Posts

Showing posts from 2019

How To Receive All Your Android SMS On PC

Image
​​​​​​🔰How To Receive All Your Android SMS On PC🔰 🔹 Many of you works on your PC for a long  and at that  it looks quite difficult to pickup android and read out every SMS  received on it. 🔹 Mostly when you device is on charging and you working at distance from it  🔹Steps To Get All Your Android SMS On PC:-   1. First of all download and install app Mighty Text in your android device.   2. Now in your Google Chrome browser add the extension Mighty Text.   3. Now open the app you will need an initial pair up with your PC as it will be done over wifi network on which both the devices being connected.   4. Now when you setup is done now you will see your android name on the icon when you click on it.   5. Thats it all done, now when you android receive any SMS it will transfer on your extension of PC and you can read it there.

🔰How to Get Cheaper Steam Games [Working]🔰

Image
🔰How to Get Cheaper Steam Games [Working]🔰 1. Start By Downloading A VPN Service Of Your Choice 2. Connect To Buenos Aires, AR or Connect Anywhere WithinArgentina 3. Now You Want To Go To Your Windows Date & Time Settings And Set Your Date & Time To City Of Buenos Aires. 4. Once Done Open The Steam Application And Click The Arrow Next To Your Profile Name In The Top Right Corner. Then Click On "Account Details". 5. Now You Want To Click The "Update Store Country" Label Within The Account Details Section. 6. You Now Want To Change Your Country Of Residence To Argentina. 7. Now You Want To Fill In The Required Information. You Want To Use An Argentina Address, Simply Use Google To Locate An Address. 8. Now That You Have Done That You May Go Ahead And Purchase Whatever Game You Want For A Very Cheap Price! 📌Nord VPN is Recommended But You Can Choose Tiger VPN Instead

​​🔰How to use SOCKS Proxy on FireFox🔰

Image
1.  To use it on FireFox, just go to Options. 2. Navigate to the Advanced tab. 3.  Then select Network tab and click on the Settings button. A new settings window will appear. From here, you can now input the proxy you got. Just be sure to select the radio selection button for Manual configuration and uncheck the Use this proxy server for all protocols checkbox. 4.  Then proceed on inputting your SOCKS proxy, click on OK when finished #hacks

Top 3 Best VPN For Google Chrome To Access Blocked Sites 2019

Image
🔰 Top 3 Best VPN For Google Chrome To Access Blocked Sites 2019 🔰 ➖➖➖➖➖➖➖➖➖➖➖➖ ✅ Using this VPN extension you can open the sites that are restricted to the wifi or LAN network that your computer is connected. So download and install your favorite extension below. 1🖱️ GOM VPN ⚜ This is one of the best google chrome VPN that will let you open the blocked sites in your google chrome browser. You just have to click on the icon in a browser and start exploring any of your favorite sites in google chrome. 🌀 Features Of GOM VPN: 💠 Super fast 1000mbit unblocking servers and proxies 💠 Zero configuration 💠 One-tap activation 💠 Use on Android, iPhone, Firefox or Chrome on the same account, without extra charges. 2.💻 Hola  vpn ⚜ This is one of the best extension and popular among many users. This extension provides lots of servers to select and you can easily switch to any listed country to access blocked sites. 🌀 Features Of Hola VPN: 💠 FREE and secure VPN...

How to recover deleted image or video from android (internal storage) without root

Image
💠 How to recover deleted image or video from android (internal storage) without root ❔ STEP 1: DOWNLOAD AND INSTALL JIHOSOFT ANDROID PHONE RECOVERY AT YOUR COMPUTER. You could download the Windows version at: Android Recovery , download Mac version at: Android Recovery for Mac . After download, you will be lead to install the app at your computer. STEP 2: SELECT DATA GENRE THAT YOU NEED TO SCAN After installation, run the app at your PC. You will see the interface show you four options: “Mul”, “Database”, “WhatsApp”, “All”. Tap One of it according to your own demand. STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER. First, connect your android device to computer via USB cable. Then, turn on USB debugging at android equipment. If the app failed to identify your equipment, install related USB driver at your computer. STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT After identification, click "Start" for scanning. Please be patient about t...

