<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4574892340134152115</id><updated>2025-06-11T05:19:18.717-07:00</updated><category term="Hacking Special"/><category term="Tech news"/><category term="Android Tricks"/><category term="Tricks"/><category term="Do You Know?"/><category term="Facebook Tricks"/><category term="Gadgets"/><category term="computer tricks"/><category term="App Review"/><category term="About Us"/><category term="PC/Laptop"/><category term="Smartphones"/><category term="facebook hack"/><category term="facebook name change"/><category term="facebook page"/><category term="facebook page name"/><category term="free wifi"/><category term="wifi hack"/><category term="wifi password cracker"/><title type='text'>Technical Vaibhav</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default?start-index=26&amp;max-results=25'/><author><name>COC Wizard</name><uri>http://www.blogger.com/profile/07294688493302278994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>39</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-3077260607648073068</id><published>2017-07-19T07:44:00.003-07:00</published><updated>2017-07-19T08:18:06.222-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="App Review"/><title type='text'>Microsoft Just Launched An Awesome New App For Your Android</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidcLMpoK4jprptxy2tLKBRjzP5st70yYrFAR6kuFgrcchVT0cxG_stZK1fSMxn6VnTJHHfjgkQdo4o80mHhINSOUkK4mhqPSA3Uo0WHaGxJl-5wl9CmY_U4IxASc6JKzX5GvY0PEmxYSQ/s1600/Microsoft+Just+Launched+An+Awesome+New+App+For+Your+Android.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidcLMpoK4jprptxy2tLKBRjzP5st70yYrFAR6kuFgrcchVT0cxG_stZK1fSMxn6VnTJHHfjgkQdo4o80mHhINSOUkK4mhqPSA3Uo0WHaGxJl-5wl9CmY_U4IxASc6JKzX5GvY0PEmxYSQ/s400/Microsoft+Just+Launched+An+Awesome+New+App+For+Your+Android.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;Microsoft just launched a new app for Android users, which is known as Path Guide which is for indoor navigation without using the GPS feature of your phone. The Path Guide app uses sensors on your phone to record every movement in a particular area or city.&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;The GPS system in our smartphone has been used to navigate the city streets, but have you ever thought there is no connectivity? Recently, Microsoft launched an app that allows users to navigate the streets of the city without the use of GPS.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Let me tell you, the app does not even need WiFi, so this is another obstacle to ignore. Launched by Microsoft, the new app is known as Path Guide, which is for indoor navigation without using the GPS feature of your phone.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;The new launcher launched by Microsoft is now available for Android users. The Path Guide app uses sensors on your phone to record every movement in a particular area or city. The Path Guide app can create users&#39; maps of buildings and allow them to make these maps public so that other users can find and travel their way through the buildings.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTz_aI1s9huhL9rT49JFf18z0fptHL5qXANKrZ2URgPMUFXcIysY25pGUUVCVfbO6vkdEvMBdMZ3UfRGlLzvJXwruCDb9Eka1UzNqoqXYBD1S9Tdrwk3KxR8dfFcE7Rt6ZCoFbjEERqdc/s1600/Path-Guide+App.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;556&quot; data-original-width=&quot;650&quot; height=&quot;340&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTz_aI1s9huhL9rT49JFf18z0fptHL5qXANKrZ2URgPMUFXcIysY25pGUUVCVfbO6vkdEvMBdMZ3UfRGlLzvJXwruCDb9Eka1UzNqoqXYBD1S9Tdrwk3KxR8dfFcE7Rt6ZCoFbjEERqdc/s400/Path-Guide+App.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #999999; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Image Source: Path Guide&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;The Path Guide app can also be used in many situations such as the recording of each step you made and the distance within the building. The app also enables users to record audio, notes and images that will later help others using the map.&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_1bTWR7ToGghEKpk1lVfCBUBr-kybLhH84w3WprJJFPCX3VCI9yO0pM9uI1ZVA7teeboAqAeWd5r4A2Pqy5j6xwwPy204qfe-Vhe7uYbuzvBaZUsIgwOOKjXj7OxIbzcfESlvtA3M1CU/s1600/Path-Guide-2.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;234&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_1bTWR7ToGghEKpk1lVfCBUBr-kybLhH84w3WprJJFPCX3VCI9yO0pM9uI1ZVA7teeboAqAeWd5r4A2Pqy5j6xwwPy204qfe-Vhe7uYbuzvBaZUsIgwOOKjXj7OxIbzcfESlvtA3M1CU/s400/Path-Guide-2.jpeg&quot; width=&quot;233&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Image Source Path Guide&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Here&#39;s how Google Play Store describes Microsoft&#39;s Path Guide app:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&quot;Path Guide is a completely mapless, infrastructure-free, plug-in-play indoor navigation service that leverages the ubiquitous geomagnativity and natural walking patterns that move users with the paths collected by travelers first. Does. &quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Note that the app is in its initial stages and is expected to become more intelligent over time. You can download them from &lt;b&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.microsoft.msra.followus.app&amp;amp;rdid=com.microsoft.msra.followus.app&quot; target=&quot;_blank&quot;&gt;Google Play&lt;/a&gt;&lt;/b&gt; or from &lt;b&gt;&lt;a href=&quot;https://www.apkmirror.com/?s=com.microsoft.msra.followus.app&amp;amp;post_type=app_release&amp;amp;searchtype=apk&quot; target=&quot;_blank&quot;&gt;APKMirror&lt;/a&gt;&lt;/b&gt;.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/3077260607648073068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/microsoft-just-launched-awesome-new-app.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3077260607648073068'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3077260607648073068'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/microsoft-just-launched-awesome-new-app.html' title='Microsoft Just Launched An Awesome New App For Your Android'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidcLMpoK4jprptxy2tLKBRjzP5st70yYrFAR6kuFgrcchVT0cxG_stZK1fSMxn6VnTJHHfjgkQdo4o80mHhINSOUkK4mhqPSA3Uo0WHaGxJl-5wl9CmY_U4IxASc6JKzX5GvY0PEmxYSQ/s72-c/Microsoft+Just+Launched+An+Awesome+New+App+For+Your+Android.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-6881278504030956280</id><published>2017-07-16T01:03:00.000-07:00</published><updated>2017-07-16T01:03:15.969-07:00</updated><title type='text'>WARNING! Don’t Use This Fake TOR Browser — Scammers Are Fooling People</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcUI0Za26fKn_3T8tPm331z1-5r_iNzXa821YR_vResmoxMCw8-YvjPFAsZ_DQrcFhUwRnjLKk8LxHzhVVpOJrTCZbk6L8FALVFQ7sSv1DUSxnVMOnxH-LDi5oTgSexSnRCr56ZhqOrh_0/s1600/WARNING%2521+Don%25E2%2580%2599t+Use+This+Fake+TOR+Browser.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcUI0Za26fKn_3T8tPm331z1-5r_iNzXa821YR_vResmoxMCw8-YvjPFAsZ_DQrcFhUwRnjLKk8LxHzhVVpOJrTCZbk6L8FALVFQ7sSv1DUSxnVMOnxH-LDi5oTgSexSnRCr56ZhqOrh_0/s640/WARNING%2521+Don%25E2%2580%2599t+Use+This+Fake+TOR+Browser.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;ubuntu&amp;quot;; font-size: 18px; font-style: italic; font-weight: bold;&quot;&gt;Browsing the internet anonymously is not an easy task, but, still, if you want to surf the Internet without any trace then Tor Browser is undoubtedly the best solution for you. But, recently, according to the latest reports, a supposedly fake dark website called “The Rodeo” is being promoted through a web browser which is named as TOR.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: sans-serif; font-size: 18px; font-style: italic; font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;We all know very well that browsing the internet anonymously is not an easy task, especially since we register, however, make me clear if you do not know that protecting our online privacy through additional tools It is possible to help us save and hide our identity.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, if you want to surf the Internet without any type of thing, surely, the tar browser is undoubtedly the best solution for you. But, it seems now that in the recent past, the fraud has written a wrong browser, users who want to securely connect to the sub-form of the rodeo when users download the software and connect to the alleged market for buying illegal merchandise , They are given a reliable user interface.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;However, in the whole process, the only goal is to lend them out of the bitcons pocket. It is believed that the dark web market emerges in non-technical or noob and encourages users to place order in the form of products and services such as hooking services, weapons, unlock phones, drugs, fake credit cards, fake money And encourage to pay just through the bus. Bitcoin for those products that will never be received.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPiRTXZJB5f0n-Hcv5JpWqAeSkbnS62Nkn9O12qRV8v51id5jhF3uJnasaea-ZdOZn8pB6cElvqWNw-3x8zoOatFjiIuM__CLVRh5-g3hxRD0ri9-ILrxMjkmYk1mTc_t5W26NZ2cjUlz_/s1600/Untitled+design+%25286%2529.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;512&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPiRTXZJB5f0n-Hcv5JpWqAeSkbnS62Nkn9O12qRV8v51id5jhF3uJnasaea-ZdOZn8pB6cElvqWNw-3x8zoOatFjiIuM__CLVRh5-g3hxRD0ri9-ILrxMjkmYk1mTc_t5W26NZ2cjUlz_/s640/Untitled+design+%25286%2529.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Also, the alleged browser never establishes a connection with the tow network, it downloads only the web pages from an FTP server on which they are stored as plain text and base64 encoded HTML. PGP-encrypted user data is reportedly also in plain text. So far 158 users are registered for bitcoins for some of them and their accessories are awaiting.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZhRX2f18yVE89JSz5ruSUobdMJlReBz2zPT8PecGz64c5mhcGW2lm1EN9MTpcPR4hokgXTqXFfcvotMZXmEgUiaxdJpCAlx5pXIraQka6PzQ21V0RYEnK5xv9qEDBXPSU5xiWgsYVziA/s1600/Untitled+design+%25287%2529.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;416&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZhRX2f18yVE89JSz5ruSUobdMJlReBz2zPT8PecGz64c5mhcGW2lm1EN9MTpcPR4hokgXTqXFfcvotMZXmEgUiaxdJpCAlx5pXIraQka6PzQ21V0RYEnK5xv9qEDBXPSU5xiWgsYVziA/s640/Untitled+design+%25287%2529.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Although the browser is a very basic NAT program and almost all the buttons of the software do not work, the actual website of the alleged market is well implemented.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Frauders have kept many illegal items in order to attract visitors and many visitors to spend money. They also aggressively advertise their wrong undergrounds with YouTube tutorials that promise easy, secure access to illegal goods.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: sans-serif; font-size: 15px;&quot;&gt;So, what do you think about this scam? Share your thoughts in the comment section below.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;spanstyle and=&quot;&quot; below.=&quot;&quot; buntu=&quot;&quot; comments=&quot;&quot; do=&quot;&quot; font-family:=&quot;&quot; gt=&quot;&quot; ideas=&quot;&quot; in=&quot;&quot; just=&quot;&quot; o=&quot;&quot; of=&quot;&quot; sans-serif=&quot;&quot; scam=&quot;&quot; section=&quot;&quot; share=&quot;&quot; span=&quot;&quot; the=&quot;&quot; think=&quot;&quot; this=&quot;&quot; thoughts=&quot;&quot; what=&quot;&quot; you=&quot;&quot; your=&quot;&quot;&gt;&lt;/spanstyle&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/6881278504030956280/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/warning-dont-use-this-fake-tor-browser.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6881278504030956280'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6881278504030956280'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/warning-dont-use-this-fake-tor-browser.html' title='WARNING! Don’t Use This Fake TOR Browser — Scammers Are Fooling People'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcUI0Za26fKn_3T8tPm331z1-5r_iNzXa821YR_vResmoxMCw8-YvjPFAsZ_DQrcFhUwRnjLKk8LxHzhVVpOJrTCZbk6L8FALVFQ7sSv1DUSxnVMOnxH-LDi5oTgSexSnRCr56ZhqOrh_0/s72-c/WARNING%2521+Don%25E2%2580%2599t+Use+This+Fake+TOR+Browser.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-6820650450161970134</id><published>2017-07-14T03:16:00.000-07:00</published><updated>2017-07-14T03:16:19.733-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>Master Decryption Key Of Original Petya Ransomware Released</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-Py0sfQTXV3ijEO8sbgvoTIKxnopx5Kp0M5XMfHHm-0-C1otL1wEGb9cvKD1IuGAAC02-v9-dC3LPh8s9DKPSTn7Eam6TydNeM1zQV_iAcMhWPU2Fg2zcnvIac0EuMd3Jg4T_KtabQqj/s1600/Master+Decryption+Key+Of+Original+Petya+Ransomware+Released.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-Py0sfQTXV3ijEO8sbgvoTIKxnopx5Kp0M5XMfHHm-0-C1otL1wEGb9cvKD1IuGAAC02-v9-dC3LPh8s9DKPSTn7Eam6TydNeM1zQV_iAcMhWPU2Fg2zcnvIac0EuMd3Jg4T_KtabQqj/s640/Master+Decryption+Key+Of+Original+Petya+Ransomware+Released.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;The original Petya ransomware generated in 2016, can now easily be broken open using its master decryption key, its author Johns Cyber crime Solution has released the key as an encrypted file, which was torn by Malwarebytes. Please note that this chat does not work on recent Petya/Notpetya wiper malware in which the affected computers do not have the ability to decrypt.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;You know that recently the Petya / Petya is a malware attack, which is a disguised wiper in the form of a ransomware, before the 2016 Petya ransomware originally. Recently, the creator of the original Petya, Janus Cyber Crime Solutions (one person or one group) came out of the shadow and declared that he is not the mastermind behind the new Petya malware attack.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Now, Janus has gone ahead and has released the master decryption key for all the ransomware of the late Petya family - including GoldenEye, which was the last Petya version released by Janus. Please note that this key does not work on recent NotPetya malware, which does not have the ability to decrypt the affected system.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Janus has shared the master key on Twitter to let the affected people decrypt their files for free.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
&quot;They&#39;re right in front of you and can open very large doors&quot; &lt;a href=&quot;https://t.co/kuCUMZ5ZWP&quot;&gt;https://t.co/kuCUMZ5ZWP&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hasherezade&quot;&gt;@hasherezade&lt;/a&gt; &lt;a href=&quot;https://twitter.com/MalwareTechBlog&quot;&gt;@MalwareTechBlog&lt;/a&gt; ;)&lt;/div&gt;
— JANUS (@JanusSecretary) &lt;a href=&quot;https://twitter.com/JanusSecretary/status/882663988429021184&quot;&gt;July 5, 2017&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;//platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;

&lt;br /&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;However, the linked file was encrypted and the password was preserved. However, a security researcher at Malwarebytes estimated the password and decrypted the package with openssl. Therefore, here is the content of the file, that is, the original Petya ransomware master key in plain text:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;PT Sans&amp;quot;; font-size: 17px; text-align: start;&quot;&gt;&lt;br /&gt;&lt;/em&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Congratulations!&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Here is our secp192k1 privkey:&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;38dd46801ce61883433048d6d8c6ab8be18654a2695b4723&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-size: 17px;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the “Personal Code” which is BASE58 encoded.&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;PT Sans&amp;quot;; font-size: 17px; text-align: start;&quot;&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;While some previous versions of the patio were broken, but this key can help affected people who have preserved the encrypted disk in the hope of getting their files back.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Only if you are thinking that why Janus is trying to shine, then this may be due to all the publicity surrounding this new patio / notepeta wiper. It may be possible that Jansus does not want to be associated with the new version and is trying to improve by releasing the key for the older versions.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Is this article useful? Do not forget to share your experiences.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/6820650450161970134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/master-decryption-key-of-original-petya.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6820650450161970134'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6820650450161970134'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/master-decryption-key-of-original-petya.html' title='Master Decryption Key Of Original Petya Ransomware Released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-Py0sfQTXV3ijEO8sbgvoTIKxnopx5Kp0M5XMfHHm-0-C1otL1wEGb9cvKD1IuGAAC02-v9-dC3LPh8s9DKPSTn7Eam6TydNeM1zQV_iAcMhWPU2Fg2zcnvIac0EuMd3Jg4T_KtabQqj/s72-c/Master+Decryption+Key+Of+Original+Petya+Ransomware+Released.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-283897251773344479</id><published>2017-07-08T01:16:00.002-07:00</published><updated>2017-07-08T03:47:33.302-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>Police Seize Servers Of Software Firm Linked To Petya Malware Attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ97QpgR2hQcuXxEY2FulGdE9BSMjtUNVu0c-FfWGBFtXhR-PHDR_iI8f1wpo02nuh0hgsDP7He-jCCqyFSKkXIdsY0c1S4B6YRuPqrfmEca6LeEv3vE_yN0dLZ3sa9ltHexuG3sWWZNhB/s1600/Petya+Ransomeware+%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ97QpgR2hQcuXxEY2FulGdE9BSMjtUNVu0c-FfWGBFtXhR-PHDR_iI8f1wpo02nuh0hgsDP7He-jCCqyFSKkXIdsY0c1S4B6YRuPqrfmEca6LeEv3vE_yN0dLZ3sa9ltHexuG3sWWZNhB/s640/Petya+Ransomeware+%25281%2529.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i style=&quot;font-weight: bold;&quot;&gt;In view of the recent Petya / Notpetya attack, cyber crime of Ukraine has seized software firm&#39;s servers which make&amp;nbsp;&lt;/i&gt;&lt;b&gt;&lt;i&gt;M.E.Doc&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&amp;nbsp;accounting software to prevent further cyber attacks. The police suspect that hackers had used the backdoor to install malicious code in the software and the initial transition was spread through software updates. Meanwhile, users have been advised to avoid using the software on their computer.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;As part of an ongoing investigation to uncover the truth behind the Petya malware attack, the Ukrainian police captured on Tuesday an accounting firm&#39;s server, which is a major in the spread of the head of the cyber police in Ukraine Reuters suspected of playing role.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The software in question is M.E.Doc, which is Ukraine&#39;s most popular accounting software. It is used by about 80% of companies in Ukraine, the cyber experts of the Ukrainian government have found that the attackers unauthorized interference with the company&#39;s computers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;After reaching the source code of the software, hackers had installed a notorious code by using the back door in the M.E.Doc software. In particular, representatives of the software were informed about the flaws in the past, but they chose to ignore it by saying a coincidence.&lt;/span&gt;
