Showing posts with label Security Tips. Show all posts
Showing posts with label Security Tips. Show all posts

Sunday, 30 September 2018

USBHarpoon : BadUSB Attack | USBHarpoon a Charging Cable That Hacks Your Computer

Hello guys,In today's post we will know about USBHarpoon so some security experts have created a malicious version of USB charging cable, As soon as it is plugged into a computer or laptop, computer can be hacked by pre key-stock and command. This is done by re-programing the USB Controller Chip in Harpoon that the computer thinks that a (HID)human interface device is connected. Such as keyboard, Mic, game controller etc. In such situation, the process of key-stock connected to the computer's command charging cable, by which it gets malicious code run, And the computer gets compromise from that USB cable, it gets connected. This process takes place in a few seconds and the biggest thing of USB harpoon is that it does not even detect Antivirus and Firewall.


computer hacks, android hacks, USBHarpoon, all device affected


Earlier this work was done by the modified USB but now it has turned it into a USB cable and gave it the name USB harpoon. The hardware in this USB charging cable is designed in such a way that they can pass data and power together, In which the computer with malicious command is sent along with charging and it looks like cable normal USB cable. So it is difficult to identify in normal cable and USB harpoon.

MUST READ:


History of USBHarpoon


Behind USBHarpoon is the popular hacker Kevin Mitnick from Vincent Yiu and SYON Security from RFID Research Group. It can work on Bad USB cable Type C "and normal Usb, with it you can also use this cable for mobile with a laptop. As soon as this bad USB connects to victim's system, payload is installed in that computer. If you are connecting to this mobile from a mobile computer then that charge will also happen. If you do not charge mobile then the payload will be executed in the system.

How to hack any computer from USBHarpoon?


As we all know that if we have to hack a victim's computer then we would have to install a payload in his computer or run malware and after that we get access to computer to an extent, but in this process, it becomes difficult for us to install this payload in victim's computer. If victim's computer has antivirus, then that payload is not of any use as the antivirus removes this payload or by detecting malware.


computer hacks, android hacks, USBHarpoon, all device affected


There will not be anything like this in USBHarpoon. On the other hand, if you want to hack any computer, you have to send malware to its computer, But in this USB cable, all ready is the payload that is not visible to the victim and the victim automatically understands this cable as normal cable when you connect to the computer and this payload gets installed in its computer and the thing with all of this payload is that it does not detect any anti virus and firewall. So Hacker can easily attack your computer.
This cable does not come in India but in the coming days, it can be seen in Attack India also. You just did not become a victim of this attack, so no buy made in chaina  from the market made of chagrin's cable "should buy a branded company's own usb cable.

So friends this is the end of the article ,If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh

Tuesday, 21 August 2018

How to remove password from a PDF File | Unlock password protected pdf file| MyTeachWorld

Do you want to open your password protected pdf password and want to know how to remove it, this post is especially for you. Pdf is a name that almost everybody knows, think what would happen if you put a password in your pdf file and forgot it, in this case you will miss Google Uncle.


Unlock password, Crack password, remove password, unlock pdf file


PDF file is a very good utility to collect your information; most organizations, documents and pdf files are provided in the colleges, and all those files are password protected. I will tell you 2 methods here so that you can easily remove any password from PDF file and read the content inside it.

1. Removing the password by anyBizSoft PDF Password Remover software
2. Use the online site to remove the password.

MUST READ:



Removing the password by anyBizSoft PDF Password Remover software

Step1; First of all, you have to download a software on your computer, which is named AnyBizSoft PDF Password Remover. this software is not available for free, you will have to buy it, but you can download its trial version.

Step2; After this, Opening AnyBizSoft PDF Password Remover software is in your computer.

Step3; As soon as you open this software, a screen will open, it will be written as "Getting Starred", which will have an option under Add files, Simply click on it and select your pdf file containing the password.

Step4; Now in the screen you will see an option on the left of the output folder, in it you have to enter the location where your pdf file will be saved and no password will be left in it.

Step5; After inserting the location, Simply click on the start button.