⌨️HOW TO MAKE SYMBOLS WITH KEYBOARD⌨️

Image
Make symbols with keyboard⌨️ ================= Alt + 0153..... ™... trademark symbol Alt + 0169.... ©.... copyright symbol Alt + 0174..... ®....registeredtrademark symbol Alt + 0176 ...°......degree symbol Alt + 0177 ...±....plus-or-minus sign Alt + 0182 ...¶.....paragraph mark Alt + 0190 ...¾....fraction, three-fourths Alt + 0215 ....×.....multiplication sign Alt + 0162...¢....thecent sign Alt + 0161.....¡......upside down exclamation point Alt + 0191.....¿.....upside down question mark Alt + 1...........smiley face Alt + 2 ......☻.....black smiley face Alt + 15.....☼.....sun Alt + 12......♀.....female sign Alt + 11.....♂......male sign Alt + 6.......♠.....spade Alt + 5.......♣......Club Alt + 3............. Heart Alt + 4.......♦......Diamond Alt + 13......♪.....eighth note Alt + 14......♫......beamed eighth note Alt + 8721.... ∑.... N-ary summation (auto sum) Alt + 251.....√.....square root check mark Alt + 8236.....∞.....infinity Alt + 24.......↑.....u...

📶How to Hack Random Home Routers📶

Image
🔰Hack Random Home Routers🔰 ▪️Steps 1. We should select an IP range. I have selected IP range that includes my public IP address. XXX.XXX.30.0-XXX.XXX.30.255 2. Now let's scan for home routers.When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23).I have found many IP addesses with port 80 is opened.So I stopped my scan. 3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log in page 4. If you see the alert error messages, it says TD-8817. So we can Google for it search "TD-8817 default username and password" 5. Now let's try to access these IP addresses using default logins we just got on step 4. Default username and passwords are not same for every routers. With username : admin and password : admin, we can log in to the router administration page ♨️Attacker can do several harm...

🌀 How to Move Emails from One Gmail Account to Another❓

Image
🌀 How to Move Emails from One Gmail Account to Another❓ ✨ The Method Is Just Simple And Straight And You Will Use Some Of Gmail Account Settings That Will Allow You To Transfer All The Email To Another Account And This Is a Feature Of Gmail That Probably No One Of You Was Knowing Before Reading This Guide. So Follow Up Some Simple Steps Below👇 --> Steps To Enable POP In Old Email Account To Import Mails To New Account :- 1️⃣ First of all login into your Gmail account whose email you want to move to another account. 2️⃣ Now click on settings button there on below of your profile picture of your account.1 3️⃣ Now under settings click on Forwarding and POP/IMAP option and there enable Enable POP for all mail (even mail that’s already been downloaded). 4️⃣ At below select Mark Gmail Copy As Read in the drop down option and then simply click on save changes option. 5️⃣ Now visit your new Gmail account to which you want to get all your mails. 6️⃣ There click on Settin...

Keep track of all your Google notes

Keep track of all your notes, by adding them to your Google Docs. 📄Step 1: Open a document 💡Step 2: Select the Keep icon from the menu on the right side 📔Step 3: Select a note to copy ➕Step 4: Click the top-right menu, select ‘Add to document’ #JustGoogleThings

USEFUL WINDOWS📂 CMD Commands

Image
All CMD Commands are Bellow.. 1. Accessibility Controls ==> uj access.cpl 2. Accessibility Wizard ==> accwiz 3. Add Hardware Wizard ==> hdwwiz.cpl 4. Add/Remove Programs ==> appwiz.cpl 5. Administrative Tools ==> control admintools 6. Automatic Updates ==>  wuaucpl.cpl 7. Bluetooth Transfer Wizard ==> fsquirt 8. Calculator ==>  calc 9. Certificate Manager ==> certmgr.msc 10. Character Map ==> charmap 11. Check Disk Utility ==> chkdsk 12. Clipboard Viewer ==> clipbrd 13. Command Prompt info ==> cmd 14. Component Services ==> dcomcnfg 15. Computer Management ==> compmgmt.msc 16. Control Panel ==> control 17. Date and Time Properties ==> timedate.cpl 18. DDE Shares ==> ddeshare 19. Device Manager ==> devmgmt.msc 20. Direct X Troubleshooter ==> dxdiag 21. Disk Cleanup Utility ==> cleanmgr 22. Disk Defragment ==> dfrg.msc 23. Disk Management ==> diskmgmt.msc 24. D...

Games ‍✖️ PC GAMES - Collection✖️

Image
Games ‍✖️ PC GAMES - Collection [112 GB] ✖️ 80 Days A Boy and His Blob A Fistful of Gun Alien Breed + Alien Breed Tower Assault Another World Armikrog Art Of Fighting 2 Assault Android Cactus Baldur's Gate 1+2 (Enhanced and Original Versions) Baseball Stars 2 Bastion Beneath a Steel Sky Big Pharma Blazing Star Bloodrayne Chroma Squad Consortium Cook Serve Delicious Day of the Tentacle Remastered Democracy 3 Dex Doom 2 + Final Doom Dreamfall Chapters Dungeons & Dragons Dark Sun 1 + 2 Dust An Elysian Tail Elegy for a Dead World Enter the Gungeon Expeditions Conquistador Fatal Fury Special Gabriel Knight 20th Anniversary Galak-Z Garou Mark of the Wolves Gods Will Be Watching Grim Fandango Remastered 👉 https://mega.nz/#F!7ZJyhLga!hmYLN1hhX374bJ-vRXwvvQ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Halcyon 6 Hand of Fate Human Resource Machine Huniepop + HunieCam Studio I Have No Mouth and I Must Scream Indiana Jones and the Fate of Atlantis Ironcla...

