Friday 30 March 2018

How To Spy WhatsApp without installing on Target Phone - SAMHACKERSWORLD

When we hear the term- spy, we think that there might me some bad intention behind it. In the past, hackers only focus on the act on spying on others’ mobile or computer to steal the important data.


However, at present, we need to spy on our dear ones’ online activity just for their benefits. Some mobile users like to hack the data of their spouses, while others want to do constant monitoring on the teens.

While we are able to know the detailed information on the target Smartphone user, we can remove all our concerns. So, the best tool, available for your successful spying, is Copy9.


How to Spy on WhatsApp Messages?

Is it possible to spy on WhatsApp messages without installing on target phone?


Before giving you the ultimate solution, we like to ask you a question- Do you think that it is too tough to hack others’ mobile?


The truth is that no one will give you consent on spying on his phone. Most of us have a belief that to spy on a target mobile, we need to access the device all the time.

Now, with the release of Copy9, you have no such concern.

As WhatsApp is a very popular app, Copy9 is designed to hack this app easily. You know that there are different ways of hacking this application. However, nothing is simpler than to use this effective spy tool.


Copy9 app developers have realized that there is some good reason behind spying on another mobile. That is why they have created this app for everyone’s benefit.

The installation of this spy app will never affect the functioning of the mobile. All Android and iPhone users can get the opportunity of using this application to hack WhatsApp information successfully.

Now, the major issue is- How should you spy on WhatsApp messages without installing on target phone? You can do it effectively only with the use of Copy9.


You may find several online tools, which claim that they are helpful for spying activity. However, after you invest on those tools, you find that you have to access the mobile to start the spying process.

But, there is no such issue with the software, Copy9. It ensures you of 100 percent success rate by using this app. Most of the users, who have run this app, have easily spied on the target phone.


Copy9 enables you in tracking everything, related to WhatsApp-


The received and sent messages to the app users- You can find those messages on your Notification bar


Outgoing and incoming calls to WhatsApp


Duration of those calls


Name of contacts with whom the target users


Time of all chats


The best fact is that Copy9 remains invisible on the target mobile. Thus the mobile user will not be able to know that his mobile is hacked by other.


This is one of the most advanced spy tools, which are effective at uploading the data and recording everything securely. There is no need to touch the target device. 

How to Spy on WhatsApp Messages?


While you have a concern on how to spy on whatsapp messages, we have presented these simple steps for you


Go to the website of Copy9


Install the app


From the Control Panel, you have to choose Sync Settings for the synchronization of your mobile and the target device


Copy9 works at the background, while you have activated Stealth Mode. Just create your free account, and you will get a chance of reviewing the data that you have received from the victim’s mobile.


You will have a clear view of the information, presented in a tabular form. You can easily trace out the data from the interface.

With Copy9, you can get several other useful features, which are intended to make your spying successful.


Messenger apps-


Copy9 is useful to track not only WhatsApp account but also other apps, including Viber Skype and Facebook.


Call record


All the calls can be silently recorded and you can have those downloadable audio files from your Cpy9 account.


TraceYou as the server app-


Copy9 has serever version, TraceYou and this app helps you in viewing information without access to control panel.


Track the surroundings-


While the internet system of the target device is turned on, you will get an alarm and this feature is called as Audio Live.


Thus, download Copy9 and have a trial version of this software. All WhatsApp messages of the target mobile are now revealed to you. As one of the WhatsApp spy tools, Copy9 is really reliable.


You can install it for tracking data from various applications on the target mobile. The premium version of the Copy9 is also affordable to all users. So, if you prefer the free app, you can choose to use the paid one.

How To Spy WhatsApp - SAMHACKERSWORLD

Smartphones today come with numerous quality apps for people to use.


There is an app for any purpose and need. Some of the most wanted apps are those that help people protect their privacy and personal stuff.


All types of smartphones have their own vulnerabilities, so it is of crucial importance for people to protect them from hacking.


However, hacking into someone's phone has never been easier today, especially if you use a quality app for spying someone's smartphone activities.


Check out the following ways for spying whatsapp messages.


Quick Navigation


How to spy WhatsApp?

Main features of Whatsapp Spy App

Whatsapp spy free trial

Part 2: How to read someones whatsapp messages without their phone?

The WhatsApp encryption backdoor

The Best way to spy someone's Whatsapp 

Part 1: How to spy on whatsapp messages without target phone?


