Thursday, 29 December 2016

5 Easy Computer Hacking Tricks! 2017

Posted by Sufyan Hacker  |  at  10:56:00

                   computer hacking tricks
What’s going on everyone! In this tutorial we will be showing you 5 pretty cool computer hacking tricks. Now I just want to write a disclaimer before we start. What we are about to show you should not be used on anyone! This article is strictly for educational purposes only.
You might be asking yourself on why we are showing some computer hacking tricks. The answer is simple. We want you to be able to have a reverse engineering mindset. What that means is this. Knowing how to hack will also teach you how to prevent your information from being hacked.

There are many resources out there including many classes that can teach you all about cyberdefense. However, if you don’t understand how hackers are stealing your information and wreaking havoc on your computer, then you are more likely to succumb to getting your stuff stolen online.
So let’s get started, shall we!:

1. Social Engineering

What is social engineering you might ask? It doesn’t just pertain to technology and using it for computer hacking tricks. Social engineering is a technique in using technology, psychology, and manipulation to squeeze information out of someone.
A prime example of a former criminal who used social engineering was Kevin Mitnick. He is now a consultant in cyber security getting paid big bucks by the FBI. The point of me referring to him is that he used phishing techniques by calling corporations and people up over the phone to get information out of them. He pretended to be someone he’s not.
Through the use of a social engineering strategy, Kevin Mitnick was able to steal passwords, social security numbers, and credit card information over the phone. From there he used this information to break into victims private computers, and other types of safeguards that protect personal data.
There is a pretty cool online tool that can generate all types of fake information. The information generated will give you a completely new identity including a fake address, social security number, and a fictitious credit card number. If you want to create a new identity for social engineering, just click on the anchor text I just linked to. Again, I want to stress that this tool is for educational purposes only!

2. Email Spoofing

If you don’t know what spear phishing is, and have not read our email spoofing article, check it out. This will set the tone and give you a base line knowledge on what it is.
To rehash on this subject a little, email spoofing is basically cloning an email address that already exists. It may even be someone you already know. You send this spoofed email out to a victim in order to execute something called a spear phishing attack. These attacks try and squeeze important information out of someone, and can be a form of social engineering.
So, how do you create a spoofed email address and use a spear phishing attack to steal information? Were glad you asked! There are tons of free software programs out there available for download. You can even use online tools that don’t require any sort of downloading to create a fake email address.
One online tool that you can use is called send email. You can use this free online tool to clone an email address that already exists. You can then use this cloned email as a gag to prank someone you may know. However, this tool can be used to steal information. I hope you now know how hackers create spoofed emails to try and take important data that’s not theirs.

3. Command Line

Windows command prompt. Learn it, live it, breath it! If you can master the command prompt in windows, then you will not only know how to generate computer hacking tricks, but you will understand more in depth how computers actually work. You will also really know how hackers gain entry into restricted areas of your computer and or network.
The command line is a highly useful tool. If you ever get hit hard with a nasty computer virus, the command line is capable of shutting down all programs on you computer. You can then work manually to get rid of a virus that is infecting your computer. However, it takes time to master.
If order to open your command line, just go to your Windows start menu. From there, type in the letters “cmd”. After you see the command line program, just click on it and open it.
So I am not going to reinvent the wheel by adding screen shots or my own self made video on how to open the command line.This works very similarly for any windows computer. So whether you have Windows XP, Windows 7, Windows 8, Windows 10, or whatever, this will work on any of the Windows operating systems.
Hopefully this article will get you more interested in learning how to use the Windows command line tool, because it is extremely, and I mean very EXTREMELY valuable to know!

4. Ping Command

So in this computer hacking tricks tutorial, I wouldn’t feel right if I didn’t even show you one cool trick with the command line.
Now that you know how to open the command line prompt, type these characters in exactly, “ping”. The ping command will call out to Google’s website, and Google will talk back to your computer. If you notice that after pinging Google you will see something that says packets sent, and packets received. What this means is this; packets are like little packages of information about the internet traffic going to and from computer to computer, or network to network. It is basically all the important information about your internet traffic.
Packets are what computers use to send and receive information, and that information in the packets tell the network where to send the traffic conversations. Hackers can use packet analyzers to do some serious damage to your computer or network. This why the ping command can be useful for a hacking attack and or use of cyberdefense.

5. Brute Force Attack

Brute force attack is a perfect representation of a word when it comes to computer hacking tricks. This type of hacking technique uses a computer program capable of cracking online passwords and usernames to websites. Is there any need to explain more?
The simplistic explanation on how a brute force attack works is this. The program goes through millions of words in a second that are dictionary words in order to guess phrases and letters of a password that you are using online. It deciphers each letter and finally words to figure out what your username or password is. If you are interested in experimenting with this type of tool, then you can download brute force attack software.
If you decide to download this, I highly advise to not go around and crack passwords to websites that aren’t yours! If you get caught cracking passwords and usernames to websites, you can be charged with a felony. Cracking passwords is no different then breaking into someones home, so tread very carefully with the use of this tool. Remember, you may be charged with a breaking and entering criminal action, so don’t do it!
We hope you enjoyed our computer hacking tricks tutorial. Cyberdefense would always like to know what hacks you know, and would like to share. Please leave comments below and share your cyber security knowledge. It’s valuable to everyone!


