Thursday, 3 September 2015

12 Steps To Become A Hacker

12 Simple Steps To Become A Hacker

Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

Wednesday, 2 September 2015

CyanogenMod updated to v12.1 Android 5.1 Lollipop, comes with Stagefright patch

CyanogenMod version 12.1 released, gets Android 5.1 and Stagefright security fix

Cyanogen Inc is rolling out firmware update for its CyanogenMod OS starting today. The new version is based on Android 5.1 Lollipop and bumps up the version number to 12.1. CyanogenMod 12.1 comes with a patch for the dreaded Stagefright vulnerability which can be exploited by hackers just by sending a specially crafted Multimedia message or a Google Hangout message.
The Cyanogen website states that the update will rolled out to all OnePlus One device owners starting today, while Andromax Q, Yureka, Yureka Plus, and Yuphoria smartphone owners will have to wait for a little while. The website says that the update for these smartphones will be rolled out once approval and certification process is completed.
The new firmware will provide improved stability and performance across the board and bring following features:
What’s new in 12.1:
  • Smarter Screen: LiveDisplay intelligently adjusts your screen based on environmental conditions.
  • Calendar Together with Email:Enjoy the latest Boxer powered experience where you can seamlessly share your availability and schedule appointments.
  • Cyanogen Browser: The new Cyanogen browser delivers search results and loads web sites faster and more securely than leading browsers.
  • Redesigned Launcher: App Drawer and Folders have been redesigned for one-handed use.
  • Fresh AudioFX: The user interface has been updated for consistency across all devices.
  • More Playback support: Cyanogen has increased added more codec support for video and audio playback.

Cyanogen Browser

The new OS come with a Cyanogen homespun browser called Cyanogen Browser. According to Cyanogen the new browser will be secure and fast. Here are few features of  Cyanogen Browser :
  • Performance: 1.21x better than Chrome in top priority benchmarks
  • Speed: 1.69x faster than Chrome in page load benchmarks
  • Power Efficient: 1.2x better in power efficiency
  • Less Memory Used: Lower runtime memory usage—on average 50-100MB less memory (optimized to not consume as much memory)
  • Location Privacy: When websites ask for access to location, the user can choose to allow for 24 hours (as opposed to allowing permanent access), giving the user finer control over their location privacy
  • Security: Saved passwords for websites are encrypted, increasing password security if your phone is ever lost or stolen

Top 10 hacker Tools (2015)

List of top ten hacker tools of 2015

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.
If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2.Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3.Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4.Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6.THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7.Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8.Snort:

Snort is an awesome hacking and network tool that can be configured in one of three modes: it can either be used as a sniffer, packet logger, or within network intrusion detection. In the (more commonly used) sniffer mode, this hackers program will read (sniff) network packets and display them on a GUI(Graphical User Interface). In the packet logger mode, Snort will audit and log packets to the disk. In intrusion detection mode, Snort monitors network traffic and analyzes it against a rule set defined by the user.

9.Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10.Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.
If you have any favourite tool of your own which we have not mentioned in the article, kindly mention it in the comments so that we can include it in our next list.

Quantum Computing

What Exactly Is Quantum Computing?

hort Bytes: Quantum computing is hailed as the future. Many companies are putting plausible efforts to make quantum computers a reality. But, what is quantum computing and what are quantum computers? Read the article to know.

For past few months, you must be noticing your news feed is flooded with major breakthroughs and headways in the tech arena. The technology feed could range anything from the recent surge in international cyber intrusions or simple hacking tutorials to space expeditions, defying Moore’s law or the developments in Artificial intelligence. But, what seems to excite most of the tech enthusiasts is the intricate quantum computing and its prospects in future.

The Chinese have announced to set up the world’s first ever and largest hack proof quantum computing communications network from Beijing to Shanghai. Let’s see what these computers actually are and why quantum computing is important for our future!

What is a Quantum Computer?

Quantum computers are nothing like the regular computers or even supercomputers. While thetop supercomputers use extensive parallelism with numerous processing units to get its super speed, the Quantum computers work with the physics of quantum mechanics at its core.

A quantum computer is built atom by atom. Now, quantum mechanics in itself is one of the most dreaded topics in physics, so it is no surprise that the quantum computer bears the same traits as well.

