Friday, 13 May 2016
GET UNLIMITED PHONE NUMBER FOR SOCIAL MEDIA VERIFICATION
Get Free Unlimited US Phone Numbers
These phone numbers can be used for anything you want, activations of accounts, spam,
recieving SMS and Voice messages.
1. Create a GMail, Yahoo! or Outlook email adress. You’ll only need this once.
2. Go to http://meltmail.com/, insert your created email adress with a 3h timer and go
Create Melt Mail.
3. Next go to http://voicemail.k7.net/signup/Signup
with your melt mail. Input a PIN (ex. 1234, 0000, and so on
and so forth).
4. Do the captcha at the end of the page and finish the registration. You should get a phone
number starting with 2XXXXXXXXX.
That is you phone number. The prefix is +1
2XXXXXXXXX.
5. Login to the site to view your messages or voice messages. You can also recieve SMS
and Voice messages via email.
Just repeat from step 2 for unlimited numbers.
Bypass Any phone Verification (Google/Facebook /Bank/Paypal/Ebay…)
SMS &Phone Verification
Sometimes you want to create many accounts in google or facebook but you can't since they made
the new security method, this type of protection is to verify your mobile phone number by sending
you a SMS to containing the verification code. So in this tutorial i will show you 2 method to
verify your account on google or facebook without using your mobile number.
Method 1:
1. Go to www.pinger.com/tfw/
2. Create a free account and pick a random number
3.Paste the number in the verification website( Google/Facebook etc)
4.You will receive a SMS in your account(on pinger) With this method not only you can used for verification BUT to contact with your friends and many other things ;)
Method 2:
1. Go to receive-sms-online.com/
2. Pick a random number and copy it
3.Paste the number in the verification website
( Google/Facebook etc)
4.Go back to the receive-sms-online.com and click the number you chose
5.You will notice the code for account verification :) NOTE: in this method everyone can see the sms so be careful
Other Sms receiver websites :
receive-sms.com/
www.k7.net/ lleida.net/uk/
sms-verification.com/
receive-sms-online.com/
pinger.com/tfw
receivesmsonline.com/
freephonenumber/
www.receivesmsonline.com/
www.youtextmessage.com/
www.simser.info
Method 3 :
For USA , get a free US number :
1. Sign Up on callcentric.com/login
Under the New customers please sign up here
2. Fill all the fields with your information and click continue.
3. Now verify your email and enter your own address or Get a
free USA address from here: link
Next click on I agree
4. Click on “Go to My CallCentric” now under your username
there will be CallCentric # in this format 1777*******
5. Open http://phone.ipkall.com and fill information : Choose your
account type : SIP Choose Area Code for your IPKall Number:
(253) SIP username : Now put your CallCentric # here which
will be like this 1777******* Host name or IP address :
callcentric.com And use previous email address and password
which you used on CallCentric.com and Click submit
6. Now check your email address you will receive an email from
info@ipkall.com in which your detail will be given.
At the end of the first line there will be your local US phone
number but you need to register this number.
7. Download Express talk from here
8. When you are installing express talk, select the default
option for all screens. At “SIP Setup” option, select “Yes, I
already have a SIP account” and enter all your detail as you
fill in Step "5" and log in.
9. After your successful login your US local phone number will
be registered automatically. Which you can see on
CallCentric.com home page under "Balance" tab saying "Your
phone is registered"
Get US Google Voice Number
1. Go to google.com/voice in new tab or browser sign in with an existing account or you can sign up for a new Google account
2. Click on Get a Voice number then on "I want a new number" and pick any number of your choice by entering Area, zip code, city, word or phrase number after choosing your number, Create a new pin and click continue
3. Put your IPKall phone Number without dashes at "Add a forwarding phone" and click continue Now Google will verify your number you will be provided a two digit code for verification now press "Call me now" button
4. Now you will receive a phone call on IPKall number, receive and press your two digit code. Now you have done, now you can free call on US or Canada to your relatives.