Step6; As soon as you click on Start, the password of PDF will start getting remove and you will see a new screen in which you will see  your pdf password.

Use the online site to remove the password 


If you do not want to use any software, then tell you that without software you can also remove any pdf password. There is a lot of online website that cracks the encryption in PDF. But I will tell you about a very popular website, which cracks passwords very easily. And its user interface is also very easy, it is very easy to use. In the online website, all you have to do is upload your PDF file containing the password, and the rest of the work is done by the website itself.
So let's see how online pdf password removes the password completely from its pdf file using the Remover website.

Step1; First of all, go to this website http://www.pdfunlock.com/, this is the online website that will help us to remove pdf password.

Step2; After this, let the website go completely open.

Step3; Now you will have a simple box that will be see on the click on my computer's option and select it by going to the location of your pdf file, and uploading your pdf file.

Step4; After this you will have to click on the unlock button, this will start uploading your password protected pdf file and after some time you will open a new screen in which your pdf file password will be remove.

Step5; Now Simply download that PDF file from here, now when you open that pdf, you will see that no password will be asked in it.


In this way, you have broken the password of PDF without using any 3rd party software , There is a problem with this method that if your pdf file size is very large, then you will take more time to upload that file, then in this case you need software. So see the above method for it, in which I have removed the password by using a software.

Best Free Software to Break PDF Password?

You saw 2 methods above, one of which was online method and the other was to remove the password of pdf from the software, but you saw that the software was not available for free, because of this I have some software and whose popularity is also very much And their work is also a totally straight forward. You can also download the following software from a link.

  • PDFCrack                                          Download  Now
  • PDF Unlocker                                   Download  Now
  • PDFMate Free PDF Merger           Download  Now
  • PDFCrypt                                           Download  Now
  • PDF Password Remover                 Download  Now 

So friends this is the end of the article ,if you like this post please share it your friends. thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh.


Saturday, 20 January 2018

[WiFi Security WP3] Wi-Fi Alliance launches WPA3 protocol with new security features in 2018

Hello guys , In this post today i am going to tell you  about “WiFi Security WPA3”  Friends, we all take up the work of WiFi, there are many smart devices like your laptop, phone, tablet, computer, and so on. Where we work on WiFi . The WiFi security here is that it becomes very big consent. Now the latest WiFi security work is taking wpa2. Since then there should not be any improvement or any change in it. 

WiFi Security WP3@myteachworld.com


 As you all know that we all use WPA2 security of wifi that came in 2004.
WPA2 was introduce in September 2004
1 Based on the final IEEE 802.11i standard
2 Two modes

  • WPA2 Personal- individuals and SOHOs
  • WPA2 Enterprise- larger enterprises

WPA2 also addresses both encryption and authentication

  • Uses AES for data encryption
  •  Supports IEEE 802.1x for authentication or can also use PSK technology


This WiFi device that is hacking for Vulnerable. Where a hacker  hacks WiFi . Where there were different ways and there were different loopholes, so that his security could be compromised. In such a situation, friends who have the biggest problem come out, when you go in a cafe, and you get there, it is very easy to use an open WiFi network. If there is a hacker sitting there, then he can track your data.
Hacker used many methods to crack the WiFi password. Such as the Bruteforce Attack, Dictionary Attack etc.

READ MORE:





According to Mathy Vanhoef, a network security and applied cryptography post-doctoral candidate and one of the researchers behind the WPA2 KRACK vulnerability which took advantage of the WPA2 uses a four-way handshake that ensures the same password is being used by both clients and access points when they join a Wi-Fi network. WPA3 standard will use a new handshake, which won’t be vulnerable to dictionary attacks. Further, WPA3 will also feature a 192-bit security suite aligned with the Commercial National Security Algorithm (CNSA) Suite that will protect government, defense, and industrial networks that have higher security requirements. The new security features will be available later in 2018.


The Wi-Fi Alliance, an industry body made up of device makers including Apple, Microsoft, and Qualcomm, announced Monday its next-generation wireless network security standard, WPA3. The standard will replace WPA2, a near-two decades old security protocol that's built in to protect almost every wireless device today including phones, laptops, and the Internet of Things.