The answer to this question is use Whatsapp Spy App for smartphones. Copy9 is an application with which you can learn how to spy whatsapp very efficiently.


With the application you can also monitor all other activities of the person, so it is not just an ordinary whatsapp spy utility.


With this spy app you can also track and record calls, chat history, text messages and online activity of the targeted user.


You are probably wondering about how to spy whatsapp? Well, that is done pretty easily.


This application does a great job in being top whatsapp spy and using it does not require any special skills.


Spying on other whatsapp messages has never been easier and you can check out the behavior of your closest ones, your colleagues or workers.


How to spy WhatsApp?

If you want to whatsapp spy download you need to do a few simple steps:




First you should go on the Copy9 website




Download the application, install it on the phone




Final step is to create your account on the website where you can check the whatsapp spy utility.


Great thing regarding Copy9 is that there is free trial version with which you can test this whatsapp spy utility to see its great features.


When it comes to the features you should know that there are many other quality features besides hacking whatsapp.


Another great thing is that Copy9 helps you do whatsapp spy without being detected.


The targeted smartphone user will never know that you are spying on whatsapp messages, so you have nothing to worry about.


Whatsapp is a very popular social application today and millions of people are using it to communicate between each other.


Teens, young adults, and even senior citizens are using whatsapp.


If you are worried about your children's or partner behavior, then you can use Copy9 in order to whatsapp spy.


For checking out the whatsapp messages of the targeted user you just need to open any web browser, visit the Copy9 website, login to your personal account and check everything you want to know.





Buy Copy9 Now and Start Monitoring Within Minutes!



Main features of Whatsapp Spy App


We mentioned that the Whatsapp spy app for android is just one of the features Copy9 offers. Correspondingly, it means that the app has a lot of additional features to offer to you. They are:




GPS positioning - From the control panel, you can always determine the exact location of the smartphone. It uses GPS so it is extremely accurate and available 24/7/365.




Call recording - Obviously, listening to the phone calls is possible, but the app allows you to record the calls as well. The recorded calls will be available as files to download later on.




Microphone activation - This is one of the favorite features of many users. It allows you to activate the microphone and listen to the conversation.




Monitor internet activity - Which websites your spouse, child or employee visits? It is impossible to tell without the app. That’s why internet activity feature is important.




Keylogger - This is a feature which records the keystrokes in real time, allowing you to also read the written messages, record passwords and login information.




Full-app control - This addition will be useful if the user uses some inappropriate apps. They can be deleted, blocked or simply limited.




Full data access - Every single file or data on the targeted device is fully visible and manageable from the control panel itself. From there, you can download the file, delete it or even send it to another user.


Now you know how to spy on Whatsappbut you will also have to know that the Copy9 is undetectable, meaning that none of the conventional software can detect its presence on the targeted device.


Whatsapp spy free trial


The best part of the Copy9 app is the trial feature. It allows you to check all the capabilities of the app itself, so you can later determine is it suitable for you. In any case, the money back guarantee is available as well.


Only after trial period, you can decide to purchase the app which will unlock plenty additional features, which make spying simpler and better.



Part 2: How to read someones whatsapp messages without their phone?


The WhatsApp encryption backdoor


Looking for ways and solutions about how to read someones whatsapp messages without them knowing has been on people's minds since forever.


The truth is that hacking someone's account has never been easier and you should always be very careful when receiving some photos or videos on whatsapp.


No more than just a few seconds are required for someone to hack a whatsapp account.


Recently whatsapp discovered a vulnerability in its system through which hackers can fully take control over someone's whatsapp account.


However, this vulnerability affected only the browser version of whatsapp.


According to some researches that looked into the security of whatsapp, they pointed out that some images and videos may contain malicious codes, and if the person clicks on them their phone may get hacked.


Many people want to learn how to read someones whatsapp messages without them knowing and are doing all they can to exploit that weakness.


Hackers can send images with some type of malicious code inside, so when the victim clicks on the picture the code will spread and the hacker will gain complete access to victim's whatsapp messages.


Hackers can them access the whatsapp account to:




View chat history




Check group and ​​​​personal chats



View videos, photos, documents and other shared files through whatsapp.


However, hacking whatsapp cannot be done with just about any tool, so you need a quality whatsapp tracker online to do that.


Truth is that there is vulnerability inside whatsapp, especially when encryption keys are being changed.


Many experts suggest that this vulnerability is not exactly a backdoor, but a feature to prevent unnecessary verification of keys after regeneration is done.


