How to keep yourself from the internet ?

You must be thinking, Why ?! What could possible happen? Its safe right?

Here is a video to all your questions on what hackers can do.

Cool and also scared right ?

So i am here to share with you some knowledge i have, so you would not be a victim of fraud, scam, hacked, whatever you want to call it.
There are many hacking techniques hacker uses.

Always remember this.

Hack can happen anywhere as long as there is signals and devices.

Get a VPN to protect yourself!

Attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication, Mostly done via Email, Cloned site)……

“Read More”

A phishing website (sometimes called a “spoofed” site) is made by hackers which, tries to steal your account password or other confidential information by tricking you into believing you’re on a legitimate website and you could even land on a phishing site by mistyping a URL (web address). 

E.g – Legit site – ” ” | Mistyped site – ” “

“Read More”

Social engineering are used to con, trick, manipulate you to give out information that shouldn’t be and those information being extracted is used to commit fraud or impersonating you to other party.

They also can combine Email Phishing and Website Phishing in this attack so be careful.

“Read More”

Malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.

“Read More”

What is malware & types? (Keyloggers/Virus)

Malware, short for malicious software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user — and so does not include software that causes unintentional harm due to some deficiency.

  1. Ransomeware “Pay To Access”(Type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key also known as a password.)
  2. Spyware “24/7 Watching You” (Type of malware that is sitting quietly on the background of the computer can be deceived as important program that is required to keep the computer running,  spying on your every movement on the internet, gathering information of you. E.g.-“Keystrokes, Websites you view, Usernames&Passwords, Basically everything you do.)
  3. Adware “URGH! So many pop ups (Malware that shows you unwanted ads in pop ups, when you are browsing the internet. Sometimes it tend to be “unclosable”)”


Now the focused topic is cryptocurrency

Money Machine

Money Machine 2

Look at this short clip and tell me its impossible.


Thank you for reading!

Learn more about technique of hackers. Protect yourself and your coins now!

Make Money With Cryptocurrency!

Do support this page by switching off ad-blockers / view those ads or Donate at the bottom of the page

*Donations are used to host the site and support my family income*

Share the knowledge with your friends and family!