WiFi Security WP3@myteachworld.com


If you’re buying a new router or other network equipment later this year, you’ll want to look out for WPA3 certification. Android Police notes that your existing hardware may not receive WPA3 firmware updates because of the certification requirement, but that will largely depend on whether manufacturers care to take the effort to secure the devices they’ve already sold.

If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you

Wednesday, 17 January 2018

[Virus Inside] Meltdown And Spectre Big CPU Security Flaws

Now let's go to today's article which is related by the virus called Meltdown and Spectre. Friends, almost every system is infected with both of these viruses. So friends read carefully that if such an attack is on your system then you can keep yourself safe from this attack.

Friends These viruses are currently infecting most systems and there is no system escape from these viruses, because the method of attacking them is very different, so all the systems are easily hacked.
The most important is that many people who know about these viruses are being infected and their systems are also being hacked and those who do not know their systems are also being hacked. There are some systems that are left of these viruses, or it has the cability to hack almost all the systems.

READ MORE:

What is Meltdown and Spectre?

At present, 2 new bugs have come up. Whose name is Meltdown and Spectre. The most important thing is that these flaws are found in the CPU chip in the computer's brain.
These bugs are all devices that use intel, amd or arm processors. These processors are mostly used in systems. Now whether it be your desktop, laptop, mobile, IOT or RPI devices.
Friends, now you may have understood which devices might be infected with these bugs. With these exploits hackers hack your password, email etc from your system.


[Virus Inside]@myteachworld.com



How to work Security flaws ?

Intel processor devices are in danger of bugs like Metdown and Spectre due to weak security. Windows, Linux, Mac and IOS all devices are infected with Meltdown and Specter bugs. I mean these bugs can hack all these devices Meltdown and Specter exploit on the processor, and as you know, the processor processes all your data. And all the information goes through the CPU, and when these bugs only infects your CPU, then they all hack your personal information. The processor also accesses the CPU's memory.

Security agencies say that in the last 10 years, those devices are made up of 60% of these devices are in danger of bugs. All these devices have to be updated and due to these bugs, the speed of the Intel processor device can also be up to 30%. In addition to Intel, amd and arm processors are also in its grip, which means that it comes into the circulation of its infections.

However, when most companies find this kind of problem, they do not mention it, because if these drawbacks come out, the hackers can make the most of them, but Intel has mistaken about this Even before the arrival of Solution, it was known about the defect and the news came out that this is the reason that Intel's shares have also fallen in the same sense.


How to Avoid Meltdown and Spectre?

Friends now talk about how you can avoid them, however Intel has not taken any of its salutions, but Temperori Solutions is that you have to keep your system and software updated. While Windows has released its security patches, Apple will release its security patches soon.

So friends this is the end of the article ,if you like this post please share it your friends.If you face some problem in any steps please drop your email by going to contact us section of this site. thank you

Saturday, 16 September 2017

[BlueBorne Bluetooth Hacking Attack] What is BlueBorne Exploit?

 Hello guys , In this post today i am going to teach you  about “Blue Borne Exploit”  what is Blue Born Exploit, and how can we avoid this? Friends Recently, Armes Lab has a Bluetooth vulnerability search, named Blue Born. The device which is Bluetooth enabled by this attack can be hacked. The attack vector “BlueBorne” Exposes almost every connected device.
Blue Borne is an attack vector by which hackers can leverage blutooth connection to penetrate and take complete control over targeted devices. Blue Borne affects ordinary computers, mobile phone and the expanding realm of lot devices. The new attack vector endangering major mobile, desktop and lot operating system , including Android ,Windows, iOS , Linux and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airbone) and attacks devices via Blutooth. The attack does not require any malicious file, link or the targeted devices to be paired to the attacker device, or even to be set discoverable mode. The attacker locates active Bluetooth connections and device can be identified.


BlueBorne Bluetooth Hacking Attack@myteachworld.com


It allows an attacker to strike completely undetected , it attack occur without victim’s knowledge.
Suppose a hacker has accessed your smartphone via Blue Brone Attack, then he can take away all the data on your phone and transfer it to his system. Hackers can send viruses or malware to your system, hackers can be hacked from any other device through your device via Bluetooth.
Blue Borne provide a number of opportunities for the attacker. Frist spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second , it allows the attack to bypass current security measures and remain undetected. The attacker obtains the device’s MAC address. Which is a unique identifier of that specific device. By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly.
This is true hacking attack, and this Zero Day vulnerability has been discovered by Armes Lab.

Read More:


How do you find Blue Born vulnerability in your device?

All Android phones, tablets, and wearables(except those using only Bluetooth low energy) of all version are affected by four vulnerabilities found in the Android operating system, two of which allow remote code execution(CVE-2017-0781 and CVE-2017-0782). One results in information leak(CVE-2017-0785) and the last allows an attacker to perform a Man-in-the-middle-attack(CVE-2017-0783).

All Windows computers since WindowS Vista are affected by the ”Blutooth Pineapple” vulnerability which allow an attacker to perform a MAN-IN-THE-MIDDLE-ATTACK(CVE-2017-8628).

All Linux device running BlueZ are affected by the information leak vulnerability(CVE-2017-1000250). All Linux device from version 3.3-rc1 (released in October 2011) are affected by the remote code execution vulnerability(CVE-2017-1000251)

To find Blue Born vulnerability in your device, install the app given below.


Download BlueBorne Vulnerability Scanner 

BlueBorne Bluetooth Hacking Attack@myteachworld.com



If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you

Sunday, 6 August 2017

How to secure the website by finding the Website's Vulnerabilities using Kali Linux?

Hello Friends, today we will know how to find websites' vulnerabilities? First of all, why do you need it? So friends, its main two uses , First, to secure the website and second, to hack the website.Ethical hackers find the drawbacks of the website and make it secure, And the same black hat hacker hacks the website by finding those vulnerabilities.To perform this process you will need kali Linux OS. As you all know, Kali Linux is one of the best passion operating systems of white hat hackers, security researchers and pentester. It offers advanced penetration testing tool and its ease of use.  If you are beginning an ethical hacking or you want to learn to find a website vulnerabilities, then read this post to the last.

how to find websites' vulnerabilities@myteachworld.com


How To Find  Website Vulnerabilities Using Kali Linux [Step by Step follow me]

I'll tell you about a very popular tool called uniscan which is installed by default in kali linux operating system.It is a web vulnerability scanner and It is very powerful tool. And the best thing about this uniscan tool is ,you can use this tool as CLI (command line interface) or GUI (graphical user interface) mode.

READ MORE:


Method1: Command Line Interface(CLI)

Step1; Friends, first you open the terminal window in your Kali linux machine.

Step2; Now type the command uniscan in the terminal window of  Kali linux , and hit enter button.

Step3; Now you will see that the whole detail will be seen in front of you, you found many options or feature of uniscan tool for example enable directory check,enable file check,robot.txt check,enable static change etc.

how to find websites' vulnerabilities@myteachworld.com


Basic scan of a website:

Step4; Friends like I have to  scan of a website named www.myteachworld.com then simply execute this command unscan -u http://www.myteachworld.com .

how to find websites' vulnerabilities@myteachworld.com


Step5; Now you will get the basic details of the website, such as domain name, server, ip, Also these information are saved in the uniscan report folder ,the path of report folder given on the screen. 

Step6; By typing the command given below, you can see the report of the website.
Command:
cd /usr/share/uniscan/report      (hit enter button)

how to find websites' vulnerabilities@myteachworld.com

then type ls command . you can see the list of folder . and again type the command given blow.
Command:
firefox www.myteachworld.com.html    (Your case may be your website.)

how to find websites' vulnerabilities@myteachworld.com


Deep scan of a website:

Step1; You know the information of that website www.myteachworld.com in detail then you need to execute this command unscan -u http://www.myteachworld.com -qwtds and press enter button.
Note: here  -q To check the directory of that website, w to check the file's website, e to check website's sitemap and robot text, after that d for dynamic check and s for static check.
Step2; Now the uniscan tool will start to scan the full website in depth, and provide you full detail about that website such as which php version is used, emails are using  on that site or not,external host, msql is vulnerable or not ,and many more detail and option will get.

