Home
Videos uploaded by user “Tech Raj”
This is How Hackers Crack Passwords!
 
05:44
In this video, we'll see how hackers really crack passwords. This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5 DISCLAIMER : This video is intended only to educate people about how hackers crack passwords, and how important the strength of the password is, when coming to security. If you are using a common password like test123456 which I used in the video, then the hacker will easily be able to know the plain text form of your password from the hash string. There is something known as Rainbow tables. These rainbow tables contain the password hashes of numerous commonly used passwords. So the hacker will be to do a simple search with the password hash that he has, and if the password hash exists in the rainbow table, then that means the password is successfully cracked, and we have the password in a plain text. Remember that rainbow tables contain the password hashes of only the passwords which are commonly used. As a reference, you can go to https://crackstation.net/ If the password is not a commonly used password, then there comes dictionary attack and brute force attack. In dictionary attack, you have a wordlist. A wordlist is nothing but a huge text file with loads of passwords. In this attack, the hacker writes a code which compares the password hash to be cracked, with the password hash of each and every password that exists in the wordlist. Now, this attack can be target-specific as well. which means we can build a wordlist targeting an individual provided that we know some basic details about him/her. In a brute force attack, each and every combination of letters ,symbols and numbers are converted into their hash forms, and are then compared with the hash to be cracked. This is a more expensive. A new technique called salting is introduced by security analysts to give hackers a hard time in cracking passwords. In this technique, a specific combination of characters are inserted at specific positions of the plain text password before hashing. Every company has its own salting algorithm, and they don’t make their salting algorithm public For example, kets say Facebook salting algorithm inserts the string f&2p at the beginning, after the third character, and at the end of the plain text password. After salting the password, the salted password is then hashed by a hashing algorithm. So when salting is used, rainbow tables are of no use even if the password to be cracked is a weak commonly used password. Because the hashe of the password without salting do not match the hash of the password which is salted Also, brute force and dictionary attack are not effective to crack salted passwords unless the hacker already knows the salting algorithm employed by a company. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 6428621 Tech Raj
Website Hacking - What is Cross Site Scripting (XSS)?
 
06:01
Cross site scripting(XSS) is a very serious issue faced by big companies like Facebook, Twitter, Google, Microsoft, etc in the past. XSS is still a very major vulnerability faced by many websites on the Internet these days. So, what is this Cross site scripting? Why is it soo dangerous? In XSS, an attacker injects malicious script in a webpage’s source code. A website is vulnerable to XSS if the user input is not treated properly, and if the html tags are not escaped. The script tag in html is used to include javascript in webpages. Javascript is browser oriented, which means your browser will execute this javascript code whatever is written in the webpage’s HTML. A hacker can make use of XSS to inject malicious javascript. With this javascript, he can display popups on the website, deface the website, and many more…. The worst thing is that a hacker can also steal users cookies by injecting a malicious javascript code into the webpage’s HTML. What this javascript can do is, it steals the users cookies and sends it to the hacker’s database. Though no text appears once the comment is posted, the malicious javascript is actually injected to the webpage’s HTML and it is ready to steal cookies of people. If you don’t know what are cookies and how critical they are, just do a google search. Briefly, cookies are some strings used by websites to identify their users. So, if a hacker has your cookies, he can impersonate you on that particular website. In simple words, if the hacker steals your Facebook cookies, he will be able to login to your Facebook account without entering your password. Image If this vulnerability existed in Facebook now, taking over user’s Facebook accounts would have been as easy as making a comment under a Facebook post with a simple line of javascript! Whenever someone sees this Facebook post with your comment, their cookies are sent to your database and their account is compromised. Obviously Facebook or Twitter or any big company is not vulnerable to this kind of simple XSS now , but there are times when these sites are actually vulnerable to this simple attack and sh*t happened! And yes, there are many websites on the Internet which are still vulnerable to XSS. And they must be fixed ASAP to maintain their web security. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 23470 Tech Raj
How to create a new drive in Windows7 || Create a new Partition
 
07:52
Hey guys , in this tutorial i am gonna show you how to create a new partition to your hard disk in windows 7, i am also gonna show you how to delete created partitions from your hard drive. Like my fb page : http://facebook.com/techraj156 Email me if you have any doubts : [email protected] Visit my blog : http://techraj156.blogspot.com Please Like, Feel free to Comment Please Subscribe !! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 38821 Tech Raj
Read Deleted WhatsApp Messages with this Simple Trick!
 
03:50
Read the recalled messages on WhatsApp easily with this simple trick. Gihosoft TubeGet: https://goo.gl/a7AK4P Easy to Download 4K/8K Videos from YouTube on Windows & Mac! Gihosoft iPhone Data Recovery https://goo.gl/LF7B13 Donate to me : https://paypal.me/techraj156 Watch UPDATED video here : https://youtu.be/EACR7j87HSU WhatsApp bought a new feature where you can delete a sent message on both the ends of the chat. But, there is something you can do to read the deleted messages, only if you are using an Android device. Android saves all the notifications from different apps (like whatsapp, facebook, instagram, etc) in a notification log, until the device is rebooted. So, when someone sends you a message on whatsapp, it gets stored in the notification log (since you get a notification on your device), and if the same message was deleted by the other end, the message still exists in the notification log. So, we can just open the notification log on our android device, and read the saved notifications from whatsapp, which will contain the deleted message. You can read the notification log with this App named : Notification History Link : https://play.google.com/store/apps/details?id=com.evanhe.nhfree Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com Thanks for watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 12077469 Tech Raj
How to Download and Install Java JDK on Windows 7/8/10
 
08:37
Hey There! This is Teja! In this video, I will be teaching you how to download and Install Java Development Kit (JDK) on Windows 7 or Windows 8 or Windows 10. Link to download JDK : (Official Oracle Website) http://www.oracle.com/technetwork/java/javase/downloads/index.html You might need to install Java to run some programs (which are only compatible with Java), and for other purposes like coding. If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com Visit my Website : http://techraj156.com Email me : [email protected] Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 123515 Tech Raj
Why is HTTPS more secure than HTTP?
 
08:40
This video was sponsored by SkillShare. Get 2 months of SkillShare premium for FREE by following this link : https://skl.sh/TechRaj Hurry up! The offer is only available for the first 500 people who register using the above link! When you are visiting a website like Facebook or google or any website that has a https:// before the url, you see a green pad lock icon on your browser. When you click on it, it shows you that the connection to the site is secure. Your browser shows you this pad lock icon because the website you are visiting uses HTTPS which stands for HTTP secure, and this HTTPS protocol is meant to be more secure than the ordinary HTTP. In this video, I’m gonna show you why HTTPS is more secure than HTTP and why you should always prefer websites that have HTTPS before their URL. HTTPS fixes two things : 1. Encrypt all the messages 2. Make sure that we are communicating with the real web server, and not with a hacker or a third party. To learn more about why HTTPS is preferred than HTTP, watch the whole video! SUBSCRIBE for more awesome videos! Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below. Thanks for watching! Cheers!
Views: 8756 Tech Raj
Access Your Computer from anywhere on the Internet!
 
10:39
Access your computer from anywhere on the Internet by following this simple tutorial! In this video, I will teach you how to make your own computer as a server, and connect it to the Internet as a server. You don't need to have a static IP to achieve this. DOWNLOAD LINKS : Download python : https://python.org Download PIP : https://pip.pypa.io/en/stable/installing/ Create ngrok account and download the tool : https://ngrok.com Download my script : https://github.com/teja156/simplefileaccess First off, we are creating a simple http server in python (by using my script). This script will run on localhost and port 1560. We then use ngrok to create a secure tunnel from localhost:1560 to the ngrok server. By doing this, our localhost can be accessed from the Internet. When someone access the ngrok server with our port number, they are going to be taken to our localhost where the python script is running. This python script provides access to a particular directory on our computer. In this way, we can access our computer from any device on the Internet through ngrok. For more information about how the script works, visit the github page. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 18797 Tech Raj
Buying anything Online for Just 1 Rupee/Dollar ?
 
