Sunday 24 November 2019

4 WAYS TO HACK FACEBOOK ACCOUNT AND HOW TO PROTECT YOUR ACCOUNT FROM IT



4 WAYS TO HACK FACEBOOK ACCOUNT AND HOW TO PROTECT YOUR ACCOUNT FROM IT




We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities — and that's just with the visible information we purposely give away through our public Facebook profile.
The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven't already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.

 In fact, Facebook actually allows people to get into someone else's Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà — you're into the account. It's as easy as that.
In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.

Method 1Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section. Still stuck? Hackers use scraping tools like TheHarvester to mine for email addresses,to find a user's email that they don't already know.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself

  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries — not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2Use a Keylogger

Software Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data.

How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
The easiest way to do this would be  to make an exact copy of the facebook login page. Then you'll just need to tweak the submit form to copy / store / email the login details a victim enters.
Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it's still possible, especially if you clone the entire Facebook website

How to Protect Yourself

  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URl,If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

Method 4Man in the Middle Attack

If you can get close to your target, you can trick them into connecting to a fake Wi-Fi network to steal your credentials through man in the middle attack, Tools like the Wi-Fi Pumpkin make creating a fake Wi-Fi network and Once the victim connects to your fake network, you can inspect the traffic or route them to fake login pages. You can even set it to only replace certain pages and leave other pages alone.
This little computer can create an evil AP - a cloned wireless network to trick the user into connecting so you can listen in on their traffic.

How to Protect Yourself

  • Don't connect to any open (unencrypted) Wi-Fi Networks.
  • Especially don't connect to any Wi-Fi networks that are out of place. Why might you see a "Google Starbucks" when there's no Starbucks for miles? Because hackers know your phone or computer will automatically connect to it if you have used a network with the same name before.
  • If you have trouble connecting to your Wi-Fi, look at your list of nearby networks to see if there are any copies of your network name nearby.
  • If your router asks you to enter the password for a firmware update to enable the internet or shows you a page with major spelling or grammar errors, it is likely you're connected to a fake hotspot and someone nearby is stealing your credentials.

A Couple More Facebook Hacks

We will continue add more Facebook hacks in the near future, so keep coming back here.

How to Protect Yourself

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL.Use Firefox add-on,https -Everywhere or force TLS
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your network traffic will be encrypted all the way to your VPN provider.

Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it possible for hackers

Everything You Need to Know About Rooting Your Android Phone

By Mac King,November 24,2019







We love Android, but rooting your phone can give you the opportunity to do so much more than your phone can do out of the box—whether it’s wireless tethering, speeding it up with overclocking, or customizing the look of your phone with themes. Here’s what you need to know about the rooting process, and where to find a guide for your phone.

Update: This used to be our always up-to-date rooting guide, which proved to be too large an undertaking for us to keep up. It was a nice try, but seeing as we only have a few Android phones to test, we couldn’t reliably keep it up to date. So, we’ve removed the links to individual rooting instructions and kept this as a general resource for those of you that want to get into rooting (though many of the old comments still remain).

Check out the glossary below to get acquainted with important rooting terms, then check out the FAQ for more info on your burning questions. When you’re ready, check out the last section for resources on your specific device. We can’t give you the instructions ourselves, but hopefully we can give you a push in the right direction and make the process easier for you.
What Is Rooting, Exactly?
Rooting, for those of you that don’t know, means giving yourself root permissions on your phone. It’s similar running programs as administrators in Windows, or running a command with sudo in Linux. With a rooted phone, you can run apps that require access to certain system settings, as well as flash custom ROMs to your phone, which add all sorts of extra features. If you’re on the fence about rooting, check out our top 10 reasons to root your Android phone for some motivation.

Top 10 Reasons to Root Your Android Phone

Android is one of the most open, versatile, and customizable mobile operating systems out there.…
Read more




There are a ton of different Android phones out there, and while some rooting methods might work for multiple phones, there is no one-size-fits-all guide for rooting every phone out there. But, there are a lot of things you should know about rooting before you start, and this guide should help you out.
Glossary of Rooting Terms
Image by Andrew Mason (Flickr).



