Home
Videos uploaded by user “Tech Raj”
This is How Hackers Crack Passwords!
 
05:44
In this video, we'll see how hackers really crack passwords. This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5 DISCLAIMER : This video is intended only to educate people about how hackers crack passwords, and how important the strength of the password is, when coming to security. If you are using a common password like test123456 which I used in the video, then the hacker will easily be able to know the plain text form of your password from the hash string. There is something known as Rainbow tables. These rainbow tables contain the password hashes of numerous commonly used passwords. So the hacker will be to do a simple search with the password hash that he has, and if the password hash exists in the rainbow table, then that means the password is successfully cracked, and we have the password in a plain text. Remember that rainbow tables contain the password hashes of only the passwords which are commonly used. As a reference, you can go to https://crackstation.net/ If the password is not a commonly used password, then there comes dictionary attack and brute force attack. In dictionary attack, you have a wordlist. A wordlist is nothing but a huge text file with loads of passwords. In this attack, the hacker writes a code which compares the password hash to be cracked, with the password hash of each and every password that exists in the wordlist. Now, this attack can be target-specific as well. which means we can build a wordlist targeting an individual provided that we know some basic details about him/her. In a brute force attack, each and every combination of letters ,symbols and numbers are converted into their hash forms, and are then compared with the hash to be cracked. This is a more expensive. A new technique called salting is introduced by security analysts to give hackers a hard time in cracking passwords. In this technique, a specific combination of characters are inserted at specific positions of the plain text password before hashing. Every company has its own salting algorithm, and they don’t make their salting algorithm public For example, kets say Facebook salting algorithm inserts the string f&2p at the beginning, after the third character, and at the end of the plain text password. After salting the password, the salted password is then hashed by a hashing algorithm. So when salting is used, rainbow tables are of no use even if the password to be cracked is a weak commonly used password. Because the hashe of the password without salting do not match the hash of the password which is salted Also, brute force and dictionary attack are not effective to crack salted passwords unless the hacker already knows the salting algorithm employed by a company. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 4102616 Tech Raj
Website Hacking - What is Cross Site Scripting (XSS)?
 
06:01
Cross site scripting(XSS) is a very serious issue faced by big companies like Facebook, Twitter, Google, Microsoft, etc in the past. XSS is still a very major vulnerability faced by many websites on the Internet these days. So, what is this Cross site scripting? Why is it soo dangerous? In XSS, an attacker injects malicious script in a webpage’s source code. A website is vulnerable to XSS if the user input is not treated properly, and if the html tags are not escaped. The script tag in html is used to include javascript in webpages. Javascript is browser oriented, which means your browser will execute this javascript code whatever is written in the webpage’s HTML. A hacker can make use of XSS to inject malicious javascript. With this javascript, he can display popups on the website, deface the website, and many more…. The worst thing is that a hacker can also steal users cookies by injecting a malicious javascript code into the webpage’s HTML. What this javascript can do is, it steals the users cookies and sends it to the hacker’s database. Though no text appears once the comment is posted, the malicious javascript is actually injected to the webpage’s HTML and it is ready to steal cookies of people. If you don’t know what are cookies and how critical they are, just do a google search. Briefly, cookies are some strings used by websites to identify their users. So, if a hacker has your cookies, he can impersonate you on that particular website. In simple words, if the hacker steals your Facebook cookies, he will be able to login to your Facebook account without entering your password. Image If this vulnerability existed in Facebook now, taking over user’s Facebook accounts would have been as easy as making a comment under a Facebook post with a simple line of javascript! Whenever someone sees this Facebook post with your comment, their cookies are sent to your database and their account is compromised. Obviously Facebook or Twitter or any big company is not vulnerable to this kind of simple XSS now , but there are times when these sites are actually vulnerable to this simple attack and sh*t happened! And yes, there are many websites on the Internet which are still vulnerable to XSS. And they must be fixed ASAP to maintain their web security. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 17473 Tech Raj
How to create a new drive in Windows7 || Create a new Partition
 
07:52
Hey guys , in this tutorial i am gonna show you how to create a new partition to your hard disk in windows 7, i am also gonna show you how to delete created partitions from your hard drive. Like my fb page : http://facebook.com/techraj156 Email me if you have any doubts : anonymoushacker156@gmail.com Visit my blog : http://techraj156.blogspot.com Please Like, Feel free to Comment Please Subscribe !! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 30429 Tech Raj
How to Download and Install Java JDK on Windows 7/8/10
 
08:37
Hey There! This is Teja! In this video, I will be teaching you how to download and Install Java Development Kit (JDK) on Windows 7 or Windows 8 or Windows 10. Link to download JDK : (Official Oracle Website) http://www.oracle.com/technetwork/java/javase/downloads/index.html You might need to install Java to run some programs (which are only compatible with Java), and for other purposes like coding. If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com Visit my Website : http://techraj156.com Email me : anonymoushacker156@gmail.com Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 91684 Tech Raj
Read Deleted WhatsApp Messages with this Simple Trick!
 
03:50
Read the recalled messages on WhatsApp easily with this simple trick. Gihosoft TubeGet: https://goo.gl/a7AK4P Easy to Download 4K/8K Videos from YouTube on Windows & Mac! Gihosoft iPhone Data Recovery https://goo.gl/LF7B13 Donate to me : https://paypal.me/techraj156 Watch UPDATED video here : https://youtu.be/EACR7j87HSU WhatsApp bought a new feature where you can delete a sent message on both the ends of the chat. But, there is something you can do to read the deleted messages, only if you are using an Android device. Android saves all the notifications from different apps (like whatsapp, facebook, instagram, etc) in a notification log, until the device is rebooted. So, when someone sends you a message on whatsapp, it gets stored in the notification log (since you get a notification on your device), and if the same message was deleted by the other end, the message still exists in the notification log. So, we can just open the notification log on our android device, and read the saved notifications from whatsapp, which will contain the deleted message. You can read the notification log with this App named : Notification History Link : https://play.google.com/store/apps/details?id=com.evanhe.nhfree Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com Thanks for watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 11149126 Tech Raj
Access Your Computer from anywhere on the Internet!
 
10:39
Access your computer from anywhere on the Internet by following this simple tutorial! In this video, I will teach you how to make your own computer as a server, and connect it to the Internet as a server. You don't need to have a static IP to achieve this. DOWNLOAD LINKS : Download python : https://python.org Download PIP : https://pip.pypa.io/en/stable/installing/ Create ngrok account and download the tool : https://ngrok.com Download my script : https://github.com/teja156/simplefileaccess First off, we are creating a simple http server in python (by using my script). This script will run on localhost and port 1560. We then use ngrok to create a secure tunnel from localhost:1560 to the ngrok server. By doing this, our localhost can be accessed from the Internet. When someone access the ngrok server with our port number, they are going to be taken to our localhost where the python script is running. This python script provides access to a particular directory on our computer. In this way, we can access our computer from any device on the Internet through ngrok. For more information about how the script works, visit the github page. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 14662 Tech Raj
Install Kali Linux Alongside Windows 7 | Dual Boot Kali Linux and Windows 7 [Step By Step Guide]
 
13:07
Hey there! This is Teja. In this video tutorial, I will be teaching you how to install kali linux alongside windows 7, that is, how to dual boot kali linux and windows 7 from the same hard disk. Please follow the video carefully, because we are trying to do some serious stuff, and if anything goes wrong in this process, you are going to loose all your files, and you may end up with no Operating System on your hard disk. Sorry for the bad Video quality. ------------------------------------------------------------------------- Step 1 : Download Kali Linux ISO Image : http://kali.org/downloads Step 2 : Download Universal USB Installer : http://pendrivelinux.com Step 3 : Create a Partition on your Hard disk for Kali Linux. Step 4 : Install Kali Linux alongside Windows 7 ------------------------------------------------------------------------- SUBSCRIBE for more Videos!! If you have any doubts regarding this, feel free to comment below! Follow me on Instagram : https://www.instagram.com/teja.techraj/ Follow me on Twitter : http://twitter.com/techraj156 Like my Facebook Page : http://fb.com/techraj156 Visit my Website : http://techraj156.com Email me for new tutorials : anonymoushacker156@gmail.com Thanks for Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 182400 Tech Raj
How to check who are using your Wi-Fi [ No Software Needed]
 
