Category Archives: Non classé

How to create a Fyatu account? Online payment

In the digital age, it’s easier than ever to pay for goods and services online. Not only can you use your credit or debit card with ease, but there are also a host of secure payment services (Fyatu) that make the process faster and more convenient.
Whether you’re buying a subscription or a one-time item on an e-commerce site.

You may be asked to provide your payment information at checkout. This can be as simple as providing your credit card details or choosing from different options such as PayPal or Apple Pay. 

Each of these online payment methods has advantages and disadvantages. We, therefore, advise you to continue reading this article to discover a new, reliable, and secure online payment service that will make your life easier.

What is Fyatu?

Fyatu is an online payment service similar to PayPal, Payoneer, Stripe, or Skrill. But it is better suited for use in multiple countries around the world. 

Fyatu offers instant and unlimited USD payment cards. It also allows companies to integrate their credit card creation API into their systems to help them grow.

Fyatu’s services as presented on its official website can be easily summarized in 3 short lines, which are :

  • Management of virtual cards;
  • Money transfer (send and receive);
  • Charge cell phones;

Virtual card management

Fyatu lets you automate the creation, management, and distribution of virtual cards with advanced spending controls and real-time authorization, putting you in control of every step of the process.

You can also pay with any Apple Pay-compatible device by adding Fyatu’s virtual card to your Apple Pay wallet. It also allows you to receive instant notifications of your online or in-store card payment events.

Money transfer (send)

With Fyatu, send money anywhere in the world instantly from your Fyatu account to mobile money platforms in 9+ countries in Africa or make payments to your partners to 3+ popular online wallets.

Charge cell phones

Fyatu has a direct partnership with more than 19 Mobile Money operators in 9 African countries to ensure the speed of your money transfer

Why use Fyatu?

If you are a blogger or a person doing online business regularly, Fyatu offers you the possibility to create a Personal (standard) account: Allow the use of Fyatu’s minimum services. Example: create a virtual card, recharge a phone, make online purchases, exchange bitcoins, etc.

Sellers (business)the target audience is freelancers, online sellers, developers, etc. This account itself allows an individual or a company to integrate Fyatu into their payment system. 

Therefore, it can be used in a business to automatically receive payments. But also for transactions between external services such as receiving money via PayPal, bank cards, Mobile Money, etc. in addition to managing one or more virtual cards.

Agent (company): This type of account registers you as a Fyatu agent. This allows you to earn money by providing Fyatu services to individuals and businesses.

How to create a Fyatu account

Here we are at the right time to create our Fyatu account and start using it. By going to my link to register, you will AUTOMATICALLY EARN $ 0.5 FREE BONUS. 

What’s it like to make money with Fyatu? The answer to this question is very simple. Fyatu has an affiliate program, so you will receive commissions if the person you invited with your referral link starts using Fyatu and makes transactions.

After clicking on the button, you will be directed to the registration form: To create an account, you must fill in the form with the information requested, and I invite you to read Fyatu’s terms of use.

As you see in this figure, you must provide your name, surname, email, choose your country, and password. Make sure to enter a strong password using uppercase, lowercase, numbers, and special characters.

For example, (PASSWORDstrong@2025) Above all, don’t forget to check if you are not a robot by validating the captcha before clicking on “Create an account.”

So as soon as you click on create an account, a link will be sent to you by e-mail. This is the link that will be used to confirm your email.

You will be taken directly to the dashboard. And from there you can do other operations like:

  • Top up your account
  • Buy virtual MasterCard
  • Confirm your phone number, etc.

Here we are at the end of our article on creating a Fyatu account. If you have a question or recommendation, you are welcome. Before doing any transaction with Fyatu, you must verify your phone number and complete your profile. You can check this:

How to verify Fyatu account – KYC verification

Hello everyone, welcome to this article about how to verify a Fyatu account (KYC verification). In this article, you will discover how to proceed to verify your Fyatu account and be validated easily in less than a few minutes. Know Your Customer (KYC) requirements are a set of principles and procedures designed to help organizations verify the identity of their customers in order to prevent money laundering, terrorist financing, corruption, bribery, and other illegal activities. In many countries and sectors, KYC regulations have become standard practice for businesses that interact directly with customers. Some institutions even require companies to conduct a KYC check before opening an account for them.

It’s critical to comprehend why KYC is required, what exactly it comprises, and how to complete the procedure as quickly as possible, whether you’re opening an account with a new bank or even registering for a free service on an app. All the information you require about KYC will be covered in this post.

What is KYC and how verification errors can be avoided?

One of the cornerstones of the commercial relationship between a company and its clients is client knowledge. It depends on adhering to rules that allow for the verification of the client’s identity, address, and the subject of the commercial relationship in order to build trust. In the banking environment, the KYC verification procedure and the regulatory responsibilities that follow are tools for fighting online fraud, money laundering, and terrorism financing (together known as AML/CFT). Online verification systems that streamline numerous manual processes are frequently unreliable and therefore unreliable.