07:23
If you look at any website closely, they are programmed to send data to their respective web servers and receive data from the same. When you click the Buy Now button, the button is programmed to send some set of data like the item name, item id, its price, etc to the web server so that the web server knows what item you are trying to buy. So when you click this button ,this set of data is automatically sent to the server even though you can’t see it being sent, cuz all this is happening in the background. You can pretty much tamper or modify any data that the website on your browser is sending to its server. You will simply need to make use of intercepting tools like BurpSuite.. So, while the website is sending data of the item like its id, price, etc, you can simply modify this data, and change these parameters to anything you like. If the website doesn't employ cryptographic functions along with its payment gateway, it is vulnerable to data tampering. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 15833 Tech Raj
A PROXY VIRUS CAN DO THIS! HOW EASY... 😲
 
06:43
To learn about what is a USB Rubber Ducky, watch this video : https://goo.gl/4y8g3y A week back I’m browsing Internet on my Windows PC and all of a sudden I couldn’t access the internet. There is no problem with the Internet connection as all of my other devices are still able to access the Internet. So, I checked the proxy settings on my Windows PC and realised that a proxy address is created without my knowledge. I immediately turned off the proxy and tried accessing the Internet but still I couldn’t access it. I checked my proxy settings and my proxy is again automatically turned on. I then realised that it is a malware trying to turn on my proxy settings automatically. I somehow got rid got rid of the malware. But I want to show you guys why it is so bad if your PC is connected to a proxy without your knowledge. So, I decided to create a malware like that myself and show you how it works and what It does. First, I’ve written a python script which will listen to the address 127.0.0.1 (which is localhost) and on the port 1560. So if we just change the proxy settings of a PC to this address and port, our script can receive and send the data to the browsers. Once the data is received by my script, I’m forwarding this data to a particular host on a particular port number. This particular host and particular port is going to be the server of the attacker (in this case, me). Once my script sends the data to the server, it also waits for a response back from the server. Once it receives the response back from the server, it forwards this response to the web browser of the PC. So, this makes a simple python script which is to be run on the victim’s PC (which in this case, Is my friend’s PC). I will now save this script on the Internet so that it can be downloaded when needed on to the victim’s PC Now I need to write another script which will capture or sniff the data that the script on victim’s PC is sending. This script should be run on a server, so that the data can be received and sent to the victim’s PC from anywhere on the Internet at any time. But since I don’t have a personal server, I will use my MacBook as the server with the help of ngrok. Using ngrok I first create a secure tunnel from my localhost to the ngrok server. By doing this, my localhost will be accessible anywhere on the Internet with the address of ngrok and a unique port number. I then write the script which needs to be run on the attacker’s machine in-order to act as a man in the middle and sniff data. First I’m listening to 127.0.0.1 and port 1234. Also remember that I’ve already configured ngrok to create a tunnel from my localhost with port 1234 to ngrok’s server. So, whenever I’m listening to 127.0.0.1 with port 1234 it means that I’m actually listening to the secure tunnel which I created. And the end of this secure tunnel is available to connect for any device on the Internet(including the victim’s PC) I’m receiving the data from this secure tunnel(127.0.0.1 : 1234) and then retrieving the url from the data. Then I’m connecting to that particular web server usually with the port 80(for HTTP connections) and sending the data to it. I also wait for responses from the particular web server, and then forward this response to the secure tunnel. The script running on the victim’s computer is then going to receive this response since it is connected to the end of the secure ngrok tunnel. It then forwards it to the browser. In this way I made a simple proxy server and also managed to act like a man in the middle and inspect or sniff or terminate all the HTTP data that is sent or received by the victim’s PC. So I have written a USB rubber ducky script which will automatically change the proxy settings to connect to 127.0.0.1 and port 1560 on the victim’s PC as soon as I plugin the rubber ducky into the victim’s PC, and it will then download the script from the Internet and then executes the script. So, in less than 20 seconds our backdoor will be running on the victim’s PC. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 9928 Tech Raj
Here Is How Your Computer Can Be Hacked - A Small Demo
 
04:35
Hey there! This is Teja In this video, I will be showing you how your PC can be hacked, by a malicious file or malicious application. This video is a demo on how vulnerable your PC is, and how can it be hacked. Here are few ways to prevent your PC from getting hacked : 1. Download files only from Authorised or Official websites. 2. Make sure that you have an Anti-Virus installed on your computer, which Stay Safe! Like my Facebook Page : http://fb.com/techraj156 Follow me on Twiter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email me at : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 6572 Tech Raj
Install Kali Linux Alongside Windows 7 | Dual Boot Kali Linux and Windows 7 [Step By Step Guide]
 
13:07
Hey there! This is Teja. In this video tutorial, I will be teaching you how to install kali linux alongside windows 7, that is, how to dual boot kali linux and windows 7 from the same hard disk. Please follow the video carefully, because we are trying to do some serious stuff, and if anything goes wrong in this process, you are going to loose all your files, and you may end up with no Operating System on your hard disk. Sorry for the bad Video quality. ------------------------------------------------------------------------- Step 1 : Download Kali Linux ISO Image : http://kali.org/downloads Step 2 : Download Universal USB Installer : http://pendrivelinux.com Step 3 : Create a Partition on your Hard disk for Kali Linux. Step 4 : Install Kali Linux alongside Windows 7 ------------------------------------------------------------------------- SUBSCRIBE for more Videos!! If you have any doubts regarding this, feel free to comment below! Follow me on Instagram : https://www.instagram.com/teja.techraj/ Follow me on Twitter : http://twitter.com/techraj156 Like my Facebook Page : http://fb.com/techraj156 Visit my Website : http://techraj156.com Email me for new tutorials : [email protected] Thanks for Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 191374 Tech Raj
How to view saved Wi-Fi Passwords in Windows 7
 
01:53
Hey there!! This is Tech Raj, and in this short tutorial, i will teach and you will learn about how to view saved Wifi passwords in Windows 7. It is very easy to view the passwords of saved wifi networks (saved in the sense, when you already connected to those Wifi networks, by entering a correct Wifi Password) You can simply view your saved Wifi Passwords by following these steps : 1.Go to your Control Panel 2.Select 'Network and Internet' 3.Under 'Network and Sharing center', select 'View network status and tasks' 4.In the Right side of the screen, you will find an option which says 'Manage Wireless Networks', click on that. 5.Then, you will see a list of saved Wifi networks, from that list, right click on the network, whose password you want to see, and select 'Properties' 6.A Window pops up, in that window, go to 'Security Tab', and there, you will find a text field which contains the password of that network, under that text field, you will find a check box, which says 'Show hidden Characters', just check that check box, and then, the password will be visible. Show your thanks by Subscribing me !! Like my Facebook page : http://fb.com/techraj156 Visit my Website : http://techraj156.com If you have any doubts regarding this video, you can feel free to comment below. You can ask me for any new tutorials by emailing me at : [email protected] Thanks for watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 378235 Tech Raj
Change your MAC Address!
 
09:28
Best iTunes Alternative to manage and transfer music- iMusic Download Now:http://bit.ly/2SoyxXQ MAC stands for Media Access Control and MAC addresses are used to uniquely identify a device on a network. Each device on a network is assigned a dynamic IP which is mapped to the corresponding MAC address of the device with the help of ARP protocol, and thus allowing devices in the network to communicate with any device in the network they wish. In this video, I will show you how to change the MAC address on your Windows and MacOS computer. To change it on Kali linux, you can go to 'Wireless Settings' and you will find a field that says 'Cloned MAC address', just type the new MAC address in there and click Apply. For Android, and iOS, there are many apps available that claim to change the MAC address, but its easier to change the MAC address on your smartphone if it is already rooted (in case of Android) or Jailbroken (in case of iPhone) Like my Facebook Page : https://facebook.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 Website : https://techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 3845 Tech Raj
Top 5 Computer Hacks You Can Try At Your Home!
 
