We are legion, for we are many.

Thursday, June 9, 2016

How to hack online payments.

1:18:00 AM Posted by Unknown No comments
Hey Guys what is up with you today!!!???? :) 
Today I'll be showing you how to Purchase IDM for free.
Okay guys so first of thank you for taking time off your day to visit my blog channel, it really means a lot to me.
Okay so let's begin!
Step 1:- Open up IDM.

//Only this hack only works if you have ended your 30 or any number of days of trial.
It will look like this:-









Step 2;- Disconnect your internet connection and press ok on the IDM pop up

Step 3:- Fill out the information (It can be fake)

Step 4:- This is the most important step off all On the serial number bar type in DBNJC-D4R59-YPAGA-T3S1Q

Step 5:- Press enter and ta-da you have now purchased the file.

Go Ahead break a leg.

Thank you for visiting, and This much for today and I'll see you in the next one!!
The next blog will be much more related to hacking. Kali linux style.
So stay tuned.

BYE BYE!!

Wednesday, June 8, 2016

Some terms on hacking

7:52:00 PM Posted by Unknown No comments
Hey Guys!! :D .
My Name is hardy man. This is my first article on this blog. So I'll introduce some basic terms that you can understand very easily.
White/grey/black hat hackers:
White hat hackers are those hacker who use their skills  for good use like for security firms in companies.
Grey hat hackers are those hackers who use their skills to do things that might be illegal in some parts of the world, its like in the line separating legal and illegal.
Black hat hackers are those hackers who use their skills to do a shitload of illegal work. The black hat hackers hack bank accounts , personal computers , credit cards. If you an example of a black hat hackers fell free to visit the dark web.
RAT : Remote Access Trojan.
RAT's are used by hackers to infiltrate the system of a victim.
<WORKING OF RAT>
The victim gets a file.
He/She opens/installs it.
BOOM!! The attacker now has access to the system of the victim. (Don't worry I'll teach you how to make a RAT)
FUD; Fully UnDetectable. Whenever a hacker sends you a file he/she will try to make it undetectable by your anti-virus.
If you want to understand some more keywords please go to this link:
https://www.youtube.com/watch?v=sFFCF2Xscog
//I dont own this video.
So guys this was just the introduction part.
In the next article I'll be teaching you how to Buy IDM with a serial key without crack.