Method 4 :
Use a call-forwarder :
+
If you still have a problem to bypass phone verif (because some websites have strong security) , go to :
http://www.tollfreeforwarding.com/
or http://www.sonetel.com/
You will buy a virtual phone number from 100 countries and forward to your anonymous sim card or you real number (as you wish
Enjoy
UPDATE:
Check out this sites for virtual phone numbers for android and ipad :
http://burnerapp.com/
http://hushed.com/
http://www.notmynumber.net/
Untested site that accepts bitcoin.
http://www.numberproxy.com/
Friday, 15 January 2016
THE PRIVIT’S MAN WORST PRIVACY NIGHTMARE
PRIVACY AND SECURITY Vol.1
After series of research on various platforms about security and privacy I realized that most of the roads and methods still lead you to a dead end because believe me there is nothing like a free secured VPN or socks4/5 online that can guarantee your security without somehow leaking some info from your computer directly or indirectly through DNS and Various leaks. So I went through the pain of my studies to see what the gurus of hacking and the dark web has to offer. If u really need your privacy and security then u really need to think like CIA to beat the CIA from going after you like the saying goes “if u want to catch a thief u need to think like a thief” likewise in computing to have your privacy you need to entrust criminals to help you out. Not forgetting that our various smartphones have been the worst snitcher around us
Do you know when someone is really interested, they will pinpoint your exact location right this very moment? They can even take your picture before you will gather your sense, they would have read all your messages, stolen your contact and even seen your credit score.
This isn’t fiction. You have in our various pockets a snitcher’s best friend and you take it everywhere, office to bedroom, dining room to lavatory. Its records everything you do and can be made to turn against in a matter of some few seconds. Believe it or not the modern day smartphone is the private citizen’s worst privacy nightmare. Think of what u have there: emails addresses, contacts, appointment, photos and even personal financial information. On top of it the smartphone can truck your location to build a detail profile of your where about and that is enough for anybody to truck arrest you or even steal information from your phone for fraudulent use. There multiple ways your phone can send information about their users which makes smartphones particularly troublesome not only for those who want to remain anonymous, but also the average user. In fact even I you never use the smartphone for calls and various apps for message transfer you still broadcast information just by the mere act of using it.
97% OF TESTED APPS INAPPROPRIATELY ACCESED PRIVATE INFORMATION
In recent study conducted by HP, the company discovered that 97% of tested apps inappropriately accessed private information source within a device and another 87% lacked the means of protecting themselves from common exploit. But the good news is that smartphone allows you to alter many privacy related settings with one tap or two. Let’s look at the various in which u leak private information about yourself via smartphone and how u can minimize such broadcast. We’ll also look at tools that allow you to take charge of your privacy and help you communicate without compromising the actual exchange of information
Many task that was exclusively to PCs have now branched out to phones. They can double up as media players, recorders, gaming device, GPS navigation devices and more. To enjoy all these conveniences you need apps. Unfortunately apps are the weakest link between your private data and the world. Many access your personal data to enhance their experience, but you must trust that these apps will use your data in a desirable way. Unfortunately not every app clearly states how they use your data and there is no assurance of your safety. Then there are the free web service like google, twitter, Facebook, and others that provide you with free service in return for information about you. This information is then used to target ads. Some consider this a fair trade but privacy campaigners are becoming increasingly concerned.
A critical component of your android is the permission system. When you install an app, it notifies you of what it will like to gain access to. You can install the app or not. Unfortunately this system puts a lots of responsibility on the user to know whether these access request are appropriate. According to a research report (source: http://bit.ly/1bRbsVr) many apps request excessive permissions. There are many ways of visualizing app permission. Bitdefender’s free clueful app helps you identify what an app is doing. Once installed will scan your apps and categorize them as high risk, moderate risk and low risk. You should uninstall any high risk app as they might be sniffing you password or reading your emails. Then there is Malwarebytes mobile app which includes a privacy manager. It scans apps and divides them into category based on access to calendar and storage. This app come in handy when you wish to view all the apps that can read personal information as you contact list, web history and your location.
Shearing images reveals lots of information thanks to the EXIF data attached
CONTROL PERMISSION
JohnMcAfee, who was evading authorities was ousted in Guatemala thanks to a photo. Shearing images taken from your smartphone reveals lots of information about you thanks to the EXIF data attached to then, so if you take an image with your smartphone make sure the GPS is disabled because it can reveal your location and the time it was taken.