While all business sectors are affected by potential identity theft, the financial and banking sectors are leading the way, especially due to the sensitive nature of the transactions they handle. physical. Trusted financial transactions over €250 (or total transactions over €2,500 in a calendar year) rely on necessary but time-consuming verification procedures.

In France, the Regulatory and Controlling Prudential Authority (ACPR) holds banking and insurance groups accountable and can impose penalties for non-compliance. Sanctions totaling €7 million (compared to €10 million in 2020) To carry out these checks, ACPR recommends establishing KYC verification procedures. While these processes are complex and manual, solutions exist to comply with standards without compromising customer engagement. But first let’s see what the KYC process is.

What is KYC control, exactly?

KYC verification is mainly based on identifying and verifying the identity of the customer or user. If the company is legally insured in the KYC process, the customers are also covered, which ensures that they are contracting with a trusted party. By verifying that the customer is who he claims to be, the company can then grant him access to various offers. There are several methods to verify a person’s identity as part of a KYC check:

  • Verification of identification documents (such as a driver’s license, passport, or identity card)
  • Verification of certified documents
  • Visually enhanced by conference
  • Biometric control Verification of safety

How to verify your Fyatu account – KYC verification

Because you cannot trasact in Fyatu without verifying your account and confirming your phone number. KYC verification is mandatory for all Fyatu users, so to fix it and avoid trouble for you, let’s see how. So, before you have to verify your account, Fyatu requires you to complete your profile first to get access to KYC verification.

Here is the information you need to fill in:

  • Phone number
  • Nation City / Town
  • Full address
  • ZIP code
  • Date of birth
  • Gender

This is a list of information that needs to be completed before proceeding with KYC verification. When opening your account, Fyatu only asks for your first and last name, email address and password. So to complete your profile, go to your profile or your account settings, as shown in the following figure.

Then, once you’re in your account or profile settings, you’ll see the information below.

As you can see in this picture, I have filled in all the information that needs to be completed to be ready to proceed with KYC verification. Then, once you’ve finished filling out your profile, validate by clicking the save button.

For people living in countries where the postal system is not efficient, please enter a 5 digit number like 00000, 123 5, etc.

One more thing to fill in is your profile picture, it’s required, but you don’t have to put your own face, you can put any picture you want.

Then, after updating your profile picture, you can proceed with the KYC verification.

You may also like to know How to Reset a Fyatu Account Password

KYC verification of Fyatu account

Well, once you have finished filling in the profile information, in the menu, go to KYC verification.

As soon as you click on KYC verification, the screen shown in the following figure will appear.

At this stage you must click on choose. To choose the type of document you have, on Fyatu you are offered the possibility of verifying your account with three types of documents of which:

  • Identity card
  • National passport
  • Driving licence.

So, to continue, you have to choose among the three which type of document you have, then you will have to send the photos that Fyatu request you to submit.

  • The part of the ID card that contains your photo.
  • The back part of your ID card.
  • Your Selfie holding your card and a paper with a mention FYATU.COM and date and time

You may also like to know How to create a virtual credit card with Fyatu

Here, you need to submit part of your ID card that shows your photo and other information about you.

Then, you have to upload the photo that shows the back of your ID card.

Finally, you need to take a photo of yourself holding your ID card(front part that shows your picture), and a piece of paper that says and today

Example of a selfie to send without forget the paper with the mention and date and time

by filling all this information you can then send your documents to Fyatu by simply clicking the submit button.

One last thing to know, make sure you send clear photos and don’t submit expired documents, or your submitted documents will be rejected by Fyatu. The verification process takes approximately 2 hours after submitting the document. If you have any difficulty completing the KYC verification, please leave us a comment or contact Fyatu customer service department.

How to get a MasterCard for $5 – Fyatu

An alternative to a physical credit card that may be used online is a virtual credit card (MasterCard and Visa cards). It is also referred to as a digital credit card or alternative payment mechanism, and is growing more popular for online purchases. We’ll look at how to create a Fyatu virtual card.

A virtual credit card is essentially a spending limit-set account number that may be used to make online purchases, typically from particular shops.

They come in particularly handy if you don’t have or don’t carry a physical credit card when you want to make an online purchase. Additionally, virtual cards provide an additional layer of security.

When you buy something from a website that doesn’t require the secure HTTP protocol. In this article,

What is the purpose of a Fyatu Mastercard?

The best option for making secure online payments without disclosing your credit card information is the Fyatu virtual card.

They can be used to construct personal budgets, manage online subscriptions, and make purchases from online merchants.

Keep reading to learn more about the benefits of using the Fyatu virtual card while making online payments.

You may also like to know how to reset a fyatu password

How to create a Mastercard for only $5 ?

Before you can create a Mastercard, you must have an active Fyatu account to have access to the system. Don’t worry if you don’t yet have a Fyatu account. You can read our article on how to create a Fyatu account to make payments online.

I’m assuming that each of you already has an active Fyatu account.

After you have inserted your Gmail and your password and clicked on login, As seen in the following figure, we shall then find ourselves in front of our dashboard.

Create a Fyatu card.

When you get there, you have to make a deposit before you can create a virtual card. In contrast to conventional banks and other virtual card issuers, Fyatu offers its cards at extremely low prices, for just 5 USD. In order to proceed, you must first make a deposit of $10.