Step3; Now All the information is saved in the report folder automatically. 


Method2: Graphical User Interface(GUI)

Friends, this is a very good tool, because we can work with this tool in gui mode. Many people who feel boring to work on cli mode, but both are necessary for an ethical hacker.

Step1; First you open the terminal window of Kali linux.

Step2; Now then simply execute this command uniscan-gui and hit enter button. You will now see that the gui mode of uniscan tool is open in front of you.


Step3; Now you can enter the url of the site which you want to scan .And there are many more option you can choose.

      In the same way you can easily check Vulnerabilitie of any website easily.
So friends this is the end of the article ,if you like this post please share it your friends.If you face some problem in any steps please drop your email by going to contact us section of this site. thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh

Sunday, 18 June 2017

[Security Tips] How to recognize and avoid a phishing page?

Hello Friends, As you all know, in today's time, the whole world is using the Internet. Because nowadays most of our work is going on from the internet, Friends, I am going to tell you today how do you protect yourself all over the Internet? We are working mostly on the internet nowadays and if we do not have any information relating to Internet safety then problems can occur. Friends What happens in the phising attack? In this we can not pay attention and make mistakes in it, and put all your necessary and important information in danger because if this phishing attack works properly then from your bank account to your email id, twitter id and Their username and password are sent to all third party.
It is very important for you to know as much as possible about the phishing attack. I believe that there will be no mistake in any way, so I will tell you everything that is related to phishing attack. so I will tell you everything that is related to phishing attack. So friends Today, we will tell you about a new method of phishing attack, which only professional people are aware of, because these phishing attacks are very difficult to avoid and they also get involved in identifying them, so that any person has their nets But when friends tell us about it, you can also avoid them, but they can recognize them well. Friends today are moving forward in the world of technology like us. In the same way, related crime is increasing with internet and technology. So Friends, we can avoid such criminal activity by having accurate information about using internet and having accurate information about cybercrime. If you have to know about the phising attack or how to avoid it, then you can read this post to the last.

How to recognize and avoid a phishing page@myteachworld.com


READ MORE:



So friends know now what kind of phishing attacks can they be?

E-Commerce Website:

Friends, as you all know, nowadays we go shopping on all the E-Commerce Websites. Because we get a lot here. As I told you that those who are hackers take care of everything that is of their own benefit and that they can hack your account, through which they can steal all your information, and for them E- Where to get good information from the Commerce Website means that it works like a platform for them. Whichever cyber criminals are, they first see your interests from e-commerce websites, what is the interest to you, they make their phishing page related to it.

Antivirus Phishing Page: 

Friends, when you use the Internet, sometimes you suddenly pop up in front of you, and seeing an antivirus warning appears in front of you, and then he tells you that the virus has come to your computer. You clean it and he will clean it. The option is given and when you clean it several times, it looks faill in your computer, it tells you that you have to remove it from the antivirus Please install it.
As soon as you click on the antivirus it gets installed on your computer. It is not really that antivirus, it is a real virus that stole all the information from your computer and sends it to a third party. To avoid if you delete that entire page, by doing so, the popup that goes away.

Help Desk:  

Friends These phishing attacks are the most on the website, when we search something on a website, the help desk page opens on our page. When searching for something and we are not getting it, do not we take help from the help desk and when you get help desk help, which is a phishing page in the realty. He asks for some personal information from you and you understand the formality and enter it so that all your personal information is stolen and you reach the attacker and you do not even know, you just think that due to some reason or fault This page is not open next.

Alert Phishing Page:  

Friends such a phishing attack is via email, when visiting a phishing website, they entice you with a trick that lets you in some way put all your financial information in it. But if you know about the phishing attack, then normally no one can harm you from the phishing attack and you will be able to keep yourself safe from such a phishing attack.