How To Prevent Spear Phishing Attacks 2017 NEW

Posted by Sufyan Hacker  |  at  10:55:00

                                  spear phishing attacks
In this blog post, PkHackingTricks will show you real world examples on how to block emails coming from spear phishing attacks.
In our last article, we talked about the latest current events on how email spoofing and spear phishing attacks are costing the U.S. economy big money. Hackers are sending out fake emails to unsuspecting victims. These false emails that are being sent out may look exactly like a familiar email address of someone you know well. This email address could even be a clone of the person messaging you. This technique of cloning someones email address is called email spoofing.

When you receive a spoofed email, there is always an agenda behind it. This agenda of a hacker pretending to be someone their not. They are trying to squeeze some sort of personal information out of you through these spear phishing attacks. Information that most hackers are interested in could be bank account numbers, credit card numbers, social security numbers, user names, passwords, your full name, your address, and so on. They might even be trying to get someone else’s information out of you through their phishing attempt as well.
Regardless of the reasons on why hackers want to steal your personal information, these attacks can be very harmful! This is why we will be showing you how to spot phishing attacks, and how to block emails on the most popular email service providers such as,, and even
Yes you heard me right when I said! The majority of email users still use a Hotmail account which is now for their email services. Ok sorry for that little side rant, but knowing how to block Hotmail emails will be useful for those who don’t know and still use this Microsoft email service.
Ok, so let’s get down to business. I will show you real world spoofed email addresses, and actual examples on how I was attacked through one of these spear phishing attacks.

Example 1: Federal Express Spear Phishing Attacks

This is a spoofed email from a sender claiming to be from Federal Express. The email looks legit, but it was one of many types of spear phishing attacks. I will break down an explanation of the email:

Subject: FedEx #46358
From: Federal Express
Thu 1/1/2016 12:00 AM
FedEx No.46358
We have sent you a message.
We have sent you a message with the required information.
Have trouble reading this email?
Click here to open this email in your browser.
Please click unsubscribe if you don’t want to receive these messages from Federal Express in the future.

As you can see above, the sender looks like it’s from FedEx. The email address was identical to that of a FedEx email address. There are even links like the “View messages” button, and a link to unsubscribe to future emails.
I never ordered anything from FedEx, so that got me thinking that this must be a mistake, or a phishing attack. Sure enough, it was a phishing attack. Now I don’t recommend anyone to do this at home, but since I have a dummy computer to practice cyber security on, I went ahead and did the unthinkable. I actually clicked on the “View messages” button! Again, I reiterate to NOT do this at home!
What happened next was that it brought me to a website claiming that my computer’s Adobe Flash Player was out of date, and that I needed to install the latest version. Below is a screen shot of the false alert.
spear phishing attacks fake webpage
In the image above, it displays a webpage that is false. I checked my Adobe Flash Player, and it is completely up to date to the most recent version. I am sure if I clicked on any of the links from this website, it would fill my computer with malware and viruses! Let’s move on to another example.

Example 2: Junk Mail

I am sure most of you get these emails already, but I had to post an example for anyone that wasn’t aware. Before I explain what this type of spam email is, I am just going to go ahead and post an example. Below is not one of the spear phishing attacks that I have been talking about, but it is an example of junk mail:

(No subject)
Click Here [Online Pharmacy]
Or Copy and Paste this Safe redirect Url into your browser:
===> 1.html
Viagra|Price_ $0.87
Cialis Price: $0.87
Viagra Professional|Price $2.67
Cialis Professional|Price: $3.59
Levitra|Price $ 1.04
Payment: VISA,MasterCard
Copyright 2007-2016. All Rights Reserved.
(If the link does not work then click – Wait, it’s safe! Or I’m not sure. Let me check)

This is strictly junk email sent to my inbox. This isn’t a spoofed email, and may or may not be a phishing attack, but these emails are more annoying if anything. If you are looking to buy Viagra online, I would not attempt to click on any of the links in an email sent to you from a company claiming to sell a drug to get your juices flowing. Clicking on a link may still download viruses and malware onto your computer.

Example 3: More Spoofed Email FedEx Spear Phishing Attacks

Below is another example of a spoofed email from FedEx that is phishing for information:

FedEx:Not possible to make delivery
From: Chloe
Fri 5/20/2016 5:50 AM
To: Your Name (
Subject: FedEx
January 1, 2013
Not possible to make delivery.
Our companys courier couldnt make the delivery.
Delivery Manager
FedEx 1995-2013 | Global Home | Terms of Use | Security and Privacy

The email above is claiming that I made a purchase, and the shipping was not able to make a delivery to my home. Again, I made no purchases, and this email is trying to get me to click on one of their links so I can be directed to a bogus website, and be fooled into typing in my personal information. Also if you look at the spelling of their email, it is certainly a clue that this is a phishing attempt. This is an indicator that this email is from a false sender. The example above is purely a phishing attack!
Let’s move on to our final example before we go onto showing you how to block emails in your gmail, yahoo, and Hotmail accounts.