07:04
Top 5 Computer hacks that you can give a try! This video features the top 5 best, free and safe computer hacks that anyone can try at their homes. Hey there! My name is Teja. These are the 5 computer hacks that I featured in the video : 1. Manage passwords with face recognition Download Intel True Key : https://www.truekey.com/ Using this software, you can login to any website, by just scanning your face using your webcam. In such a way, you can ensure your security and at the same time, say good bye to the hassle of passwords. 2. Lock your computer with a USB drive Download Predator : https://www.predator-usb.com//predator/en/index.php?n=Main.Download Using this tool, you can lock your computer using your USB, the computer gets unlocked only if you connect the USB or enter the Master Password 3. Change start button on Windows Download Classic Start Menu : http://www.classicshell.net/ Using this you can set any image of your choice as the start button on your Windows PC, follow the video for further guidance. 4. Create Fake Harmless Virus to prank your friends Download the vbs code : https://www.mediafire.com/?7orqctn7eftm31h Follow the steps shown in the video, to prank your friends usng this Simple VB Script. Remember, it is completely harmless. To stop this virus, go to task Manager, and then go to 'Details' tab, and search for 'wscript.exe' and end the process tree. 5. Turn off your computer directly without loosing Unsaved work. Follow the steps in the video to enable 'Hibernate' mode in Windows. Now, you can turn your computer off without loosing any changes. Your computer will consume zero battery when you hibernate it, and at the same time, restores the Computer state when turned on. Visit my Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching ! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 11780 Tech Raj
Earn Money From Home Online (5 Simple Ways)
 
08:03
Check out these 5 simple ways to make money from your home online. By following these methods, you can start making money without investing a dime! Hey there! Its Teja here! In this video, I will be teaching you the 5 simple ways to earn monwy online, right from your home! Here are the methods that I featured in the video : 1. FreeLancer Go to : https://freelancer.in This is a very famous website in which millions of people find their income, from their homes. You can register for a freelancer account, and once you log in, you will find various projects related to website building, logo designing, data entry, marketing, etc. You can choose the project in which you are skilled, get the work done, and earn the money. 2. iWriter Go to : http://iwriter.com In this website, you can earn money by writing articles. Register for an account, and after you login, you will find many projects. Choose a project, write the article according to the guidelines and submit it. If your article satisifies the person who posted that article, you will be paid. 3. Youtube You can create a youtube channel and upload videos following your passion, for free. Once your channel exceeds 10,000 views, you can make money from your videos. You can do this by using the Google Adsense Program. So you need to register for Adsense firstly. 4. Website / Blog You can build your own website or blog, and start posting articles on it. Now, you can register for Google Adsense, and then place ads on your website or blog. Basing on the clicks and views the ads displayed on your blog gets, google pays you. To create a blog/website you can make use of these two popular services : Google Blogspot : https://blogger.com Wordpress : https://wordpress.com Create a domain for yourself, start posting articles, maintain the SEO, and start earning money. Remember, that this takes time, and requires a lot of hard work, just like all the other methods. 5. Instagram You can make money from your instagram account, by promoting various product's on your Instagram account. You need to have atleast 1,000 followers on instagram to do it. Go to Grape Vine Logic : http://grapevinelogic.com Register for a new account, and once your account gets approved, you can view offers posted by various companies. Apply for any campaign, promote their product, and thus make money. SUBSCRIBE for more videos. Visit My website : https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : http://instagram.com/teja.techraj Follow on Twitter : http://twitter.com/techraj156 Email : [email protected] Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 12191 Tech Raj
Top 5 Facebook Tricks
 
05:57
Hey there! So this will be my first video for the year 2016! This video is a lot special to me, because I worked really very hard in busy schedule to make this out. So, this video features the top 5 working facebook tricks. The tricks are : 1. Edit anything Using this trick, you can edit anything on your timeline or others timeline, or anywhere. The javascript to do that is : javascript:document.body.contentEditable='true'; document.designMode='on'; void 0 Make sure that you manually type in 'javascript:' at the beginning of the code and then hit enter. Please note that once you refresh your page, all the changes will get lost. 2.Upside down Text Go to http://upsidedowntext.com Type in any text there, and you will see the typed text is made upside down, you can copy the upside down text, send it to your friends and have fun with them !! 3.Save Browser You can save the browser and the device which you use everytime to login to your account. So that, whenever anyone else hacks your account and log into it, you will get a notification that your account has been logged into, from an other browser or device. Thereby, you can change your password immediately and protect your account. This is simply a great trick to protect your account from hakcers!! 4.Randos at After you login to your account, In the facebook search, type in 'Randos at' followed by the name of a company or orgnisation (eg google) and hit enter, and then, you can find all the people who are working at that company !! 5.Upside Down English You can change your facebook to upside down!! without using any third party tools!! Just go to your language settings and change your language to 'English(Upside Down)' and save the changes. And Flash!! Your facebook will be upside down !! So those are all the tricks which I found interesting and hence put them in the video. So what was your favourite trick?? Comment below. Do you know anyother facebook trick?? Do comment below!! Thanks For watching Subscribe for more videos Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my facebook page : http://fb.com/techraj156 Follow me on twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Check out my blog : http://blog.techraj156.com Cheers !! ----------------------------------------------------------------------------------------------------------- Music : Daily Beetle by Kevin MacLeod is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...) Source: http://incompetech.com/music/royalty-... Artist: http://incompetech.com/ ----------------------------------------------------------------------------------------------------------- -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 402596 Tech Raj
5 Things You Need To Follow In-Order to Keep Your Online Bank Account Secure
 
08:24
Check out this video to learn about the 5 neccesary things that you need to follow in order to keep your Online Banking Account Safe. Hey There! This is Teja! In this video , I will be teaching you the 5 things that you need to follow to keep your bank account secure. Follow these Instructions, and stay safe from Hackers! Use a good anti-virus and a good firewall which can protect you from online thefts. If you have any doubts regarding this, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Blog : http://blog.techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 5401 Tech Raj
How to Live Stream On Facebook From Your Computer
 
10:21
Go Live on Facebook from your Computer or Laptop using Open Broadcaster Software for FREE! Hey there! Its Teja here! In this video, I will be teaching you how to live stream on your Facebook Page using Open Broadcaster Software(OBS) Link to download OBS Studio(Official) : http://viid.me/qvgnk0 STEPS 1. Firstly, go to 'Studio mode' in your OBS studio 2. Then, go to scene pane and add a new pane or edit the existing defualt pane and rename to "Facebook Live" 3. Now go to 'Sources' pane and Click on the + symbol and select 'Video Capture Device' from the list. Select 'Create New' in the next window and click Ok 4. In the proceding window, select your Webcam and click OK 5. Now add another Source and this time, select 'Audio Input Device' from the list and click Ok. Give a name to it in the next window and then, select your Microphone and finally click Ok 6. You can also add a text to your live video, and to do that select + symbol and then 'Text(GDI+) from the options. Next, you will be able to add a text to your Live video. 7. Now login to your Facebook page, and go to 'Publishing Tools' and then Select 'Video Library' under 'Videos'. Click on 'Live' Button and a window pops up on your screen. 8. In that window, copy the Stream Key and click on next. 9. Switch to your OBS studio and go to Settings, and then to 'Stream' tab and paste the Stream key in the corresponding textbox. In the 'Server' section, select 'Facebook Live' from the drop down menu and apply the changes. 10. Now click on 'Start Streaming' and wait for some time. After some time, OBS will be connected to Facebook, and you will see a 'Go Live' button in your Facebook Page. Simply click on it. That's it, you are now being Broadcasted Live on your Facebook Page. Enjoy! If you have any doubts regarding this video, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj165 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 95492 Tech Raj
Top 5 Hacking Tools Used By Hackers [For Windows, Mac, Linux]
 
