google has already started doing that .


Max Rosett,describes his experince in his blog,and how just by entering few programming terms "python lambda function list comprerhsion",he get into recruitment process and ultimately landed  a job at Google.

Max was merely looking for some information for his project in his computer science degree, and as he entered the google secret search of phyton  lambda ,Google'e message popped up, breaking apart the blue linked result page.

The message read : "you are speaking our lenguage.Up for a challange ?"

just like any arcade game Google gave the option of "i want to play" or "no thanks"Maxx clicked for "want to play" option and then started a challanging series of programming questions.
this problem was time based and time based abot logrithm 

detail about   Max rosett 

 

The Man Company Beard Oil - Almond and Thyme Hair Oil

Friday 2 December 2016

Best CMD  or MS-DOS promot command which every hacker should know

if you have been following this page regularly,chances are you are very verstile hackers in your right and dont need to know to these commands.But many of the readers who are beginners and want to know learn hacking always ask us for the post for the top Dos promot (C:/or CMD commands in Windows in 7/8.1) they should know.So go here ;

CMD is a power tool which lets you do almost anything with your PC/laptop.There are commands like CD,and MD etc.which you probably knows so we wont get into that.Here are some really useful things a hackers can do with CMD commands.Network Connection and right click and select PROPERTIES .Then select TCP/IP and click PROPERTIES again.Now click on ADVANCED and WINS tab.select DEFAULT for NEBIOS,Now back to main local area connection window,select file and print sharing for MICROSOFT NETWORKS and hit enter. 
This is just to make sure you have fun with NWTYBIOS on CMD.In case ypu dont know how to get CMD by clicking the Window iconn at the left hand bottom of your screen in all Window version and click to START,then type "cmd" without  quotes.
Now here are some important commands which every wannable hacker ahoul know;
 nslookup
net view
net use
pingto 
tracert 
arp
route
nbststat
netstat
ipconfif
In case you dont know some of them,then just type the command on CMD and hit enter.A little help will show up on screen.Read it out undestand what that perticular command does.
Lets start easy....
1) PING: This comamnd will allow you to know if the host you pinging is alive,which means if it is up up at the time of executing the "ping" command.
ping x.x.x.x.(x is IP adress). You can try pinging 8.8.8.8. which belongs to Google

or

ping www.google.com
(www.google.com is a website you want to ping, but you dont know the IP)


2)NSLOOKUP: This command has many funcyionalities.One is resolving DNS into IP. Lets say for swebstite URL but dont know the website URL but you knows its IP but you want to find it out .
Eg. NSLOOKUP www.google.com is the website for which you want to find ouy the IP)

nslookup(enter)
set type =mx (enter)
yahoo.com


This commands will give you the mail server IP of yahoo.com.You can use whatever server you want and if it is listed in DNS,then you get an IP .
Simple ,isnt it? You can send a spoofed email to your friends using the IP adress od the mail server.You can check this


3)_TRACERT: This comamnd will give you the hops that a packet will travel to resch its final destination.This command is really helpfull iif you know the route  a packet takes before it goes to the target box.

tracert x.x.x.x. (x is the IP)

or tracert www.google.com
(www.google.com is a website you dont know the IP )


4)ARP: This command will show you the arp table.You can find out id anyone has done arp poisoning in your LAN using this command


5)ROUTE: This comamnd will show you the routing table ,geteway,interference and metric.


6) IPCONFIG: This comamnd will shows you a lot of usefull things like IP :Gateway,DNS is use  etc..This command will give all that into but for all network you might have it

code:
ipconfig
or 
code:
Ipconfig/all


Also, in case you have a dynammic IP and want to  change it,then type...
Code:
ipconfig/release (this will release  your IP)

ipconfig/renew (this will renew your IP)


7)NETSTAT: This command will show you coonection stats


Code:
netstat

or

Code;
netsat -a (this will show you all the listening ports and connections with IP address)
netstat-n (this will shows you all with an open all the open connection with IP address)

Saturday 26 November 2016

HACKERS made Bank ATM to SPIL Cash

How hackers hacked Bank ATm and made them spit out million in cash



The FBI warns of potential attacks in U.S. after similar crimes in TAIWAN and THAILAND

Earlier this year ,the cyber crimes in Taiwan and Thailand programmed bank ATM by making it gang member stand in front of machine at the appointment hour in order to collect millons of dollars . Apparently ,the cybercriminals are now trending the bansk own computers,with oftendramatic result


