France has the largest share of electricity generated by nuclear power. China has the fastest growing nuclear power program with 28 new reactors under construction, and a considerable number of new reactors are also being built in India, Russia and South Korea. At the same time, at least 100 older and smaller reactors will “most probably be closed over the next 10–15 years”.
European Union countries (contiguous land mass) employing nuclear energy for electricity generation are marked in orange. Those without nuclear power stations are shown in pale blue (including islands belonging to countries that do have reactors but no presence on this island).
Slovenian plans to expand Krško plant seem to have been dropped, instead a 20 years life extension is under evaluation. EPR new reactors under construction in Finland and France have been delayed and are running over-budget. Similar problems are for new VVR reactors under construction in Slovakia, which are anyway slowly closing to completion.
Several countries, among the ones owning nuclear power plants, have anyway expanded their nuclear power generation capacity by just upgrading existing reactors. Such upgrades granted from 10% to 29% more power per unit.
Following the Fukushima nuclear disaster, Germany has permanently shut down eight of its reactors and pledged to close the rest by 2022; but difficulties, costs and subsequent critics of planned energy transition could potentially harm this policy. Italy voted twice, in 1987 to make more difficult to build new plants (the vote was extensively interpreted by following governments as a total repeal of nuclear power plants, leading to the sudden shut down of all Italian operating reactors within few years), and in 2011 to keep their country non-nuclear. Switzerland and Spain have banned the construction of new reactors. Belgium is considering phasing out its nuclear plants. France, frequently heralded as a nuclear commercial model for the world, was as of 2011 locked in a national debate over a partial nuclear phase-out. In the same time, however, Sweden embraced a nuclear phase-out policy as early as 1980, so preceding all these countries; but only the two oldest reactors, of twelve, were shut down at their end of life; while in 2010 Swedish Parliament repealed this policy.
Stress tests were developed within EU in the aftermath of Fukushima nuclear disaster, with the goal to make all the 132 operating European reactors to follow the same safety standards and to have the same safety level, for a list of possible catastrophical events (e.g. earthquake, flooding or plane crash). Generally speaking, the most part of reactors proved well during the tests, with just 4 reactors in 2 countries having less than one hour for reactivating safety systems; anyway, most part of reactors will have as well to undergo a program of safety upgrades. The costs of additional safety improvements were estimated in 2012 to be in the range of €30 million to €200 million per reactor unit. Thus, the total costs for the 132 reactors operating in the EU could be in the order of €10–25 billion for all NPP units in the EU over the coming years.
As of November 2016 there is a total of 186 nuclear power plant units with an installed electric net capacity of 163,685 MWe in operation in Europe (five there of in the Asian part of the Russian Federation) and 15 units with an electric net capacity 13.696 MWe were under construction in six countries.
net capacity MWe
net capacity MWe
Nuclear power plants in Europe, in operation and under construction, as of November 2016
In terms of electricity generated by nuclear energy in 2015 France holds the top position with a share of 76,3 % followed by the Ukraine with 56,5.4%, the Slovakian Republic with 55,9 % and Hungary with 52,7 %.
Nuclear Power Plants in Operation in Europe, November 2016
I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. Password cracking is both an art and a science, and I hope to show you the many ways and subtleties involved.
We will start with the basic principles of password cracking that are essential to ALL password cracking techniques, followed by some of the tools and technologies used. Then, one by one, I will show you how to use those principles and technologies effectively to crack or capture the various types of passwords out there.
The Importance & Methods of Password Cracking
Passwords are the most widely used form of authentication throughout the world. A username and password are used on computer systems, bank accounts, ATMs, and more. The ability to crack passwords is an essential skill to both the hacker and the forensic investigator, the latter needing to hack passwords for accessing the suspect’s system, hard drive, email account, etc.
Although some passwords are very easy to crack, some are very difficult. In those cases, the hacker or forensic investigator can either employ greater computing resources (a botnet, supercomputer, GPU, ASIC, etc.), or they can look to obtain the password in other ways.