As you learn more about the rooting process, you’ll probably run into a bunch of terms that can be confusing. Here are some of the most important ones and what they mean.
If there are any other terms you think we should add, let us know and we’ll put them in!




Root: Rooting means you have root access to your device—that is, it can run the sudo command, and has enhanced privileges allowing it to run apps like Wireless Tether or SetCPU. You can root either by installing the Superuser application or by flashing a custom ROM that includes root access.

ROM: A ROM is a modified version of Android. It may contain extra features, a different look, speed enhancements, or even a version of Android that hasn’t been released for your phone yet. We won’t discuss ROMs in depth here, but if you want to use one once you’re rooted, you can read more about doing that here.




Stock: “Stock” refers to a few different things, depending on the context. When we refer to “Stock Android,” we mean the Google-built version you’d find on Nexus devices, with no extra UI chances like HTC Sense or Samsung TouchWiz. Many ROMs are based on stock Android with some additions, like CyanogenMod, while others are based on the version that came with your phone. In other cases, “Stock” can also mean the version of Android that came with your phone—e.g., if you want to get rid of your ROM and return your phone to factory settings, you might say you’re “going back to stock.”

Kernel: A kernel is the component of your operating system that manages communications between your software and hardware. There are a lot of custom kernels out there for most phones, many of which can speed up your phone and increase your battery life, among other things. Be careful with kernels, though, as a bad one can cause serious problems with your phone and possibly even brick it.




Radio: Radios are part of your phone’s firmware. Your radio controls your cellular data, GPS, Wi-Fi, and other things like that. You can sometimes find custom radios for your phone that you can flash yourself, but beware as sometimes these can cause problems.

Flash: Flashing essentially means installing something on your device, whether it be a ROM, a kernel, or a recovery (see below) that comes in the form of a ZIP file. Sometimes the rooting process requires flashing a ZIP file, sometimes it doesn’t.
Brick: To brick your phone is to break it during flashing or other acts. There is always a small risk with flashing, and if your phone becomes unable to function—that is, it basically becomes a brick—you’ve bricked your phone. The risk is very small, however, and more often than not people say “brick” when they really mean “it turns on but doesn’t boot properly,” which is a very fixable problem. See the FAQ below for more information.



Bootloader: Your bootloader is the lowest level of software on your phone, running all the code that’s necessary to start your operating system. Most bootloaders come locked, meaning you can’t flash custom recoveries or ROMs. Unlocking your bootloader doesn’t root your phone directly, but it does allow you to root and/or flash custom ROMs if you so desire.






Recovery: Your recovery is the software on your phone that lets you make backups, flash ROMs, and perform other system-level tasks. The default recovery on your phone can’t do much, but you can flash a custom recovery—like ClockworkMod or TWRP—after you’ve unlocked your bootloader that will give you much more control over your device. This is often an integral part of the rooting process.
Nandroid: From most third-party recovery modules, you can make backups of your phone called nandroid backups. It’s essentially a system image of your phone: Everything exactly how it is right now. That way, if you flash something that breaks your phone, you can just flash back to your most recent nandroid backup to return everything to normal. This is different from using an app like Titanium Backup that just backs up apps and/or settings—nandroid backups backup the entire system as one image. Titanium backups are best when switching between ROMs or phones.


ADB: ADB stands for Android Debug Bridge, and it’s a command line tool for your computer that can communicate with an Android device you’ve connected to it. It’s part of the Android Software Developers Kit (SDK). Many of the root tools you’ll find use ADB, whether you’re typing the commands yourself or not. Unless the instructions call for installing the SDK and running ADB commands, you won’t need to mess with it—you’ll just need to know that it’s what most of the tools use to root your phone.