&lt;/div&gt;&lt;script type=&quot;text/javascript&quot;&gt;
google_ad_client = &quot;9031049502095913&quot;;
google_ad_host = &quot;9031049502095913&quot;; google_ad_width =728;
google_ad_height =90; google_ad_type = &quot;text_image&quot;;
google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;ffffff&quot;;
google_color_link = &quot;0000ff&quot;; google_color_text = &quot;000000&quot;;
google_color_url = &quot;008000&quot;; google_page_url =
&quot;https://technicalvaibhav.blogspot.in//&quot;//--&gt; &lt;/script&gt;&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;&lt;/script&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Further investigations, cyber police also found that the back door has the ability to gather information about users and send a remote server, file uploads etc. The initial transition on users&#39; systems was disguised as M.E.Doc software update.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Cyber ​​Police has given all users access to M.E.Doc. It is also recommended to stop using the doctor. Close the software and the computers on which it is installed. Users are also advised to change their passwords and digital signatures.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Did you find this article interesting? Share your thoughts in the comments section below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/283897251773344479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/in-view-of-recent-petya-notpetya-attack_8.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/283897251773344479'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/283897251773344479'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/in-view-of-recent-petya-notpetya-attack_8.html' title='Police Seize Servers Of Software Firm Linked To Petya Malware Attack'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ97QpgR2hQcuXxEY2FulGdE9BSMjtUNVu0c-FfWGBFtXhR-PHDR_iI8f1wpo02nuh0hgsDP7He-jCCqyFSKkXIdsY0c1S4B6YRuPqrfmEca6LeEv3vE_yN0dLZ3sa9ltHexuG3sWWZNhB/s72-c/Petya+Ransomeware+%25281%2529.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-198614399594864611</id><published>2017-07-07T10:35:00.002-07:00</published><updated>2017-07-08T00:16:24.056-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Do You Know?"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>Wikileaks Unveils CIA Tools That Steals Credentials From Windows &amp; Linux PCs</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXQohDlILljPbtJc9C3H1EtUhd8nMVAPmIPhx6WhTGVoCEp9jHYqc2dI2cgUVta1eRacb-4x8cRVde8zvlpWgeApmWRArTVGZfHwmwCT4Z5Dw8KrZjWD2-OyvXH6-8ye3f8fchhqKbyZ4/s1600/CIA+SSH+CredentialsStealing+Tools.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXQohDlILljPbtJc9C3H1EtUhd8nMVAPmIPhx6WhTGVoCEp9jHYqc2dI2cgUVta1eRacb-4x8cRVde8zvlpWgeApmWRArTVGZfHwmwCT4Z5Dw8KrZjWD2-OyvXH6-8ye3f8fchhqKbyZ4/s400/CIA+SSH+CredentialsStealing+Tools.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;We all know that Wikileaks is exposing the malicious tool of CIA and NSA. However, lately, the popular leak, apparently, has been described by Wikileaks as some horror tools through which the United States Central Intelligence Agency (CIA) is stealing credentials from Windows and Linux PCs.&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;i&gt;Wikileaks has received rain since its announcement of Walt 7, based on the CIA&#39;s alleged confidential documents, all hacking tools of the agent are described.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Wikileaks today published the 15th batch of its ongoing Vault 7 leak&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;at this time, two alleged CIA implants have been given, which are used by the agency to attack different viruses using targeted vectors, targeted SSHs (Secure Shell)&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;allows to stop and exterminate credentials.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Secure Shell or SSH is a cryptographic network protocol that is safely used for remote access on machines and servers on an insecure network.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Dub Dell Botham - Imprint for Microsoft Windows XSell client, and targets openSSH clients on various distributions of Linux OS including Girafallon - Seoxos, Debian, RHEL (Red Hat), OpenSUSE and Ubuntu.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Both transfers steal user credentials for all active SSH sessions and then send them to the CIA-controlled server.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;BothanSpy - Implant for Windows OS&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPF_q8es5PeCJ0_bVce0t31kZnjprMW5immZz4qijifOdRoF_X9waqhhk98tUSwKn7Ds8vpUE4c5J6uFMG_WcPqbMFF5x-qowLRmEOTkwhC4cTtVhViGC8LLntGYVOQ76rYlIHcw1VtxdV/s1600/important.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;233&quot; data-original-width=&quot;596&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPF_q8es5PeCJ0_bVce0t31kZnjprMW5immZz4qijifOdRoF_X9waqhhk98tUSwKn7Ds8vpUE4c5J6uFMG_WcPqbMFF5x-qowLRmEOTkwhC4cTtVhViGC8LLntGYVOQ76rYlIHcw1VtxdV/s640/important.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;BothanSpy has been installed on the target machine as a shellerm 3.x extension and is only active if running on xshell with active sessions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Xshell is a powerful terminal emulator that supports SSH, SFTP, Telnet, RLOGIN&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;and SERIAL to deliver industry leading features including dynamic port forwarding, custom key mapping, user defined buttons, and VB scripting.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;To use the Bayanap to be against the goal of running the X64 version of Windows, the loader used should support WOW64 injection,&quot; leak reads the CIA user manual&quot;.&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;Xshell only comes in the form of an x86 binary, and thus Boththanpoft has been compiled as only x86. Sheller 3.0 3.0 supports Wow64 injection, and the shellTrum is highly recommended.&quot;&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Gyrfalcon - Implant for Linux OS&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Gyrfalcon targets Linux system (32 or 64-bit kernel) for continuous use of CIA-developed JQC / kitw rootkit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Gefalak is also able to collect full or partial OpenSSH session traffic, and later stores stolen information in encrypted file for exfoliation.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;The device is running automatically. It is configured in advance, is executed on the remote host and is running on the left,&quot; reads the user manual of Gyrfalcon v1.0.&quot;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;After some time, the operator returns and commands all of its collection to flush it on the disk. The operator retrieves the archive file, decrypts it, and analyzes the collected data.&quot;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The User Manual for Gearfalcon v2.0 says that the implant includes &quot;two compiled binaries&quot; that should be uploaded to the targeted platform with an encrypted configuration file.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;Garyphalon does not offer any communication services between the local operator computer and the target platform. The operator should use a third-party application to upload these three files to the target platform.&quot;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;Previous Vault 7 CIA Leaks&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Last week, WikiLeaks snatched a classified CIA project, which allowed spy agency to hack into a PC running Linux Operating System and remotely spy.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Durbard Outlurch, Project CIA allows hackers to redirect all outbound network traffic to the targeted machine, to CIFA-controlled computer systems and to redirect data infiltration.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Since March, the Vital Blowing Group has published 15 batches of &quot;Vault 7&quot; series, including the latest with the following batches and leaks in the previous week:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;ELSA&lt;/b&gt; - The alleged CIA malware that tracks the geographic location of targeted PCs and laptops running Microsoft Windows operating systems.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Cruel Kangaroo&lt;/b&gt; - A tool suite for Microsoft Windows used by the agency to target closed networks or air-gap computer systems within an organization or enterprise without the need for any direct access.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Cherry Blossom&lt;/b&gt; - An agency framework used to spy on the internet activity of targeted systems by exploiting loopholes in WiFi devices, basically remotely controlled firmware-based implant.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Pandemic&lt;/b&gt; - The agency&#39;s project changed the Windows file server to the underground attack machines, which could quietly infect other computers of interest within a targeted network.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Athena&lt;/b&gt; - A spyware framework designed by CIA that takes full control remotely on infected Windows machines, and works against every version of Windows OS, from Windows XP to Windows 10.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;AfterMidnight and Assassin&lt;/b&gt; - Two alleged CIA malware frameworks for the Microsoft Windows platform, designed to monitor operations and execute malicious actions on infected remote host computers.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Archimedes&lt;/b&gt; - Man-in-the-Middle (MTM) attack tool was allegedly designed by the CIA to target computers inside a local area network (LAN).&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Scripts&lt;/b&gt; - Software was allegedly designed to embed &#39;web bacons&#39; into confidential documents, allowing spy agency to track insiders and whistleblowers.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;&lt;b&gt;Grasshopper&lt;/b&gt; - Framework that allowed the agency to easily create custom malware to break into Microsoft&#39;s windows and inhibit antivirus protection.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;&lt;b&gt;Marble&lt;/b&gt; - Source code of a secret anti-forensic structure used by the agency to hide the original source of its malware.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;&lt;b&gt;Dark Matter&lt;/b&gt; - Hacking uses a design agency to target iPhone and MACS.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;&lt;b&gt;Eping Angel&lt;/b&gt; - The spying tool is used by the agency to infiltrate smart TVs, converting them into secret microfons.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;&lt;b&gt;Year Zero&lt;/b&gt; - CIA hacking exploits for popular hardware and software.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/198614399594864611/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/wikileaks-unveils-cia-tools-that-steals.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/198614399594864611'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/198614399594864611'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/wikileaks-unveils-cia-tools-that-steals.html' title='Wikileaks Unveils CIA Tools That Steals Credentials From Windows &amp; Linux PCs'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXQohDlILljPbtJc9C3H1EtUhd8nMVAPmIPhx6WhTGVoCEp9jHYqc2dI2cgUVta1eRacb-4x8cRVde8zvlpWgeApmWRArTVGZfHwmwCT4Z5Dw8KrZjWD2-OyvXH6-8ye3f8fchhqKbyZ4/s72-c/CIA+SSH+CredentialsStealing+Tools.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-7800812357281428658</id><published>2017-07-06T08:54:00.000-07:00</published><updated>2017-07-06T08:54:05.480-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How to Check What Kind of Processor Your Android Device Have</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXmjYpOSMIdrsjjXDEnBtN6TBr5hyphenhyphen7A79pzoIYOwfZimfG5wksMAohCvDgrSDPFMHEYmMF8cZM0dxALlLBwF5DUzJ6MmM1wGO6iWZomVmCOl7JdNDVCS1YAVfesqm8uV88DKy0OFj2QSlA/s1600/What+Kind+of+Processor+your+Android+Device+Have-.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXmjYpOSMIdrsjjXDEnBtN6TBr5hyphenhyphen7A79pzoIYOwfZimfG5wksMAohCvDgrSDPFMHEYmMF8cZM0dxALlLBwF5DUzJ6MmM1wGO6iWZomVmCOl7JdNDVCS1YAVfesqm8uV88DKy0OFj2QSlA/s400/What+Kind+of+Processor+your+Android+Device+Have-.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;To see if your Android device is a processor, which will help you decide several things during your device customization, then follow the tutorial to proceed.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;With the release of the Android Lollipop version, its rigorous compatibility requirements for the root apps processor like the Xposed Framework arises, and for each other processors, it also needs to be installed to different versions of that app, along with different builds. This makes users very important to know about the precise architecture of your Android device processor and then they can start only to install the exact app. By default, the Android processor will not provide much information about which it is running, so to know better details of the processor, some external method has to be implemented. In this article, the way in which we can learn about the exact processor that your Android device has been integrated and some other information about your device&#39;s hardware can be found, but discussed. If you want to know about total processor hardware information on your Android device, then just follow the article and therefore learn those techniques. Now it&#39;s time to go for those methods and articles, so go now and read it!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;How To Check&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This method is very straightforward, and you have to follow the simple step from the guide below to move forward.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;1)&lt;/b&gt; First of all, download and install Drilled hardware Infos named design from Google Play Store. Just search for this app and then click on the installation button to start the installation process, then download and install the app. Before installing the app, some permissions will be asked, just give them all and move immediately with installation.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;2)&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Open the new installed app and go to the System tab inside the app head and you will see a field called two CPU architecture and instructions group. Open these areas and surf through them, you will get a lot of information for the processor, but you may not be able to read it. Just follow the method and we will help you understand the information of your Android device processor.&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEas5g-4Vx3gsz1pDdXkcLqrxMajzlIB1wguHK0R3hXNEJytYysR08iPkToqRdM7XAY72LBElx0PrxJRU_tQPxiM9MP9qFL0YOJ5ZdAezHPneoL8XKE4Ac21GDE-W8AA7YkkOdZVpP79HG/s1600/Image+1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEas5g-4Vx3gsz1pDdXkcLqrxMajzlIB1wguHK0R3hXNEJytYysR08iPkToqRdM7XAY72LBElx0PrxJRU_tQPxiM9MP9qFL0YOJ5ZdAezHPneoL8XKE4Ac21GDE-W8AA7YkkOdZVpP79HG/s400/Image+1.png&quot; width=&quot;218&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #666666; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Copyright @ Technical Vaibhav&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;3)&lt;/b&gt; Originally ARM: ARMV7 or Armbi, ARM 64: ARI 64 or Arm 64 and X86: X86 or X86 Bb is the decoded information of your processor architecture that you are looking for. Some other information is also listed with the app, which you can easily use to describe the complete hardware information of your device processor!&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgG0lohbd1zEw5HhtzHpeYZfRHARfR80Z1ZcpRQ2MhX1AXEmegtlPZEeD4TWhAU2b2zigKquGOr5hrgkODM0u5PRyOD9azq4fQ0FFAsFHhq74bPkHKrt1oirZGLIPpK8QVIWpOYe9Cq2_Vh/s1600/Image+2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgG0lohbd1zEw5HhtzHpeYZfRHARfR80Z1ZcpRQ2MhX1AXEmegtlPZEeD4TWhAU2b2zigKquGOr5hrgkODM0u5PRyOD9azq4fQ0FFAsFHhq74bPkHKrt1oirZGLIPpK8QVIWpOYe9Cq2_Vh/s400/Image+2.png&quot; width=&quot;175&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;&lt;span style=&quot;color: #666666; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Copyright @ Technical Vaibhav&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;After reading the above article, you have now found an easy way through which you can learn all the technical information about your processor on Android device. It can be useful for you to know about the quality of the device during the purchase of any new device and its performance factors can be.