😧: Why make a deposit of $10 when the card only costs $5?

Naturally, the card is worth $5 to respond to this question, but you must first make a deposit of $5 into the card.

You can therefore select the Virtual Cards option from the menu after finishing the deposit process. 💳

Then, click on Create a Card; as soon as you validate, you will be presented with a screen like the one in the following figure.

As you can see, you must name your card and enter the $5 deposit and initial purchase amounts. But, this does not preclude putting down the appropriate sum for the initial deposit; however, for the purpose of creating the card, the sum cannot exceed $50.

😧: What does it mean that the amount of money cannot surpass $50?

Relax, you can only make a deposit of $50 when you are creating a card, and then after the creation. However, as soon as the creative processes are completed, the maximum amount you can top up onto your card is $250.000.

With Fyatu Mastercard you can buy and pay on more than 6000 websites

This is the end of our article, if you got any question or suggestion don’t forget to share with us on the comment section.

How to Reset a Fyatu Account Password

Have you ever lost your website account’s login or password? One of the most annoying things that can occur while browsing the internet is this. You don’t have to handle this scenario by yourself, though. You will discover some methods in this manual to reset your forgotten Fyatu login or password, no matter where you are or what device you are using.

This guide will show you how to change your Fyatu password without losing your mind. What is Fyatu, for those who don’t know it yet. You can read our post to learn how to set up an online payment Fyatu account. Those of you who utilize Fyatu already likely got an email advising you to change your password.

As you can see, in order to continue using our Fyatu account with more security, we are required to alter our password. When they saw this warning, many Fyatu users became alarmed. Many people attempted to access their accounts without having to update them, but sadly they were unable to do so. Let’s discover how to change our Fyatu password right away.

How to update a Fyatu account password

All you have to do to update a Fyatu password is visit the login page of the Fyatu website.

Following that, you must click the Forgot Password link, as shown in the image.

After selecting “forgot password,” you will be presented with the picture shown in the aforementioned figure. You then enter your Fyatu-registered Gmail account without forgetting to verify that you are not a robot😁. A link will be sent to your email address automatically when you click “generate reset link.”

This picture depicts the email I got from Fyatu after clicking on the generate link. Therefore, as soon as you read this message, confirm that you asked to have your password reset. then press the button marked “Reset Password” or the message’s associated link. The reset page will then be displayed, as shown in the figure below.

In order to reuse your account, you may now set a new password for your Fyatu account over here.

Advice: Use caution if you get an email urging you to change your password. To prevent sending your information to hackers, confirm with Fyatu’s customer support that they are the ones who sent the email before doing so.

7 BEST apps to spy on your partner’s WhatsApp

Let me just start with this simple question before we start. Do you think your partner is chitting at you? Do you want to spy on your partner? if yes then continue reading.

What do you think it’s like when you realise your partner is hiding something from you? It was excruciating. And I’m guessing that if you’re reading this, it’s because you’re looking for a quick fix to your problem that will allow you to access your partner’s WhatsApp chats with just one click. What I’m trying to convey is that you’ve come to the correct place since this post will list the top seven applications for spying on your partner’s chats, despite the fact that doing so is against the law.

The word “spy” alone conjures up images of a scandal. It’s understandable to be sceptical of digital espionage in a time when illicit hacking and camera access have made many IT specialists and big business owners nervous.

However, much like anything else, the usage of phone spying apps can be both ethical and unethical, depending on the individual’s preferences.

Why Use Spyware Apps

There are numerous valid reasons why someone would wish to utilize a spy phone app. These apps can be used to locate a stolen or misplaced phone, monitor your child’s cell phone usage, and track incoming and outgoing SMS and phone calls. Also, it can help to monitor your partner’s smartphone

When it comes to selecting such apps, there are many possibilities available today. As a result, deciding on the finest phone spy applications might be difficult. We’re here to put your mind at ease as you make decisions.

In this guide, we’ll introduce you to some of the greatest spy phone applications on the market today, as well as provide information on their performance, features, and pricing. In the meantime, we’ll provide you with a handful of our own personal favourite spyware software.

What Are Phone Spy Apps

Phone spying apps are essentially smartphone surveillance apps that allow you to monitor the activities of a smartphone device that you want to monitor. Incoming and outgoing calls, SMSs, and the phone’s location may all be tracked in real-time. The end-user is unaware of these programs because they are undetectable.

Pro-Tip: Before purchasing a phone spy app, familiarize yourself with the regulations that govern the area in which you will be operating. It’s possible that your government forbids the use of such applications in your area. Second, look into the overall reception of the app you’ve chosen; it should have a resoundingly good user base. Choose an app that doesn’t have a complicated UI and is simple to use.

Frequently Asked Questions about spy apps

1) Are Phone Spy Apps Legal?

Answer: It’s only legal if you’re using it to track a minor’s phone activity or your own. Installing such programs on another person’s cellphone without their knowledge or agreement is unlawful, and if detected, can result in steep penalties and prison time. We only recommend that you utilize such apps for legitimate purposes.

