Increasing cyber crime in Pakistan by Ahmed Hassan NooriHackers send you emails. Your account has been corrupted, disabled, and a link is given at the bottom stating that by clicking on the link below your page / ID / account / Password, restore.
Many people believe that their account is blocked / deleted. They click on that link to unblock or restore it. After that they have an interface show in front of them. Take a website, for example, Facebook. (Because I have created a dummy interface of Facebook. You log in. You no longer know the login, ie your account and password.) There you are asked to enter your password, which will restore your account.
Similarly, for Jazz Cash EasyPay, there are fake phone calls asking you to enter your ID card number. So that your account can be verified. Shortly after giving the PIN, you are sitting on the ground holding your head. Why are you sitting? gone.
These companies would warn you not to give your PIN to anyone. And their terms and conditions are clearly written. If you give yourself a little effort and read then the Hour has not come. I keep reading nonsense every day. Also read some work. (Read my novel too. It is written very hard.)
When you add your account details to them, ie password, phone number or Gmail ID, they reach them. After that, they can easily hack your account.
The second method is to insert malware into someone's system or mobile. In this method, hackers send you a link, which contains a malware hidden. Simply put, a software is hidden. Clicking on it gives the hacker access to your entire system. For example, I give you a fake link. Let it be fictitious.
https://www.youtube.com
Increasing_cyber_crime_in-Pakistan_by_Ahmed_Hassan_Noori
This link is given as an example, you have visited this website many times. This is the complete link. If you click on it, you will reach this website. This was a normal link of a hacker. Let me explain how a link is created.
Write anything. Since I am giving a demo, I will take a paragraph and hide the link in it. That is my fake malware.
P tags are used for paragraphs.
<p> This is a tag of the paragraph. Inside it is to hide the link. For link we have used anchor HTML5. For linking <a> or link tech is used. </p> p>
Just understand it. No need to read in logic.
<a href="https://www.facebook.com> Ahmed Hassan </a>
In fact, the ID is given here, the class, the title, and the style are also given. Because we are not doing any professional work, we are explaining for the demo, so I have not added all these things. If he was working professionally, he would have given all this. As you can see in the image below, I was editing one of my web, so I gave it all.
Now if I run this code or send it to someone, it will only show my name. Nothing else. Like
Ahmed Hassan
And when he clicks on that link, he'll be taken straight to facebook.com, or to the link I've hidden inside. For example, YouTube, Facebook or any of his own websites. ۔ This is called backlink and the free lasers for creating it charge in dollars. Even in Avon K. Arrived at the site. Let me give another example. You visited the website of a book or novel and clicked on an ad there. On the site. Why does this happen?
Because a backlink was hidden behind or inside this ad. As soon as you clicked, you were redirected there. (Arrived.) (I created the backlinks myself, my accounts For the promotion of, Like My Channel, Page, Any kind of web, and backlinks are also hidden behind them.)
What do hackers do? They put a link to their software (malware) where I wrote Facebook. And where I wrote my name, they put a link or write something. Now what? Explain openly.
When you click on this link, the software is secretly downloaded to your system. After that, all your access goes to this slave. He can extract your pictures, your data, anything. Is.
Not in Pakistan but there are some websites outside where your data is sold for thousands of dollars. Natural picture of beautiful Asian girl is in great demand. In both legal and illegal market. So I prefer the Asian girl. I need an image for the graphics, if it is not or pad then I use the second pick. Such are the people working in the illegal market. They take pics of Asian girls and edit them to make them standby. You can better understand where they are, there is no child here.
جزاک اللہ
وسلام
احمد حسن نوری ( اس آرٹیکل کے تمام کاپی رائٹس میرے پاس محفوظ ہیں اسے میری اجازت کے بغیر میری ناول میں پبلش ہونے کے بعد ہی کہیں اوریوز کیا جا سکتا۔ادر وائز آپ کاپی رائٹس کے اصولوں کی خلاف ورذی کریں گئے۔)
Hackers send you emails. Your account has been corrupted, disabled, and a link is given at the bottom stating that by clicking on the link below your page / ID / account / Password, restore.