Miscellaneous Hackers

Image
🔰Miscellaneous Hackers Apart from few well known class hackers , we have following categories of hackers based on what they hack and how they do it- 🔴RED HAT HACKERS: Red hat hackers  are blend of both black hat and white  hat hackers . They are usually on the level of Hacking government agencies , top secret information hubs and generally anything that falls under the category of sensitive information. 🔵Blue hat hackers: A blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed. Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in Windows. 🔴Elite Hackers: Elite hacker is the name utilized by the community with the aim of identifying those individuals who are deemed to be as experts in their line of work. These people are actually on the “cutting edge” of both the computer and network industry. 🔴Script Kiddi...

Steps To edit Any Game On Android 2019

Steps To edit Any Game On Android 2019 🌀Step 1. First of all after rooting your Android device open the GameCIH App. It will ask you for superuser access, grant it. (This will only come if you have properly rooted your android device. Now on the home screen of this app, you will see Hot-Key option, select any of them which you feel more convenient while using in your android. Step 2. Now open the game that you want to hack in your android device. Now pause the game and access the hotkeys displaying there, select any value that you want to edit in your game. Like any of text value like keys of subway surfer game. Step 3. Enter your desired value in the text field box appeared there and click on done. Now you will see default value will get replaced with your value. Similarly, you can alter any values in any of the game according to your wish. That’s it game hacking is done, Now you can access any resources using this hack. So above is all about Hack Any Game On Android. With...

Important Information & Do’s and Dont’s on Cyber Security

Image
🏦Please notify any unauthorized electronic transaction on  1-800-425-3800  immediately. Longer the time taken to notify, higher would be risk of loss to you. 🔑Never share your Username, Password or OTP with anyone!!!   Do’s on Cyber Security 💻Keep your computer/Mobile free of malware. 🔑Use hard-to-guess passwords or passphrases. A password should be of minimum 10 characters using combination of uppercase letters, lowercase letters, numbers and special characters, to make it easy for you to remember but hard for an attacker to guess. Change your password periodically and avoid using guessable passwords. Use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised. 🌐Ensure that the URL in your browser address bar begins with “https”. 🔐 Ensure that the address bar displays the padlock symbol. 📢 Click the padlock to view and verify the security certificate. 📢🌐 Please see to ...

HOW TO ACTIVATE WINDOWS 10 WITHOUT ANY PROGRAMS

Image
HOW TO ACTIVATE WINDOWS 10 WITHOUT ANY PROGRAMS ! 100% 1 - Select a windows key for which ever version of windows you are running. Home: TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 Home N: 3KHY7-WNT83-DGQKR-F7HPR-844BM Home Single Language: 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH Home Country Specific: PVMJN-6DFY6-9CCP6-7BKTT-D3WVR Professional: W269N-WFGWX-YVC9B-4J6C9-T83GX Professional N: MH37W-N47XK-V7XM9-C7227-GCQG9 Education: NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 Education N: 2WH4N-8QGBV-H22JP-CT43Q-MDWWJ Enterprise: NPPR9-FWDCX-D2C8J-H872K-2YT43 Enterprise N: DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4 2 - Open Command Prompt as Administrator 3 - Run the command “slmgr /ipk YOURKEYHERE” (use the key you selected from above, make sure its is for your correct version of windows). Wait a few seconds and if done correctly you will get a white box that pops up saying "Installed product key (YOURKEY) successfully 4 - Run the command “slmgr /skms kms8.msguides.com” Wait a few seconds and...

How To Find The Serial Key Of Any Software Free

Image
🔸️ How To Find The Serial Key Of Any Software Free 1. First You Have To open Google Homepage or Google Front page. 2. Type there your Software Name and“94FBR“ (For e.g. ” Photoshop 94FBR“) 3. In Google search result you see your product key name or you can open any webpage link. Use any product key and enjoy fully licensed software.

🔰Common Sense Security Strategies in the Digital World🔰

Image
You’ve been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you’re on a vacation and suddenly your credit card is declined or you’re in the airport and your flight is canceled. Maybe you’re traveling through an airport and someone skims your credit card and starts making transactions while you’re in the air. What would you do? How long would it take you to respond? How many times have you received a phone call that says you have to pay some portion of a bitcoin (BTC), or a webcam video of you doing something inappropriate is going to be sent to all your contacts. These are just a few of the scenarios that can and do happen in our increasingly connected world. With the Samsung Pay and Apple Pay, mobile payments that can be performed with your cell phone, Appl...

