Antivirus Softwares are expensive and come with an expiry date. So, If you don’t want to spend on any antivirus program to delete viruses then you can locate a virus manually using the Windows Command Prompt and can also do the successful deletion process. So, Learn How to Perfectly Remove Virus Using CMD.

Remove Virus Using CMD Hackagon

As we know, The Command prompt is a utility program that have an access to alter all the system files of windows, and in this method, we will be using the same access of cmd. This method works on attributes removing which can be one reason of virus.

Steps To Remove Virus Using CMD:

  1. Go hit on Start button.
  2. Then, click on Run.
  3. In the search box type cmd.exe.
  4. Now, Type dir c: s -h *. * /s /d (You can also type attrib -s -h /s /d *.*) and press “Enter” on Command Prompt.Virus cmd command HACKAGON
  5. The command prompt will load all the files in your drive. If you see anything suspicious like Autorun.inf or any .exe file. Then these files you need to watch out for.Virus HACKAGON
  6. If you found any .exe and the Autorun.inf  file that’s it. You’ve just found the virus file.
  7. Write down the program’s name and where the program is located.
  8. Rename the Autorun.inf so you can open it without activating the virus. It’s better to rename it in a .rar extension.
  9. Now, Open your My Computer and select the tainted drive, that has the infected file >> Find the program directory that contains Autorun.inf.
  10. Right-click on the file you renamed (virus file) and choose “Delete“.
  11. Done!!. .You’ve successfully removed the virus from your computer’s hard drive.

Stay secure from viruses without spending on expensive Antivirus Softwares. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


We are so much addicted to our electronic gadgets that we sometimes forgot about our security and also about the blackhat hackers of this giant digital world. As we know IP address is responsible for tracking one’s location, ISP (Internet Service Provider), and some of the user’s private details so, it is very important to know the way of perfectly Hiding IP Address In PC And Smartphone.

Hiding IP Address In PC And Smartphone Hackagon

What is IP Address?

An Internet Protocol address (IP address), is a numerical label assigned to each device (e.g., Computer, Smartphone, Printer, etc) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions:

  • Host or network interface identification.
  • Location addressing.

Why Hide IP Address In PC And Smartphone?

You may have your own reasons for hiding your IP address, but here are a few technical reasons why people hide their public IP address:

  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To Avoid leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.

How To Hide IP Address in PC And Smartphone?

Hiding Ip Address In PC:

Some of the most common ways to hide IP and safeguard your online identity in PC are discussed below:

1. Using a VPN Proxy: Using a trusted VPN proxy service is the best way to conceal your IP address during your online activities. Here is a list of most popular and highly reliable VPN proxy services that will hide your IP address:

  1. TunnelBear
  2. OpenVPN
  3. Hotspot Shield
  4. VPNBook
  5. UltraVPN
  6. PacketiX.NET
  7. CyberGhost
  8. TorVPN
  9. SecurityKiss
  10. Your-Freedom
  11. USA IP
  12. Get US VPN

2. Website Based Proxy Servers: This is another popular way to quickly mask IP address on the Internet. Since it is a web-based service, users need not have to install any piece of a software program on their computer. The following are some of the popular websites that offer free proxy services to obscure your IP address:

  1. Unlock My Web – http://www.unblockmyweb.com/
  2. Proxy Site – https://www.proxysite.com/
  3. Hide My Ass – https://www.hidemyass.com/
  4. England Proxy – https://www.englandproxy.co.uk/
  5. Unblocker – https://www.unblocker.us/
  6. Fast USA Proxy – http://fastusaproxy.com/
  7. New IP Now – http://newipnow.com/
  8. Anonymouse – http://anonymouse.org/anonwww.html
  9. Hidden Digital Info – http://hiddendigital.info/
  10. K Proxy – http://www.kproxy.com/
  11. Don’t Filter – http://dontfilter.us/
  12. Working Proxy – https://www.workingproxy.net/

3. Browser Configured Proxy Servers: There are hundreds of freely available open proxies that can be found on the Internet. You can obtain the IP address of one of those freely available proxy servers and configure your browser to start hiding your original IP address. However, as they are openly available to the public, most of them are either dead or perform too slow under normal conditions.

Hiding Ip Address In Android:

The most common way to hide IP and safeguard your online identity in an Android device is to download and install any VPN App from the Google Play Store.  Some of the best VPN Applications that you can use are given below:

  1. Hotspot Shield Free VPN Proxy
  2. TunnelBear VPN
  3. Hideman VPN
  4. Tigervpns Free VPN and Proxy
  5. Free & Premium VPN – FinchVPN
  6. Betternet Unlimited Free VPN

Hiding Ip Address In iPhone:

Some of the best VPN Applications that you can use for iPhones are given below:

  1. VPN Express
  2. SurfEasy VPN
  3. Spotflux
  4. Hotspot Shield

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


SMS spoofing is a relatively new technology which uses the Short Message Service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product).

About SMS Spoofing and How it’s Done:

SMS Spoofing occurs when a sender manipulates address information. Often it is done to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network – with the home SMSC essentially being “hijacked” to send messages to other networks.

The impact of this activity is threefold:

  • The home network can incur termination charges caused by the delivery of these messages to interconnect partners. These messages can be of concern to interconnect partners. Their customers may complain about being spammed, or the content of the messages may be politically sensitive. Interconnect partners may threaten to cut off the home network unless a remedy is implemented. Home subscribers will be unable to send messages to these networks.
  • While fraudsters normally used spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. The risk, therefore, emerges, those genuine subscribers may be billed for roaming messages they did not send. If this situation occurs, the integrity of the home operator’s billing process may be compromised, with potentially huge impact on the brand.

