Monday, August 8, 2016

How To Remove All Your Google Web History?

Remove entire Google Web History
As most of you already know, Google keeps a tab on pretty much everything you do on a Google site, provided that you signed in on any one of these websites. Everything you do is recorded, and can be used against you in the future. Search data can reveal particularly sensitive information about you, such as facts about your location, interests, age, religious views, and so on. You can, however, choose to not be so vulnerable, and can remove all of your Google web history to protect yourself from an unforeseen eventuality.

In this post, I'll show you how to remove your entire Google web history.

Before we begin, please note that any data you remove will be deleted permanently. Google keeps a lot of useful information that helps you find what you're looking for faster. It gives you quick access to webpages you've visited in the past, and even lets you know in search results which pages you've visited, and when. This information can be useful if you're a power user, and like to get things done quickly.
Google Web History

But if you still want, you can go ahead and erase your entire web history. You can also pick and choose individual items to remove, so that you won't lose everything.

Delete your Google Web History

Follow these steps to partially or completely.

  • Step 1: Visit your Google History page at Alternatively, you can click the gear icon  on the upper right corner of a search results page, and then go to Search history.
  • Step 2: Click on the gear  icon again, and then go to Settings.
  • Step 3: Click on the delete all link. You'll be prompted for a confirmation. Click on Delete all again, and your entire search history is gone!
  • Step 4 (optional): Click on the Turn off button on the Settings page to stop Google from storing your history again

If you don't want to delete your entire history, you can select individual items from the History main page, and delete them. This, by no means, implies that Google has nothing more to do with your data. They still keep some of your information on their servers for auditing and other such purposes. But at least your personal data is off the line now, and isn't susceptible to leaking out into the wrong hands.

Tuesday, July 5, 2016

Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend

Hacking is a term with a wide variety of acts associated with it. Some are incredibly complex and demand a high degree of knowledge, others are little more than installing some software on your device and acting a bit…less than ethically.
One of the most common hacks is also one of the easiest to defend against. This is what is known as a fake wireless access point. Hackers use this tactic to easily steal data of unsuspecting wireless users in public places.
What is a fake wireless access point data theft?
This type of attack has a number of nicknames associated with it: AP Phishing, Wi-Fi Phishing, Hotspotter, Evil Twins, and Honeypot AP. All of these are associated with creating a fake Wi-Fi connection that people log into, and whose goal is to steal credentials, logins, and passwords.
To accomplish this, hackers simply use a piece of software, or app, that is designed to capture data that is sent over a wireless connection. Examples of software that is sued during a fake Wi-Fi attack includes:
  • AirSSL
  • AirJack
  • Airsnarf
  • Dsniff
  • Cain
  • void11
No matter which apps are used, the key to it all is setting up a wireless connection that people will want to connect to. When they go to connect to the wireless point they likely won’t suspect a thing. Why? Because this tactic is used most often in public areas.
If you were to go into your local Starbucks, sit down with your mochalatte venti with cream and sugar pumpkin spice, and open up your tablet, finding a connection labelled ‘Starbucks Free WiFi,’ you’d probably connect in a heartbeat (on which is quicken by caffeine, at that). The same goes if you’re on a layover at JFK and you see a connection labelled ‘JFK Free Wi-Fi.- You wouldn’t think twice. That’s what the hackers are counting on – you not thinking.
How is your data stolen during a fake wireless access point theft?
How your most important data is stolen is a little shocking – you give it to them. A large percentage of these hacks take place with a fake wireless point that requires a login and password. Once that information is put into the login, hackers will take it and use it to sign into popular websites, assuming that you use the same login and password for multiple sites.
When your online accounts start showing charges that you didn’t initiate, or if your social media account is taken over, you could be the victim of a fake wireless access point data theft.
How to defend against an ‘Evil Twin’ attack?
There are a number of ways to defend against it, I’ll look at some easy to understand examples:
  • The best defence is to always verify with the wifi provider. Ask the Starbucks staff what their wi-fi is called, it can save you a massive headache. Always remember – if a deal seems too good to be true, like free wifi, it probably is.
  • Use different login details and passwords for public wifi.
    Disconnect auto-connect when you’re in unfamiliar territory.
  • Be cautious when connects suddenly disconnect, especially if it happens for everyone on the network. An app known as aireplay is capable of disconnecting users from wifi, hoping that they’ll reconnect to their fake wifi.
  • Be cautious of certificates. Good websites can occasionally send you one, but if this happens over a public wifi that you don’t know, it is best to back off.
  • If a wifi hotspot is interfering with your VPN, forcing you to shut it down, that is a HUGE red flag. A VPN is a great defence against this attack, and hackers know it. Forcing your VPN to disable when you’re trying to connect is the only way that they can steal your data.
That last point is one I want to look at further. A VPN can be a great defence against this type of attack because it encrypts all of the data that you send out. With this data being encrypted, even when you create your login and password with the fake wifi, your data can not be stolen because it can not be deciphered. We review our Top 10 VPNs over on our website if you’re interested in learning more about them.
A last option that I’ll suggest is using SSL-protected apps. These do take more care and thought to use, but they will offer you protection that is similar to a VPN. Some hackers have even found a way around SSL protection ( the BREACH method), so you may want to explore using this with a secondary defensive measure.
The overall advice is to be cautious and verify before you connect. People look at me weird all the time when I ask for the correct wifi name that I should use to connect to. I’ve never been the victim of an ‘Evil Twin’ attack…I’ll take a funny look or two!     

