About Technology Tricks, here you can find tricks related to Computer Software, Mobile Applications and many more tricks and information related to technology.

Friday, 23 October 2015


Today we will understood that how to become a hackers but its for temporary, today’s post will make you feel as a hacker through which you can get all facebook friends hidden email addresses.

How To Find Facebook Friends Hidden Email Address

Just Follow The Steps Below And You Will Gain Access To The Hidden Facebook Email Addresses
  • From your Facebook account you have to create a new Yahoo mail account (Use only that Facebook account for which you want friends hidden email addresses)
  • After creating your ymail or yahoo account, your work starts from here.
  • Now you have to go the contact directory of your yahoo page as shown below.
    Find Facebook Hidden Email address
    Find Facebook Friends Hidden Email Address
  • After that you will be prompt that the contact book is empty, so you have to add Facebook contacts.

Find Facebook Hidden Email address1
Find Facebook Friends Hidden Email Address

  • Just select the Facebook and import all the friends to your yahoo
  • now you will be able to see all your Facebook Friends Email IDs.
Note: every this is easy but something it need to agree that you unable to export those contacts, if your Facebook friends list having 300 friends then you will get may or may not about 250 or less cause some of the friends using Facebook with their ID as mobile number, and again remember that you can’t export your emails. Hasta-La-Vista, Enjoy don’t misuse it!

I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.

Thursday, 15 October 2015

How To Become Certified Ethical Hacker ?

Today many businesses and government-related organizations that are serious about their network security hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud from that black hat and other hackers.  So you can earn through it by learning the ethical hacking.

How To Become Ethical Hacker (10 Steps)

There are many ways to become an ethicial hacker to get certified for that . Below i have listed the ways to have knowledge about how the things actually works so you are able to hack it.
  1. Programming


    A programmer or developer knows how to build software and websites and these software or websites may be very important and require better security researches. Role of hacker will be as a security analyst who should find the flaws on the programs or websites and help programmer to make it more secure by testing different attacks on it . Also it is not possible if the hacker don’t have the knowledge of programming .  I have already written some article that will help you to understand programming and development of certain live projects.
    Read: Best Websites to Learn Programming.
  2. Networking


    Today the knowledge of networking is very essential as we daily shares a lot of stuff on internet and some data may be shared publicly but some data must be secured like your passwords, Bank information etc. And an ethical hacker must have ability to find out any flaw on the network security and vulnerabilities. And if you are well aware about the working of internet, he/she can figure out most of the problem on network securities.
  3. Encryption & Decryption

    This manly refers to cryptography, which means how you secure something that is with what methods ,like when you want to login in some site you enter the passwords there . Similarly you can use many other ways to encrypt something like OTP(one time password), Finger Prints, Face Detection etc. And when you the best way to encrypt a thing then you must know the decryption method to bypass that securities to become a ethical hacker.
  4. DBMS (Database Management System)

    This is the another most important thing that you must know as if you know how to create and manage different databases then only you can learn how they can be easily hacked like SQL injection knowledge can’t be get without knowing the SQL.
  5. Linux/UNIX

    Linux is very much powerful and It’s also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time . So this is the best operating system that can choose while learning hacking. And note that most of the hacker use this OS.
  6. Code in C Programming Language

    C programming is the base of learning UNIX/LINUX as this OS is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker, starts begning with learn C language.

  7. Learn More Than One Programming Language


    It is important for a person in the hacking field to learn more than one programming language. There are number of programming languages are there and learn such as C++, Java, Python, Free Hacking eBooks and tutorials etc are easily available online.

  8. Learn More Than One OS (Operating Systems)

    It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from LINUX/UNIX, Windows, MAC OS, Android, JAVA, Cent  etc. Every system has a loop hole, hacker needs it to exploit it.

  9. Experiment

    After learning some concepts of hacking/cracking, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.
  10. Continue Learning

    Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

The World’s Most Advanced Ethical Hacking and Penetration Testing Program – Certified Ethical Hacker (CEH)

Today this is the worlds most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization over the internet and the main goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation on any security. There you will walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification.
 
So above is the discussion about How To Become Certified Ethical Hacker. It is almost impossible to become a professional hacker by neglecting the things that i have discussed above. So carefully notice all the things and start working on it and you can become Certified Ethical Hacker .