The legitimate use cases for SMS spoofing include:

  • A sender transmits an SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full-size console. They must spoof their own number to properly find themselves.
  • A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance to activate an account.
  • A sender adopts the default network gateway identifier provided by an online service, to send an anonymous SMS, not specifying the number of their own choosing.
  • A third-party sends a message to a virtual number, which then forwards (resend) the message to one or more recipients in such a way that the true originator address (rather than the virtual number) appears as the sender ID and the recipient(s) can reply, call, sort, save, or otherwise process the message in an expected way.

An SMS Spoofing attack is often first detected by an increase in the number of SMS errors met during a bill run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to bypass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services.

 Sites That Offer Text Message Spoofing:

Below listed are some sites that have, or do, offer SMS spoofing services:

  1. Send Anonymous SMS: http://www.sendanonymoussms.com
  2. TxtEmNow: http://txtemnow.com
  3. TextEm: http://www.textem.net
  4. Text For Free: http://textforfree.net
  5. TxtDrop:  http://www.txtdrop.com
  6. SMS Anonymous (For Australians): https://smsanonymous.herokuapp.com
  7. SMS Spoofing: http://www.smsspoofing.com
  8. Spoof Card: http://www.spoofcard.com
  9. Spoof Texting: http://www.spooftexting.com
  10. Fake My Text: http://www.fakemytext.com
  11. The SMS Zone: http://www.thesmszone.com

The Legality of SMS Spoofing:

The legality of SMS spoofing has been brought to our attention many times. In 2007, The UK premium rate regulator, PhonepayPlus (formerly ICSTIS) concluded a public consultation on anonymous SMS, where they stated they were not averse to the operation of such services. However, in 2008 PhonePayPlus introduced new regulation covering anonymous SMS, requiring anonymous SMS service providers to send a follow-up message to the recipient stating that a spoofed SMS has been sent to them, and use a complaints helpline. It is illegal to send anonymous SMS messages in Australia. We have heard that many countries across Europe and Asia have actually passed laws making it illegal to spoof text messages. We are confident that text message spoofing is NOT illegal under any existing laws in the United States.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and feel free to drop a comment below if you still face any kind of problem.


Hackers hack information or passwords in many ways not only in online but also in the offline mode. So to Hack Password Using USB Drive HACKAGON derived a small trick for stealing information or passwords from your Friend’s/Victim’s computer using USB Drive.

Hack Password Using USB Drive HACKAGON

Windows have the capability to store most of the passwords which are used on a daily basis by internet users, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Wireless Keys, Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE, Chrome and Firefox.

There are many tools for recovering these passwords from their stored locations. Using these tools and a USB drive you can create your own rootkit to hack password from your friends/college computer.

Steps to Hack Password Using USB Drive

  1. Download our file by just clicking on “HACKAGON USB Hacking.zip“.
  2. Extract the file you downloaded.
  3. Copy all the extracted files to your USB Drive.
  4. Remove and Re-Insert your USB Drive.
  5. If your PC autoruns the USB Drive then click on the option “Perform a Virus Scan” but in case if it doesn’t go to autorun mode because of your PC settings, then just go to My Computer –> Open your USB Drive and manually click on “HACKAGON.bat” file.
  6. Now it will go in action and performs the task.
  7. At the execution time if you find any popups then just hit on YES.
  8. You are done with all the process.
  9. Now, you’ll get some text files generated in your USB Drive, if you open them you will see usernames and passwords waiting for you.

This trick will work only if Victim stores his password in windows or if he opted for remembering the passwords.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Everybody is so much familiar with facebook and also about its huge amount of data storage. Facebook is one of the most widely used social networking sites, with more than 750 million users, as a reason if which it has become the number one target of hackers. So, HACKAGON will show the Best ways to Hack Facebook so that the readers of HACKAGON will stay aware from hackers and protect their facebook account from getting hacked.

Best ways to Hack Facebook Hackagon

So, know the top 10 methods of How Hackers Can Hack Facebook Account Password:

1# Phishing:

Phishing is the most popular assault vector utilized for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims credentials like “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

To make it simple, let’s say that facebook phishing is a way to make and create fake facebook website according to the real website for negative purposes, such as stealing credentials, data, etc.

2# Keylogging:

A keylogger is a suspicious program that record your keystrokes, Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once installed on victim’s computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address. Some advanced keylogger’s are also there which can even take the screenshot of the victim’s desktop.

3# Stealers:

Almost 80% percent of facebook users uses stored password in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software specially designed to capture the saved passwords stored in the victim’s Internet browser.

4# Session Hijacking & Cookie Stealing:

Session Hijacking & Cookie Stealing can be exceptionally perilous if you are accessing Facebook on an HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim’s browser cookie which is used to authenticate the user on a website and use it to access the victims account. Session hijacking is widely used on LAN and WiFi connections.

The cookie which facebook uses to authenticate its users is called “Datr”, If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

An attacker can use a variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account or If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called Firesheep in order to capture authentication cookie and gain access to victims account.

5# Sidejacking:

Sidejacking attack is basically another name for HTTP session hijacking, but it’s more targeted towards WiFi users. It went common in late 2010, however, it’s still popular nowadays.

Sidejacking Attack Involves two Major Steps:

  • Capturing packets (Session Cookie): There are a wide variety of tools available that can Sniff packets containing “session cookies“. Use any packet sniffer such as Wireshark to sniff the packets between the target IP and the host. These tools can capture packets such as POST or GET requests used by Web browsers to send and receive data from the HOST. But we are mainly interested in grabbing the cookies, so carefully take out the cookie information from the sniffed Packets. Popular packet Sniffers: WireShark, Ethereal, etc.
  • Using Captured Session Cookie: Once you have the cookie information, the next task is to use this information to get access to victims user account. Using Sniffed Cookie you can actually log into your victims account even without knowing his/her password. To do this, you will require browser plugin that can manage and edit cookies. For firefox Browser, you can use Cookie Manager+ or Edit Cookies to do this task. Chrome users can checkout: Edit This Cookie or Cookie Manager.

