Author Archives: Techiax
Test
6 ways to access blocked websites

If you also feel stifled by the blocked websites then here are some ways to access blocked websites:
1. Become Anonymous: Use Proxy Websites
A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from the ISPs and allows you to access blocked websites. To get a proxy website for any blocked site, just perform the Google search.
Eg: Facebook Proxy Server. In case, Facebook is blocked in your institution, or you can go to
http://www.spysurfing.com/
http://proxify.us/p/ and more…
2. Use VPN
VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.
Check out our How To set-up VPN on Android devices without the need of any software
3. Use IP Rather Than URL
The blocked website sometimes are stored as a list of URLs and using IP of the website might work in few of the cases. To get the IP address for any website, you do a ping domain.com command in Command Prompt.
Using IP is a simple way to access blocked websites in your region. However, if the website had hidden its IP too, then it won’t open with this method.
4. Change Network Proxy In Browsers
Your college or institute might be having more than one proxy for its network. So, it happens that some websites are restricted on one proxy, but accessible in another. So, you can give a try to proxy surfing to access blocked websites in your college.
Change the advanced settings of your Firefox browser and select the Manual Proxy. Put the bypass proxy under HTTP proxy.
5. Use Google Translate
Institutes or even countries sometimes don’t ban Google Translate. So, you can bypass the restriction by converting the blocked website into some other language that you may know. Try Google Translate and see for yourself. It is yet another simple way to access blocked websites.
6. Bypass via Extensions
If the websites that are blocked by your institute or office are dynamic in nature such as Facebook or YouTube, then should give a try to these extensions. Hola and ProxMate are some extensions that you can use to access blocked websites.
These are some of the most effective and easy to use methods to circumvent the censorship that has been put on your favorite websites. Let us know which one do you prefer to access blocked websites in your region.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Top 10 sites to protect your online privacy
Online Privacy is one of the major concerns among the citizens today. It is no secret that companies and websites keep a check on your online habits and store your personal information (sometimes messages or emails). The information leaves you open to hackers and is sold to third parties including government.
Here’s a list of 10 websites and services to protect your online privacy and help you stay anonymous to some extent on the Internet.
1) TOR
The Onion Router, more famously known as TOR, is by far one of the best ways to protect your online privacy. TOR is a free software that directs the Internet traffic through more than 6,000 relays worldwide. TOR conceals your identity and encrypts your query, thus, giving you safe passage inside the world wide web.
TOR saves you from the direct cyber attack. You will be amazed to see the intensity of cyber attacks across the globe in the Norse Map taking place right now.
2) DuckDuckGo
DuckDuckGo is a privacy-focused search engine and since last two years has witnessed a whopping 600% growth, especially after the NSA leaks. DuckDuckGo goes by catchphrase of “the search engine that doesn’t track you”.
The website promotes strict online privacy measures and claims that it doesn’t collect information about its users, and neither sends your IP address while crawling the web. DuckDuckGo is the search engine you would want to prefer to protect your online privacy.
3) StartPage
Startpage is another private search engine that subroutes your queries to Google, through itself. The searches are seen from the StartPage’s servers and give you anonymity on Google. Just like DuckDuckGo, Startpage doesn’t monitor your IP address and provides you with enough online privacy.
4) MyPermissions
MyPermmission is an extension that tells you which of your apps are connected to your social media accounts such as Facebook or Google which can possibly track your online actions. Once known, you can revoke those permissions.
MyPermissions will also inform of such actions in case you install new apps, thus, helping you to protect your privacy online.
5) Hide My Ass
Hide My Ass is a paid VPN service that hides your real IP address and gives out one of its own. In this way, you stay protected, no matter which website you visit.
Hide My Ass also allows you to circumvent and gives access to the blocked websites. A definite thumbs up for this VPN service that gives you online privacy.
6) Express VPN
Express VPN brags of both the security and speed. Express VPN is SSL secured with 256-bit encryption and optimizes continuously to provide the users a super fast encrypted network.
Express VPN provides online privacy and secure surfing for $12.95 per month and an annual subscription of $99.95.
7) IP Vanish
Another paid VPN service provider that allows to surf the Internet anonymously and gives you access to the blocked websites for $77.99 per year subscription.
IP Vanish protects your identity through its encrypted channels, so comes in the list of ways to protect your online privacy.