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If you are receiving any issues regarding grabbing your processor on Android device, please comment in comment box we will reply as soon as possible.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/7800812357281428658/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/how-to-check-what-kind-of-processor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7800812357281428658'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7800812357281428658'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/how-to-check-what-kind-of-processor.html' title='How to Check What Kind of Processor Your Android Device Have'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXmjYpOSMIdrsjjXDEnBtN6TBr5hyphenhyphen7A79pzoIYOwfZimfG5wksMAohCvDgrSDPFMHEYmMF8cZM0dxALlLBwF5DUzJ6MmM1wGO6iWZomVmCOl7JdNDVCS1YAVfesqm8uV88DKy0OFj2QSlA/s72-c/What+Kind+of+Processor+your+Android+Device+Have-.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-1852782116165032825</id><published>2017-07-05T02:22:00.004-07:00</published><updated>2017-07-05T02:22:57.088-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>OMG! Reliance Jio Launching 4G VoLTE Phone At Just Rs. 500</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshoyuZb9ZAtsAqXHFpd4FgiaxawtC5wCbXuKonkajtWRc1RtqdeHt_cbW2ieoYgJYXhUDHaj1RGm-HMa7JPFDyJtXjYiJsksehGOmgyjZ94f6OYSYOEgleeLm-__Hl622xqF4QcVtEpMq/s1600/Reliance+Jio+Feature+Phone+At+Rs.+500.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshoyuZb9ZAtsAqXHFpd4FgiaxawtC5wCbXuKonkajtWRc1RtqdeHt_cbW2ieoYgJYXhUDHaj1RGm-HMa7JPFDyJtXjYiJsksehGOmgyjZ94f6OYSYOEgleeLm-__Hl622xqF4QcVtEpMq/s400/Reliance+Jio+Feature+Phone+At+Rs.+500.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;After taking the telecom sector along with the storm, Reliance Jio, which is especially known for its high speed internet, is preparing to launch free voice calls and SMS new feature phones, the price Is as low. 500. Yes, it can be crazy, but it is true.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As we all know that Reliance Jio is clearly dominant in the telecommunications market with the Reliance Jio telecom market, Reliance Jio&#39;s Lyf smartphones are also selling in India for a few months, but the company is still selling the rural and Small data for its data services and mobile business&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Therefore, after taking the telecom sector with a storm, now Reliance Jio, which is known for its high-speed Internet, is preparing to launch free voice calls and SMS new feature phones. 500. Yes, it can be crazy, but it is true, because this feature phone series from Reliance Jio hopes to be launched shortly in 2017 this year.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to The Economic Times, HSBC director and telecom analyst Rajeev Sharma said that &quot;Jio has fixed the price of 4G feature phones in 500 rupees so that 2G subscribers can switch directly to 4G, which means that is, the Jio has to subsidize every handset, the more than Rs. 650-975&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;But, what is more interesting about this topic? According to The Economic Times, Reliance Jio telecom will launch this new phone around the annual general meeting of Reliance industries, which is expected to be on 21 July 2017.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Apart from this, the company has recently confirmed that it has more than 100 million subscribers and it has been considered as the first data-service, and its 4G plans start in the form of low. With access to 19 free voice calls and premium live apps, as we all know, Reliance Jio&#39;s service only works with 4G-enabled handsets.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Combat Research Associate Director, Tarun Pathak said that &quot;One of the bundled schemes with the bouquet of 4G data applications and content services in the world, aggressive 4G offerings from free trial, Geo intends to purchase strongly in favor of it operated in just six months &quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Therefore, the company knows very well that with its 4G VoLTE-enabled phones, it can only attract users on a large scale and it can also increase its 4G service. Now, it seems that in the coming months, once again again a huge storm will hit the market once again.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So, what do you think about this? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/1852782116165032825/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/omg-reliance-jio-launching-4g-volte.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1852782116165032825'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1852782116165032825'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/omg-reliance-jio-launching-4g-volte.html' title='OMG! Reliance Jio Launching 4G VoLTE Phone At Just Rs. 500'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshoyuZb9ZAtsAqXHFpd4FgiaxawtC5wCbXuKonkajtWRc1RtqdeHt_cbW2ieoYgJYXhUDHaj1RGm-HMa7JPFDyJtXjYiJsksehGOmgyjZ94f6OYSYOEgleeLm-__Hl622xqF4QcVtEpMq/s72-c/Reliance+Jio+Feature+Phone+At+Rs.+500.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-492245143487686765</id><published>2017-07-04T23:11:00.002-07:00</published><updated>2017-07-04T23:11:25.432-07:00</updated><title type='text'>How to Protect Your Business from Mobile Hackers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg89_z25QiR_eeWnH9lNODeCuc3BIqQ_ides9uepyY2TmqRUlESdZzCj9Z2cm7EYgTHKGCdy1qPwANsPa9_Uu0AUbTOdrzFA3_SfxLkiU46Br4eE0baBSWhWNOp4Ik6iKR0ak_aIO6qgUA4/s1600/PicsArt_07-05-11.39.54.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg89_z25QiR_eeWnH9lNODeCuc3BIqQ_ides9uepyY2TmqRUlESdZzCj9Z2cm7EYgTHKGCdy1qPwANsPa9_Uu0AUbTOdrzFA3_SfxLkiU46Br4eE0baBSWhWNOp4Ik6iKR0ak_aIO6qgUA4/s400/PicsArt_07-05-11.39.54.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Businesses need to be proficiently manage the customers and for the steady change in their telephone framework, calls will have to reduce issues, for example, unauthorized use of telephone services and toll fraud (phone hacking). For use of corporate correspondence offices for toll calls, one of the real tests is to unknowingly see the screen. Misuse of authorization codes for different types of businesses is a matter of significant concern. Toll fraud can be with TDM and IP based voice frameworks, from any representatives who try to make free calls to programmers, any telephone infrastructure can be helpless. Despite this, call logging programming can help solve this problem to ensure that the phone framework is not traded. Call logging involves holding call records, storing them in a database, and then fixing them by the method of a reporting interface.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Call logging can track the wrong presentation of programming toll and can warn and report exceptional phone action. As a monitoring of VoIP requirements, programming annexes give warning to the supervisor of any suspicious calling movement. It covers the global front of the line, the travel lines, the excitement services, the services being grown, and this is just the beginning, in the period of terrorism, it is paramount to follow the call.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Reports prepared by call logging programming can be used to create commercial impact with additional mixed programming modules. The information of the phone call can be gathered and may be broken up for various purposes for the maintenance of expenses. By taking a disturbance in these records, a business can understand the double-mindedness of the toll and simultaneously screen the price of the call and can take important steps to reduce such tasks. It is also imaginable to detect the amount of unused or abusive incidents in a system.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Call logging enables the merchants to increase the execution of workers by examining how fast the inbound calls are detected by traders. The use of this information can be used to prepare and order employees to eliminate additional profits. Being a real concern of security, it is important to choose the right telephony framework, for example, Cisco phones and mit folks offer call logging features to help avoid the dangers, for example, toll fraud Cisco IP The phone emphasizes the interchange framework, which provides a secure structured system to the client.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 21px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;&quot;&gt;
Counteractive Action is Superior to Cure:&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what practical measures can the telecommunications or IT administrators take to help in the wrong way, hoping to be an alternative casualty?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;One of the best ways to increase the security of telephony framework includes an extraordinary one:&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; margin: 0px 0px 20px 40px; padding: 0px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Station benefits and confinements&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Voice and information calling examples&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Public and private system steering access&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Automatic way determination&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Software characterized systems&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;Private exchanged and pair systems&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;letter-spacing: 0.7px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;letter-spacing: 0.7px;&quot;&gt;The design of your PBX has been evaluated in light of the known programmer methods in various measures, and looking at part of the arrangement against the best practice and seeing any administrative pre-requisites related to your industry sector.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;letter-spacing: 0.7px;&quot;&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Guarantees change the default voicemail and support passwords and make an estimate using a predefined password.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Confirm that the system continually confirms changes in headlines and guarantees that the approach is authorized.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To present a notice of suspicious action on your PBX, presenting a call logging result is a convenient solution and one that can often bear the cost of unexpectedly strikage warning costs. Auditing existing PBX control works which can be in danger or may allow slips, whatever&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Be aware that many voice screens now have an IP address and are thus related to your information system - evaluate what you need to purchase the department of both systems. Security Exposures can come in the same way because different PBX stages have joined the corporate system or are connected to interconnectivity with the existing provisions.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Research and investigation of work structure shortcomings - Including explanatory discoveries, suggesting, prioritizing and eliminating or eliminating the need for conclusions - and executing standard calendars of searching against server administration packs, patches, hot-fixes and transit programming.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Call logging programming is used by many businesses around the world so that they can view phone calls, cut costs, and see the prices and benefits of payroll. In this way, small and medium enterprises should think about putting resources into call logging software with the fundamental high calling action.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Good phone systems are very useful when doing business in any company, business owners, employees, owners, owners and owners of the company&#39;s goods and services, use the phone system to communicate with each other to process the goods and services Easy to make and easy to provide to their customers. Customers will ask questions through phone and give their opinions. This service makes distribution more professional and many customers will prefer a company with a good phone structure and this will increase profits in the business.&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/492245143487686765/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/how-to-protect-your-business-from.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/492245143487686765'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/492245143487686765'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/how-to-protect-your-business-from.html' title='How to Protect Your Business from Mobile Hackers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg89_z25QiR_eeWnH9lNODeCuc3BIqQ_ides9uepyY2TmqRUlESdZzCj9Z2cm7EYgTHKGCdy1qPwANsPa9_Uu0AUbTOdrzFA3_SfxLkiU46Br4eE0baBSWhWNOp4Ik6iKR0ak_aIO6qgUA4/s72-c/PicsArt_07-05-11.39.54.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-1285244219337892250</id><published>2017-07-03T08:04:00.001-07:00</published><updated>2017-12-05T06:37:15.428-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>There Is A New Feature In Whatsapp (Latest Update 2017)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirW0Hn__xquB6w_LMQL66Z8di7aTKvXnXvL0qhKJGvjcPc4-UYtm0SUqY-1oC8yJbIAeN8d4D1PJrP37wgJrLTPhtZa_DDjY74wcv6qlxeNpoVsCUn1V-G8FL0BThdxhhYgFSUg_ChhhpQ/s1600/There+Is+A+New+Feature+In+Whatsapp+%2528Latest+Update+2017%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirW0Hn__xquB6w_LMQL66Z8di7aTKvXnXvL0qhKJGvjcPc4-UYtm0SUqY-1oC8yJbIAeN8d4D1PJrP37wgJrLTPhtZa_DDjY74wcv6qlxeNpoVsCUn1V-G8FL0BThdxhhYgFSUg_ChhhpQ/s400/There+Is+A+New+Feature+In+Whatsapp+%2528Latest+Update+2017%2529.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;As time passes and we are increasingly using all types of technology, especially mobile devices are still common today. Therefore, the popular and most widely used instant messaging app Whatsapp is about to bring a new and game-changing feature to enhance user experience.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: georgia, times new roman, serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;a href=&quot;http://www.pngzip.com/&quot;&gt;DONT FORGET TO VISIT PNGZIP.COM&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;As time consumes and we are increasingly using all types of technology, especially mobile devices are still common today, there are many applications and platforms, which have opted to start night mode between its operations. is.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This is something we&#39;ve seen in the popular YouTube video portal in the last few months, for example, or in the latest update of Windows 10, Creator Update We spend large numbers in front of the devices screen, so it is possible that this is also the best possible damage in our eyes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Okay, lately, the application of instant messaging excellence, Whatsapp will have in your near night mode in the near future, though, although yes, about the tools we&#39;ve talked about earlier, a lot different Will be the attitude. At this point, it is worth noting that in this case, we refer to a night mode which will focus on working with the device&#39;s camera where we have installed the instant messaging app, of course, whatsapp.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Whatsapp will have a night mode option for the camera&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;It should be kept in mind that the camera is one of the most used elements in this type of platform, whether it is time or in which case we are.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Well, thanks to the new night mode so that more responsible people can be included in this application, when we use the camera in a low light photographic environment, we can get better results.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The truth is that after a brief announcement, at the moment, we do not currently know more about this, how we improve the quality of the pictures we take in low-light environments, we will see later and discuss. But it is undoubtedly obvious that the owners of Facebook and Whatsapp show with this kind of movement that the camera is being used more effectively, while we talk to our contacts and we share snapshots, even when the situation for it Most did not have the appropriate.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/1285244219337892250/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/there-is-new-feature-in-whatsapp-latest.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1285244219337892250'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1285244219337892250'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/07/there-is-new-feature-in-whatsapp-latest.html' title='There Is A New Feature In Whatsapp (Latest Update 2017)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirW0Hn__xquB6w_LMQL66Z8di7aTKvXnXvL0qhKJGvjcPc4-UYtm0SUqY-1oC8yJbIAeN8d4D1PJrP37wgJrLTPhtZa_DDjY74wcv6qlxeNpoVsCUn1V-G8FL0BThdxhhYgFSUg_ChhhpQ/s72-c/There+Is+A+New+Feature+In+Whatsapp+%2528Latest+Update+2017%2529.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-575588502157302084</id><published>2017-06-30T09:34:00.002-07:00</published><updated>2017-06-30T09:34:55.982-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Do You Know?"/><category scheme="http://www.blogger.com/atom/ns#" term="Gadgets"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>This Mobile Phone Can Make Calls Even Without A Battery</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhORtdascI7VY11q_SrBS6U-QDInuVd2N71ebQch6iFLqrct2pEB7QoJWl96dsIoA9BwuvidV7CBU3_Ko-zSvXGrKQfxdzuMAsoZxOJsc2hdoZAMnjk7uFxL-Mqw1ReilwKD714Gqb36Cr/s1600/This+Mobile+Phone+Can+Make+Calls+Even+Without+A+Battery.