Wednesday, May 4, 2016

Send Self Destruct Messages when your Friend Read

We always want some new things in our web or Internet Life. Here I tell you a website named Privanote. This website destroy your send messages when your friends read that messages. This is totally cool things for those who wanna secure your messages.
Send Self Destruct Messages when your Friend Read

This website is send your confidentional information to your friends and families over the internet without worrying about the malicious hackers.

Privnote is a free web based service that allows you to send top secret notes over the internet. It's fast, easy, and requires no password or user registration at all.

Steps for Using Privnote

  • Write your note whatever you want in . You will get a link.
  • Then copy and paste your link and send it to your friends.
  • When your friends click on that note first time,they see your message.
  • And now this message automatically self destruct when your friends read that message.

There are many websites like self destruct. 
You find more features on others sites.
So try this website.

Learn Linux Online with Command Practice - Webminal

Learn linux Online with terminal this is possible my friend. You can learn all linux commands without install any OS on your system. Linux is good OS because this is open source, anyone can modify it and customize it.
Linux come in all interface Like GUI and CUI. In this article I teach you how can you learn linux in CUI from Online.

How to learn Linux online terminal with webminal?

Webminal: Online Linux Terminal

Learn Linux Online is very simple with the help of webminal. Webminal is a online website which provides you virtual linux over the web browser. 
Wit the help of webminal you can practice all linux commands.

  • In webminal, First you need to register yourself on this site.
  • When you open terminal on this site ,this site asks you login and password like linux system.
  • Now try all linux commands in this online service.
  • If you don't know much linux commands try our linux section.

Turn on Windows Firewall -Protect you from malicious network activity

Computer and Internet is not safer this time,because there are many hackers and crackers wanna hack your system. So here I give you a small tip,this tip make a shield between you and hackers.
In Windows a Firewall can a first blockage for hackers, so I recommend you always this thing turned on.
Windows Firewall is like a strong shield ,this shield protect you from every type of attacks against your computer.
Turn on Windows Firewall -Protect you from malicious network activity

A firewall is not a antivirus. This is network shield and network filter software.

Your Windows firewall should be enabled by default, but if you’re worried that you’re not protected, here’s how to turn on your PC’s firewall.

Steps to Enable Windows Firewall

1. Press Window Button and type Enable Firewall.

2. Suddenly a result come in top Check firewall Status, click on that.
Turn on Windows Firewall -Protect you from malicious network activity

3. A Dialog Box open ,now left side you see that
Turn Windows Firewall On or Off option click on that.
Turn on Windows Firewall -Protect you from malicious network activity

4. Select the Turn on Windows Firewall for both Private Network Settings and Public Network Settings.
When you enabling the firewall for both networks,your computer protects you from harmful activity come from the open Internet.
Turn on Windows Firewall -Protect you from malicious network activity

So I recommend you always check your firewall its opened or not because some malicious software disable your windows firewall.

Top 5 Websites for Hackers see it

Today In this post,We talk about How do you get latest news about  hacking. Hacking infected all world,so here we tell you some best websites to see live hacking.These Hacking site stats shows you live hacking and ddos attack.
Top 5 Websites for Hackers

Best Website for Newsbies Hackers


Hackernews website give you all latest news about hacking.Hackernews website covers all hacking news from worldwide.


Hackertyper gives you feel like hacker.This is not a hacking site.This is troll/prank site.When you type any keyword on this site, this website  automically type 10 words on website.When you tap caps lock double time this site gives message you access denied and when you tap alt button double time this site gives you message access granted.


Ipviking site shows you real time hacking in worldwide.This website gives you all type of information like attackers name,attack port,country and attack name.


Digitalattackmap shows you live ddos attack worldwide.

Kaspersky Live Cyber Attack

This is owned by Kaspersky and shows all type of cyber attack.Kaspersky live cyber attack is like a google earth.

kaspersky live cyber attack

So this websites gives you all type of hacking news from worldwide.

What personal information goes to Internet through Your Web Browser

Hello all you know when you are online many of your personal information goes to internet.This is a serious security issue. Hackers use this information in Illegal Activities.
When you open your internet browser and open any website the information goes on internet is.

  • Computer Information
  • Browser Extension
  • Software information
  • Network related information
  • Ip address
So how can you see what your information goes to internet. Here  I provide a solution  you can see what your personal information goes to internet.

System Scanner is website which shows what information goes to internet through your web browser. System Scanner shows you network,browser extension,os,hardware information and browser plugins,ip address,broadband speed,geo lacation and many type of personal information.
 So beware next time when you run your web browser because someone is sseing you.
system scanner