These ways might include insecure storage. In addition, sometimes you don’t need a password to access password-protected resources. For instance, if you can replay a cookie, session ID, a Kerberos ticket, an authenticated session, or other resource that authenticates the user after the password authentication process, you can access the password protected resource without ever knowing the password.
Sometimes these attacks can be much easier than cracking a complex and long password. I will do a tutorial on various replay attacks in the near future (look out specifically for my upcoming article on stealing the Facebook cookie to access someone’s Facebook account).
Now, let’s start with the basics.
Step 1: Password Storage
In general, passwords are not stored in clear text. As a rule, passwords are stored as hashes. Hashes are one-way encryption that are unique for a given input. These systems very often use MD5 or SHA1 to hash the passwords.
In the Windows operating system, passwords on the local system are stored in the SAM file, while Linux stores them in the /etc/shadow file. These files are accessible only by someone with root/sysadmin privileges. In both cases, you can use a service or file that has root/sysadmin privileges to grab the password file (e.g. DLL injection with samdump.dll in Windows).
Step 2: Types of Attacks
A dictionary attack is the simplest and fastest password cracking attack. To put it simply, it just runs through a dictionary of words trying each one of them to see if they work. Although such an approach would seem impractical to do manually, computers can do this very fast and run through millions of words in a few hours. This should usually be your first approach to attacking any password, and in some cases, it can prove successful in mere minutes.
Most modern systems now store passwords in a hash. This means that even if you can get to the area or file that stores the password, what you get is an encrypted password. One approach to cracking this encryption is to take dictionary file and hash each word and compare it to the hashed password. This is very time- and CPU-intensive. A faster approach is to take a table with all the words in the dictionary already hashed and compare the hash from the password file to your list of hashes. If there is a match, you now know the password.
Brute force is the most time consuming approach to password cracking. It should always be your last resort. Brute force password cracking attempts all possibilities of all the letters, number, special characters that might be combined for a password and attempts them. As you might expect, the more computing horsepower you have, the more successful you will be with this approach.
A hybrid password attack is one that uses a combination of dictionary words with special characters, numbers, etc. Often these hybrid attacks use a combination of dictionary words with numbers appending and prepending them, and replacing letters with numbers and special characters. For instance, a dictionary attack would look for the word “password”, but a hybrid attack might look for “p@$$w0rd123”.
Step 3: Commonly Used Passwords
As much as we think each of us is unique, we do show some common patterns of behavior within our species. One of those patterns is the words we choose for passwords. There are number of wordlists that have been compiled of common passwords. In recent years, many systems have been cracked and passwords captured from millions of users. By using these already captured passwords, you are likely to find at least a few on the network you are trying to hack.
Step 4: Password Cracking Strategy
Many newbies, when they start cracking passwords, simply choose a tool and word list and then turn them loose. They are often disappointed with the results. Expert password crackers have a strategy. They don’t expect to be able to crack every password, but with a well-developed strategy, they can crack most passwords in a very short amount of time.
The key to develop a successful strategy of password cracking is to use multiple iterations, going after the easiest passwords with the first iteration to the most difficult passwords using different techniques for each iteration.
Step 5: Password Cracking Software
John the Ripper is probably the world’s best known password cracking tool. It is strictly command line and strictly for Linux. Its lack of a GUI makes a bit more challenging to use, but it is also why it is such a fast password cracker.
One of the beauties of this tool is its built in default password cracking strategy. First, attempts a dictionary attack and if that fails, it then attempts to use combined dictionary words, then tries a hybrid attack of dictionary words with special characters and numbers and only if all those fail will it resort to a brute force.
Ophcrack is a free rainbow table-based password cracking tool for Windows. It is among the most popular Windows password cracking tools (Cain and Abel is probably the most popular; see below), but can also be used on Linux and Mac systems.
It cracks LM and NTLM (Windows) hashes. For cracking Windows XP, Vista and Windows 7, you can download free rainbow tables. You can download Ophcrack on SourceForge, and you can get some free and premium rainbow tables for Ophcrack here.