To simplify this Task, Mr.Eric Butler a software engineer introduced a firefox extension called Firesheep. It is widely used to carry out sidejacking attacks but it only works when the attacker and victim are on the same WiFi network.

6# Mobile Phone Hacking:

Besides PC/Laptops, Billions of Facebook users access Facebook through their Smartphones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. There are a bunch of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are:

  • Mobile Spy
  • Spy Phone Gold.

7# DNS Spoofing:

In DNS Spoofing attack if both, the victim and attacker are on the same network then an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

Basically, DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver’s cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer (or any other computer).

8# USB Hacking:

In USB Hacking attacks, if an attacker has physical access to your computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser.

For USB Hacking attack you need two things:

  • A USB Drive devoted to this.
  • The programs and files with the capability of consequently concentrating the spared passwords.

9# Man In the Middle Attack:

In Man In The Middle Attack, if the victim and attacker are on the same LAN and on a switch based network then a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

Basically, In cryptography and computer security, A Man In The Middle Attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

10# Botnet:

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

Basically, A botnet is a collection of compromised computers often referred to as “zombies” infected with malware that allows an attacker to control them.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still have any query or update related to this.


Jonathan James Hackagon

Name Jonathan Joseph James
Alias Jon, cOmrade (Network Name)
Country of Citizenship United States
Born December 12, 1983, Miami, Florida
Death May 18, 2008
Cause of Death Committed Suicide
Occupation Computer Hacker
Graduated school University of Melbourne
Major achievements FBI search for Melissa virus circulated assist people

Jonathan James (Also known across the interwebs as cOmrade) was the first juvenile convicted and jailed for hacking in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. After identification of two invasions the 16-year-old, James was sentenced to prison for a period of six months. He, later on, admitted that he likes to joke, wandering around and meet the challenges.  However, after the two invasions, James put a lot of attention to network security and determined to start a computer security company. He died on May 18, 2008, of a self-inflicted gunshot wound.

Hacks: 

James hacked into several companies back in 1999 including Bell South, the Miami-Dade school system and a little organization called the United States Department of Defense. He didn’t really mess much up but did read sensitive information, including the source code that made the International Space Station work.

Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system. What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in Dulles, Virginia, which he used to install a sniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers.

After the intrusion was detected, NASA shut down their computers for three weeks to investigate for a loss of $41,000. James was arrested on January 26, 2000, later plea-bargained and was sentenced to house arrest and probation. He violated that probation by failing a drug test and later served six months in an Alabama prison.

Arrest:

James’ house was raided at approximately 6:00 AM on January 26, 2000, by agents from the Department of Defense, NASA and the Pinecrest Police Dept. James was formally indicted six months later. On September 21, 2000, he entered into an agreement with U.S. Attorney Guy Lewis: he would plead guilty to two counts of juvenile delinquency in exchange for a lenient sentence.

James was sentenced to six months house arrest and probation until the age of eighteen and was required to write letters of apology to NASA and the Department of Defense. He was also banned from using computers for recreational purposes. James later violated that probation when he tested positive for drug use and was then subsequently taken into custody by the United States Marshals Service and flown to an Alabama federal correctional facility where he ultimately served six months.

Legal experts have suggested that, given the extent of his intrusions, he could have served at least ten years for his crimes if he had been an adult. Both Attorney General Janet Reno and prosecuting attorney Guy Lewis issued statements claiming the James case was proof the Justice Department was willing to get tough with juvenile offenders accused of cyber crime.

Death:

On May 18, 2008, Jonathan James was found dead in his shower with a self-inflicted gunshot wound to the head. His suicide was apparently motivated by the belief that he would be prosecuted for crimes he had not committed. “I honestly, honestly had nothing to do with TJX,” James wrote in his suicide note, “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

Note: Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below, if you find any correction.


Whatsapp is not an app, it’s a habit nowaday. People are so much addicted to this shit that if their WhatsApp crashes, they’ll get a small heart attack.

Crash Someones WhatsApp Remotely Hackagon

There is a new bug in WhatsApp that could allow anyone to remotely crash most popular messaging app just by sending nearly 4000 emojis to the target user/friend and till now 1 Billion users are affected by this bug. Also, you can make any WhatsApp group dead with this bug.

Now the question is How to Crash Someone’s WhatsApp Remotely??

Whatsapp your friend with just a message containing nearly 4000 smileys and the friend will suffer from a crash everytime he/she opens the message. Whether it’s WhatsApp Web or the mobile application, and it requires no specially crafted method or coding.

Now let’s understand the bug!!

In WhatsApp Web, WhatsApp allows 6550-6600 characters, But after typing about 4200-4400 smiley/Emoji, Browser starts to slow down. But since the limit is not yet reached, so WhatsApp allows to go on inserting & when it receives it overflows the buffer and it crashes.

Last year WhatsApp crash bug required 2000 words (2kb in size) message in the special character set to remotely crash WhatsApp messenger app. but after this discovery, the company patched the bug by setting up the limits of characters in WhatsApp text messages, but unfortunately, it failed to set up limits for smileys send via WhatsApp.

This recent WhatsApp bug tested on Android devices by multiple brands and caused the WhatsApp crash. WhatsApp for Android devices including Marshmallow, Lollipop and Kitkat and also the WhatsApp Web for Chrome, Opera and Firefox web browsers are affected by this bug.

Now lets’s see how to stay secure from this Bug!!