To strip the EXIF information from pictures before shearing you can use the instant EXIF remover app. This app doesn’t have an interface, once installed it will be available as an option in the shear action. When selected the app will intercept any image u wish to shear and delete all the EXIF data before passing then to the email Clint or any other shearing app. Also before uploading files to a cloud service like Dropbox, Google drive and Sky drive it will be better if you encrypt them and this can be done with linux box with EncFS which is available on popular distros like Fedora and Ubuntu. The too required you to create two directories one for that houses your unencrypted content and the other with the encrypted version. The way the tool works is that you interact with the files in the unencrypted folder and they are encrypted on-the-fly in the encrypted folder. To use of EnFS with a cloud shearing service like Dropbox just makes sure you keep the encrypted folder inside the Dropbox folder. This will automatically sync any change to the encrypted folder to Dropbox! After installing EncFS, create the two folders with encfs¬/Dropbox/.encrypted ¬/private. The tool will ask you questions and create the folder. Any files in the private directory will now be synced.
THREE DEGREE OF SEPERATION
You don’t need to be talking to a terror suspect to get the NSA interested in your personal communications, the agency is allowed to travel three hops from its target. So they can monitor the communication of people who talk to people who talk to people who talk to you. This three degree of separation allows NSA to virtually monitor everyone
COMMUNICATING SECURLY
You can also use Orweb browser which is Tor for android (Tor will be discussed into details in subsequent blogs) which is configured to browse anonymously but unconfirmed information from Canada indicate that lunching of tor is illegal and warrant of arrest if lunched.
You can also encrypt SMS messages with an open source TextSecure app which can encrypt sms stoe locally on the phone. However to send encrypted messages the recipient must also have same app to decrypt the message or else the recipient will receive encrypted sms
SUPRISINGLY MANY PEOPLE STILL USE THEIR SMART PHONES FOR ACTUAL CALLS AND TEXT AS THE MAIN MEANS OF COMUNICATION .
Every year offers a vanning android operating system popularly known as AOSP for download. Many developers take this version and work on it to develop their own custormized version of android. CyanogenMod is one such android distribution and also one of the most popular with millions of of users. One reason for its popularity is that it gives complete control of your device and frees it to any ties to google, your network or phone manufacturer. It’s also worth mentioning that the Cynogen mode tea is quick to patch security holes and fix bugs that were only fixed by google in their next Android release. This third-party firmware also includes Privacy Guard which gives you better control of and their permission, the newest version as at December 2015 includes AppOps feature redacted by google in android 4.3. with the feature u can prevent individual app from accessing your data. The latest version of CynogenMod also integrates the secure SMS app TextSecure in the firmware itself.
PLS DO LEAVVE YOUR COMMENT AND SUGGESTION BEHIND
Thursday, 14 January 2016
HACKING MADE SIMPLE
Let me start by saying “Education is what remains when u
have forgotten all that have been thought” (ANSHUL KAUSHIK) I write this blog
for all those curious faces who wants to learn how to hack and the curious administrators who
wants their systems protected 24/7. And by this I will emphasize on the fact
that gaining knowledge is not a crime but applying it in the wrong direction
may amount to unethical behaviour and a crime.
DISCLAIMER
I cannot be held responsible for any actions performed by
reading of this blog, I write to improve defence
INTRODUCTION
Let me start by defining and explaining some term;
originally a hacker refers to someone who makes furniture with an axe, but in
computing a hacker is someone who enjoys exploring the details of a
programmable system and stretching it capabilities in search of security
vulnerabilities in a computer programme and a network
There are two types of hackers who are the “the white hat
hacker” and “the black hat hacker”
STEPS IN HACKING
Protection and
defence
Gaining and gathering
information
Scanning
Gaining access
Maintaining access
Covering trucks
Dark web and it uses
Credit card hacks and
sales
PayPal hacks and
sales
Successful carding and cashing out methods
Crypto currency (the ultimate for hack exchange)
Before we dive deep into the various steps in hacking I
would like to make known all available shortcuts available in both windows and
mac systems that is very important every beginner should know to make the
hacking and security process very fast and simple.