L0phtCrack is an alternative to Ophcrack, and attempts to crack Windows passwords from hashes in the SAM file or the Active Directory (AD). It also uses dictionary and brute force attacks for generating and guessing passwords.
L0phtCrack was acquired by Symantec and they promptly discontinued it in 2006. Later, L0phtCrack developers re-acquired this excellent password cracking tool and re-released it in 2009. You can download the tool here.
Cain and Abel
Cain and Abel just might be the best known password cracking tool on the planet. Written strictly for Windows, it can crack numerous hash types, including NTLM, NTLMv2, MD5, wireless, Oracle, MySQL, SQL Server, SHA1, SHA2, Cisco, VoIP, and many others.
Cain and Abel can crack passwords using a dictionary attack, rainbow attack, and brute force. One of its better features is the ability to select the password length and character set when attempting a brute force attack. And besides being an excellent password cracking tool, it is also a great ARP Poisoning and MiTM tool.
THC-Hydra is probably the most widely used online hacking tool. It is capable of cracking web form authentication, and when used in conjunction with other tools such as Tamper Data, it can be a powerful and effective tool for cracking nearly every type of online password authentication mechanism.
Brutus is an online password cracking tool that many consider the fastest online password cracker. It is free and available on both Linux and Windows, and it supports password cracking in HTTP (Basic Authentication), HTTP (HTML Form/CGI), POP3, FTP, SMB, Telnet, and other types such as IMAP, NNTP, NetBus, etc.
Brutus has not been updated in quite awhile, but it can still be useful and since it is open source, you can update it yourself. Brutus can be downloaded here.
In my humble opinion, aircrack-ng is undoubtedly the best all-around Wi-Fi hacking software available. It is capable of cracking both WEP and WPA2, and it is also capable of doing the following, among many other things.
It is only available for Linux and requires a bit of a learning curve to master, but you will be richly rewarded for the time spent learning it. In addition, to be most effective you will need to use an aircrack-ng compatible wireless card, so check their extensive list before buying your card. You can find more info on aircrack-ng over in my Wi-Fi hacking series.
Password cracking is simply a function of brute force computing power. What one machine can do in one hour, two machines can do in a half hour. This same principle applies to using a network machines. Imagine what you can do if you could access a network of one million machines!
Some of the botnets available around the globe are more than a million machines strong and are available for rent to crack passwords. If you have a password that might take one year to crack with your single CPU, a million-machine botnet can cut that time to approximately 1 millionth the time, or 30 seconds!
GPUs, or graphical processing units, are much more powerful and faster than CPU for rendering graphics on your computer and for cracking passwords. We have a few tools built into Kali that are specially designed for using GPUs to crack passwords, namely cudahashcat, oclhashcat, and pyrit. Look for coming tutorials on using these tools and the GPU on your high-end video card to accelerate your password cracking.
In recent years, some devices have been developed specifically for hardware cracking. These application-specific devices can crack passwords faster than over 100 CPUs working symmetrically.
That concludes our beginning lesson on the basics of general password cracking. Stay tuned for more lessons as we go more in-depth with specific examples of using some of the tools and methods we have just covered above.
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.
We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they’re ready for primetime.
But we sometimes forget who’s watching.
We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we’re not home and for how long we’re gone. They know the answers to our security questions. People can practically steal our identities—and that’s just with the visible information we purposely give away through our public Facebook profile.
The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven’t already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.
In fact, you don’t even have to be a professional hacker to get into someone’s Facebook account.
It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else’s Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you’re into the account. It’s as easy as that.
In this article I’ll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone’s Facebook account. But don’t worry, I’ll also show you how to prevent it from happening to you.
Method 1: Reset the Password
The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying to hack.
The first step would be to get your friend’s Facebook email login. If you don’t already know it, try looking on their Facebook page in the Contact Info section.
Next, click on Forgotten your password? and type in the victim’s email. Their account should come up. Click This is my account.
It will ask if you would like to reset the password via the victim’s emails. This doesn’t help, so press No longer have access to these?
It will now ask How can we reach you? Type in an email that you have that also isn’t linked to any other Facebook account.