Online Banking Phising: 

The biggest and most disadvantive method of phishing is the use of online banking, as hackers target your bank account. If you use any type of online banking then you can do very carefully with the website that you are putting in the related information from the bank.  It is a phishing page, and thereby stealing all the information related to hackers from your account.
So friends Every time you use online banking, you can use it only with a trusted way. If you look anything different then you can not include any information related to your bank account.

Social Networking Site Phishing: 

Friends, do you know that the social networking sites you use like Facebook, Twitter, Gmail etc. Sometimes Hackers take their support to steal all your information and how does this happen? Many times what hackers do, they create the same phishing page as the same social site, which send the link of that page to your social website, and you can give them any kind of greed on that link as you would Much like. 
If Friends are ever with you and you are already on the social site and clicking on a link again asks for your password and username again, you should never share your password or any Personal Information on that page.

Login Phising Page: 

Friends hackers create a faked page in the name of some popular websites, which you can send also for which you have to login and when you login in it all your information goes to the third party.
To avoid this, first of all, you have to check that this website has to be logged in this way, because the website does not ask for any more information.

Final Word:  Friends Nowadays, many of the phishing pages make you easily steal anyone's information from the phishing page, but many people do not know that it is illegal to do so. These are just a few phishing attacks from related knowledge, there are many other tricks that can make hackers targets. But if you have the right information then you can avoid such a phishing attack.

If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post, you can use the share buttons given below. Thank U and Good Bye.

Friday, 9 June 2017

How to protect yourself from sharing your WhatsApp Information with Facebook?

Hi Friends, Just a few days before, WhatsApp has created a new policy, according to which your WhatsApp Information has been shared with Facebook. And so all your WhatsApp Data will be shared with Facebook.  You must know that Facebook had purchased WhatsApp two years ago. After that, Facebook has got its full rights and now they can make any policy with it.
However, while purchasing WhatsApp, the CEO had said that nothing will change with it but now this new policy is a matter of concern for us as WhatsApp is now going to share all your data with Facebook. According to this policy, WhatsApp is now going to share all the user's mobile number with Facebook. Whichever cleansing says WhatsApp, it will help to show the ads appearing on Facebook correctly.
  That is, the right advertising will reach the right people, which will benefit both the customer and the businessman.


Don't share your whatsaap informatiom@myteachworld.com



MUST READ:


So let's know that save your own WhatsApp Information from sharing with Facebook! 

 Whatsapp will update the updated information about the new rules of service. Do not accept it. When you open the app, you will see a page. You will be asked if you agree with the new conditions.


  • First of all WhatsApp will now show you a policy that will be seen as soon as you open WhatsApp.
  • If you have not come to this before, then you will get it soon, in which you will be asked for your consent by telling you some policy.
  • If you have not yet found this policy and have been able to go ahead, you do not have to agree.

This means that when the policy comes into your mobile, then Step-by-Step information is given to you about what to do.

Step1; First click on Read More at the bottom. 


Step2; After that you will see a page like the screenshot of the bottom, now at the bottom you will be asked if you agree to share your number? The box in which the box will already be checked will uncheck it and click on Agree.


Step3; In this way you will avoid sharing your number with Facebook.

If you have already agreed to this, that means you have clicked the Agree button without unchecking the box, then ?

So there are ways to do this, and it is that even after this, WhatsApp gives you 30 days of the time in which you can change it.

That means you still have the option of not sharing the number.

Step1; First, go to Settings in WhatsApp and then click Account.

Step2; After that, find Share My Account Info.

Step3; Now you will see there uncheck the check option already there.

In this way, even after you agree, you can avoid sharing this mobile number with Facebook.

Note: WhatsApp can still use your information for other things, but now it can not share your Mobile Number and Data with Facebook.

So friends, with this easy WhatsApp Tricks can avoid sharing your Mobile Number with Facebook.
If you like this post, do not forget to share it with your friends. You can help us reach it to more people by sharing it on social networking sites such as Facebook or Twitter. Thank you

Saturday, 13 May 2017

[WiFi Trick] How To Disable Someone's WiFi Internet Connection From Android Phone?

