<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6139959024343361412</id><updated>2026-02-01T22:36:10.824+05:30</updated><category term="hacking"/><category term="Security"/><category term="Tricks Hacks"/><category term="XP secrets"/><category term="XP tricks"/><category term="hackers"/><category term="hacking XP"/><category term="ransomware"/><category term="remotely access"/><category term="shutdown virus"/><category term="windows secrets"/><category term="Hacking News"/><category term="Keylogger"/><category term="Phishing"/><category term="Tips and Tricks"/><category term="hacker"/><category term="prank virus"/><category term="remote control"/><category term="remotely shutdown"/><category term="virus"/><category term="Battleground"/><category term="Brute Force"/><category term="Download HD Movies Online"/><category term="Free Movie Download Sites 2023"/><category term="Free Movie Streaming Sites 2023"/><category term="Heartbeat"/><category term="Heartbleed"/><category term="Internet Speed"/><category term="Jio SIM"/><category term="Microsoft bug"/><category term="Mobile game"/><category term="OpenSSL"/><category term="PUBG"/><category term="Password cracking"/><category term="PoisionTap"/><category term="Secrets"/><category term="Social Engineering"/><category term="Twitter Bug"/><category term="Twitter Hack"/><category term="WhatsApp"/><category term="Windows"/><category term="cyberattack"/><category term="free movies app"/><category term="free movies online"/><category term="google"/><category term="google hacking"/><category term="hack windows password"/><category term="proxy bypass"/><category term="school proxy"/><category term="search hacking"/><category term="searching tricks"/><category term="shutdown with mobilephone"/><category term="vulnerability"/><category term="vulnerable"/><title type='text'>Hacking Tricks and NEWS</title><subtitle type='html'>Learn about Hacker, Ethical Hacking, Hacking tools, CEH, Hacking Tricks, Latest Hacking News, Proxy Website, Hacking Simulator.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>38</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-8745080979148838800</id><published>2025-03-09T14:00:00.001+05:30</published><updated>2025-03-09T14:00:00.125+05:30</updated><title type='text'>10 AI-Powered Cyber Attacks: How Hackers Use AI to Attack You</title><summary type="text">10 AI Cyberattacks and How to Prevent ThemAlright,
so you know how we&#39;re always hearing about AI doing cool stuff, right? Like,
creating art or writing stories? Well, it turns out, the same tech can be used
for some not-so-cool things, especially when it comes to cybersecurity.
Yeah, AI can be a double-edged sword, and today, let&#39;s chat about how it can be
used to generate some seriously sneaky </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/8745080979148838800/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/10-ai-powered-cyber-attacks-how-hackers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/8745080979148838800'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/8745080979148838800'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/10-ai-powered-cyber-attacks-how-hackers.html' title='10 AI-Powered Cyber Attacks: How Hackers Use AI to Attack You'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHS8o4i3xKUjatseoRnUiTp11I0C3Jr3cr39srynxlSnS1Rp0QFC-nWcLZoh1DagVYjArRTcE6ty-iAebTSRRUQy9Mlg_wYjG6XQG4LA7Q-aDKVvv0KfD9wF1IrSSWtPjSSaKreADudtzBVWlZXBFJ6rkU-qSAz00keEURHEwsm7hIOgOzVsy0kdeHSM9M/s72-w575-h320-c/Gemini_Generated_Image_yqweo5yqweo5yqwe.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-332187917188908112</id><published>2025-03-08T18:00:00.013+05:30</published><updated>2025-03-08T18:00:00.233+05:30</updated><title type='text'>16 Weirdest and Funniest AI Prompts and AI Responses (ChatGPT Prompts, Gemini Prompts)</title><summary type="text">16 Weirdest and Funniest AI Prompts and AI Responses (ChatGPT Prompts, Gemini Prompts)Here are some of the weirdest and funniest AI prompts that have been used:Motivational Quote Gone Wrong: &quot;Give me an inspirational quote to start my day.&quot; AI Response: &quot;If at first you don’t succeed, maybe success just isn’t your thing.&quot;Cats vs. Dogs Debate: &quot;Which is better, cats or dogs?&quot; AI Response: &quot;Both </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/332187917188908112/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/16-weirdest-and-funniest-ai-prompts-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/332187917188908112'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/332187917188908112'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/16-weirdest-and-funniest-ai-prompts-and.html' title='16 Weirdest and Funniest AI Prompts and AI Responses (ChatGPT Prompts, Gemini Prompts)'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoifYzFmcjfWDhEzSS4KDqfPaSsDp-8JE0CdOmgStEmKF8KMKxByd9ywVkZcCoMw_qoFUakZTAAK058Rvq7bfRHVQla0GLwntMcDXE45Z4wW9dVRQClxN7kAcC0KA0o-h6C5f90J_S77W7ty5BLBanHDPHuLxIa4aXxF1T5vj_NVdy5t9W296pTnTU4O5k/s72-w593-h327-c/AI%20prompts%20and%20responses.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-7873385490634494950</id><published>2025-03-08T13:44:00.003+05:30</published><updated>2025-03-08T13:51:01.861+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="PUBG"/><title type='text'>What is New in 3.7 update PUBG mobile? How to Download 3.7 update PUBG mobile?</title><summary type="text">&amp;nbsp;Exploring the Exciting Changes in PUBG Mobile 3.7 Update: Golden DynastyIntroduction:Hey there, PUBG Mobile fans! The much-awaited 3.7 update, also known as the Golden Dynasty update, has finally arrived. Released on March 7, 2025, this update brings a host of new features, an additional map, new weapons, and some significant gameplay enhancements. In this blog post, we’ll take a closer </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/7873385490634494950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/what-is-new-in-37-update-pubg-mobile.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7873385490634494950'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7873385490634494950'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2025/03/what-is-new-in-37-update-pubg-mobile.html' title='What is New in 3.7 update PUBG mobile? How to Download 3.7 update PUBG mobile?'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdh-A5ohAGw97hPi39grj0iw_ulZezZt7IfatWiQ14OddNr39_DtytqteuHweBIbFCrM8QKr26qJCghoVvjmm2XRchFAMgmEqUOf0f0vu4HJPCAtoF-x5XVeMXeaJgqOA_PtkV9-uC5ByFufcLDrTmtwIJpXXv_Ab5ikuRW51F5aJienmKSduLILnt6It7/s72-w574-h323-c/PUBG-Mobile-3-7-Update.