Monday 12 December 2016

HOW YOU CAN GET A JOB AT "GOOGLE" JUST BY ITS SECRET SEARCH
GOOGLE is master of creativity and it shows in its methods of recruitment as well.Google looks out for people whose search habit fits in Google's code book.Once assured of that,the company will ask you to apply for a job at Google.Check it out how this person landed a job at Google just by entering a secret search.
GOOGLE has one of the most rigious and byzatine processes of recruitment.it is not that you dont know of,you might at some point at your life wished or even prapered for a job atGoogle.But,here is something you dont know on Google's door to get a job there.

Google looks out for people whose search habbits fits for google search code book.Once assured of that ,the company's algorithm will ask you to apply for a job at Google.Sounds wildd,right?Nevertheless,There were spectulations that in the near future we would get hired by algorithm,but Google has already started doing that .


Max Rosett,describes his experince in his blog,and how just by entering few programming terms "python lambda function list comprerhsion",he get into recruitment process and ultimately landed  a job at Google.

Max was merely looking for some information for his project in his computer science degree, and as he entered the google secret search of phyton  lambda ,Google'e message popped up, breaking apart the blue linked result page.

The message read : "you are speaking our lenguage.Up for a challange ?"

just like any arcade game Google gave the option of "i want to play" or "no thanks"Maxx clicked for "want to play" option and then started a challanging series of programming questions.
this problem was time based and time based abot logrithm 

detail about   Max rosett 

 

The Man Company Beard Oil - Almond and Thyme Hair Oil

Friday 2 December 2016

Best CMD  or MS-DOS promot command which every hacker should know

if you have been following this page regularly,chances are you are very verstile hackers in your right and dont need to know to these commands.But many of the readers who are beginners and want to know learn hacking always ask us for the post for the top Dos promot (C:/or CMD commands in Windows in 7/8.1) they should know.So go here ;

CMD is a power tool which lets you do almost anything with your PC/laptop.There are commands like CD,and MD etc.which you probably knows so we wont get into that.Here are some really useful things a hackers can do with CMD commands.Network Connection and right click and select PROPERTIES .Then select TCP/IP and click PROPERTIES again.Now click on ADVANCED and WINS tab.select DEFAULT for NEBIOS,Now back to main local area connection window,select file and print sharing for MICROSOFT NETWORKS and hit enter. 
This is just to make sure you have fun with NWTYBIOS on CMD.In case ypu dont know how to get CMD by clicking the Window iconn at the left hand bottom of your screen in all Window version and click to START,then type "cmd" without  quotes.
Now here are some important commands which every wannable hacker ahoul know;
 nslookup
net view
net use
pingto 
tracert 
arp
route
nbststat
netstat
ipconfif
In case you dont know some of them,then just type the command on CMD and hit enter.A little help will show up on screen.Read it out undestand what that perticular command does.
Lets start easy....
1) PING: This comamnd will allow you to know if the host you pinging is alive,which means if it is up up at the time of executing the "ping" command.
ping x.x.x.x.(x is IP adress). You can try pinging 8.8.8.8. which belongs to Google

or

ping www.google.com
(www.google.com is a website you want to ping, but you dont know the IP)


2)NSLOOKUP: This command has many funcyionalities.One is resolving DNS into IP. Lets say for swebstite URL but dont know the website URL but you knows its IP but you want to find it out .
Eg. NSLOOKUP www.google.com is the website for which you want to find ouy the IP)

nslookup(enter)
set type =mx (enter)
yahoo.com


This commands will give you the mail server IP of yahoo.com.You can use whatever server you want and if it is listed in DNS,then you get an IP .
Simple ,isnt it? You can send a spoofed email to your friends using the IP adress od the mail server.You can check this


3)_TRACERT: This comamnd will give you the hops that a packet will travel to resch its final destination.This command is really helpfull iif you know the route  a packet takes before it goes to the target box.

tracert x.x.x.x. (x is the IP)

or tracert www.google.com
(www.google.com is a website you dont know the IP )


4)ARP: This command will show you the arp table.You can find out id anyone has done arp poisoning in your LAN using this command


5)ROUTE: This comamnd will show you the routing table ,geteway,interference and metric.