Win+Arrow Down
|
Set window to
Restored (if Maximized) or Minimized (if Restored)
|
Win+Arrow Up
|
Maximize window (if
Restored)
|
Win+Shift+Arrow Down/Win+Shift+Arrow Up
|
Maximize Restored
window vertically / Restore window to previous state
|
Win+Arrow Right/Win+Arrow Left
|
Move Restored
window to left/center/right. Works across multiple monitors
|
Win+Shift+Arrow Right/Win+Shift+Arrow Left
|
Move window to left
monitor / to right monitor when using multiple monitors
|
Alt+Space
|
Opens the title bar
menu
|
Alt+Space+Enter
|
Restore Window
|
Alt+Space+X
|
Maximize Window
|
Alt+Space+N
|
Minimize Window
|
F11
|
Turn full page view
on or off
|
'Maximized' means full screen, 'Restored' means variable
window size, and 'Minimized' means minimized to taskbar.
|
Switch between Applications
|
|
Alt+Tab,
Alt+Shift+Tab |
Cycles through open programs in taskbar. Hold alt and
continuously press tab to move forward between applications. Release keys to switch
to application selected. Add shift to reverse direction.
|
Alt+Ctrl+Tab, then use arrow keys to select application
|
Cycles through open programs in taskbar without needing to
hold alt continuously. Press alt+ctrl+tab once, then continue with arrow keys
and press enter on application.
|
Alt+Esc/Alt+Shift+Esc
|
Cycle through programs on taskbar in the order they were
opened or accessed
|
Win+Tab
|
Cycle through programs using Aero Flip 3D
|
Ctrl+Win+Tab
|
Cycle through programs on Taskbar using Aero Flip 3D
|
Win+G
|
Cycle through Gadget Window
|
Manage Multiple Windows
|
|
Win+D
|
Minimize all windows on all Monitors. Press again to
restore previous state
|
Win+M
|
Minimize all windows on current Monitor
|
Win+Shift+M
|
Restore previously minimized windows on current Monitor
|
Win+Home
|
Set all windows to Minimized on current Monitor except
active
|
Win+Space
|
Preview Desktop / make windows transparent (May not work
with all Settings)
|
Win+E
|
Start Windows Explorer (in My Computer)
|
Win+R
|
Open the Run window
|
Win+F
|
Open Windows Search. f3 on empty desktop works, too.
|
Win+L
|
Lock the keyboard/ computer
|
Win+F1
|
Display Windows Help
|
Alt+Shift
|
Change keyboard language layout if multiple language
layouts are active*
|
Shift when inserting CD or DVD
|
Prevent CD or DVD from automatically playing
|
Win+P
|
Choose Presentation Display Mode
|
Win+X
|
Open Mobility Center
|
When working with multiple Keyboards Layouts (e.g.
Spanish/English/German). Add unlimited Layouts under Regional settings and
activate language bar in Taskbar to see current language.
Switch with
shortcut any time.
|
Win or Ctrl+Esc
|
Activate Start Button. Then use arrow keys, space and
enter to navigate within Start Menu
|
Win+T
|
Go to first item in taskbar, continue with arrow keys
|
Win+B
|
Go to first item in system tray
|
Shift+click on a taskbar item
|
Start new instance of taskbar item
|
Ctrl+Shift+click on a taskbar item
|
Start new instance of taskbar item as administrator
|
Shift+right-click on a taskbar item
|
Show the window menu for the program
|
Win+1...9
|
Switch to application in position N on taskbar (or launch
pinned application)
|
Shift+Win+1...9
|
Start new instance of taskbar item in position N on
taskbar
|
Unfortunately, Microsoft removed the possibility to select
multiple taskbar items in Windows 7
|
|
|
|
Arrow Keys
|
Navigate between and select single icons on desktop
(when
focus is on the desktop)
|
|
|
Home/End
|
Select first / select last object on desktop
|
Enter
|
Launch active icon
|
Shift+F10
|
Activate context menu of active icon by simulates right
mouse button.
Once in the context menu use arrow keys, a-z and enter
to
select item
|
tab, shift+tab on empty desktop
|
Navigate between desktop, the quick-launch bar, task bar
and notification bar.