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-5178586722400229572</id><published>2023-01-18T03:08:00.000+05:30</published><updated>2023-01-18T03:08:10.405+05:30</updated><title type='text'>8 Common IoT Attacks in Cyber Security</title><summary type="text">The Internet of Things (IoT) is the network of physical devices, vehicles, buildings and other items embedded with electronics, software, sensors, and connectivity which enables these objects to connect and exchange data. IoT technology has rapidly progressed in recent years, and it has brought many benefits to our lives, including enhanced automation, improved efficiency, and greater convenience</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/5178586722400229572/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2023/01/8-common-iot-attacks-in-cyber-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5178586722400229572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5178586722400229572'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2023/01/8-common-iot-attacks-in-cyber-security.html' title='8 Common IoT Attacks in Cyber Security'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-5209097507837860508</id><published>2023-01-15T18:14:00.025+05:30</published><updated>2023-01-15T18:25:20.843+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Download HD Movies Online"/><category scheme="http://www.blogger.com/atom/ns#" term="Free Movie Download Sites 2023"/><category scheme="http://www.blogger.com/atom/ns#" term="Free Movie Streaming Sites 2023"/><category scheme="http://www.blogger.com/atom/ns#" term="free movies app"/><category scheme="http://www.blogger.com/atom/ns#" term="free movies online"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>(2023) 7 Free Movie Streaming Sites USA— Download HD Movies Online</title><summary type="text">Free Movie Streaming Sites 2023, Download HD Movies Online, Free Movie Download Sites 2023, free movies online, free movies appWith the rise of streaming services, it can be hard to find a reliable and free way to watch movies online. However, there are still a number of free movie streaming sites available for those on a budget or who don&#39;t want to subscribe to a paid service. Here are 7 free </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/5209097507837860508/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2023/01/2023-7-free-movie-streaming-sites-usa.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5209097507837860508'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5209097507837860508'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2023/01/2023-7-free-movie-streaming-sites-usa.html' title='(2023) 7 Free Movie Streaming Sites USA— Download HD Movies Online'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHEAdHcqF2LV2xcByduUXTxI4dVpOjKaZdCbncrNKwkB6Xu7EDGRCvoVfAVJjCM2FObkDnaXNY6uwHHCEMNwCQcQ2P-sg_pEhH1sL8lUnhBBPOqKY8MLCMUJAzdTDnbAMYXiK5xFLu4HVS7irQ_0L8XP3NngFudFILXPKtDFcExEZY_0InFwIBlk9utQ/s72-w456-h137-c/Screenshot%202023-01-15%20181606.jpg" height="72" width="72"/><thr:total>2</thr:total><georss:featurename>United States</georss:featurename><georss:point>37.09024 -95.712891</georss:point><georss:box>8.780006163821156 -130.869141 65.400473836178847 -60.556641</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-4379656292064623409</id><published>2021-06-19T02:16:00.002+05:30</published><updated>2021-06-19T02:42:31.721+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Battleground"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile game"/><title type='text'>Battlegrounds Mobile India Beta Released - How to Download and Install</title><summary type="text">Battlegrounds Mobile India beta version has been released. If you remember the pre registration of Battlegrounds Game was started a month ago. The beta version of the&amp;nbsp;BGMI&amp;nbsp;game got updated on Google Play for downloading everyone on 17 June 2021.BGMI Beta can now available for all users. Initially it was available for select users only who participated on Testing program called&amp;nbsp;</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/4379656292064623409/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/battlegrounds-mobile-india-beta.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4379656292064623409'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4379656292064623409'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/battlegrounds-mobile-india-beta.html' title='Battlegrounds Mobile India Beta Released - How to Download and Install'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-2513912296820372767</id><published>2021-06-17T00:06:00.002+05:30</published><updated>2021-06-17T00:06:19.647+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><title type='text'>Clop Ransomware Gang Got Arrested By Ukraine Police</title><summary type="text">Ukrainian law enforcement officials have arrested Clop ransomware gang. Officials informed that they have been disrupting the infrastructure used in attacks targeting victims around the world since 2019.Ukrainian National Police, authorities from South Korean and U.S. authorities ran a joint operation and arrested six offenders who are accused of running a double extortion scheme. Wherein if </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/2513912296820372767/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/ukraine-police-arrest-clop-ransomware.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/2513912296820372767'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/2513912296820372767'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/ukraine-police-arrest-clop-ransomware.html' title='Clop Ransomware Gang Got Arrested By Ukraine Police'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuJi00nqwlnUkknHm_ZSL0Cnv4zkz_Rfh5fWN6Zx7uTuQh_rh-PG6CYlwk6FFNHGIM2YGs-mo4bXiGuuak2d16CcVQ07wXZ8yt6MppXvLnh_jHmA6qP0WiL5N4WiBt203qOCyTapIPgva_/s72-w627-h282-c/Ukraine-Police-Clop-Ransomware.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-9177452484745386042</id><published>2021-06-04T03:06:00.004+05:30</published><updated>2021-06-04T03:24:19.089+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyberattack"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><title type='text'>REvil Ransomware Attack - JBS Foods Shutdowns Temporarily  </title><summary type="text">The largest meat distributor JBS Foods faced a REvil ransomeware attack over the weekend and it disrupted several servers supporting IT systems and affected the supply chain as well.&lt;!--wp:paragraph--&gt;