It will now ask you a question. If you’re close friends with the victim, that’s great. If you don’t know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don’t figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.
How to Protect Yourself
Use an email address specifically for your Facebook and don’t put that email address on your profile.
When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher’s names. It’s as easy as looking through a yearbook.
Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
Method 2: Use a Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim’s computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
CNET has Free Keylogger, which as the title suggests, is free. If this isn’t what you’re looking for, you can search for other free keyloggers or pay for one.
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim’s computer. The USB drive will save a summary of the keystrokes, so it’s as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it’s bit higher than buying the software since you have the buy the USB drive with the program already on it.
How to Protect Yourself
Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer’s online activity and sniff out anything suspicious.
Install a password manager. Keyloggers can’t steal what you don’t type. Password mangers automatically fill out important forms without you having to type anything in.
Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
Change passwords. If you still don’t feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.
Method 3: Phishing
This option is much more difficult than the rest, but it is also the most common method to hack someone’s account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you’ll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it’s still possible, especially if you clone the entire Facebook website.
How to Protect Yourself
Don’t click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here’s a great guide on what to look out for). If you’re still doubtful, go directly to the main website and login the way you usually do.
Phishing isn’t only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don’t click on any sketchy looking links that ask for your information.
Use anti-virus & web security software, like Norton or McAfee.
Method 4: Stealing Cookies
Cookies allow a website to store information on a user’s hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don’t actually get the login passwords, but they can still access the victim’s account by cloning the cookies, tricking Facebook into thinking the hacker’s browser is already authenticated.
Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.
From there, the hacker can click on the saved cookies and access the victim’s account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.
On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can’t sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
Log off a website when you’re done. Firesheep can’t stay logged in to your account if you log off.
Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you’re on as all your network traffic will be encrypted all the way to your VPN provider.
Protecting Yourself: Less Is More
Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn’t something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.
Track a Cell Phone in Simple Steps Here is a Complete Cell Phone Tracking Guide!
Are you looking to know how to track a cell phone with pin point accuracy? Do you need to exactly know where your child or employees are moving around during your absence? If so you have come to the right place. In this article I will let you know some of the possible methods to GPS track a cell phone in simple steps.
1. Track a Cell Phone That’s Not Yours
If you need to track someone else’s phone such as your children or employees, you can simply use a cell phone tracking app such as SpyStealth Premium. This is a very small app that can be installed in just a few simple steps and takes only 2-3 minutes to complete. Once installed the app stays hidden on the phone but keeps track of every activity on the phone including its GPS location, Call Logs, Text Messages and more.
How Tracking Works?
You will have to download and install the tracking app onto the target phone of whose location and activities you want to track.
Installation takes only a few minutes during which you should have the target phone in your hand.
Once the installation is complete, the tracking process will begin immediately and the recorded logs are silently uploaded to your online account as shown in the demo below.
You can login to your secure online account at any time to view the logs containing GPS location, Calls, Phone Contacts, Text Messages and more.
Watch SpyStealth Premium Demo
You can take a look at the live demo of SpyStealth in action from the following link:
Supported Phones: Android, iPhone, iPad and Tablets.
2. Tracking a Lost Cell Phone
Now, let us look at some of the possible options to track a phone in case if it is lost or stolen.
For Android Phones:
If you need to track a lost android phone, you can follow the steps mentioned below:
Download Android Device Manager from Google play store and install it on another android device. This app lets you track your stolen android phone and also lets to remotely lock or erase all the data on it.
From “Android Device Manager” log into your Google account using the same ID associated with your lost phone. After successful login this app will attempt to locate your device and show its last known location on the map.
In addition, you will also be able to perform several actions on your lost phone such as give a Ring, Lock the device or Erase all the data stored on it.
For Apple iPhones:
If you need to track a lost iPhone, you can follow the steps mentioned below:
Login to the iCould Website using an Apple ID associated with your lost phone. Since location tracking is turned on by default on all iPhone devices, iCould lets you track it from your web browser or your iPad and shows its location on the map.
When your phone is found nearby to your location you have an option to Play Sound on it so that your iPhone will emit a sound, helping you track it down.
