World Hacker

World Hacker
Hacking page 2's



what is Ransomware ?


what is Ransomware?


Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to gain access to the files is to pay a ransom.


Ransomware is part of sophisticated malware that blocks the victim's access to his files, and the only way to regain access to the files is to pay a ransom.


Two types of ransomware in circulation:


(There are two types of ransomware in circulation:)


Encrypting ransomware, which includes advanced encryption algorithms.


It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content.


Examples include CryptoLocker, Locky, CrytpoWall and more.


(Encrypting ransomware, which incorporates advanced encryption algorithms.


 It was designed to block system files and request payment to provide the victim with a key that can decrypt the blocked conte


Examples include CryptoLocker, Locky, CrytpoWall and more.)


Ransomware locker, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files.


Ransomware locker, which locks the victim out of the operating system, making it impossible to access the desktop and any applications or files.


The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.


These files are not encrypted in this case, but the attackers are Locker ransomware, which locks the victim away from the operating system, making it impossible to access desktops and any apps or files.


Examples include the police-themed ransomware or Winlocker.


 The files are not encrypted in this case, but the attackers are still asking for a ransom to unlock the infected computer.


 Examples include police-themed ransomware or Winlocker.


"https://en.wikipedia.org/wiki/Ransomware"


_________________________


W****what is pendrive hacking ?


(what is a hacking flash?)


Windows allows the storage of the passwords, as do modern browsers. While this feature is convenient for users, it has impacted itself as a big security risk among organizations.


Windows allows password storage, as do modern browsers. Although this feature is convenient for users, it has placed itself as a major security risk among organizations.


We know that browsers store most passwords on a daily basis, like MSN messenger, Yahoo, Facebook passwords, etc. Most people lack time and ask their browsers to save their passwords.


We know that browsers store most passwords on a daily basis, such as MSN messenger, Yahoo, Facebook passwords, etc. Most of the people are short on time and ask their browsers to save their passwords.


As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to make a USB password stealer and steal saved passwords.


As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to create a USB password thief and steal saved passwords.


Just to explain the concept, we are going to collect some password stealing tools, tools that are freely available on the internet and capable of steering the passwords stored in the browsers or other windows files.


Just to explain the concept, we will collect some password-stealing tools, tools that are freely available on the internet and capable of stealing passwords stored in browsers or otherwise.


Then, we create a batch program that will execute these combined programs and store the stolen usernames and passwords in a text file.


Then, we created a batch program that would run this combined program and store the stolen username and password in a text file.


To further spice up the penetration testing demonstration, we will also make this batch file execute as an auto-run for the USB stick, effectively stealing the passwords as we plug it in.


To further improve the penetration testing demonstration, we will also make this batch file executed as auto-run for USB sticks, effectively stealing the password when we install it.


Download tools from here: "http://securityxploded.com"


Download tool from here: "http://securityxploded.com"


_________________________


What is malware and how can we prevent it ?


(What is malware and how can we prevent it?)


Malware is an abbreviated term meaning malicious software.


Malware is a short term meaning malicious software.


This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.


This is software specifically designed to gain access to or damage a computer without the knowledge of its owner.


There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.


There are different types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.


The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be aware when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.


The best protection from malware continues to be the usual advice: be careful what email attachments you open, be careful when surfing and stay away from suspicious websites, and install and create


_________________________


How to Remove Memory Card Password ?


(How To Remove Memory Card Password?)


Today every mobile user weather it is android,ios or any other use memory card in their devices. And this small chip is a device that can store million bytes of data.


Nowadays every mobile phone user can use android, ios, or any other memory card that uses their device. And these tiny chips are devices that can store millions of bytes of data.


Sometimes we protect our memory card with password, but forget that. In that case you will have trouble to access your memory card or copy paste anything in it. So in this post I will tell you a trick which will remove the memory card password. Just follow the below to proceed.


Sometimes we protect our memory card with a password, but forget it. In this case you will have difficulty accessing your memory card or copying anything that is on it. So in this post I will tell you a trick


The method to remove password from memory card is very simple and easy and this can be done by two ways, either from Pc or from android device. Also you can even view your current password too. Just follow the below steps to proceed.