&lt;!--/wp:paragraph--&gt;

&lt;!--wp:paragraph--&gt;
Global meat distributor JBS SA had to shut down operations in the United States, Canada and Australia after a Ransomware attack on its IT systems. “</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/9177452484745386042/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/revil-ransomware-attack-jbs-foods.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/9177452484745386042'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/9177452484745386042'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/06/revil-ransomware-attack-jbs-foods.html' title='REvil Ransomware Attack - JBS Foods Shutdowns Temporarily  '/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhe22_n32wbY4lcKnpG9uvMQz_rcWVYgYsWWPyikzchvo7H-n_4F6nH0fx8Dr7AzK5yWEYOJFP8xhmuB3YY2RrZZfqkW9PTmfmdH6VlHp1XFgLNK43AToxMtTwRLpQfIOVVkEQa-IJhjqWL/s72-w523-h393-c/pexels-pixabay-207580-min.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-1570137772449591735</id><published>2021-05-22T19:10:00.002+05:30</published><updated>2021-06-19T02:25:04.370+05:30</updated><title type='text'>Importing Your PUBG Mobile Account Data To Battlegrounds Mobile India May Not Be Possible</title><summary type="text">PUBG Mobile game is banned in India for last few months and couldn’t make a comeback after numerous efforts. Developer Krafton recently announced Pre-registration of Battlegrounds Mobile India for Indian players. It has new privacy policy, gameplay changes, and restrictions. Previous reports revealed that the PUBG Mobile user account and inventory would be migrated to Battlegrounds Mobile India. </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/1570137772449591735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/05/pubg-to-battlegrounds-mobile-india.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/1570137772449591735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/1570137772449591735'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/05/pubg-to-battlegrounds-mobile-india.html' title='Importing Your PUBG Mobile Account Data To Battlegrounds Mobile India May Not Be Possible'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4m7C2SJO_877EZYlWAEphe0o4bQ3zBANlcuu5ZMtDNRiBzb6bR1DA7lgh6HVDIi5JqPHISnLkV8_TuhWMd7XG9X62VjH2YwwRmfdFyUGelvVLN1OgRlGLLyMTMdKQrRcMcbv6H0W1hVr3/s72-w643-h250-c/image.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-2101909883148942516</id><published>2021-04-22T18:54:00.008+05:30</published><updated>2021-04-22T19:47:47.374+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Hackers Are Using Telegram to Spread Malware and Control the System</title><summary type="text">Check Point researchers identified more than 130
cyber attacks using a Remote Access Trojan called ToxicEye. This malware is
managed by cybercriminals through Telegram messenger app.As per Check Point Research, there is a new trend of
attack among cybercriminals, where Telegram is used as a control-and-command
system to spread malware even popular application is not installed or is not
used, the </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/2101909883148942516/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/hackers-are-using-telegram-to-spread-malware.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/2101909883148942516'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/2101909883148942516'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/hackers-are-using-telegram-to-spread-malware.html' title='Hackers Are Using Telegram to Spread Malware and Control the System'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrUUqlLx2pjAeRNi-dXWyPZxpjjFjm_W8wpka2Vw4rOA7hqLSFLlX7m8h-8QxbucEPQYuhJKdRg_83Xb8VTJeChHYLZW21AC6jm0ClqPV_HRuzcvHlOMyBtQwzCgV5gGGFwBOwxvikGeh4/s72-w431-h443-c/image.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-872808248743648094</id><published>2021-04-16T01:47:00.021+05:30</published><updated>2021-04-16T01:56:33.068+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="remotely access"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>New WhatsApp Vulnerabilities could have allowed Attackers to Hack Android Mobile Remotely</title><summary type="text">&amp;nbsp;WhatsApp technical team recently addressed 2
security vulnerabilities in WhatsApp for Android. As per security researchers
Remote attackers could have exploited these vulnerabilities to execute malicious
code on a target device.