8) Just Delete Me
Just Delete Me is a directory of direct links that helps you to erase all of your digital footprint by deleting your accounts from web services. The directory has hundreds of websites including social media sites like Facebook, messaging apps like Snapchat, and even Google.
If someday anxiety over online privacy gets to you, then remember Just Delete Me.
9) Buffered VPN
Buffered VPN is in the list of paid VPN services that protects your privacy by hiding your IP Address and allows you to overcome firewalls. You can use Buffered VPN for a secure browsing experience and protect your online privacy.
10) ToS;DR
Terms of Service; Didn’t Read is the service for you if are skeptical and fed up of all the terms and conditions that are provided for the simplest of the anonymity services. It helps you to understand the intricacies of all the T&C and tells you how the services use your data . ToS;DR saves you from false promises and tricks and helps you to safe and protect your online privacy.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Now you can stream apps with google
Google’s push to organize the world’s information has recently been focused on figuring out the best way to index mobile apps. Today, the company started indexing Android apps that don’t have matching web content, and even began experimenting with letting users stream apps that they don’t have installed.
Google has been testing various levels of app indexing for years, with features showing up as early as December 2013. The company typically begins with Android, and then considers expanding functionality to iOS. This time is no different: Both of these new features are only available on Google’s mobile operating system.
Until now, Google has only indexed apps that have matching web content, meaning you could always find a corresponding website with the same information. Now, the company is going after content that lives primarily in apps (it doesn’t exist online or it provides a poor user experience). Today’s debut begins with just nine apps: Hotel Tonight, Weather, Chimani, Gormey, My Horoscope, Visual Anatomy Free, Useful Knots, Daily Horoscope, and New York Subway.

“We want to make sure users are engaging with this app-only content” and that “the streaming experience works well,” Rajan Patel, Google’s director of mobile search, told VentureBeat. “If users enjoy it, and we see they’re using it, we will expand the scope.”
Additionally, if you don’t have a given app installed, Google will now let you stream content — as long as you’re on a reliable Wi-Fi connection. That means you don’t have to install the app to get the information you’re looking for.
In fact, you can even accomplish tasks like booking a hotel room without installing the app. When these apps show up in search results, they are accompanied with a Stream button. Tapping it takes you into a streamed version that you can interact with as if you had the app on your phone. Android Lollipop is required, tablets are not yet supported, and the search has to be conducted through Google (streaming won’t work through Google’s mobile site).
But how does the feature work? Well, the streaming technology is built “at least in part” into the Google app. But Google also can’t just stream any app.
“These apps are running on virtual machines on Google Cloud Platform, using the same technology as the Google Cloud Test Lab,” a Google spokesperson told VentureBeat. “It’s similar to a streamed video, but interactive, with swipe, tap, etc. signals being sent to the streamed app in essentially real time. We are experimenting with a few apps initially to get the user experience right, but we are looking to scale to more apps soon.”
This is a big play from Google, as it could fundamentally change how searching for in-app content works on mobile devices. Right now, Google serves up the app if you have it installed, possibly even the specific section with what you’re looking for. If you don’t have the app installed, Google gives you the corresponding mobile webpage. Going forward, Google will give you the app whether you have it installed (it just launches) or not (it just streams).
In its announcement today, Google also shared it now has over 100 billion deep links into apps in its search index. These include popular apps like Facebook, Instagram, Airbnb, and Pinterest. In fact, over 40 percent of Google searches on Android now surface app content.
Google is well aware that search has evolved from simply entering queries into a desktop browser. “We’re not thinking about desktop at all right now, in terms of experience,” Patel explained. This is all about mobile.
“Today, you’re more likely to be searching on your mobile device, and the best answers may be buried in an app … perhaps one that you don’t even have installed yet,” the company acknowledged.
And that’s exactly why Google is investing in indexing apps: The company wants all the world’s information, wherever it resides.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Best notepad hacks and tricks
Notepad Is Just A Simple Text Editor Provided By Every OS. It Is A Program That Is Pre-Installed In The Operating System To Create Text Files. It Almost Supports All Extension Like Html, JavaScript, JQuery, Batch Files Etc. Mostly The Programmers Use Notepad For Coding Because It Is The Best Way To Improve Programming Skills. It Has A Simple Graphical User Interface And Very Easy To Use. But If You Think That Notepad Is Only Use For This Stuff Then You Are Wrong. There Are Many Notepad Tricks And Hacks, With This You Can Make Fun With Your Friends In The School And College. The Notepad Tricks Are Just Simple Commands To Use To Run Small Programs. You Just Have To Copy The Code And Paste In Your Notepad And Then Save With The Extension Of That File. It Will Create A Simple Icon On Your Desktop Or Where Ever You Save The File. Run The File And You Will See The Effect Of That File. So Here I Am Going To Discuss You Notepad Tricks And The Features That Make Notepad Very Famous.