S-OFF: HTC phones use a feature called Signature Verification in HBOOT, their bootloader. By default, your phone has S-ON, which means it blocks you from flashing radio images—the code that manages your data, Wi-Fi, and GPS connections. Switching your phone to S-OFF lets you flash new radios. Rooting doesn’t require S-OFF, but many rooting tools will give you S-OFF in addition to root access, which is nice.
RUU, SBF, and OPS: ROM Upgrade Utilities (for HTC phones), System Boot Files (for Motorola phones), and OPS and PIT files (for Samsung phones) are files direct from the manufacturer that change the software on your phone. RUU and SBF files are how the manufacturers deliver your over-the-air upgrades, and modders often post leaked RUU and SBF files for flashing when the updates haven’t been released yet. They’re also handy when downgrading your phone, if a rooting method isn’t available for the newest software version yet. You can flash RUUs right from your HTC phone, but Motorola users will need a Windows program called RSD Lite to flash SBF files, and Samsung users will need a tool called Odin to flash OPS and PIT files (note there is a specific version of Odin for each device).





How to Get Better Battery Life and Performance on Your Android Phone with a New Kernel
You may have heard about how flashing a new ROM can improve your Android experience, but flashing a
Read more
Frequently Asked Rooting Questions






People have a lot of questions about rooting, and we hear them all the time. Here are some of the most frequently asked, laid out so you don’t have to ask someone else.
What’s the difference between rooting, unlocking, and flashing a ROM? This can be confusing, since the three practices are often performed at the same time. We’ve detailed some of this above, but briefly: Unlocking your bootloader is usually the first step in the process and allows you to flash a custom recovery. From there, you can then give yourself root access or flash a ROM. Root access isn’t required to flash a ROM, but almost all custom ROMs will come with root access built-in.







Note that when we say “unlock” in this guide, we mean unlocking your bootloader—not unlocking your phone to use a different carrier, which is a completely different thing and doesn’t always require hacking (since you can often purchase carrier-unlocked phones directly from Google or elsewhere).
Can I unroot my phone? Yes. If you decide you don’t like being rooted, you can often find instructions on unrooting your phone as well. Usually it involves flashing an RUU, SBF, or something similar to return the phone to truly stock settings.






Is rooting illegal? No. Technically, it once was, but exceptions to the DCMA have made it legal for most phones (but not necessarily tablets). Either way, it’s hard to imagine anyone actually enforcing this rule (much like ripping DVDs for your own personal use).
Will rooting void my warranty? Yes. Unlocking your bootloader will void the warranty on your phone, even if your manufacturer provides a way for you to do it. That said, if you need warranty service for a hardware issue, you can sometimes unroot your phone and take it in for service with no one the wiser. However, some phones have a digital “switch” that flips when you unlock your phone that is very difficult or impossible to revert, so do your research before unlocking if you want to preserve your warranty.






Could rooting brick my phone? It’s possible, but pretty unlikely. As long as you follow instructions well, you probably won’t brick anything (but we’re not responsible yadda yadda yadda). Flashing custom kernels and radios is a little riskier than just rooting or flashing ROMs, but again, if you follow directions you should be okay. Keep in mind that bricking means your phone means it won’t turn on or function at all—if you’re stuck in a boot loop or boot straight to recovery, your phone is not bricked, and it can be fixed.

How Do I Fix My Bricked Android Phone?
Dear Lifehacker, Rooting my Android phone went well, but I've tried to flash a custom ROM and now I
Read more





Are any phones unrootable? This is a tough question. In the past, many manufacturers have tried to make “unrootable” phones with harsher protections (like the Droid X), but they’re usually still rootable in some way, shape, or form. The more likely scenario is that, if you get a new phone or a phone that had a recent update, that a root exploit isn’t available yet. In that case, you may have to wait a few months before you’re able to root it. This is one of the reasons we recommend buying a Nexus.