2) Can Such Apps be installed on another device without physically touching that device?

Answer: Yes, these apps can be loaded on another device without coming into contact with it physically. This feature, of course, differs from app to app.

3) Is it possible to find out whether your phone is being spied upon?

Answer: Yes, all you have to do is keep an eye out for suspicious-looking apps or notifications on your iPhone. You can also use powerful anti-virus software to detect and remove any type of spyware, malware, or adware from your computer.

You may also like How to know if Your smartphone is Tapped or spyed

Our TOP Picks:

• Real-time GPS location
• Multi-phone overview
• It remains undetected
• Keylogger
• Screen recorder
• Works in Stealth mode.
• View Call history
• Real-time GPS location
• Keylogger
Price: $19 per month
Trial version: Available
Price: $48.99/month
Trial version: Available
Price: Reasonable price
Trial version: Available
Mobilespy official pageMspy official pageUmobix official page

List of spyware

#1) mSpy

mSpy is another amazing phone surveillance tool on the market. The fact that it is primarily used as a parental monitoring tool sets it apart from the others on the list.

It’s a robust platform with features like mobile phone monitoring, location tracking, multimedia file monitoring, and online activity tracking, among others. It allows you to control apps and programs on a hidden device from afar.


  • Facebook, Instagram, Snapchat, and other social media platforms are all monitored.
  • Recovering deleted messages, restricting websites/apps/contacts from afar, and so forth.
  • It’s equipped with a screen recorder.

Conclusion: mSpy is an excellent parental control application that includes all of the necessary functions. It allows you to keep track of every keystroke and tap, as well as social media chats and shared photos. It gives all of these surveillance capabilities while remaining undetected.


  • 1 Month – $48.99/month,
  • 3 Months – $27.99/month,
  • 12 Months – $11.66/month.
  • Demo available.

#2) Cocospy – spy app

Cocospy is a simple-to-install and-use cross-platform phone spying tool. It takes only 5 minutes to set up and install, and it operates in perfect stealth mode, so the phone user is unaware of its presence on the device. Using a sophisticated dashboard, the app can monitor practically everything that happens on the target device in real-time.

You can easily examine phone logs, trace sent and received SMSs, and keep track of your online browsing history. You may also track a person’s real-time whereabouts using either a SIM card or GPS technology with the app.


  • Geofence Alerts
  • Call Tracker
  • Social Media Spy
  • Track Browser History
  • Stealth Mode

Conclusion: Cocospy has received high appreciation from a number of customers around the world for its straightforward installation and user-friendly spying interface. With this program loaded and operating in the background, no smartphone activity can be hidden. The program is compatible with both iOS and Android smartphones, and there is no need to jailbreak or root any of them.


Premium is 9.99 per month, Basic is 39.99 per month, and Family is 69.99 per month on Android (when purchased annually)
Premium – 10.83 per month, Basic – 99.99 per month, Family – 399.99 per month (when purchased annually)

#3) – spy app is a spy app with a lot of features. It’s the only Smartphone Tracking App that gives you real-time access to GPS, Camera, Photos, Call-Recordings, Call Notifications, Social-Media Messages (Whatsapp, Facebook, Instagram, Vkm, SMS, and more), and everything else.

Even beginners will have no issue utilizing this Spyapp because the platform is quite current and simple to use.

There are over 42 unique features, all of which you can try out for free on Live-Demo to see whether they meet your demands.

You may also like the ways to protect smartphones from hackers. Guardian self-defense


  • Futuristic Real-Time Dashboard
  • Location Tracking
  • Access to GPS, Photos, Videos, and Calls
  • Comprehensive online activity tracking

Conclusion: is ideal for both parents and businesses looking for the most advanced spyapp money can buy.

Price: Free trial for 7 days, Monthly plan is $19.00 per month, quarterly plan is $13.00 per month, and the half-year plan is $13.00 per month.

#4) uMobix

The only app that gives you complete access to your Instagram and Facebook accounts is uMobix. Users can log into anyone’s Facebook or Instagram account and click on any button there to manage accounts, alter settings, add friends, or delete followers.

The only app that works flawlessly on both iOS and Android is uMobix. It implies you can install it without any problems and monitor it without finding any bugs.

Unlike many of its competitors, uMobix does not require you to jailbreak your iOS smartphone. You simply enter your iCloud ID and password, and the monitoring begins as soon as the backup is completed.

The app has several truly unique features, such as an online status indicator (which shows whether the user is online), real-time Android reporting, Youtube monitoring, and app activity tracking.

Overall, uMobix provides the most value for money, as it is one of the most economical surveillance apps available today.

Price: $29.99 per month with a free trial.

#5) eyeZy

No matter what device you are using, eyeZy is a simple-to-use phone monitoring app that enables parental control on all phones. Without the user of the device realizing it, eyeZy enables you to keep an eye on your selected phone. You may use the software to track all actions taken on your target smartphone, including text messages, browsing history, and other activities.