06:50
Here are the top 5 hacking tools that are used by Hackers. These tools are available for Windows, Mac Os, and Linux. Hey there! This is Teja! In this video, I will be showing the top 5 hacking tools. Here is the list : aircrack-ng Download : http://viid.me/qvgm9t Watch the tutorial on how to use aircrack-ng : https://www.youtube.com/watch?v=wMUCu4_AoTQ It is a complete suite of tools to access Wi-Fi Security It can crack passwords of Wi-Fi networks which are WEP and Wpa/Wpa2 encrypted by brute forcing. This uses FMS attack which stands for Fluhrer Mantin and Shamir attack It works, firstly by capturing a 4-way handshake with the AP (ie., the Wi-Fi network). The 4-way handshake is obtained by deauthenticating the devices connected to the target, using aireplay-ng And then, it can perform a brute force attack using a wordlist of our choice. Ettercap Available for Linux and Windows. Unfortunately, the windows version is having issues, and it doesn't work fine. Ettercap stands for Ethernet Capture. Ettercap is a comprehensive suite for man in the middle attacks. Using ettercap, you can perform a man in the middle attack, and you can hence, sniff the passwords and usernames from the victim's PC which is on the same network. This tool feauters ARP poisoning. Hackers use this to sniff your personal info by placing themselves as the man in the middle. If once you are infected,then the hacker knows everything that you are doing on your computer. This includes sniffing your online banking details, email credentials and more of your personal data. That is why it is not recommended to connect a public Wi-Fi, because the information that you send over these networks are vulnerable. wireshark Download : http://viid.me/qvgQu7 wireshark is a opensource packet analyzer. It comes with a Graphical User Interface. It is available for Linux, Windows and Mac OS. It comes pre installed with kali linux Wireshark captures the network packets and tries to display them in human readable format . It uses various colour codes inorder to show the information clearly. In simple words, using wireshark you can sniff usernames, passwords and the websites that are visited by a device which is connected to the same netwoork that you are connected to. john the ripper Download : http://viid.me/qvgQbL It is available for linux, windows and mac os once again, it comes preinstalled with kali linux John the ripper is an offline password cracking tool, which is used to crack password hashes. At present, it can crack more than 40 password hash types such as DES, MD5, etc. You just have to mention the password hash of the password which you wanna crack, and john will crack the password hash for you. However, this is a time taking process and it depends on the strength of the password sql map Download : http://viid.me/qvgQFv sqlmap is available for linux , windows and mac. It is pre installed on kali linux sqlmap is an open source penetration testing tool used to exploit SQL injection flaws into database servers. It comes with a powerful detection engine. It can be used for database fingerprinting, data fetching from the database. At present, it can hack MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, HSQLDB and Informix databases. Using this tool, you can fetch a vulnerable website and hack into its database. If you have any doubts regarding this, feel free to comment below Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 93912 Tech Raj
Hacking a Smartphone by simply sending an SMS?
 
09:21
This video shows how easy it is for a hacker to hack your android phone / iOS phone by sending an SMS! Watch an in-depth and practical tutorial on how to do this, on my website : https://techraj156.com/videos DISCLAIMER : This video is only intended to bring awareness in people about how easy it is for someone to hack into your smartphone. The App used in this video is only for Demonstration purpose. This can happen with any app, and not only the one shown in the video. SUBSCRIBE for more awesome videos! Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below. Thanks for watching! Cheers!
Views: 353021 Tech Raj
See what other People are Browsing on your Wi-Fi!
 
06:43
See what websites or services other people are using on your Wi-Fi network with this simple trick. An alternate way(other than the method shown in the video) of doing this is by doing ARP poisoning. To know what is meant by ARP poisoning, and how to do it, watch this video : https://youtu.be/iOZIFaiKf_Q In this video, we will configure our Wi-Fi router to use the OpenDNS as the default DNS. So every DNS request that any device connected to your Wi-Fi sends to OpenDNS , is recorded and it shown to us in our dashboard. In this way, we can see what other people on our Wi-Fi are browing from their devices! Link to OpenDNS : https://opendns.com Download Links for OpenDNS IP Updater For Windows : http://www.opendns.com/download/windows/ For Mac : http://www.opendns.com/download/mac/ For Linux : https://support.opendns.com/hc/en-us/articles/227987727 To change the DNS settings on your Wi-Fi router, you should open your Router's homepage. You can do that by accessing the Default Gateway address of your router. If you don't know the username and password for your Wi-Fi router, perform a quick google search with your router's company and model number, and you will find the default username and password. Every router page has a different UI, to know where the DNS settings are located on your Router's page, you can perform a google search or search through forums on opendns.com Once you are done configuring everything, you must wait atleast 24 hours to start seeing the DNS request reports made by all the devices on your Wi-Fi. You can see these reports on your Cisco Umbrella Dashboard. Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for Watching! Cheers!
Views: 176495 Tech Raj
Ethical Hacking Videos now on Tech Raj!
 
04:14
To watch my Ethical Hacking content, visit my website : https://techraj156.com SUBSCRIBE for more awesome videos! Thanks for watching! Cheers!
Views: 10420 Tech Raj
Visual Basic Tutorial - Create a Simple Login Form [Voice Tutorial]
 
19:18
Hey there! This is Teja In this video, I will be teaching you how to create a simple Login Program in Visual Basic. I will be using Visual Studio 2010 in this video. Sorry for the birds chirping in the background! If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Visit my Blog for written tutorials : http://blog.techraj156.com SUBSCRIBE For more videos. Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 34588 Tech Raj
Track the Location of Anyone On the Internet!
 
07:23
Track the Location of any internet connected device using this simple trick! Hiding location on the internet is impossible unless you use a VPN. In this video, we will learn how to track the location of anyone connected to the Internet. Step 1 : Find their IP address. Use this website to create your own link to record the IP addresses : https://iplogger.org Step 2 : Track the location of the IP. Use this website to track the location of a particular IP address : https://ip-tracker.org If you want to track the web servers of a particular website, use this link to resolve the domain name into IP address, and then track that IP address : http://www.ip-tracker.org/resolve/domain-to-ip.php Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 126909 Tech Raj
How the INTERNET actually works?
 
12:46
Get a basic idea about how the Internet actually works, and how it's very fast. We all use Internet, and it is our responsibility to have basic understanding about how the internet works. The mystery of how internet works is explained in this video. How are we able to stream videos online, make video calls, send emails, download and upload files to websites, and do much more by just connecting to the internet? What exactly is internet? Who owns the internet? Where is the internet located? Find the answers to all these questions by watching this video. Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Don't forget to activate the bell button, to receive updates from me. Thanks for Watching! Cheers!
Views: 8768 Tech Raj
How to Fix any DLL Error on your Computer[d3dx9_43.dll , d3dx9_26.dll ,etc]
 
04:07
Read Complete Written tutorial on my Blog : https://goo.gl/dD4Dl7 Fix " d3dx9_43.dll is Missing from your computer " or " d3dx9_23.dll is Missing from your computer" or any other .dll error on Windows 7/8/10 . This Solution also works for any DLL error on Windows OS. Hey there! This is Teja! In this video, I will be teaching you how to fix D3DX9_43.DLL Missing error in any Windows OS. The basic reason for all the Dynamic Link Library (DLL) errors is that, some .dll which is required to run a specific program is missing from your computer. Hence, whenever you open that specific program, it can't run due to the missing dll file, and results in the error. So, the simplest fix to all of the common DLL errors, is to install all necessary and common DLLs on your computer. You can do this by installing DirectX End-User Runtime Web Installer on your PC. The Link to download it is : https://www.microsoft.com/en-in/download/details.aspx?id=35 Once you install it, the error should be solved. Thank me, by Subscribing! 😙 If you have any doubts regarding this, feel free to comment below Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 3706 Tech Raj
IF YOU USE AN ANDROID PHONE, THEN YOU SHOULD WATCH THIS!
 