The flaws allow attackers to execute
“man-in-the-disk” attacks that is possible when mobile apps use External
Storage that is shared across all the applications. </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/872808248743648094/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/new-whatsapp-vulnerabilities-hack-mobile.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/872808248743648094'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/872808248743648094'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/new-whatsapp-vulnerabilities-hack-mobile.html' title='New WhatsApp Vulnerabilities could have allowed Attackers to Hack Android Mobile Remotely'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/sdVqTEXHxxY/default.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-4582546604171882300</id><published>2021-04-05T14:20:00.001+05:30</published><updated>2021-04-05T14:20:57.776+05:30</updated><title type='text'>Hackers released Facebook User&#39;s Leaked Data For Free Download</title><summary type="text">&amp;nbsp;&amp;nbsp;The case of data leakage from Facebook is becoming big issue once again and this is a huge dent in the Facebook security. Selling the phone number and personal data of Facebook owner Mark Zuckerberg is in the headlines. Report says that data of more than 533 million people of 100 countries around the world using Facebook has been leaked online.Now hackers have made public the phone </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/4582546604171882300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/hackers-released-facebook-users-leaked.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4582546604171882300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4582546604171882300'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2021/04/hackers-released-facebook-users-leaked.html' title='Hackers released Facebook User&#39;s Leaked Data For Free Download'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCLnhr1gt3A-hGEPU5u5GN1SGzCx4PDNDrFSDVmOuXFgHtj1GwZriMaMaEouhyphenhyphenKjVIMSROJG68O028tG0XdOwmnL4BuDh5YZqkWqlchsjcWrTETfjd_PFONGBCyAegkc88AXnP9CtCug-q/s72-w379-h413-c/Screenshot+2021-04-05+135522.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-8226039500100718671</id><published>2020-05-30T19:17:00.005+05:30</published><updated>2021-06-27T00:01:12.687+05:30</updated><title type='text'>WeTransfer Banned In India, 5 Alternatives of WeTransfer</title><summary type="text">WeTransfer has become an important technology that allows
the user to upload and send large files with excellent quality to other users. A
premium version of the service allows one to share larger file more than 2GB.