Anyhow, the fact is that hackers can penetrate whatsapp with a whatsapp spy online, regardless of the level of security that whatsapp has.


Whatsapp has a couple of options they can do for bigger protection of their over billion of users.


Whatsapp can lower the regeneration of encryption keys, because at the moment they are doing this very frequently.


Besides that, whatsapp can also provide an option within the application settings, with which if you turn it on you will not get new encryption keys automatically.


The abovementioned were the ways through which a whatsapp account can be hacked.


As you can see, hackers have many options available when it comes to hacking accounts.


They are always coming up with new ideas and new ways to enter someone's smartphone and check out messages, calls and other things.


You can choose to be up to date with latest developments and learn how to do it or protect yourself, or you can sit back and do nothing, but you will risk others spying on your smartphone applications.


At the end we are coming to the summary where we need to compare and check what is best out there on the market.


Now you have a clear picture that hacking a whatsapp account is not that hard and that you only need a suitable application for doing so.


Today application developers are making programs so the apps are not hard to use.


General public always wants something simple to use when it comes to hacking someone's whatsapp.


Luckily, your option is quite good, so make sure you pick the best way to hack whatsapp.


The Best way to spy someone's Whatsapp 


Clearly of all options you have available on the market, using Copy9 is your best pick when it comes to efficiently and quickly learning how to read someoneswhatsapp messages online free.


There are many reasons why you should use Copy9 for learning how to read someoneswhatsapp messages online free, and one of the best reasons is because this small application is completely undetectable.




You can remotely control it and monitor whatsapp activities without the final user even realizing that his or her phone is being monitored.




Monitoring whatsapp messages is a good thing especially if you have children that you want to protect from bad influences, if you suspect that your partner is cheating, or if you want to spy the communication between your workers.




Monitoring calls, checking out contacts, watching videos and photographs are all done very easily with just a few clicks on your computer.




GPS tracking option also comes in handy if you want to know where the targeted user is at all times.




Whatsapp has been known as an application with strong protection implemented in it, but Copy9 is a powerful spy application that cannot be detected by the security systems.


Free trial, affordable paid version, numerous top quality features, 24/7 customer support, and easy to use steps are few things that make Copy9 your best option for hacking and spying on other people's whatsapp accounts.



Buy Copy9 Now and Start Monitoring Within Minutes!



Thursday 29 March 2018

A Major Loophole in WhatsApp Allows Hackers to Take Over Your Account - SAMHACKERSWORLD



A recent finding by Check Point Software Technologies Ltd. throws light on how susceptible messaging apps are to hacking and data theft. The discovery by Check Point, mentioning especially Whatsapp and Telegram, which contain a critical security flaw in their end-to-end message encryption process. This makes both their online platforms – WhatsApp Web and Telegram Web – vulnerable to outside access.


To make their point clear, Check Point designed a malicious, innocuous file to take full control over Whatsapp and Telegram user accounts. In order to gain access, all an attacker would have to do is fake a MIME type, by crafting the HTML file to display an image preview. Once the victim clicks on the HTML file, the attacker would gain access, and the victim’s account would be taken over by the attacker completely.


The alarming case-in-point here is that while most such attacks over either Whatsapp or Telegram will give attackers access to only tidbits of the users’ data, there is also the possibility for attackers to gain absolute control over the victim’s account.


Once a hacker has full control of the victim’s account, he/she will be able to download the victim’s previously shared photos, videos, contact information, and will also have access to the victim’s friends’ information. This means attackers would be able to post the victim’s photos online, message on the victim’s behalf, and would even be able to take over the victim’s friends’ accounts.


Concerns regarding user privacy over messaging apps was brought to the fore by the recent WikiLeaks publication, which talked about the possibility for government organisations to access Whatsapp, Telegram, or any other end-to-end encrypted chat app. Encryption is primarily designed to ensure that only the people communicating can read the messages. But since over Whatsapp and Telegram, messages are encrypted even before they were validated, it was easy for both chat applications to turn a blind eye towards the issue. The encryption had essentially made them unable to prevent any malicious content from being sent.


After Check Point having disclosed their alarming findings to both companies’ security teams, the security teams have acknowledged that there are security and data threat issues. Both companies have now developed a fix for their web clients. Both Whatsapp and Telegram are now validating content over their platforms before the encryption process itself, allowing them to block out any seemingly malicious files. It would, however, be safer to err on the side of caution as a user and avoid downloading any content and opening any links sent by unknown users. Additionally, periodically cleaning logged-in computers from the Whatsapp and Telegram log will allow you more control over the devices that have the option to host your account.




