Posts

Showing posts with the label PASSWORD

How To View Saved Wi-Fi Passwords On Android and iOS

Image
I love working from cafes, especially the ones with free Wi-Fi. Nothing better than working with a bit of white noise around and writing with a hot cup of coffee by my side. That’s the reason I have saved Wi-Fi passwords of many cafes in my locality. However, sometimes you don’t go to these places alone and are accompanied by your friends who might as well need the Wi-Fi access. If you have your laptop with you then it’s not that difficult to make it show the passwords. But on a phone, it isn’t that straightforward. And the chances of our phones being with us than our laptops is significantly more. Asking the baristas is always an option, but why bother them when you can retrieve it from your phone itself. Plus this is a useful method to know because it can come in handy in many other situations when you desperately need the Wi-Fi password of a network you previously connected to on the phone. Before we get started, it’s important to make it...

How to Hack Any Windows 7 User Password.

Image
This is a how to to change any user password on a windows 7 computer. If you forgot your password you can change any account password even if you are locked out of your account. Warning I am not responsible for any damage done to any computer in the process of this hack or any other hacks I publish Fair tip: Some administrators have disabled system repair making this hack useless. To see if system repair is available follow steps 1 and 2. Step 1: First Startup the Computer and Cut the Power at Windows Startup. The first thing that you need to do is startup your computer. After you computer starts, shutoff the power source (unplug it) when you see the window startup come up. Step 2: Restart Your Computer and Select Windows Repair. After you shutoff your computer by cutting the power you want to plug your computer back in and turn it on again. You should then by prompted with launch startup repair, select this option by hitting enter when it is highlighted. Step 3: When Prompted to Rest...

Cyber-Attacks on India Mostly From China, Pakistan: Prasad

Image
By All Tricks Cybercriminals from countries like Pakistan, China, Bangladesh and the US are mostly involved in hacking and launching attacks on computer networks of Indian organisations, Parliament was informed in New Delhi. Minister for Communications and Information Technology Ravi Shankar Prasad said attackers are compromising computer systems in different parts of the world and use masquerading techniques and hidden servers to hide the identity of actual systems from which the attacks are launched. "In such cases, Indian Computer Emergency Response Team (CERT-In) notifies the concerned organisation regarding the cyber-attacks and requests for logs of network devices, servers and other related components for analysing the attacks and identifying sources of attack," he said in a written reply to the Rajya Sabha. Analysis of attack methology is done based on available log provided by the organisations, he added. "According to the logs as analysed and m...

Hacking Tutorials Log In Windows Without Password With Kon Boot

Image
By Parth Well I think this hacking tutorials Log in Windows Without Password with Kon Boot will be easy for us to follow from the step by step. The purpose of this tutorial is to know the importance of physical security and how to keep us safe from this kind of attack. Three or four days ago I watch BBC about spying where they even can put the spy device on your motherboard silently, again…the importance of physical security. For personals maybe it wasn't a big deal since we will carry our laptop or computer whereever we go, but it will become big problem if it was a firms who has a lot of important data on employees computer. Wikipedia  says about Physical Security: Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security we talked in this tutorial is part fro...