If this does not help, you can choose the option Lost Mode which will remotely lock your phone down and display a phone number that can be reached at.
When none of the above options work, you can finally decide to go with the option Erase iPhone which will completely wipe out all the data stored on it. This way you can prevent your private information from falling into the wrong hands.
For Windows Phones:
In order to track down a lost Windows phone, you can try the below mentioned steps:
This will ask you to sign-in using your Windows account associated with your lost phone. If your phone gets traced you will see a map showing its exact location. You will also find options to Lock, Ring and Erase its data in case if your phone is found to be completely lost.
I hope this post has helped you with the right information to track cell phones with simple steps involving minimal effort. Please share your thoughts and feedback in the comments section below.
Need to Hack WhatsApp Account?
Below is a WhatsApp Hack Guide with Complete Instructions!
Learn how to hack WhatsApp in simple steps with the following easy to follow and foolproof tutorial. Since WhatsApp has become one of the popular app to share messages and media instantly, it has also become a favorite place for many to engage in illicit activities. Therefore, in order to investigate the truth people are left with no choice other than to hack WhatsApp account.
Possible Ways to Hack WhatsApp
The following are the only two ways to hack WhatsApp account:
1. WhatsApp Hack using a Spying App: The Easiest Way
Even though there are several ways to hack WhatsApp, using a spy app is by far the most simple and easiest way. This method requires no prior hacking knowledge or technical skills to carry out and hence more suitable for common people. Installing a spy app to hack WhatsApp is as simple as installing any other app on mobile. Out of several apps out there, SpyStealth Premium is one of my favorite one to hack WhatsApp:
How to Hack WhatsApp with this App?
Install the spy app on the target WhatsApp phone which takes a few minutes to complete.
After this is done, the app silently records all WhatsApp conversation in hidden mode.
All the WhatsApp chat records are sent to your online account.
View all the information from anywhere at anytime with your online account.
Watch SpyStealth Premium Demo
You can take a look at the live demo of SpyStealth in action from the following link:
Compatibility: Android, Apple iPhone, BlackBerry and Windows Mobile.
2. WhatsApp Hack by Spoofing Mac Address: The Tough Way
There is another method to hack WhatsApp known as Mac address spoofing which involves spoofing the Mac address of the target phone on your own phone. Unlike using spy apps, this one is somewhat time consuming and requires technical skills to implement. To spoof the Mac of the target WhatsApp phone address, follow the below mentioned steps:
Find out the Mac address of the target phone on which you need to hack WhatsApp account:
For Android – Navigate to Settings —> About Device —> Status —> Wi-Fi MAC address.
For iPhone – Navigate to Settings —> General —> About —> Wi-Fi address.
Once you’ve the Mac address of the target WhatsApp phone, you can spoof the Mac address as mentioned in my post: How to Spoof the MAC address.
Next, install WhatsApp on your phone using the target phone number and verify it.
Now, you’ve an exact replica of the target WhatsApp account and you should receive all the conversation and updates on your phone as well.
This method of WhatsApp hacking is quite time consuming and is known to have less success rate as MAC spoofing requires rooted phones. Therefore, if you are someone who does not have sufficient time and skills to implement this, I still recommend the use of spying apps to successfully hack WhatsApp account.
Need to Hack Facebook Password?
Here’s a Complete Guide on Possible Ways to Hack Facebook!
In the recent years, Facebook has also become a popular place for many to exchange secret messages and manage illicit relationships. Therefore, it’s no wonder many people decide to hack Facebook password of their loved ones. If you are in a similar situation or just want to hack the password of any Facebook account, this article is for you.
Recently, a lot of fake hacking websites have popped-up on the Internet. They usually make false promises to hack the Facebook password of any account. These sites often demand people to take-up a surveys in order to complete the password hacking process.
This is only a trick to make quick money by forcing people to take up surveys. However, upon completing of the survey no Facebook password is given to the people. So, I always warn my visitors about such scam websites and their fake promises about hacking Facebook.