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhORtdascI7VY11q_SrBS6U-QDInuVd2N71ebQch6iFLqrct2pEB7QoJWl96dsIoA9BwuvidV7CBU3_Ko-zSvXGrKQfxdzuMAsoZxOJsc2hdoZAMnjk7uFxL-Mqw1ReilwKD714Gqb36Cr/s640/This+Mobile+Phone+Can+Make+Calls+Even+Without+A+Battery.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;b&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;b&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Recently, a group of Washington University researchers in Seattle (United States) have built a mobile phone, for which there is no need for a phone to call, because it has the ability to get energy from the air.&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;A group of researchers at the University of Washington in Seattle (United States) have built a mobile phone that does not require batteries to make calls. Because there is the ability to get energy from the air.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The new prototype is the result of one year of work by this team. Its purpose was to be able to call a mobile without batteries, in the end, for which they had to face two major challenges: obtaining the required energy from the environment and reducing the power consumption of a call, which is usually 800 mg&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First of all, researchers focused on resolving the issue of communication. For this, the prototype is based on a technique called backscatter, a physical phenomenon that reflects the waves, particles or signs from which they come.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;A member of the Washington University researchers group in Seattle (United States), Joshua Smith, comes from working on a startup, a system called &quot;passive WiFi&quot;, which is a digital backscaster for ultra low power WiFi The technology is the equipment However, this system requires a lot of energy for the project.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To solve the problem, secondly, they sought a method to reduce the power consumption of phone calls. The director of this research, Wamsi Tala, said, &quot;Conversion of analog human voice consumes a lot of energy in digital signals&quot; &quot;It is more efficient to use analog technology.&quot; Thus, although the prototype uses digital signals to dial the number, but the backscitter process of voice calls is analog.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;For example, the use of some remote components to save mobile energy without battery, for example, there is a base station with the circuit for the conversion and connection of the digital network, which is currently Skype prototype only active with fixed frequencies And can not be separated from the base of more than 15 meters.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;It is necessary to enable domestic WiFi routers or traditional telephony towers for business development without phone. However, there is still a long way to go. The first step is to improve the quality of the call and create a new prototype with an efficient electronic ink screen for text message.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So, what do you think about this amazing project? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/575588502157302084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-mobile-phone-can-make-calls-even.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/575588502157302084'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/575588502157302084'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-mobile-phone-can-make-calls-even.html' title='This Mobile Phone Can Make Calls Even Without A Battery'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhORtdascI7VY11q_SrBS6U-QDInuVd2N71ebQch6iFLqrct2pEB7QoJWl96dsIoA9BwuvidV7CBU3_Ko-zSvXGrKQfxdzuMAsoZxOJsc2hdoZAMnjk7uFxL-Mqw1ReilwKD714Gqb36Cr/s72-c/This+Mobile+Phone+Can+Make+Calls+Even+Without+A+Battery.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-214290578099303786</id><published>2017-06-30T09:21:00.002-07:00</published><updated>2017-06-30T09:21:09.934-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>Anonymous Claims That NASA Is About To Announce Evidence Of Alien Life</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-style: italic; font-weight: 600; line-height: 26px; margin-bottom: 26px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZdOEkP0pVU-X1CUKZ_dKqnYqFvLtOLgaoVJ2heFyGSnHyu2UsCujYIWQdKwaKFHl5H4RRLELeTCX6pyG_lDKKqj9sFlnByzvRHtgiMy9cWCFwELEtGQF2mvW4KZMy8MsKRVuCzmTs1iKq/s1600/Anonymous+Claims+That+NASA+Is+About+To+Announce+Evidence+Of+Alien+Life+%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZdOEkP0pVU-X1CUKZ_dKqnYqFvLtOLgaoVJ2heFyGSnHyu2UsCujYIWQdKwaKFHl5H4RRLELeTCX6pyG_lDKKqj9sFlnByzvRHtgiMy9cWCFwELEtGQF2mvW4KZMy8MsKRVuCzmTs1iKq/s640/Anonymous+Claims+That+NASA+Is+About+To+Announce+Evidence+Of+Alien+Life+%25281%2529.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-style: italic; font-weight: 600; line-height: 26px; margin-bottom: 26px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;The popular hacking group, Anonymous which is well-known for declaring war on ISIS or for filtering data from the Police, says that NASA (National Aeronautics and Space Administration) would be about to announce that it has evidence of extraterrestrial life.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; box-sizing: border-box; line-height: 26px; margin-bottom: 26px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The popular hacking group, known for its declaration of war against ISIS or filing data from the police, says NASA has been declaring that she has evidence of supernatural life.&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The revelation has been done through a video that has been published through a YouTube affiliate channel and has already gathered near one million scenes. Anonymous&#39;s video exposes for more than 12 minutes of logic. If you have not seen it yet, then we will leave it to see.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/HGh8n1XxDrg/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/HGh8n1XxDrg?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The hacker group does not support such a solid argument on solid evidence, but it is overcome by very famous interpretations and evidence. According to him, the spatial discoveries of recent years allow us to be optimistic about the existence of a supernatural life.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;First, in April, it was announced that the Cassini spacecraft had detected hydrogen in the Moon&#39;s Aselladus in Saturn, which, according to scientists, is a missing component for the port of micro-organisms on the seashore. On the other hand, Anonymous explains that lately, 10 planets can be discovered by Kepler satellite, which is another clue for them.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;In addition, the video quoted Thomas Zürbchen, Director of Science Mission in NASA, who said during the hearing of the US Congress about progress in the search for the life of the month of April: -&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;Our civilization is about to uncover the evidence of supernatural life in the universe. In connection with the various activities and missions which are in search of supernatural life, we are about to make one of the unprecedented&quot; deepest discoveries in history &quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;However, in his speech, Zurbuchen refers to the progress of human race&#39;s ability to discover life, and not to prove the existence of an external world for existence. In fact, in its announcements, when it was found that the Solar System Tropist-1 specifically spoke about the following: -&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;Although we have not seen signs of life anywhere else at this time, there is a marked progress in our quest and astrology is focusing on the growing stars of NASA. For astrology, the answer to this question is,&quot; What is there? &quot;There will be scientific progress in many different areas of science, in which presently are not involved in this exciting effort.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Therefore, claiming anonymity is more than suspicion that NASA will present proof of short-term extraatrical life.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; line-height: 26px; margin-bottom: 26px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/214290578099303786/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/anonymous-claims-that-nasa-is-about-to.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/214290578099303786'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/214290578099303786'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/anonymous-claims-that-nasa-is-about-to.html' title='Anonymous Claims That NASA Is About To Announce Evidence Of Alien Life'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZdOEkP0pVU-X1CUKZ_dKqnYqFvLtOLgaoVJ2heFyGSnHyu2UsCujYIWQdKwaKFHl5H4RRLELeTCX6pyG_lDKKqj9sFlnByzvRHtgiMy9cWCFwELEtGQF2mvW4KZMy8MsKRVuCzmTs1iKq/s72-c/Anonymous+Claims+That+NASA+Is+About+To+Announce+Evidence+Of+Alien+Life+%25281%2529.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-7089395758622189947</id><published>2017-06-29T09:27:00.000-07:00</published><updated>2017-06-29T09:29:34.122-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Do You Know?"/><category scheme="http://www.blogger.com/atom/ns#" term="Gadgets"/><title type='text'>This Mini Pocket PC Runs Windows 10 &amp; Ubuntu Linux</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUkgiacsR32l8Pe5H0N185VYgJH4FQ8N-WFQvH6DxaklUggfzQl4z2jOeEhhzfIDdJDQt42joGldyVlMAQaLhq6b1i8WmKLW9pwRtnZ53773vxI9yOIX1ykXhUQVDz_Bg6IFlIALU7owdA/s1600/GPD+Pocket+Mini+Laptop+Up+For+Pre-Order+For+%2524399.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUkgiacsR32l8Pe5H0N185VYgJH4FQ8N-WFQvH6DxaklUggfzQl4z2jOeEhhzfIDdJDQt42joGldyVlMAQaLhq6b1i8WmKLW9pwRtnZ53773vxI9yOIX1ykXhUQVDz_Bg6IFlIALU7owdA/s640/GPD+Pocket+Mini+Laptop+Up+For+Pre-Order+For+%2524399.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 18px; font-style: italic; font-weight: 600; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Recently, GPD has launched a campaign on Indiegogo for its GPD Pocket laptop which is actually a 7-inch pocket computer powered by Intel Atom processor. As we told that it is a pocket PC, it means you can easily carry it around in your pocket and not only that even it runs Windows 10 and Linux as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;You do not remember, but there was a time when the word &quot;Pocket Computer&quot; was popular, the idea of ​​putting a hand in a jacket and carrying a mini-pocket laptop with which to work and answer the email was looking at the future of computing Was there.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;However, when we think of a 7-inch screen, the idea that comes to us will be of a tablet and at least no PC will be there. Now that we have a smartphone that is capable of doing everything, then the idea is old. But this does not mean that it does not continue to be possible&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;But the truth is that this is a proposal that exists and one of them is what we know today. Yes, you will be surprised by the communication features and interfaces which integrates Pocket GPD.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Pocket GPD actually came out of a crowded campaign in comparison to a strong, powerful, yet small size option, as well as large laptops like the MacBook or Surface. Pocket GPD is the first laptop that assures us that mobile computing is possible. In fact, this is the first time in more than a decade that this concept can really be true as we wanted, in addition to this, this small computer will still be able to give the user the desired operating system between Ubuntu 16.04 LTS or Windows 10 Offers the possibility of choosing.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Pocket computer that is more than a smartphone with keyboard&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The pocket computer really is, because the GPD Pocket is a notebook with only 180 × 106 × 18.5 mm and weighing 480 gms. Let&#39;s be clear that this is not the smartphone that uses the desktop interface on Android. Yes, this is the real computer, with a real keyboard and desktop operating system.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;Specifications&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;In terms of technical specifications, Pocket GPD has an internal storage of 8 GB RAM and 128 GB eMMC, with Intel Atom X 7-Z 8750 processor and Intel HD graphics graphics card.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The screen is only 7 inches, which has 16:10 aspect ratio and 1920 x 1200 pixel resolution. This screen is tangent and has the specialty of having protection Gorilla Glass 3.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Wi-Fi 2.4 and 5.0 GHz (802.11A / B / G / N / AC) and Bluetooth 4.1 are available. As a communication interface, it also has USB Type-C and USB Type-A3.0, which has an HDMI port and audio port for 3.5mm jacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The keyboard is QWERTY and has an integrated TrackPoint in it. For batteries, there is a huge 7000 mAh in it, which is non-remo&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;vable and, according to the manufacturer, this Pocket PC should have up to 12 hours of battery life.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc33gNuNHVqPYykTHjaJu9PSbqEhXLn0FWKEMgxR8KlTgwQd7VDfF5QAFgR_aW0b7NAAT6IGTEmEBboqRtpzGo2P67F2Gx5Kqf2Wd_45KLXLSvHse_-lOlDqp3WI5CHpakfufxOArcysLi/s1600/specifications+of+GDP.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;605&quot; data-original-width=&quot;747&quot; height=&quot;518&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc33gNuNHVqPYykTHjaJu9PSbqEhXLn0FWKEMgxR8KlTgwQd7VDfF5QAFgR_aW0b7NAAT6IGTEmEBboqRtpzGo2P67F2Gx5Kqf2Wd_45KLXLSvHse_-lOlDqp3WI5CHpakfufxOArcysLi/s640/specifications+of+GDP.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Price and availability&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Currently, Pocket GPD is for promotional price of (Rs. 4,98,982) with Windows 10 in the pre-cell phase. With Ubuntu, the value is (Rs. 35,264).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Click here to buy.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;1.&lt;a href=&quot;http://www.geekbuying.com/item/GPD-Pocket-7-Inch-Tablet-PC-Intel-Atom-X7-Z8750-8GB-128GB-375711.html&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Geekbuy&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;2.&lt;b&gt;&lt;a href=&quot;https://www.indiegogo.com/projects/gpd-pocket-7-0-umpc-laptop-ubuntu-or-win-10-os-laptop--2#/&quot; target=&quot;_blank&quot;&gt;Indiegogo&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think of this Pocket PC? Just share your thoughts and ideas in the comment section below.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/7089395758622189947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-mini-pocket-pc-runs-windows-10.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7089395758622189947'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7089395758622189947'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-mini-pocket-pc-runs-windows-10.html' title='This Mini Pocket PC Runs Windows 10 &amp; Ubuntu Linux'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUkgiacsR32l8Pe5H0N185VYgJH4FQ8N-WFQvH6DxaklUggfzQl4z2jOeEhhzfIDdJDQt42joGldyVlMAQaLhq6b1i8WmKLW9pwRtnZ53773vxI9yOIX1ykXhUQVDz_Bg6IFlIALU7owdA/s72-c/GPD+Pocket+Mini+Laptop+Up+For+Pre-Order+For+%2524399.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-1385234619156798417</id><published>2017-06-29T08:47:00.001-07:00</published><updated>2017-06-29T08:48:24.639-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>Petya Is Not A Ransomware, It’s A Destructive Wiper!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuEth0FmcyStFJHRC4JUtvg5EklAhSJvoJOIJ_qmQulvWJVXncEjxkzJuUCc31C5OCTZpEfkPcYHXs7VHKnu3UxzzKIbHnJbDvVGoQTwPfzBo4OSyLG8InYPf3fnYWVYm8xyxCzttOwBVk/s1600/Petya+Is+Not+A+Ransomware%252C+It%25E2%2580%2599s+A+Destructive+Wiper%2521.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuEth0FmcyStFJHRC4JUtvg5EklAhSJvoJOIJ_qmQulvWJVXncEjxkzJuUCc31C5OCTZpEfkPcYHXs7VHKnu3UxzzKIbHnJbDvVGoQTwPfzBo4OSyLG8InYPf3fnYWVYm8xyxCzttOwBVk/s640/Petya+Is+Not+A+Ransomware%252C+It%25E2%2580%2599s+A+Destructive+Wiper%2521.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-size: 18px; font-style: italic; font-weight: 600; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-size: 18px; font-style: italic; font-weight: 600; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;The Petya ransomware is wreaking havoc across the world. Europe, US, and India are the countries which have been on the target. Researchers claimed that the creator of Petya is not looking to collect money from victims or enterprises.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;When we thought that the destruction of the Vanarae Ranomavar was stopped, then another similar attack was seen in the banks of Ukraine. The latest ransomware, which goes by the name of the patio, is locking the computer of government offices.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;PETA ransomware is going on havoc all over the world. Europe, America and India are some of the countries which are on target Recently, security researchers have come out with the results of the ongoing attack. It is concluded by saying that the chestnut is not a rhinovirus, it is a wiper.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Researchers called Petya as a wiper because it was intended to destroy the data. The researchers claimed that the creators of the box are not trying to collect money from victims or enterprises.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The thong has been from the last two years. Matt Suiche, founder of Cyber Security firm Comae, examined Petya&#39;s 2016 and 2017 edition and found that the current version is a wiper, Matt Suiche published a long blog post in which he talked about how the box works.