Notepad Tricks And Hacks 2016
#1. Falling Matrix Code Effect
This Is The Cool And Best Notepad Trick Ever. In This Trick You Will See The Green Code Falling Continuously. This Trick Is Inspired By The Matrix Movie.
- Open Your Notepad
- Copy The Below Given Code And Paste In Your Notepad.
- Then Save The File With Name.Bat Extension. You Can Place The Name Whatever You Want To But .Bat Is Must.
@Echo Off Color 02 :Start Echo %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% Goto Start
#2. Create Your Own Diary
This Is The Another Best Notepad Trick. In This Trick I Will Show You How You Can Create Your Own Diary So Whenever You Write Something On Notepad And Save It Will Automatically Save Your File With Date And Time.
- Open Notepad
- Now Type .LOG In Notepad
- Then Save The File As A Log.Txt
- Then Open The Program And Type Anything In The Notepad Then Save It And You Will See It Will Automatically Save With The Date And Time.
#3. Computer Speaking Your Message
With The Help Of This Cool Notepad Trick Your Computer Will Be Able To Speak Whatever You Want To Speak From Your Computer.
- Open Notepad.
- Copy The Below Given Code And Paste In Your Notepad.
- Then Save The File With Name.Vbs Extension Then Double Click On The Icon To Run It.
- You Can Replace Text “Welcome To Mytrickscorner.Com” With Your Own Message.
Dim Speaks, Speech
Speaks="Welcome To Mytrickscorner.Com"
Set Speech=CreateObject("Sapi.Spvoice")
Speech.Speak Speaks
#4. Dancing Keyboard LED
This Notepad Trick Make Your Computer’s LEDs Dancing.
- Open Notepad.
- Copy The Given Code And Paste In Yout Notepad.
- Then Save The File With Name.Vbs Extension Then Double Click To Run It.
Set WshShell =Wscript.CreateObject("WScript.Shell")
Do
Wscript.Sleep 100
Wshshell.Sendkeys "{CAPSLOCK}"
Wshshell.Sendkeys "{NUMLOCK}"
Wshshell.Sendkeys "{SCROLLLOCK}"
Loop
#5. Disable The Mouse
This One Is The Funny Notepad Trick With The Help Of This Trick You Can Disable Your Computer’s Mouse Just With The Help Of This Simple Code.
- Open Notepad.
- Copy The Given Code And Paste In Notepad.
- Then Save The File With Name.Vbs Extension.
Rem Disable Mouse Set Key="HKEY_LOCAL_MACHINEsystemCurrentControlSetServicesMouclass" Reg Delete %Key% Reg Add %Key% /V Start /T REG_DWORD /D 4
#6. Eject CD Drive Continuously
With The Help Of This Notepad Trick Your Computer’s CD/DVD Drive Will Move Continuously Until You Stop The Script. You Can Amaze Your Friends With This Amazing Notepad Trick.
- Open Notepad.
- Copy The Given Code And Paste In Notepad.
- Then Save The Name.Vbs Extension.
Set OWMP = CreateObject("WMPlayer.OCX.7")
Set ColCDROMs = OWMP.CdromCollection
Do
If ColCDROMs.Count >= 1 Then
For I = 0 To ColCDROMs.Count - 1
ColCDROMs.Item(I).Eject
Next
For I = 0 To ColCDROMs.Count - 1
ColCDROMs.Item(I).Eject
Next
End If
Wscript.Sleep 5000
Loop
#7. Shut Down PC
Here Is Another Best Notepad Trick With This You Will Be Able To Shut Down Your PC Laptop Direct By Double Clicking On The Program Created With The Given Code.
- Open Notepad.
- Copt The Code And Paste In Notepad.
- Then Save The File Name.Bat Extension.
@Echo Off Shutdown.Exe -S -T 10 Cls Msg * I Don’t Like You SHIT!