Possible Ways to Hack a Facebook Password:
With over 10 years of experience, I can tell you is that there are only TWO ways to hack a Facebook password.:
1. Using a Keylogger – Easiest Way to Hack Facebook!
A keylogger when installed will simply record each and every keystroke that a user types on the keyboard including Facebook or any other account password.
Since keylogger requires no special skills to install and use, it is the easiest way to hack a Facebook password. I recommend the following keylogger program as the best one to gain access to Facebook or any other online account:
To Hack Facebook Users on PC/Mac:
Why Realtime-Spy is the Best?
Realtime-Spy Top Features:
Remote Installation from any corner of the globe.
100% stealth operation and remains undetected!
Extremely easy to use as it requires no special skills to install.
Compatible with Windows XP/Vista/7/8 (32 and 64-bit) and Mac.
How it Works?
To hack the Facebook password, all you need to do is just install Realtime-Spy on the target computer. When the target user logs into his/her Facebook account from this computer, the login details are captured. The login details are then uploaded instantly to the Realtime-Spy servers. You can later access the stored logs to obtain the Facebook password.
Supported Phones: Android, iPhone, iPad and Tablets.
2. Phishing – The Difficult Way:
The other common way to hack Facebook account is via Phishing. This method will make use of a fake login page (spoofed web page) which will exactly resemble the original one.
A spoofed web page of Facebook looks exactly same as that of the original Facebook website. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her Facebook password on such a fake login page, the login details are stolen away by the hacker.
Phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a newbie user (perhaps like you) to attempt this trick. It is a punishable offense too. So in order to successfully hack the Facebook password, I recommend the usage of keylogger as it is the easiest and the safest way.
Why do People Want to Hack Facebook Passwords?
You many wonder why people want to hack the password of someone’s Facebook account. In most cases people attempt to hack the Facebook account of their boyfriend or girlfriend so as to find out what is going on behind the scenes. These days parents are also concerned about their child’s Facebook activity and would like to hack their Facebook accounts to monitor. A husband or wife may try to hack the password and gain access to a suspicious partner’s Facebook account and so on.
While most people have a strong motive behind their need to hack passwords, there are a few who also hack Facebook password just to exhibit their skills.
Facebook Hacking Methods that Do Not Work:
There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes. This in turn can be used to hack Facebook passwords.
It is no longer possible to use conventional methods like brute-force approach to hack Facebook password. This is because big time players like Facebook have employed tight security measures to protect themselves against any such password hacking attempts.
Since Facebook has millions of users, they take every possible security measure to safeguard their accounts which otherwise could cause a severe impact on their business. So, if you come across any website teaching such age old tricks, please be assured that they cannot be successful against Facebook.
Common Myths About Hacking Facebook Password
Unlike what many scam websites claim, Facebook website or Facebook servers do not contain any flaw that allows hackers to crack its password. The only Facebook hacking method that can give you the password is keylogging and phishing. None of the other methods is known to obtain the password for you!
We all do it. Refreshing our news feeds until our thumbs are tired, confused that nothing significant enough to require a status has happened in the last 30 seconds. If you don’t do it then you’re a better person than me, and perhaps this article won’t be of such importance to you. To those who do know the familiar glow of your Facebook page on your iPhone at 4am stay with me…
Facebook is great for many, many reasons. You can stay in touch with people, see what they’re up to without having to pick up the phone, you can share news, and links, and retro #tbt photographs that make everyone cringe. BUT, (and there is always a but), there is also growing evidence to suggest that everyone’s favourite social networking site could have a potentially detrimental effect on mental health, especially for those predisposed to illnesses such as depression and anxiety. Here’s why…
1) Compare & Despair
No matter what you are doing or how happy you are, one look on Facebook can convince you that everyone you know is having a much better time than you.
If you are already feeling vulnerable, and the voice inside your head is telling you that you’re not good enough, Facebook provides the ideal looking glass to provide ammo to that little gremlin. Sparkly fantastic lives are reflected back at you through a falsified looking glass. You think ‘how beautiful she looks’, ‘how many friends he has’, ‘how exciting their life is’, and in comparison reduce yourself to nothing.