Earlier this month ,U.S. banks were warned by Fedral Bureau of Investigation(FBI) off the possiblity of similar attacks .in bulletin ,the FBI said that it is"monitring emerging reports indicates that well resoursed and organized mailcious actors have intentention to target the U.S. financial sectors"
Buhtrap ,a Russian gang was mentioned by the FBI bulletin using the software .Buhtrap and other gang enhanced their techinique on Russian banks ,and then expanded to other countries ,say computer -security specialist .While there are times ,the hackers break into the system that process transaction onn banking payment networks,other times they have hit ATm network directly.


received  a reeport of currency lying on first commercail banks ATM in the city's Da'an Precint.Soon ,eeport of loose cash at other Atm's started trickling in.

a few days later. in a writtenn statement ,police said that ATM were "abnormally spltting out bills"

by june 11,the criminals without using ATM cards had collected more than 83 million new Taiwan dollars .Twenty two people ,mostly from Eastern Europe ,waited at the ATms to remove the money .Later ,three suspects were arrested and over NT$77 millon recovered .


<a href="http://6c7e0jtjfhwbz3w6enpgu3855j.hop.clickbank.net/" target="_top">Click Here!</a>

Monday 5 September 2016

Facebook Messenger Chat box can leak your private information
Facebook's attempt to bring chat box to its FB Messenger were appreciated by tech pundits as well as users,while businesses are making new attempts to woo customers with better experience, Facebook Messenger chatbots go a long way in making FB  users life more comfortable. But this comes at the risk of your privacy according to a new research.
According to tech website Venture Beat,business which are switching to Facebook Messenger fir all services interaction will soon regret their decision because of possible customer information leaks,if people want too get tracking information of their orders online, chatbots are a perfect solution for a successful communication, but the story is not same when it comes to senstive data like bank account information or insurance company detail,
Conversation wit these business can be complex, emotionally driven and often required senstive and personal information too pass between any two parties .customer of these organization need frequent and ongoing interaction the report notes .
Venture Beat says the privacy and security needs fir such senstive communication and transactions are very high Ann's thrusting Facebook chatbots will be a big challenge for customers ,as it is Facebook user don't trust the networking giant with their data

Sunday 28 August 2016

Here are some of the best Android smartphone hacking Apps Android is undoubtedly the world’s most popular mobile operating system. With over 1.5+ billion plus users, Android is way ahead of iOS. Similarly, in Apps space, Android hacking apps are also increasing. Many of these hacking Apps are meant for pros but some can become useful to you also. With such hacking Apps, you can remove unnecessary bloatware utilizing most of the internal storage memory. While other times, such hacking App may help you remove irritating ads or allow you to access blocked system Apps. We bring you such hacking Apps which let you get the best out of your Android smartphone. Remember most of these Apps require a rooted smartphone to try them out. INCREASE RAM Root your phone. Download ROEHSOFT RAM EXPANDER from Google Play Store. Convert desired amount of SD card space into system swap RAM. This will make apps perform better when you have lot of storage area in your SD card. ram Wi-Fi WPS/WPA TESTER Download WIFI PS/WPA Tester App from Google Play Store. It let’s you analyze your WiFi security and others in the vicinity and attempts to hack their password It only hacks WPS enabled WiFi networks.wps REMOVE UNWANTED SYSTEM APPS OR BLOATWARE Root your android phone and Download sSystem app remover (ROOT) from Google Play Store. Remove many unwanted inbuilt Apps which you don’t think are necessary from internal storage of your Android phone.\ system app HACKING HUB Download the app Linux Deploy from Google Play Store. This installs Linux Operating system on your Android phone. Then use use Aircrack and other hacking Apps on your phone to hack WiFi and website passwords. linux FREE STUFF Root your phone Download and install BusyBox App from Google Play Store. Install modded Play Store from Lucky Patcher. With Lucky Patcher App you hack in-App purchases and get free stuff or game coinsbusy ACCESS BLOCKED CONTENT Download CyberGhost App from Google Play Store. Use it to connect to a VPN of a country of your choice. Now you can download apps from Google Play Store which are blocked in your country and also use websites like torrent websites blocked in your country. busy BATTERY LIFE Root your phone Download Greenify App from Google Play Store Hibernate many user and system apps. Greenify allows you to hibernate apps that won’t use battery and memory in background. So, you can save battery life and RAM.gree BUILD PROP EDITING Most of the Android smartphones out promise you 8MP images but in fact deliver only 6MP picture quality on 8MP camera. If you are facing a similar issue, you can solve it using this hack. This also requires a rooted smartphone. Download BuildProp Editor App from Google Play Store. Goto –>add entry Ro.ril.max.jpeg.quality. And set it’s value to 100 so it looks like Ro.ril.max.jpeg.quality = 100 Once done, your 8MP smartphone camera will deliver you 8MP images build TUBEMOTE Download Tubemote from Google Play Store. Now you can download any and all online videos, not just from YouTube but any website in your desired resolution and quality at high speeds. You can also download just mp3 or m4a sound files from videos. tube ANDROID ID CHANGER Root your phone. Download Android Device ID Changer App from Google Play Store. Change your Android ID, which apps use to identify you and restart the phone. Your Android smartphone has a new Android ID. id DRIVEDROID Download Drivedroid App from Google Play Store. Once installed, open the App and download LINUX.iso file from the dropdown menu. Burn this image on your phone and use it as CD or USB drive to boot your PC. dri KABOOM THE SELF DESTRUCTING APP Download and install Kaboom App from Google Playstore This App lets you control the photos and messages you post online. You can use this App to make the images and posts disappear at a set time. KABOOM FAKE LOCATION Download Fake Location GPS App from Google Play Store Go to —> Settings Tap on Build Number 7 times to unlock Developer Options. Enable Mock Locations. Open Fake Location GPS app and set your location to any place in the world you wish.fake gps