Hello friends , in this articles today’s I am going to show you “How To Disable Someone's WiFi Internet Connection From Android Phone?” Do you know that you can disable other people’s Wi-Fi internet connections on the same network? This can be done with an app called WiFiKill pro . With the help of this app, we can remove any other that is connected to the same WiFi network. This application mostly used by students to save bandwidth in colleges or in any network where they want to disconnect all other users and use complete bandwidth for better speed or by some Network admins.
It is a lightweight tool with simple user interface. That is, anyone can use this app without any user guides.

To use this app, your Android phone must be root, If you have not rooted the Android phone, then definitely, because you keep the relation from hacking, then it is very important. You must have understood what I want to say and what you are going to learn,





The great features of WifiKill Pro App for android

  • Increase your wifi speed
  • Cut wifi users speed or disconnect wifi users connectivity
  • Show the network names of the devices.
  • Good part is that the killed device will not be disconnected and the person using that device won’t have any idea about you shutting him down.
  • Increase your internet speed
  • Android version 2.2 or higher.
Note: This article is only for educational purpose. This app can be very dangerous in wrong hands. It should not be used at public networks to annoy people. this app can be used to control the devices on your own network. Again, do not misuse this app as you hold the power of disconnecting any device from the Wi-Fi Network to which you phone is connected.

 Requirement : 

  1. Friends, I told you earlier that your Android phone should be rooted, if your mobile is not rooted then don’t worry just read this post  "How To Root Any Android Device?"
  2. Download WiFi Kill Pro App

How to use WiFi Kill Pro App STEP BY STEP

Step1; First of all, download WiFi Kill Pro App from the link below and install it on your phone.
DOWNLOAD WiFiKill Pro App
Step2; After this, now connect your phone to the WiFi network.

Step3; Open the WiFi Kill app, you will see a Disclaimer, then click ok, if you open it, you will ask for permission on the root, then grant it to the root. 


WiFI Kill@myteachworld.com


Step4; Now you will find your home screen for WiFi, and click on the play button there.


WiFI Kill@myteachworld.com


Step5; If you want to disable all devices, from the WiFi network, first option on the right side will be "grab all" go to it and then click on the "kill all" button. And Now if you want to disable the Internet of any Particular Person, first click the IP of that person's device and go to the "grab" button and click on the "kill" button again. His internet connection will be disconnected.

WiFI Kill@myteachworld.com


Step6; Now if you want the user's Internet connection disabled, if you want the person to connet the Internet again, then you can unblock by clicking on the "stop" button.


WiFI Kill@myteachworld.com


just friends, now you have learned to disconnect your personal or any person's wifi, keep in mind that this is only possible when you and your friend are connected to the same WiFi network.
Actually, the WiFi Kill Pro cannot terminate the internet connection of a device, all it can do is block the packet data going to the device.
 If  you like this post please don't  forget to share it with friends also please socialize it . thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh


Saturday, 6 May 2017

Pendrive ko Virus Attack se kaise bachaye?

Hello Dosto, Myteachworld blog me aapka swagat hai. Friends aaj ki iss post me aap janenge ki pendrive ko virus attack se kaise bchaya jaye? aur sabse khas bat ye hai ki pendrive iss trick se aap apne pendrive ke data ko bhi secure kar sakte hai. Example ke liye jaise man lijeye aapne koi project bnaya, or uss project ko aapko apne office me dena hai. to jahir si bat hai aap pendrive ka use karenge . To dosto kai bar aisa hota hai ki uss pendrive me koi na koi virus aajata hai , jisse aapka project kharab ho jata hai. 
Dosto iss trick ka use karke  aap apne important data ko bhi protect kar sakte hai. Jaise man lijeye aapko koi data apne friend ko dena hai or aap chahte hai ki uss data ko koi pendrive se delete na kar paye. or na he pendrive ko koi format kare. to aap iss trick ka use kar sakte hai. Dosto Iss trick ki sabse achhi khas bat ye hai ki iss trick ko use karne ke liye koi bhi third party application ki jarurat nhi padti hai. Aap last tak iss post ko padhte rahiye , or aap bahut he aasani se apne pendrive ke data ko protect rakh sakte hai.
To dosto start karte hai-


pendrive@myteachworld.com


How to secure pendrive virus attack?