Not coincidentally mental health therapists are starting to notice a pattern of Facebook use when it comes to identifying, ‘compare & despair’ which has long been identified as one of the mechanisms used by people suffering from anxiety or depression.
Unfortunately even though we know deep inside that these posts are exaggerated and often don’t symbolise the truth, our weak brain can use them as fuel to sink our self esteem even further.
2) Never letting go
In the famous words of Rose Dawson in Titanic, Facebook gives you the perfect opportunity to ‘Never Let Go’ of the past.
In the days when we still just had humble phones to keep us in contact, once a relationship or friendship ended, we would grieve for a while and eventually get over it. Now, we have the perfect excuse to cyber stalk our ex- partners, see how well they’re doing, and how attractive their new girlfriend or boyfriend is, thus making us feel worse about ourselves. We scroll through old photos reminding ourselves of what things were like in the rose tinted ‘ good times’. Even if we attempt to go cold turkey by de-friending them, they will always pop up in a friend’s comments or likes, reminding you of them and making it more difficult for you to move on with your life.
3) Compulsive behaviour
The introduction of smart phones paved a very easy path for compulsive behaviour. On average we check out phones 150 times a day, and I would bet that a fair few of these include checking our Facebook apps. Even when we are not on Facebook, how many people would admit to thinking about what picture they want to post, or what status to write? Without even using it, we are thinking about using it.
Like any kind of habitual, compulsive behaviour it becomes addictive and distracts us from the other activities we are engaging in. I will admit at times only partly concentrating on a film, or gig, more interested in uploading pictures of the moment than being in the moment.
Studies have also found that overuse of smart phones to maintain social interaction can lead to increased stress especially amongst those already suffering from anxiety. The pressure to respond to a comment, or message, or thinking about how a status might be received, is just adding to our worries in our already busy head.
4) The search for the perfect selfie
After the 23rd attempt you manage to take a selfie that makes you look your best. You then spend 10 minutes editing it to achieve the perfect skin tone, and eye colour, and the result is a stunningly beautiful, but completely unrealistic version of yourself.
Like the retouched celebrities that we see in magazines, and movies, we are constantly presenting the rest of the world an enhanced version of ourselves. It’s hardly surprising that we are then disappointed when we look in the mirror, and don’t see the same thing. This is all the more concerning for teenage girls who are devoting their time to producing these flawless images of themselves, and then comparing them to others. Rather than just being a phase it may also be the start of something more worrying.
Psychiatrists and researchers alike have seen a clear link between taking lots of selfies and Body Dismorphic Disorder (BDD), with some psychiatrists reporting that at least two thirds of patients suffering from BDD have a compulsion to take lots of selfies and upload them on social media.
5) Allows you to detach without cutting yourself off
This one isn’t unique to Facebook and can be said for many of the social networking platforms we use now. Whatsapp, Instagram, Twitter are all great mediums for sharing, but they also provide the perfect excuse to never have to physically meet up with or talk to anyone.
Anyone who has suffered from depression will know that desire to withdraw from social interaction. By continuing to communicate as your online self, it makes it all the easier present an ‘i’m doing fine’ image of yourself, and prevent you getting the help that you need.
6) Longing for likes and social approval
If you have a personality that seeks approval Facebook is the ideal platform to provide instant gratification. Unfortunately though it’s just a short term solution, 72 ‘likes’ on your photo may make you feel great about yourself for an hour or so, but doesn’t change how you feel about yourself deep down.
From a young age now people are measuring their activities, images, thoughts, and opinions with the amount of ‘likes’ or ‘comments’ they receive. To hold the belief that the reason that you are doing something is to see how much approval you can receive from others cannot be good for long term mental stability.
7) The green eyed monster
I have known perfectly healthy relationships split up over a ‘ tag’ or ‘like’ on Facebook. When you are feeling insecure in yourself your brain can paint a thousand pictures which are mostly far from the truth. An innocent comment, or photograph from the past, can transform itself into an elaborate story of betrayal which you then fuel by searching for anything else you can find bordering on suspicious. Of course, sometimes these suspicions are not completely unfounded, but the looking glass of Facebook can magnify things completely out of proportion.