How to Get Rid of 5 of the Most Dangerous Android Viruses 📱

How to Get Rid of 5 of the Most Dangerous Android Viruses   The virus is such kind of infectious or malware content in the system of any computing device or smart device that can turn out the whole behavior of the system go in the wrong way. This can also harm up to the hardware of the device too but only if the type of virus is extremely dangerous, and this is possible although it happens very rarely. Android is one of the most stable OS which is said to be the safest configuration from the virus attacks and most probably the users of Android does not pay any chance for Antivirus software as they never get any contact with any form of virus related issues. Although rare still there are some very dangerous viruses that can harm up to the Android. 2️⃣ Schedun 💯 A well known android malware that can cause your Android to root itself automatically without the user being known of that and then it makes up the pathway for the live streaming of the Ads all here and there. You ...

🏦Secure Banking Tips🏦💸💳

Image
Cases Tips Banking Security Tips Mobile Security – Do’s and Dont’s Password protect the mobile phone and never give your mobile phone to anyone. Choose a strong password to keep your account and data safe. Change your mobile PIN regularly at least once in every 60 days. Report a lost or stolen phone immediately to the Airtel Payments Bank, mobile service providers (Airtel / Vodafone / Idea/jio etc.) and law enforcement authorities. Use anti-virus, anti-spyware and personal firewalls and keep them updating regularly. Use licensed software. Software purchased from untrustworthy sources could have virus or trojans that could corrupt your files and reveal your confidential data. Don’t store sensitive information such as credit card details, mobile banking password and user ID on your phone Be cautious while accepting offers such as caller tunes or dialer tunes or open/download emails or attachments from known or unknown sources Be cautious while using Bluetooth in public...

How to use Digilocker

Image
                  Digilocker Digital locker is a facility that has been launched under Digital India scheme for  properly  organising & storing the documents of a citizen. It has been introduced by the Government of India to enable to keep essential certificates or documents of an individual for different purpose and for verification  of  sharing of the documents With the government organization or other entities as  & when  required. Every citizen has some or other certificates or license Which are required to be shown for Different purpose at many points of life.Such documents are to be kept very cautiously as they pertain to self-identity of a person. Such documents must be kept safe and have to be carried and produced or shown many a times, To different entities. Under digilocker facility, the copy of such documents can be uploaded and kept in a safe digital box and can be accessed from a...

What should you do with your phone or not?

Image
Important safety information Read all the safety information below before using your device. Using unauthorized cables, power adapters, or batteries can cause fire, explosion, or pose other risks. Use only authorized accessories which are compatible with your device. Use this device within the temperature range of 0°C ~ 40°C, and store this device and its accessories within the temperature range of -20°C ~ 45°C. Using this device in the environments outside of this temperature range may damage the device. If your device is provided with a built-in battery, don’t attempt to replace the battery yourself to avoid damaging the battery or the device. Charge this device only with the included or authorized cable and power adapter. Using other adapters may cause fire, electric shock, and damage the device and the adapter. After charging is complete, disconnect the adapter from both the device and the power outlet. Do not charge the device longer than 12 hours. Do not attempt t...

WHAT IS.....?

🔰 Proxy Trojan 🔰 A proxy Trojan is a virus which hijacks and turns the host computer into a proxy server,part of a botnet,from which an attacker can stage anonymous activities and attacks. Thewhole point of a proxy Trojan is to hide the attacker,making it harder to trace the true origin of an attack since the attacks will look like they are coming from random and multiple directions because of the proxy bots. ➖  ➖ Ⓜ️COMPUTER WORMⓂ️ 🌀Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self-propagating program.🌀 ➖➖ 🔰Social media optimization (SMO) 🔰 Ⓜ️Social media optimization (SMO)is the process of increasing the awareness of a product,brand or event by using a number of social media ou...

Ⓜ️How you can access the developer options in Android:Ⓜ️

Image
Ⓜ️How you can access the developer options in Android:Ⓜ️ 🌀Step 1: First open the Settings section and then click on System. Some phones may not have this option so they can simply proceed from the seconds step. Step 2: Now look for the About Phone option and click on it. Step 3: Find the Build Number(or custom os version) and tap on it exactly 7 times, no more no less. Step 4: After my seventh click, you will be asked to key in your password. Then a notification will show up stating that I’m already a developer. (Some device not required a password) Step 5: Then go back to the System tab and you’ll now see the Developer Options section. (Some device it's showing additional settings)  Step 6: At this point, you can tweak your smartphone as per your preferences.🌀