When this file sharing site has helped many users around the world share
important files with each other during this work from home culture, Indian users are reporting that
the file</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/8226039500100718671/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2020/05/Banned-In-India-5-Alternatives-of-WeTransfer.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/8226039500100718671'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/8226039500100718671'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2020/05/Banned-In-India-5-Alternatives-of-WeTransfer.html' title='WeTransfer Banned In India, 5 Alternatives of WeTransfer'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzR_lkck-LqmMXRpPWkur3QeYu0AeN1aD-dE2nq5EPx05Pja3qlHDOQj4X9OmntxOZF7yXxsUWfFwR6ezcRQq7K_4i86479di8Kcn38LsW3rw5fovuUV_uYDEHHbwYCKKJu8NwKcXU5mjv/s72-c/wetransfer.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-4232723151261382615</id><published>2020-05-16T21:46:00.002+05:30</published><updated>2020-05-16T23:53:57.438+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><title type='text'>REvil Ransomware Attack | Hackers Threaten to Post Trump &quot;Dirty Laundry&quot; And Celebs Secret</title><summary type="text">A New York-based firm, Grubman Shire Meiselas &amp;amp; Sacks
that offers legal services to the entertainment and media industries including
Lady Gaga, Madonna, Elton John, Barbara Streisand, Bruce Springsteen, Mariah
Carey and Mary J. Blige and Priyanka Chopra, has been hit by a ransomware
attack.

Cybercriminals attack law firm using the REvil ransomware
(also known as Sodinokibi). Hackers are now </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/4232723151261382615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2020/05/what-is-revil-ransomeware-attack.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4232723151261382615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4232723151261382615'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2020/05/what-is-revil-ransomeware-attack.html' title='REvil Ransomware Attack | Hackers Threaten to Post Trump &quot;Dirty Laundry&quot; And Celebs Secret'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-3709849755758199884</id><published>2019-12-27T00:18:00.000+05:30</published><updated>2019-12-27T00:18:34.855+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter Bug"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter Hack"/><title type='text'>Twitter Bug - Researcher Compromised 17 million users phone number</title><summary type="text">
&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/3709849755758199884/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2019/12/twitter-bug-researcher-compromised-phone-no.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/3709849755758199884'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/3709849755758199884'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2019/12/twitter-bug-researcher-compromised-phone-no.html' title='Twitter Bug - Researcher Compromised 17 million users phone number'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-6036287825509267627</id><published>2018-05-28T20:29:00.007+05:30</published><updated>2021-07-03T01:35:01.555+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="proxy bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="school proxy"/><title type='text'>100 Best Proxy Sites and Bypass Servers</title><summary type="text">100+ Best Proxy Sites - These are updated list of Proxy sites
from where you can access any website that is blocked in your office or
country.

You can stream Youtube videos from these top proxy sites for
videos if streaming is blocked in your office or college.
 
  
  http://proxymesh.com/web
  
  
  proxymesh
  
 
 
  
  https://www.proxysite.com
  
  
  proxysite
  
 
 
  
  http://</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/6036287825509267627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2009/05/best-proxy-bypass-servers-sites.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/6036287825509267627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/6036287825509267627'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2009/05/best-proxy-bypass-servers-sites.html' title='100 Best Proxy Sites and Bypass Servers'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-5570110202344394859</id><published>2018-01-03T15:19:00.002+05:30</published><updated>2021-07-03T00:27:29.221+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Brute Force"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="Password cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>5 Most Commonly Used Method To Hack And Preventive Measures</title><summary type="text">
&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;



There are number of methods used by hackers to hack your Email/Social
Network account and get your personal information. Today I will let you know 5
Most commonly used method to hack or crack your account password and preventive
actions to avoid such attacks. This article will help to make your account
safe.