The best way to protect ones WhatsApp is the deletion of conversation when such message is received. If you become a victim of such message on WhatsApp, just open your messenger and delete the whole conversation with the sender. However, remember, if you have kept some records of your chat with that particular friend, you’ll end up losing them all.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

This trick will be famous and users will be vulnerable until a patch is released by the Facebook Inc. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

Hack WiFi using Android Phones

We’re living in an electronically digitized world, where the combination of WiFi Networks and Android is very common habits. WiFi network is actually a helpful option for wireless connection to the internet with the use of radio-wave of 2.4 GHz and 5 GHz SHF (Super High Frequencies). WiFi sometimes also known as Wireless Local Area Network (WLAN) and most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. There is 99.9% chance for any password protected WiFi network to be hacked.

Hack WiFi using Android Phones

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> Hack WPA2-PSK WiFi Password Using Linux

So, Today We Come Up With The 2 Best Methods To Hack WiFi Using Android Phones:

Method 1# WEP Routers:

  1. Root a compatible device: Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will offer the best chance of success. Some of the known supported devices include:
  • Nexus 7
  • Galaxy S1/S2/S3/S4/S5
  • Galaxy y
  • Nexus One
  • Desire HD
  • Micromax A67
  1. Download and install bcmon: Download the app by clicking on “bcmon APK“. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. To install an APK file, you’ll need to allow installation from unknown sources in your Security Menu so:
  • Press the Menu button on your phone and tap Settings.
  • Scroll down to Security and tap it to open the Security Menu.
  • Scroll down and check the “Unknown Sources” box.
  • This will let you install apps directly from the APK file.
  1. Run bcmon: After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the “Enable Monitor Mode” option. If the app crashes, open it and try again. If it fails for the third time, your device is most likely not supported.
  • Your device must be rooted in order to run bcmon.
  1. Tap “Run bcmon terminal”: This will launch a terminal like most of the Linux terminals. Type airodump-ng and tap the Enter Airodump will load, and you will be taken to the command prompt again. Type airodump-ng wlan0 and tap the Enter button.
  1. Identify the access point you want to crack: You will see a list of available access points. You must select an access point that is using WEP encryption.
  1. Note the MAC address that appears: This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Note down this MAC address.
  • Also, note down the Channel that the access point is broadcasting on.
  1. Start scanning the channel: You will need to collect information from the access point for several hours before you can attempt to crack the password. Type airodump-ng -c channel# –bssid MAC address -w output ath0 and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.
  • Replace channel# with the channel number the access point is broadcasting on (e.g. –c 6).
  • Replace MAC address with the MAC address of the router (e.g –bssid 00:0a:95:9d:68:16)
  • Keep scanning until you reach at least 20,000 – 30,000 packets.
  1. Crack the password: Once you have a suitable number of packets, you can start attempting to crack the password. Return to the terminal and type aircrack-ng output*.cap and tap Enter.
  1. Note the hexadecimal password when finished: After the cracking process is complete (which could take several hours), the message Key Found! Will seem, followed by the key in the hexadecimal form. Make sure that “Probability” is 100% or the key will not work.
  • When you enter the key, enter it without the “:“. For example, if the key was 12:34:56:78:90, you would enter 1234567890.

 

Method #2 WPA2 WPS Routers:

  1. Root a compatible device: Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will offer the best chance of success. Some of the known supported devices include:
  • Nexus 7
  • Galaxy Ace/S1/S2/S3
  • Nexus One
  • Desire HD
  1. Download and install bcmon: Download the app by clicking onbcmon APK“. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. To install an APK file, you’ll need to allow installation from unknown sources in your Security Menu so:
  • Press the Menu button on your phone and tap Settings.
  • Scroll down to Security and tap it to open the Security Menu.
  • Scroll down and check the “Unknown Sources” box.
  • This will let you install apps directly from the APK file.
  1. Run bcmon: After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the “Enable Monitor Mode” option. If the app crashes, open it and try again. If it fails for the third time, your device is most likely not supported.
  • Your device must be rooted in order to run bcmon.
  1. Download and install Reaver: Download the app by clicking on “Reaver App“. Reaver App is a program developed to crack the WPS PIN to retrieve the WPA2 passphrase.
  1. Launch Reaver: Tap the “Reaver for Android” icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.
  • You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.
  • The access point you select must accept WPS authentication. Not all routers support this.
  1. Verify your settings: In most cases you can leave the settings that appear at their default. Make sure that the “Automatic advanced settings” box is checked.
  1. Start the cracking process: Tap the “Start attack” button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.
  • Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful.

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> Hack WPA2-PSK WiFi Password Using Linux

 

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and feel free to drop a comment below if you still face any kind of problem.


There are often such situations when one want to track the location of the person you’re chatting to. Not always, but sometimes it’s really urgent. There are some different methods that you can use according to your convenience but remember one thing that, as the complex is the method, better will be the results. Here, we have three best methods for helping you out in tracking the location of any person by chatting on facebook and other social networking websites.

Trace Location Of Victim By Chatting on Facebook or WhatsApp hackagon

So, Just don’t only read out but also understand all the method discussed below and use any of them to check out the location of any person by chatting with them on social sites:

Method#1 Track Location By Chatting On Facebook or any other Social Sites: This is fast, but a little tricky method as well as pretty straight forward. Many people have used this method and succeeded. So, you need to be friends with the person you want to track on Facebook or any social site. Secondly, start chatting with that friend. Make sure all other tabs remain closed, and no application is running on the background that consumes your internet. and follow the below-given instructions:

  1. Press “Win+R“, a shortcut to “Run” or just open “Run” in any other way you know.
  2. Here, type “cmd” and hit “Enter“.
  3. Now, In command prompt, type “netstat -an” and hit “Enter“.
  4. Now this will provide you a list of IP addresses, which will have the person’s address with whom you are chatting too as well.
  5. Now, you have to look at the possible IP address of the person/victim.
  6. Next, Click on this link or just copy paste it in your address bar “http://www.ip-adress.com/ip_tracer/” and then type the IP address on the box and click the button which says “Track IP, Host or Website”.
  7. And there you go.

