| How hacking actually looks like | Hacking Linux | Sosical Hacking Account |

Опубликовано: 07 Апрель 2020
на канале: ELROND GAMING
158
7

Let me show you what hacking actually looks like.
You've probably seen many movies where hacking is portrayed like this - random windows open, they display random text scrolling very fast, doesn't make any sense

In this video, let's see what real hacking actually looks like.

Breaches
Believe me or not, your password is probably already out there publicly available on the Internet without even. your knowledge. This might feel a bit unconvincing, but it’s true there is a chance. Even mine existed publicly on the Internet without even me knowing it until recently when I finally found out that my credentials are already stolen and available for literally anyone to see. I had to then change my passwords on all my websites immediately.

Fun fact : There is a breach compilation available on the Internet that contains literally 1.4 billion email password combinations! Think about it! 1.4 billion!


The best way to stay safe from data breaches is to use a different password for every website. Use a password manager like Dashlane to generate random unique passwords for every website you use.
Man in the Middle attacks
Now, this type of hacking is not very likely to occur, but there is chance that you get hacked by Man in the Middle attacks. In this attack, a hacker can put himself as the Man in the Middle between you and the Internet.
Let’s say you’re browsing Internet from a public Wifi network. Anyone who is using the same wifi network will be able to put themselves as the Man in the Middle, and they can see your Internet traffic, and even modify it.
This means, they will be able to see everything that you are sending and receiving from the Internet using the Public WiFi.
But, as I said, it is very unlikely to happen. Because most websites nowadays use HTTPS connection which means the traffic between you and the website is encrypted, and no Man In the Middle will be able to extract this internet traffic. But you’re still at risk if you’re using a website that doesn’t use HTTPS over HTTP. In such a case, you may want to use a VPN to stay secure while browsing. You can watch the video I made about VPN to know more about why it’s a good idea to always use a VPN , I will make sure to leave the link in the description.







✅DISCLAIMER: This description contains affiliate links, which means that if you click on one of the product links and purchase something, I’ll receive a small commission at no extra cost to you.

➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖

✅Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

✅VIDEO DISCLAIMER: The Content in this video is for educational use only.
➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖
✅Thank you so much to everyone that watch, like, share and comment on my videos. It may seem like a small thing to you but I appreciate each and everyone of you. All of the feedback and comments are what has helped our channel grow to what it is now.
So once again,

#ReyalHacking #HowHacking #LinuxHacking



One-Liner 'Hacking Quotes and Sayings'

“Human Stupidity, that's why Hackers always win.” “The quieter you become, the more you are able to hear…” “You're allowed to want different things in bed than you do in your normal everyday life.” “Never underestimate the determination of a kid who is time-rich and cash-poor.”

SUBSCRIBE for more videos! Thank you so much guys !!! 😍


Tag hacking,ethical hacking,cyber security,real hacking,how hackers hack passwords,password cracking,how hackers really crack passwords,hack facebook,how do hackers hack,tech raj,crack password,hacking tutorial,facebook hacking,how hacking looks like,real hackers,black hat hackers,online hacking,vpn,social engineering,phishing,phishing attacks,man in the middle attack,session hijacking,remote access trojan,instagram phishing