Then use arrow keys and enter or space to activate
specific icons
|
A, B, C, ...
|
Pressing the initial letter of the name of any objects
will highlight the
respective application or folder. Continue typing the
object name if multiple objects
start with the same letter
|
Basics
|
|
Win+E
|
Start Windows Explorer (My Computer)
|
Alt+Arrow Up
|
Go up one folder
|
Alt+Arrow Left/Alt+Arrow Right
|
Go to previous folder / go to next folder
|
Tab/Shift+Tab
|
Switch focus forward/ backward between Address bar, Search
Bar, Toolbar, Navigation Pane, and File List (Default is usually File List)
|
Alt+D or f4
|
Jump to the Address bar and select absolute address. Copy
address with ctrl+c if desired
|
Ctrl+E or ctrl+f
|
Jump to Search Box in Explorer
|
Ctrl+N
|
Open new instance of Windows Explorer
|
F11
|
Maximize window
|
Navigate File List and Navigation Pane
|
|
Arrow Keys
|
Navigate between files and folders
|
Enter
|
Open folder or start application
|
Home/End
|
Jump to first / jump to last item
|
F2
|
Change the file name of active item
|
F2, then arrow left/Arrow Right
|
Move one character to the left / to the right in item name
|
F2, then ctrl+Arrow Left/Ctrl+Arrow Right
|
Jump one word to the left / to the right of item name
|
F2, then home /End
|
Jump to beginning / jump to end of item name
|
F2, then ctrl+a
|
Select complete object name including suffix (default
excludes suffix)
|
Arrow Left/Arrow Right
|
Expand folder / collapse folder (navigation pane only)
|
File List
|
|
Alt+P
|
Display or hide Preview Pane
|
Alt+V then D
|
View details. Check View menu for more options
|
Alt+V then X
|
View extra-large icons. Check View menu for more options
|
Ctrl+mouse scroll wheel
|
Change size of icons
|
Select Items in File List and Navigation Pane
|
|
Shift+Arrow Up/Arrow Down
|
Select multiple adjacent items (directly above or below)
|
ctrl with arrow keys and space
|
Select multiple non-adjacent items. Hold ctrl, use arrow keys
to move to next item, and press space to add/remove from selection
|
Ctrl+A
|
Select all
|
A ...Z and 1..9
|
Press the initial letter any item to jump to it. Continue
typing the full name if multiple items start with the same letter
|
Manipulate Items in Explorer
|
|
Ctrl+C, Ctrl+X, Ctrl+V
|
ctrl+C for copy, Ctrl+X for cut and Ctrl+V for paste
|
Ctrl+Z
|
Undo an action
|
Ctrl+Y
|
Redo an action
|
Delete
|
Delete an item and place it into the Recycle Bin
|
Shift+Delete
|
Delete an item permanently without placing it into the
Recycle Bin
|
Shift+F10
|
Activate context menu of active object. Replaces the right
mouse button. Once in the context menu use arrow keys, a-z and enter to get
to the selection
|
Ctrl+Shift+N
|
Create new folder
|
Alt+Enter
|
Open Properties dialog box
|
▲ up
Arrow Left/Arrow Right
|
Go to next / go to previous photo
|
Ctrl+.
|
Rotate photo clockwise
|
Ctrl+,
|
Rotate photo counter-clockwise
|
[+]/-
|
Zoom in / zoom out (or mouse wheel)
|
Ctrl+0 (zero)
|
Fit to Window
|
Delete
|
Delete current photo
|
Shift+Delete
|
Permanently delete current photo
|
Alt+Enter
|
Show properties of current photo
|
Alt+E or Ctrl+S
|
Email current photo
|
Ctrl+C
|
Copy current photo file to clipboard
|
Alt+O
|
Open current photo in other application (e.g. Paint of
Office)
|
|
|
|||||
|
|
|
||||
|
|
|
||||
|
|
|
||||
|
|
|
||||
|
|
|
||||
|
|
|
||||
|
|
|
||||
|
|
|
Alt+Home
|
Display the Start menu
|
||||||||||||||||||||||||||||
Ctrl+Alt+pause/break
|
Switch between a window and full screen
|
||||||||||||||||||||||||||||
Ctrl+Alt+End
|
Display the Windows Security dialog box
|
||||||||||||||||||||||||||||
Alt+Delete
|
Display the system menu
|
Magnifier
|
|||||||||
Win+[+]
|
art Magnifier and zoom in
|
||||||||
Win+-
|
Zoom out with Magnifier active
|
||||||||
|
|
||||||||
Win+Esc
|
Exit Magnifier
|
||||||||
Ctrl+Alt+Arrow Keys
|
Move the Magnifier windows
|
||||||||
Note: Microsoft lists more shortcuts for Magnifier, but
not all of them seem to work.
|
Subscribe to:
Posts (Atom)