1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Brute </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/5570110202344394859/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2016/12/5-most-commonly-used-method-to-hack-and.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5570110202344394859'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5570110202344394859'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2016/12/5-most-commonly-used-method-to-hack-and.html' title='5 Most Commonly Used Method To Hack And Preventive Measures'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-5408718066942288372</id><published>2017-08-20T21:49:00.000+05:30</published><updated>2018-05-29T21:50:15.707+05:30</updated><title type='text'>How To Retrieve Password From Dots, Stars or Asterisk </title><summary type="text">
&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  800x600
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  MicrosoftInternetExplorer4
  
   
</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/5408718066942288372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2013/08/how-to-retrieve-password-from-dots.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5408718066942288372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5408718066942288372'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2013/08/how-to-retrieve-password-from-dots.html' title='How To Retrieve Password From Dots, Stars or Asterisk '/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6VCM4jG4j1SVvYth4P8Z4_EtKcoY2bVGHqp4FS4CNJ12qrfkgNlPfLXdS-SrKiLEVKXtqL6k9E_Q1F2BUw-g-CpB4m5B25aHmUTf7VIo0yddCBlKqdqDaRQmdpZtRVj4mNReJMNJSDSah/s72-c/1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-7278781669104354106</id><published>2017-03-28T18:13:00.000+05:30</published><updated>2018-05-29T21:43:33.782+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="prank virus"/><category scheme="http://www.blogger.com/atom/ns#" term="shutdown virus"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>How to make a Virus (Destroyer) continued.......</title><summary type="text">
Now i&#39;m going to tell you make a Virus.
Make one called matrix.
Now remember this is not the answer to all your revenge needs.
The best way to get revenge is to make a FAKE virus that just scares the crap out of them.
If you want to do something constructive with a virus send it to someone who has written and forwarded one before, to stop them.
Heed my warning, but if you still want to ruin your</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/7278781669104354106/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2009/03/how-to-make-virus-destroyer-continued.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7278781669104354106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7278781669104354106'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2009/03/how-to-make-virus-destroyer-continued.html' title='How to make a Virus (Destroyer) continued.......'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-5274005084016211531</id><published>2017-03-26T22:14:00.000+05:30</published><updated>2018-05-29T21:43:07.618+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="prank virus"/><category scheme="http://www.blogger.com/atom/ns#" term="shutdown virus"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>How to make a VIRUS</title><summary type="text">
I&#39;m sure that everyone dreamed just once to make a virus and spread him.I personally dreamed to make a big virus and spread it I recognize.Today I&#39;ve found that you don&#39;t need any advanced skills to make a virus.Anyone can make one with a few simple mouse clicks.Today I&#39;m telling you about a prank virus but if you are interested to know how to make a dangerous virus I&#39;ll tell you definitely. </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/5274005084016211531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2009/03/how-to-make-virus.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5274005084016211531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/5274005084016211531'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2009/03/how-to-make-virus.html' title='How to make a VIRUS'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-7388815219486856387</id><published>2016-11-17T20:34:00.000+05:30</published><updated>2016-11-17T20:34:34.095+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="PoisionTap"/><category scheme="http://www.blogger.com/atom/ns#" term="remote control"/><category scheme="http://www.blogger.com/atom/ns#" term="remotely access"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks Hacks"/><title type='text'>Hack Locked Computer using $5 Device (PoisionTap)</title><summary type="text">
&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;










If
you think that your computer is safe when it is locked with a strong password,
then Samy Kamkar’s device PoisionTap will make you wrong. This cheap exploit
tool takes just 30 seconds to install a privacy-invading backdoor into your
computer.