#8. Create Password Protected Folder Lock
With This Amazing Trick You Can Create A Folder With Password Protected.
- Open Notepad.
- Copy The Given Code And Paste In Notepad.
- Now Save The File With Locker.Bat.
- The Password Of The Folder Is Mytrickscorener.
- You Can Change The Password By Replacing Mytrickscorener From The Code With Your Own Text.
@ECHO OFF
Title Folder Locker
If EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Goto UNLOCK
If NOT EXIST Locker Goto MDLOCKER
:CONFIRM
Echo Are You Sure U Want To Lock The Folder (Y/N)
Set/P "Cho=>"
If %Cho%==Y Goto LOCK
If %Cho%==Y Goto LOCK
If %Cho%==N Goto END
If %Cho%==N Goto END
Echo Invalid Choice.
Goto CONFIRM
:LOCK
Ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
Attrib +H +S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
Echo Folder Locked
Goto End
:UNLOCK
Echo Enter Password To Unlock Folder
Set/P "Pass=>"
If NOT %Pass%==Mytrickscorener Goto FAIL
Attrib -H -S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
Ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
Echo Folder Unlocked Successfully
Goto End
:FAIL
Echo Invalid Password
Goto End
:MDLOCKER
Md Locker
Echo Locker Created Successfully
Goto End
:End
#9. Convey Your Friend A Lil’ Message And Shut Down His / Her Computer
- Open Notepad.
- Copy The Given Code And Paste In Notepad.
- Now Save The File With Name.Bat Extension And Run It.
@Echo Off Msg * I Don’t Like You Shutdown -C “Error! You Are Stupid!” -S
#10. Open Notepad Continually In Your Friend’s Computer
With This Cool Trick You Can Make Fun Of Your Friends. Simple Create A File With The Given Code And Send It To Your Friends. When Your Friend Open This File The Notepad Will Continually Open In Their Computer Until They Stop The Program.
- Open Notepad.
- Copy The Given Code And Paste In Notepad.
- Now Save The File With Name.Bat Extension And Send It To Your Friend.
@ECHO Off :Top START %SystemRoot%System32notepad.Exe GOTO Top
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Move Whatsapp conversations from one Android to another
Whatsapp is one of the most widely used messaging app in android & iPhone Smartphone till today. It has various features like real time messaging, media sharing (images, videos etc), group chatting and so on. Apart from this, Whatsapp also offers some hidden features that most of the people don’t know. And one of the most important is the conversation backup and its portability. That is you can use this backup file to get your conversation on any android device where you want to retrieve your conversations. And in this post we will be discussing on the same that is the method to move your chats from your old android to your new one. So have a look on complete method discussed below to proceed.
How to Move Whatsapp Conversations Of One Android To Another
The method that we are going to discuss right is simple and straight and you just need to copy paste and nothing else and you will get conversation from one android device to another. You just have to move the backup file of conversation that is there is database of your whatsapp to the device where you want to get all the chats. just follow the below steps to proceed.
Steps To Move your Whatsapp Chats From One Android To Another:
- First of all go to your wahtsapp settings -> conversations and then backup now to backup all your chats records to the current time.
- Now in your android device you need to do is go to the Internal storage and then navigate to the folder Whatsapp in your file manager.
- Now there you will find Database folder, you just need is copy that folder and then paste in external sd card to transfer conversations from your current device to any other.

- Now put that External Sd card in your another android where you want to get your chats
- In that android uninstall the whatsapp if already there and then go to Whatsapp folder in internal storage and rename Database folder to Database1.
- Now copy the Database folder from external sd card and then paste in the Whatsapp folder of internal Storage and this folder will contain your chats of your previous android.

- Now install whatsapp and this time when you see the Restore button simply click on that button and all your chats will get retrieved in your whatsapp.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Is it wrong to pull USB out without ejecting?

Your computer will often display a scary warning if you fail to safely eject the drive. But do you actually still need to do this? What happens if you don’t?
Is there any harm to be incurred by just pulling a flash drive out? Why do we need safe removal at all?
We have all been guilty of ripping our USB drives out of our computers instead of ejecting them properly, only to receive the judgemental pop up telling us we really shouldn’t have done that.
But when everything on the USB works fine next time you plug it in, you can’t help but doubt: does it actually do anything when you safely eject your disk before removing it?
