Here at How? NERD you will find Computer tips & How to `s and read latest Game Reviews.
Get your articles featured on How NERD. Just send your Article or Review through our Contact Us Page.





Methods used for Facebook hacking

Facebook is the most used social networking website used by millions of people daily. This is the reason why everyone wants to get in this website and hack it. The most asked question on our website and facebook fan page is “How can I hack a Facebook account?”. There are only few methods which someone can use to hack their friend’s Facebook account. Today I will discuss all those methods. And also will give a few tips on how to protect your facebook account from being hacked.



Phishing Attach
facebookphishing
Phishing attack is the most common method of Facebook hacking. In this attack, you are sent to a website which is a copy of Facebook. When you type your email id and password in the fields, those credentials are saved in a separate text file without giving any information to the Victim.
Protection:- Whenever you open facebook, may sure to see the URL bar. It should behttps://www.facebook.com and not fakeweb.com or something else.

Keylogging

keylogger
Keylogging is the easiest way Facebook accounts are hacked. Even a person with good computer knowledge can fail to notice keylogging. The keylogger installs itself silently in the victim’s computer while another software is being installed.
Protection:- Always install software from verified publishers and well reputed websites and never install useless software like, “facebook hacker tool” or something like that. You will never be able to hack someone’s account using those software and instead your account will get hacked.

USB Hacking

Apple_USB_drive-640x360
Hacking via a malicious USB can be used to cause all kinds of mayhem. You can get all the passwords the victim saved in their computer and web browser using USB Hacking.
Protection:- Never trust unknown removable devices.

Man-In-The-Middle Attack

Main_the_middle
If the hacker and the victim are on the same network, then this attack can be performed. The attacker acts as a default gateway between the victim’s computer and the server and gets all the information which the victim is sending to the server. This is possible over HTTPS by establishing two independent SSL sessions, one over each TCP connection.

4 comments:

  1. windows 7 ultimate sp1 keys , office 2013 activation keys , windows 10 serial key how to find , windows 10 activation online , windows 10 serial key free , windows 10 activation questions , free windows 7 home premium product key list , cheap visio key code , sAoBPX

    windows 10 pro key

    office 2013 pro key sale

    cheap visual studio key buy

    ReplyDelete
  2. buy windows 7 , how to upgrade windows 7 home basic to ultimate online for free , windows 7key , windows 7 ultimate product key 64 bit keygen , Genuine Windows 8.1 Standard Product Key , windows 7 ultimate oem product key , microsoft office installer , Office Professional Plus 2016 sale , lXHusJ

    cheap office project 2013 product keys

    buy windows 7 ultimate sp1 product key

    Online Windows 10 Pro Product Key Store

    Windows 7 Home Premium SP1 key code

    buy cheap windows 7 product keys

    ReplyDelete