05:21
Know a few things about Android that you wouldn't be knowing until now. In this video, I show you a few things that I came to know about Android and which I feel I should share with everyone. This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5 I'm not an Android guy, so please excuse me if there is any error in this video! Comment down below what you think about this video! To all my subscribers out there, please do enable the bell icon beside the subscribe button so that you will get notifications from me. However, YouTube's notification algorithm seems to have some issues and my videos, community posts are not being delivered to my subscribers effectively. So please help me out and activate the bell icon. Let's hope that the issues with notifications will be fixed soon. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 61317 Tech Raj
How To Create Your First Android Application with Java
 
36:53
Create Your First Android Application with Java in Android Studio Integrated Development Environment (I.D.E).The App that I will be making in this video is the simplest one and perfect for beginners. Watch this video till the end to be able to understand it completely. You need some basic knowledge about Java to make an Android App. Hey Guys! Its Teja here! In this video, I will be teaching you how to create your first Android App in Java. In this video, I will be teaching you to make a simple clicker application for Android. This App is simple and it just shows us on what Button we clicked. Its perfect for beginners to get started with this simple application. DESIGN I will be using one TextView and three Buttons in this App, such that the TextView shows us the name of the button on which we clicked. The Three Buttons have the Text "A","B" and "C" respectively. So if we click on the first button with text "A", then the text in the text view is going to change as "A is clicked" and similarly with other two buttons. For simplicity, set the ID's of the three buttons as btn1,btn2 and btn3 respectively and TextView as txt in your activity_main.xml Coding Firstly, we need to add the four elements of the widget library(three buttons and one textview) to our activity_main.xml folder which represents the Layout of our Application. Then we need to link all these four elements to our Main Activity class. The MainActivity class is the first thing that is going to be executed when our Android App is executed. In the MainActivity class, we need to import the widget java package to be able to use the three buttons and one TextView that we used in the xml file(our Application Layout) To import the button class from the Widget library, use the code : import android.widget.Button; To import the TextView class from the widget Library, use the code : import android.widget.TextView; After importing these, you have to declare these in your Main Activity class. You can do that by simply saying : Button buttonA; Button buttonB; Button buttonC; TextView txtView; So, by the above four java declaration statements we declared three buttons and one text view. buttonA, buttonB and buttonC are the variable names of the three buttons of Button Datatype corresponding to the ID's btn1,btn2,btn3 respectively in activity_main.xml. txtView is the variable name for the TextView corresponding to the ID txt in activity_main.xml. The next thing is to set OnClick Listener to the three buttons. You can do so by typing : buttonA.setOnClickListener(this); buttonB.setOnClickListener(this); buttonC.setOnClickListener(this); Make sure that you implement OnClickListener to your MainActivity class. Now we can programatically know whenever the user clicks on any of the three buttons since we are listening to the clicks using OnClickListener. Next thing is, perform some activity whenever the user clicks on a Button in our Applciation. So, start a OnCreate method. This OnCreate method is going to be executed whenever the user clicks on any of the three buttons. And then, we are going to change the text of the textView basing on what button the user clicked using the setText() method. You can simply say : txtView.setText("text of the button that is clicked"); Thats it! Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj156.com Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : [email protected] Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 207089 Tech Raj
How to Recover Deleted WhatsApp Messages in Android - 2016
 
05:47
Hey there! So, I am back with another tutorial. This time, I will show you to recover your lost WhatsApp Messages. This is a very easy trick, just follow me carefully. Please do not message me on WhatsApp to that number, I actually did not notice that my number is visible at one point to of the video. Sorry for the bad Audio quality, you can expect better Audio quality in my Upcoming videos. If you have any doubts regarding this video , feel free to comment below! I will try my best to help you. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj156 You can post or message to my facebook page, about any tech queries, I will reply you As Soon As Possible! Feel free to Email me : [email protected] Visit my Website : http://techraj156.com Subscribe to my Newsletter on my Official Website SUBSCRIBE to my channel for more videos!! Thanks For Watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 93560 Tech Raj
The Secret to Learn any Programming Language - Logic Building [Part 1/2]
 
34:25
The secret to learn ANY PROGRAMMING LANGUAGE easily is here...... By watching this video, you can learn how to build your own logic, and write your own computer program in ANY PROGRAMMING LANGUAGE. Hey there! This is Teja! In this video, I will be teaching you, how to build a logic and thus write code in any programming language. Please watch the video until the end, for clear understanding. Link to Part 2 : https://youtu.be/IamoK8YPxh8 Written Tutorial on Blog : [Coming Soon] NOTE : The intention of this video , is to teach you the logic, but not any particular Programming language. Once you know the logic, you can learn any language easily in a matter of days. Like my Facebook Page : https://fb.com/techraj156 Visit my Website : https://techraj156.com Follow on Instagram : https://instagram.com/teja.techraj Follow On Twitter : https://twitter.com/techraj156 SUBSCRIBE for more programming tutorials. Thanks for Watching, don't forget the part 2. Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 80805 Tech Raj
I Got an Email from Donald Trump? 😱😵[Email Spoofing]
 
07:24
Ever received an email from…. Donal Trump or Christiano Ronaldo or Tom Cruise or some famous personality like that? Well, if you did receive such email, then its probably not from the person you think it can from. I’m not trying to offend you but common how Donald Trump doesn’t even know that you and me even exist. I’m from India BTW. So obviously the email is not from Donal Trump, it is from a fake sender like a spammer or your friend whose only job is to try to fool you in some or the other way.Anyways but how did the fake sender send the email from Donald Trump? OMG did he hack Donald trump’s Email? OF COURSE NOT. What he did is just modify the email header, and replaced his email address with Donald Trumps email address. Well, I’ll explain. Firstly, we call this Email Forging or Email Spoofing where a person can pretend to be some other person and send you an email. In simple words, a spammer can you send you an email from your friend’s email address and all this without gaining access to your friends email account. Let me explain how the spammer does this. Email works on SMTP which stands from Simple Mail Transfer Protocol. Let’s learn how the SMTP works. When you are writing an email, you put in the subject, the message, any attachments and the recipIent’s mail ID. BTW, A recipIent is the one who you want to send the email. Once you click on send, the client which in my case is GMAIL is going to forward this email to the smtp server of Gmail. And obviously the email that you are sending needs to be converted to a particular format so that the SMTP server can understand where to forward this email. So the email is converted into a header which looks something like this. Once the SMTP server receives the email header, it forwards this header to the respective SMTP server of the receiver. For example if the receiver’s email ID is a hotmail ID, then the SMTP server of gmail is going to forward this header to the smtp server of hotmail. Once the header is received by the receiver’s SMTP server, It is again forwarded to the POP3 server of the receiver. POP3 stands for Post Office Protocol and 3 here is the version number. POP3 servers receive emails from the SMTP servers and store them until needed. So when the receiver opens his email client, ie., when he opens his hotmail account, his client is going to pull all the unread emails from the POP3 server. And if you can remember, the email that we sent has reached the POP3 server of the receiver and is stored there. So, the receiver will now retrieve the email that we sent. So this is how email works in a nutshell. But, if you can look closely here at the Email header you can notice that there is no authenticity. Which means there is no factor to ensure that the email is coming from a valid sender. You can see that there is a from: line which holds the email ID of the sender. We can simply replace this From: line and insert any email ID we wish. And as I said earlier there is no factor to ensure that the email is truly coming from that particular sender. Like, for example if at all the email header also consist the password of the sender, then we can be sure that the sender is actually the sender if the password is correct, but if the password is included in the header, then the receiver will also get to know the password of the sender by just looking at the email header. SO obviously we cannot include the password in the email header. So, this means that anyone can simply tamper the email header and insert any email address in the From: line. And thus, they can pretend to be someone else. Obviously, this is a big threat because SMTP lacks authenticity. So, some extra security standards are added. The From field of the Email is now digitally signed and this digital signature is added to the email header when the email is sent from the sender’s side. When received by the receiver, if the digital signature is valid, it means that no data inside the email header is tampered and hence the email is authentic and the sender is really the sender. If the digital signature is not valid, then the email ends up in your spam folder. This is known as DKIM. DKIM uses cryptographic functions to achieve this authenticity. We will learn about these cryptographic functions in some other video. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 66659 Tech Raj
Bypassing Two Factor Authentication (OTP LOGIN)!
 