04:05
Hey there! This is Tech Raj. So, in this tutorial i will show you how to find all the devices which are using or connected to your Wifi. Now, this trick helps you to find whether if any unknown device is using your Wifi without your Knowledge. This is a very easy trick, but please note that if you have any wifi router other than TP- Link, then you got to search for the options that i showed you in this video. ----------------------------------------------------------------------------------------------------------- I am not showing you how to find the devices connected to your Wifi, by using any private Softwateres, instead, i am showing you how to do it manually without the use of any software, as those softwares MAY be malicious, and MAY harm your Computer. Like my Facebook Page : http://fb.com/techraj156 Visit my Website : http://techraj156.com Email me at : anonymoushacker156@gmail.com Thanks For watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 5185 Tech Raj
A PROXY VIRUS CAN DO THIS! HOW EASY... 😲
 
06:43
To learn about what is a USB Rubber Ducky, watch this video : https://goo.gl/4y8g3y A week back I’m browsing Internet on my Windows PC and all of a sudden I couldn’t access the internet. There is no problem with the Internet connection as all of my other devices are still able to access the Internet. So, I checked the proxy settings on my Windows PC and realised that a proxy address is created without my knowledge. I immediately turned off the proxy and tried accessing the Internet but still I couldn’t access it. I checked my proxy settings and my proxy is again automatically turned on. I then realised that it is a malware trying to turn on my proxy settings automatically. I somehow got rid got rid of the malware. But I want to show you guys why it is so bad if your PC is connected to a proxy without your knowledge. So, I decided to create a malware like that myself and show you how it works and what It does. First, I’ve written a python script which will listen to the address 127.0.0.1 (which is localhost) and on the port 1560. So if we just change the proxy settings of a PC to this address and port, our script can receive and send the data to the browsers. Once the data is received by my script, I’m forwarding this data to a particular host on a particular port number. This particular host and particular port is going to be the server of the attacker (in this case, me). Once my script sends the data to the server, it also waits for a response back from the server. Once it receives the response back from the server, it forwards this response to the web browser of the PC. So, this makes a simple python script which is to be run on the victim’s PC (which in this case, Is my friend’s PC). I will now save this script on the Internet so that it can be downloaded when needed on to the victim’s PC Now I need to write another script which will capture or sniff the data that the script on victim’s PC is sending. This script should be run on a server, so that the data can be received and sent to the victim’s PC from anywhere on the Internet at any time. But since I don’t have a personal server, I will use my MacBook as the server with the help of ngrok. Using ngrok I first create a secure tunnel from my localhost to the ngrok server. By doing this, my localhost will be accessible anywhere on the Internet with the address of ngrok and a unique port number. I then write the script which needs to be run on the attacker’s machine in-order to act as a man in the middle and sniff data. First I’m listening to 127.0.0.1 and port 1234. Also remember that I’ve already configured ngrok to create a tunnel from my localhost with port 1234 to ngrok’s server. So, whenever I’m listening to 127.0.0.1 with port 1234 it means that I’m actually listening to the secure tunnel which I created. And the end of this secure tunnel is available to connect for any device on the Internet(including the victim’s PC) I’m receiving the data from this secure tunnel(127.0.0.1 : 1234) and then retrieving the url from the data. Then I’m connecting to that particular web server usually with the port 80(for HTTP connections) and sending the data to it. I also wait for responses from the particular web server, and then forward this response to the secure tunnel. The script running on the victim’s computer is then going to receive this response since it is connected to the end of the secure ngrok tunnel. It then forwards it to the browser. In this way I made a simple proxy server and also managed to act like a man in the middle and inspect or sniff or terminate all the HTTP data that is sent or received by the victim’s PC. So I have written a USB rubber ducky script which will automatically change the proxy settings to connect to 127.0.0.1 and port 1560 on the victim’s PC as soon as I plugin the rubber ducky into the victim’s PC, and it will then download the script from the Internet and then executes the script. So, in less than 20 seconds our backdoor will be running on the victim’s PC. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 7724 Tech Raj
Hacking a Smartphone by simply sending an SMS?
 
09:21
This video shows how easy it is for a hacker to hack your android phone / iOS phone by sending an SMS! Watch an in-depth and practical tutorial on how to do this, on my website : https://techraj156.com/videos DISCLAIMER : This video is only intended to bring awareness in people about how easy it is for someone to hack into your smartphone. The App used in this video is only for Demonstration purpose. This can happen with any app, and not only the one shown in the video. SUBSCRIBE for more awesome videos! Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below. Thanks for watching! Cheers!
Views: 146367 Tech Raj
How to view saved Wi-Fi Passwords in Windows 7
 
01:53
Hey there!! This is Tech Raj, and in this short tutorial, i will teach and you will learn about how to view saved Wifi passwords in Windows 7. It is very easy to view the passwords of saved wifi networks (saved in the sense, when you already connected to those Wifi networks, by entering a correct Wifi Password) You can simply view your saved Wifi Passwords by following these steps : 1.Go to your Control Panel 2.Select 'Network and Internet' 3.Under 'Network and Sharing center', select 'View network status and tasks' 4.In the Right side of the screen, you will find an option which says 'Manage Wireless Networks', click on that. 5.Then, you will see a list of saved Wifi networks, from that list, right click on the network, whose password you want to see, and select 'Properties' 6.A Window pops up, in that window, go to 'Security Tab', and there, you will find a text field which contains the password of that network, under that text field, you will find a check box, which says 'Show hidden Characters', just check that check box, and then, the password will be visible. Show your thanks by Subscribing me !! Like my Facebook page : http://fb.com/techraj156 Visit my Website : http://techraj156.com If you have any doubts regarding this video, you can feel free to comment below. You can ask me for any new tutorials by emailing me at : anonymoushacker156@gmail.com Thanks for watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 314599 Tech Raj
See what other People are Browsing on your Wi-Fi!
 
06:43
See what websites or services other people are using on your Wi-Fi network with this simple trick. An alternate way(other than the method shown in the video) of doing this is by doing ARP poisoning. To know what is meant by ARP poisoning, and how to do it, watch this video : https://youtu.be/iOZIFaiKf_Q In this video, we will configure our Wi-Fi router to use the OpenDNS as the default DNS. So every DNS request that any device connected to your Wi-Fi sends to OpenDNS , is recorded and it shown to us in our dashboard. In this way, we can see what other people on our Wi-Fi are browing from their devices! Link to OpenDNS : https://opendns.com Download Links for OpenDNS IP Updater For Windows : http://www.opendns.com/download/windows/ For Mac : http://www.opendns.com/download/mac/ For Linux : https://support.opendns.com/hc/en-us/articles/227987727 To change the DNS settings on your Wi-Fi router, you should open your Router's homepage. You can do that by accessing the Default Gateway address of your router. If you don't know the username and password for your Wi-Fi router, perform a quick google search with your router's company and model number, and you will find the default username and password. Every router page has a different UI, to know where the DNS settings are located on your Router's page, you can perform a google search or search through forums on opendns.com Once you are done configuring everything, you must wait atleast 24 hours to start seeing the DNS request reports made by all the devices on your Wi-Fi. You can see these reports on your Cisco Umbrella Dashboard. Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for Watching! Cheers!
Views: 73526 Tech Raj
How to Live Stream On Facebook From Your Computer
 
