Home Hacking



Unemployed Palestinian programmer Khalil Shreateh discovered a privacy bug in facebook and said that his intention was not wrong , he just wanted to collect the traditional $500 bounty the social network giant offers to those who voluntarily expose its glitches.

But when Facebook ignored his first two reports, Shreateh took his message to the top — and hacked into CEO Mark Zuckerberg’s personal page to prove his point.


He wrote on CEO Mark Zuckerberg’s personal page:


“Sorry for breaking your privacy,” he wrote the Facebook founder, “I has no other choice to make after all the reports I sent to Facebook team … as you can see iam not in your friend list and yet i can post to your timeline.”


The stunt performed by the 30-year-old  guy Palestinian  earned him praise — and numerous job offers — for being able to get to the boss of the world’s most ubiquitous social network.
Shreateh  lives near the West Bank city of Hebron and has been unable to find a job after his graduation two years ago in IT .He  told Facebook that he found a way that allowed anyone to post on anyone else’s wall.

 “I told them that you have a vulnerability and you need to close it,” he told The Associated Press. “I wasn’t looking to be famous. I just wanted to make a point to Mark (Zuckerberg).”


“As a few other commenters have pointed out, we get hundreds of reports every day,” Jones wrote. “Many of our best reports come from people whose English isn’t great — though this can be challenging, it’s something we work with just fine and we have paid out over $1 million to hundreds of reporters. However, many of the reports we get are nonsense or misguided, and even those … provide some modicum of reproduction instructions.”

Nevertheless, he said, “we should have pushed back asking for more details here.”
He went on to say that Shreateh would not be paid from Facebook’s bounty program because he’d violated the company’s terms of service — namely by posting items to the Facebook pages of users he should not have had access to.
“The more important issue here is with how the bug was demonstrated using the accounts of real people without their permission. Exploiting bugs to impact real users is not acceptable behavior for a white hat,” he said, using an industry term for ethical security experts.
Jones added that the bug was fixed Thursday. Facebook declined to comment beyond the post.
The bug — and Facebook’s response to it — has become a talking point in information security circles, with many speculating that the Palestinian could have helped himself to thousands of dollars had he chosen to sell the information on the black market.
Shreateh said he was initially disappointed by the Facebook response but that after being inundated by job offers from all over the world he is pleased with how things worked out.


“I am looking for a good job to start a normal life like everybody,” he said. “I am so proud to be the Palestinian who discovered that exploit in Facebook.”


0 3215

Hacking Tips n Tricks
Without putting your morals to the side, there are many legal hacking tricks that you can use to make your tech life easier. Remember hackers aren’t just about causing mayhem or righting wrongs they perceive. It’s also about optimizing technology. A few common hacker commands can make a huge difference to the common IT user.
Ctrl-C isn’t just for copying a highlighted passage. If you’ve already completed a command, this quick fix can undo almost anything. It’s a quick abort command that works in most fixes and saves you time. Check out these other easy tips that pros like your seo company already know.

The Top Row of Your Keyboard Is Useful

All of those Fs stand for something and it’s time you knew what. In the command prompt, use F1 to paste the last command by each character, F2 to paste the last command up to the last character, F3 to paste the last command, F4 to delete the prompt text and F5 to paste the last command. Once you get the hang of it, usingthe commands become as natural as typing in QWERTY.
If you’re not quite there yet, consider what the F keys are for out of command mode. Most keyboards have pictures that highlight their use. You can brighten the screen, control sound and control if you’re connected to the internet. Spend some time exploring the F keys and customize your laptop.

Hacking Siri

If you’ve seen the recent Big Bang Theory episode about the voice command Siri, maybe you’ve been tempted to try it out. The throaty female voice’s command follows your wish, but you need to know how to talk to the lady. She’s not very good at grammar and using punctuation, but all you need to do is state the punctuation point you want included (such as a period or comma).
She’s also not very savvy with proper names, but you can fix that. You can tell Siri, “Joaquin Smith is my brother,

One fine morning, you wake up to find that you are not able to log on to your Facebook account. As you are wondering what caused this lockout, you receive an urgent call from your friend asking you about the hospital you are admitted in. By the time you finish explaining to your friend that you are hale and healthy and that the post in Facebook was not from you, you are exhausted.If seeing your beloved Facebook account getting hacked was not a heavy blow on your fragile system, the fact that someone is sending malicious messages from your ID makes matters worse. It is not the question of losing your Facebook account. There is a wealth of personal information in your Facebook profile that any hacker can utilize to gain access to your bank accounts. Yes, we know it is a terrible feeling, but don’t worry, all is not lost.

There are certain things you can do to recover from a hack attack. Begin by recovering your account before you start restoring your Facebook profile.
  • First is the obvious step: Don’t ever share your passwords, Facebook or otherwise, with anyone. That includes your friends and family. Always browse through a secure connection.
  • Don’t click on links you are not sure of. Flooding your newsfeed with suspicious links that you may be tempted to click is one of the tools that hackers use. Don’t give in to that temptation. Games, apps and offers are some such tactics used by hackers.
  • Accept ‘friend requests’ only from people you know. When you accept friend requests from people you don’t know, you are giving access to your personal information.
  • Understand the security policy of Facebook before signing up. One way to protect your Facebook profile from being hacked is by adding a secondary email ID. How? In the event that your profile is hacked, Facebook will send account recovery information to both your email ID’s.
  • Don’t post financial details on Facebook. Although this sounds obvious, there are instances where we inadvertently post financial and personal information on Facebook. And don’t go to any site that asks for personal information.
  • Don’t paste codes on to your browser tab. Although copy/pasting lines of code is easy, remember that hackers use your laziness to spread malware.
  • Don’t give permission to third party apps to access your Facebook account. Disable or remove those apps that you are not using presently.
  • Always keep your login notifications in active mode. This way, every time your account is activated you will receive a notification.
  • And don’t forget to report the hack to Facebook.
  • Don’t get into the habit of using recycled passwords. Try using new passwords that are unique and can easily be memorized by you.
Facebook may be your best buddy, your diary of sorts, chronicler of your life and an outlet for your creativity. And it is important that you keep your Facebook account as personal and secure as you can. These points can help your Facebook account be totally free from the hackers menace.
Author Bio: This is a guest post by Ron Schiff of xfinityonline, a site that offers savings and current information on xfinity.

When рeорlе fіrѕt hеаr аbоut hacking, thеy wіll uѕuаllу ѕее thiѕ іdеа аs ѕоmething nеgatіvе. Indееd, hacking hаѕ alwаys bееn about taking аdvаntаgе of unрrotectеd or wеakly-guardеd ѕites оr ѕуѕtemѕ fоr the indіviduаls оwn ѕеlfiѕh іntеrеst. Bе

STAY CONNECTED