IP Tracer Hackagon

 

Method#2 By Creating Tracking Link: In this method, we’re going to create a tracking link that we’ll send to the victim and that’ll record the location of the person, who opens that link. This is a better way than the first one. And also, once done, it lets you track the Ip addresses.

Basically, you created a link which will save the victim’s IP address with timestamp and user-agent/browser. So, all you have to do is follow the below-given steps:

  1. First of all, Visit a website such as 000webhost, My3gb, Hostgator, Byethost, Freehostia, Gazalahosting, 3owl, etc or just google for free domain hosting websites.
  2. Now you need to make up a domain name and register yourself there for free. Maybe a subdomain like yoursite.freehosting.com. And also, make sure you can add up your own files.
  3. Next you have to download a zip file so just click on Track-IP
  4. You will see files, Namely: img.jpg, index.php and log.txt. You need to upload them up on your free website’s root.
  5. Now, the link you created, (yoursite.freehosting.com), this will be your tracking link. So, Now you need to send it to the victim with a good story so that they visit it. And just make sure they visit it.
  6. Once they click on your tracking URL, the log.txt file will trace their IP, Browser along with the timestamp.
  7. And you’re Done.

 

Method#3 By Using Website Tracing Scripts: For this method you need to have a website. In short this method is only for website holders. So, for tracking a person through this method follow the below-given instructions:

  1. Add the Google Analytics tracking code on your website.
  2. Create a link of your website or a dummy post would be more preferable.
  3. Just like in the above method you need to make them click on the link you just sent.
  4. If you would stay online, you can see them on your Google Analytics account for the link. Otherwise, you cab visit there later, and check out the history and other details.
  5. For the user’s stat, Google Analytics is a lot more detailed one but there are other tracking links are also available such as Histats, Statcounter, etc.

 

 

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


In this emerging digital world, the size of our hard disk matters the most. We always have a lot of data to store and we always face the fact that our disk space is low. So today HACKAGON is showing you a technique by which you can enlarge your hard disk space up to 64 TB no matter what size of the actual hard disk you’re using and obviously you can use it in your way.

Follow the below given easy step by step instructions for creating your own Virtual Hard Disk (VHD):

  1. First of all, open your “My Computer” or simply press “Start+E” button from the keyboard.
  2. Now, Right click the mouse on “My Computer” from the left panel and click on “Manage“.Manage hackagon
  3. Then, The Computer Management window will get open.
  4. Now, Click on “Disk Management” from the “Storage” section and then click on Action >> Create VHD.VHD hackagon
  5. Fill the location as “F:\Hackagon HDD.vhdx” >> Choose the size in MB, GB or TB then type the Disk’s Size in blank space >> Choose the virtual hard disk format as “VHDX” >> Choose the virtual hard disk type as “Dynamically Expanding”  and then click “OK“. (Remember, we are using here F:\ drive for creating VHD, but you can choose any drive letter you have.)VHD1 hackagon
  6. In Disk Management, you will see the virtual drive listed as Unallocated space.VHD2
  7. To begin using it, you’ll need to Right-click and select “Initialize Disk“.VHD3 hackagon
  8. In the “Initialize Disk window” >> Opt for “GPT(GUID Partition Table)” and hit “OK“.VHD4
  9. Now, this is the time to create a Volume by Right-clicking the unallocated space and select “New Simple Volume“.VHD5 hackagon
  10. Now, the New Simple Volume Wizard gets open. So, click on “Next” following all the instructions till the completion of the wizard.VHD6 hackagon
  11. And guess what!! You are done! . . A drive is waiting for you in your my computer section to store your valuables.

Enlarge your HardDisk upto 64TB by creating VHD hackagon

Advantages: Significant benefits result from the ability to boot a physical computer from a virtual hard drive:

Ease of deployment: IT organizations can deploy standardized, ‘pre-built’ configurations on a single VHD. As an example, software engineering organizations which need a specific set of tools for a particular project could simply ‘pull’ the appropriately-configured VHD from a network location.

  • Ease of deployment: IT organizations can deploy standardized, ‘pre-built’ configurations on a single VHD. As an example, software engineering organizations which need a specific set of tools for a particular project could simply ‘pull’ the appropriately-configured VHD from a network location.
  • Backup-and-Restore: Changes to the contents of a VHD (such as infection by a virus, or accidental deletion of critical files) are easily undone.
  • Multi-User Isolation: Many current operating systems support having multiple users, but offer varying degrees of protection between them (e.g., one user of the OS could become infected by a virus which infects other users, or make changes to the OS which affect other users). By giving each user their own version of the operating system—say, by creating for each of them a differencing VHD based on a base installation of the OS—changes to any particular child image would have no effect on any of the other child images.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


The “Windows Master Control Panel Shortcut“, labeled “All Tasks” and also called Windows GodMode by bloggers and All Tasks folder by at least one Microsoft developer, is a short-cut to access various control settings in Windows Vista and later operating systems. By creating a folder with a certain name, users have access to all of the operating system’s control panels from within a single folder. This hack was published outside of Microsoft documentation in 2007 and gained popularity when the name GodMode was used by bloggers. Variations of the same method can access different settings, and have also been called ‘GodMode‘ folders. So follow the below instructions and make your own GodMode:

  1. First of all, Make a New Folder in Your Desktop.
  2. Now, Rename that “New Folder” to “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}” (Make sure that you rename the folder without quotes.)Godmode1 hackagon
  3. Now, You’ll observe that folder is automatically changed in an icon as same as control panel’s icon.Godmode2 hackagon
  4. This resulting GodMode will give you around 250 different settings and options depending on your PC’s configuration. Use this options & settings very carefully and enjoy the GodMode in Windows.Activate Godmode in windows hackagon

This trick will work on all types of windows versions including 32 and 64 Bit. So, Just bang on with your GodMode

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Diposable Phone Number hackagonA One-Time Password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital devices. OTPs avoid a number of shortcomings that are associated with traditional (static) password-based authentication, a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has, as well as something a person knows (such as a PIN). If any website is asking to enter your phone number for further process for which that website is going to send you the OTP in your number and you don’t want to reveal your real number due to privacy concern but also, you want to use their website then these below given websites will help you a lot for bypassing the OTP with a disposable number.

