30/11/2014

How to Connect to Protected Wi-Fi Hotspots for Free Without Any Passwords


Depending on who you ask, internet connectivity should be a basic human right. With Google recently embarking on a project to provide internet capabilities to remote corners of the world using balloons and satellites while Facebook attempts to do the same with unmanned drones, the concept of free web access is steadily gaining steam. It's this train of thought that sparked the idea for a new crowd-sourced database of Wi-Fi access point passwords. The service uses an app called Instabridge to allow users to share passwords for Wi-Fi networks that they've connected to, then provides a map of all of these access points to other users.
Read Also:-Fern WiFi Cracker
Instabridge relies on user submissions to grow its list of connections, and thousands of network credentials have already been submitted. So if you're ready to join in the fun, I'll review the app in detail below.
Recommended Post:-How to Increase Wifi Signal Strength
1. Install Instabridge Instabridge- is available for free on the Google Play Store, but it is also available for Mac and Windows computers.
2. Set Up Your Preferences. When you first launch Instabridge, you'll have to go through a one-time setup process. First, tap I am new then review and Accept the Terms of Service.
Next, Instabridge will ask you to verify your phone number. This is done so that your friends will be able to find you and connect to your shared Wi-Fi networks, but it is not required. If you'd rather not share your phone number, hit Skip. Otherwise, hit OK.
If you opted to verify your phone number, a text message will be sent to your phone and Instabridge will automatically detect it. Once that has happened, a button will show up in the upper right-hand corner where you can hit Done.
Next, you'll be given a chance to review your settings. From here, you can set your phone to automatically connect to My own networks, Friend Networks (networks shared with you by friends), and Community Networks (networks shared by other users). The last two options help improve the Instabridge network and app, so leave them turned on and press the Done button up top.
3. Add Your Wi-Fi Networks. If you are connected to a Wi-Fi access point when setup has finished, the app will automatically ask if you would like to save and share the login credentials for that network. If you are not currently connected, you can get to this same interface at a later time from the app's main screen. Under the Networks you can connect to field, you will see your current Wi-Fi connection. Tap the Share or backup this hotspot button to begin. Enter your password on the following screen, then hit Next. From here, tap the Share with field then select who you'd like to share this Wi-Fi connection's password with. If it's a public access point, feel free to contribute to the cause and share the password with All Users. Otherwise, if this is your home network, it would be best to choose either Friends or Just me, no one else for security reasons. With the Friends option, you'll be given a chance to select which friends to share this connection information with. They will need to have the app installed on their device to connect to your network. You can view the amount of times that other users have connected to networks that you've shared by tapping the second tab from the app's home screen.
4. Connect to Free Wi-Fi Networks Instabridge makes it easy to discover free Wi-Fi connections in your area. From the app's main screen, simply tap the third tab (the one with the Earth icon) to begin. Grey dots represent public Wi-Fi connections that require payment or restrict access in some regard. Pink dots mark free, open Wi-Fi connections that are available for you to use. Tap any of the dots, and you'll be taken into Google Maps so that you can navigate to within range of the signal. When you're ready to connect to one of these networks, simply tap it from Networks you can connect to field on the app's main screen, and connection will occur automatically.
Love this article?
Share it with your friends on Facebook

28/11/2014

Hack Any Remote PC By IP Address Using Kali Linux


This is how we can get the IP address of the victims website. How about your friend’s PC? You can’t do www.yourfirend’ sname.com, can you? Finding your friend’s IP address is a little tough job, for you and tougher it is if he has dynamic IP address that keeps changing. But in our case, Finding friend’s/victim's IP address is as easy as A, B, C.
I'll show you one of the widely used method to detect IP address of your friend is by chatting with him or go through Find someone's IP address! in order to get IP address.
Now you got the IP address right? Is it online? To know the online status just ping the IP address, if it is online it will reply. If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily. Use Advanced Port Scanner to scan all open and venerable ports.
Read Also:-Hack Into Emails And Facebook Using Kali Linux

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > Add windows components. Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port].

You’ll be asked to input login information.

If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like Brutus, THC- Hydra In this way you’ll able to hack remove computer using only IP address.
Love this article?
Share it with your friends on Facebook

27/11/2014

Chat with Friends through Command Prompt (cmd)

Talk with other computers on your network.