10:21
Go Live on Facebook from your Computer or Laptop using Open Broadcaster Software for FREE! Hey there! Its Teja here! In this video, I will be teaching you how to live stream on your Facebook Page using Open Broadcaster Software(OBS) Link to download OBS Studio(Official) : http://viid.me/qvgnk0 STEPS 1. Firstly, go to 'Studio mode' in your OBS studio 2. Then, go to scene pane and add a new pane or edit the existing defualt pane and rename to "Facebook Live" 3. Now go to 'Sources' pane and Click on the + symbol and select 'Video Capture Device' from the list. Select 'Create New' in the next window and click Ok 4. In the proceding window, select your Webcam and click OK 5. Now add another Source and this time, select 'Audio Input Device' from the list and click Ok. Give a name to it in the next window and then, select your Microphone and finally click Ok 6. You can also add a text to your live video, and to do that select + symbol and then 'Text(GDI+) from the options. Next, you will be able to add a text to your Live video. 7. Now login to your Facebook page, and go to 'Publishing Tools' and then Select 'Video Library' under 'Videos'. Click on 'Live' Button and a window pops up on your screen. 8. In that window, copy the Stream Key and click on next. 9. Switch to your OBS studio and go to Settings, and then to 'Stream' tab and paste the Stream key in the corresponding textbox. In the 'Server' section, select 'Facebook Live' from the drop down menu and apply the changes. 10. Now click on 'Start Streaming' and wait for some time. After some time, OBS will be connected to Facebook, and you will see a 'Go Live' button in your Facebook Page. Simply click on it. That's it, you are now being Broadcasted Live on your Facebook Page. Enjoy! If you have any doubts regarding this video, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj165 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 90550 Tech Raj
Earn Money From Home Online (5 Simple Ways)
 
08:03
Check out these 5 simple ways to make money from your home online. By following these methods, you can start making money without investing a dime! Hey there! Its Teja here! In this video, I will be teaching you the 5 simple ways to earn monwy online, right from your home! Here are the methods that I featured in the video : 1. FreeLancer Go to : https://freelancer.in This is a very famous website in which millions of people find their income, from their homes. You can register for a freelancer account, and once you log in, you will find various projects related to website building, logo designing, data entry, marketing, etc. You can choose the project in which you are skilled, get the work done, and earn the money. 2. iWriter Go to : http://iwriter.com In this website, you can earn money by writing articles. Register for an account, and after you login, you will find many projects. Choose a project, write the article according to the guidelines and submit it. If your article satisifies the person who posted that article, you will be paid. 3. Youtube You can create a youtube channel and upload videos following your passion, for free. Once your channel exceeds 10,000 views, you can make money from your videos. You can do this by using the Google Adsense Program. So you need to register for Adsense firstly. 4. Website / Blog You can build your own website or blog, and start posting articles on it. Now, you can register for Google Adsense, and then place ads on your website or blog. Basing on the clicks and views the ads displayed on your blog gets, google pays you. To create a blog/website you can make use of these two popular services : Google Blogspot : https://blogger.com Wordpress : https://wordpress.com Create a domain for yourself, start posting articles, maintain the SEO, and start earning money. Remember, that this takes time, and requires a lot of hard work, just like all the other methods. 5. Instagram You can make money from your instagram account, by promoting various product's on your Instagram account. You need to have atleast 1,000 followers on instagram to do it. Go to Grape Vine Logic : http://grapevinelogic.com Register for a new account, and once your account gets approved, you can view offers posted by various companies. Apply for any campaign, promote their product, and thus make money. SUBSCRIBE for more videos. Visit My website : https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : http://instagram.com/teja.techraj Follow on Twitter : http://twitter.com/techraj156 Email : anonymoushacker156@gmail.com Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 10471 Tech Raj
Top 5 Facebook Tricks
 
05:57
Hey there! So this will be my first video for the year 2016! This video is a lot special to me, because I worked really very hard in busy schedule to make this out. So, this video features the top 5 working facebook tricks. The tricks are : 1. Edit anything Using this trick, you can edit anything on your timeline or others timeline, or anywhere. The javascript to do that is : javascript:document.body.contentEditable='true'; document.designMode='on'; void 0 Make sure that you manually type in 'javascript:' at the beginning of the code and then hit enter. Please note that once you refresh your page, all the changes will get lost. 2.Upside down Text Go to http://upsidedowntext.com Type in any text there, and you will see the typed text is made upside down, you can copy the upside down text, send it to your friends and have fun with them !! 3.Save Browser You can save the browser and the device which you use everytime to login to your account. So that, whenever anyone else hacks your account and log into it, you will get a notification that your account has been logged into, from an other browser or device. Thereby, you can change your password immediately and protect your account. This is simply a great trick to protect your account from hakcers!! 4.Randos at After you login to your account, In the facebook search, type in 'Randos at' followed by the name of a company or orgnisation (eg google) and hit enter, and then, you can find all the people who are working at that company !! 5.Upside Down English You can change your facebook to upside down!! without using any third party tools!! Just go to your language settings and change your language to 'English(Upside Down)' and save the changes. And Flash!! Your facebook will be upside down !! So those are all the tricks which I found interesting and hence put them in the video. So what was your favourite trick?? Comment below. Do you know anyother facebook trick?? Do comment below!! Thanks For watching Subscribe for more videos Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my facebook page : http://fb.com/techraj156 Follow me on twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Check out my blog : http://blog.techraj156.com Cheers !! ----------------------------------------------------------------------------------------------------------- Music : Daily Beetle by Kevin MacLeod is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...) Source: http://incompetech.com/music/royalty-... Artist: http://incompetech.com/ ----------------------------------------------------------------------------------------------------------- -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 396667 Tech Raj
Top 5 Computer Hacks You Can Try At Your Home!
 
07:04
Top 5 Computer hacks that you can give a try! This video features the top 5 best, free and safe computer hacks that anyone can try at their homes. Hey there! My name is Teja. These are the 5 computer hacks that I featured in the video : 1. Manage passwords with face recognition Download Intel True Key : https://www.truekey.com/ Using this software, you can login to any website, by just scanning your face using your webcam. In such a way, you can ensure your security and at the same time, say good bye to the hassle of passwords. 2. Lock your computer with a USB drive Download Predator : https://www.predator-usb.com//predator/en/index.php?n=Main.Download Using this tool, you can lock your computer using your USB, the computer gets unlocked only if you connect the USB or enter the Master Password 3. Change start button on Windows Download Classic Start Menu : http://www.classicshell.net/ Using this you can set any image of your choice as the start button on your Windows PC, follow the video for further guidance. 4. Create Fake Harmless Virus to prank your friends Download the vbs code : https://www.mediafire.com/?7orqctn7eftm31h Follow the steps shown in the video, to prank your friends usng this Simple VB Script. Remember, it is completely harmless. To stop this virus, go to task Manager, and then go to 'Details' tab, and search for 'wscript.exe' and end the process tree. 5. Turn off your computer directly without loosing Unsaved work. Follow the steps in the video to enable 'Hibernate' mode in Windows. Now, you can turn your computer off without loosing any changes. Your computer will consume zero battery when you hibernate it, and at the same time, restores the Computer state when turned on. Visit my Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching ! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 10090 Tech Raj
Install Android Marshmallow on PC | Dual Boot Remix OS and Windows [Complete Guide]
 
10:36
Read Step By Step Written Tutorial on my Blog : https://goo.gl/XfOl0H Dual Boot Remix OS on your Computer. This is a complete Guide on how to install Android Marshmallow on your PC! Hey there! Its Teja here! In this video, I will be teaching you how to dual boot remix os with any other Windows Operating Systems. Link to download Remix OS ISO file and PC Installer (Official) : http://www.jide.com/remixos-for-pc Follow the video carefully, so that you will be succesful in installing Remix OS on your PC. If you get an error after selecting Remix OS from the Boot menu, simply open your Boot Device options by tapping on your BIOS key (BIOS key varies for each computer, it depends on the company of the laptop, or the motherboard if you are using a PC. So simple, google your BIOS key) Now select 'Boot From EFI File' and then go to EFI, then to'Remix OS' , and then select 'grubx64.efi' This is going to fix the error. However, most of you will not be seeing this error. If you have any doubts regarding this, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 28872 Tech Raj
Top 5 Hacking Tools Used By Hackers [For Windows, Mac, Linux]
 