Websites, Who Provide Disposable Phone Numbers:

How to Use These Websites to Bypass the OTP:

  1. First of all, visit any website from above list.
  2. Then, Click on Phone number & it will open Inbox list.
  3. Then, enter that number, in the site where you want to bypass OTP.
  4. Then, refresh the page of Disposable phone number site. You will see your OTP Code there.
  5. Enter OTP code on third party websites & you will be able to Bypass OTP Code easily.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

SMS Bomber


Prank your Friends by Sending continuous messages to them with SMS Bomber. As of in many situations, you want to disturb or irritate your friends or relatives. So in that case, you need this post to bombard the messages on their cell phones inbox.

sms bomber

So, for bombarding messages on your behalf, an amazing SMS Bomber is developed by WIZBLOGGER group. You can make victims cell phone flooded with messages by entering their phone number in the form of their website.

How to use SMS Bomber:

  1. First of all, Visit the website by clicking on SMS BOMBER.
  2. Now, enter your Friend’s Phone Number there.
  3. Then, enter number of SMS as much as you want to send (Maximum 100 SMS per Time).
  4. Then Click on SUBMIT button as shown in the screenshot below.

sms bomber

Features Of SMS Bomber:

  1. Completely free. You don’t have to pay a single penny to bomb your friends/victims.
  2. Super fast speed. Even if you send 100 SMS it will take only a few seconds to complete the request
  3. Works awesome. No delays in between SMS.
  4. Works on DND activated sim also.
  5. Works on all Indian mobile numbers.
  6. Can send up to 100 SMS per go.

Some Rules for using the facility: For the security reasons, you need to follow the following rules:

  • You agree that you will not use this trick for any illegal purpose.
  • You can only send max 100 SMS to one person.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

Aaron Swartz


Aaron Swartz Hackagon

Name Aaron Hillel Swartz
Born November 8, 1986, Highland Park, Illinois, U.S.
Death January 11, 2013 (Aged 26), Brooklyn, New York, U.S.
Cause of Death Committed Suicide
Occupation Software developer, Writer, Internet activist
Education Stanford University
Major Achievements RSS, Markdown, CC, Web.pyReddit

Aaron Swartz is a famous young computer genius, the famous social networking site “Reddit” co-founder, web.py designer. He is also a digital age Robin Hood, committed to opening up the network information, because of the alleged trespassing Massachusetts Institute of Technology (MIT) and JSTOR (full name Journal Storage, An academic journals online storage system) is accused, he will be subject to up to 35 years in prison and a fine of $ 1 million. The case was in the plea stage, when Aaron Swartz on January 11, 2013, in his Brooklyn apartment, hanged himself with a belt, the body was subsequently found by his girlfriend.

Life:

November 8, 1986, Aaron Swartz was born in Chicago, the son of Robert Swartz is a software expert, and mother Suzanne is a weaving, sewing, and fiber material artists.

Aaron Swartz got influenced by the immeasurable Internet world. At the age of 13, he alone set up his own first non-profit website called get.info (The Info.org), is a free online encyclopedia, everyone can add, edit, organize content on the site, which is pretty similar to Wikipedia, but it is developed few years before Wikipedia came into existence. Therefore, he won the ArsDigita Prize, given to young people who create “useful, educational, and collaborative” non-commercial websites. At age 14, he became a member of the working group that authored the RSS 1.0 web syndication specification.

In 2004, Aaron admitted to Stanford University and Reddit later became one of America’s most popular sites, eventually acquired by Conde Nast. Aaron, therefore, becomes a millionaire before the age of 20. Even so, Aaron has been just using technology to do well, not to make money.

Later, Aaron engaged in social activities, the creation of the Open Library, and participated in the program on television to discuss Internet issues. He became principal of protesters opposed to the US government’s SOPA (Stop Online Piracy Act), in his view, this bill will lead to a massive loss of Internet censorship leaving the public Internet Freedom. In 2010, Aaron set up to promote Internet freedom and privacy “seeking Advancement” (Demand Progress), and became the heart and soul of the organization, vigorously oppose “Stop Online Piracy Act” (SOPA) and “Protection of Intellectual Property Bill “(PIPA). Aaron eventually made this incredible victory.

Aaron because of his “hacking” into complex cases chose to commit suicide and left us, left his lifetime trying to change the world.

W3C:

In 2001, Swartz joined the RDFCore working group at the World Wide Web Consortium (W3C), where he authored RFC 3870, Application/RDF+XML Media Type Registration. The document described a new media type, “RDF/XML“, designed to support the Semantic Web.

Markdown:

Swartz was a major contributor to Markdown, a lightweight markup language for generating HTML, and author of its html2text translator. The syntax for Markdown was influenced by Swartz’s earlier atx language (2002), which today is primarily remembered for its syntax for specifying headers, known as atx-style headers:

# H1-header

## H2-header

###### H6-header

Markdown itself remains in widespread use.

Wikipedia:

Swartz volunteered as an editor at Wikipedia, and in 2006, he ran unsuccessfully for the Wikimedia Foundation’s Board of Trustees. Also in 2006, Swartz wrote an analysis of how Wikipedia articles are written, and concluded that the bulk of the actual content comes from tens of thousands of occasional contributors, or “outsiders”, each of whom may not make many other contributions to the site, while a core group of 500 to 1,000 regular editors tend to correct spelling and other formatting errors. According to Swartz: “the formatters aid the contributors, not the other way around.”