Meanwhile, cyber-security continues to remain an issue garnering growing concern and attention. The increasing number of internet-connected devices around us allows hackers to employ a broad range of tactics to pry into hapless victims’ lives. Further, the sheer large amount of data of personal/private/confidential nature that is exchanged over networks brings with it the risks of data leakage, data theft, and cyber attack by hackers.


Interestingly, Telegram, which accounted for about 87% of downloads worldwide in 2016, not only makes it the most downloaded messaging app in 2016, but is also what users considered the most secure. Even though Whatsapp also uses an end-to-end message encryption technology, users seem sceptical about the amount of security the app can really offer.


As of January 2017, however, Whatsapp, with over 1.2 billion monthly active users is the still most popular mobile messaging app, followed very closely by Facebook messenger. Telegram, with just about 100 million monthly active users is slowly gaining popularity and catching up with Whatsapp, thanks to the amount of security it provides.


With about $5.75 billion being the estimated size of the global mobile security market in 2019, one can only imagine the proportionate growth in security breaches and data thefts over the next three years. Let’s not forget the growing security concerns for mobile applications in general, and specifically to Instant messaging applications.


SOFTWARE LOOPHOLES AND FLAWS - SAMHACKERSWORLD

SOFTWARE LOOPHOLES AND FLAWS


Rather than trying to get a password, many hackers take the alternative (but not always reliable) route of trying to exploit a flaw in the operating system or application server, thus bypassing the target computer's security altogether. Exploits (called 'sploits among hackers) that use software flaws are especially popular with novice hackers, called script kiddies, because they can use them to sneak into a system without knowing much about the system they're breaking into. In fact, script kiddies are often more dangerous than more technically skilled hackers because a script kiddie may damage or delete files through sheer clumsiness, while a more technically sophisticated hacker would know how to avoid causing accidental damage (although he would know how to do even more serious damage if he wanted).


Buffer overflows


Perhaps the most common flaw in many operating systems and in server software is the buffer overflow, which occurs when you feed a program too much data, or sometimes a type of data that the program isn't expecting. In many cases, overflowing a computer with data simply crashes it.

While crashing a computer might be fun for some people, buffer overflows have a potentially dangerous flaw. If a hacker floods a target computer with too much data along with a program, the overload of data tricks the computer into running the program, which can tell the computer to open a port, wipe out files, or give the hacker access to parts of the computer that only an administrator should be allowed to modify.

To see how prevalent buffer overflow vulnerabilities are in a variety of programs, including ICQ, Microsoft Internet Information Server (IIS), WS-FTP, Macromedia Flash, HP Tru64 UNIX, and AOL Instant Messenger, visit the CERT Coordination Center (http://www.kb.cert.org/vuls) and search for "buffer overflows" as shown in Figure 12-6.

 Figure 12-6: An ever-growing list of known buffer overflow vulnerabilities.

Hidden back doors


When creating software, programmers often create back door or default accounts and passwords to test their software, so they can bypass the login process and quickly access and test other portions of the program. Before the company ships the finished program, the programmers need to remove any back door accounts and passwords, but inevitably they forget a few, which leaves a back door open to any hacker who can find it.

When Red Hat shipped its Linux Virtual Server (LVS) software (nicknamed "Piranha"), the developers inadvertently left in an undocumented backdoor account with the username set to "piranha" and a password set to "q", giving anyone who knew of this exploit access to servers running on Red Hat's LVS.

The piranha problem highlights the double-edged nature of open source software, such as Linux. While revealing the source code can help strengthen its security by allowing others to study the program, it also allows hackers the chance to find flaws they might not otherwise have been able to discover and exploit.

Default settings


Many programs, such as operating systems or webserver software, come packed with plenty of built-in security. The only problem is that when you install the software, it fails to install any of its security features unless you specifically tell it to do so. Since most people rarely customize the installation of their software, it's possible and common for someone to install a perfectly secure program with all the security features turned off.

If you're using Windows XP, you may not realize that it comes with a built-in Internet firewall to protect your computer from unauthorized access over the Internet. Unfortunately, many manufacturers install Windows XP with the firewall turned off, because it can interfere with someone's Internet connection if they don't realize that the firewall is turned on.