Thursday 25 August 2016

Android noughat 7.0 has arrived and rolling out I nexus devices, the day has arrived for Android users to say hello to Nougat. Google has just announced that Android 7.0 Nougat factory images and OTAs have started rolling out for current Nexus devices, the Pixel C and the General Mobile 4G. Android 7.0 is an important upgrade to Google’s mobile OS with multi-window support mode for most apps, redesigned notifications, and many essential performance optimizations. While the final build is almost identical to the last developer preview, it should be more stable and on your smartphone. Multi-window multitasking allows you to run two apps simultaneously, similar to the iPad when running iOS 9. This multitasking mode will probably be most useful on tablets like the Pixel C, but it works on smartphones as well and the experience is a lot better than we originally expected. Notifications are now grouped by app in the notification shade; pulling down of any app’s alerts will give you the complete list. You can also reply directly from notifications, something that iOS has actually had for longer than Android. Speaking about the rollout, the official Android blog says: “Today, and over the next several weeks, the Nexus 6, Nexus 5X, Nexus 6P, Nexus 9, Nexus Player, Pixel C and General Mobile 4G (Android One) will get an over the air software update to Android 7.0 Nougat. Any devices enrolled in the Android Beta Program will also receive this final version.” It also says that the LG V20 will be the first Android smartphone to ship with Android 7.0 out of the box. Other flagship Android devices will get the upgrade towards the end of the year or early 2017. Also, the official OTA is not available on older Nexus devices. All other smartphones and tablets will have to wait for OEMs and carriers to roll out updates. If you’ve been using the official Android 7.0 Beta program, you won’t notice a significant change, but you will still receive an update to the latest version. The Nougat OTA will likely be rolling out slowly over the course of few days or maybe few weeks. All supported devices on stock Marshmallow software will get the OTA notification, as will devices on the N preview enrolled in the beta. Check out the Android blog for more details on what can you expect from Nougat. Source: Gizmodo