His conclusions, based on the analysis of edit histories of several randomly selected articles, contradicted the opinion of Wikipedia co-founder Jimmy Wales, who believed the core group of regular editors, were providing most of the content while thousands of others contributed to formatting issues. Swartz came to his conclusions by counting the total number of characters added by an editor to a particular article—while Wales counted the total number of edits

Tor2web:

In 2008, Swartz worked with Virgil Griffith to design and implement Tor2web, an HTTP proxy for Tor-hidden services. The proxy was designed to provide easy access to Tor from a basic web browser.

However, depression is like a ghost, always hiding in the shadows waiting for an opportunity to extend his claws. He wrote on the blog text to read often. In the blog article entitled “sick” of Aaron, he wrote: “In the past few weeks I’ve been lying in bed, drink only liquid at this time, I was sick, and it is four diseases – cold, stomach pain, migraine, and bad mood struck together.” His mother said: “We always knew he was suffering from depression, but never knew he experienced so much pain.”

Note: Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below, if you find any correction.

 


MAC (Media Access Control) address is a unique identifier assigned to most Network Adapters or Network Interface Cards (NICs) by the manufacturer for identification, IEEE 802 standards use 48 bits or 6 bytes to represent a MAC address. This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses.

IEEE 802 standards define 3 commonly used formats to print a MAC address in hexadecimal digits:

  1. Six groups of two hexadecimal digits separated by hyphens (-), like 01-23-45-67-89-ab
  2. Six groups of two hexadecimal digits separated by colons (:), like 01:23:45:67:89:ab
  3. Three groups of four hexadecimal digits separated by dots (.), like 0123.4567.89ab

Now a day, MAC address is often used to trace the devices playing over the internet. So for private or anonymous browsing MAC address must be hidden.

Here, we are using a tool by which we can easily change our default MAC address at runtime session, which will make our PC be anonymous on the network as no one can trace the actual MAC address.

Steps for changing MAC Address:

  1. Download and install the tool Technitium MAC Address Changer.
  2. Extract and launch the tool in your PC.MAC Changer Hackagon
  3. Now, select the network where you being currently connected.
  4. Now, click on “Random MAC Address” button. (The process will generate any random MAC Address for your computer.)MAC Generate Hackagon
  5. Now, click on the “Change Now” button at the bottom of the window.MAC Generated
  6. Now, you’ll see a pop-up saying MAC Address was changed successfully”.
  7. Done, now your PC is assigned to a new/random anonymous MAC Address on the network.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Stay secure by attackers and surf anonymously on the network by following the above steps to change MAC address of any Windows PC. Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Now a day, we must know our MAC (Media Access Control) Address for some sort of security issues as we know that a MAC address is a unique identifier assigned to most Network Adapters or Network Interface Cards (NICs) by the manufacturer for identification.

As we know that, MAC address is used to trace the devices residing over the internet/network. Therefore, for private or anonymous browsing MAC address must be hidden. But first of all, we should know that how to find MAC Address.

So here we’re providing very easy step by step instructions for acquiring the default MAC address of windows PC:

  1. Click the “Start button” & select “Run” or simply press “Ctrl+R” from the keyboard.
  2. Then type “cmd” and press enter or click on OK.cmd hackagon
  3. A black Command prompt window will get open. Type “ipconfig /all” and press Enter. (Remember the space between ipconfig and /all).ipconfig
  4. Lots of information will be displayed, but what you need is in the Ethernet Adapter Local Area Connection section. Write down the Physical Address that looks like “8C-A9-82-5E-8B-5D”. This is the “MAC Address.”
  5. Your MAC Address (Physical Address) almost always starts with a zero. If you’re writing down a number that does not start with “0” you’ve probably got the wrong number.Physical Address Hackagon
  6. Done . . . So, now as you obtained the MAC address, you can use it your way.

 

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.


Julian Assange hackagon

Name Julian Paul Assange
Alias Hackers Robin Hood
Citizenship Australia
Place of birth North Queensland City of Townsville, Australia
Date of birth July 3, 1971
Occupation Reporter
Graduated school University of Melbourne
Major achievements 2006 founder of “WikiLeaks

Julian Paul Assange is an Australian computer programmer, publisher, and journalist. He is known as the editor-in-chief of the website “WikiLeaks“, which he founded in 2006 after an earlier career in hacking and programming. WikiLeaks achieved particular prominence in 2010 when it published U.S. military and diplomatic documents leaked by Chelsea Manning. Julian Assange has been under investigation in the United States. Since, that time. In the same year, the Swedish Director of Public Prosecution opened an investigation into four sexual offenses that Assange allegedly committed. In 2012, facing extradition to Sweden, he sought refuge at the Embassy of Ecuador in London and was granted political asylum by Ecuador.

Childhood:

When Assange was a year old, his mother “Claire” (a pseudonym) married to Richard Brett Assange (an actor). At the age of 8, his parents divorced and his mother remarried to a tyrannical musician, soon separated. Assange had a nomadic childhood and had lived in over thirty different Australian towns by the time he reached his mid-teens. Assange moved town to town so frequently that full of his school age have no access to proper education. He attended many schools, including Goolmangar Primary School in New South Wales (1979–1983) and Townsville State High School, as well as being schooled at home. He studied programming, mathematics, and physics at Central Queensland University (1994) and the University of Melbourne (2003–2006), but did not complete a degree.

Hacking Career:

Claire (Assange’s Mother) was working at an electronics store to rent a house, Assange often used to do programming on that store’s computers. Later, Claire bought a computer as a gift for Assange. On which, Assange learned how to crack the usual procedures. At the age of 16, Assange began hacking under the name “Mendax”. He and two of his fellows, “Trax” and “Prime Suspect” formed a hacking group known as “International Subversives”. During this time, he hacked into, the Pentagon and other U.S. Department of Defense facilities like MILNET, the U.S. Navy, NASA, and Australian Overseas Telecommunications Commission, Citibank, Lockheed Martin, Motorola, Panasonic, and Xerox and the Australian National University, La Trobe University, and Stanford University’s SRI International. He is thought to have been involved in the WANK (Worms Against Nuclear Killers) hack at NASA in 1989, but he does not acknowledge this.

