jeudi 16 avril 2020

WINDOWS 10 Product Keys and Serial Numbers

Steps to Activate Windows 10 using Product Keys
  1. Go to Settings or tap on Windows key + i.
  2. Go to Update & Security.
  3. Choose Activation from the left-hand menu.
  4. If you don't have a Windows License Key, click on Go to Store. ...
  5. Go to Settings again.
  6. Go to Update and Security.
  7. Choose Activation from the left-hand menu.





 ACTIVATION KEYS 

Windows 10 Enterprise N4CPRK-NM3K3-X6XXQ-RXX86-WXCHW
Windows 10 EnterpriseQFFDN-GRT3P-VKWWX-X7T3R-8B639
Windows 10 Professional NVK7JG-NPHTM-C97JM-9MPGT-3V66T
Windows 10 EducationDCPHK-NFMTC-H88MJ-PFHPY-QJ4BJ
Windows 10 Enterprise 2018 LTSBYTMG3-N6DKC-DKB77-7M9GH-8HVX7
Windows 10 Home Key2F77B-TNFGY-69QQF-B8YKP-D69TJ
Windows 10 Enterprise 2018 LTSB NDXG7C-N36C4-C4HTG-X4T3X-2YV77
Windows 10 ProfessionalWNMTR-4C88C-JK8YV-HQ7T2-76DF9
Windows 10 Enterprise 2018 LTSB NWYPNQ-8C467-V2W6J-TX4WX-WT2RQ
Windows 10 Enterprise GDPH2V-TTNVB-4X9Q3-TJR4H-KHJW4
Windows 10 Home Singe LanguageYNMGQ-8RYV3-4PGQ3-C8XTP-7CFBY
Windows 10 Pro44RPN-FTY23-9VTTB-MP9BX-T84FV
Windows 10 Enterprise 2016 LTSB84NGF-MHBT6-FXBX8-QWJK7-DRR8H
Windows Pro N for WorkstationsNW6C2-QMPVW-D7KKK-3GKT6-VCFB2
Windows 10 Home Single Language8PTT6-RNW4C-6V7J2-C2D3X-MHBPB
Windows 10 Professional WorkstationYVWGF-BXNMC-HTQYQ-CPQ99-66QFC
Windows 10 SGJTYN-HDMQY-FRR76-HVGC7-QPF8P
Windows 10 Home Country SpecificYYVX9-NTFWV-6MDM3-9PT4T-4M68B
Windows 10 Education NXGVPP-NMH47-7TTHJ-W3FW7-8HV2C
Windows 10 Enterprise EvaluationNPPR9-FWDCX-D2C8J-H872K-2YT43
Windows 10 Home + Office 2016 Professional KeyMNXKQ-WY2CT-JWBJ2-T68TQ-YBH2V
Windows 10 EnterpriseNW6C2-QMPVW-D7KKK-3GKT6-VCFB2
Windows 10 Pro + Office 2016 Professional KeyMNXKQ-WY2CT-JWBJ2-T68TQ-YBH2V
Windows 10 Education NDCPHK-NFMTC-H88MJ-PFHPY-QJ4BJ
Windows 10 Education KeyWYPNQ-8C467-V2W6J-TX4WX-WT2RQ
Windows 10 EducationQFFDN-GRT3P-VKWWX-X7T3R-8B639
Windows 10 Enterprise Key84NGF-MHBT6-FXBX8-QWJK7-DRR8H
Windows 10 Pro N2F77B-TNFGY-69QQF-B8YKP-D69TJ
Windows 10 Pro KeyVK7JG-NPHTM-C97JM-9MPGT-3V66T
Windows 10 HomeWNMTR-4C88C-JK8YV-HQ7T2-76DF9




dimanche 12 avril 2020

5 Ways Hackers Steal Your Passwords

          


                  One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. No matter what opinion any of us have on passwords, though, one thing is indisputable: we’re going to be using them today, tomorrow and for the forseeable future. Unlike touch or facial recognition technologies, passwords are used everywhere because they’re cheap to implement and simple to use. For end users, they are as low-tech as security tech ever gets. Of course, that ubiquity and simplicity is precisely what makes passwords attractive to thieves. In this post, we take a look at how hackers steal our passwords and what we can do to stop them.



1. Credential Stuffing


Risk Level: High

It is estimated that tens of millions of accounts are tested daily by hackers using credential stuffing.

What Is It?