If you want a private chat with a friend or client on you Network, you don't need to download any fancy program! All you need is your friends IP address and Command Prompt.
1. Open notepad then type:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
And then save as Messenger.bat and close the Notepad.
Read Also:-Shutdown Any Computer Remotely Using Command Prompt (CMD)
2. Go to control panel (make sure you are in Classic View) Click on administrative tools then click on services.
3. Now find the Messenger service in the list on the right, then open it. You'll see startup type which should be disabled, so click on that and select manual.
4. Now press the start button in the upper right hand corner of the window (not the green start button), and click apply.
5. Next, do the same procedure on the remote computer. Until this service is activated on that PC, or you won't be able to use this.
6. Now click on the messenger file you made. Since it is a batch file it will open with cmd (command prompt). It should show MESSENGER at the top and User: below that. Type the IP address of the remote computer after User:
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press Enter it should look like this:
MESSENGER
User: 56.108.104.102
Message: Hi
Now all you need to do is press Enter and start chatting.
Note: By default Microsoft disabled those features to further secure the system and among other things. net send is a command using a background service called messenger. This service is no longer working with Windows 8 nor in any latest OS versions.
Love this article?
Share it with your friends on Facebook

Top 17 Cyber Security And Privacy Tips


One of the easiest ways to help others is to simply share your knowledge. You don’t have to be in front of a classroom to teach. Every day there is an opportunity to educate someone about you know. At the end of this article, click share button.
Now let's explore!
With the growing variety of mobile devices, social networking sites, and online offers, it is important to protect yourself and your computer. We’ve compiled this list of 17 cyber security tips to help you take action now.
1. Do not use your full or partial Social Security number as a Personal Identification Number (PIN), user ID or password.
2. Make sure that your password is 8 or more characters and combines capitalized letters, numerals and symbols. Do not use the same user ID and password for your financial accounts as you do for other sites.
3. Consider a screen lock on your mobile device. Many mobile phones offer this option, as well as other customizable security settings, which can help keep your phone and information secure.
4. Do not use your mobile device to store sensitive personal information or bank account numbers.
5. Never respond to urgent email claiming to be from a bank or any company that requests your account information or personal details. Forward these emails to www.fbi.gov or call your local police immediately.
6. Limit the amount of personal information you provide on social networking sites. The more information you post, the easier it may be for a criminal to use that information to steal your identity, access your data, or commit other crimes.
7. Be cautious about messages you receive on social networking sites that contain links. Even links that look like they come from friends can sometimes be harmful or fraudulent attempting to gain control of your computer or steal your personal information. If you are suspicious, don’t click the link. Contact your friend or the business directly to verify the validity.
8. Keep your computer operating system and browser up to date with the latest and official software and security downloads. These may be called "patches" or "service packs" and should be installed as soon as possible.
9. Don’t open attachments or install free software from unknown sources, this may expose your computer and the information on it to unauthorized sources.
10. Install a comprehensive (official) Firewall/Antivirus/Anti-spyware software package on your computer. These software suites help detect and remove viruses and spyware, which can steal vital information.
11. When entering personal information into a website, make sure that the URL starts with https://. The “s” stands for secure and means that any information entered into the website is encrypted so that no one else can access it.
12. Use caution when connecting to unfamiliar or public Wi-Fi networks. These networks are sometimes referred to as zombie networks and can be the gateway to malware or viruses. As an extra safety measure, turn off your Wi-Fi or Bluetooth when not using it.
13. Add a DNS service to protect other devices. A DNS or domain name system service converts a web address (a series of letters) into a machine-readable IP address (a series of numbers). You're probably using your ISP's DNS service by default, but you can opt to subscribe to openDNS which redirect you if you attempt to access a malicious site.
14. When checking your bank account or paying a bill online use the incognito mode or private browsing and when you finish the browsing, clear browsing history, stored password and cache from browser settings.
Normally web browsers store information like your browsing history, images, videos, text and cookies in a cache. A cache stores information about a webpage that lets it load faster the next time you visit.
15. Use more than one email address one for social networking and other for your business. (Honestly, i've more than 23 email addresses).
16. Keep your account numbers, user names, and passwords secret. Don't share it with your boyfriend/girlfriend. At the time of breakup, they can hit your privacy by getting the help from outside sources.
17. Avoid tech support phone scams: Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can trick you into installing malicious software that could capture sensitive data.
Share it with your friends on Facebook