Monday 22 August 2016

Shocking censorship in India, visiting torrent sites in India could land you in jail for three years as well as a fine of $4,500 The last couple of months have been really tough on torrent users. First, Kickass Torrent was taken down after its founder was arrested, then Torrentz was shut down casting a doom on the torrent users. And the drama continues. According to a report by India Today, you can now get three-year jail sentence as well as a fine of Rs. 3 lakh for trying to visit URLs that are banned by the Indian government. Over the past few years, the Indian government with the support Internet Service Providers (ISPs) or under the directive of the courts have blocked thousands of websites and URLs. In August 2015, the government banned at least 857 sites for their pornographic contents. Additionally, the government also banned about 170 objectionable sites. However, in spite of blocking numerous websites and URLs, people still do visit these websites, using different techniques. Hence, the new rule implies that users who are found visiting torrent sites blocked in India or downloading a file, or viewing an image will land you in jail along with a heavy fine of Rs. 3 lakh. According to the report, you will be shown the following warning, if you visit a blocked torrent site or URLs: “This URL has been blocked under the instructions of the Competent Government Authority or in compliance with the orders of a Court of competent jurisdiction. Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of upto Rs. 3,00,000/-. Any person aggrieved by any such blocking of this URL may contact at urlblock@tatacommunications.com who will, within 48 hours, provide you the details of relevant proceedings under which you can approach the relevant High Court or Authority for redressal of your grievance.” Earlier, if you would visit a banned site, the message would should that the URL has been blocked at the direction of Department of Telecom (DoT) or the court. However, it appears that now new warnings are fast replacing the older message. The warning has started rolling out on MTNL connections in addition to Airtel and Tata. Lately, however, the government bodies were not only experimenting in how to implement the blocks but were also trying to figure what message to show to users. Recently, the blocked URLs also gave out not reachable error without specifying any message. Most websites in India were earlier blocked using (Domain Name System) DNS-filtering, which was very easy to bypass these blocks and access the actual website using third-party DNS services (for example, the ones maintained by Google). However, DNS filtering does not serve the intended purpose when a site uses HTTPs or is secured with encryption. As a result, at the request of government bodies, ISPs have continued to invest more in improving the blocking mechanism. The government has also taken the help of big companies such as Tata Communications and Airtel to help them reach their ‘blocking’ goals. As pointed out by the report, the message clearly states that the Indian government is taking strict steps to ensure blockage of all URLs via Internet gateways. Currently, Tata Communications seems to be the one of the bigwigs managing the gateways. While the step to block illegal websites is a good one, the message in itself is ominous and surely must have been vetted by a government body. However, there is no clarity as to how it will be enforced. It doesn’t look possible that the government will be keeping a watch on the whole World Wide Web, and looking for people may access or try to access a blocked URL. Further, it is also not clear how someone would be prosecuted and what process will be followed, if they are found acce

Saturday 20 August 2016

Important Programming languages for Hackers Many of our readers often send us queries about which programming language they should learn. Some want to know quick fix hacking solutions. Almost all tech gadgets are built with coding. Every App, game or site that you use is programmed in a particular computer language. You need to know that hacking is not a click-of-a-button job but a serialized and compartmentalized vocation which uses different programming languages for different uses. Most of the websites out there will give you list of most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers. Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language 1. Web Hacking Since most of the tech is build around world wide web, it is important to learn web hacking to be a good hacker. Let’s say you are interested in hacking web apps and/or websites then you will need to learn web coding. Websites use mostly HTML, PHP and JavaScript so it is important to learn these three. HTML: One of the easiest and widely used static markup web language present in each and every website you see in your browser. It’s recommended to learn HTML because it helps understanding web actions, response, and logic. JavaScript: JS is a client-side web programming mostly used in web sites for better user interface and quick response. If you are interested in a hacking career you need to learn JavaScript because it helps to understand client-side mechanism which is essential for finding client-side flaws. PHP: A dynamic server-side language which is responsible for managing web-apps and database. PHP is considered one of the most essential language because it controls everything on site and server, like a captain of a ship. It is advised to learn PHP nicely. SQL: SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors. Black hat hackers mostly target SQL database and steal information which is later sold on underground dark web forum. If you want to be good security researcher, you should learn SQL so that you can find flaws in a website and report them. 2. Exploit Writing After web hacking, another most important feature of hacking is exploits. You can crack a particular software by writing a exploit. But to write a exploit you need to learn either Python or Ruby. Python: It is said that a security researcher or hacker should know Python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master Python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in Python. Ruby: Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing. It is used for meterpreter scripting by hackers. The most famous hacker tool, Metasploit framework is programmed in Ruby. Though Ruby may not be as versatile as Python, knowledge of Ruby is must in understanding exploits. 3. Reverse Engineering Reverse engineering, the process of taking a software program’s binary code and recreating it so as to trace it back to the original source code. If you know reverse engineering you can find flaws and bugs easily. If you want to learn reverse engineering you need to know C, C++ and Java. The process of converting the code written in high level language into a low level language without changing the original program is known as reverse engineering. Do you think any other programming language is essential for wannabe hackers and security researchers? if yes then please comment below.>