I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.



Monday, 12 October 2015


Here is a way to How To Increase RAM Using USB/Pendrive. I know it’s old trick but still some people aware of it that’s why i’m sharing it with you all. As you all know what is basic functionality of RAM in your PC/Laptop as the more RAM means more speed and faster your system’s speed.
For gaming purpose one need more RAM. What if you don’t have enough money to buy new RAM and aslo sometimes there is no extra slot on your motherboard to setup new RAM also somtimes motherboard do not more RAM that you need so, then how will you upgrade you PC/Laptop’s RAM ?You need to buy a new PC/Laptop ? Well the answer is no, Today, We will share some tips regarding How to Increase RAM Using Pendrive in Windows.
Steps to Increase RAM Using USB/Pendrive :-
  1. First of all connect your USB/pendrive into your PC/Laptop’s USB port.
  2. Now in the desktop just right click on the My Computer icon and then click on theProperties.
  3. After this you will have to click on Advanced Tab then click on Performance.
  4. Now click on Advanced and then click on Virtual Memory.
  5. Now select you pendrive/USB icon and then click on Custom size.
  6. After that you have to view the memory available in your Pendrive/USB and note it down and click on OK.
  7. Restart you Laptop/PC and Enjoy the fast speed of your system :)
I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.


Today we are here with Easily Recover Files From Corrupted USB Drive. The best way to recover data from corrupted storage device. Today we mostly share our files through USB and some storage drive, But due to some viruses or wrong injection of these drives makes them corrupted and they stop working properly. And data in them can now be accessible directly. So for this we have a way to recover files from these corrupted drive. You just have to follow simple guide to recover all your files from any corrupted drive.

How To Recover Files From Corrupted USB Drive

The method is very simple and easy and depends on a cool recovery CMD trick that will let you to recover all files easily from your corrupted USB drive where you can’t unable to access files. Just follow some simple steps below to proceed.

Steps To Recover All Files From Corrupted Storage Device:-

  1. First of all Insert your drive in computer and press Windows button and type cmd.
  2. Now right click on Command Prompt and select Run as admin.
  3. Now there type Chkdsk f: /r where f is the drive letter and which can be different in your computer which you can check in Computer.1
  4. Now files and folders verifying process will starts and you can will see the process in percents there.
  5. Id you receive error that your drive is not windows XP drive then simply enter Y there.
  6. Now when the process completes it will ask you for Convert Lost Chains into Files , simply answer yes.
  7. Thats it your files will automatically start displaying in your Drive storage.
  8. If you see no items in your USB drive then simply type “.” (dot without quotes)in search box top right corner and hit enter.
So above is all about How To Recover Files From Corrupted USB Drive. With this cool cmd trick you can easily recover all your files from a corrupted USB and any storage drive very easily using this.

I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.

Friday, 9 October 2015



For all our tech lovers we are here with How to Send Free Text SMS from Gmail. Gmail is giant network that provides lots of services to its users and we here will be talking one of the cool service. And that is sending text SMS from gmail. Yes you can easily send text messages using your gmail account and you will not get any charge of doing this. As this service is totally free and can be used to send message to anyone for free. So have a look on guide to use this SMS sending service in your gmail account.

How to Send Free SMS from Gmail Account

The method to send sms using gmail is very easy and you just need a mailing trick that will send your SMS to the target mobile number and the complete method is discussed in below steps. Follow them all and enjoy free messaging services.

Steps To Send Free SMS Using Gmail Account:

  1. First if all login into account from which you want to send free SMS.
  2. Now in your account click on compose button and sending mail dialog pop up will appear.
  3. Now in the field To you will write the mobile_number@carrieraddress according to your carrier addresses given below:
    -> AT&T: number@txt.att.net
    -> T-Mobile: number@tmomail.net
    -> Verizon: number@vtext.com
    -> Sprint: number@messaging.sprintpcs.com or number@pm.sprint.com
    -> Virgin Mobile: number@vmobl.com
    -> Tracfone: number@mmst5.tracfone.com
    -> Metro PCS: number@mymetropcs.com
    -> Boost Mobile: number@myboostmobile.com
    -> Cricket: number@sms.mycricket.com
    -> Nextel: number@messaging.nextel.com
    -> Alltel: number@message.alltel.com
    -> Ptel: number@ptel.com
    -> Suncom: number@tms.suncom.com
    -> Qwest: number@qwestmp.com
    -> U.S. Cellular: number@email.uscc.ne
    scr1
  4. Now type the message in message box below and just click on send button.
  5. Thats it you are done, now your message will get send to the number for free of cost using your gmail account.
If your carrier address is not listed above then you can search out your specific carrier messaging address.
So above is all about How to Send Free Text SMS from Gmail Account. With this you can easily send any SMS using your gmail and your mail id will get displayed to the receiver mobile and there will no need to add any identification message.