6) IPCONFIG: This comamnd will shows you a lot of usefull things like IP :Gateway,DNS is use  etc..This command will give all that into but for all network you might have it

code:
ipconfig
or 
code:
Ipconfig/all


Also, in case you have a dynammic IP and want to  change it,then type...
Code:
ipconfig/release (this will release  your IP)

ipconfig/renew (this will renew your IP)


7)NETSTAT: This command will show you coonection stats


Code:
netstat

or

Code;
netsat -a (this will show you all the listening ports and connections with IP address)
netstat-n (this will shows you all with an open all the open connection with IP address)

Saturday 26 November 2016

HACKERS made Bank ATM to SPIL Cash

How hackers hacked Bank ATm and made them spit out million in cash



The FBI warns of potential attacks in U.S. after similar crimes in TAIWAN and THAILAND

Earlier this year ,the cyber crimes in Taiwan and Thailand programmed bank ATM by making it gang member stand in front of machine at the appointment hour in order to collect millons of dollars . Apparently ,the cybercriminals are now trending the bansk own computers,with oftendramatic result


Earlier this month ,U.S. banks were warned by Fedral Bureau of Investigation(FBI) off the possiblity of similar attacks .in bulletin ,the FBI said that it is"monitring emerging reports indicates that well resoursed and organized mailcious actors have intentention to target the U.S. financial sectors"
Buhtrap ,a Russian gang was mentioned by the FBI bulletin using the software .Buhtrap and other gang enhanced their techinique on Russian banks ,and then expanded to other countries ,say computer -security specialist .While there are times ,the hackers break into the system that process transaction onn banking payment networks,other times they have hit ATm network directly.


received  a reeport of currency lying on first commercail banks ATM in the city's Da'an Precint.Soon ,eeport of loose cash at other Atm's started trickling in.

a few days later. in a writtenn statement ,police said that ATM were "abnormally spltting out bills"

by june 11,the criminals without using ATM cards had collected more than 83 million new Taiwan dollars .Twenty two people ,mostly from Eastern Europe ,waited at the ATms to remove the money .Later ,three suspects were arrested and over NT$77 millon recovered .


<a href="http://6c7e0jtjfhwbz3w6enpgu3855j.hop.clickbank.net/" target="_top">Click Here!</a>

Monday 5 September 2016

Facebook Messenger Chat box can leak your private information
Facebook's attempt to bring chat box to its FB Messenger were appreciated by tech pundits as well as users,while businesses are making new attempts to woo customers with better experience, Facebook Messenger chatbots go a long way in making FB  users life more comfortable. But this comes at the risk of your privacy according to a new research.
According to tech website Venture Beat,business which are switching to Facebook Messenger fir all services interaction will soon regret their decision because of possible customer information leaks,if people want too get tracking information of their orders online, chatbots are a perfect solution for a successful communication, but the story is not same when it comes to senstive data like bank account information or insurance company detail,
Conversation wit these business can be complex, emotionally driven and often required senstive and personal information too pass between any two parties .customer of these organization need frequent and ongoing interaction the report notes .
Venture Beat says the privacy and security needs fir such senstive communication and transactions are very high Ann's thrusting Facebook chatbots will be a big challenge for customers ,as it is Facebook user don't trust the networking giant with their data