PoisionTap,
a tiny $5 Raspberry Pi Zero microcomputer loaded with Node.js code and attached
to a</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/7388815219486856387/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/hack-locked-computer-using-5-device.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7388815219486856387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7388815219486856387'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/hack-locked-computer-using-5-device.html' title='Hack Locked Computer using $5 Device (PoisionTap)'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-1259776750473254500</id><published>2016-11-03T15:15:00.001+05:30</published><updated>2016-12-19T23:06:29.671+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft bug"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Google’s Disclosure Makes Microsoft Unhappy</title><summary type="text">
&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;





Now Google
has started a new war by publishing details about a critical vulnerability in
Windows and that makes Microsoft angry. Google claimed that it reported the bug
to Microsoft 10 days ago but company did nothing to address this issue.

In its
official&amp;nbsp;Security Blog , Google wrote:

&quot;After
seven days, per our published policy for actively </summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/1259776750473254500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/googles-disclosure-makes-microsoft.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/1259776750473254500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/1259776750473254500'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/googles-disclosure-makes-microsoft.html' title='Google’s Disclosure Makes Microsoft Unhappy'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-124842567980980147</id><published>2016-11-01T16:43:00.001+05:30</published><updated>2016-11-01T16:46:25.114+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Speed"/><category scheme="http://www.blogger.com/atom/ns#" term="Jio SIM"/><category scheme="http://www.blogger.com/atom/ns#" term="Secrets"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Increase JIO Internet Speed - Simple Tricks</title><summary type="text">
&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/124842567980980147/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/increase-jio-internet-speed-simple.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/124842567980980147'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/124842567980980147'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2016/11/increase-jio-internet-speed-simple.html' title='Increase JIO Internet Speed - Simple Tricks'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-4528580963169529758</id><published>2016-08-02T23:27:00.000+05:30</published><updated>2018-05-29T21:46:06.360+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="remote control"/><category scheme="http://www.blogger.com/atom/ns#" term="remotely access"/><category scheme="http://www.blogger.com/atom/ns#" term="remotely shutdown"/><title type='text'>Take control of another computer</title><summary type="text">
Things to need
Remote Pc’s Account Username And Password

&lt;-- --=&quot;&quot; method=&quot;&quot;&gt;&lt;/--&gt;

1. Go tO COmmand Promt(press Windows+R and type cmd)
2. type cd\ (to go to main root Of C:)
3. type the command
c:\net use \\(Rempote PC’s Username i.e Amit)\ipc$ /u:Administrator
c:\net use \\Amit\ipc$ /u:Administrator(press Enter)
(Results of the above Command)
The Password Or Username Is Invalid For \\Amit\</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/4528580963169529758/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2009/08/take-control-of-another-computer.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4528580963169529758'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/4528580963169529758'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2009/08/take-control-of-another-computer.html' title='Take control of another computer'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6139959024343361412.post-7986382611033021064</id><published>2016-05-01T20:51:00.000+05:30</published><updated>2018-05-29T21:44:45.454+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="google hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="search hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="searching tricks"/><title type='text'>Google Search Hacking</title><summary type="text">
Well if u ask me this is the best Part &quot; how to Search &quot;,
Anyone anywhere needs something out of the great &quot;www&quot;,
now if u know how to grab hold to &quot;something&quot; in one click that is the skill,
this article henceforth is one of my best my best,
n especially crafted to meet all ur needs !!

Songs
javascript:Qr=&#39;&#39;;if(!Qr){void(Qr=prompt(&#39;ENTER ARTIST OR SONG NAME:&#39;,&#39;&#39;))};if(Qr)location.href=&#39;http://</summary><link rel='replies' type='application/atom+xml' href='http://wholovehacking.blogspot.com/feeds/7986382611033021064/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wholovehacking.blogspot.com/2009/05/google-search-hacking.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7986382611033021064'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6139959024343361412/posts/default/7986382611033021064'/><link rel='alternate' type='text/html' href='http://wholovehacking.blogspot.com/2009/05/google-search-hacking.html' title='Google Search Hacking'/><author><name>Prakash</name><uri>http://www.blogger.com/profile/03051912960673854307</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9cqOgfPDQDUJNzE_rp5W84olG-mg-yL0XA690EhW5ug7hhU22vwBaFbMpLvW7vonflrolgr1Zmjak-zxNIzzUCEgOatxAuMIaKklYRNz1E2cTSxdS23LRMU2J3FrcSc/s113/hacking_big.jpg'/></author><thr:total>1</thr:total></entry></feed>