How Does Quantum Computing Work?

The quantum computers use atoms (quanta) as its physical system. Unlike in regular computing where the information is carried in either 0 or 1 bit, the quantum mechanics allows an atom to be in both 0 and 1 state simultaneously. This bit of data is called a qubit. ( Don’t hold your head just yet!)

So, as per the theory, if there are equal number of qubits and the regular bits, then the qubits will hold twice the information, i.e. if there are n qubits in the supercomputer, then it will have 2^n different states. So experimentally, it can hold more information as compared to regular digital bits thereby increasing the speed of the system exponentially.



In theory, the quantum phenomenon seems mind blowing but actually building one is equally painstaking. The qubits are dynamic and are only the probabilistic superposition of all of their states. So, the accurate measurement is difficult and requires complex algorithms such as Shor’s algorithm.

What are the Challenges To Quantum Computing?

One of the biggest challenges is to remove quantum decoherence. Decoherence in a layman’s language could be understood as the loss of information to the environment. The decoherence of the qubits occurs when the system interacts with the surrounding in a thermodynamically irreversible manner.

So, the system needs to be carefully isolated. Freezing the qubits is one of the ways to prevent decoherence.

Past And Present Of Quantum Computing:

The concept of Quantum computing was laid down in the 1980s, but major progress started only two decades later. In 2001, researchers demonstrated Shor’s algorithm to factor 15 using a 7-qubit NMR computer. After that, developments in the field of quantum computing operating system and expansion in the qubit numbers were focussed.

As of today, many private players have entered into the competition to build a quantum computer, that would actually silence the critics. D-Wave has recently claimed to break the 1000 qubits barrier record. Other tech giants such asGoogle and IBM are advancing to develop their own quantum computers as well.

If It’s So Complex, Why Is Everyone After Quantum Computing?

A fully functional quantum computer would require around a million atoms. And right now, we are at a mere thousand. But, what would happen if we reach that limit or even its half?

The complex and massive calculations for example in genome sequencing or tracking weather patterns require huge computers or supercomputers for that matter. Now with the current technology, if the amount of data that a supercomputer can handle is increased by just one digit, the system would fail and you would require an even bigger supercomputer.

Second, the modern day encryption systems are entirely based on the limitations of the regular computers. The normal computers can’t figure out the huge probabilistic analysis required to decrypt any sophisticated code. Even a supercomputer would take years decrypting the RSA cryptography, whereas with the help of Quantum computing it would be a matter of days, if not hours.

Quantum computers will lead to research that are either considered hypothetical or at a standstill. From simulating and computing the molecular scale structures to stretching far into the mysteries of Universe, we cannot even dream of the possibilities.

Quantum computing won’t be of changing your lives in day to day operations, but a quantum communication network would definitely provide a better and secure network.

Have something to add? Tell us in comments below.



Here’s a look at the Top 10 hacking apps for Android smartphones and tablets

Here’s a look at the Top 10 hacking apps for Android smartphones and tablets

Linux is regarded as the best operating system for ethical hacking and penetration testing also called pentesting. There are various hacking apps available for Android, as it is a Linux based operating system. If you want to test out vulnerabilities and find bugs, you need a solid hacking tool to back your research up.

Below is a list of Android hacking applications that will convert your Android device into a hacking machine.

AndroRAT

AndroRAT is a remote administration tool for Android devices. In other words, it is basically a client server application. The aim of the remote administration tool is to give control of the Android system remotely and retrieve information from it.

SpoofApp

(Phone call only) SpoofApp let’s you to place (spoof) calls with any caller ID number. You need SpoofCards to spoof calls, which are sold separately. It also includes some other features such as voice changer, which allows you to change your voice while using it. Additionally, it also allows you to record the whole conversation. You will receive a free 5 minute SpoofCard when you install the app for the first time.

Network Spoofer

Network Spoofer is another good app that allows you to change the website on other people’s computer from your Android phone. You need to download the Network Spoofer app and then log onto the Wi-Fi network. Choose a spoof to use with the app then tap on start. This app is considered as a malicious hacking tool by network administrators. So, it is advisable to not try this on unauthorized networks, as this is not a penetration testing app. It is just to exhibit how susceptible the home network is.