To turn on (or off) the Windows XP firewall, follow these steps:

Click the Start button and click Control Panel.


Click Network and Internet Connections.


Click Network Connections.


Click the Local Area Connection icon.


Click Change Settings of This Connection, which appears in the left side of the Network Connections window. A Local Area Connection dialog box is displayed.


Click the Advanced tab.


Click in the "Protect my computer and network by limiting or preventing access to this computer from the Internet check box." (If the check box already has a check mark in it, the firewall is already turned on.)


Click OK.


Click the close box of the Network Connections window.


Finding more software exploits


Every program has flaws, and someone discovers a new one practically every day, so website administrators spend much of their time just keeping up with the latest information and installing the latest patches. Inevitably, some administrators won't hear about a particular patch, which means that a commonly known exploit can often be found in computers years after the vulnerability has been discovered. Sometimes installing a patch to fix one flaw accidentally creates and opens up another flaw, which means installing another patch again in the future.

To exploit these flaws, hackers create tools that allow anyone to probe a computer and test for commonly known flaws, which is how novices (script kiddies) can access a computer without even understanding what they're doing.

To read about the latest security exploits for Windows, visit Microsoft's Security & Privacy site (http://www.microsoft.com/security) and download patches, or read bulletins describing just how insecure your Windows network may really be.

To stay up to date with the latest security breaches in products as diverse as Windows 2000, Linux, ColdFusion, Solaris, FreeBSD, and Unix, visit these sites:

Insecure.org

http://www.insecure.org

Security Administrator

http://www.ntsecurity.net

SecurityFocus

http://www.securityfocus.com

Packet Storm

http://packetstormsecurity.nl

SecuriTeam

http://www.securiteam.com

Linux Security

http://www.linuxsecurity.com

Zone-H

http://www.zone-h.org

SOFTWARE LOOPHOLES AND FLAWS - SAMHACKERSWORLD

SOFTWARE LOOPHOLES AND FLAWS


Rather than trying to get a password, many hackers take the alternative (but not always reliable) route of trying to exploit a flaw in the operating system or application server, thus bypassing the target computer's security altogether. Exploits (called 'sploits among hackers) that use software flaws are especially popular with novice hackers, called script kiddies, because they can use them to sneak into a system without knowing much about the system they're breaking into. In fact, script kiddies are often more dangerous than more technically skilled hackers because a script kiddie may damage or delete files through sheer clumsiness, while a more technically sophisticated hacker would know how to avoid causing accidental damage (although he would know how to do even more serious damage if he wanted).


Buffer overflows


Perhaps the most common flaw in many operating systems and in server software is the buffer overflow, which occurs when you feed a program too much data, or sometimes a type of data that the program isn't expecting. In many cases, overflowing a computer with data simply crashes it.

While crashing a computer might be fun for some people, buffer overflows have a potentially dangerous flaw. If a hacker floods a target computer with too much data along with a program, the overload of data tricks the computer into running the program, which can tell the computer to open a port, wipe out files, or give the hacker access to parts of the computer that only an administrator should be allowed to modify.

To see how prevalent buffer overflow vulnerabilities are in a variety of programs, including ICQ, Microsoft Internet Information Server (IIS), WS-FTP, Macromedia Flash, HP Tru64 UNIX, and AOL Instant Messenger, visit the CERT Coordination Center (http://www.kb.cert.org/vuls) and search for "buffer overflows" as shown in Figure 12-6.

 Figure 12-6: An ever-growing list of known buffer overflow vulnerabilities.

Hidden back doors


When creating software, programmers often create back door or default accounts and passwords to test their software, so they can bypass the login process and quickly access and test other portions of the program. Before the company ships the finished program, the programmers need to remove any back door accounts and passwords, but inevitably they forget a few, which leaves a back door open to any hacker who can find it.

When Red Hat shipped its Linux Virtual Server (LVS) software (nicknamed "Piranha"), the developers inadvertently left in an undocumented backdoor account with the username set to "piranha" and a password set to "q", giving anyone who knew of this exploit access to servers running on Red Hat's LVS.

The piranha problem highlights the double-edged nature of open source software, such as Linux. While revealing the source code can help strengthen its security by allowing others to study the program, it also allows hackers the chance to find flaws they might not otherwise have been able to discover and exploit.