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;According to the matte list, the current version of the chest is removing all the first areas of the disk and causes a planned destruction of data. Matt Suiche also explained the difference between wiper and ransomeware, he said: &quot;A wiper will destroy the possibilities of restoring the bus.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The Petya used to overwrite the data on the disc, and it is not read anywhere. The real difference between Petya&#39;s 2016 and 2017 edition is that the 2016 version modified the disc in such a way that it was possible to get back the data. However, the 2017 version makes it impossible to get back the data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;On the other hand, Kaspersky analyzed the installation ID which is displayed on the victim&#39;s screen, which they say is just creating random data. The security firm says that the attacker can not really decrypt the disc after the ransom because there is no decryption key in it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/1385234619156798417/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-petya-ransomware-is-wreaking-havoc.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1385234619156798417'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1385234619156798417'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-petya-ransomware-is-wreaking-havoc.html' title='Petya Is Not A Ransomware, It’s A Destructive Wiper!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuEth0FmcyStFJHRC4JUtvg5EklAhSJvoJOIJ_qmQulvWJVXncEjxkzJuUCc31C5OCTZpEfkPcYHXs7VHKnu3UxzzKIbHnJbDvVGoQTwPfzBo4OSyLG8InYPf3fnYWVYm8xyxCzttOwBVk/s72-c/Petya+Is+Not+A+Ransomware%252C+It%25E2%2580%2599s+A+Destructive+Wiper%2521.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-6029090388438252108</id><published>2017-06-28T09:26:00.003-07:00</published><updated>2017-06-28T23:51:29.340-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>Petya Ransomware Attack: How To Protect Your PC/Laptop?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjShZ2PtTXOlGBycV4OAppNYI1ohRwcEVB2O-eyLz0f4JqBd4pkfTCxq9z4UusMoAYiM6aw9ba2rxhnrdaabEIVxJz19uanTY1OGA1GVjAe6jt5W_US5zAnZr_0OCI2v1LIKKp7SgbgMgiX/s1600/Petya_Ransomeware.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;576&quot; data-original-width=&quot;1024&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjShZ2PtTXOlGBycV4OAppNYI1ohRwcEVB2O-eyLz0f4JqBd4pkfTCxq9z4UusMoAYiM6aw9ba2rxhnrdaabEIVxJz19uanTY1OGA1GVjAe6jt5W_US5zAnZr_0OCI2v1LIKKp7SgbgMgiX/s640/Petya_Ransomeware.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;The latest ransomware, named Peta, is locking the computer of government offices and is already affecting the Chernobyl nuclear plant and the electricity supplier of Ukraine. Security researcher Amit Sapper found a move against Petia Ransomware to protect his computer.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Last month, we have broadcast WannaCry ransomware at a very fast pace and infected thousands of computers all over the world. Recently, similar attacks were seen in Ukraine banks, the new rainmovie campaign has taken Ukraine banks offline.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The latest randomware attack is locking the computers of government offices and has already influenced the Chernobyl nuclear plant and the electricity supplier of Ukraine.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The latest RandomWare named Petty has infected 60% of computers in Ukraine, after 30% in Russia. The United States, Poland, Britain, Germany and France had recorded the remaining 10% of the infection.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;It is said that Petya Ransomware takes advantage of the Infinite Blue vulnerability, which is used by the creators of VKK ransomware to use the same risk.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;However, the thong queue software works in a different way. After the transition, this system resides for approximately 10 to 60 minutes, and then restarts the system using &#39;at&#39;, &#39;scoot&#39; or &#39;shutdown.exa&#39; utilities. Once rebooted, Ransomware starts to encrypt the MFT table in NTFS partitions and overwrites the MBR with the folder that contains the denial notes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;If you want to read the full details on how Petya Ransomware works, you need to visit&amp;nbsp;&lt;/span&gt;&lt;a data-wpel-link=&quot;external&quot; href=&quot;https://securelist.com/schroedingers-petya/78870/&quot; rel=&quot;nofollow external noopener noreferrer&quot; style=&quot;background-color: white; box-sizing: border-box; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Kaspersky’s Securelist blog&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;. According to the reports from&amp;nbsp;&lt;/span&gt;&lt;a data-wpel-link=&quot;external&quot; href=&quot;https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/&quot; rel=&quot;nofollow external noopener noreferrer&quot; style=&quot;background-color: white; box-sizing: border-box; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Bleeping Computer&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;, Security researcher Amit Serper had somehow managed to find a trick to defend your computer against Petya ransomware.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , sans-serif; font-size: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Amit&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Serper&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , sans-serif; font-size: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;analyzed the functioning of the box-ransomware and found that if it finds a local file on a disc, its silkwormer will end its encryption process. The findings have been confirmed by some other researchers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Step 1.&lt;/b&gt; First of all, you have to enable Windows extensions. For this, you need to open the folder options and then uncheck the option &#39;Hide extensions for known file types&#39;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2fq8HqEfDyWXgkA0E56ZXod_roJSPPmZFKM_v-6rrsUgSPKl-EdqIEsDCqomLGdTgD5RenZH5AVZLVh_6fgBRrJStCavQBs3Am090J3DVHchuDKsMWYWzpMzj6428PPmF99ajPddu1IrO/s1600/imz1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;800&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2fq8HqEfDyWXgkA0E56ZXod_roJSPPmZFKM_v-6rrsUgSPKl-EdqIEsDCqomLGdTgD5RenZH5AVZLVh_6fgBRrJStCavQBs3Am090J3DVHchuDKsMWYWzpMzj6428PPmF99ajPddu1IrO/s400/imz1.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Step 2.&lt;/b&gt; Now you have to go to C: \ Windows and you need to find the Notepad.exe program&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipCUFmcJ3NwkWbXGvclG61jPywnbhPnNmO9zxakK5CmR5wIWKNKyOXHqhATD6GYmbon0Ez39hZnf0MCBe0334qKOoW1VTDOzeu8VAu37Y1cxQ2Cm89li4ZessSuNGTCs2THz7UVOhyRAOP/s1600/Untitled+design+%25284%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;800&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipCUFmcJ3NwkWbXGvclG61jPywnbhPnNmO9zxakK5CmR5wIWKNKyOXHqhATD6GYmbon0Ez39hZnf0MCBe0334qKOoW1VTDOzeu8VAu37Y1cxQ2Cm89li4ZessSuNGTCs2THz7UVOhyRAOP/s400/Untitled+design+%25284%2529.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Step 3.&lt;/b&gt; You have to copy and paste the file into the same folder. Select the file and then press CTRL + C to copy and paste using CTRL + V.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Step 4.&lt;/b&gt; Now you will see a new Notepad-copy. You must enter perfc and hit to rename the file. You will be promoted to ensure that you want change or not, just click Yes to continue.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj99SjZW5-5QoyJh42dOTdjoMpzRAaeXpFnL6AJ8Ow4bG1Ug1_QHeIU2QJw0hYfLz_HloAtmib5x_9qGK6Cs6n2zmCF7O2GYN05_Ff9kUE01ARyQr3KKI95JLjXugxXiD7-iGH6PxLi6UMj/s1600/Untitled+design+%25285%2529.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj99SjZW5-5QoyJh42dOTdjoMpzRAaeXpFnL6AJ8Ow4bG1Ug1_QHeIU2QJw0hYfLz_HloAtmib5x_9qGK6Cs6n2zmCF7O2GYN05_Ff9kUE01ARyQr3KKI95JLjXugxXiD7-iGH6PxLi6UMj/s400/Untitled+design+%25285%2529.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Step 5.&lt;/b&gt; Now click on the file and click on &#39;Properties&#39; and under Properties, select the &#39;Read-Only&#39; option and then click Apply and then OK.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This is for you to protect your computer, which is against Petya ransomware Share this post with your friends so that they can secure their computer. So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/6029090388438252108/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-latest-ransomware-named-peta-is.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6029090388438252108'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6029090388438252108'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-latest-ransomware-named-peta-is.html' title='Petya Ransomware Attack: How To Protect Your PC/Laptop?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjShZ2PtTXOlGBycV4OAppNYI1ohRwcEVB2O-eyLz0f4JqBd4pkfTCxq9z4UusMoAYiM6aw9ba2rxhnrdaabEIVxJz19uanTY1OGA1GVjAe6jt5W_US5zAnZr_0OCI2v1LIKKp7SgbgMgiX/s72-c/Petya_Ransomeware.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-3004130659387471826</id><published>2017-06-28T04:15:00.002-07:00</published><updated>2017-06-28T04:15:14.490-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>How Hacks CIA Computers That Are Not Connected To The Internet</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij5V4ts9-8xKNuBiAaLWXAgVIsoHDBvlfNbRsiXopQie-Vzj7EWMDLA-4fDTqAI8ip2DuvSE30-h14GP-X6LJxzTQL9fzAEevSJ1CEJh_LQK7zfWBTN82d71i8uivn4rntZaw5ysYCnsiP/s1600/How+hacks+CIA+computers+that+are+not+connected+to+the+internet.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij5V4ts9-8xKNuBiAaLWXAgVIsoHDBvlfNbRsiXopQie-Vzj7EWMDLA-4fDTqAI8ip2DuvSE30-h14GP-X6LJxzTQL9fzAEevSJ1CEJh_LQK7zfWBTN82d71i8uivn4rntZaw5ysYCnsiP/s640/How+hacks+CIA+computers+that+are+not+connected+to+the+internet.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;span style=&quot;font-weight: 600;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;span style=&quot;font-weight: 600;&quot;&gt;&lt;i&gt;WikiLeaks has published another group of secret documents throwing light on the CIA&#39;s hacking operation. The latest document has 150 pages and they have mentioned CIA&#39;s malware toolkit, which is called cruel kangaroo.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;span style=&quot;font-weight: 600;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First, we have seen the anti-privacy organization, WikiLeaks has published more than thousands of documents, which they called &quot;sophisticated software tools&quot; used by the Central Intelligence Agency.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Documents show that the CIA can turn your TV into a mic, hack into a computer, bypass the encryption system in some popular chat apps and can do a lot more. Now, WikiLeaks has published a secret document which throws light on the CIA&#39;s hacking operation.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The latest document has 150 pages and they have mentioned CIA&#39;s malware toolkit, which is called cruel kangaroo. Cruel Kangaroo is able to take control of air-cooling computers using special USB drives.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to WikiLeaks reports, cruel kangaroo components have created a custom network within the closed target of the network, making the job easier.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The cruel Kangaroo project has four components - the running time frame, which is a thumb drive transit tool, Shattered Assurance, which is a server tool that operates the automatic transition of thumb drives, Broken promises, which are a postprocessor that collect information and shadow Evaluates which is the primary firmness mechanism&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Cruel Kangaroo uses a Windows operating system vulnerability, which can be used to manually handwrite link files to infect the USB thumb drive. Once the infected drive is inserted into the victim&#39;s computer, in which the dripping deadline designates the named component malware.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After the transition, the component scans and transmits other connected computers to the shadow network. Finally, a broken promise scans the data from devices with air-gap and exposes it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Therefore, if we unite all components of cruel kangaroo, then it becomes a very useful tool to hack air-gapped devices. You can get more information about cruel kangaroo from &lt;b&gt;&lt;a href=&quot;https://wikileaks.org/vault7/#Brutal Kangaroo&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/3004130659387471826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-hacks-cia-computers-that-are-not.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3004130659387471826'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3004130659387471826'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-hacks-cia-computers-that-are-not.html' title='How Hacks CIA Computers That Are Not Connected To The Internet'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij5V4ts9-8xKNuBiAaLWXAgVIsoHDBvlfNbRsiXopQie-Vzj7EWMDLA-4fDTqAI8ip2DuvSE30-h14GP-X6LJxzTQL9fzAEevSJ1CEJh_LQK7zfWBTN82d71i8uivn4rntZaw5ysYCnsiP/s72-c/How+hacks+CIA+computers+that+are+not+connected+to+the+internet.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-7742479433506132709</id><published>2017-06-27T04:55:00.002-07:00</published><updated>2017-06-27T04:55:38.525-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>US Government Websites Hacked By Anti-Trump, Pro-ISIS Group</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXucwWIiPZAoBfNiUCg8h_JoRk2Wnd98SANcG-WTf4Tobhg-fldT1MgFAs5Jl6f3fDfq0z_Z0rYTD20fOGen5X3qkhrT-r7D4_g0f37fH64rfRpu4tM0AGtCZsK1IFPEI2wd0-q-BcdGsY/s1600/Ohio+Government+Websites+John+Cassich+and+Howard+County%252C+Maryland+were+the+first+two%252C+who+were+cut+off+on+Sunday+morning.+Some+reports+have+said+that+some+hacking+attempts+were+made+in+the+Ohio+Department+of+Ohio+Reh.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXucwWIiPZAoBfNiUCg8h_JoRk2Wnd98SANcG-WTf4Tobhg-fldT1MgFAs5Jl6f3fDfq0z_Z0rYTD20fOGen5X3qkhrT-r7D4_g0f37fH64rfRpu4tM0AGtCZsK1IFPEI2wd0-q-BcdGsY/s640/Ohio+Government+Websites+John+Cassich+and+Howard+County%252C+Maryland+were+the+first+two%252C+who+were+cut+off+on+Sunday+morning.+Some+reports+have+said+that+some+hacking+attempts+were+made+in+the+Ohio+Department+of+Ohio+Reh.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;Some of Ohio&#39;s official websites were haCked by a hacking group on Sunday, the team system calling DZ. The hacking group criticized President Donald Trump and strengthened the Islamic State.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the weekend some government websites related to the United States were hacked on Monday late night and less hacking efforts were filed on Tuesday.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Some of Ohio&#39;s official websites were hacked by a hacking group on Sunday, the team system calling DZ. The hacking group criticized President Donald Trump and strengthened the Islamic State.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The Hacking Group, which is calling Team System DZ has dissolved the index page of government websites with ISIS and anti-Donald Trump messages. Not only this, the hacking group has also President Donald Trump had warned against his strategy against Muslims.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Ohio Government Websites John Cassich and Howard County, Maryland were the first two, who were cut off on Sunday morning. Some reports have said that some hacking attempts were made in the Ohio Department of Ohio Rehabilitation and Reform, Ohio First Women, Workplace Change, Ohio Governor and Health Change Office and Medicaid.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Websites have separated compromised websites with a black wallpaper, which shows an Arabic symbol, with an Islamic call to pray in the background. Perverted websites included a warning for Donald Trump and all Americans&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Messages on distorted websites &quot;You will be held responsible for every drop of blood flowing from the Muslim countries, you and all your people&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;However, most of the websites have been restored. The Ohio authorities have contacted the FBI to investigate. Ohio Administrative Services spokesman Tom Hot said, &quot;All affected servers are offline and we are investigating how these hackers can cover these websites. We are also working with law enforcement to understand this better That &quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Okay, I&#39;ll tell you that the Hacking Group Team System Dies is on air since November 2015. Already have targeted websites that are related to Spanish and French officials.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/7742479433506132709/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/us-government-websites-hacked-by-anti.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7742479433506132709'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7742479433506132709'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/us-government-websites-hacked-by-anti.html' title='US Government Websites Hacked By Anti-Trump, Pro-ISIS Group'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXucwWIiPZAoBfNiUCg8h_JoRk2Wnd98SANcG-WTf4Tobhg-fldT1MgFAs5Jl6f3fDfq0z_Z0rYTD20fOGen5X3qkhrT-r7D4_g0f37fH64rfRpu4tM0AGtCZsK1IFPEI2wd0-q-BcdGsY/s72-c/Ohio+Government+Websites+John+Cassich+and+Howard+County%252C+Maryland+were+the+first+two%252C+who+were+cut+off+on+Sunday+morning.+Some+reports+have+said+that+some+hacking+attempts+were+made+in+the+Ohio+Department+of+Ohio+Reh.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-6211757814607746092</id><published>2017-06-27T04:35:00.002-07:00</published><updated>2017-06-27T04:35:38.551-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>How To Spy On Whatsapp Messages</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Ys3DjnigYPZs3_aDQK239OE5iJzPfPfXP74S-EYkBEG3bapLtxW0PX6u778ivoj1pLk4fjfKTnumyu5RJwJChAc8VIkqJz-MNDeG457hROnA6CAzg5AZShDIlBIx32tWrw37RKLoe_gk/s1600/Spy+WhatsApp+Messages.