Example 4: Spoofed Amazon email & Spear Phishing Attacks

This next email example is claiming that I made a purchase from Amazon, and that my order was cancelled. See below:

Subject: – Your Cancellation (11-323-46942)
Jan 1/1/2016 12:33 PM
Dear Customer,
Your order has been successfully canceled. For your reference, here’s a summary of your order:
You just canceled order 11-323-46942 placed on May 12, 2016.
1 “Huey”; 2006, Special Edition
By: Pierre Wallace
Sold by: LLC
Thank you for visiting!
Earth’s Biggest Selection

When I got this email, I must admit I was a little taken back from it. It looked like it was from Amazon, but the only problem was is that I never ordered anything in a while from them. At first I thought someone hacked into my Amazon account and made a purchase for 1 “Huey”; 2006, Special Edition
By: Pierre Wallace. I did some research and found that no such product existed. Their link all the way at the bottom of this email even brought me to the Amazon website.
Everything else about this email seemed legit, except for the order number 11-323-46942. The order number link took me to a webpage that looked like an Amazon page, but just looked a little off. It was asking for me to re-enter my credit card information, my full name, and my address. The webpage just didn’t feel right, so I decided to contact Amazon’s customer support directly.
Sure enough, I received a legit email from Amazon’s customer support team, and below is an actually copy of the email:

Message From Customer Service
Thank you for writing to us.
The e-mail you received was not from We are investigating the situation, and we appreciate you letting us know that you received this.
For your protection, we suggest that you never respond to requests for personal information that may be contained in suspicious e-mail. It is best to assume any e-mail that asks for personal financial information (or web site linked to from such an e-mail) is not authentic.
If you did not click on the link in the fraudulent e-mail, your account at is fine — there’s nothing more you need to do. If you did click the link, but didn’t enter any personal information (such as your login or password), the phishers will not have your account information.
However, please know that if you ever respond to a phishing e-mail and do enter your login and password (or any other personal information) on the forged web site, the phishers will have collected that information and you should take appropriate action. We recommend that you update your password immediately, and, if you entered financial information, you may want to contact your bank or credit card provider.
If you encounter any other uses of the name that you think may be fraudulent, please do not hesitate to contact us again.
Thank you for contacting
Phishing e-mails have been around for years. The term phishing comes from the use of increasingly sophisticated lures to “fish” for users’ personal or financial information. In phishing, the scam artist usually sets up a spoofed a web page, which looks like the real one, but is owned and operated by the phisher.
Go to to read more about ways to protect yourself from phishing.
Spoofing, in this context, refers to a counterfeit web page or e-mail that is made to “look and feel” authentic but is actually owned and operated by someone else. It is intended to fool someone into thinking that they are connected to a trusted site, or that they have received an e-mail from a trusted source.
Visit the “Privacy & Security” section of our Help pages for safe shopping tips, our privacy policy, and more:
Go to our home page then click “Your Account” on the top right menu. Choose the option “Change your name, e-mail address, or password” found under Account Settings.
We’d appreciate your feedback. Please use the links below to tell us about your experience today.
Best regards,
Amazon Rep.

There is some pretty good information from Amazon that was sent to me through their customer support email.
I hope the examples above gave you all some deeper insight on what a spoofed email looks like, and how a phishing attack is performed.
Now that we all have a better understanding on how to spot a phishing attempt, lets learn how to block these emails from ever being sent again to our email address for better cyberdefense awareness.

How To Block Emails

Below is a step by step guide in how to block a sender from your gmail account:

Gmail Account

spear phishing attacks gmail
Step 1: When you are in your gmail account go to the top right hand corner of an email message and click on the drop down menu.
Step 2: Just click “Block” as shown in the picture above.
Blocking an email address in Google is really that simple! Lets move onto blocking a sender from a Yahoo email account.

Yahoo Account

spear phishing attacks yahoo
Step 1: Go ahead and sign into your yahoo email account.
Step 2: As shown in the image above, go to options at the top and click on “Mail Options”
Step 3: From there you should see an option to Block Addresses
Step 4: Just type in the email address that you would like to block, and never receive email from that sender again.
Blocking someones email address in yahoo is as simple as baking an American pie!
Ok let’s wrap this up. Below is how you block someone in a Hotmail account.

Hotmail Account

spear phishing attacks hotmail
Step 1: Just go to your Hotmail homepage.
Step 2: And now, just follow these exact steps, and your all good!
That’s it, we hope you enjoyed this lesson on how to block emails and spot a spear phishing attack. We also hope you now know what a spoofed email looks and feel like too. Please leave comments below and talk about your experiences with email spoofing and spear phishing attacks.


Fake Email Sender Gets Everyone Eventually! 2017

Posted by Sufyan Hacker  |  at  10:54:00

                                     fake email sender
Even if you’re a savvy PkHackingTricks user, you are still at risk in getting hit by a fake email sender. There is always some article in the news about some celebrity, or some random employee who works for a mega corporation getting scammed by one of these cyber criminals. Even cyber security professionals who work for the government still get fooled into giving up valuable information through a phishing scam sent through an email spoofing cyber attack.
I will try and cover some good and up to date news stories to reflect on how bad email spoofing can be to the victims being attacked.
The same old story goes as follows, an email is sent to one of these innocent people’s email addresses, and they look at the sent electronic message and think to themselves that this is someone, or some organization that they know well. They then open the sent email and either open an attached file to that email which has malware on it, or they are led to a bogus website that looks legit. Somehow, someway they always freely give up their valuable information, and that the information they divulge is usually their bank account number, their credit card number, a password to one of their important accounts, or they are tricked into giving up some sort of important personal information of theirs.
If I had a nickle for every time someone got fooled by a fake email sender, I would be rich! I would be even richer if I could count the number of news articles on this subject that have been written on year after year straight!