The Artificial Intelligence that eyeZy has is what really makes it stand out. You don’t need to keep glueing yourself to the app because of its superior AI. In fact, the app will notify you if the intended phone is in use. You can also feel secure knowing that eyeZy uses bank-grade encryption to safeguard the information that is important to you and your loved ones.


  • Monitor each keystroke that is recorded on a target device.
  • Observe text and social media usage. uncover even erased texts.
  • Geo-Location Tracker and Wi-Fi Network Analysis.
  • Locate the multimedia files that have been saved on the target device and watch them online.
  • View and disable the websites that users of your targeted device have visited.

Conclusion: eyeZy is a feature-rich phone monitoring tool that enables you to keep tabs on every action taking place on the target device. Parental control is greatly facilitated by this app. The icing on the cake is AI, which is truly astonishing. Given how simple it is to install and use on both iOS and Android devices, this one is definitely worth a shot.

Cost: $9.99 for a year, $27.99 for three months, and $47.99

#6) Hoverwatch

With the ability to record position, SMS, call audio, WhatsApp, Facebook, and other things, Hoverwatch is a mobile phone tracker and a covert monitoring program. It enables you to keep an eye on online activity. It works with Windows, Mac OS X, and Android. It operates in stealth mode and vanishes from view for the target Android device’s user.


  • On the target device, Hoverwatch can record both incoming and outgoing calls.
  • It allows you to check the phone’s internet history and tracks things like Facebook messages and SMS.
  • It includes technologies like Viber spy, Snapchat spy, and WhatsApp spy, among others.
  • It can also track calls, track to-do lists, identify SIM card changes, track phone whereabouts, take screenshots, and much more.

Conclusion: The Hoverwatch mobile tracker is absolutely undetectable and has the ability to track SMS, geolocate users, record calls, and monitor social media.

Price: Hoverwatch offers the service with three different pricing tiers: Personal ($24.95/month), Professional ($9.99/month/device), and Business ($6.00/month/device). Free registration is available.

You may also like to know the Airdroid Best Android App To Transfer Files & Control Device


Cell phone spy apps may be quite helpful for both businessmen who want to safeguard their interests and parents who want to shield their kids from the dark things the internet can expose them to. These are the only acceptable justifications for using such programs.

Any other use could cause you to lose friends or, worse yet, land you in jail. Choose your justifications carefully. As for our suggestion, we advise you to try XNSPY or FlexiSPY for a sophisticated and reasonably priced spying experience. You can choose the basic mSpy instead for a more austere user experience, mostly for parental concerns.

How to Remain Anonymous While Traveling Abroad

Every web user who does not want to be watched by huge companies and governments throughout the world needs to be anonymous. Being anonymous is beneficial to both novice and advanced users. This is why, in this post, we will explore how to remain anonymous while travelling abroad in any country.

In a recent article, we covered how to surf anonymously and sensibly using the browser and NordVPN on the darknet. This was a fantastic essay for individuals who need to remain anonymous when browsing the darknet. I strongly advise you to take a look at it.

Then let’s see what we can do to keep our identities hidden. This is not a magical article.

The first thing you’ll need is a fictitious identity. There’s no getting around it. Before you can fly, you have to know your falsehoods inside and out. Then, in case you’re detected, you’ll need to lay a foundation to back your lie. We’ll select the Philippines because it’s the world’s most socially connected country. And I’m not talking about online.

Create an email address

The first step is to create an email account with the format Obviously, the name should be fictitious and something that is widespread in your country but not in your city. So, if you’re from Chinatown, you should probably go somewhere else.

For most tall white guys, John Smith is arguably too obvious. You must never use this email for anything related to your real name, as the goal is to muddy the waters for anyone looking for you.

They’ll look for your favourite Skype usernames using reverse image searches, phone numbers, Facebook pages, Instagram, and possibly Usenet and Ars Technica forums.

Never use this fictitious name on social media that is linked to your real identity. Ever. If at all possible, avoid using this name on the same IP address. Use a VPN on a laptop dedicated to this fictitious identity. If you must, sign up for Facebook, but keep in mind that if you log in from the same IP address as your Real You, Facebook will notice and broadcast it to the world.

Is that your real name?

When people talk to you on Skype or in a chatroom, they virtually always question, “Is that your real name?” You can tell them you work for a hidden company if you have to; if you expose your true name, nothing will work out. If someone asks for your address on the internet, stop communicating with them right away. They’re either a stalker or an identity thief, most likely.

Don’t post your real pictures

Posting outdated images to a fake Facebook page is never a good idea. Any images you take must be specifically for that profile and nothing else, or people will see outdated photos from your personal Facebook page.

You can sometimes encircle a problem like this. Checking in at the Marriott with a nice female by your side, the same one you just lied to, is a problem area. Only the lovely emerald-green-eyed girl behind the counter inquires about your real name. Do you tell lies? Your cover is blown. How about displaying your ID card? Nope, not this time. Because not everyone there speaks great English, she may easily ask you to pronounce it. As a result, your goose is now cooked. What should I do, what should I do?