06:50
Here are the top 5 hacking tools that are used by Hackers. These tools are available for Windows, Mac Os, and Linux. Hey there! This is Teja! In this video, I will be showing the top 5 hacking tools. Here is the list : aircrack-ng Download : http://viid.me/qvgm9t Watch the tutorial on how to use aircrack-ng : https://www.youtube.com/watch?v=wMUCu4_AoTQ It is a complete suite of tools to access Wi-Fi Security It can crack passwords of Wi-Fi networks which are WEP and Wpa/Wpa2 encrypted by brute forcing. This uses FMS attack which stands for Fluhrer Mantin and Shamir attack It works, firstly by capturing a 4-way handshake with the AP (ie., the Wi-Fi network). The 4-way handshake is obtained by deauthenticating the devices connected to the target, using aireplay-ng And then, it can perform a brute force attack using a wordlist of our choice. Ettercap Available for Linux and Windows. Unfortunately, the windows version is having issues, and it doesn't work fine. Ettercap stands for Ethernet Capture. Ettercap is a comprehensive suite for man in the middle attacks. Using ettercap, you can perform a man in the middle attack, and you can hence, sniff the passwords and usernames from the victim's PC which is on the same network. This tool feauters ARP poisoning. Hackers use this to sniff your personal info by placing themselves as the man in the middle. If once you are infected,then the hacker knows everything that you are doing on your computer. This includes sniffing your online banking details, email credentials and more of your personal data. That is why it is not recommended to connect a public Wi-Fi, because the information that you send over these networks are vulnerable. wireshark Download : http://viid.me/qvgQu7 wireshark is a opensource packet analyzer. It comes with a Graphical User Interface. It is available for Linux, Windows and Mac OS. It comes pre installed with kali linux Wireshark captures the network packets and tries to display them in human readable format . It uses various colour codes inorder to show the information clearly. In simple words, using wireshark you can sniff usernames, passwords and the websites that are visited by a device which is connected to the same netwoork that you are connected to. john the ripper Download : http://viid.me/qvgQbL It is available for linux, windows and mac os once again, it comes preinstalled with kali linux John the ripper is an offline password cracking tool, which is used to crack password hashes. At present, it can crack more than 40 password hash types such as DES, MD5, etc. You just have to mention the password hash of the password which you wanna crack, and john will crack the password hash for you. However, this is a time taking process and it depends on the strength of the password sql map Download : http://viid.me/qvgQFv sqlmap is available for linux , windows and mac. It is pre installed on kali linux sqlmap is an open source penetration testing tool used to exploit SQL injection flaws into database servers. It comes with a powerful detection engine. It can be used for database fingerprinting, data fetching from the database. At present, it can hack MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, HSQLDB and Informix databases. Using this tool, you can fetch a vulnerable website and hack into its database. If you have any doubts regarding this, feel free to comment below Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 78362 Tech Raj
How to Recover Deleted WhatsApp Messages in Android - 2016
 
05:47
Hey there! So, I am back with another tutorial. This time, I will show you to recover your lost WhatsApp Messages. This is a very easy trick, just follow me carefully. Please do not message me on WhatsApp to that number, I actually did not notice that my number is visible at one point to of the video. Sorry for the bad Audio quality, you can expect better Audio quality in my Upcoming videos. If you have any doubts regarding this video , feel free to comment below! I will try my best to help you. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj156 You can post or message to my facebook page, about any tech queries, I will reply you As Soon As Possible! Feel free to Email me : anonymoushacker156@gmail.com Visit my Website : http://techraj156.com Subscribe to my Newsletter on my Official Website SUBSCRIBE to my channel for more videos!! Thanks For Watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 92005 Tech Raj
Track the Location of Anyone On the Internet!
 
07:23
Track the Location of any internet connected device using this simple trick! Hiding location on the internet is impossible unless you use a VPN. In this video, we will learn how to track the location of anyone connected to the Internet. Step 1 : Find their IP address. Use this website to create your own link to record the IP addresses : https://iplogger.org Step 2 : Track the location of the IP. Use this website to track the location of a particular IP address : https://ip-tracker.org If you want to track the web servers of a particular website, use this link to resolve the domain name into IP address, and then track that IP address : http://www.ip-tracker.org/resolve/domain-to-ip.php Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 96777 Tech Raj
The Secret to Learn any Programming Language - Logic Building [Part 1/2]
 
34:25
The secret to learn ANY PROGRAMMING LANGUAGE easily is here...... By watching this video, you can learn how to build your own logic, and write your own computer program in ANY PROGRAMMING LANGUAGE. Hey there! This is Teja! In this video, I will be teaching you, how to build a logic and thus write code in any programming language. Please watch the video until the end, for clear understanding. Link to Part 2 : https://youtu.be/IamoK8YPxh8 Written Tutorial on Blog : [Coming Soon] NOTE : The intention of this video , is to teach you the logic, but not any particular Programming language. Once you know the logic, you can learn any language easily in a matter of days. Like my Facebook Page : https://fb.com/techraj156 Visit my Website : https://techraj156.com Follow on Instagram : https://instagram.com/teja.techraj Follow On Twitter : https://twitter.com/techraj156 SUBSCRIBE for more programming tutorials. Thanks for Watching, don't forget the part 2. Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 64069 Tech Raj
How To Create Your First Android Application with Java
 
36:53
Create Your First Android Application with Java in Android Studio Integrated Development Environment (I.D.E).The App that I will be making in this video is the simplest one and perfect for beginners. Watch this video till the end to be able to understand it completely. You need some basic knowledge about Java to make an Android App. Hey Guys! Its Teja here! In this video, I will be teaching you how to create your first Android App in Java. In this video, I will be teaching you to make a simple clicker application for Android. This App is simple and it just shows us on what Button we clicked. Its perfect for beginners to get started with this simple application. DESIGN I will be using one TextView and three Buttons in this App, such that the TextView shows us the name of the button on which we clicked. The Three Buttons have the Text "A","B" and "C" respectively. So if we click on the first button with text "A", then the text in the text view is going to change as "A is clicked" and similarly with other two buttons. For simplicity, set the ID's of the three buttons as btn1,btn2 and btn3 respectively and TextView as txt in your activity_main.xml Coding Firstly, we need to add the four elements of the widget library(three buttons and one textview) to our activity_main.xml folder which represents the Layout of our Application. Then we need to link all these four elements to our Main Activity class. The MainActivity class is the first thing that is going to be executed when our Android App is executed. In the MainActivity class, we need to import the widget java package to be able to use the three buttons and one TextView that we used in the xml file(our Application Layout) To import the button class from the Widget library, use the code : import android.widget.Button; To import the TextView class from the widget Library, use the code : import android.widget.TextView; After importing these, you have to declare these in your Main Activity class. You can do that by simply saying : Button buttonA; Button buttonB; Button buttonC; TextView txtView; So, by the above four java declaration statements we declared three buttons and one text view. buttonA, buttonB and buttonC are the variable names of the three buttons of Button Datatype corresponding to the ID's btn1,btn2,btn3 respectively in activity_main.xml. txtView is the variable name for the TextView corresponding to the ID txt in activity_main.xml. The next thing is to set OnClick Listener to the three buttons. You can do so by typing : buttonA.setOnClickListener(this); buttonB.setOnClickListener(this); buttonC.setOnClickListener(this); Make sure that you implement OnClickListener to your MainActivity class. Now we can programatically know whenever the user clicks on any of the three buttons since we are listening to the clicks using OnClickListener. Next thing is, perform some activity whenever the user clicks on a Button in our Applciation. So, start a OnCreate method. This OnCreate method is going to be executed whenever the user clicks on any of the three buttons. And then, we are going to change the text of the textView basing on what button the user clicked using the setText() method. You can simply say : txtView.setText("text of the button that is clicked"); Thats it! Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook Page : http://fb.com/techraj156.com Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email ID : anonymoushacker156@gmail.com Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 155175 Tech Raj
Ethical Hacking Videos now on Tech Raj!
 