Monday 15 August 2016


Why it is better to reset your Wi-Fi router than restart it in case your Internet speed suddenly slow down You are surfing the Internet at a swell speed of 50 Mbps and suddenly there is a drop to a mere 3-4 Mbps. Your first reaction is to go to your Wi-Fi router and switch it off, wait for 30 seconds and switch it on again. While this method may work if the drop is a single instance but if your Internet speed has been continuously slowing down, it’s way better to reset your Wi-Fi router. Why? We will try to explain you in the article why resetting Wi-Fi router is better than restarting your router. First things first! Resetting your router is quite different from restarting your router. While restarting your router doesnt change any settings and merely reconnects with your ISP using your current configuration, a router reset will allow you to set it from scratch where it will work at optimal levels. The main reason for persistent slowing down your Wi-Fi speed has more to do with your ISP than your router. Resetting your router will take your settings back to the optimum level. Do this when you feel you’re having issues with your network or after you’ve upgraded your internet speed and don’t seem to get the speed that you’re supposed to get. It’s also the only way you can re-gain access to a router’s web interface once you’ve forgotten the password (the password will then be restored to the default password.) While resetting the router may be a great way to get back to square one, do remember, when you reset your Wi-Fi router, you will lose all the special commands and setting that you have made. There is a way out for that as well. If you want to retain the current network settings, you should first log into the router’s web interface and save the current settings to a file (most routers will have this setting in the web interface). While in the interface, you can choose to reset the router via its web interface using a function called Reset or Restore, which restores the router to its factory default condition. Most Wi-Fi routers have the reset button on their rear panel while some may have it on the underside. The reset button is almost always recessed but you should be able to access it with a straightened-out paper clip. To reset, make sure the router is turned on, press and hold the reset button for 10 seconds, then release it. The router will then restart in the factory default setting. Now you can proceed with setting it up like you did when you first got it or, if you saved the settings, restore them from a file. Do it once in a while and you will find that your network speed has increased considerably.

Friday 5 August 2016

Top 8 websites to learn online ethical hacking

Here are the top 8 websites to learn ethical hacking Everybody wants to learn hacking in today’s age. However, this is not an easy task until you have basic knowledge about computers and network security. For beginners to know, there are two types of Hacking Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal. We provide you with a list of websites that offers you white hat content. However, it is important to note that as a beginner to not perform any hacking & cracking tactics that breach any cyber law. Hackaday Hackaday is one of the top ranked sites that provide hacking news and all kinds of tutorials for hacking and networks. It also publishes several latest articles each day with detailed description about hardware and software hacks so that beginners and hackers are aware about it. Hackaday also has a YouTube channel where it posts projects and how-to videos. It provides users mixed content like hardware hacking, signals, computer networks and etc. This site is helpful not only for hackers but also for people who are in the field of Digital Forensics and Security Research. Evilzone Forum This hacking forum allows you see the discussion on hacking and cracking. However, you need to be a member on this site to check out queries and answers regarding ethical hacking. All you need to do is register to get your ID to get an answer for your queries there. The solution to your queries will be answered by professional hackers. The Remember not to ask simple hacking tricks, the community people here are very serious. HackThisSite HackThisSite.org, commonly referred to as HTS, is an online hacking and security website that gives you hacking news as well as hacking tutorials. It aims to provide users with a way to learn and practice basic and advanced “hacking” skills through a series of challenges, in a safe and legal environment. Break The Security The motive of the site is explained in its name. Break The Security provides all kind of hacking stuff such as hacking news, hacking attacks and hacking tutorials. It also has different kind of useful courses that can make you a certified hacker. This site is very helpful if you are looking to choose the security and field of hacking and cracking. EC-Council – CEH Ethical Hacking Course The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. CEH, which stands for Comprehensive Ethical Hacker provides complete ethical hacking and network security training courses to learn white hat hacking. You just have to select the hacking course package and join to get trained to become a professional ethical hacker. This site helps you to get all kinds of courses that make you a certified ethical hacker. Hack In The Box This is a popular website that provides security news and activities from the hacker underground. You can get huge hacking articles about Microsoft, Apple, Linux, Programming and much more. This site also has a forum community that allows users to discuss hacking tips. SecTools As the name suggests, SecTools means security tools. This site is devoted to provide significant tricks regarding network security that you could learn to fight against the network security threats. It also offers security tools with detailed description about it.
Electronics