The method to remove the password from the memory card is very simple and easy and this can be done in two ways, either from a Pc or from an android device. You can even see the current password as well. Follow the steps below to continue.


Steps To View & Remove Password Of Memory Card Using Android:-


Steps To View and Remove Memory Card Passwords Using Android: -




First of all insert your password protected memory card in your android device.


First of all, enter a password-protected memory card on your android device.


2.Now download the ES file Explorer in your Android and open it.


Now download ES file Explorer on your android and open it.


3.Now there go to system folder and location the file mmcstore.


Now go to the system folder and look for the mmcstore file.




Now rename it as mmcstore.txt and open it.


Now change the name to mmcstore.txt and open it.


5.Now there you can see the current password of your memory card, note it down.




Now in memory card option click on remove password and then paste the password that you have noted.


Now in the memory card option click remove password and then paste the password you have recorded.




Thats it you are done.


It's done.


Steps To Remove Password Of Memory Card Using PC




(Step To Remove Password From Memory Card Using PC)


With this method all your data will get lost as you will be going to format your memory card in this method, so I recommend to use above method and if it doesn’t work then go for this method


With this method all your data will be lost as you will format your memory card in this method, so I recommend using the above method and if it does not work then use this method


1. First of all insert your memory card in any smartphone.


First of all, insert your memory card into one of the smartphones.


2. Now connect the phone with computer using USB cable.


Now connect your phone to your computer using a USB cable.


3.Now right click on memory card drive in your Pc and click on format(It will not ask any password to format.)


Now right-click on the memory card drive on your PC and click on the format (It won't ask for a password to format).


Thats it by formatting your memory card password will also get removed and you can now access your memory card completely.


That by formatting your memory card password will also be deleted and now you can access your memory card completely.


So above are the two ways for How To Remove Password Of Memory Card. By these ways you can easily view or remove password from memory card and can easily share data from it. And this method is such a simple that even non tech person can also do this by just following the simple steps discussed above. enjoy;)


So above are two ways to Delete Memory Card Passwords. This way you can easily see or remove the password from the memory card and can easily share the data from it. And this method is as simple as it is that even non-techy people can also do this by simply following the simple steps discussed above. Good luck with ;)


_________________________


What is phishing ?


What is phishing?


Phishing is a fraudulent attempt, usually made through email, to steal your personal information.


Phishing is a fraudulent attempt, usually done via email, to steal your personal information.


The best way to protect yourself from phishing is to learn how to recognize a phish.


The best way to protect yourself from phishing is to learn how to recognize phish.


Phishing emails normally appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password.


Phishing emails usually come from well-known organizations and ask for your personal information - such as credit card numbers, social security numbers, account numbers or passwords.


Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.


Many times phishing attempts seem to come from sites, services, and companies that you don't even have an account for.


In order for Internet criminals to successfully phish your personal information, they must get you to go from an email to a website.


In order for Internet criminals to successfully deceive your personal information, they must make you switch from email to website.


Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is required. Legitimate organizations would never request this information of you via email.


Phishing emails almost always tell you to click on links that take you to sites where your personal information is requested. Legitimate organizations will never ask for this information from you


more details here:


complete info :


"https://spyboyblog.wordpress.com/2015/01/11/hack\-facebook\-by\-phishing\-meathod/"


_________________________


What is a Trojan Virus ?


What is Trojan Virus?


A Trojan horse or Trojan is a type of malware that is oft disguised as legitimate software.


A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.


Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.


Trojans can be used by cyber thieves and hackers trying to gain access to user systems.


Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.


Users are usually tricked by some form of social engineering into loading and executing Trojans on their system.


Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system


Once enabled, the Trojan can allow cybercriminals to spy on you, steal your sensitive data, and gain backdoor access to your system


These actions can include:


Deleting data, though,


Data blocking, though,


Modifying data, though,


Copying data..


This action may include:


 Deleting data,


 Blocking data,


 Modifying data,


 Copying data ..


Disrupting the performance of computers or computer networks


Like computer viruses and worms, Trojans are not able to self-replicate.


Interfere with the performance of computers or computer networks


 Unlike computer viruses and worms, Trojans cannot self-replicate.


_________________________


**8 May 2020


" remember learn the word ² and the above meaning .because someday it will be useful "


*do not give up on studying*