Many people believe that their account is blocked / deleted. They click on that link to unblock or restore it. After that they have an interface show in front of them. Take a website, for example, Facebook. (Because I have created a dummy interface of Facebook. You log in. You no longer know the login, ie your account and password.) There you are asked to enter your password, which will restore your account.
Similarly, for Jazz Cash EasyPay, there are fake phone calls asking you to enter your ID card number. So that your account can be verified. Shortly after giving the PIN, you are sitting on the ground holding your head. Why are you sitting? gone.
These companies would warn you not to give your PIN to anyone. And their terms and conditions are clearly written. If you give yourself a little effort and read then the Hour has not come. I keep reading nonsense every day. Also read some work. (Read my novel too. It is written very hard.)
When you add your account details to them, ie password, phone number or Gmail ID, they reach them. After that, they can easily hack your account.
The second method is to insert malware into someone's system or mobile. In this method, hackers send you a link, which contains a malware hidden. Simply put, a software is hidden. Clicking on it gives the hacker access to your entire system. For example, I give you a fake link. Let it be fictitious.
https://www.youtube.com
Increasing_cyber_crime_in-Pakistan_by_Ahmed_Hassan_Noori
This link is given as an example, you have visited this website many times. This is the complete link. If you click on it, you will reach this website. This was a normal link of a hacker. Let me explain how a link is created.
Write anything. Since I am giving a demo, I will take a paragraph and hide the link in it. That is my fake malware.
P tags are used for paragraphs.
<p> This is a tag of the paragraph. Inside it is to hide the link. For link we have used anchor HTML5. For linking <a> or link tech is used. </p> p>
Just understand it. No need to read in logic.
<a href="https://www.facebook.com> Ahmed Hassan </a>
In fact, the ID is given here, the class, the title, and the style are also given. Because we are not doing any professional work, we are explaining for the demo, so I have not added all these things. If he was working professionally, he would have given all this. As you can see in the image below, I was editing one of my web, so I gave it all.
Now if I run this code or send it to someone, it will only show my name. Nothing else. Like
Ahmed Hassan
And when he clicks on that link, he'll be taken straight to facebook.com, or to the link I've hidden inside. For example, YouTube, Facebook or any of his own websites. ۔ This is called backlink and the free lasers for creating it charge in dollars. Even in Avon K. Arrived at the site. Let me give another example. You visited the website of a book or novel and clicked on an ad there. On the site. Why does this happen?
Because a backlink was hidden behind or inside this ad. As soon as you clicked, you were redirected there. (Arrived.) (I created the backlinks myself, my accounts For the promotion of, Like My Channel, Page, Any kind of web, and backlinks are also hidden behind them.)
What do hackers do? They put a link to their software (malware) where I wrote Facebook. And where I wrote my name, they put a link or write something. Now what? Explain openly.
When you click on this link, the software is secretly downloaded to your system. After that, all your access goes to this slave. He can extract your pictures, your data, anything. Is.
Not in Pakistan but there are some websites outside where your data is sold for thousands of dollars. Natural picture of beautiful Asian girl is in great demand. In both legal and illegal market. So I prefer the Asian girl. I need an image for the graphics, if it is not or pad then I use the second pick. Such are the people working in the illegal market. They take pics of Asian girls and edit them to make them standby. You can better understand where they are, there is no child here.
جزاک اللہ
وسلام
احمد حسن نوری ( اس آرٹیکل کے تمام کاپی رائٹس میرے پاس محفوظ ہیں اسے میری اجازت کے بغیر میری ناول میں پبلش ہونے کے بعد ہی کہیں اوریوز کیا جا سکتا۔ادر وائز آپ کاپی رائٹس کے اصولوں کی خلاف ورذی کریں گئے۔)