Faceniff

(Facebook only) Faceniff is basically used to sniff the Facebook ID over the same network. For instance, if you are on the same network and your Faceniff is turned on, then it will sniff all the Facebook IDs that are logged in from the same network. Since this is a paid version, you need to pay for this on the internet.

WhatsApp Sniffer

(For WhatsApp only) This tool can be used to hack private WhatsApp chats, pictures, audios and videos of your friends who are using your Wi-Fi Hotspot. Disable your antivirus before using this app, as it is detected by antivirus.

APK Inspector

The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps. You can also get the source code of any android application and edit it in order to remove credits and license.

dSploit

dSploit is a free penetration testing suite developed for the Android operating system, which comes with all-in-one network analysis capabilities. It can be used by anyone in order to perform a number of advanced network related tasks. It also contains a number of powerful functions that allow you to analyze, capture, and manipulate network transactions. You can scan networks for connected devices, identify the operating system, running services and open ports on each device, as well as check them for vulnerabilities. The app is designed to be very fast, handy and easy to use.

Wi-Fi Killer

This app allows you to block a person from using your Wi-Fi network. You can disable internet connection for any device that is present in your Wi-Fi network.

DroidSheep

DroidSheep is also one of the free best application for sniffing the sessions over the network. Similar to Faceniff, it not only sniffs the Facebook sessions but also other sessions.

Eviloperator

(Phone call only) This app connects two person automatically in a phone call, which makes them believe that they have called each other. The advantage of this app is that you can record and save the conversation.

Some of the apps given above may work only on rooted Android smartphones. We have given links for the App download, however download the app at your own risk. If you are not familiar with pentesting, theses apps will do you no good.
Kindly mention any other app which you may like for research/hacking/pentesting and we will include it in our future posts.

Sunday, 23 August 2015

Control your PC with Android Mobile..

Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access
Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access



smartphone and computers let you get things done anywhere and everywhere, but portability becomes more bane than blessing when you forget a critical file at home, especially if you're the type of person who dumps files on your desktop rather than a Dropbox folder.here i am going to use Google's Chrome Remote Desktop for control your pc with the help of your android device easily.this service, first launched in 2011, is coming to mobile. But now, the company released an Android app that will let users access their desktop computers, whether through a Chrome web app for Mac, PC, and Linux or through Chrome OS itself. Once you've set up your primary machine, you can launch the Android app to connect to it. GigaOm reported a few days ago that the app was in beta testing, but it's now available to anyone with an Android phone or tablet, though doing much with the former will be a little cramped. There's no precise date given for an iOS version, but Google says it will be coming later this year.

Since releasing Chrome Remote Desktop, Google has increasingly added ways to connect desktop computers with other devices. Hangouts got a remote desktop feature in mid-2013, and the Chromecast dongle pulls Chrome tabs onto a TV with a minimum of hassle. Outside its ecosystem, other companies have offered similar apps, including Microsoft, which added native remote desktop support in Windows 8 and released apps for both iOS and Android in late 2013.

Now follow step by step full guide to control your pc or laptop using your android phone no root required.

Step:1) First of all you need to download and install chrome remote desktop .apk file in your android device or tablets ,for download it simply go to google play store in your android mobile phone and install Chrome Remote Desktop
 
"or you can download it directly using below link."

<< download link>>
 

Step:2) Now i assuming that you download and install google remote desktop from step 1, after installing when you will click on the chrome remote desktop app on your phone, it will show you a screen like the one given below.

Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access


Step:3) after step 1&2 you need to install chromo remote desktop extension ,for this simply first  go to your PC and Open Chrome Browser and click this link for install extension


Step:4) 
give permission to chrome remote desktop authorize, click "continue" button


Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access

Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access


Step:5) It will take you tochrome://chrome-signin/ page. Sign in here with the same gmail account as of your android phone.


Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access








Step:6) After clicking on that an exe file will start downloading. Install that .exe file once it gets downloaded. Continue the process.

Step:7) It will prompt you to choose a six digit PIN. This six digit PIN is the same PIN which will be required as a access key for pairing up with your PC.