County Treasurer Pays Fifty Grand From A Fake Email fake email sender platte county missouri

Email spoofing from a fake email sender is no joke! Just recently, in June 2016 a County Treasurer just cost the state of Missouri $50,000. Wow, that’s a lot of money to be wasted, especially for local tax payers, because that large sum of money is coming out of their pockets indirectly.
So what happened was this, the treasurer of the county, Rob Willard got a convincing email that looked very legit. The email stated with urgency that a bill needed to be paid immediately. This email looked like it was from Rob Schieber who is the Presiding Commissioner. The email address was exactly identical to Rob Schieber’s email address, which gave it the credibility it needed in order to trick Rob Willard in paying what seemed to be a time sensitive payment.
With all fairness to Rob Willard, the average person receiving such a well crafted email wouldn’t probably think twice if they received a clone email from someone they knew well. It was even written in the same style of Rob Schieber. This email spoofing attack looked like it was very well planned out, and because of the time and effort that went into this attack, it cost the state of Missouri’s county a large sum of money. These attackers just received a nice hefty little paycheck for their efforts. Fifty Grand is a years worth of pay for the average American, so you can imagine why this cyber attack was worth it for the criminals that conducted it. Not that I am endorsing it by any means.
If you wish to read the full story I am linking it here.

Milwaukee Bucks Teammates Are Under Cyber Attacks Through a Fake Email Sender! fake email sender milwaukee bucks

Another news article has recently popped up stating that Milwaukee Bucks members are undergoing spoofed email attacks from a fake email sender. An employee of the Bucks has received emails from Peter Feigin who is the president of the well known basketball team. Peter Feigin is asking for each team members W-2 form information. The information asked for includes Social Security numbers, financial information, names of all the Bucks members, and also addresses on each teammate playing for the famous basketball team.
The employee, like any other, handed all this information over without question of the email he/she received from Peter Feigin. The only problem with this scenario is that the email from Peter Feigin’s email address was in fact not from Peter Feigin at all. This email that the Milwaukee Bucks employee received was a cloned email of Peter Feigin. It was well crafted and looked legit. Much like how the treasurer from Missouri was scammed, the email was written in a similar style on how Peter Feigin writes.
Because of this spoofed email attack from a fake email sender, all of the Milwaukee Bucks team members information is in serious jeopardy now. Think of what a cyber criminal can do with all that sensitive information they received. Probably a lot of damage to these basketball players lives!
If you wish to read the official article on this email spoofing report which is fairly short, I am linking to it here.

Tax Scams Coming Directly From The IRS?fake email sender irs scams

You read that correctly, there has been a major tax scam coming directly from he IRS this past coming tax season in April 2016.  Well, not exactly from the IRS, but from someone claiming to be the IRS. Although I have been focusing on email spoofing attempts which are email clones from someone you may know, this IRS scam is actually the same concept but with phone numbers.
Cyber attackers have been targeting innocent and naive college students in what appears to be a huge and major IRS scam. These cyber criminals are using caller ID spoofing which makes a phone number coming from a government agency located in Washington D.C. look legit. These phone calls to these college students sound like they are from very credible IRS agents. The fake IRS agents already have some information on these college students that are being called, which makes the scam sound more convincing.
These unsuspecting students who are wrongfully scammed are being told that they owe federal student tax money to the IRS. The students are tricked into making a payment using a MoneyGram wire transfer to these fake IRS agents bank account. Some of these students actually go through and make the payment out of fear of getting in trouble with the law. Many of these students are not even aware that a federal student tax does not even exist.
To give these students who are being fooled by these scams the benefit of the doubt, when I was that age in college I wouldn’t have been familiar with a scam like this as well.
Again, if this is an article that you are interested in reading more in depth, I am linking to it here.
I am not going to review any more news articles on spoofing. I hope by now you get the point on what email or phone spoofing is, and I hope that you are more aware on how you can get scammed with this very real fraudulent activity.
I would like to switch gears a little bit and talk a little more on the statistics of these cyber attacks, and where they are coming from.
So the question begs, who are these criminals that are conducting these cyber attacks? Where do they come from? To be honest, most of these cyber criminals aren’t even pushing forward these spoofing attempts from inside the U.S. The fact that these attacks can come from anywhere in the world makes it all the more scarier. Someone can literary pick you out as an individual half way across the globe and steal your information somehow. Most of these spoofed emails are coming from Africa, Eastern Europe, and even some Asian countries. So the fact remains, that most of these cyber attacks are out of the FBI’s jurisdiction to really do anything about it when it comes to prosecuting these criminal actions!
Statistically, email spoofing scams are costing American business over $2.3 billion dollars a year. More than 50% of internet users in the U.S. receive at least 1 phishing email a day, and over 97% percent of these people being attacked through spoofed emails cannot even correctly identify these attempts.
Below is a graph that shows you how many attacks are conducted a day on most individuals. Hopefully this will give you a more clear visual representation on this widespread problem:
fake email sender statistics
The chart shows continual rising threats of spoofing attacks on individuals per day in American from 2013-2015. Based on everything that was talked about in this blog article, I would say yeah, email spoofing is a major problem that we are facing today!
You might be asking yourself, how can I stay clear from getting hit by a spoofed email address and risk giving all of my personal information away? Stay tuned, because in the upcoming weeks we will post an article in our computer hacking tricks section. We will showing very clear examples on what a spoofed email may look like, and how you can avoid them.