I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.

Monday, 5 October 2015

                         
We are going to share a trick on How To Change Your Ip Address in Windows & MAC OS. Ip adress is an address of device connected to a network. It is a 32bit address given to a device. The Ip address will alter with change in networks. Every network will provide different Ip address to different devices connected to it.Suppose if there are 10 computer connected to a single network then the ip address of all the computers will be different within some serial orders. Any device is tracable on a network through its Ip address. Now some time there is need to change an ip address of a computer weather for a security or some other purposes. In this trick i will tell you the trick to change your ip adress in just 1-2 minutes. How To Change Your IP Address 2015 in Windows & MAC OS X.

How To Change Your IP Address in Windows & MAC

Steps to change ip address in Windows :-

  1. Click on start and then control panel.
  2. Select Network And Internet.
  3. Click on Network and Sharing Centre.
  4. Select Change adapter settings at left side.
  5. Now Right click on the network which you are currently being connected.
  6. Select properties.
  7. Double click on Internet Protocol Version 6(TCP/IPv6).
  8. Click on Use the following IPv6 address: .
  9. Now type any Ip address which you want to set.
  10. Double check the Vlidate button at bottom and then click OK.
Thats it you have changed your ip address. Now your system will have new ip address assignedby you. Now every packets sent to Networking layer will have Ip address which you have changed.You van also revert back the default ip adress by repeating upto 7th step and then clicking Obtain an Ipv6 address automatically and then clicking ok.

Method To Change Ip Address In Mac OS X:-

Steps to change ip address in MAC X :-

  1. Click on Apple logo at right top corner of  the desktop.
  2. Select system prefrences from the drop down list.
  3. Select the network icon from there (the icon with silvered colour).
  4. Now select the network which you want to connect either wifi, broadband or any other network.
  5. Now click on advanced grey coloured button.
  6. Now select TCP/IP  tab at the top.
  7. Now  select the Using DHCP with manual address option from the drop down menu to the right of Configure IPv4.
  8. Now enter the ip address you want to set.
  9. Also enter subnet mask there.
  10. Now click on grey Ok button at right and click on apply button.
By this your ip address will be change and now your all network working will have that ip address . You can also revert back the settings to automatic that will set your ip address that will be provided by your network.
How To Change Your IP Address in Windows & MAC OS X – Changing ip address to your desire ip address may break your connection with main server and you will be not able to access internet at that stage you will have to revert back the ip address to automatic that has been set by network as discussed above.

I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.

Sunday, 27 September 2015


For all android user we are here with How to Unlock/Bypass Android 5 Lollipop Lock Screen. Suddenly if you forget your android lock pattern, don’t worry, have a very simple method to unlock or reset the android lock pattern. In our previous posts we was having two methods, one using factory reset and another using tools with PC. But in this method you will use security bug of android 5.0 to unlock your android device. So have a look on complete guide discussed below to proceed.
How to Unlock/Bypass Android 5 Lollipop Lock                                            Screen                                                                                                                                           The method is quite simple but little time taking and this is actually based on android 5.0 vulnerability that will help you to unlock our android without loosing data or without need of any PC tools. Just proceed with some simple steps below.

Steps To Bypass Android 5 Lollipop Lock Screen

  1. First of in your locked android click on Emergency Dialer option.
  2. Now there keep on typing any random numbers and characters until it reaches its maximum limit.





  1. Now just copy out all the number that you have typed there.
  2. Now open the camera that you can even access a lock screen.
  3. Now try to drag the screen downward and it will ask you to enter a password. There paste the code that you had copied.
                                      
  1. If the camera app not crashes then repeat step from 1 to 5 with pressing volume keys while pasting the character code.
  2. Now you have to repeat this until camera app crashes and you moved to main menu with unlocked screen.