For starters, you can make a lodging reservation over the phone rather than online. You must be prepared for her to ask for identification at any time. That is to say:

  • Prepare a business card with your website and a phoney email address and give it to anyone who asks. Just don’t give it out nervously, or you’ll discover, as Jim Rockford learned in the 1970s, that terrible liars are a source of shame for everyone concerned, so be as calm as Mr. Orange in Reservoir Dogs.
  • Put everything in the room’s safe, including your real ID. Passports, too (did you send yourself a copy in case it was stolen? There are a lot of sticky palms on those Pinoy trikes). Say the next War and Peace manuscript if she or he asks what’s in the safe. You have gold, but they have nothing. – On your luggage tags, only write your bogus email address, not your real name.
  • Make sure that any phone’s ‘location’ feature is turned off.

How to create an executable file in command prompt (CMD) like a geek

In this article we are going to discuss how to create an executable file in command prompt, that is, how to create a program (script) that runs in CMD. To be able to do this, you will need to have some knowledge of command prompting, so you should know a few commands in this area.

If you don’t know, no problem; you can use the HELP command to help you with the CMD functions. Then, it will be up to you to continue your research to learn more. Let’s go 😉 !

Before we go any further, I hope you know what the command prompt is. For those who don’t know the command prompt, is the Windows command line interpreter (not a game console or anything like that). It’s used to execute commands. The console is a piece of software, or rather a way of using the operating system by means of commands called console codes. This term is very familiar to users of Linux systems.

Well, by default the text is white and there is no transparency but you can customise it. That’s right! This means that you can do everything under the command prompt and even more than you would do with the GUI. But that’s not what we’re going to talk about today, I’ll tell you about that in another article. Let’s move on to what we are interested in here.

As software, here we will use the Windows Notepad, but you can use a text editor that you want like sublime text or vscode. So the first thing to do is to launch your Notepad, then save it in a place you want (and with a name of your choice) but with the extension .cmd.

Look at the location you have chosen, you will see a nice executable file, you can even try by running it

.But in most cases, you will get a message like this:

If you find such a message, it is simply because your script has no command yet. So to correct it you just have to type commands in the file and save it. I use the HELP command that I mentioned above. If all goes well, when you run the little script it will start and close suddenly unless you used a different command than mine.

Well, CMD scripts are read by the computer as text files (line by line), that is to say, that the computer reads line by line your script. It tries to execute the tasks it understands and then continues if there is no more task to complete it closes the script.

If you want your script to stay open, use a command that either asks for information input or launches another program and then the script will be closed automatically only after closing the program it launched. Try with the DISKPART command to launch Diskpart, a partition manager (storage media in general) provided by Windows. Here are the captures of my two screens.

Then, if you execute this script it will show the message “You are watching the course code of my script” because the command echo help to display the message. And the command diskpart helps to run the small program “diskpart”

This is just a small script but you can add commands and even a complete program with the same principle. Thanks for reading this article, especially feel free to put any problems or recommendations in the comments. 👍👋

How to recover an installation ISO image from a USB stick (bootable).

It happens sometimes that someone loses his operating system installation file, simply because he formatted it when reinstalling the partition that contained the said image, or maybe he had a loss of data due to some event but he still has his installation key (that he had booted).

So, here we will see how to create an installation ISO file from a key that has been booted. For those who don’t know what an ISO file is, I will publish the article “How to reinstall your PC properly like an expert”.

For everything we’re going to talk about to be possible, you need to download PowerISO, because that’s the software we’ll be using here. But, I want to warn you that this software is not free, there is a trial version but it doesn’t manage images bigger than 700 MB, for the ISO images of an OS installation are much bigger than that. So it would be convenient to buy the software on its official site: Download PowerISO.If you already have it, run it.

The PowerISO home screen

This is the home screen of the software in the figure above. Don’t worry if you have downloaded it in a language that doesn’t suit you because it is multilingual. To change the display language, click on the menu Options > Language > Choose the language of your choice.

I’m not going to explain how the whole program works, we’ll just see how to recover an ISO file. Let’s go! First of all, you need a bootable USB stick, that is, one that the computer can boot from. Because we need all the system installation files.

Of course, if you are sure that you have all these files either on your disk in a folder (maybe you have copied them when you found out that you lost the image), you can use them without any problem.

To start, click on the Add button and then go to the directory where these files are located and select everything, without exception.

Before moving on, you need to be sure that all the files are there. To be sure, if it is a USB stick, it will have a special icon depending on the system it contains. Here is the icon of my key because I booted Windows 7 on it. For Windows, here are the files and folders that should generally be there:

As you can see, the key has the setup.exe file icon
After adding all the files (and folders) to your key, you need to save by pressing Save. You can do this in the location of your choice, and as a file type, choose Standard ISO.

Wait until the end of the registration process, it takes time because the file is large, for me it is more than 2 GB but recent versions of Windows go even beyond 4 GB. Once the process is finished, you will find the ISO file you saved. I don’t know if you’ve noticed but at the bottom of the window, it says non-bootable image. This means that you still can’t install (reinstall) a computer with the file you created.

How to make this file bootable and ready for installation?