Monday, 26 December 2016

Website Got Hacked By Sufyan Hacker 2016

Posted by Sufyan Hacker  |  at  10:24:00

                                                  Website Hacked By Sufyan HaXor
                                                          We are anonymous.
                                                            We don't forgive.
                                                              We don't forget.
                                                                  Expect us.
Don't forget to fllow me on  Google+


Sunday, 25 December 2016

Google Website Hijacked by Pakistani Hackers

Posted by Sufyan Hacker  |  at  05:06:00

The Bangladesh domain belonging to Google is the latest to become the victim of hackers, as a group of attackers apparently coming from Pakistan managed to deface the search engine page and post their own message on the site.
Hackers who are part of a group called Team Pak Cyber Attackers hijacked the Google Bangladesh search engine domain and posted a message that taunts the security systems put in place by Google.
As HackRead notes, the breach was mostly possible with DNS hijacking, which was the same method that other hackers turned to in the past to disrupt other Google websites, including the Vietnamese homepage.
In this latest hack, the attackers posted a message on the Google Bangladesh page that included the Pakistan Zindabad slogan, which translates to Long Live Pakistan.
“Struck by Faisal 1337. Google Bangladesh Stamped by Team Pak Cyber Attackers. Security is an illusion. Pakistan Zindabad,” the full message posted on the Google website read.
Google has obviously moved very fast to restore access to its website, so everything’s back to normal now. It’s not clear, however, how long the defaced website remained available for visitors.
This isn’t the first time when Bangladesh hackers are targeting high-profile websites and similar cases happened last year as well when websites belonging to Google and Microsoft were compromised through DNS hijacking. Google and MSN domains based in the Pitcairn Islands were defaced by a different group of hackers who posted a message similar to the one published today.

“Google Pitcairn Island hacked by Tiger M@te & Surg4bij4k. Bangladesh to Indonesia, we own it all,” hackers who defaced the Pitcairn Islands domains said on the compromised pages.

At this point, it’s not known if the Pakistani hackers targeting Google’s Bangladesh domain had any other purpose than to highlight the weak security of the website, but given the fact that it all happened through DNS hijacking, no information was put at risk.


Friday, 23 December 2016

10 Things that Matters While Ranking Website in Google

Posted by Sufyan Hacker  |  at  19:18:00

SEO hacks and tricks 2017

Keyword in the title tag.

The title meta tag is one of the most grounded significance signals for a web crawler. The label itself is intended to give the precise portrayal of the content of the page. Web indexes utilize it to show the fundamental title of a query item. Counting a catchphrase in it will show to web crawler what to rank the page for.

In a perfect world, the catchphrase ought to be put toward the begin of the title tag.

Pages advanced along these lines will rank superior to those with catchphrase nearer to the title’s label end.

Keyword in meta depiction tag.

The significance of the meta portrayal label today is regularly examined in SEO circles. It is in any case still a significance flag. It is additionally significant for picking up client clicks from list items pages. Counting the catchphrase in it makes it more significant to an internet searcher and a searcher.

Keyword in H1 tag.

H1 tag is yet another significance figure, serving as a depiction of the page’s content. Regardless of a progressing discourse about its significance, it is still a decent practice to incorporate your catchphrase in a special H1 tag on a page.

Using catchphrases in the pages duplicate.

As of not long ago, stuffing your page with watchwords was a surefire approach to building its rankings for a specific catchphrase. That is not the case any longer. Utilizing the watchword as a part of the duplicate still sends an importance flag of what the substance is about. How you put it, notwithstanding, has changed radically.

The length of the substance.

Nowadays searchers need to be instructed and won’t fulfill with essential data. Google, subsequently, searches for a legitimate and useful substance to rank first. Also, it’s sound judgment that the more extended your substance is, the more prominent the possibility that you can cover more parts of your point. Try not to be short of composing long yet profoundly valuable duplicate then.

Duplicate substance.

Not all variables can impact your rankings decidedly. Having comparable substance crosswise over different pages of your site can really hurt your rankings. Abstain from copying content and compose unique duplicate for every page.

Canonical tag.

Some of the time, be that as it may, having two URLs with comparable substance is unavoidable. One of the routes from keeping this from turning into a copy content issue is by utilizing an authoritative tag on your site. This tag does one straightforward thing; it tells Google that one URL is likeness another, plainly expressing that notwithstanding two pages having a similar substance, they are in actuality one.

Image Optimization.

It’s not just content that can be upgraded on a page, however, other media as well. Pictures, for example, can send the web index importance motions through their alt content, inscription, and portrayal for instance.

Content Updates.

Google calculation favors naturally upgraded content. It doesn’t imply that you need to alter your pages constantly. I trust that for business pages, for example, item portrayals Google perceives the way that they are not as time delicate as blog entries covering late occasions. It is insightful however to incorporate some methodology to redesign certain sorts of substance once at regular intervals or somewhere in the vicinity.

Outbound connections.

Connecting to legitimate pages sends trust signs to the web crawler. Consider it thusly, the main motivation behind why you would send a client to another site is whether you needed them to take in more of the subject. This can be a colossal trust calculate for Google. Excessively numerous outbound connections, notwithstanding, can essentially lessen the page’s PageRank, harming its pursuit permeability. Outbound connections can influence your rankings yet utilize them with some restraint.

Internal connections.

Interlinking pages on your site can pass their quality between them.

Keyword in URL.

Counting the watchword in the URL slug (that is the bit that shows up after the “.com/”part of the URL) is said to send another pertinence flag to Google.

Site elements:

There are sure extensive variables that can influence your site’s hunt permeability too: Tella sitemap seeks motor to record all pages on your site. It is the easiest and most effective approachtellingGoogle what pages your site incorporates.

Domain trust.