04:14
To watch my Ethical Hacking content, visit my website : https://techraj156.com SUBSCRIBE for more awesome videos! Thanks for watching! Cheers!
Views: 8140 Tech Raj
Visual Basic Tutorial - Create a Simple Login Form [Voice Tutorial]
 
19:18
Hey there! This is Teja In this video, I will be teaching you how to create a simple Login Program in Visual Basic. I will be using Visual Studio 2010 in this video. Sorry for the birds chirping in the background! If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Visit my Blog for written tutorials : http://blog.techraj156.com SUBSCRIBE For more videos. Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 24472 Tech Raj
Here Is How Your Facebook Account Can Be Hacked !
 
10:11
Hey there! This is Teja. This video features the possibilities in which your Facebook account can be hacked, and provides few tips in order to secure your facebook account. Here are all the possible ways(As per me) in which your facebook account can be hacked : 1.Phishing Phishing is the process of 'Fishing' your Facebook Username and Password by using a clone Facebook website, which looks exactly like facebook, but when login over there, your credentials will be captured by that page, and will be sent to the creator of that Phishing page (Creator of the page is the hacker, in this case) 2.Keylogging Keylogger is a software which can record your keystrokes, including your facebook password. So, when you are using facebook on a Public computer or someone else computer, be aware that they might have installed keylogger on that computer, and it can record your Password when you type in using your Keyboard. 3.Malicious Files Hackers can gain control over your PC, by sending you a malicious file, or when you directly download it from their website unknowingly. They can also hack your Banking Account through this process.So be aware, when you are downloading any file to your computer! 4. Tokens Some Apps or Websites offer you more likes for your facebook posts, pictures, etc., these apps want you to submit your Access Token in their website in order that you login. Once you do it, the Apps can have full control over your Facebook Account. Guess what? they can now post spam from your Account, or use your account to like the status or photos of other unknown persons on Facebook ! 5. Email Recovery You need to keep the Gmail Account (which is linked to your Facebook Account) secure, because using that, anyone can change your password directly. So, if anyone knew the password of your Gmail Account, they will automatically be able to access your Facebook Account too ! 6. Save Password This option is in every modern Web Browser. Using this, you can save the password and username of your Facebook Account. So, if you have saved your Facebook password accidentally, or unknowingly on some one else's computer, then they can easily Login to your account with one click, after you leave the place ! A small correction : After 'Malicious Files' the next tittle is 'Tokens', but in the video the same tittle 'Malicious File' is repeated twice. I apologize for this error in editing, really very SORRY. Please Note it. DISCLAIMER : The video's objective is clearly to create Awarness in you, about how your Facebook Account can be hacked. I am not showing you to do any illegal things, in this video. This video also features several tips by which you can secure your facebook account. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Website : http://techraj156.com Blog : http://blog.techraj156.com Email ID : anonymoushacker156@gmail.com Thanks For Watching !! Cheers!! MUSIC : It's Always Too Late to Start Over by Chris Zabriskie is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) Source: http://chriszabriskie.com/dtv/ Artist: http://chriszabriskie.com/ -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 42855 Tech Raj
How to Install Kali Linux on VM Virtual Box [Step By Step Tutorial]
 
14:41
Hey there! This is Teja In this video, I will be teaching you how to install Kali Linux on Oracle VM Virtual Box. In one of my other tutorial, I have shown you how to install Kali Linux alongside windows 7 , that is, to dual boot windows 7 and Kali Linux. Watch the video here : https://www.youtube.com/watch?v=hUM8fwgGtLk ----------------------------------------------------------------------------------- Link to download Oracle VM Virtual Box : https://www.virtualbox.org/wiki/Downloads Link to download Kali Linux ISO File (32 bit or 64 bit) : https://www.kali.org/downloads/ ----------------------------------------------------------------------------------- SUBSCRIBE for more videos Like my Facebook page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Visit my Blog : http://blog.techraj156.com Email me for any queries : anonymoushacker156@gmail.com Thanks for watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 4316 Tech Raj
Here Is How Your Computer Can Be Hacked - A Small Demo
 
04:35
Hey there! This is Teja In this video, I will be showing you how your PC can be hacked, by a malicious file or malicious application. This video is a demo on how vulnerable your PC is, and how can it be hacked. Here are few ways to prevent your PC from getting hacked : 1. Download files only from Authorised or Official websites. 2. Make sure that you have an Anti-Virus installed on your computer, which Stay Safe! Like my Facebook Page : http://fb.com/techraj156 Follow me on Twiter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email me at : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 4400 Tech Raj
IF YOU USE AN ANDROID PHONE, THEN YOU SHOULD WATCH THIS!
 
05:21
Know a few things about Android that you wouldn't be knowing until now. In this video, I show you a few things that I came to know about Android and which I feel I should share with everyone. This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5 I'm not an Android guy, so please excuse me if there is any error in this video! Comment down below what you think about this video! To all my subscribers out there, please do enable the bell icon beside the subscribe button so that you will get notifications from me. However, YouTube's notification algorithm seems to have some issues and my videos, community posts are not being delivered to my subscribers effectively. So please help me out and activate the bell icon. Let's hope that the issues with notifications will be fixed soon. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 56831 Tech Raj
Is Internet Secure?
 
10:09
Internet as all of us know is a computer network. Information is exchanged between computers which are located globally by the use of Internet. Any two internet connected computers have the ability to communicate with each other by exchanging information. This can be text, image, audio, video, basically anything. And these computers can exchange information in very less time even though they are miles apart. Thanks to the well crafted applications of physics and chemistry we have a decent Internet hardware which falicitates us to make the communication faster. The computers on the Internet are either server computers or client computers. Server computers are those which serve the requests of the client computers and send them the files that they’re requesting. Client computers are those which send requests to server computers asking for files or information. Internet is now becoming almost a common requirement for everyone living on the Earth. Every organisation or company is using Internet to digitalise their work. We are using Internet for online shopping, social networking, to read and send important emails, all of which are worth a lot of money. You know it is serious when we are talking about money. So, if are doing things which are worth money on the Internet, you know Internet should be secure. Just like how banks have a tight security. Internet also must have. So, in this video we will see if Internet is secure and if it is, how secure Internet is. Consider a case where you are logging in to your ONLINE Internet banking account. You visit your bank portal on your browser, put in your username and password and click login. When you click on login , the credentials you entered must be validated to see if they are correct. For this to happen, your credentials are to be sent to the server computer of your bank which may be located miles apart. Your data containing the credentials are broken down into packets and are first sent to your home router, from where they will be forwarded to other routers and packet switches on the Internet. Finally they reach your bank’s server computer where the packets are re-assembled and then the credentials are validated. But notice here that the packets of data Containing your credentials are forwarded to many routers and packet switches before they reach the bank server. This means that your packets of data are almost public while they are transmitted. Anyone can eaves drop on you, and can easily capture these packets of data. Or anyone who owns any one of the router on the path between you and your bank server can reassemble the packets and can read your credentials. And I need not explain what might happen if any one has your bank credentials. This is the same with your email credentials, or Facebook credentials or your payment information that you are sending to some online shopping website or any other critical information. So, is there any way using which we can directly send our data packets to the web sever without any intermediate routers? No, there isn’t. Or at least for now, there is no technology to achieve that. So, what other option is left? We know we can’t prevent anyone eavesdropping us. SO what do we do? We lock our data with a key. Just like how we keep important things in a box and then lock the box with a key and keep the key with us securely. We lock our data with a key before we send it to the Internet, and we keep this key very secure with us. Now, if anyone wants to read our data they need this key to unlock it first. So, even though if someone captured the data that we are sending, they will not be able to read it since it is locked and they need a key to unlock it, and they don’t have it. This is the general theory of Cryptography. One QUESTION arises, what if brute force and guess the private key using our computer. Well, it’s almost impossible to brute force a key. Because that is how these algorithms are all designed. You cannot brute force a key with your home computer .It may take a million years to crack a key with your computer because it involves a lot of processing and a lot of guessing. It is impossible to crack a key with the present technology we have. But who knows in the future computers can be fast enough to crack a key in a matter of minutes may be. We can’t expect how far technology may go. But wait, have you listened about QUANTUM computers? They are expected to be arriving soon or they’ve already arrived?, anyways they are much much much faster than the normal computers that we’re using. And yeah, they are a threat to the current cryptographic techniques that are employed on the Internet. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 3630 Tech Raj
Anyone Can Hack Your Facebook Account with this Security Bug!
 