06:22
Can you bypass OTP login, and somehow get access into your accounts without entering the OTP? Download Dashlane : https://www.Dashlane.com/techraj Get 10% off on the premium version by using the code "techraj" In this video, I've spoken about how can anyone bypass the two factor authentication or two step authentication by session hijacking. I've written a python script which steals the cookies from the browsers of the victim's machine and then sends them to my server where they are stored on my database. I can then access my database and retrieve the stolen cookies, and use them in my request messages to impersonate a user, and thus hijack or hack the session of the user. Remember, malicious apps can easily steal your cookies without your knowledge and can send them to hackers who can then gain access to all your accounts event hough you protect them with Two Factor Authentication Therefore, never download un-trusted apps, or any files from un-trusted websites, and always be aware of what apps are running on your computer. Using a good anti-virus can also help! (not in all the cases, though) Follow on Instagram : https://instagram.com/teja.techraj Like my Facebook Page : https://facebook.com/techraj156 Twitter : https://twitter.com/techraj156 Website : https:/techraj156.com Thanks for Watching! SUBSCRIBE for more videos! Cheers!
Views: 14197 Tech Raj
How to Install Kali Linux on VM Virtual Box [Step By Step Tutorial]
 
14:41
Hey there! This is Teja In this video, I will be teaching you how to install Kali Linux on Oracle VM Virtual Box. In one of my other tutorial, I have shown you how to install Kali Linux alongside windows 7 , that is, to dual boot windows 7 and Kali Linux. Watch the video here : https://www.youtube.com/watch?v=hUM8fwgGtLk ----------------------------------------------------------------------------------- Link to download Oracle VM Virtual Box : https://www.virtualbox.org/wiki/Downloads Link to download Kali Linux ISO File (32 bit or 64 bit) : https://www.kali.org/downloads/ ----------------------------------------------------------------------------------- SUBSCRIBE for more videos Like my Facebook page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Visit my Blog : http://blog.techraj156.com Email me for any queries : [email protected] Thanks for watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 4509 Tech Raj
How to Create a Social Networking Website like Facebook for FREE [EASY]
 
17:09
Read Step By Step Written Tutorial on my Blog : http://blog.techraj156.com/how-to-create-a-social-networking-website-like-facebook-for-free-easy/ Hey there! Its Teja here! In this video, I will be teaching you how to create a social networking website such as Facebook and that too, for free! So, firstly you got to create a domain or a sub-domain for that. If you want to register a domain, then obviously you got to pay for that. But, if you don't want to spend a dime doing it, then you also have an option to register a sub-domain which is absolutely! You can use this website to register a sub-domain(or a domain) : https://cpanel.hostinger.in/auth You can create an account or login directly if you already have one. Here is the link to download Open Source Social Network : https://www.opensource-socialnetwork.org/ This is a pre-created php using which you can create your own social networking website If you have any doubts regarding this video, feel free to comment below! Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 97119 Tech Raj
Is Internet Secure?
 
10:09
Internet as all of us know is a computer network. Information is exchanged between computers which are located globally by the use of Internet. Any two internet connected computers have the ability to communicate with each other by exchanging information. This can be text, image, audio, video, basically anything. And these computers can exchange information in very less time even though they are miles apart. Thanks to the well crafted applications of physics and chemistry we have a decent Internet hardware which falicitates us to make the communication faster. The computers on the Internet are either server computers or client computers. Server computers are those which serve the requests of the client computers and send them the files that they’re requesting. Client computers are those which send requests to server computers asking for files or information. Internet is now becoming almost a common requirement for everyone living on the Earth. Every organisation or company is using Internet to digitalise their work. We are using Internet for online shopping, social networking, to read and send important emails, all of which are worth a lot of money. You know it is serious when we are talking about money. So, if are doing things which are worth money on the Internet, you know Internet should be secure. Just like how banks have a tight security. Internet also must have. So, in this video we will see if Internet is secure and if it is, how secure Internet is. Consider a case where you are logging in to your ONLINE Internet banking account. You visit your bank portal on your browser, put in your username and password and click login. When you click on login , the credentials you entered must be validated to see if they are correct. For this to happen, your credentials are to be sent to the server computer of your bank which may be located miles apart. Your data containing the credentials are broken down into packets and are first sent to your home router, from where they will be forwarded to other routers and packet switches on the Internet. Finally they reach your bank’s server computer where the packets are re-assembled and then the credentials are validated. But notice here that the packets of data Containing your credentials are forwarded to many routers and packet switches before they reach the bank server. This means that your packets of data are almost public while they are transmitted. Anyone can eaves drop on you, and can easily capture these packets of data. Or anyone who owns any one of the router on the path between you and your bank server can reassemble the packets and can read your credentials. And I need not explain what might happen if any one has your bank credentials. This is the same with your email credentials, or Facebook credentials or your payment information that you are sending to some online shopping website or any other critical information. So, is there any way using which we can directly send our data packets to the web sever without any intermediate routers? No, there isn’t. Or at least for now, there is no technology to achieve that. So, what other option is left? We know we can’t prevent anyone eavesdropping us. SO what do we do? We lock our data with a key. Just like how we keep important things in a box and then lock the box with a key and keep the key with us securely. We lock our data with a key before we send it to the Internet, and we keep this key very secure with us. Now, if anyone wants to read our data they need this key to unlock it first. So, even though if someone captured the data that we are sending, they will not be able to read it since it is locked and they need a key to unlock it, and they don’t have it. This is the general theory of Cryptography. One QUESTION arises, what if brute force and guess the private key using our computer. Well, it’s almost impossible to brute force a key. Because that is how these algorithms are all designed. You cannot brute force a key with your home computer .It may take a million years to crack a key with your computer because it involves a lot of processing and a lot of guessing. It is impossible to crack a key with the present technology we have. But who knows in the future computers can be fast enough to crack a key in a matter of minutes may be. We can’t expect how far technology may go. But wait, have you listened about QUANTUM computers? They are expected to be arriving soon or they’ve already arrived?, anyways they are much much much faster than the normal computers that we’re using. And yeah, they are a threat to the current cryptographic techniques that are employed on the Internet. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 3957 Tech Raj
Install Android Marshmallow on PC | Dual Boot Remix OS and Windows [Complete Guide]
 
10:36
Read Step By Step Written Tutorial on my Blog : https://goo.gl/XfOl0H Dual Boot Remix OS on your Computer. This is a complete Guide on how to install Android Marshmallow on your PC! Hey there! Its Teja here! In this video, I will be teaching you how to dual boot remix os with any other Windows Operating Systems. Link to download Remix OS ISO file and PC Installer (Official) : http://www.jide.com/remixos-for-pc Follow the video carefully, so that you will be succesful in installing Remix OS on your PC. If you get an error after selecting Remix OS from the Boot menu, simply open your Boot Device options by tapping on your BIOS key (BIOS key varies for each computer, it depends on the company of the laptop, or the motherboard if you are using a PC. So simple, google your BIOS key) Now select 'Boot From EFI File' and then go to EFI, then to'Remix OS' , and then select 'grubx64.efi' This is going to fix the error. However, most of you will not be seeing this error. If you have any doubts regarding this, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 30734 Tech Raj
Anyone Can Hack Your Facebook Account with this Security Bug!
 