Credential stuffing, also known as list cleaning and breach replay, is a means of testing databases or lists of stolen credentials – i.e., passwords and user names – against multiple accounts to see if there’s a match.

How Does It Work?

Sites with poor security are breached on a regular basis, and thieves actively target dumping user credentials from such sites so that they can sell them on the dark net or underground forums. As many users will use the same password across different sites, criminals have a statistically good chance of finding that user janedoe@somesite.net has used the same password on janedoe@anothersite.com. Tools to automate the testing of a list of stolen credentials across multiple sites allow hackers to quickly breach new accounts even on sites that practice good security and password hygiene.

How Can You Stay Safe?

The key to not becoming a victim of credential stuffing is simple: every password for every site should be unique. Of course, that won’t prevent your password being stolen for one account on a site with poor security, but it does mean that any one compromise of your credentials will not affect you anywhere else on the internet. If you’re gasping at the thought of creating and remembering unique passwords for every site you use, see our Tips section near the end of the post.

2. Phishing


Risk Level: High

Over 70% of all cybercrimes begin with a phishing or spear-phishing attack. Hackers love to use phishing techniques to steal user credentials, either for their own use, or more commonly to sell to criminals on the dark net.

What Is It?

Phishing is a social engineering trick which attempts to trick users into supplying their credentials to what they believe is a genuine request from a legitimate site or vendor.

How Does It Work?

Typically, but not always, phishing occurs through emails that either contain fraudulent links to cloned websites or a malicious attachment. Somewhere along the chain of events that begins with the user taking the bait, the fraudsters will present a fake login form to steal the user’s login name and password. Fraudsters will also use some form of interception between a user and a genuine sign-in page, such as a man-in-the-middle attack to steal credentials.

How Can You Stay Safe?

Use 2-factor or multi-factor authentication. Although researchers have developed tricks to overcome these, in the wild cases are yet to be reported. Caution is your number one defense against phishing. Ignore requests to sign in to services from email links, and always go directly to the vendor’s site in your browser. Check emails that contain attachments carefully. The majority of phishing emails contain misspellings or other errors that are not difficult to find if you take a moment to inspect the message carefully.
A fake Spotify phishing subscription confirmation from the app store

3. Password Spraying


Risk Level: High

It’s been estimated that perhaps 16% of attacks on passwords come from password spraying attacks.

What Is It?

Password spraying is a technique that attempts to use a list of commonly used passwords against a user account name, such as 123456password1231qaz2wsxletmeinbatman and others.

How Does It Work?

Somewhat like credential stuffing, the basic idea behind password spraying it to take a list of user accounts and test them against a list of passwords. The difference is that with credential stuffing, the passwords are all known passwords for particular users. Password spraying is more blunt. The fraudster has a list of usernames, but no idea of the actual password. Instead, each username is tested against a list of the most commonly used passwords. This may be the top 5, 10 or 100, depending on how much time and resources the attacker has. Most sites will detect repeated password attempts from the same IP, so the attacker needs to use multiple IPs to extend the number of passwords they can try before being detected.

How Can You Stay Safe?

Ensure your password is not in the list of top 100 most commonly used passwords.
Top 5 popular passwords by year according to SplashData

4. Keylogging


Risk Level: Medium

Keylogging is often a technique used in targeted attacks, in which the hacker either knows the victim (spouse, colleague, relative) or is particularly interested in the victim (corporate or nation state espionage).

What Is It?

Keyloggers record the strokes you type on the keyboard and can be a particularly effective means of obtaining credentials for things like online bank accounts, crypto wallets and other logins with secure forms.

How Does It Work?

Keylogging is more difficult to pull off than Credential Stuffing, Phishing and Password Spraying because it first requires access to, or compromise of, the victim’s machine with keylogging malware. That said, there are lots of publicly available post-exploitation kits that offer attackers off-the-shelf keyloggers, as well as commercial spyware tools supposedly for parental or employee monitoring.

How Can You Stay Safe?

You need to be running a good security solution that can detect keylogging infections and activity. This is one of the few kinds of password theft techniques where the strength or uniqueness of your password really makes no difference. What counts is how well your endpoint is secured against infection, and whether your security software can also detect malicious activity if the malware finds a way past its protection features.

5. Brute Force


Risk Level: Low

Surprisingly not as prevalent as people tend to think, brute forcing passwords is difficult, time-consuming and expensive for criminals.

What Is It?

It’s the kind of thing that security researchers like to write about, or which you might see in TV shows: a hacker runs an algorithm against an encrypted password and in 3…2…1… the algorithm cracks the password and reveals it in plain text.