                                                      

  1. Thats it you are done, your android will be unlocked now.
So above is all about How to Unlock/Bypass Android 5 Lollipop Lock Screen. The easiest and simple way to unlock forgotten password, pin of your android with security vulnerability of android 5.0. Hope you like this, do share this with others too aware them also. Leave a comment below if you have any related queries.

Friday, 25 September 2015

                                     
We are going to reveal all the  methods that generally hackers can use these top ways/methods to How to Hack Facebook Account Password easily (Educational Purpose Only & Beware from Hackers). My motto of this post beware you from hackers.
I will show number of ways to Hack Facebook Account that all hackers usually use tohack Facebook Account. So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers.
NOTE :- THIS POST IS ONLY FOR SECURITY PURPOSE DON’T TRY ANY ILLIGAL ACTIVITY AND I’M JUST SHARED THESE METHODS BECAUSE PROTECT OUR FACEBOOK ACCOUNT FROM THESE TYPES OF HACKING ATTACKS.

Top Ways How Hackers Can Hack Facebook Accounts In 2015

Mostly Hackers use these methods to hack facebook account 2015, So protect yourself from hackers. Must Read this post, and beware from hackers,

#1 Hack Facebook Account Password By Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims “Email Address” and “Password” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

#2 Hack Facebook Account Password By Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim’s computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

#3 Stealer’s

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser.

#4 Hack Facebook Account Password By Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

#5 Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards WiFi users.

#6 Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are: Mobile Spy, and Spy Phone Gold.

#7 DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

#8 USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

#9 Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

#10 Botnets

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.


Tuesday, 22 September 2015

Today we are here with cool google chrome trick that is just a bug in chrome that is How To Crash Google ChromeRecently there is a bug found in a google chrome that lead to the crash of this browser instantly when the link is opened in the google chrome. This is a 16 character line that lead to crash of any version of google chrome in your computer. Read out the full story about this google chrome bug below.

How To Crash Google Chrome With Just 16 Characters

The 16 character code is given below which will crash your google chrome in second and all your tabs will get crashed. Use the code to play prank with your friends or having fun.

Google Chrome Bug That Lead To Crash It

In your google chrome you have to type the below code and then hit enter and then see the broswer it will instantly get crash.
http://x/%%30%30

1
google chrome crash

Use this code to crash any google chrome wither its your or yours and friends one. Google is working on this to fix the bug as soon as possible.
Conclusion:

So this was all discussion about How To Crash Google Chrome With Just 16 Characters. This bug is now getting viral all over the virtual world. And hope this bug will fixed as soon as possible from the google. So till that time enjoy this and have fun with friends. Share this with others too. And tell us about your experience in the comment box below.

Note : This is for Educational Purpose only, Perform the Trick at your Own Risk, www.asktrick.com is not liable for any damage you cause to your Computer.
I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.
Thanks
Keep Visiting Keep Learning.

Saturday, 4 October 2014



Today i am discussing with you an important information about hacking, as we know every person who relates with Computer technology, want to be ethical hacker.

In today's tutorial we are shareing with you important and useful tools for hacking, these tools are my favorite hacking tools.
I hope these hacking tools may support you to innovate your career in hacking fields.

Best hacking Tools :

  •  Angry IP Scanner :  Angry IP Scanner is really most important tool for Hacker , it is powerful tools for scanning the IP address on network/whole network/your network.
                 To Download Angry IP Scanner Please Click here




  • Achilles: Another tools for hacking is Achilles, general purpose of , it Achilles are:
        • Assessment Tools
        • Web Application Security
                           It acts as HTTPS/HTTP proxy that allows a user: 
        • To Intercept
        • Modify web Traffic on the fly 
        • Log
                    To Download Achilles Scanner Please Click here


  •  Cain and Able : This is most powerful and most important tool for hackers, i am also fan of this tool, it is used in:
          • Wireless  Hacking
          • LAN Hacking
          • Sniffing
    • Cain and Able tool is used to hack neighbor password and view all the activities of neighbor. 
                    To Download Cain and Able Please Click here


I hope you enjoyed this tutorial , If you have any query regarding this tutorial please mail us or comment us.

   
Thanks
  Keep Visiting Keep Learning.
  Ask Trick
 

 

X