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Ys3DjnigYPZs3_aDQK239OE5iJzPfPfXP74S-EYkBEG3bapLtxW0PX6u778ivoj1pLk4fjfKTnumyu5RJwJChAc8VIkqJz-MNDeG457hROnA6CAzg5AZShDIlBIx32tWrw37RKLoe_gk/s640/Spy+WhatsApp+Messages.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;In addition to the most widely used IM applications Whatsapp, it has become a favorite place for cheaters to exchange secret messages and maintain illegal relationships. So, if you are looking for a Whatsapp spy device to check the truth about your partner or children, then this post can definitely help you!&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; box-sizing: border-box; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px; text-align: left;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Verdana, sans-serif;&quot;&gt;Ways to Spy on WhatsApp&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Some potential ways to spy on WhatsApp messages are described below:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #660000; font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;1. WhatsApp Spy Using A Spy App: Easy Way&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Most of all are the easiest way to spy on WhatsApp messages while using a spy app. Although most companies are selling bad &lt;b&gt;Whatsapp spy&lt;/b&gt; app nowadays, however, there are some real people who are worth considering. One of my favorite apps to spy on Whatsapp is &lt;a href=&quot;https://www.spystealth.com/whatsapp-tracking-app.html&quot; target=&quot;_blank&quot;&gt;SpyStealth Premium&lt;/a&gt; which is known for its quality and top notch features.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR-19uJ-PU1RV0UAlwlBzVo51p1RPaabhyn8nEutkr37ALSsAzrV_ENmJuheTz0_JcfT0a-fYUC8ZMZNtFHsfjLozs_h9rxFnFl235zAfSBvkCtOEw3IMHNFKesUPkHngjRnTy2tBYOIVv/s1600/SpyStealth.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;150&quot; data-original-width=&quot;486&quot; height=&quot;122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR-19uJ-PU1RV0UAlwlBzVo51p1RPaabhyn8nEutkr37ALSsAzrV_ENmJuheTz0_JcfT0a-fYUC8ZMZNtFHsfjLozs_h9rxFnFl235zAfSBvkCtOEw3IMHNFKesUPkHngjRnTy2tBYOIVv/s400/SpyStealth.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;https://www.spystealth.com/whatsapp-tracking-app.html&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;206&quot; data-original-width=&quot;652&quot; height=&quot;63&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCHH6wpD1PbGNK_LDyDQr0ErMnuJlAt5Z-QLY1zLQT353JXoZxeGppUeMGycojsI5lx0QkH9MHt_PjrgqtZ7gfBSBYfXCUdrJtcjge9dOpR5srsIRS7UNhhLZQ1x9LusrUjZ6bUpue6r7W/s200/Download-Now-1.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.spystealth.com/whatsapp-tracking-app.html&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;span style=&quot;color: red; font-family: Verdana, sans-serif; font-size: large;&quot;&gt;&lt;b&gt;How It Works?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step-1:&lt;/b&gt; Download the app on the target phone where you need to spy on Whatsapp messages.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step-2:&lt;/b&gt; Install and configure the application so that you must have the target phone for at least a few minutes in your hand.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step 3:&lt;/b&gt; Now, the WhatsApp monitoring process will start and the logs entered can be accessed from your online account.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;SpyStealth Premium Features:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In addition to WhatsApp Spying, there are some other features of SpyStealth Premium:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Spy on WhatsApp messages and chat&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;WhatsApp spy on group messages&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Spy on internet activity including social media like Facebook, WhatsApp, Twitter etc.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;GPS spot spying in real-time&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Spy on WhatsApp Contacts&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Monitor keystrokes, photos, and videos&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Spy operation works in a complete stealth mode and thus becomes invisible!&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;color: #990000; font-family: Verdana, sans-serif;&quot;&gt;SpyStealth See Premium Demo&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;View live demo of SpyStealth Premium with the following link:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.spystealth.com/demo.html&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;143&quot; data-original-width=&quot;500&quot; height=&quot;91&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeAbNNMpxFx8Gcyu3zHtz9m55mO1qkUKxwgdjg9giX1r06oaWpz1phS5PCYVpPBt-jKgldZbE1XJg-Ipwu3XgWI_1dd1fpfJ1VgR0e1s-m4sYbE5YuLAVfYqj4yFIqwK0McQF4HXsrKCR4/s320/watch+now.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;h4 style=&quot;background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;2. Spoofing the MAC Address: The Difficult Way&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
To spy on someone else&#39;s WhatsApp message is another way to cheat the MAC address of the target phone from your phone. This method is considered to be a bit difficult and requires a general amount of technical skills. Let me explain&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
Whatsapp is a small vulnerability that allows you to run the same WhatsApp account on two phones, both of which are the same MAC addresses. For this, you need to have access to the target phone to record your MAC address and cheat on your device. In this way how can you get the MAC address of the target phone:&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h5 style=&quot;background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 19px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;&quot;&gt;
&lt;span style=&quot;color: #990000;&quot;&gt;Finding the MAC Address:&lt;/span&gt;&lt;/h5&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; margin: 0px 0px 20px 40px; padding: 0px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;Android&lt;/span&gt;&amp;nbsp;– Head over to Settings —&amp;gt; About phone —&amp;gt; Status—&amp;gt; Wi-Fi MAC address.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;iPhone&lt;/span&gt;&amp;nbsp;– Head over to Settings—&amp;gt; General —&amp;gt; About —&amp;gt; Wi-Fi address.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;Windows Phone&lt;/span&gt;&amp;nbsp;– Head over to Settings —&amp;gt; About —&amp;gt; More info —&amp;gt; MAC address.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; padding-bottom: 18px;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;BlackBerry&lt;/span&gt;&amp;nbsp;– Head over to options —&amp;gt; Device —&amp;gt; Device and Status info —&amp;gt; WLAN MAC.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;letter-spacing: 0.7px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
After recording the MAC address of the target phone, you have to cheat the MAC address on your Android phone. After this is done, install Whatsapp on your phone, configure it using the target phone number of the phone and verify the Whatsapp account using the verification code received on the target phone.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you successfully manage all of the above steps, then you will replicate the WhitSap account of the target user running on your phone. This means that you will receive notifications on your phone for every activity of the target phone.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Share your thoughts in comment box about this article.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/6211757814607746092/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-spy-on-whatsapp-messages.html#comment-form' title='215 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6211757814607746092'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/6211757814607746092'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-spy-on-whatsapp-messages.html' title='How To Spy On Whatsapp Messages'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Ys3DjnigYPZs3_aDQK239OE5iJzPfPfXP74S-EYkBEG3bapLtxW0PX6u778ivoj1pLk4fjfKTnumyu5RJwJChAc8VIkqJz-MNDeG457hROnA6CAzg5AZShDIlBIx32tWrw37RKLoe_gk/s72-c/Spy+WhatsApp+Messages.png" height="72" width="72"/><thr:total>215</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-7662417034790756001</id><published>2017-06-26T08:39:00.001-07:00</published><updated>2017-06-26T08:40:08.705-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer tricks"/><title type='text'>How to Hack A Computer?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpcEVEw81CDIyCylqzDD4da5oKqyvNOqRYlKaTG7OMeCjdYwB6dDZ9we8hnTi2h4BJ3aZL7Xl-MK_dizlRvgKVClP1tprMw2wI_bnx7NwL0offjMxQRYU7K4DyIL72jyn816E25J6ird6v/s1600/Hack+A+Computer.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpcEVEw81CDIyCylqzDD4da5oKqyvNOqRYlKaTG7OMeCjdYwB6dDZ9we8hnTi2h4BJ3aZL7Xl-MK_dizlRvgKVClP1tprMw2wI_bnx7NwL0offjMxQRYU7K4DyIL72jyn816E25J6ird6v/s640/Hack+A+Computer.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;The question &quot;how to hack a computer&quot; is probably one that is often asked by many internet users and hacking enthusiasts, so, to solve some common questions and doubts on this topic, I have decided to write this article. If you are looking for information in a possible way to hack a computer, then this post can definitely help you.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Does computer hacking actually mean?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Computer hacking is a huge subject and has many different meanings in it. For example, when someone is asked to hack into the computer, it can mean how to break the password of a local or remote computer so that they can gain access. However, hacking is not included in breaking into that computer only if you go deeply, can include things like techniques to bypass authentication of computer hacking system, internet users, computer databases, software programs and so on. Can hack.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Therefore, in order to define in simple terms, computer hacking is meant to gain or exploit its data on exploiting computer data or weakness in the network.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;How can I start a hack?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;To hack a computer, you need to know how computers actually work and learn some basic concepts on this topic. If you are serious and passionate about it, then you can do a moral hacking course that will help you develop skills. You can refer book from internet.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;What skills do I need to hack a computer?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Although there are many ready-to-use tools and programs available on the Internet, you must have at least one computer knowledge to use them. Knowledge of the basics of operating systems, computer networks and their protocols, firewalls and how they all understand these tasks. If you want to take it as a profession and want to become an ethical hacker or penetration examiner, then you have to move a few steps further and learn programming languages ​​like Unix / Linux and programming languages ​​such as C, PHP, Javascript, SQL. e.t.c.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If you are completely new to hacking and only have basic knowledge of computer, then you can refer to the resources available on the Internet easily to develop your skills.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;b&gt;Is computer hacking legal?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Hacking a computer is considered illegal in most cases without the permission of its owner. However, there are many moral hackers who are hiring by big companies and government organizations, in such cases, there are special permissions to break into computers in cases of cyber criminal or terrorist groups. Occasionally the penetration testers are given pre-permission to hook the computer so it is possible that possible vulnerabilities can be found before any other hacker and compromise. In such cases, it is completely legal to hack the computer.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/7662417034790756001/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-question-how-to-hack-computer-is.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7662417034790756001'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/7662417034790756001'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/the-question-how-to-hack-computer-is.html' title='How to Hack A Computer?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpcEVEw81CDIyCylqzDD4da5oKqyvNOqRYlKaTG7OMeCjdYwB6dDZ9we8hnTi2h4BJ3aZL7Xl-MK_dizlRvgKVClP1tprMw2wI_bnx7NwL0offjMxQRYU7K4DyIL72jyn816E25J6ird6v/s72-c/Hack+A+Computer.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-8714785125094881059</id><published>2017-06-26T04:23:00.003-07:00</published><updated>2017-06-26T04:23:56.248-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Special"/><title type='text'>This CIA Tool Can Easily Hack Most Secure Network In the world</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOgNWBffL2NNGbm1A7FrvfzLIUY4_f1jnY9ivWH33g9BVSPoF-Omxw9kd7E_0Mm_Wt_1LM8Mb_BFTLFwSoYV3DO9nFGUD4Ehdup9h60jCmVd0U1qfRytr20CNdCKsd_9chGwR6ZmDKJisW/s1600/CIA+Has+A+Hacking+Tool+That+Can+Hack+World%2527s+Secure+Network.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOgNWBffL2NNGbm1A7FrvfzLIUY4_f1jnY9ivWH33g9BVSPoF-Omxw9kd7E_0Mm_Wt_1LM8Mb_BFTLFwSoYV3DO9nFGUD4Ehdup9h60jCmVd0U1qfRytr20CNdCKsd_9chGwR6ZmDKJisW/s640/CIA+Has+A+Hacking+Tool+That+Can+Hack+World%2527s+Secure+Network.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;Recently, WikiLeaks has released a new installment of the Walt 7 Leak Series on the CIA&#39;s malicious hacking tool to spy on its target. According to the recent leaks of WikiLeaks, the Central Intelligence Agency (CIA) has a malicious tool that can be used to hack the safest network in the world very easily.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;WikiLeaks has released a new installment of the # Vault7 leak series on the CIA hacking tool to spy on its target. This time it is a cruel kangaroo, which is a malware developed by US Central Intelligence Agency to infiltrate into a secure network, known as Air, is composed of computers with Windows as an operating system.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;An air compressor or network is a machine or network that is completely different from the outside for safety protection. For this, they are not connected to the internet or any computer or device, due to which they are more difficult to hack. In addition, there is usually additional security arrangement to prevent the intrusion of external agents.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Examples of air glade equipment or networks are found in machines that process credit or debit card transactions in industrial control systems working with retail, military, or important infrastructure.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to WikiLeaks, the CIA used the cruel Kangaroo to be able to penetrate into these computers or secure networks. It is made up of a set of tools that uses contaminated USB memory to enter the machines to create a custom hidden network within the target network. Once inside, malware is able to execute the code remotely.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Documents leaked by WikiLeaks show that how the CIA managed to infiltrate computers and air-gap networks within an organization, the first step is to infect the computer connected to the Internet within the company, which is called the primary host. Once cruel kangaroo is installed on the initial PC, malware is corrupted with viruses other than any USB memory or removable hard disk that connects.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After this, you have to wait for a member of the organization to use the unit to join the air-gapped network. If there are many computers in the closed network under the control of the CIA, they will create a secret network for the coordination and exchange data of the work, such as the Stuxnet worm.&lt;/span&gt;&lt;br /&gt;