Default settings


Many programs, such as operating systems or webserver software, come packed with plenty of built-in security. The only problem is that when you install the software, it fails to install any of its security features unless you specifically tell it to do so. Since most people rarely customize the installation of their software, it's possible and common for someone to install a perfectly secure program with all the security features turned off.

If you're using Windows XP, you may not realize that it comes with a built-in Internet firewall to protect your computer from unauthorized access over the Internet. Unfortunately, many manufacturers install Windows XP with the firewall turned off, because it can interfere with someone's Internet connection if they don't realize that the firewall is turned on.

To turn on (or off) the Windows XP firewall, follow these steps:

Click the Start button and click Control Panel.


Click Network and Internet Connections.


Click Network Connections.


Click the Local Area Connection icon.


Click Change Settings of This Connection, which appears in the left side of the Network Connections window. A Local Area Connection dialog box is displayed.


Click the Advanced tab.


Click in the "Protect my computer and network by limiting or preventing access to this computer from the Internet check box." (If the check box already has a check mark in it, the firewall is already turned on.)


Click OK.


Click the close box of the Network Connections window.


Finding more software exploits


Every program has flaws, and someone discovers a new one practically every day, so website administrators spend much of their time just keeping up with the latest information and installing the latest patches. Inevitably, some administrators won't hear about a particular patch, which means that a commonly known exploit can often be found in computers years after the vulnerability has been discovered. Sometimes installing a patch to fix one flaw accidentally creates and opens up another flaw, which means installing another patch again in the future.

To exploit these flaws, hackers create tools that allow anyone to probe a computer and test for commonly known flaws, which is how novices (script kiddies) can access a computer without even understanding what they're doing.

To read about the latest security exploits for Windows, visit Microsoft's Security & Privacy site (http://www.microsoft.com/security) and download patches, or read bulletins describing just how insecure your Windows network may really be.

To stay up to date with the latest security breaches in products as diverse as Windows 2000, Linux, ColdFusion, Solaris, FreeBSD, and Unix, visit these sites:

Insecure.org

http://www.insecure.org

Security Administrator

http://www.ntsecurity.net

SecurityFocus

http://www.securityfocus.com

Packet Storm

http://packetstormsecurity.nl

SecuriTeam

http://www.securiteam.com

Linux Security

http://www.linuxsecurity.com

Zone-H

http://www.zone-h.org

Saturday 24 March 2018

If You Are Using Facebook? Then Immediately Delete This Information - SAMHACKERSWORLD

If You Are Using Facebook?




Mark Zuckerberg has accepted the mistake of breaking his silence on Facebook's data leak scandal in Facebook. At the same time, he has also said that some steps should be taken to maintain the privacy of the users. At the time, we are going to tell you some things that you can save your profile on Facebook.


Location Share



Users usually share their location on Facebook. Avoid doing this, because anyone can know where you are and it can be misused. Avoid photographing the airport and holidays, especially when you are out of the house.


Phone Number



In Facebook, your phone number should be removed from Facebook. The reason is that someone can misuse it. Therefore, you must remove the phone number from your personal profile.


Personal Photos



Many times it happens if we go to the party then after drinking the alcohol, the photographs are put in the fb profile. A family member may see these pictures and they may be disappointed.


Date Of Birth



The date of birth is also not needed on Facebook. Hackers can use hackers to access various types of information. So remove your date of birth from Facebook.


Thursday 22 March 2018

Jio BIG dhamaka: FREE 1024GB data - SAMHACKERSWORLD



New Delhi, March 22: Reliance Jio is once again planning to give a very big gift to its users and therefore announced to give 1TB or 1024 GB of free data.


Users are entitled to 1TB (1024 GB) of 4G data, unlimited voice calls and messages with a 1-year validity at Rs. 4,999 along with complimentary access to all the Jio apps and a Jio Prime membership. If your data gets expired before 1 year, even then you will continue to receive 2G data.


The free data offer can be availed when you purchase Samsung Galaxy S9 and S9 Plus from Jio's official website.


Reliance Jio is giving this offer on these smartphones given below:


Galaxy S9 (64GB) : Rs 57,900 (MRP 62,500)
Galaxy S9 (256 GB) : Rs 65,900 (MRP 71,000)
Galaxy S9+ (64GB) : Rs 64,900 (MRP 70,000)
Galaxy S9+ (256 GB) : Rs 72,900 (MRP 79,000)


Thanks...
Visit Again...
...SAMHACKERSWORLD...