Trust matters. It’s hard no to believe that locales Google trusts ought to rank higher. In any case, how would you construct that trust? Brian from Backlinko has a full rundown of trust elements here. Obviously, building trust elements of your area will absolutely pay off.

Server area.

Some SEOs trust that a server’s area helps rankings for that specific nation or locale.

Mobile advanced site.

Just a year back, 46% of searchers utilized versatile solely to explore. I trust this number expanded exponentially in the most recent 12 months. It would be nothing unexpected then that having a versatile improved site would influence rankings somehow.

Google Search Console coordination.

In conclusion, having your website confirmed at Google Webmasters Tools is said to help with your locales ordering. Regardless of the possibility that that is not the situation, the device gives important information you can use to upgrade your site better.


Tuesday, 13 December 2016

Bypass Android Pattern Lock 2016 NEW METHODS

Posted by Sufyan Hacker  |  at  03:52:00


Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc…) Installed:
1. Download this zip Pattern Password Disable (Download from attachments) on to your sdcard
(using your PC, as you cant get into your phone, right )
2. Insert the sdcard into your phone
3. Reboot into recovery mode
4. Flash the zip
5. Reboot
6. Done!
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Solution For Everyone Without Recovery Installed – ADB:
What You Need:
=>A computer running a Linux distro or Windows+Cygwin
=>USB cable to connect your phone to the PC
=>Adb installed
How to install adb:
1. Open Terminal
2. Type:
“sudo apt-get install android-tools-adb”
-> Hit [Enter]
3. Follow the instructions until everything is installed.
1. Connect you (turned on) Phone to the Computer via USB.
2. Open a terminal window.
3. Type:
adb devices
adb shell
cd data/system
rm *.key
4. Done.. Now You Just Have To Reboot.
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Solution For Everyone Before Lock Accident :
SMS Bypass – Download Link – Install It On Your Device (Download from attachments)
This App Allows You To Remotely Bypass Your Phone’s Screen Lock By Sending A SMS.
It Removes Your Gesture Pattern Or Password After Receiving A Preset Keyword Along With A Secret Code Via SMS.
SMS Bypass App Requires Root.
1.First, make sure you give permanent root access to the app.
2.Change the secret code to your preferred choice. The default password is : 1234
3.To reset your screen lock, send the following message from another phone:
secret_code reset
1234 reset
Note 1 : There is a space between your secret code and reset. Also the secret code is case sensitive.
Note 2 : There is an option available to change the preset keyword. Default is : reset – Your phone will restart and your lock screen will be reset.
Note 3 : If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Solution For Everyone Via Adb – SQL Command :
=>Type This Commands Separated In Your Terminal (CMD Prompt) :
adb shell
cd /data/data/
sqlite3 settings.db
update system set value=0 where name=’lock_pattern_autolock’;
update system set value=0 where name=’lockscreen.lockedoutpermanently’;
=>Now You Just Have To Reboot.
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.
Solution For Everyone Via Adb – File Removal :
=>Type This Command In Your Terminal (CMD Prompt) :
adb shell rm /data/system/gesture.key
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Solution For Everyone With USB Debugging Enabled :
Primary Step for all method:
Download & Extract to anywhere – Bypass Security Hack (Download from attachments)
Open SQLite Database Browser 2.0.exe in SQLite Database Browser.
Run pull settings.db.cmd inside By-pass security Hacks folder to pull out the setting file out of your phone.
Drag settings.db and drop to SQLite Database Browser 2.0.exe program.
Navigate to Browse data tab, At table there, click to list down the selection & select secure.
Instruction To Remove Pattern Lock:
Now, find lock_pattern_autolock, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone
Instruction To Remove PIN Lock:
Now, Find Or Create lockscreen.password_type, double-click & change it’s value to 65536, Apply changes!
Now, find lock_pattern_autolock, Delete Record, If doesn’t exist, Ignore
Close & save database
Run push settings.db.cmd and reboot your phone
Instruction To Remove Password Lock:
Now, find lockscreen.password_salt, Delete Record
Now, find lockscreen.password_type, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Solution For Everyone With Recovery Installed :
1.Download and Copy Aroma File (Download from attachments) to your memory card.
2. Open your recovery (press volume Down + Power button or it can be different according to the phones. Generally the phones who have pressable button on the middle they have to press all three buttons. Google for you pattern there are lots)
3. There’ll b an option in recovery called “mount”. Go in that option and then mount all the cache and everything it is there.
4. Then select “update” and select “apply update from SD/external” and select aroma file file that you downloaded using above QR code above.
5. After Flashing or updating, the aroma file manager will open. Use volume keys for up/down and power button 2 select like you use to get into recovery.
6. In aroma File manager , Go to menu , which is located in bottom strip and then select Settings.
7. Go to bottom n select “mount all partition in startup ” then exit from aroma file manager.
8. Now after exit, re-update that aroma file again and it will open again.
9. Go to data >> and then System.
Then find ‘gesture.key’ (for pattern lock) and ’password.key’ (for password lock) then long touch on gesture.key or password.key and sum option will be prompted , choose delete and delete that file and restart.
Note: If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry.
Just Try Any Random Pattern Or Password And it Should Unlock.


Sunday, 11 December 2016

Download Free Wireless Hacking and Defence Guide in PDF 2016

Posted by Sufyan Hacker  |  at  08:36:00

Here is a Free WiFi Hacking PDF that will teach you all about how the 802.11 protocol works as well as  how to hack WEP, WPA, WPA2 and WPS as well as how to protect against it.

With the help of this guide you learn how to hack a unsecured wifi and how to secure your vulnerable wifi.

1.  The following discussion is for informational and education purpose only.
2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden.
3 – Misused could result in breaking the law so use it at your own risk.

                      Download WiFi Hacking Guide (PDF Link)


Lock and unlock your computer with a Pendrive [Hacker Style] 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  08:20:00

Hello Guys! After a long time Sufyan Hacker is here with interesting article about Locking and Unlocking Your Computer With a Pendrive. Lets Do it!
Want a security for your PC. Try this hack, you can turn your pen drive or USB into a security key. Without this key nobody can access your PC. In simple language, you can lock and unlock your PC from Pendrive.

Lock and unlock your computer with a Pendrive, Hacker Style

We do this thing from an amazing software named Predator. This software turns your Pendrive into a password. Without your Pendrive, you can’t access your PC. If you unplug Pendrive from your PC your PC will be locked. This is one of the most advanced security for any computer user.

Lock and unlock your computer with a Pendrive, Hacker Style

1. Download Predator USB software from its Official Website for 9 days trial.
2. Install and Launch this software in your window PC.
3. When you launch this software first this software asks you to set the password.
Set Password in Predator Software
Set Password in Predator Software
4. Set your password and click on Ok button. (Make sure your Pendrive is connected to your PC.)
Set your password and click on Ok button.
Set your password and click on Ok button.
5. Now this software is ready for locking your computer from Pendrive.
6. Open Predator Settings
Open Preadator Settings
Open Predator Settings
Predator Settings

Here you set time interval according to your needs.The default time interval is 30 seconds. If you remove Pendrive from your computer you computer will be locked in 30 seconds.
When you remove Pendrive from your computer your computer asks you enter your password with the warning.
Predator Warning for System Lock
Predator Warning for System Lock
If you do not enter the correct password, you computer screen goes black with access denied message.
Access Denied in Predator

Start Automatically Predator Software When you Start your PC 

If somehow this software not automatically started when you start your computer then add this software in your startup folder.
1 Press Win+R, type shell:startup and press enter.
Open Startup Folder in PC
Open Startup Folder in PC
2.  Now add Predator Shortcut icon in Startup Folder. You can copy it from the desktop.
Add Shortcut in Startup Folder
Add Shortcut in Startup Folder
PREDATOR protects its own in-memory process. Nobody can stop it with Ctrl-Alt-Del. PREDATOR can sound an audible alarm if somebody enters an invalid password.
You can also see logs for all messages, warnings, fail login attempts and all other information.
Predator Logs


Friday, 2 December 2016

Top 10 Best Hacking Tricks & Tips For Android 2016 NEW

Posted by Sufyan Hacker  |  at  22:49:00

Today we are here with Best Androids Hacks & Tricks To Make Your Android Cool.
Android is a very cool device that provides lots of cool features and also you can perform lots of hacks in your android that can help you to do lots with your android. So we are here with some cool android hacks that will let your to change you android into a cool hacking device to perform different hacks. So have a look on complete guide discussed below.

Best Hacking Tips & Tricks For Android

So here we have selected some cool hacks that were written in some of our cool articles, refer them and perform various android tricks that will shock the people around you. So have a look on these hacks and tricks below.

Top 10 Best Android Hacks and Tricks:-

#1 Unlock Lock Screen In Android Lollipop 5.0 Without Any Tool

The method is quite simple but little time taking and this is actually based on android 5.0 vulnerability that will help you to unlock our android without loosing data or without need of any PC tools.How-to-Unlock-or-Bypass-Android-5-Lollipop-Lock-Screen

#2 Hack Wifi Security In Your Android 

Android Wifi Hacking App for rooted android phone. With this app you can disable other user net connection on same wifi network. With this WPS Connect application you can hack any wifi network and connect automatically to any password proctected wifi network.How-to-Hack-Wifi-on-Android-640x300

#3 Use Finger Print Security In Android Without Actually Having Finger Print Scanner Hardware

Use Finger Print Security in your android without having hardware in your device with the cool app discussed in this article.How-To-Make-Your-Android-Device-as-A-Fingerprint-Sensor-Enabled-2-640x424

#4 Install Kali Linux In Your Android For Pentesting

In this method you will be installing all the linux files on your android by downloading them and then using the complete interface for your pentesting or any other way that you like.

#5 Record Slow Motion Videos In Android Device

Now slow video recording is possible in any android device with some cool appss that are available today by which you can easily captures your special moments in slow motion.Apps-To-Record-Slow-Motion-Videos-640x372

#6 Remotely Shutdown Your PC With Your Android

The method is based on a cool windows program that is mainly designed to schedule shutdown on your PC but it can be used as remotely shutdown program too using some settings and implementationsShutdown-Pc-With-Phone-640x351

#7 Add Recycle Bin Feature In Any Android

With the recycle bin feature in you android device you can now easily make your data secure by securing it by getting deleted by any other person too. And the method is very easy and is just based on a simple android app that will temporary store deleted files that you can restore.Add-Recycle-Bin-Feature-On-an-Android-Device

#8 Add Guest Mode In Your Android

This feature is now coming in almost all new android, but older android don’t have this feature so they can use the method below to enable guest mode in any android.Add-Guest-Mode-Feature-In-Any-Android

#9 Block Or Stop Any Particular App For Particular Time In Android

Here you will get a cool app that will let you to stop particular apps for a particular time and you can get rid of distracting apps.Stop-Android-Apps-For-Particular-Time-640x318

#10 How To Unlock Windows Computer from Android/iPhone

How to unlock your computer with the help of your android smartphone, you will need a Rohos Logon Key software installed both on your Android and Computer to gain access you computer.

Unlock Windows Computer from Android iPhone 

So above are all the Best Android hacks and tricks that you will love to try in your android. Hope you will like this, do share these with others too. Leave a comment below if you have any related queries with any of the article, discussed above.


How To Block Particular Apps For Particular Time In Android 2016

Posted by Sufyan Hacker  |  at  22:47:00

You can now easily make your Android work for you according to your assigned time. Learn how to block particular apps for the particular time in your android.
For android users, we are here with the excellent method for How to block particular distracting Apps for the particular time in Android. Today there are lots of apps installed on your android device that can distract you. As in your busy time, your android can distract you from your work, so we are here with a cool guide that will help you block your apps for a particular time and after the assigned time limit they will again start working. So have a look on complete guide discussed below to proceed.

How to Block Particular Apps For Particular Time In Android

Here we will be discussing a cool app that will let you stop particular apps for a particular time and you can get rid of distracting apps. So follow up the steps below to implement this on your android device.

Steps To Block Distracting Apps For Particular Time In Android

Step 1. First of all, you need a cool android app that is ClearLock: block distractions in your android.
How to Block Particular Apps For Particular Time In Android
Step 2. Now launch the app on your android device and there you will see the list of the app that being currently installed on your android device.
How to Block Particular Apps For Particular Time In Android
Step 3. Now select  the apps that you want to block for a particular time in your device.
How to Block Particular Apps For Particular Time In Android
Step 4. Now set the time period for how long do you want to block your distracting apps.
How to Block Particular Apps For Particular Time In Android
Step 5. Now Clear lock will ask you to confirm your app block. Simply click on “I’M SURE” there.
Note: You won’t be able to use your blocked apps until the time has ended. 
How to Block Particular Apps For Particular Time In Android
Step 6. Now you will see a screen which will let you know how much time left to unlock your apps. You need to reboot your device in order to access your blocked apps.
How to Block Particular Apps For Particular Time In Android
That’s it now you will have time to complete out your work without getting distraction from the apps on your android device.
So above is all about How To Particular Distracting Apps For Particular Time In Android. With this, you can easily make your android work for you according to your set time and can complete your works without distractions. Hope you like our work, do share with others too. Leave a comment below if you want to give any related suggestions with this.


How To Add Guest Mode Feature In Any Android 2016

Posted by Sufyan Hacker  |  at  22:43:00

   How To Add Guest Mode Feature In Any Android
Learn How To Add Guest Mode Feature In Any Android: If you frequently hand your android to someone else without keeping an eye on your privacy then you are at the right place. You can now add Guest mode feature on any android device. Therefore, we are going to share two easy methods that will help you add Guest Mode feature on any android smartphone.
Android is a very smart device which provides many feature to its user, that’s why this operating system is most widely used in the world. And there are numbers of apps that are being developed to run on this OS making it more user-friendly. And talking about one of the coolest features that usually comes on some latest android version is Guest Mode, the excellent way to ensure your privacy. In this mode, you can set menu options according to your wish and you can create a different account with limited access for other users who want to access your android. Hence, we are here with How To Add Guest Mode Feature In Any Android. Just read out the below method to proceed.

How To Add Guest Mode Feature In Any Android

This feature is presently coming to almost all new android devices, but older android doesn’t have this feature so they can use the method below to enable guest mode in any android. There are two different methods for it which you can use for this purpose. Read out the below methods to proceed.

Add Guest Mode Feature In Any Android Using Guest Mode App

Step 1. First of all download and install the app Guest Mode on your android device.
Add Guest Mode Feature In Any Android
Step 2. Now you need to choose your app that guests can open in limited time. Click on the (+) sign to proceed.
Add Guest Mode Feature In Any Android
Step 3. Now you will see all your apps that are currently installed on your device, select the one you want to protect and click on apply
Add Guest Mode Feature In Any Android
Step 4. Now you need to click on next arrow which is located in the lower right of your screen.
Add Guest Mode Feature In Any Android
Step 5. Now you need to set the timer .
Add Guest Mode Feature In Any Android
Step 6. Now you will be given a password, it’s repeated time. Now click on start.
Add Guest Mode Feature In Any Android
Step 7. Now you will see Guest mode is running on your device and in its notification bar with a given time limit.
Add Guest Mode Feature In Any Android
Step 8. If you want to close Guest mode simply tap on the running guest mode on your notification bar you need to enter the given password in the 6th step to close.
Add Guest Mode Feature In Any Android
With the help of this app, you can easily get into a guest mode and can ensure your privacy.

Guest Mode In Android Using Switchme App

Step 1. First of all, you need a rooted android, for rooting your android click here. After rooting download and install the app Switchme on your android device.
Step 2. Now launch the app and grant it super user access. There you create a primary profile first then the other profile according to your wish.
Add Guest Mode Feature In Any Android
Step 3. In all other secondary profiles, you can set the limited apps that you want to set.
Add Guest Mode Feature In Any Android
That’s it! you are done now you can easily switch between these accounts.
So above is all about How To Add Guest Mode Feature In Any Android. The above two methods are simple and straight and easily adds guest mode feature in your android. Hope you like the post, don’t forget to share it with others too. Leave a comment if you have any related query.


Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge


Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>