&lt;strong style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;strong style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;&lt;span style=&quot;color: red; font-family: Verdana, sans-serif;&quot;&gt;The Brutal Kangaroo project is composed of several components:-&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; margin-bottom: 26px; padding: 0px; text-align: justify;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; line-height: 26px; margin-left: 21px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Drifting Deadline:&lt;/strong&gt;&amp;nbsp;USB memory infection tool.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; line-height: 26px; margin-left: 21px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Shattered Assurance:&lt;/strong&gt;&amp;nbsp;Server tool that manages the automated infection of storage units.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; line-height: 26px; margin-left: 21px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Broken Promise:&lt;/strong&gt;&amp;nbsp;System that evaluates the collected information.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; line-height: 26px; margin-left: 21px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Shadow:&lt;/strong&gt;&amp;nbsp;A mechanism that acts as a covert C &amp;amp; C network.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; line-height: 31px; margin-bottom: 26px; text-align: justify; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Brutal Kangaroo takes advantage of a Windows vulnerability that can be exploited by links to handmade files that load and execute programs without user interaction.&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So, what do you think about this? Simply share your views and thoughts in the comment section below.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/8714785125094881059/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-cia-tool-can-easily-hack-most.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/8714785125094881059'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/8714785125094881059'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/this-cia-tool-can-easily-hack-most.html' title='This CIA Tool Can Easily Hack Most Secure Network In the world'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOgNWBffL2NNGbm1A7FrvfzLIUY4_f1jnY9ivWH33g9BVSPoF-Omxw9kd7E_0Mm_Wt_1LM8Mb_BFTLFwSoYV3DO9nFGUD4Ehdup9h60jCmVd0U1qfRytr20CNdCKsd_9chGwR6ZmDKJisW/s72-c/CIA+Has+A+Hacking+Tool+That+Can+Hack+World%2527s+Secure+Network.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-1066607957720224629</id><published>2017-06-25T02:42:00.003-07:00</published><updated>2017-06-25T06:26:53.948-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>Airtel Monsoon Surprise Offer: 30GB Free Data For 3 Months</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieASOegredZBQ23iS9s_lI-JuX4EIORTECq6ii9aXxEwcCgna8ASMvdNN8Flyy1B82SEDdrz2pNlAyH4fvL_NxwRRmFS9y9LP34f7-fKo7-FnrFPJVBTIj5uX2s8kRJHMpPinMuUoeG32E/s1600/Airtel+Mansoon+Surprise+Offer.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieASOegredZBQ23iS9s_lI-JuX4EIORTECq6ii9aXxEwcCgna8ASMvdNN8Flyy1B82SEDdrz2pNlAyH4fvL_NxwRRmFS9y9LP34f7-fKo7-FnrFPJVBTIj5uX2s8kRJHMpPinMuUoeG32E/s640/Airtel+Mansoon+Surprise+Offer.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-style: italic; font-weight: 900; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-style: italic; font-weight: 900; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-style: italic; font-weight: 900; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;India’s largest telecom company, Airtel has decided to extend its previously announced “Holiday Surprise” offer for the next 3 billing cycle. The company had announced new Monsoon surprise offer. The company is offering 30GB of free data for three months (10Gb every month) for its postpaid subscribers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-style: italic; font-weight: 900; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Recently, India&#39;s largest telecom company, Airtel has decided to expand its offer for the next 3&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;billing cycle&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;offering the &quot;Holiday&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Surprise&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&quot;. The company had announced the offer of new monsoon surprises.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Offer is available for postpaid users only. Airtel said, &quot;Airtel is increasing the Holiday Surprise Offer by 3 months, which was given to postpaid users earlier. Postpaid customers can claim up to 30 GB.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Let me tell you that the &quot;Holiday Surprise&quot; offer was introduced in April 2017, it was over in July. Now the company has increased the proposal as a new monsoon surprise. Therefore, users have to use another three months till September.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The company has given 30GB free data for three months (10 GB every month) for its postpaid customers, Bharti Airtel CEO, Gopal Vittal has written, &quot;Now as a monsoon perspective, we have another of your data I am happy to tell that we are amazed with data for another 3 months, now you get additional data for 3 more billing cycles.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;All you need to do is claim your surprise on My Airtel app after 1st July, 2017&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZP845ESQhVxXk3_i8Q1bgzstJ13rLJbgB6tLTMrXanQ03-3YUgfHayYRSfXmK_pzip5D2Cn9IB7dCp7qU4z8OC-u9XiNrq6yelpRasAIr9uRurQB55fsBgYD4GYl_-TtOrFwjNWFkeF6A/s1600/airtel-monsoon-offer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;782&quot; data-original-width=&quot;743&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZP845ESQhVxXk3_i8Q1bgzstJ13rLJbgB6tLTMrXanQ03-3YUgfHayYRSfXmK_pzip5D2Cn9IB7dCp7qU4z8OC-u9XiNrq6yelpRasAIr9uRurQB55fsBgYD4GYl_-TtOrFwjNWFkeF6A/s640/airtel-monsoon-offer.jpg&quot; width=&quot;608&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Users need to claim the offer through my Airtel app after July 1st. If you do not have an app then you can download it from &lt;a href=&quot;http://corneey.com/qZlp23&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Just download the offer and claim to enjoy the other three months of free data.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/1066607957720224629/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/airtel-monsoon-surprise-offer-30gb-free.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1066607957720224629'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1066607957720224629'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/airtel-monsoon-surprise-offer-30gb-free.html' title='Airtel Monsoon Surprise Offer: 30GB Free Data For 3 Months'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieASOegredZBQ23iS9s_lI-JuX4EIORTECq6ii9aXxEwcCgna8ASMvdNN8Flyy1B82SEDdrz2pNlAyH4fvL_NxwRRmFS9y9LP34f7-fKo7-FnrFPJVBTIj5uX2s8kRJHMpPinMuUoeG32E/s72-c/Airtel+Mansoon+Surprise+Offer.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-1976861415622435259</id><published>2017-06-24T23:34:00.002-07:00</published><updated>2017-06-25T01:06:27.229-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Tricks"/><title type='text'>How to hack facebook password?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVcdKP7gU5pSdgkqdBNYdBU2VCZUgsnVrCP_4G5yLv-OMNbyoX76SkrDtjmyxfis9WJCMYf-1Xm0-Oxe3fnKPlkws6GkoLRPsEAD4fEt3M_sL6TKSIbzvbNv-TK5EgQepYbfVKrcDRwUY5/s1600/Hack+Facebook+Password.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVcdKP7gU5pSdgkqdBNYdBU2VCZUgsnVrCP_4G5yLv-OMNbyoX76SkrDtjmyxfis9WJCMYf-1Xm0-Oxe3fnKPlkws6GkoLRPsEAD4fEt3M_sL6TKSIbzvbNv-TK5EgQepYbfVKrcDRwUY5/s640/Hack+Facebook+Password.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;In recent years, many people have become popular places to exchange secret messages and manage illicit relations. Therefore, no wonder that many people decide to hack Facebook friends of their loved ones. If you are in a similar situation or just want to hack the password of any Facebook account, then this article is for you.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Recently, many fake hacking websites have popped up on the internet, they usually make false promises to hack Facebook accounts of any account. These sites often ask people to do a survey to complete the password hacking process.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This is only a trick to make quick money by forcing people to take the survey. However, no Facebook password is given to people on completion of the survey. Therefore, I always warn about my fake promises about hacking my scam websites and Facebook.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h2 style=&quot;background-color: white; box-sizing: border-box; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px; text-align: start;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Possible Ways to Hack a Facebook Password:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 16px; letter-spacing: 0.7px; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;There are only TWO ways to hack a Facebook password:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 16px; letter-spacing: 0.7px; text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; letter-spacing: 0.7px; text-align: left;&quot;&gt;&lt;span style=&quot;color: blue; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;1. Using a Keylogger - The Easiest Way To Hack Facebook!&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;ul style=&quot;letter-spacing: 0.7px; text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;A keylogger installed will simply record each and every keystroke that a user types on a keyboard with a Facebook or other account password.&lt;/li&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/ul&gt;
&lt;ul style=&quot;letter-spacing: 0.7px; text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;li&gt;Since there is no special skill required to install and use keylogger, Facebook is the easiest way to hack passwords. I recommend the following keylogger program as best to access Facebook or any other online account:&lt;/li&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;letter-spacing: 0.7px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: purple;&quot;&gt;To Hack Facebook User On PC / Mac:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: white; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQZ7dU9CMtiHRU8Dg5wcOiO68lN7VacOBBRypT8CRnVAe_r-EjsK3W5ZCCyW4eckx8JjCSGd8Q71mzlUrKss-YLWKXX0A1EXUWu7qcLYQq8I0sUXIXKTGvEskziCxJv3nRFvKFlTBfWI6h/s1600/realtimespy+-+remote+spy+software.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;182&quot; data-original-width=&quot;567&quot; height=&quot;127&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQZ7dU9CMtiHRU8Dg5wcOiO68lN7VacOBBRypT8CRnVAe_r-EjsK3W5ZCCyW4eckx8JjCSGd8Q71mzlUrKss-YLWKXX0A1EXUWu7qcLYQq8I0sUXIXKTGvEskziCxJv3nRFvKFlTBfWI6h/s400/realtimespy+-+remote+spy+software.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://www.realtime-spy.com/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;206&quot; data-original-width=&quot;652&quot; height=&quot;63&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiofG5jeVFfpaR9HYQ_t21W7SFgMv7UnTUjdIP0gXwFJF21CLknjkSQ_p1hqkkXRedh3FlAlRK3sGIU9I4cPdZLXv1dMmNOhaNp4E2QkkptzyeYc5rOXQz20cAL9KYnUTdItHzlRLF-jqAT/s200/Download-Now-1.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.realtime-spy.com/&quot; target=&quot;_blank&quot;&gt;For Windows&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://www.realtime-spy-mac.com/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;206&quot; data-original-width=&quot;652&quot; height=&quot;63&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiofG5jeVFfpaR9HYQ_t21W7SFgMv7UnTUjdIP0gXwFJF21CLknjkSQ_p1hqkkXRedh3FlAlRK3sGIU9I4cPdZLXv1dMmNOhaNp4E2QkkptzyeYc5rOXQz20cAL9KYnUTdItHzlRLF-jqAT/s200/Download-Now-1.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.realtime-spy-mac.com/&quot; target=&quot;_blank&quot;&gt;For Mac&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidfUlEfYET06O5lAYwaRktWsEDcM9N38UztR2uuZhw4betqZNqdzF3FGvLCTneU7QFO3D9U526CgMAn0JKZ07O9a8MJVa7jmyN18ZFznr2g_TS2U37z1qwS7MxvH_BLjxarLYwi88FCVFa/s1600/why+real+time+spy1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;492&quot; data-original-width=&quot;1270&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidfUlEfYET06O5lAYwaRktWsEDcM9N38UztR2uuZhw4betqZNqdzF3FGvLCTneU7QFO3D9U526CgMAn0JKZ07O9a8MJVa7jmyN18ZFznr2g_TS2U37z1qwS7MxvH_BLjxarLYwi88FCVFa/s640/why+real+time+spy1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;background-color: white; box-sizing: border-box; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Verdana, sans-serif;&quot;&gt;How it Works?&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To hack Facebook password, you only need to install realtime spy on target computer. When the target user enters his / her Facebook account from this computer, the login details are captured. Login details are then uploaded instantly to realtime-spy servers. You can later use stored logs to get the Facebook password.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; box-sizing: border-box; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 20px; font-weight: 700; letter-spacing: 0.7px; text-align: start;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;To Hack Facebook Users on Mobile:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; letter-spacing: 0.7px; text-align: start;&quot;&gt;&lt;br /&gt;To hack the Facebook password of mobile users (&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; text-align: left;&quot;&gt;Android, iPhone, iPad &amp;amp; Tablets&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; letter-spacing: 0.7px; text-align: start;&quot;&gt;), there is a mobile version of this program called &quot;SpyStealth&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;b style=&quot;color: red; font-family: Verdana, sans-serif; font-size: x-large;&quot;&gt;2. Phishing - Difficult Way:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Another common method of hacking a Facebook account is through phishing. This method will use a fake login page (spoofed web page) which will actually be identical to the original one.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Facebook&#39;s cheated web page looks similar to the original Facebook website. This page is actually created by hacker and has been hosted on its own server once the victim enters his Facebook password on such fake login page, then login details by hacker are stolen.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: medium;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To implement phishing requires specialized knowledge and high level skill. Therefore, it will not be possible to try this trick for the novice user (probably like you). This is also a punishable offense, so in order to successfully hook Facebook&#39;s password, I recommend using Keylogger because it is the easiest and safest way&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: large;&quot;&gt;Why People Want to Hack Facebook Password?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 16px; letter-spacing: 0.7px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 16px; letter-spacing: 0.7px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;You many wonder why people want to hack the password of someone’s Facebook account.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; text-align: justify;&quot;&gt;&amp;nbsp;In most cases, people try to hack their Facebook or Facebook account so that they can find out what is going on behind the scenes. These days parents are also worried about their child&#39;s Facebook activity and want to hack their Facebook accounts to monitor. A spouse can try to hack passwords and get into a suspicious partner&#39;s Facebook account and so on.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Although most people have a strong motive behind their need to hack the password, but there are some people who just hack Facebook passwords to show their skills.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Facebook hacking methods that do not work:&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small; font-weight: normal;&quot;&gt;In fact, keyloggers are very common and keystrokes are designed to be logged in. There is no ready software program that is available to hack Facebook passwords (except for keylogger). In return, Facebook can be used to hack the password.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small; font-weight: normal;&quot;&gt;It is no longer possible to use traditional methods like cracking a Facebook password to brutal force approaches. The reason for this is that big time players such as Facebook have adopted strict security measures to save themselves against any kind of password hacking efforts.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small; font-weight: normal;&quot;&gt;Since Facebook has millions of users, they take all possible safeguards to protect their accounts, otherwise they may have serious implications on their business. Therefore, if you come to any website that offers such tricks, please be assured that they can not succeed against Facebook.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Common methods about facebook password hacking :&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small; font-weight: normal;&quot;&gt;Compared to many scams websites, there is no defect in the Facebook website or Facebook server, which allows the hacker to recover its password. The only Facebook hacking method that can give you a password is keylogging and phishing. None of the other ways is known for getting the password for you!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: magenta; color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: red; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small;&quot;&gt;Warning :&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: #eeeeee; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small; font-weight: normal;&quot;&gt;You can apply all the information given in this article at your own risk. Without the first user cognition, the use of spyware can be against your local laws and you can do it at your own risk!&lt;/span&gt;&lt;br /&gt;
