Skip to main content

SOME HACKING TIPS

SOME   TIPS ABOUT HACKINGS AND HACKERS




As we know today's world is revolving around the internet , we all are connected with the internet but we does not give much intension towards the links and the  and the malvertising .there are two types of links are provided in th internet which is bascically used by the users of the internet they are https and the other one is created by the hackers mostly so before going to a link we must check it out whether it is a https or not and malvertising is a type of a advertisement from which your system may be hacked and the hacker can enter  your system by creating a small hole literally not a hole but a path through which he can enter and by this he can process your camera in this processes he acts a   [mim] which means man in middle 
in this he can change the messages which you are getting and also can send replies to them as well as you.

                                        
                                    but  it looks such a real view you cant  also doubt upon it.
ex-1:
you can understand properly after reading the example how this prcess is done.

      son to papa: i want to buy a rolex watch papa.
      papa to son: ok i am sending uhh money in your paytm.
      hacker to papa: ok papa send it to account no. XXXXXXXXX as my paytm is not working.
      hacker to son:i will buy a watch for uhh next month.
      son to papa: but next month sure ok.
      hacker to papa: i recieved money papa.
      papa to son : ok

**IN THE ABOVE EXAMPLE YOU CAN SEE HOW THE HACKER CAN CHANGE YOUR MESSAGES AND CAN WRITE OR MODIFY THE MESSAGE ACCORDING TO HIS/HER WISH. 


 
now you have a question i think how can we be saved from the hackings 🤷‍♀️


>>dont be panic and  dont tell anyone that you are hacked and follow the steps

> before saving youself first is to detect that u are hacked you or not you can do so by not using your 
phone for 4 hours or more if your phone becomes hot and the battery drained faster then before then understand your 1 st step in hacking is true .
then  on off your phone upto 2 times then  disable all the permisions of your phone this is due to a process which is done by the hacker he must need 1 min or 2 min to connect again to your phone after doing such your next step is to connect your phone to internet at this time the permissions of all apps must be disabled he can access your camera so please also disable the system apps then he/she will feel wired beacause acessing will be disabled to him as uh  have disabled it   👍

>then reset your phone and open a new gmail account in android or apple id in ios then you sign up with that  and in case of pc or laptop reset your pc and put it on bios then unlock irt by providing the details then you can mail me for solving your issue by onling giving your IEMI code
then i can set that out  or contact 7077358291.
                                                                           else 
                                                                                        you can write a back code for your mobile or system means  the reversal code in .onion format which will make a  boundary between the hacker and your phone then you can use your system or phone accordingly..
                                for reversal code you may contact me or use youtube.
prefer this :-






    

                            

Comments

Post a Comment

if you have any doubt let me know

Popular posts from this blog

ARTIFICIAL INTELLIGENCE

PART-1  (AI) For over a decade, manufacturers have turned to automated solutions to improve their bottom line. Automation and machine vision are now being changed or it's value is increased and even replaced by AI. Here is the value AI-based visual inspection in 2020. Value of AI-Based System AI BRAIN Being replaced by AI is especially true when it comes to visual inspection. The use of AI-based visual inspection technology is transforming manufacturing’s ability to improve business operations. AI-based visual inspection based on two of AI’s main strengths: computer vision and deep learning. Every AI system is built with the core capacity to perceive its environment (computer vision) and act on those perceptions (deep-learning). It has unlimited potential and can be developed rapidly to meet a manufacturer’s needs. Concept of AI Well-trained human eyes ca

WORLD WITH DRONES

DRONES  History The first pilotless aircraft were built during and shortly after World-War I. It was made by using the techniques of A.M Low's radio control in the year of 1916. At that time it was known as "flying bomb". later in november 1917,the automatic airplane was flown for the representatives of the US army.This led the to commission a project to build an "aerial torpedo". TYPES OF DRONES IN RECENT TIMES QUADCOPTER MINIATURE UAV PASSENGER DRONE DELIVERY DRONE AGRICULTURAL DRONE QUADCOPTER Quadcopters generally have two rotors spinning clockwise and two counterclockwise. flight control is provided by the independent variation of the speed and hence lift and torque of each roter.

Machine Learning

What is machine learning Machine is a mechanical structure that uses power to apply forces and control movement to person an intend action. its a thing that is created by a people to make work easier . Machine learning is a branch of artificial intelligence that deals with the design and development of algorithms. Compared to human beings machine learning is still very localized and nascent to the problem for which it is designed  Machine learning is about creating a model that closely represent that part of the real world which is captured in the training data.Machine learning consist of mathematical formula,decision criteria and multidimensional parameters.we can say machine learning and Artificial intelligence are close to each other.  We love bringing the latest and greatest machine learning techniques, breakthroughs, and developments to you in the form of articles and blogs.