Step:8) after that  go to your phone and click on chrome remote desktop again and you will find your computer there. Click on your PC icon.(see below screenshot)


Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access

Step:9) now here you need to Enter the same six digit key which you chose just before in step 7


Control Your PC Via Your Android Phone using Google chrome remote desktop-2015 remote access
 

that's it friends you have done !  you are now using your computer through your phone.

Note :
that You must be connected through internet in your Phone as well as your PC to do that. You can also use chrome remote desktop to connect one PC to another.

 

OVER TO YOU :


In the end, the new Chrome Remote Desktop app is a welcome addition to the Android family, delivering a truly user-friendly experience that's oh-so-rare in the world of remote desktop software. It's fast, it's easy, it's free, and you don't even need to install any additional software on your PC if you're already using Chrome. What's not to like?

Hack a memory card password within minutes

possible ways to break micro sd memory card password
Image result for memory card


hye friends today's topic is very importent .some time we secrate the data in memory card with
password but unfortunatly we forget that password which protect our dta from hackers or
your friends or any other you guess.
so i am here to give you best solution of breaking memory card paasword in only 5 minutes.
there are lot off methode publish on internate about how to break the memory card password but
many of my reader advise me to write a tutorial about breaking memory card password .becuase
they believe that i am write that tutorial very friendly so they can understand very ifficiently.
so now i am going to start the tutorial namly how to break memory card password.here i am
publish very friendly methode break password so i give only those methode which easily
understandable for everyone .so dont wasting your valuable time lets start.follow step by step
procedure.
solution no. 1:--

BREAKING MEMORY CARD PASSWORD FOR ANDROID DEVICES


1.   first of all  Go to file manager (my files)  of your android  mobile phone.

2.    after that .there are lot off your folder so going to right folder  ,in the setting  choose system folders,

3.     find a file named as mmcstore  in the system folder .

4.   simply copy that file mmcstore  and Send the file on pc or laptop with the help of data cable or Bluetooth or any other transfering software.

5. after doing step 4 ,simply Open the file  mmcstore  In notepad or any other file editore applictaion,i prefer use notepad because it is inbuilt application in your pc or laptop.

6.    now this is the time to remove the passwrd  when file mmcstore is open you will see the password located in the file.password formate like bellow given .
ie: (?!??1?2?3?4?5???)
so here is the password of your memory card is 12345
thats it you have break your memory crad password .
NOTE: this methode is not only for android phone also for those phones which give you acces to control mmcstore file in file explorer.you also bteak memorycard password in those mobile phones


solution no. 2:

in solution no. 1 i give you very simple trick to break password unfortunatly ,
if you are unable to break memory card pasword using solution no.1 ,so dont worry there is another methode to break memory card password follow step by step procedure .
break memory card  pasword using nokia E& N series mobile
1.first of all Insert memory card in any E series or N series Nokia mobile

2.after that simply  Format it

3. when you fomate your memory card you see that it will not ask you for password
4.  so after fomate memory card you see your memory card password removed.

solution no. 3:---

HOW TO BREAK MICRO SD MEMORY CARD PASSWORD FOR  NOKIA SYMBIAN MOBILES:


1.first of all  install  any file Explorer aplication in  your device it scan your device.
2. after that  open Explorer app and  press zero (0).This will allow you to see system files

3.now this time to find   MmcStorefile,which should be located in the following path
/sys/data/mmcstore

4.after that when you find that file mmcstore then copy it and open it using any editor application like notepad

5. in this file mmcstore you check the third column, the code like!VBGGSSMDGY

6. SIMPLY  delete it.and you are done  your memory crad password will be break.
 
solution no. 4:

HOW TO RECOVER MEMORY CARD PASSWORD USING  SOME SOFTWARE


(1.)Remove the memory from you android device

(2.) insert into any memory card and connect to pc or Laptop

(3.) once done and right click on device disk

(4.) then choose format from menu option.(for windows only)

(5.) Once done,you will see your memory card password has been removed/unlock

i Hope,this article will help you in restoring/remove memory card password.If you faced any issue 

with above procedure do let me know in below comments.

if you like this tutorial please share it with your friends and like this article how to remove memory

crack passwrod in simple steps.