Frustrated by Android Fragmentation? Just Buy the Nexus Already
If you're an Android geek, you're probably sick of hearing about Android's "fragmentation" problem.
Read more







Will I still get over-the-air (OTA) updates? Will downloading them break my root? If you root your phone without flashing a custom ROM, then you will likely still get OTA updates from your carrier, and they will break your root. We highly recommend against downloading these updates, since you may not be able to re-root your phone for awhile after updating. Alternatively, you can use an app like OTA Rootkeeper that will help you keep your root access (though it doesn’t work with every version of Android).
If you flash a custom ROM, you will not get OTA updates from your carrier. You may, howaever, get notifications for updates to your specific ROM. Those are safe to download.



Will rooting speed up my phone? Not on its own—all rooting does is give you root access. However, it does open up the possibility for other tweaks that can speed up an old phone.

How to Speed Up Your Old or Sluggish Android Device
Whether you're resisting the temptation to upgrade to newer, faster hardware, or a year's worth of…



Are Custom ROMs really necessary on a stock phone like the Nexus? Sure! ROMs are useful for more than just getting stock Android—they add a lot of useful features, get updates even if Google has abandoned your phone, and lots more. Check out this article for more.

Are ROMs Really Necessary on a Nexus Phone?
Dear Lifehacker, I've rooted my Galaxy Nexus per your guide, but now everyone tells me I should…


Can you tell me how to root my [insert phone model here]? NO. Please don’t email us asking this. We only own a few phones and thus probably don’t know how to root yours. Check out the section below to find out where to find information on how to root your phone.
What should I do once I’m rooted? Glad you asked! Check out our top 10 reasons to root your Android phone for some inspiration, as well as all of our posts concerning Android Rooting.
ADVERTISEMENT
Where to Find Rooting Methods and Tools
ADVERTISEMENT
So now we get to the good stuff: actually rooting your phone. Unfortunately, every single phone is different, and rooting methods change every time that phone’s software updates. With so many Android phones out there, it’s become impossible for us to actually list rooting instructions here—especially because we only own a few different phones ourselves.
Luckily, now that you know a thing or two about rooting, you’re in a much better position to understand some of the other instructions out there. So, here are a few places you’ll find guides, ROMs, and other information about rooting your specific phone.
ADVERTISEMENT
The XDA Developers forums are the number one place to look for information on your phone. This is where all the best hackers and tweakers gather to discuss phones, share links and guides, create rooting tools, and more. Head to the forums, find your device, and poke around the different subforums for your phone. You should find a number of threads that will direct you to information on how to root your phone, what ROMs and kernels are available, and more. And, when in doubt, ask the other users!
The Phandroid forums (aka Android Forums) aren’t quite as popular as XDA, but they have always done a pretty good job of organizing information on rooting. This is a good place to start. Head to the forum for your device and look for the “All Things Root” subforum.
RootzWiki may not be as popular as it once was, but there’s still good information to be had on these forums, especially pertaining to new ROMs, kernels, and other things on the development side.
The CyanogenMod Wiki: CyanogenMod, one of the most popular ROMs out there, has a fantastic wiki with a ton of information on different devices. Even if you don’t plan on flashing CyanogenMod (or any ROM, for that matter), you can often find information on how to root your phone within their device-specific instructions on installing CyanogenMod, so it’s worth checking out.
ADVERTISEMENT
Try any or all of the above sources and see what you can find. Once you’ve found the forum for your phone, search around for a rooting guide or rooting tool. Make sure it’s applicable to your current software version and try it out. If you have any questions, you can ask in the forums—but be sure to read as much as you can before doing so, since your question has probably already been answered elsewhere.
Armed with the knowledge in this glossary and FAQ, along with the right rooting method on those forums, you should be well on your way to a better phone. Good luck!
Follow this link to join our WhatsApp group, for latest free browsing cheats

Follow this link now to join us on WhatsApp for latest free browsing cheats and hacks
https://chat.whatsapp.com/H9S79eT0L0e0NZnytETGVc
Subscriber to our blog,to get any news of about updated post,and follow us,and share this now to others,to benefit
🆔@Mac King