Now I am not saying quit Facebook altogether ( I certainly couldn’t do it) but USE RESPONSIBLY. Remember that people choose what they want you to see, and most of the time it’s far from the true picture.
We share so many details of our daily lives online, but where should we draw the line on what we share about ourselves, our family, and our friends? There are some tidbits of personal information that it is best to never share online, here are ten of them:
1. Your Full Birthdate
While you may love getting loads of birthday wishes posted by your friends on your Facebook Timeline, having your birthdate posted on your profile may provide scammers and identity thieves with one of the key pieces of information needed to steal your identity and open up accounts in your name.
2. Your Current Location
Many people don’t realize that when they post a status update or a tweet, they may also be revealing their current location. Giving out your location information can be dangerous because it tells potential thieves that you might not be at home. Depending on your privacy settings, that innocent tweet from your vacation spot might give the bad guys the green light they were waiting for to rob your house.
3. Pictures of Your Children or Your Friends’ Children Tagged With Their Names
Ok, this is a sensitive topic. We all want to protect our kids, we would lay down in front of a truck to protect them, but many of us post hundreds of name tagged pictures of our children online for the world to see. The problem is that you can never be sure that only your friends are seeing these pictures. What if your friend has their phone stolen or logs into Facebook from the library and forgets to log out?
You can’t rely on the “Friends only” setting because you really never know. Assume that everything is public and don’t post anything that you wouldn’t want the world having access to.
If you must post pictures of your children, remove any geotag information, and avoid using their real names in the picture tag or description.
Your true friends know their names, no need to label them. Same goes for tagging pictures of your friends’ kids. If in doubt leave the tag out.
I would be a hypocrite if I said I had removed all tags of my kids from Facebook. It’s a long process to go back through years worth of photos, but I work on it a little bit at a time, eventually I’ll have them all removed.
4. Your Home Address
Again, you never know who might be looking at your profile. Don’t post where you live as you are making things easy for the bad guys. What can criminals do with your address? Check out our article on How Criminals Use Google Maps to ‘Case the Joint’ to find out.
5. Your Real Phone Number
While you may want your friends to be able to contact you, what if your real phone number falls into the wrong hands. It’s possible that your location could be narrowed down by someone using a reverse phone number lookup tool which are freely available on the Internet.
An easy way to allow people to contact you by phone without giving them your real phone number is by using a Google Voice phone number as a go-between. Check out our article on How to Use Google Voice as a Privacy Firewall for full details.
6. Your Relationship Status
Want to give your stalker the green light they’ve been waiting for while simultaneously letting them know that your more likely to be home alone?
Posting your relationship status is the surest way to accomplish this. If you want to be mysterious, just say “It’s Complicated”.
7. Pictures With Geotags
There’s no better road map to your current location than a geotagged picture. Your phone might be recording the location of all pictures you take without you even knowing it. To find out more about why geotags aren’t necessarily as cool as you thought they were and to learn how to nix them from your pix, check out our article on How to Remove Geotags from Pictures.
8. Vacation Plans
“Hey, I’m going to be on vacation on the 25th of August, please come rob me”, that’s basically what you’re saying to social network trolling criminals when you post your vacation plans, vacation photos, and when you location tag yourself while you’re still on vacation. Wait until you are safely home before uploading your vacation pics or talking about your vacation online. Is “checking in” at that fancy restaurant really worth giving up your location information to potential criminals?
9. Embarrassing Things You Wouldn’t Want Shared With Your Employer or Family
Before you post anything online, think to yourself, would I want my boss or family to see this? If not, don’t post it. Even if you post something and delete it, doesn’t mean that someone didn’t take a screenshot of it before you had the chance to remove it. For more tips on this topic check out our article: How to Monitor and Protect Your Online Reputation.
10. Information About Your Current Job or Work-related Projects
Talking about work-related things on social networks is a bad idea. Even an innocent status update about how mad you are about missing a deadline on a project could provide valuable information to your competitors that they could leverage against your company.