How Does It Work?

There are plenty of tools like “Aircrack-ng”, “John The Ripper”, and “DaveGrohl” that attempt to brute force passwords. There’s generally two kinds of cracking available. The first is some form of “dictionary” attack – so called because the attacker just tries every word in the dictionary as the password. Programs like those mentioned above can run through and test an entire dictionary in a matter of seconds. The other type of technique is used when the hacker has (through means of a data breach) acquired the hash of the plain-text password. Since these can’t be reversed, the aim is to hash as many plain-text passwords as possible and try to find a match. Rainbow tables exist which list the hashes of common passphrases to speed up this process.
One of the reasons why password cracking is not as viable a technique as some of the others we’ve mentioned is that encrypted passwords typically use a salt. This is some random data used in the encryption process that ensures no two plain-text passwords will produce the same hash. However, mistakes made by site administrators when using or storing salts and passwords can make it possible for some encrypted passwords to be cracked.

How Can You Stay Safe?

The key to staying safe from brute force attacks is to ensure you use passwords of sufficient length. Anything 16 characters or over should be sufficient given current technology, but ideally future-proof yourself by using a passphrase that is as long as the maximum allowed by the service that you’re signing up to. Avoid using any service that doesn’t let you create a password longer than 8 or 10 characters. Worried about how you’d remember a super long password? See the Tips section below.