05:51
So, recently Facebook officially announced that It has found a security bug in its code, which affected almost 50 million accounts. Now yeah the number is pretty big, but what’s worse is the bug itself. Link to official announcement from Facebook about this Bug : https://newsroom.fb.com/news/2018/09/security-update/ So, let me get it straight. This security bug allows anyone to login to anyone else’s Facebook account. Which means I can simply login to Mark Zuckerburg’s Facebook account without having to do anything complex. So what is this bug? How dangerous and how dumb is it? Well, if you guys don’t know about the “View As” tool on Facebook, its basically a tool using which you can see how your profile looks from some other person’s Facebook account, so that you can customise your profile accordingly and you get to know how your profile looks from your friend’s Facebook account. Now, this feature is designed only as a view-as interface, which means it is designed only to let people know how their profile looks like from another person’s account. It does not allow anything else than just viewing the profile. This feature is existing from long back on Facebook. And honestly I never used it anytime, because, I don’t know, I never found it useful, anyways. So what happened is, when you go and use the View As tool, and select a specific person to view your profile. It displays a composer box where you can post something on Facebook. Now in this composer box, there exists a component using which you can post birthday wishes to someone. This component of the composer incorrectly gave the user an option to post a video. So, what’s the big deal if you are given an option to post a video? Obviously, this is not going to affect anyone, because if you do post a video, it is still posted on your timeline only. Well, here is the catch. Facebook released a new version of its video uploader, and this video uploader when used with the view-as option, incorrectly and un-intentionally generated the access token of the Facebook Mobile App. But wait, it is not generating your access token here, it is actually generating the access token of the person who you are using to see your profile with the view-as option. Which means, if I am using the view as option to see how my profile looks from Mark Zuckerburg’s Facebook account, then I am actually getting the access token of the Zuckerburg’s Facebook account! And I can simply find this access token in the html of the page, because it is generated there by the video uploader. And if you don’t know what is meant by an access token, it is simply a string value using which you can login to your Facebook account without having to enter your username and password. So, basically using an access token you get access to a Facebook account without the password. I mean, isn’t it quite shocking how a big company like Facebook had this dumb security bug. Like, seriously using this bug anyone can get access to anyone else’s facebook account by just using the view as tool. Nothing else need to be done. Now Facebook announced that it has actually discovered an external actor who has actually exploited this bug on Facebook. Which means that someone has found this bug before Facebook did, which is a bad thing. So, anyways Facebook has now fixed this bug, and it has also logged out people from their Facebook account to make sure that their old access token will be expired, and can’t be used anymore if in case their account is hacked via this security bug. Credits for the part of the video where I showed the View-As tool demonstration : Super Easy Tech Tips (YouTube channel)
Views: 18615 Tech Raj
5 Things You Should NEVER DO on the Internet
 
20:23
Try Dashlane for FREE : https://dashlane.com/techraj And you also can get 10% off on Dashlane premium version by using the above link! These are the 5 things that you should NEVER DO on the Internet. Doing any of these things may compromise your online security and thus your online life might be ruined! Internet is a place where computers communicate with each other globally. It is a very powerful place and it can be a dangerous one too. There are always bad guys on the Internet who try to harm you steal valuable resources from you. You must protect yourselves from such bad guys. To do that, you need to understand cyber security and why it is a critical thing for any Internet user. Watching this video helps inculcate your cyber security knowledge. In the video, I was talking about a malware that entered into my computer. Watch this video to know more about it : https://youtu.be/mQI-I3qbCZ0 To know more about why HTTPS is always preferred, watch this video : https://youtu.be/Az-lNU_wC-A To know more about the Facebook hacking scam, watch this : https://youtu.be/4UQnndQ--Jk Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 9008 Tech Raj
Recover Deleted Files from your Computer/USB/MemoryCard
 
06:27
Best 5 Free SD Card Recovery Software: http://bit.ly/2SXICgc Top 10 Free Memory Card Recovery Apps: http://bit.ly/2SXrpTV Recoverit Free: http://bit.ly/2SXrln9 Use this coupon code to avail discount for one year package : MENBFR18 Black Friday event : http://bit.ly/2A8MMsS In this video, I will teach you how to recover your deleted files using Wondershare RecoverIt. SUBSCRIBE for more awesome videos! Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below. Thanks for watching! Cheers!
Views: 6177 Tech Raj
Searching Arrays in Java - Linear Search and Binary Search | Complete Tutorial
 
40:18
Check out this video to learn about Searching Arrays in Java. There are two techniques of Searching in Java : 1. Linear/Sequential Search - The easiest way to do it, but a little bit time consuming. 2. Binary Search : A more logical way of approach, which is comparatively faster than the Linear Search. In this video, I will be explaining you, each of these searches, in a practical way. Please watch the video completely, to understand the tutorial. Written Tutorial : Coming Soon. Btw, you can check this another blog of mine, to learn about Arrays : https://bluejforicse.wordpress.com/arrays/ Check out this video tutorial, to learn about Sorting technique in Java : https://www.youtube.com/watch?v=ZQ8AaxHnAb0 For more video tutorials on Java Programming, hit the SUBSCRIBE button. Visit My website : https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : http://instagram.com/teja.techraj Follow on Twitte : http://twitter.com/techraj156 Email : [email protected] Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 8851 Tech Raj
Make your Windows PC Voice-Controlled [Jarvis] - 2016
 
09:06
Download and install Jarvis. Hey there! So in this video tutorial, I will be teaching you how to make your Windows PC voice controlled, with a Software named 'Jarvis' [Its now called Links]. DISCLAIMER : I don't have any rights on this software, I am not the programmer of it. So, using this Software, you can give a voice command to your Computer, and expect it to be done. This is similar to Iron man fame 'Jarvis' , which is a Voice - Recognition Software. So here is the official site, from where you can download the software : http://mega-voice-command.com/downloads.html Stay tuned to Tech Raj, for more videos. Hopefully, I will make another video on all the custom commands on Jarvis. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my facebook page : http://fb.com/techraj156 Visit my Website : http://techraj156.com If you have any doubts regarding this video ,Email me at : [email protected] You can ask me for new tutorials, by E-mailing me, or by posting on Facebook Page, or texting me, or even by using the contact form in my Website. Thanks for Watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 486027 Tech Raj
How to block a device from using your Wi-Fi
 
05:35
Hey there!! This is Tech Raj In this tutorial i will be showing you how to block a device from using your Wi-Fi. Please note that since I have a TP LINK Router, i am redirected to TP LINK Page, anyhow, you may be redirected to a different page, it all depends on the Wifi Router you use. If you have found any suspicious device using your Wifi, without your knowledge, then, you can Kick that device Off from using your Wifi. If You have any doubts regarding this video you can feel free to comment below. If You haven't watched my previous tutorial on how to find who are using your Wifi, then watch it at : https://www.youtube.com/watch?v=A9zc_Hfmads ----------------------------------------------------------------------------------------------------------- Please Like My Facebook Page : http://fb.com/techraj156 Please do visit my Website : http://techraj156.com Subscribe For More Videos!! Thanks For Watching !! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 162964 Tech Raj
How to install a uTorrent client in Kali Linux[Any Ver] - 2016
 
03:38
Hey there! This is Tech Raj. So, its been a very long time since i uploaded a new video, this is because i am busy with my board exams. So finally, today i made a new tutorial, and my first tutorial in kali linux. In this video, I will teach you how to install a utorrent client in kali linux and start downloading torrents on kali linux. We will be installing a utorrent client named 'qbittorrent' which is compatible with kali linux. Now, this software is very great and works fine, like all the other utorrent clients such as utorrent, bittorrent,etc. This is a very easy trick, just stay tuned to the video, with all your senses alert! ------------------------------------------------------------------------------------------------ So, here is the link from where you can download the sources list file : http://www.mediafire.com/download/898hf9t2al5wsh4/Sources+list.txt ------------------------------------------------------------------------------------------------ If you have any doubts regarding this video, feel free to comment below, so that I can help you. Ask me for new tutorials by emailing me at : [email protected] Like my facebook page : http://fb.com/techraj156 You can post on my page for any queries, or even message me, I will try my best to give the most satisfying reply to you. So, Thanks For Watching SUBSCRIBE for more videos. Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 35683 Tech Raj
Get Back Your Permanently Deleted Files in a Click!
 