&lt;/h2&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Post by Vaibhav Jadhav&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/1976861415622435259/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-hack-facebook-password.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1976861415622435259'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/1976861415622435259'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-hack-facebook-password.html' title='How to hack facebook password?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVcdKP7gU5pSdgkqdBNYdBU2VCZUgsnVrCP_4G5yLv-OMNbyoX76SkrDtjmyxfis9WJCMYf-1Xm0-Oxe3fnKPlkws6GkoLRPsEAD4fEt3M_sL6TKSIbzvbNv-TK5EgQepYbfVKrcDRwUY5/s72-c/Hack+Facebook+Password.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-3070979223370841051</id><published>2017-06-24T04:15:00.002-07:00</published><updated>2017-06-24T04:38:52.866-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech news"/><title type='text'>Reliance Jio Offering 90-Minute Free Home Delivery For Jio SIM</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi61WNMrFtoLSfwRHFhnzNUEKIqVB_6-GzXdb2tFuTUBMSa7EQ5WVHPRZZqnYQ9NvaIYcsUuZwThfiYowbo4u4Cy85TItEdgNddk-0WEfkfVCjH5XWW8n-gPHK-an9DlQyOUVGuiadO1AS/s1600/Jio+Sim+Home+Delivery+In+Just+90+Minutes.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi61WNMrFtoLSfwRHFhnzNUEKIqVB_6-GzXdb2tFuTUBMSa7EQ5WVHPRZZqnYQ9NvaIYcsUuZwThfiYowbo4u4Cy85TItEdgNddk-0WEfkfVCjH5XWW8n-gPHK-an9DlQyOUVGuiadO1AS/s640/Jio+Sim+Home+Delivery+In+Just+90+Minutes.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;If you remember, in November 2016, Reliance Jio had announced 4G SIM home delivery services. Now it seems that the company has extended delivery of its GIO SIM house to more than 600+ cities and promised to bring Geofi 4G hotspot to its door in less than 90 minutes.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Reliance Jio, known for its high-speed free internet service, had already dominated the telecom market. Reliance Jio aims to eliminate 90% of Indians with free voice calls and messaging services to eliminate freebies for free 4G internet.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If you remember, in November 2016, Reliance Jio had announced 4G SIM home delivery services. Reliance Jio is the first Indian telecom operator to launch such services in which users can get SIM cards at their doorstep.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;At that time only Mumbai, New Delhi, Kolkata, Pune and Ahmedabad are selected cities, which can avail the delivery of the SIM card door step delivery. However, now it seems that the company has increased delivery of its Jio SIM home in more than 600+ cities and promised to bring Jiofi 4G hotspot to its door in less than 90 minutes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Users just need to download the MyJio app and then need to distribute it at the door to generate a coupon in the app to book an app online with you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Reliance Jio will ask for Aadhaar number for the registration of SIM card. If we talk about Jioffi 4G hotspot, then the company is offering free home delivery services in select cities. For new Jiofi, users will get 100% cashback offers on the old dongle exchange.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If the delivery service of Reliance Jio Sim and Jiofi is not available in your area, then the standard process can take about 3-5 days. If you buy the Jiofi 4G hotspot, you can also get a 60% discount on the hotel hotel booking on Goibobbo.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;So, what do you think about this? Share your thoughts in the comment box below.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Post by Vaibhav Jadhav&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/3070979223370841051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/reliance-jio-offering-90-minute-free.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3070979223370841051'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3070979223370841051'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/reliance-jio-offering-90-minute-free.html' title='Reliance Jio Offering 90-Minute Free Home Delivery For Jio SIM'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi61WNMrFtoLSfwRHFhnzNUEKIqVB_6-GzXdb2tFuTUBMSa7EQ5WVHPRZZqnYQ9NvaIYcsUuZwThfiYowbo4u4Cy85TItEdgNddk-0WEfkfVCjH5XWW8n-gPHK-an9DlQyOUVGuiadO1AS/s72-c/Jio+Sim+Home+Delivery+In+Just+90+Minutes.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-9159547445111056501</id><published>2017-06-23T10:11:00.001-07:00</published><updated>2017-06-23T10:11:10.699-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>How to Convert Image to Text?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGTq0G6I7mxL51IfFJP4z9dOLk-Kz0nETKMFZU6x1DF_bKtdVsp8WxfbLGExLkYK0OYtfPYSHDVGQ2p3o_vHBET3BE_QZfbqdc1pppTGD_uD28eselzoZhAXpu8PalzUniI4TgxcoO1wmC/s1600/Convert+Image+to+Text.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGTq0G6I7mxL51IfFJP4z9dOLk-Kz0nETKMFZU6x1DF_bKtdVsp8WxfbLGExLkYK0OYtfPYSHDVGQ2p3o_vHBET3BE_QZfbqdc1pppTGD_uD28eselzoZhAXpu8PalzUniI4TgxcoO1wmC/s640/Convert+Image+to+Text.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Can you imagine your life without a smartphone? Maybe you can, but it will be a disaster. How do you connect with your family and friends from somewhere? Whenever this is a good moment, how do you take a quick safai? How do you remember everything from your list? In essence, mobile phones today have become indispensable gadgets that make our lives very easy.&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Another opportunity is to keep in mind the smartphone while giving us hands and making our life easier. Nowadays you have to lose time to try to find paper and pen to write notes, contacts or schedules. Just snap a picture of them and there you go, all important data is quickly and easily preserved. Besides, all the notes are always at your fingertips that your mobile phone is always in your favor.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;However, unlike these positive aspects, unfortunately, there is also a negative side. For example, those pieces of information are unusable as they are locked inside the image format. Therefore, when you want to speed up the process and make direct calls or forward them via email, you have to manually do it manually and additionally waste extra time.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Fortunately, there is a quick fix for this issue, the image for the text app will be correctly converted into your editable text file. In this way, your data will not be sealed and you will be able to use it further. In addition, this productivity app has many other useful features:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #222222; font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 12px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: #222222; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; list-style-type: disc; margin: 0px 20px 20px 0px; orphans: 2; padding-left: 40px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First-rate recognition and conversion quality&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;No limitations on the file size or number of converted files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Screenshots can be converted as well&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Easily share converted documents or open them in another app&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Converted documents are editable so, if it&#39;s needed, you can quickly make small adjustments in any text editor on your phone or a computer&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;In addition, there is a very clear and user-friendly interface in the image for the text. Therefore, it is optimized for every user type. So, let&#39;s turn a long story down and see how the image is converted into text on mobile devices.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;First of all, download an image from the app store or text from Google Play&lt;/li&gt;
&lt;li&gt;Choose photo you want to change or want to take a new picture&lt;/li&gt;
&lt;li&gt;Finally, you&#39;ll get your text between converted files&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKMJ3HhOs6zpe4-hLTHwPukWR5X8THryJEOjXKh_GmEVbc3jqIB0iRQviglbm0F-Qz6ELG5A9FqvtUpKRKKOCdbm4CbAQPSQQUk3Kk97j_I06WDyxSwsi6fIJkhyphenhyphen6YUHHRDUakxYTjTByH/s1600/image+to+text+converter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;696&quot; data-original-width=&quot;392&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKMJ3HhOs6zpe4-hLTHwPukWR5X8THryJEOjXKh_GmEVbc3jqIB0iRQviglbm0F-Qz6ELG5A9FqvtUpKRKKOCdbm4CbAQPSQQUk3Kk97j_I06WDyxSwsi6fIJkhyphenhyphen6YUHHRDUakxYTjTByH/s400/image+to+text+converter.jpg&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A positive side is that the file is being converted to the server, so the entire conversion will not remove your battery. In addition, the file has been deleted immediately after the conversion, so your data is safe and secure.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To download this helpful app and to take the most from your notes, you have to leave only one thing!&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/9159547445111056501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-convert-image-to-text.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/9159547445111056501'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/9159547445111056501'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-convert-image-to-text.html' title='How to Convert Image to Text?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGTq0G6I7mxL51IfFJP4z9dOLk-Kz0nETKMFZU6x1DF_bKtdVsp8WxfbLGExLkYK0OYtfPYSHDVGQ2p3o_vHBET3BE_QZfbqdc1pppTGD_uD28eselzoZhAXpu8PalzUniI4TgxcoO1wmC/s72-c/Convert+Image+to+Text.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-9070246306275682491</id><published>2017-06-23T09:26:00.003-07:00</published><updated>2017-06-23T09:28:15.791-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tricks"/><title type='text'>Forget Your Windows 7 Password? How to Create Windows 7 Password Reset Disk?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH5tOcIg3Tv-zJETZ_Q4tKceRVu65sGdMwfWEFbhnFxzmMqssRj7JyV4lGTa6pL5_PF2DZh9-5MuXPmV0vji77bbpnBNrSbqplSTU6Bx7fonSrGrkTa-U5IkwpmbH6ZPri_jNn2IwQiqx0/s1600/Forget+Your+Password-.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH5tOcIg3Tv-zJETZ_Q4tKceRVu65sGdMwfWEFbhnFxzmMqssRj7JyV4lGTa6pL5_PF2DZh9-5MuXPmV0vji77bbpnBNrSbqplSTU6Bx7fonSrGrkTa-U5IkwpmbH6ZPri_jNn2IwQiqx0/s640/Forget+Your+Password-.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;color: #333333; font-family: Oswald, sans-serif; font-size: 20px; font-weight: normal; line-height: 20px; margin: 0px 0px 10px; padding: 0px;&quot;&gt;
&lt;/h3&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Let&#39;s say that if you&#39;ve forgotten the Windows 7 password, you will try to find a solution to recover or reset it through the Internet. Soon you will find a solution - using Windows 7 password reset USB disk, which is most mentioned by the people. So here in this article, I will show you the exact ways to make Windows 7 Password Reset Disk.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Theoretically, a password reset disk Windows 7 can be made with a CD / DVD or USB flash drive. Since the USB flash drive is more convenient to carry and keep safe, I strongly recommend creating a Windows 7 reset password with the USB to prevent it from being locked out of the computer. Below are a guide to how to make a Win 7 password recovery USB.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Situation 1:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If you have not forgotten your Windows 7 password yet, in this situation, you can easily create such a password reset USB disc to prevent your computer from locking.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b style=&quot;background-color: white; color: #222222; text-align: left;&quot;&gt;Now follow the below steps:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol style=&quot;background-color: white; color: #222222; margin: 0px 20px 20px 0px; padding-left: 40px; text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Insert the prepared USB flash drive into your computer.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Type “&lt;b&gt;reset&lt;/b&gt;” in the Windows search box and select “&lt;b&gt;Create a password reset disk&lt;/b&gt;”.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;When the “&lt;b&gt;Forgotten Password Wizard&lt;/b&gt;” appears, click “&lt;b&gt;Next&lt;/b&gt;”.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Select your USB flash drive and click “&lt;b&gt;Next&lt;/b&gt;”.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Once the wizard finishes creating the reset disk, click “&lt;b&gt;Next&lt;/b&gt;” then “&lt;b&gt;Finish&lt;/b&gt;”.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;That&#39;s it. Job Done!&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;Situation 2:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;If you have already forgotten your Windows 7 password, many computer users have not taken any precautions against the Windows 7 password forgotten problem before they find that they have lost the password or forgot if your password If you do not forget to forget or lose your Windows 7 password, you do not have such a password reset disk, you have to look for other ways to create it and And then Windows 7 password reset will have to be done.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;background-color: white; color: #222222; text-align: left;&quot;&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Here’s how to create a reset password Windows 7 USB with Windows Password Recovery Enhance:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;You need to do the below steps in another system in order to recover your system.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #222222; text-align: left;&quot;&gt;
&lt;ol style=&quot;background-color: white; margin: 0px 20px 20px 0px; padding-left: 40px;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Download and install&amp;nbsp;&lt;a href=&quot;http://pc-login-now.soft112.com/download.html&quot; style=&quot;color: #de4e40; outline: none; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;PC Login Now&lt;/a&gt;&#39;s iso file.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Burn the ISO file to CD (Use&amp;nbsp;&lt;a href=&quot;http://www.magiciso.com/&quot; style=&quot;color: #de4e40; outline: none; text-decoration-line: none;&quot; target=&quot;_blank&quot;&gt;Magic ISO&lt;/a&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;After you have created a bootable disk, Insert that disk into the DVD Drive and Restart your computer.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Set the BIOS to boot from CD. (Mostly not required if your system automatically detects the disk on your DVD Drive).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The software then automatically runs.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Use PCLoginNow to finish the job.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-color: yellow; color: red;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Note:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Download-file is an ISO file named “&lt;b&gt;PCLoginNow_Free.ISO&lt;/b&gt;” which should be burned to a CD before using it.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Post by Vaibhav Jadhav&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/9070246306275682491/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-forget-your-windows-7-password.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/9070246306275682491'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/9070246306275682491'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-forget-your-windows-7-password.html' title='Forget Your Windows 7 Password? How to Create Windows 7 Password Reset Disk?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH5tOcIg3Tv-zJETZ_Q4tKceRVu65sGdMwfWEFbhnFxzmMqssRj7JyV4lGTa6pL5_PF2DZh9-5MuXPmV0vji77bbpnBNrSbqplSTU6Bx7fonSrGrkTa-U5IkwpmbH6ZPri_jNn2IwQiqx0/s72-c/Forget+Your+Password-.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4574892340134152115.post-3945381908593877719</id><published>2017-06-22T10:28:00.002-07:00</published><updated>2017-06-22T10:28:35.463-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Tricks"/><title type='text'>How To Track Location of Whatsapp and Facebook Users In Real Time?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7rxDiENcN6SDEH1YFoU1eOu1YDazmAI-Z9lMtWA1u6AdABggW-Z9K_VMoG2BCJ-HqS_yxGO6LF80q0LG64eXL2xIxF3jchusDTJZf0gdzT-OJcVL_35i6_UTdcteTN8K6SKm50tHu6oGd/s1600/How+To+Track+Location+of+Whatsapp+and+Facebook+Users+In+Real+Time-.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7rxDiENcN6SDEH1YFoU1eOu1YDazmAI-Z9lMtWA1u6AdABggW-Z9K_VMoG2BCJ-HqS_yxGO6LF80q0LG64eXL2xIxF3jchusDTJZf0gdzT-OJcVL_35i6_UTdcteTN8K6SKm50tHu6oGd/s640/How+To+Track+Location+of+Whatsapp+and+Facebook+Users+In+Real+Time-.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;By using command prompt, you can actually trace out the IP address of a person whom with you are chatting on facebook. Just follow the steps below to proceed :&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Step 1.&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;First of all, start chatting with your friend whose IP address you want to get and make sure that all other apps and background process must be stopped. Now press Win+R of your keyboard.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tracing IP Address Of Person On Facebook Chat Using Command Prompt&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Step 2.&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now type cmd and hit enter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tracing IP Address Of Person On Facebook Chat Using Command Prompt&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Step 3&lt;/span&gt;.&lt;/b&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now in the command prompt that appears type netstat -an and hit enter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tracing IP Address Of Person On Facebook Chat Using Command Prompt&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Step 4.&lt;/span&gt;&lt;/b&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now note down the IP address of a person.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tracing IP Address Of Person On Facebook Chat Using Command Prompt&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Step 5.&lt;/span&gt;&lt;/b&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now you need to scan that IP address to know the actual location of the person that you can check out from &lt;a href=&quot;http://www.ip-adress.com/ip_tracer/&quot;&gt;http://www.ip-adress.com/ip_tracer/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://technicalvaibhav.blogspot.com/feeds/3945381908593877719/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-track-location-of-whatsapp-and.html#comment-form' title='10 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3945381908593877719'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4574892340134152115/posts/default/3945381908593877719'/><link rel='alternate' type='text/html' href='https://technicalvaibhav.blogspot.com/2017/06/how-to-track-location-of-whatsapp-and.html' title='How To Track Location of Whatsapp and Facebook Users In Real Time?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7rxDiENcN6SDEH1YFoU1eOu1YDazmAI-Z9lMtWA1u6AdABggW-Z9K_VMoG2BCJ-HqS_yxGO6LF80q0LG64eXL2xIxF3jchusDTJZf0gdzT-OJcVL_35i6_UTdcteTN8K6SKm50tHu6oGd/s72-c/How+To+Track+Location+of+Whatsapp+and+Facebook+Users+In+Real+Time-.png" height="72" width="72"/><thr:total>10</thr:total></entry></feed>