Sunday 18 March 2018

Facebook Par Hackǝr Naam Se Account Kaise Banaye

Hello guys aaj Mai aapko bataunga ki Facebook par Hackǝr Naam se account kaise banaye to Dosto chalte hai Apne topic par.
Step by step:
1.Open http://facebook.com.
2.Input your id and password and press login.
3. After successful login go to your settings.
4.Change your language to Telugu.
5.After successful changing language go to General settings.
6.Click on Edit in Name section.
7.After that input "Hackǝr" in your First Name and delete your last name.
8.After that click on Submit.
9.After click on Submit your name was changed in to "Hackǝr".
Let's enjoy....
Agar Hamaya ye post apko pasand aye to comment jarur kigiyega.jisse ham aapke liye aise hi aur bhi tricks & tips late rahe.
Thank you.....
...SAMHACKERSWORLD...

Saturday 17 March 2018

Facebook Green Name Id Kaise Banaye - SAMHACKERSWORLD

Hiii Friendss aaj mai aapko bohat hi intresting Trick Batane ja rha hu.. Ki Facebook me green name id kaise banaye….aaj tak aapne sunna bhi nhi hoga ki facebook pe green name bhi rakh sakte soo aaj mai aapko bataunga ki green name id kaise banaye…Aap mere bataye huye step carefully follow kijiye aap aasani se aapke facebook id ka name green colour me rakh sakte hai..

Green name facebook id banane ke kuch advantages bhi hai aur kuch disadvantages bhi hai. wo ham abhi dekhenge ki Green Facebook Name id ke Advantages kya hai aur disadvantages kya hai. Pahle advantages jaante hai…

Advantage of Green name Facebook id

  1. Facebook id Green Colour me show hogi sabse uniq baat.
  2. Green colour id sabse ujiq hogi q ki sabke green name id nhi hote fb pr..
  3. Green Name id Pr click karte hi Id open ho jayegi bina kisi loading ke..

Disadvantages Of Green Name Id

  1. Green name only UC Browser me dikhega..
  2. Other Kisi Bhi Browser Me Green Name nhi dikhega..
  3. aur green name fb id banane ke liye niche diye huye name hi use kar sakte hai…

How to make green name Facebook Id

green name id banane ke liye aap ye step carefully follow kijiye…

Step 1:-    Facebook Id UC BROWSER me login karo..

Step 2:-      ab setting & privacy me jakar General pe click karo..fir name pe click karo…

Step 3:-      ab aapka current name remove kardo…

Step 4:-       ab aap name ke box me in name me se koi bhi ek likh do

(i)     see More Stories

(ii)      Next Page

(iii)    Next

step 5:-      ab niche aapka password dalkar setting save kar dijiye..

Green name Facebook id kaise banaye,
Gren name facebook id kaisr bnaye


Ab aapka name green colour me ho gya hai ab aap check kar sakte hai ki aapka name green colour me show ho rha hai ya nhi…

NOTE:- Green colour only UC BROWSER me hi show Karega agr aap kisi other browser me check karoge to aapka name aapko simple name me hi dikhega…

Isss post se related aapke kuch question hoge to aap comment karke puch sakte hai….​

FACEBOOK ME BINA NAAM (INVISIBLE) KA ACCOUNT KAISE BANAYE - SAMHACKERSWORLD

Guys aaj mai apke liye laaya hu ek bhut hi awesome trick jiski aajkal bhut demand hai

Ab ap bhi mobile se easily apni fb invisible name ki id bana sakte hai ya apni id ka naam change karke invisible kar sakte ho.....

Isse pehle apko bata du invisible name id me ham greek word ka ek asa symbol choose karte hai jise facebook support nahi karta or usi symbol ko ham apne fb name me rakhte hai or wo. Symbol fb support ni kar pata isliye hame name ki jagah pe koi name show ni hota.....

Invisible name id banana bhut easy hai or ap ase hi unlimited account bhi bana sakte ho..

To aaiye apka jyada time waste naa karke trick ki taraf chalte hai....

Sikhte hai invisible name ka new account kaise banaye:-

1- sabse pehle fb sign up page par jaye
Sign up

2- ab jo symbol bracket ke andar hai (ՙՙ) ise copy karke is trah sign up page me paste kare....


3- ab sign up par click kare.....or apne is account ko facebook app me login kare....

4- ab ap dekhenge ki apka name invisible ho chuka hai




Enjoy......

Visit daily


SAMHACKERSWORLD