08:48
Hey there! In this video, I will show you how to recover deleted files (images, videos, audio, etc) by using a software called EaseUS Data Recovery Wizard. Download EaseUS Data Recovery wizard : https://goo.gl/BfJj2c Join the EaseUS 14th Anniversary contest to win a iPhone 8 or 500$ : https://goo.gl/PfBf1X How can you recover deleted files from your computer of an external storage device? Well, think of your computer as your brain. When you are thinking about some memory or some incident that you don’t want to think about, you just try to not think about that memory by thinking about something else. That doesn’t mean that you actually forgot that memory. It’s not erased from your brain. You still remember it. You just don’t want to think about that memory, but yeah You will still be able think about that memory if you want to. Computers are exactly the same. When you delete something from your computer, your computer doesn’t instantly forget that file. The file still exists on your computer storage. Your computer just removes the reference of that file so that you will not be able to access it. BUT THE FILE IS STILL THERE. HOW LONG WILL IT BE? Well until some other data is stored on that memory location, the deleted file still exists. You just can’t see the file but it exists. So, it is absolutely possible to recover deleted files using some data recovery software softwares, among which EaseUS is the best EaseUS is an international leading software company in data backup , data recovery and disk management. They have made many useful softwares like Data recovery tools, partition manager, backup and restore, data transfer, etc. But, in this video we will be using EaseUS data recover wizard. This software is available for Windows, MAC, Android and even iOS. So whatever platform you are using you can recover your deleted files using EaseUS data recovery software.
Views: 6913 Tech Raj
How to Access Blocked Websites on College/School Wi-Fi Network
 
04:31
Access blocked websites on your college or school wifi network, with this simple trick. College and school networks basically have firewalls installed (like Fortinet) which act as web filters and block many websites even if they are not inappropriate, so it is really annoying. Here is a simple and easy trick to access any such website which is blocked by the firewall of your network, in just a minute! Go to Rabbit : https://rabb.it Create an account, by filling in the details. Enter the domain which you want to visit in the search box and hit enter. That's it, you are done. The best thing about this trick is that, you can browse web really fast with high download speed(due to rabb.it) and you can download files really quick! Limitation : Using this method, you can't directly download files from a website to your computer. After you download a file, you must upload it to dropbox or one drive, whichever is synced with your computer, and then access the download file. Visit my Website: https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow on Twitter : https://twitter.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Thanks for Watching! SUBSCRIBE for more videos!! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 95390 Tech Raj
Create a Professional Logo in Minutes!
 
08:54
Watch this video to learn how to make a professional logo for your YouTube channel or Website or Business in matter of minutes with no editing skills! You can create a perfect logo for your YouTube channel with this website. Create your own Logo with this website : https://designevo.com Get 80% off on your purchase with this discount code : DEMD55C15 If you want to get a high quality logo from the PLUS package for free of cost, comment down below. The person who is the first to comment asking about the Logo will get the logo for free. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 7913 Tech Raj
Here Is How Your Facebook Account Can Be Hacked !
 
10:11
Hey there! This is Teja. This video features the possibilities in which your Facebook account can be hacked, and provides few tips in order to secure your facebook account. Here are all the possible ways(As per me) in which your facebook account can be hacked : 1.Phishing Phishing is the process of 'Fishing' your Facebook Username and Password by using a clone Facebook website, which looks exactly like facebook, but when login over there, your credentials will be captured by that page, and will be sent to the creator of that Phishing page (Creator of the page is the hacker, in this case) 2.Keylogging Keylogger is a software which can record your keystrokes, including your facebook password. So, when you are using facebook on a Public computer or someone else computer, be aware that they might have installed keylogger on that computer, and it can record your Password when you type in using your Keyboard. 3.Malicious Files Hackers can gain control over your PC, by sending you a malicious file, or when you directly download it from their website unknowingly. They can also hack your Banking Account through this process.So be aware, when you are downloading any file to your computer! 4. Tokens Some Apps or Websites offer you more likes for your facebook posts, pictures, etc., these apps want you to submit your Access Token in their website in order that you login. Once you do it, the Apps can have full control over your Facebook Account. Guess what? they can now post spam from your Account, or use your account to like the status or photos of other unknown persons on Facebook ! 5. Email Recovery You need to keep the Gmail Account (which is linked to your Facebook Account) secure, because using that, anyone can change your password directly. So, if anyone knew the password of your Gmail Account, they will automatically be able to access your Facebook Account too ! 6. Save Password This option is in every modern Web Browser. Using this, you can save the password and username of your Facebook Account. So, if you have saved your Facebook password accidentally, or unknowingly on some one else's computer, then they can easily Login to your account with one click, after you leave the place ! A small correction : After 'Malicious Files' the next tittle is 'Tokens', but in the video the same tittle 'Malicious File' is repeated twice. I apologize for this error in editing, really very SORRY. Please Note it. DISCLAIMER : The video's objective is clearly to create Awarness in you, about how your Facebook Account can be hacked. I am not showing you to do any illegal things, in this video. This video also features several tips by which you can secure your facebook account. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Website : http://techraj156.com Blog : http://blog.techraj156.com Email ID : [email protected] Thanks For Watching !! Cheers!! MUSIC : It's Always Too Late to Start Over by Chris Zabriskie is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) Source: http://chriszabriskie.com/dtv/ Artist: http://chriszabriskie.com/ -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 57968 Tech Raj
Best Windows 7 Desktop Customization [Clock and Weather]
 
10:18
Hey there! This is Tech Raj, and in this tutorial I will be teaching you how to customize your Windows 7 desktop background to the best. In this video, I will be showing you how to make use of Rainmeter. This is a Free and trusted Software to edit your desktop background, with the help of skins. ---------------------------------------------------------------------------------------------------------- Links Link to download Raimeter : https://www.rainmeter.net/ Link to download the Skin : http://injust29.deviantart.com/art/LIM-T-1-2-344112531 Link to IP Location tools : http://iplocationtools.com The desktop background that I have shown you in this video, has been removed from its host, I can't upload it on my own because its not owned by me, so if you want the desktop background, then email me at : [email protected] ---------------------------------------------------------------------------------------------------------- DISCLAIMER : Please note that I am not the author or the owner of any of the tools used in this video (Rainmeter, Rainmeter Skin and Desktop Background) , I donot have any rights on it, but, I am just showing you how to make use of them inorder to make your desktop look cool. ---------------------------------------------------------------------------------------------------------- Please Subscribe, if this video helped you. Also do like my facebook page : http://fb.com/techraj156 IF you have any doubts regarding this video, feel free to comment below, and I will make sure that I will help you. If you want to ask me for any new tutorials, you can email me at : [email protected] Follow me on Google+ : https://plus.google.com/u/0/+TechRaj156 Thanks For Watching !! Cheers !! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 103933 Tech Raj
How to Create Your Own Website For FREE  [Using Weebly]
 
06:06
Hey there! Its Teja here! In this video, I will be teaching you how to create your Website for free! This video is for absolute beginners who dream of having their own website. In this video, I will be using Weebly to show you how to create a free Subdomain and make a professional website of your own. Link to Weebly : http://weebly.com You can also make use of other websites such 000webhost, but unfortunately, at the time of making this video, 000webhost didn't work, but I hope that the issue is fixed now. However, here is the link to 000webhost : http://000webhost.com If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email me for any queries : [email protected] SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 10074 Tech Raj
MY WEBSITE GOT HACKED! [SPAM URL INJECTION]
 
14:31
RECENTLY MY WEBSITE GOT INJECTED BY SPAM INJECTION. I recorded my screen while I'm trying to fix that and clean my website. Finally, I fixed it and in this video I included the screen cast of me fixing this problem along with my voice over. The reason for this URL injection on my website may be because of a malicious plugin which I might've installed, or due to a vulnerability in my website's theme, or due to a vulnerability in Wordpress (very less chances). Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 9045 Tech Raj

Lakes near salem oregon
Crosspoint church el paso
El paso salvage
Truck driving schools in iowa
Trips slim fuego download free