In September 1991, he was discovered hacking into the Melbourne master terminal of Nortel, a Canadian multinational telecommunications corporation. The Australian Federal Police tapped Assange’s phone line (he was using a modem), raided his home at the end of October, and eventually charged him in 1994 with thirty-one counts of hacking and related crimes. In December 1996, he pleaded guilty to twenty-five charges (the other six were dropped) and was ordered to pay reparations of a $2,100 and released on a good behavior bond, avoiding a heavier penalty due to the perceived absence of malicious or mercenary intent and his disrupted childhood. After the trial, Assange lived in Melbourne, where he survived on single-parent income support.

Wikileaks:

With extraordinary talent, Julian Assange worked as a lucrative computer security consultant, but he was always working and his academic research is not satisfied with legalistic. Assange believes that in order to conceal the truth to maintain the fight against the regime of government, the “leak” is the only way.

In 2006, Assange began work on Wikileaks, a Website intended to collect and share confidential information on an international scale. The site officially launched in 2007 and it was run out of Sweden at the time because of the country’s strong laws protecting a person’s anonymity. Later that year, Wikileaks released a U.S. military manual that provided detailed information on the Guantanamo detention center. Wikileaks also shared emails from then-vice presidential candidate Sarah Palin that it received from an anonymous source in September 2008.

WikiLeaks published secret information, news leaks, and classified media from anonymous sources. By 2015, WikiLeaks has published more than 10 million documents and associated analyzes, and has been described by Assange himself as “A giant library of the world’s most persecuted documents”. The published material between 2006 and 2009 attracted various degrees of publicity, but it was only after it began publishing documents supplied by Chelsea Manning that Wikileaks became a household name. The Manning material included the Collateral Murder video (April 2010), the Afghanistan war logs (July 2010), the Iraq war logs (October 2010), a quarter of a million diplomatic cables (November 2010), and the Guantánamo files (April 2011).

Sexual Assault Controversy:

In early December 2010, Julian Assange discovered that he had other legal problems to worry about. He had been under investigation by the Swedish police since early August, in connection with two sexual assault cases. After a European Arrest Warrant was issued by Swedish authorities on December 6, Assange turned himself into the London police.

After a series of extradition hearings in early 2011 to appeal the warrant, Assange learned on November 2, 2011, that the High Court dismissed his appeal. Still on conditional bail, Assange made plans to appeal to the U.K. Supreme Court, in regard to the case.

According to a New York Times article, Julian Assange came to the Ecuadorean Embassy in London in June 2012, seeking to avoid extradition to Sweden. Nearly two months later, in August 2012, Assange was granted political asylum by the Ecuadorean government, which, according to the Times, “protects Mr. Assange from British arrest, but only on Ecuadorean territory, leaving him vulnerable if he tries to leave the embassy to head to an airport or train station.” The article went on to say that the decision “cited the possibility that Mr. Assange could face ‘political persecution’ or be sent to the United States to face the death penalty,” putting further strain on the relationship between Ecuador and Britain, and instigating a rebuttal from the Swedish government.

Personal Life:

While still in his teens, Julian Assange married a woman known only as Teresa, and in 1989, they had a son, Daniel Assange, now a software designer. The couple separated and fought over custody of the child until they worked out a custody agreement in 1999. Assange was Daniel’s primary caregiver for much of his childhood. In an open letter to French President François Hollande, Assange stated his youngest child lives in France with his/her mother. He also stated that his family has faced death threats and harassment due to his work, thus forcing them to change identities and reduce contact with him.

Note: Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below, if you find any correction.


Liz: If you use Raspbian, you’ll have noticed that Mathematica and the Wolfram Language come bundled for free with your Raspberry Pi. (A little boast here: we were only the second computer ever on which Mathematica has been included for free use as standard. The first? Steve Jobs’s NeXT, back in 1988.) 

Earlier in July, Wolfram Research announced a big update to Mathematica, with the introduction of Mathematica 10. Here’s a guest post announcement from Arnoud Buzing at Wolfram about what the new Mathematica will offer those of you who use it on your Raspberry Pi. Over to you, Arnoud!

In July, we released Mathematica 10a major update to Wolfram’s flagship desktop product. It contains over 700 new functions, and improvements to just about every part of the system.

wolfram-rasp-pi2

Today I am happy to announce an update for Mathematica and the Wolfram Language for the Raspberry Pi, which bring many of those features to the Raspberry Pi.

To get this new version of the Wolfram Language, simply run this command in a terminal on your Raspberry Pi:

sudo apt-get update && sudo apt-get install wolfram-engine

This new version will also come pre-installed in the next release of NOOBS, the easy set-up system for the Raspberry Pi.

If you have never used the Wolfram Language on the Raspberry Pi, then you should try our new fast introduction for programmers, which is a quick and easy way to learn to program in this language. This introduction covers everything from using the interactive user interface, basic evaluations and expressions, to more advanced topics such as natural language processing and cloud computation. You’ll also find a great introduction to the Wolfram Language in the Raspberry Pi Learning Resources.

This release of the Wolfram Language also includes integration with the newly released Wolfram Cloud. This technology allows you to do sophisticated computations on a remote server, using all of the knowledge from Wolfram|Alpha and the Wolfram Knowledgebase. It lets you define custom computations and deploy them as a “instant API” on the cloud. The Wolfram Cloud is available with a free starter account, and has additional non-free accounts which enable additional functionality.

Check the Wolfram Community in the next couple of weeks for new examples which show you how to use the Wolfram Language with your Raspberry Pi.