Sunday 28 August 2016

Here are some of the best Android smartphone hacking Apps Android is undoubtedly the world’s most popular mobile operating system. With over 1.5+ billion plus users, Android is way ahead of iOS. Similarly, in Apps space, Android hacking apps are also increasing. Many of these hacking Apps are meant for pros but some can become useful to you also. With such hacking Apps, you can remove unnecessary bloatware utilizing most of the internal storage memory. While other times, such hacking App may help you remove irritating ads or allow you to access blocked system Apps. We bring you such hacking Apps which let you get the best out of your Android smartphone. Remember most of these Apps require a rooted smartphone to try them out. INCREASE RAM Root your phone. Download ROEHSOFT RAM EXPANDER from Google Play Store. Convert desired amount of SD card space into system swap RAM. This will make apps perform better when you have lot of storage area in your SD card. ram Wi-Fi WPS/WPA TESTER Download WIFI PS/WPA Tester App from Google Play Store. It let’s you analyze your WiFi security and others in the vicinity and attempts to hack their password It only hacks WPS enabled WiFi networks.wps REMOVE UNWANTED SYSTEM APPS OR BLOATWARE Root your android phone and Download sSystem app remover (ROOT) from Google Play Store. Remove many unwanted inbuilt Apps which you don’t think are necessary from internal storage of your Android phone.\ system app HACKING HUB Download the app Linux Deploy from Google Play Store. This installs Linux Operating system on your Android phone. Then use use Aircrack and other hacking Apps on your phone to hack WiFi and website passwords. linux FREE STUFF Root your phone Download and install BusyBox App from Google Play Store. Install modded Play Store from Lucky Patcher. With Lucky Patcher App you hack in-App purchases and get free stuff or game coinsbusy ACCESS BLOCKED CONTENT Download CyberGhost App from Google Play Store. Use it to connect to a VPN of a country of your choice. Now you can download apps from Google Play Store which are blocked in your country and also use websites like torrent websites blocked in your country. busy BATTERY LIFE Root your phone Download Greenify App from Google Play Store Hibernate many user and system apps. Greenify allows you to hibernate apps that won’t use battery and memory in background. So, you can save battery life and RAM.gree BUILD PROP EDITING Most of the Android smartphones out promise you 8MP images but in fact deliver only 6MP picture quality on 8MP camera. If you are facing a similar issue, you can solve it using this hack. This also requires a rooted smartphone. Download BuildProp Editor App from Google Play Store. Goto –>add entry Ro.ril.max.jpeg.quality. And set it’s value to 100 so it looks like Ro.ril.max.jpeg.quality = 100 Once done, your 8MP smartphone camera will deliver you 8MP images build TUBEMOTE Download Tubemote from Google Play Store. Now you can download any and all online videos, not just from YouTube but any website in your desired resolution and quality at high speeds. You can also download just mp3 or m4a sound files from videos. tube ANDROID ID CHANGER Root your phone. Download Android Device ID Changer App from Google Play Store. Change your Android ID, which apps use to identify you and restart the phone. Your Android smartphone has a new Android ID. id DRIVEDROID Download Drivedroid App from Google Play Store. Once installed, open the App and download LINUX.iso file from the dropdown menu. Burn this image on your phone and use it as CD or USB drive to boot your PC. dri KABOOM THE SELF DESTRUCTING APP Download and install Kaboom App from Google Playstore This App lets you control the photos and messages you post online. You can use this App to make the images and posts disappear at a set time. KABOOM FAKE LOCATION Download Fake Location GPS App from Google Play Store Go to —> Settings Tap on Build Number 7 times to unlock Developer Options. Enable Mock Locations. Open Fake Location GPS app and set your location to any place in the world you wish.fake gps