Well, we’ve done a little background study, and it turns out that it does. In fact, waiting those extra 30 seconds to safely eject could help to properly save your data and software.
Previously, operating systems treat disks as items that can be trusted not to change state unexpectedly. When reading or writing files, the OS expects the files to remain available and not suddenly vanish in mid-read or mid-write.
If a file is open, a program reading the file expects to be able to return to it and continue reading. Similarly, write orders may be dispatched to a writing subroutine and forgotten by the main program. If a drive disappears between the times the subroutine is called and the data is written to disk, that data is lost eternally.
In the olden days, there were official processes to physically “mount” and “unmount” storage media, and the physical act of mounting a tape or a disk pack triggered some mechanical switch to identify the presence or absence of media. Once the mechanism was engaged, the software could start to use the media (a “soft mount.”). Some media even had mechanical interlock to avoid media from being expelled or removed until the software processes using the media free the lock.
As Phillip Remaker explains over at Quora that our operating systems have been programmed to treat our external drives like USB sticks – like they’ll always be there. It expects the files on it to remain reachable indefinitely and these changes the way it interacts with a flash drive.
This means if a program on your computer is just reading a file and not actually saving any information to the drive, it’s probably not going mess things up too much for the files on your USB stick if you suddenly pull it out. But you do risk confusing your computer, says Remaker. “Symptoms could include: Lost data, corrupted file systems, crashing programs, or hanging computers requiring a reboot.”
The Macintosh floppy and optical disk provide more current examples of an interlocked physical and soft mount. One could only eject media through a software command, but that command might fail if some program was holding a file open on the medium. Enter USB connected storage. There is no mechanical interlock in a USB connection to coordinate the hard and soft mount. The user can decide to rip the disk out from under the operating system at any time, and endure all manner of programs freaking out about the sudden loss of media. “Hey! I was using that!”
A safe removal does a few things like it flushes all active writes to disk, alerts all programs (that know how to be alerted) that the disk is going away, and to take suitable action and it alerts the user when programs have failed to take action, and still are holding files open.
You can remove a disk at any time, but you are at the pity of how well programs using the disk manage with the sudden disappearance of that disk.
In the new computer, many steps have been taken to protect against the unpredictable and casual removal of media. For example, Windows even introduced a feature called “Optimise for Quick Removal” that makes sure data is written quickly instead of batched up and written professionally. It is very hard to get people to change habits. If you are doing exclusively reads on a media, safe removal is perhaps not needed. If you are doing writes, you are probably OK to skip safe removal if you haven’t written recently and you aren’t doing something silly like indexing that disk.
As a good friend of mine once said: Life is too small to safely eject the disk.
However, Safe Removal does a number of essential things and is, in fact, the only assuredly secure way to remove a disk. You probably don’t need it most of the time, but it is a good habit to have since data loss sucks.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
View and delete Google Now Voice command history
Google Now Voice command is a cool feature in android that helps you to control your android device without actually touching your device. When you speak to this google now then your voice get recorded and the audio files of that audio get upload to google servers and that actually get stores. Many user doesn’t know about this, That is why we are here discussing the same. In this guide i will tell you the method or say the way by which you actually view all your saved voice commands in your account and also even delete all the saved history of your google now voice search. So follow up the complete guide discussed below to proceed.
How to View & Delete all Google Now Voice Command History
For viewing and deleting these commands records you will be exploring out your google account that you linked with your android and that account will contain all the saved records and you can easily manage all of them according to your wish. Just follow some simple steps below.
Steps To View & Delete all Your Google Now Voice Command Search History:
- First of all you need to be logged in your google account in your browser in which you want to view and delete all your voice command history.
- Now visit the Google Voice History page in your browser.
- Now you will see all the voice commands history that being stored in your account and all these will be sorted according to the date they had made.

4.Now if you want to listen them then simply click on the play button in the front of the every command
5.This will contain all the command that intentionally or accidentally made by you in your android device.
6. Now if you want to delete them then simply click on three doted buttons at the top and then select Delete Options.

7.Now you will select the duration for which you want to clear your history, if you want to clear all of the history then simply click on advanced and then in drop down select All time now click on delete button there.
8. That’s it you are done, this will clear out all your voice command search history that being stored in your google account.
If you like our posts please like us on facebook and support us.
Please let us know about your views in comments.
