Sunday, April 5, 2015


By now you must have known that most zip files online are broken, when I mean broken I mean really broken or damaged as most of you would say and at times broken files makes me “seriously” sick.

Some days back, I was downloading a 2gigerbyt movie in “zip format” and after the download, I tried to unzip the movie with winrar so I can watch it on my favorite video player but I got a message saying that the zip file is broken. Wow! How frustrating can that be? I just can’t let my 2gig movie be wasted in such manner so I searched outside and online for different solutions with my “best friend” Google, at last the search ended but with no powerful solution. After the frustrated search a friend showed me the trick on how to repair the zip file and it worked perfectly. Yes! It worked like wonders i mean magic.

Turning Your Pc Into a Wifi Hotspot Without Using Software Or Application

Turning Your Pc Into a Wifi Hotspot Without Using Software Or Application

First off, go to your control panel home >>> Click Network and Internet >>> Click Network and Sharing Center
Are you in your network area now? If yes! Let’s proceed to the main show.
Click “Set up a new connection or network” → it will bring out a new panel, now scroll down and select “set up a wireless ad hoc (computer-to-computer) network”.
Have you selected it? Now click the “Next” button, click the “Next” button again.
You are now in the area where you’ll give your network a name and a simple but yet secure password.
Network Name: Your preferred name you’ll like your network to appear as
Security Type: WPA2-Personal
Security Key: Your Password to prevent unauthorized users.
Note: Make sure that your W/LAN is activated before performing the operation or it will not function.
Now click the “Next” button to take you to the final part
If you want to share your internet connection, click “Turn on internet connection sharing” it will load and you have successfully turn your pc to a WIFI hotspot.

How to Access Someone Else's WhatsApp Account

How to Access Someone Else's WhatsApp Account


Method 1 of 2: MAC Spoofing

(1)Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.

(2)Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.

(3)Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → About → More info → MAC address.
On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.

(4)Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.

(5)Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."

(6)Install and configure WhatsApp on your phone. Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.

(7)Get the confirmation code from your target's phone. This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.
If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.

(8)When you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.

Method 2 of 2: Using Spy Software

(1)Obtain permission from the person whose phone you'll be monitoring. The apps that you'll be using are intended for parents, spouses, or employers to monitor the activity of their children, spouses, or employees. They require that you use them only with prior consent, so make sure to ask the person whose phone you want to monitor and get their full permission before you proceed.

(2)Choose an app or program to use. There are a number of different apps or programs you can choose from. Research these apps to figure out which one works best for you. Consider factors like what the app was intended for, what it monitors, and whether it will pass undetected by your victim. mSpy and Spymaster Pro are two good examples of the kinds of programs you'll be looking for.
Look for the perfect app online, on Google Play, or in Apple's app store.

(3)Buy and install your chosen app. Once you've made your purchase, follow the instructions to install the app. This will usually involve installing it on your phone or computer as well as on the phone that you'll be monitoring.

(4)Set up the app and start tracking. Follow the app's instructions to make sure everything is set up properly so that you can view all the desired information. You should start receiving their WhatsApp messages, as well as any other information you've included.

Hacking Tools To Become Powerful Hacker

Hacking Tools To Become Powerful Hacker

Wondering which software is used for hacking? What is the best software for hacking password? We have created a list of useful hacking tools and software that will help you do you job much easier. 

Ethical hacking and online security involves a lot efforts. Many tools are used to test and keep software secure. The same tools can also be used by hackers for exploitation. Becoming a hacker is not easy it requires many skills. You can learn a few hacking tricks from free hacking tutorials online, some really cool hacking books and books on information security . However, Along with all the skills you need to have best tools to perform hacking, security threat analysis and penetration testing. 

A hacking tool is a computer program or software which helps a hacker to hack a computer system or a computer program. The existences of hacking tools have made the lives of the hackers much simpler when compared to the times they did not exist. But it does not mean that if the Hacker is equipped with a good hacking tool, his entire job is smoothly done. The hacker still requires the skills of all the aspects of hacking equally well.

Best Free Hacking Resources

Best Free Hacking Resources

Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. 

Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving. The security softwares are constantly evolving and therefore you must keep learning new things with a really fast pace. 
If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. I hope these free resources will help you speed up on your learning. If you decide you pursue ethical hacking as a career option, you may also want to read some in depth ethical hacking books

A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Its true that some common types of hacking can be easily done with help of tools, however doing it does not really make you a hacker. A true hacker is the one who can find a vulnerability and develop a tool to exploit and/or demonstrate it.

Hacking is not only about knowing "how things work", but its about knowing "why things work that way" and "how can we challenge it". 

Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack