Skip to main content

Posts

Showing posts with the label Tips

Ethical Hacking - Footprinting & Reconnaissance(Full Video tutorials)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about   Ethical Hacking CouresWare( Footprinting & Reconnaissance .So I provide you Download link just simple one click to that download button and download it. File Details:- Introduction Footprinting and Reconnaissance Tools Footprinting and Reconnaissance-Low Tech Conclusion DOWNLOAD NOW

Smartphone password can also be viewed from the heating your finger

Today's i am talk about daily using of Smartphone.this smartphone password u know and view to your heating of finger and break it passwords of any smartphone. News:- Password is a like to lock our any phone to make a safely for us.you can make sure to make any pattern , any number of lock ,any alphabet of password ,and much more type of password you can easy to make your smartphone.   Now a days Two German University Scientist research they make sure EVEN YOU LOCK YOUR SMARTPHONE ,AFTER 30SEC YOU DONN'T TOUCH YOUR PHONE .THAT PASSWORD OF YOUR PHONE YOU KNOW EASELY. How this possible That time you have that Imagian Thumber Camera    that application was scan that finger where you touch that camera esay to find that and you show . that time you get hardest and diffrent password you can find.even that password get that any of person that person will know your bank-account,mobile-wallat,paytm etc.. all type of transaction application they will know al

How to Use whatsapp without number?

Seems weird right!! but believe me or not it is possible by this trick. You can use whatsapp without any number. I found this whatsapp tricks hottest in the market. However there is a trick in this. It means you don’t need your number for using whatsapp but it will use whatsapp through other’s number. But here is the most tricky part. How you are going to get verification by that phone? I mean if it is not your number. It is possible through Fake whatsapp Number. We are bringing best in all whatsapp tricks for you. Steps  for using  whatsapp  without number:  whatsapp   tricks If you are already using whatsapp on your phone then uninstall whatsapp from your phone. You need to download whatsapp from the play store and do install it on your device.You need to follow this step as this is necessary if you want to use whatsapp without number. Now to bypass phone verification you need to enable flight mode in your device. Haha!! you will love the tricky

How to Edit Android Game and Application on Android Device

Hey guys, If you are android application developer or learning android application developement, you might probably looking for editing or modifying android apps. You might also looking for How to Edit an APK files & also when you first learnt how to decompile, modify then recompile .apks, it seems little tough that it’s looking. Here in this post we would going to discuss about editing APK files from android using APK Editing Tool, that will help you to edit apk files or even modify APK files directly from your android smartphones. How to Edit  Apk  Files using  APK  Editor in your Android   device. There is an app on Google Play Store and its name is APK Editor. You can search for APK editors on Google play Store and download and install it. After installing apps editor, you will be given options like select an APK file and another option would be select APK from app. If you select an APK filer(first option) it would display you apps folder fr

Do You Know About doxing?

It’s essentially gathering a bunch of information on a target they generally wouldn’t want you to know. Everything from name, e-mail, zip code, and even address. What you need: ◆ Basic social engineering ◆ Notepad ➡steps to do doxing . 1. Obtain their IP address. Do this by going to  http:// whatstheirip.com  and enter your e-mail address. This will then give you a set of links. 2. Take one of these links and trick them into clicking it by saying something like omg check this out or any method you choose. 3. If your target has e-mailed you, you can get the IP from looking at the e-mail source. To look at the e-mail source for Windows Live users, right click on the message, and click ‘View Message Source’. When you’re looking at the source, look for this: ‘Received: by’ It will show you an IP address. This is the IP address of your slave. 4. Once you have their IP address, goto  http:// ipaddress.com  and enter it in. You

What is Keylogger ???

What Is Keylogger And How To Be Safe From Keyloggers? In this tutorial i am going to talk about the most use piece of software besides from  RAT( remote access Trojan)  by hackers to observe your activities on your computer and that is keyloggers.  A  keylogger   is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.  1. What is keylogger ? You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A  keylogger  also know as   keystroke logger  is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye

Email Hacking can be possible

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong... Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's.. Email Hacking can be possible to many ways like:- 1. Social Engineering 2.Phishing Attacks 3. Cookie Hijacking 4. Keyloggers 1.Social Engineering: This Process is defined as Hack the human mind without any tools... This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want.  This really works!! But it requires a lot of patience. We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some intern

Download facebook videos without any software

This post will tell you  the simplest method to download videos from facebook, which you can't download by simply right click. This is as simple as latter. Steps : Right click on video while its playing and click show video url. Copy generated video URL.  In my case, it is https://www.facebook.com/iamkamalnayan/videos/651573224985442/ Replace www to touch in the URL and open in new tab (or existing one). Old URL: https://www.facebook.com/iamkamalnayan/videos/651573224985442/  New URL: https://touch.facebook.com/iamkamalnayan/videos/651573224985442/ Play the video. Right click on video, while its playing. Click on Save Video As to save the video. Enjoyyy...:))))

Hack a Computer Only with just a IP Address

Latest Tricks  presents you an easy tutorial to hack a Computer only with a just a IP Address in six simple steps. Steps : 1)  Prepare the IP address of the Victim. (e.g : 101.23.53.70 ) 2)  Download and Install  Advanced Port Scanner . 3)  Open Advanced  Port Scanner  and Type the  IP Address  in the right column and Click  Scan. 4)  It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )   5)  After retrieving the IP address and the Opened Ports of the Victim, Open  Command Prompt  (CMD)   and Type:  telnet [IP ADDRESS] [PORT]   e.g :  telnet  101.23.53.05   91 Enjoy...:))))