Bootable ISO images have a special little file that contains the boot information, so this is what you need to add to make your image bootable. Let’s see how this is done. To have a boot information file there are two possibilities: either you get a floppy disk that contains this information, which is a bit complicated; and, the second possibility is to copy this file from another bootable image, and this is what we are going to do.

You may also like to know about How to create an executable file in command prompt (CMD) like a geek

Open with PowerISO another bootable file, which you have, provided that it is of the same OS, they can be different versions like Windows 8 and Windows 10 or 7; then click on Actions > Boot > Save Boot Information…; select a location and give a name then save. You will have a file with the extension “.bif”, this is the Boot information file.

I advise you to keep this file in a safe place, it will be of great help in case of another loss.
Go to the other image, the one we have created, and click on Actions > Boot > Add Boot Information…; a dialogue box will open, select the .bif file you have saved; after that, save your image again because it is already bootable, check, it has changed at the bottom of the window.

And there you have it:

That’s all! Thanks for reading this article, if you encounter any problems put them in the comments.

ShellPhish Termux tool to hack social media

ShellPhish is a powerful open-source tool that was designed for phishing attacks. Phishing attacks have become popular for both beginners and advanced attackers. AbirHasan created Shellphisher due to the need of beginners and made this tool easy to work for them.

Also, it contains some templates generated by another tool called SocialFish and offers phishing templates webpages for more than 10 popular sites such as:

  • Facebook
  • Instagram
  • Google
  • Microsoft
  • Netflix
  • Paypal
  • Twitter, also playstation
  • GitHub, also Twitch
  • And more other

List of available sites in ShellPhish

Then, as I said ShellPhish has more than 10 templates that we are going to list here. And also, the developer adds other templates on each update of ShellPhish.

ShellPhish v2.5-MOD

ShellPhish v2.5 is the updated version of this tool. Here we are going to list what is new for this version.

  • New login/phishing page
  • Traditional login page
  • Also, advanced voting poll login page
  • Fake security login page
  • Facebook messenger login page
  • Also, new sites were added, and 4 port forwarding options

What can you do with Shellphish?

Well, with ShellPhish you can create phishing pages of the most popular social networking websites and other popular websites. It is easy to use for creating a fake page in order to get sensitive information from victims.

also you might like to know about wifi hacking with airgeddon

What is Phishing attack?

Phishing is a type of social engineering where an attacker sends a fraudulent (“spoofed”) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.

Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.

Installation process

The installation of ShellPhish is quite simple, we are going to discuss how you can install it in both Termux and Linux.

Then, before we continue and see how we can get and install ShellPhish make sure you have Termux on your device. And if you have not yet installed termux don’t worry you can read our post about How to hack with your smartphone using termux. And for Linux users, you can read how to start with Kali Linux. best way to follow.

Then, after we have installed what is required, make sure you know some Linux commands. But if you don’t know you can read Basic Linux commands for beginners to advance.

How to install ShellPhish in Termux

Now, open the terminal and we are going first to update and upgrade termux packages by using the command:

apt update && upgrade

Then, once the process has finished we can now install git that will help us to clone Shellphish from Github. Also, you can skip this step if you have already git installed.

apt install git -y

Now, by using the git command we can get ShellPhsh from Github to our Termux. But before we do so we have first to install some ShellPhish dependencies to avoid errors during the installation process.

apt install git wget php unzip curl -y

Then, we can get Shellphish from Github in order to install it in termux by using the command.

git clone

Well done! we can now navigate into the Shellphish folder to install the tool cloned from Github. We are going to use the Basic Linux commands for beginners.

cd ShellPhish

Then, we are going the change the permission and install Shellphish by using the command.

chmod +x * && bash

Now we have installed Shell phish in Termux. if you followed all steps listed in this article, you will see this screen appear.

How to install Shellphish in Kali Linux?

Now, let us see how we can install Shellphish in Kali Linux. The first step we are going to navigate and move to Desktop with the command cd Desktop.

Then, when on the desktop we are going to create a folder where we will clone Shellphish. we can use the command mkdir shellphish

Now, we can navigate into shellphish file by using the command cd shellphish. Then we are going to clone shellphish from Github using the command.

git clone 

Finally, we are going to execute shellphish tool by using the command: ./ Also, know that for new kali Linux will ask you to run that command as root.

Note: This is version 1.8 if you want to update to version 2.5 just run the command bash

Legal disclaimer:

Usage of Shellphish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state, and federal laws. This article is for education purposes only we assume no liability and are not responsible for any misuse or damage caused by this article

What is a Vpn, and why you need one.

Have you ever connected to a public Wi-Fi network and wondered if someone, somewhere might be able to see your online activity?. No one likes to be watched and tracked even if you have nothing to hide. That’s why you need to step up your privacy game. In this post, we are going to see few more reasons why you need a VPN.

Governments, advertisers, and even hackers may be trying to monitor your browsing history. Without a VPN, your internet service provider (ISP) could be recording your online activity and selling it to the highest bidder.

In our previous article, we discussed how to access the dark web safely, also the importance of using a VPN when accessing the dark web. And also we discussed how to use the Tor browser under a VPN. Now, if you are interested in accessing the dark web you should have a look at it.

What is a VPN?