Top 10 Evil Ways to Use Technology

Like other powerful tools, technology can be used for great good or for great evil. Learn how people use technology for wrongdoing so you can protect yourself—or use their tricks to actually do good. Here are the top 10 “evil” ways you can use technology.
10. Spoof Caller ID
Pranksters and scammers use caller ID spoofing to take advantage of us—in common telephone scams, for example, where “Microsoft” calls to warn you your computer has a virus and they’ll help you fix it (for a fee). There are legitimate reasons why you might want to make your phone number show up differently on caller ID (e.g., place a call to a young kid as Santa or Cinderella), and there are lots of spoofing apps and services to help you do this.
9. Uncover Blurred Information in Photos
People blur out the information in photos to make sure sensitive information isn’t readable to others, but it turns out this strategy isn’t that secure—particularly when you’re trying to hide numbers. The takeaway: Don’t use simple mosaics to blur your image.
8. Create a USB Password Stealer

It’s bad enough that major password leaks happen so often, hackers can steal our passwords with just a USB flash drive and a single script, grabbing our cache of passwords stored in our browser and elsewhere. You might want to test your vulnerability to this trick yourself, but either way, to protect yourself, remember the security basics: always have physical control over your computer, use a secure password manager and turn on two-factor authentication.
7. Get into a Private BitTorrent Tracker or Usenet Indexer
Private trackers and usenet indexers are great communities, but they take dedication and they’re hard to get into. While some of our strategies for getting into one aren’t necessarily “evil,” you’ll be working your way into exclusive private file sharing communities.
6. Spoof an Email Address
Caller ID isn’t the only thing spammers spoof. If you’ve ever gotten a strange, spammy email from a friend—or, worse, your email account just spammed all of your contacts—you know how annoying spoofed emails can be. Here’s how data thieves spoof email addresses to phish for information or con us into sending money to Nigerian princes. If you think you’ve been impersonated, you’ll need to take some advanced steps to secure your account.
5. Snoop on Someone’s Phone or Computer Without Them Knowing

Is your company monitoring you? Possibly. The NSA? Your ISP? Yeah. But it’s pretty easy too for a friend or family member to dig into your phone or computer without you knowing—whether by gaining physical access to your phone or computer or using remote monitoring tools. Parents might snoop on their kids, significant others might snoop on their partners out of insecurity or suspicion, whatever the reason, covering those snooping tracks isn’t that hard. If you think you might be the one being snooped on, look for signs any of those stealthy steps weren’t followed. If you share a computer with someone else, learn how you can still protect your privacy with this guide.
4. Crack a Wi-Fi Password
WEP passwords are too easy to crack with tools like BackTrack making it super simple to get into a WEP-”protected” router. That’s why everyone recommends using WPA—or really, WPA2, the latest encryption standard.WPA can be cracked too, though! That is, if your router has WPS turned on. So disable WPS if you can or try open-source router firmware like DD-WRT, which doesn’t support WPS.
3. Hack a Wi-Fi Network
Why would someone want to steal your router’s password? Besides stealing your Wi-Fi bandwidth, to spy on everything going on over your network, of course. It’s amazing the DIY creations hackers can use to sniff out network packets. Fake routers and networks, created with the help of Kali Linux, for example, can be used to trick machines into connecting, and then eavesdrop on network communications. (Yes, there’s a lot of spoofing going on in this article!) This is a good time to remind you to check your router’s settings—especially these top security settings.
2. Sniff Out Passwords and Cookies
This is somewhat related to hacking a Wi-Fi network, but it’s more about the dangers of using public Wi-Fi. It’s really easy for hackers to steal your logins and snoop on your browsing session, when the network is not secure or you’re connecting to sites that don’t use HTTPS. To protect yourself, your best bet is to use a VPN whenever you’re using public Wi-Fi or follow some of these other safety precautions.
1. Break into a Computer
Finally, you might shudder to know it’s pretty easy to break into a computer, whether it’s a Windows PC or a Mac—even if your computer is password protected. If your computer is encrypted, however, such as with BitLocker (for Windows) or FileVault (on Mac), you’ll be protected from some of the more common methods hackers use to steal data from a computer. You’ll also want to make sure you have a very strong, unique password for your computer login. If you get locked out of your computer, however, and forgot your password, well, now you know how to get back in.
If you like our post please like us on facebook and support us.
Please share your views in comments