05:51
So, recently Facebook officially announced that It has found a security bug in its code, which affected almost 50 million accounts. Now yeah the number is pretty big, but what’s worse is the bug itself. Link to official announcement from Facebook about this Bug : https://newsroom.fb.com/news/2018/09/security-update/ So, let me get it straight. This security bug allows anyone to login to anyone else’s Facebook account. Which means I can simply login to Mark Zuckerburg’s Facebook account without having to do anything complex. So what is this bug? How dangerous and how dumb is it? Well, if you guys don’t know about the “View As” tool on Facebook, its basically a tool using which you can see how your profile looks from some other person’s Facebook account, so that you can customise your profile accordingly and you get to know how your profile looks from your friend’s Facebook account. Now, this feature is designed only as a view-as interface, which means it is designed only to let people know how their profile looks like from another person’s account. It does not allow anything else than just viewing the profile. This feature is existing from long back on Facebook. And honestly I never used it anytime, because, I don’t know, I never found it useful, anyways. So what happened is, when you go and use the View As tool, and select a specific person to view your profile. It displays a composer box where you can post something on Facebook. Now in this composer box, there exists a component using which you can post birthday wishes to someone. This component of the composer incorrectly gave the user an option to post a video. So, what’s the big deal if you are given an option to post a video? Obviously, this is not going to affect anyone, because if you do post a video, it is still posted on your timeline only. Well, here is the catch. Facebook released a new version of its video uploader, and this video uploader when used with the view-as option, incorrectly and un-intentionally generated the access token of the Facebook Mobile App. But wait, it is not generating your access token here, it is actually generating the access token of the person who you are using to see your profile with the view-as option. Which means, if I am using the view as option to see how my profile looks from Mark Zuckerburg’s Facebook account, then I am actually getting the access token of the Zuckerburg’s Facebook account! And I can simply find this access token in the html of the page, because it is generated there by the video uploader. And if you don’t know what is meant by an access token, it is simply a string value using which you can login to your Facebook account without having to enter your username and password. So, basically using an access token you get access to a Facebook account without the password. I mean, isn’t it quite shocking how a big company like Facebook had this dumb security bug. Like, seriously using this bug anyone can get access to anyone else’s facebook account by just using the view as tool. Nothing else need to be done. Now Facebook announced that it has actually discovered an external actor who has actually exploited this bug on Facebook. Which means that someone has found this bug before Facebook did, which is a bad thing. So, anyways Facebook has now fixed this bug, and it has also logged out people from their Facebook account to make sure that their old access token will be expired, and can’t be used anymore if in case their account is hacked via this security bug. Credits for the part of the video where I showed the View-As tool demonstration : Super Easy Tech Tips (YouTube channel)
Views: 11556 Tech Raj
How the INTERNET actually works?
 
12:46
Get a basic idea about how the Internet actually works, and how it's very fast. We all use Internet, and it is our responsibility to have basic understanding about how the internet works. The mystery of how internet works is explained in this video. How are we able to stream videos online, make video calls, send emails, download and upload files to websites, and do much more by just connecting to the internet? What exactly is internet? Who owns the internet? Where is the internet located? Find the answers to all these questions by watching this video. Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Don't forget to activate the bell button, to receive updates from me. Thanks for Watching! Cheers!
Views: 5939 Tech Raj
How to Access Blocked Websites on College/School Wi-Fi Network
 
04:31
Access blocked websites on your college or school wifi network, with this simple trick. College and school networks basically have firewalls installed (like Fortinet) which act as web filters and block many websites even if they are not inappropriate, so it is really annoying. Here is a simple and easy trick to access any such website which is blocked by the firewall of your network, in just a minute! Go to Rabbit : https://rabb.it Create an account, by filling in the details. Enter the domain which you want to visit in the search box and hit enter. That's it, you are done. The best thing about this trick is that, you can browse web really fast with high download speed(due to rabb.it) and you can download files really quick! Limitation : Using this method, you can't directly download files from a website to your computer. After you download a file, you must upload it to dropbox or one drive, whichever is synced with your computer, and then access the download file. Visit my Website: https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow on Twitter : https://twitter.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Thanks for Watching! SUBSCRIBE for more videos!! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 70426 Tech Raj
How to Create a Social Networking Website like Facebook for FREE [EASY]
 
17:09
Read Step By Step Written Tutorial on my Blog : http://blog.techraj156.com/how-to-create-a-social-networking-website-like-facebook-for-free-easy/ Hey there! Its Teja here! In this video, I will be teaching you how to create a social networking website such as Facebook and that too, for free! So, firstly you got to create a domain or a sub-domain for that. If you want to register a domain, then obviously you got to pay for that. But, if you don't want to spend a dime doing it, then you also have an option to register a sub-domain which is absolutely! You can use this website to register a sub-domain(or a domain) : https://cpanel.hostinger.in/auth You can create an account or login directly if you already have one. Here is the link to download Open Source Social Network : https://www.opensource-socialnetwork.org/ This is a pre-created php using which you can create your own social networking website If you have any doubts regarding this video, feel free to comment below! Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 79173 Tech Raj
5 Things You Need To Follow In-Order to Keep Your Online Bank Account Secure
 
08:24
Check out this video to learn about the 5 neccesary things that you need to follow in order to keep your Online Banking Account Safe. Hey There! This is Teja! In this video , I will be teaching you the 5 things that you need to follow to keep your bank account secure. Follow these Instructions, and stay safe from Hackers! Use a good anti-virus and a good firewall which can protect you from online thefts. If you have any doubts regarding this, feel free to comment below. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Blog : http://blog.techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 3867 Tech Raj
I Got an Email from Donald Trump? 😱😵[Email Spoofing]
 
07:24
Ever received an email from…. Donal Trump or Christiano Ronaldo or Tom Cruise or some famous personality like that? Well, if you did receive such email, then its probably not from the person you think it can from. I’m not trying to offend you but common how Donald Trump doesn’t even know that you and me even exist. I’m from India BTW. So obviously the email is not from Donal Trump, it is from a fake sender like a spammer or your friend whose only job is to try to fool you in some or the other way.Anyways but how did the fake sender send the email from Donald Trump? OMG did he hack Donald trump’s Email? OF COURSE NOT. What he did is just modify the email header, and replaced his email address with Donald Trumps email address. Well, I’ll explain. Firstly, we call this Email Forging or Email Spoofing where a person can pretend to be some other person and send you an email. In simple words, a spammer can you send you an email from your friend’s email address and all this without gaining access to your friends email account. Let me explain how the spammer does this. Email works on SMTP which stands from Simple Mail Transfer Protocol. Let’s learn how the SMTP works. When you are writing an email, you put in the subject, the message, any attachments and the recipIent’s mail ID. BTW, A recipIent is the one who you want to send the email. Once you click on send, the client which in my case is GMAIL is going to forward this email to the smtp server of Gmail. And obviously the email that you are sending needs to be converted to a particular format so that the SMTP server can understand where to forward this email. So the email is converted into a header which looks something like this. Once the SMTP server receives the email header, it forwards this header to the respective SMTP server of the receiver. For example if the receiver’s email ID is a hotmail ID, then the SMTP server of gmail is going to forward this header to the smtp server of hotmail. Once the header is received by the receiver’s SMTP server, It is again forwarded to the POP3 server of the receiver. POP3 stands for Post Office Protocol and 3 here is the version number. POP3 servers receive emails from the SMTP servers and store them until needed. So when the receiver opens his email client, ie., when he opens his hotmail account, his client is going to pull all the unread emails from the POP3 server. And if you can remember, the email that we sent has reached the POP3 server of the receiver and is stored there. So, the receiver will now retrieve the email that we sent. So this is how email works in a nutshell. But, if you can look closely here at the Email header you can notice that there is no authenticity. Which means there is no factor to ensure that the email is coming from a valid sender. You can see that there is a from: line which holds the email ID of the sender. We can simply replace this From: line and insert any email ID we wish. And as I said earlier there is no factor to ensure that the email is truly coming from that particular sender. Like, for example if at all the email header also consist the password of the sender, then we can be sure that the sender is actually the sender if the password is correct, but if the password is included in the header, then the receiver will also get to know the password of the sender by just looking at the email header. SO obviously we cannot include the password in the email header. So, this means that anyone can simply tamper the email header and insert any email address in the From: line. And thus, they can pretend to be someone else. Obviously, this is a big threat because SMTP lacks authenticity. So, some extra security standards are added. The From field of the Email is now digitally signed and this digital signature is added to the email header when the email is sent from the sender’s side. When received by the receiver, if the digital signature is valid, it means that no data inside the email header is tampered and hence the email is authentic and the sender is really the sender. If the digital signature is not valid, then the email ends up in your spam folder. This is known as DKIM. DKIM uses cryptographic functions to achieve this authenticity. We will learn about these cryptographic functions in some other video. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 30544 Tech Raj
How to Protect a Folder with Password in Windows 7/8/10
 