Sabse pehle aap pendrive ko pc ya laptop me lga dejiye, or usme important data ko rakh lijeye.

STEP1: Dosto aapko apne pc ya laptop par Command Prompt open karna hai. Dosto Command Prompt open karne ke liye aap WINDOW+R key press kijeye. ek window aapke samne aayegi . usme aapko type cmd type kijeye.or enter key press kijeye. Aapke pc ya laptop ka Command Prompt open ho jayega.

STEP2: Ab aapko Command Prompt par diskpart type kar lijeye. jisse diskpart open ho jayega. Aap niche diye huwe screenshot ko dekh lijeye.
Aapko iss bat ka dhyan dena hai ki "diskpart" ke bich koi space nhi hai.
step1@myteachworld.com


STEP3: Aapko ab command prompt par list disk  type kar lijeye, or enter key press kijeye.
jisse aapke pc ya laptop par jo bhi storage device connected hai wo show ho jayengi. ab aapko apni pendrive ki location dekhni hai. Dosto niche screenshot me mere laptop par Disk1 pendrive ki location hai. iss tarah aap bhi check kar lijeye .
"list disk" ke bich me space hai.

                                 step2@myteachworld.com

STEP4: Ab aapko apni pendrive ko select karna hai, iske liye aapko command prompt par select disk 1  type kijeye. aapke case me ye disk 2 bhi ho sakti hai.  Aap screen shot jarur dekhe. 
Jaisa ki aap dekh rahe hai Disk 1 select ho chuki hai. or "select disk 1 " ke bich space hai.
step3@myteachworld.com


STEP5:  Ab  aapko command prompt par attributes disk set readonly  type kijeye or enter ki press kijeye. ab aap dekhenge ki aapki pendrive par attributes success ho gya hai. means aapka kam ho gya.
Friends ab aap apne pc ya laptop se pendrive ko nikal kar dobara lgaye. pendrive me kisi bhi folder ko delete kijeye. aap dekhenge ki folder delete nhi huwa hoga. iss pendrive me ab kuch bhi write nhi kar sakte hai. 
step4@myteachworld.com



 Pendrive ko pehle jaisi kaise bnaye?

Aap yhi soch rahe honge ki maine ye sb to kar liya lekin pendrive ko pehle jaise kaise bnaye. to dosto aap paresan mat ho mai wo bhi process aapko bta deta hu . 

STEP1: Dosto aap same wahi work dobara karna hai, jo aap karte chale aarhe hai. sabse pehle aap command prompt ko open kar lijeye. 

STEP2: Ab aapko fir se diskpart type kijeye, or enter key press kare.

STEP3: agar aapko pta hai ki pendrive ki disk kon si hai. to aap sidhe command dijeye. agar nhi malum hai to fir list disk ki command dijeye or enter key press kijeye.

STEP4: ab aapko apne pendrive ki disk ko select karna hai. same wahi process hai jo aapne pehle upper kiya tha. mai ummid karta hu aapne pendrive ko select kar liya hoga. 

STEP5: Dosto disk select karne ke bad ab aapko command prompt par attributes disk clear readonly type kijeye, or enter key press kijeye. 

 Dosto iss process ko dhayn se padhe , kyoki yahi step main hai. aap niche diye huwe screenshot ko jarur dekhe.
step@myteachworld.com


Ab aap dekhenge ki  jo aapne command lgayi thi wo successful work kar chuki hai. Iska matlb aapki pendrive pehle jaisi ho gayi hai. Aap pendrive ko apne pc ya laptop se nikal kar dobara lgaye. or kisi bhi file ya folder ko delete kare ya edit kare , aap dekhenge ki file delete ho ja rhi hai.

final@myteachworld.com


                   Dosto agar aapko meri psot achhi lgi to share karna na bhuleye. mai issi tarah ki post lata rahunga, thank u and good bay.