20 Ways to Make Money Online !!

20 Ways to Make Money Online !!

20 Ways to Make Money Online



Thanks to the wonders of the internet, it’s completely possible to bring in a steady side income from the comfort of your own home. If you want to know how to make money online, consider these possibilities:
Open an Etsy store. If you have a creative talent or skill – whether it’s creating art, sewing clothes, or making keepsakes – you can open an online store on Etsy.com and sell your wares for some quick cash. With your own Etsy store, you’re left in charge of pricing and, ultimately, how much you make. See our detailed primer, “How to Make Money on Etsy.”
Complete surveys online. Sites like Swagbucks and MyPoints.com pay people to share their opinions on products or services, test mobile apps, or participate in market research. While the payday for these sites is modest, participating frequently can help you earn extra money in a short amount of time.
Get paid to search the Web. Zoombucks.com will pay you to use their online interface to search the web. To qualify, you need to be willing to download their search bar and use it for everyday Internet use. The only caveat that comes with this “gig” is that you might be paid in gift cards instead of cash. If you can parlay those gift cards into items you need to buy anyway – like groceries or gas – searching online can be a lucrative way to spend your free time.
Evaluate search engines. Search engine evaluators use commonly-accessed search engines in order to seek out bugs or errors. You may not earn a lot, but you can do this job in your spare time and from the comfort of your own home. To find gigs, check sites like Lionbridge, and Appen Butler Hill.
Start a blog. If you love writing and are passionate about a specific topic, starting a blog is a great way to launch a low-cost side business with little money out-of-pocket. All you need to get started is a domain name, some basic online support, and a head full of ideas to share. Here’s a basic primer on starting a blog for profit.
Write and publish an eBook. You don’t need a traditional publisher and financial backing to publish your own book anymore. In fact, Amazon.com makes it possible for you to publish your own eBook and sell it independently – with no financial investment on your part. And with Kindle eBook publishing, your book will appear on Kindle stores worldwide within 24-48 hours. Just be prepared to market it yourself on social media, your blog, or elsewhere if you expect to generate sales.
Become a freelance writer or editor. If you have a passion for storytelling or a background in writing or editing, it’s possible to find freelance writing or editing work online. To search available job openings, check out sites like UpWork.com and Problogger.net. You can also check traditional job sites such as Indeed.com and enter “telecommute” or “anywhere” in the location field.
Get into affiliate marketing. If you’re active on social media and have a large following, you could parlay those connections into some fast cash with a comprehensive affiliate marketing strategy. By becoming an affiliate marketer, you’ll sell items through your own links tied to sites like Amazon.comClickBank.com, and Commission Junction.
Earn cash back for shopping. Earning cash back on your purchases is a smart idea, and credit card rewards aren’t the only good cash-back strategy out there. With a site like ShopAtHome you can earn cash back on purchases made with approved merchants. Many frequent shoppers also love the Ibotta app, which lets you earn cash-back on every purchase.
Buy and sell domain names. If you’re good at finding popular yet undiscovered domain names, you can make some cash on the side by buying and reselling websites. Think of it as digital real estate speculation. Domains are available on GoDaddy.com for as little as $2.99 per year, but are sometimes resold at far higher prices: According to Business Insider, the site MM.com sold for $1.2 million dollars in 2014. Once you find the perfect domain name to resell, you can market it on Flippa.com for a flat fee.
Make money on YouTube. People who love the spotlight and have other online hustles should consider creating their own YouTube channel. If you’re interested — and interesting — you can use the platform to market affiliate products, sell products you create yourself, or receive ad revenue for your informal tutorials or entertaining videos. Once you get the ball rolling, YouTube offers a partner program that can help you monetize your business further.
Become a virtual assistant. Virtual assistants perform a wide range of services for their clients, all of which can be completed online. Depending on the day, they may open and reply to emails, schedule online work or blog posts, write mock-up letters and proposals, or perform data entry. You can look for virtual assistant jobs on sites like UpWork.com and Problogger.net.
Work as an online interpreter or translator. If you’re fluent in a foreign language, it makes sense to look for work as an online interpreter or translator. Depending on your individual skillset, you could find work translating blog posts or eBooks, transcribing recorded lessons or speeches for clients, or translating through Skype or another online video service. And, thanks to the increased use of foreign languages in the United States, getting started could really pay off. According to the Bureau of Labor Statistics, employment for interpreters and translators is expected to increase 17% nationally through 2026.
Manage social media for businesses. If you have a knack for social media, you could potentially get paid to manage various platforms for others. Many businesses are too busy running day-to-day operations to stay on top of their Facebook, Twitter, and Pinterest accounts – and will pay someone with the knowledge and time to do it for them. To find these jobs, ask local businesses and check sites like UpWork.com and Problogger.net.
Work remotely for a call center. Because many call center jobs are location independent, finding work in this field is an easy way to earn some money from home. Dozens of sites list job openings for call-center representatives, including Freelancer.com and SimplyHired.com. Meanwhile, you should check local job listings for openings and opportunities as well.
Rent out your car. If you’re not using your car on a daily basis, you might consider renting it out for some easy cash. Sites like , RelayRides.com, and FlightCar.com let you rent out your car for a daily – or even hourly – rate.
Answer questions. If you’re a subject matter expert, you can get paid for your expertise. Sites like JustAnswer will pay you to answer questions either on the phone or online. Just register, enter your area of expertise, and get started to begin earning money on the side.
Rent out a room on Airbnb. Living near a tourist area has its perks, including the prospect of renting out a room for a profit. With home sharing sites like Airbnb, you can rent out a room in your home – or even the entire place – for a day, a week, or longer. If you have extra space and might enjoy the company of travelers, renting out a room is great way to earn some extra money with little effort on your part. See our post, “How to Make Money as an AirBNB Host.”
Teach English online. A company called VIPKID makes it easier than ever to make money teaching English to international children online. You do need a bachelor’s degree and at least one year of teaching experience to get started, but you can easily make up to $22 per hour working just 7.5 hours per week.
Become a proofreader. All kinds of businesses hire professional proofreaders to look over their copy and content for errors before they publish. This side hustle is one that could work for nearly anyone since you can work from home provided you have a computer and an internet connection. You can find online proofreading jobs through websites like Indeed.com and FlexJobs.com

samedi 11 avril 2020

NETFLIX ACCOUNT AND PASSWORD

NETFLIX ACCOUNT AND PASSWORD






howarddcme@gmail.com:21righteous - Status: Premium
thomasfernandez21@gmail.com:thomas21 - Status: Premium

offspringproductions@gmail.com:9b9b7317 - Status: Premium

erickyeagle@gmail.com:Takkouri - Status: Premium

quaresmacamoes@gmail.com:pimentinha - Status: Premium

bloomingpurplerose@gmail.com:lovemonkey2 - Status: Premium

mfwhite39@gmail.com:laxin1484 - Status: Premium

otton75@hotmail.com:Foster75 - Status: Premium

bruno.edu@r7.com:aventura - Status: Premium
stoerbeer@hotmail.com:fucky0u - Status: Premium
Dogeeliten@hotmail.com:osva001 - Status: Premium
coldazzice2001@aol.com:11unix - Status: Premium
kamandoyle@gmail.com:rachel1 - Status: Premium
aragorn831@juno.com:warcraft1 - Status: Premium
jonathan@802Subaru.com:bronco85 - Status: Premium

wesleibueno2009@hotmail.com:joselita1 - Status: Premium