Thursday 25 August 2016

Android noughat 7.0 has arrived and rolling out I nexus devices, the day has arrived for Android users to say hello to Nougat. Google has just announced that Android 7.0 Nougat factory images and OTAs have started rolling out for current Nexus devices, the Pixel C and the General Mobile 4G. Android 7.0 is an important upgrade to Google’s mobile OS with multi-window support mode for most apps, redesigned notifications, and many essential performance optimizations. While the final build is almost identical to the last developer preview, it should be more stable and on your smartphone. Multi-window multitasking allows you to run two apps simultaneously, similar to the iPad when running iOS 9. This multitasking mode will probably be most useful on tablets like the Pixel C, but it works on smartphones as well and the experience is a lot better than we originally expected. Notifications are now grouped by app in the notification shade; pulling down of any app’s alerts will give you the complete list. You can also reply directly from notifications, something that iOS has actually had for longer than Android. Speaking about the rollout, the official Android blog says: “Today, and over the next several weeks, the Nexus 6, Nexus 5X, Nexus 6P, Nexus 9, Nexus Player, Pixel C and General Mobile 4G (Android One) will get an over the air software update to Android 7.0 Nougat. Any devices enrolled in the Android Beta Program will also receive this final version.” It also says that the LG V20 will be the first Android smartphone to ship with Android 7.0 out of the box. Other flagship Android devices will get the upgrade towards the end of the year or early 2017. Also, the official OTA is not available on older Nexus devices. All other smartphones and tablets will have to wait for OEMs and carriers to roll out updates. If you’ve been using the official Android 7.0 Beta program, you won’t notice a significant change, but you will still receive an update to the latest version. The Nougat OTA will likely be rolling out slowly over the course of few days or maybe few weeks. All supported devices on stock Marshmallow software will get the OTA notification, as will devices on the N preview enrolled in the beta. Check out the Android blog for more details on what can you expect from Nougat. Source: Gizmodo

Monday 22 August 2016

Shocking censorship in India, visiting torrent sites in India could land you in jail for three years as well as a fine of $4,500 The last couple of months have been really tough on torrent users. First, Kickass Torrent was taken down after its founder was arrested, then Torrentz was shut down casting a doom on the torrent users. And the drama continues. According to a report by India Today, you can now get three-year jail sentence as well as a fine of Rs. 3 lakh for trying to visit URLs that are banned by the Indian government. Over the past few years, the Indian government with the support Internet Service Providers (ISPs) or under the directive of the courts have blocked thousands of websites and URLs. In August 2015, the government banned at least 857 sites for their pornographic contents. Additionally, the government also banned about 170 objectionable sites. However, in spite of blocking numerous websites and URLs, people still do visit these websites, using different techniques. Hence, the new rule implies that users who are found visiting torrent sites blocked in India or downloading a file, or viewing an image will land you in jail along with a heavy fine of Rs. 3 lakh. According to the report, you will be shown the following warning, if you visit a blocked torrent site or URLs: “This URL has been blocked under the instructions of the Competent Government Authority or in compliance with the orders of a Court of competent jurisdiction. Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of upto Rs. 3,00,000/-. Any person aggrieved by any such blocking of this URL may contact at urlblock@tatacommunications.com who will, within 48 hours, provide you the details of relevant proceedings under which you can approach the relevant High Court or Authority for redressal of your grievance.” Earlier, if you would visit a banned site, the message would should that the URL has been blocked at the direction of Department of Telecom (DoT) or the court. However, it appears that now new warnings are fast replacing the older message. The warning has started rolling out on MTNL connections in addition to Airtel and Tata. Lately, however, the government bodies were not only experimenting in how to implement the blocks but were also trying to figure what message to show to users. Recently, the blocked URLs also gave out not reachable error without specifying any message. Most websites in India were earlier blocked using (Domain Name System) DNS-filtering, which was very easy to bypass these blocks and access the actual website using third-party DNS services (for example, the ones maintained by Google). However, DNS filtering does not serve the intended purpose when a site uses HTTPs or is secured with encryption. As a result, at the request of government bodies, ISPs have continued to invest more in improving the blocking mechanism. The government has also taken the help of big companies such as Tata Communications and Airtel to help them reach their ‘blocking’ goals. As pointed out by the report, the message clearly states that the Indian government is taking strict steps to ensure blockage of all URLs via Internet gateways. Currently, Tata Communications seems to be the one of the bigwigs managing the gateways. While the step to block illegal websites is a good one, the message in itself is ominous and surely must have been vetted by a government body. However, there is no clarity as to how it will be enforced. It doesn’t look possible that the government will be keeping a watch on the whole World Wide Web, and looking for people may access or try to access a blocked URL. Further, it is also not clear how someone would be prosecuted and what process will be followed, if they are found acce