04:37
Hey there! This is Teja, in this video tutorial I will be teaching you how to protect your Important folders with passwords, in windows 7/8/10 Here is the code : http://www.mediafire.com/download/ajgb5de58iioni3/code.txt If you have any doubts regarding this video, feel free to comment below. Check out my new Channel Trailer : https://www.youtube.com/watch?v=ACFNlKA60zg Like my Facebook Page : http://fb.com/techraj156 Visit my Website : http://techraj156.com SUBSCRIBE for more videos. Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 2585 Tech Raj
Make your Windows PC Voice-Controlled [Jarvis] - 2016
 
09:06
Download and install Jarvis. Hey there! So in this video tutorial, I will be teaching you how to make your Windows PC voice controlled, with a Software named 'Jarvis' [Its now called Links]. DISCLAIMER : I don't have any rights on this software, I am not the programmer of it. So, using this Software, you can give a voice command to your Computer, and expect it to be done. This is similar to Iron man fame 'Jarvis' , which is a Voice - Recognition Software. So here is the official site, from where you can download the software : http://mega-voice-command.com/downloads.html Stay tuned to Tech Raj, for more videos. Hopefully, I will make another video on all the custom commands on Jarvis. Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my facebook page : http://fb.com/techraj156 Visit my Website : http://techraj156.com If you have any doubts regarding this video ,Email me at : anonymoushacker156@gmail.com You can ask me for new tutorials, by E-mailing me, or by posting on Facebook Page, or texting me, or even by using the contact form in my Website. Thanks for Watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 464876 Tech Raj
Recover Deleted Files from your Computer/USB/MemoryCard
 
06:27
Best 5 Free SD Card Recovery Software: http://bit.ly/2SXICgc Top 10 Free Memory Card Recovery Apps: http://bit.ly/2SXrpTV Recoverit Free: http://bit.ly/2SXrln9 Use this coupon code to avail discount for one year package : MENBFR18 Black Friday event : http://bit.ly/2A8MMsS In this video, I will teach you how to recover your deleted files using Wondershare RecoverIt. SUBSCRIBE for more awesome videos! Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below. Thanks for watching! Cheers!
Views: 3756 Tech Raj
Best Windows 7 Desktop Customization [Clock and Weather]
 
10:18
Hey there! This is Tech Raj, and in this tutorial I will be teaching you how to customize your Windows 7 desktop background to the best. In this video, I will be showing you how to make use of Rainmeter. This is a Free and trusted Software to edit your desktop background, with the help of skins. ---------------------------------------------------------------------------------------------------------- Links Link to download Raimeter : https://www.rainmeter.net/ Link to download the Skin : http://injust29.deviantart.com/art/LIM-T-1-2-344112531 Link to IP Location tools : http://iplocationtools.com The desktop background that I have shown you in this video, has been removed from its host, I can't upload it on my own because its not owned by me, so if you want the desktop background, then email me at : anonymoushacker156@gmail.com ---------------------------------------------------------------------------------------------------------- DISCLAIMER : Please note that I am not the author or the owner of any of the tools used in this video (Rainmeter, Rainmeter Skin and Desktop Background) , I donot have any rights on it, but, I am just showing you how to make use of them inorder to make your desktop look cool. ---------------------------------------------------------------------------------------------------------- Please Subscribe, if this video helped you. Also do like my facebook page : http://fb.com/techraj156 IF you have any doubts regarding this video, feel free to comment below, and I will make sure that I will help you. If you want to ask me for any new tutorials, you can email me at : anonymoushacker156@gmail.com Follow me on Google+ : https://plus.google.com/u/0/+TechRaj156 Thanks For Watching !! Cheers !! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 93402 Tech Raj
How to Create Your Own Website For FREE  [Using Weebly]
 
06:06
Hey there! Its Teja here! In this video, I will be teaching you how to create your Website for free! This video is for absolute beginners who dream of having their own website. In this video, I will be using Weebly to show you how to create a free Subdomain and make a professional website of your own. Link to Weebly : http://weebly.com You can also make use of other websites such 000webhost, but unfortunately, at the time of making this video, 000webhost didn't work, but I hope that the issue is fixed now. However, here is the link to 000webhost : http://000webhost.com If you have any doubts regarding this video, feel free to comment below. Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my Website : http://techraj156.com Email me for any queries : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 9506 Tech Raj
How to Fix any DLL Error on your Computer[d3dx9_43.dll , d3dx9_26.dll ,etc]
 
04:07
Read Complete Written tutorial on my Blog : https://goo.gl/dD4Dl7 Fix " d3dx9_43.dll is Missing from your computer " or " d3dx9_23.dll is Missing from your computer" or any other .dll error on Windows 7/8/10 . This Solution also works for any DLL error on Windows OS. Hey there! This is Teja! In this video, I will be teaching you how to fix D3DX9_43.DLL Missing error in any Windows OS. The basic reason for all the Dynamic Link Library (DLL) errors is that, some .dll which is required to run a specific program is missing from your computer. Hence, whenever you open that specific program, it can't run due to the missing dll file, and results in the error. So, the simplest fix to all of the common DLL errors, is to install all necessary and common DLLs on your computer. You can do this by installing DirectX End-User Runtime Web Installer on your PC. The Link to download it is : https://www.microsoft.com/en-in/download/details.aspx?id=35 Once you install it, the error should be solved. Thank me, by Subscribing! 😙 If you have any doubts regarding this, feel free to comment below Like My Facebook Page : http://fb,com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : anonymoushacker156@gmail.com SUBSCRIBE for more videos! Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 3423 Tech Raj
How to block a device from using your Wi-Fi
 
05:35
Hey there!! This is Tech Raj In this tutorial i will be showing you how to block a device from using your Wi-Fi. Please note that since I have a TP LINK Router, i am redirected to TP LINK Page, anyhow, you may be redirected to a different page, it all depends on the Wifi Router you use. If you have found any suspicious device using your Wifi, without your knowledge, then, you can Kick that device Off from using your Wifi. If You have any doubts regarding this video you can feel free to comment below. If You haven't watched my previous tutorial on how to find who are using your Wifi, then watch it at : https://www.youtube.com/watch?v=A9zc_Hfmads ----------------------------------------------------------------------------------------------------------- Please Like My Facebook Page : http://fb.com/techraj156 Please do visit my Website : http://techraj156.com Subscribe For More Videos!! Thanks For Watching !! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 149733 Tech Raj
How to install a uTorrent client in Kali Linux[Any Ver] - 2016
 