VPN stands for “virtual private network” – a service that protects your internet connection and privacy online. It creates an encrypted tunnel for your data, protects your online identity by hiding your IP address, and allows you to use public Wi-Fi hotspots safely.

When using a VPN it encrypts your data and redirects it through a secure server. You can browse online and act as you normally would, but outside observers won’t be able to see what you’re doing or track your location.

Try NordVPN – save big and get 3 months FREE

30- day money back guarantee

Get secure and private access on internet

Get NordVPN today. Cancel anytime.

How does a VPN works?

VPNs essentially create a data tunnel between your local network and an exit node in another location, which could be thousands of miles away. Also, it makes it seem as if you’re in another place. This benefit allows online freedom, or the ability to access your favorite apps and websites while on the go.

When your VPN is on, your browsing data is encrypted. Also, are sent to a secure server, and decrypted, before being passed on to their original destination. Even if a hacker can intercept your data along the way, all they’d see would be code.

The good thing is that even your ISP won’t be able to monitor you. Using a VPN is a simple and effective way to maintain your privacy. Out of a VPN, your ISP can know your entire browsing history. A VPN service provider may have servers all over the world. That means your search activity could appear to originate at any one of them.

Also, keep in mind that Search engines also track your search history, but they’ll associate that information with an IP address that’s not yours. A VPN can hide a lot of information that can put your privacy at risk.

However, it’s helpful to know how a VPN works to understand the service better. Here is what is going on behind the scene:

  • When you connect to a VPN service, it authenticates your client with a VPN server.
  • The server then applies an encryption protocol to all the data you send and receive.
  • Then, the VPN service creates an encrypted “tunnel” over the internet. This secures the data traveling between you and your destination.
  • Also, to ensure each data packacket stays secure, a VPN wraps it in an outer packet, which is then encrypted through encapsulation. This is the core element of the VPN tunnel,keeping the data safe during transfer
  • When the data arrives at the server, the outer packet is removed through a decryption process.

Why do yo need a VPN?

As I said no one likes to be watched and tracked even if you think you have nothing to hide. Here are a few more reasons why you need a VPN:

To be safe when using public Wi-Fi regularly

A VPN is your best friend when using Wi-Fi. Hackers have many methods to steal your data on public hotspots, but the good news is that when using a VPN you can stop worrying about that. If you are among people who want to browse in full privacy you should use a VPN to secure your connection.

To mask your IP address and location

If someone captures your IP address he can also access your search history and also your location. Remember your IP address identifies your device over the internet. So, since you use a VPN it’s the IP address provided by the VPN which will be seen over the internet.

It will allow you to maintain your online privacy and search the web anonymously. Also, you will be protected against your search history gathered, viewed, or sold.

Access blocked content

One of the most popular things a VPN is used for is content access. If you are a fan of streaming services and social networks while abroad is important for you to use a VPN. using a VPN, will directly change your IP address and redirects your connection to the internet through a remote server.

Avoid tracking and surveillance

Government agencies track and collect your browsing activity, messages, social posts, and other private data. A VPN protects you from being tracked by encrypting your traffic and hiding your IP address.

What should you look for when choosing a VPN?

Speed, Security and Privacy

Choosing a VPN depends on your need but here I’m going to gives you general points. When you want to choose a VPN you have to ask yourself 3 questions before choosing a provider. How fast is it? will it keep my data safe? and will it respect my privacy? Of course, everyone needs safe connections and his data to stay private.

If a VPN doesn’t respect your privacy no need to use it, because the point of using a VPN is to protect your privacy, so it’s crucial that your VPN provider respects your privacy. Also, make sure that they never track or log your online activities.

Also, make sure to know if they do set data limits. Because depending on your internet usage, bandwidth may be a large deciding factor for you to make sure their services match your needs by checking to see if you’ll get full unmetered bandwidth without limits.

There are many points to consider when you’re choosing a VPN the job is for you to make sure you’re getting the right for your needs.

Why you should use a VPN at home?

You may ask yourself why you need a VPN at home and yet you are using your own Wi-Fi. But know that you do need one because it increases your protection and privacy online. Here are some ways you can use a VPN at your home:

  • Protect yourself against cybercrime

When using a VPN, you make it much harder for attackers to access your private information. Even if they target your device with routers hack or MITM attacks, they won’t be able to decrypt your data.

  • Bypass geographical restrictions

A good VPN provider will maintain servers across the globe. that means you can funnel your data through an IP address in another country, bypassing any local browsing restrictions.

  • Maintain personal privacy

Everyone has a right to privacy, both in the real world and online. But there’s no shortage of people and corporations who would like to get a look at your browsing activity. In fact, many ISPs are legally allowed to sell your data to corporations, advertisers, research bodies, and government agencies.

For all of the reasons we’ve mentioned here, we strongly recommend using a VPN, both at home and elsewhere.

In this article I feel happy to present you NordVPN one of good VPN i have never used. With NordVPN No need to buy VPN subscriptions separately for your phone and PC.

NordVPN secures up to 6 devices and is compatible with Windows, macOS, Linux, Android, iOS, and even your Wi-Fi router.