03:38
Hey there! This is Tech Raj. So, its been a very long time since i uploaded a new video, this is because i am busy with my board exams. So finally, today i made a new tutorial, and my first tutorial in kali linux. In this video, I will teach you how to install a utorrent client in kali linux and start downloading torrents on kali linux. We will be installing a utorrent client named 'qbittorrent' which is compatible with kali linux. Now, this software is very great and works fine, like all the other utorrent clients such as utorrent, bittorrent,etc. This is a very easy trick, just stay tuned to the video, with all your senses alert! ------------------------------------------------------------------------------------------------ So, here is the link from where you can download the sources list file : http://www.mediafire.com/download/898hf9t2al5wsh4/Sources+list.txt ------------------------------------------------------------------------------------------------ If you have any doubts regarding this video, feel free to comment below, so that I can help you. Ask me for new tutorials by emailing me at : anonymoushacker156@gmail.com Like my facebook page : http://fb.com/techraj156 You can post on my page for any queries, or even message me, I will try my best to give the most satisfying reply to you. So, Thanks For Watching SUBSCRIBE for more videos. Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 32122 Tech Raj
Introduction to Loops in Java Programming - For Beginners
 
29:02
Hey there! This is Teja! This video is going to be a Java Programming Video Tutorial. In this video I will be teaching you about Looping in Java Programming. Generally, a Loop statement is used to execute a group of statements or a single statement more than once, according to the need of a Programmer. In Java, there are 3 types of loops and they are 1. For loop 2. While loop 3. Do-While loop Watch the video for explanation on all the three types of loops. If you have any doubts regarding this video, feel free to comment below! For more Java Programs , visit my blog : http://bluejforicse.wordpress.com Like my Facebook Page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Email ID : anonymoushacker156@gmail.com Thanks For Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 8482 Tech Raj
I DIDN'T EXPECT THIS FROM YOUTUBE 😧😯
 
07:11
YOUTUBE disappointed me a lot with this act 😥 😥 I also tried contacting the creator support team, but they couldn't help me with this, as they themselves are not sure if what happened is right. I got kicked out of the YouTube partner program, and I'm no longer eligible to monetize my videos, and earn from them. The reason given by YouTube for this, is soo stupid. It's like, YouTube is restricting creators and is taking away all the freedom from them and threatening them by disabling monetization for their channel. I think without creators and audience, YouTube is nothing even though it is well designed and programmed. So, before taking such decisions, youtube seriously needs to re-check everything and make it clear what is harmful and what is educational. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 17136 Tech Raj
This is How I Access blocked websites on my College Wi-Fi 😜
 
07:51
Hey there! This is exactly how I manage to gain access to any website which is blocked on my College Wi-Fi due to a firewall. DISCLAIMER : This video is not intended to promote any torrent website or any illegal service on the Internet. I know it's very annoying when you can't access numerous websites on your School/College Wifi. I mean, what's the use of providing a wi-fi network when they can't provide access to all the sites? Where is net neutrality? Well, no worries. I'm gonna show a way to bypass restrictions on your college or school or university wifi network. The trick is to make your own VPN and connect to it. You can't use other VPN's which are already on the Internet because network firewalls block access to almost all VPNs. So, we just make our own VPN! DOWNLOAD OUTLINE MANAGER AND OUTLINE CLIENT : https://getoutline.org LINK TO DIGITAL OCEAN : https://www.digitalocean.com/ You can even connect your Android Phone to your VPN, by downloading the Outline App from the playstore, and then configuring the server which you've created. Initially, in-order to rent a cloud server from Digital Ocean , you need to add a payment option (Credit/Debit card or Paypal). But, you will get 10$ as bonus when you create your account for the first time through outline. So, technically you won't be charged as soon as you add your payment option. Your Card or paypal will be saved in your DigitalOcean account so that your subscription will be renewed automatically when it ends. Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 9505 Tech Raj
MY WEBSITE GOT HACKED! [SPAM URL INJECTION]
 
14:31
RECENTLY MY WEBSITE GOT INJECTED BY SPAM INJECTION. I recorded my screen while I'm trying to fix that and clean my website. Finally, I fixed it and in this video I included the screen cast of me fixing this problem along with my voice over. The reason for this URL injection on my website may be because of a malicious plugin which I might've installed, or due to a vulnerability in my website's theme, or due to a vulnerability in Wordpress (very less chances). Visit my website : https://techraj156.com Like my Facebook Page : https://fb.com/techraj156 Follow me on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for watching! Cheers!
Views: 6650 Tech Raj
How to create a GIF Image and upload it to Facebook - Easiest Way 2016
 
05:11
Hey there! So In this video , I will be teaching you how to create a GIF (Graphic Interchange Format) from a video , and Upload it directly to Facebook. I will be showing you the easiest way in which you can do it. Here is the link to the website using which you can create a GIF easily and upload it to facebook directly : http://gifs.com --------------------------------------------------------------------------------------------- DISCLAIMER : I do not have any Administrative rights on this website, I am just teaching you how to make use of it. --------------------------------------------------------------------------------------------- The best thing in this website is that, it do not add any watermark to your GIF, and you can directly play the GIF right away, once you post it to facebook. If you have any doubts regarding this video , feel free to comment below ! Follow me on Instagram : https://www.instagram.com/teja.techraj/ Like my Facebook page : http://fb.com/techraj156 Follow me on Twitter : http://twitter.com/techraj156 Visit my website : http://techraj156.com Blog : http://blog.techraj156.com Email me at : anonymoushacker156@gmail.com Thanks for watching!! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 57073 Tech Raj
Create a Professional Intro/Video Animation without any Software! [2018]
 
07:37
Create a professional and impressive video animation or intro without using any software like After Effects or Sony Vegas or Blender. In this video, I will show you an amazing website using which you can create your own intro without any editing skills! Link to the Website (Render Forest) : https://renderforest.com Use this PROMO code to get 10% off on your purchase : techrajpromo Hurry up! This promo code will expire on 22nd January, 2018 This website contains various types of pre-made video templates, and you can choose any template, and customize it with your own image, text, music, color, etc. This is the easiest way to create your professional video animation for your Youtube channel or Website or App or business. Browse their Subscription plans here : https://www.renderforest.com/subscription Visit my Website :https://techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : https://instagram.com/teja.techraj Follow on Twitter : https://twitter.com/techraj156 For written tutorials, visit my blog : http://blog.techraj156.com SUBSCRIBE for more videos! Thanks for Watching! Cheers! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 2992 Tech Raj
Searching Arrays in Java - Linear Search and Binary Search | Complete Tutorial
 
40:18
Check out this video to learn about Searching Arrays in Java. There are two techniques of Searching in Java : 1. Linear/Sequential Search - The easiest way to do it, but a little bit time consuming. 2. Binary Search : A more logical way of approach, which is comparatively faster than the Linear Search. In this video, I will be explaining you, each of these searches, in a practical way. Please watch the video completely, to understand the tutorial. Written Tutorial : Coming Soon. Btw, you can check this another blog of mine, to learn about Arrays : https://bluejforicse.wordpress.com/arrays/ Check out this video tutorial, to learn about Sorting technique in Java : https://www.youtube.com/watch?v=ZQ8AaxHnAb0 For more video tutorials on Java Programming, hit the SUBSCRIBE button. Visit My website : https://techraj156.com Blog : http://blog.techraj156.com Like my Facebook Page : http://fb.com/techraj156 Follow on Instagram : http://instagram.com/teja.techraj Follow on Twitte : http://twitter.com/techraj156 Email : anonymoushacker156@gmail.com Thanks For Watching! Cheers!! -~-~~-~~~-~~-~- Please watch: "How the INTERNET actually works? " https://www.youtube.com/watch?v=U0mzA1AD_CY -~-~~-~~~-~~-~-
Views: 6662 Tech Raj