[Facebook Trick] How to change your facebook name before 60 days limit?

By Admin
Hello guys,  In this post i am going to tell you “How to change Facebook name before 60 day?”  Facebook basically allow us to change name only one or two time in 60 days but by using this method you can easily change your name before 60 days. If you also have to change your Facebook account name, then read this post to the last.

 change facebook name before 60 days limit@myteachworld.com


Read More :


How to change Facebook name? Step by Step follow me


Step1; First of all, login to the Facebook account, click on facebook.com to login.

Step2; First, go to "Settings & Privacy" and click on "General". 



Step3; Now click on the name option. 

 change facebook name before 60 days limit@myteachworld.com


Step4; Now you will see some options and again click on “Learn More”   screenshots are given below


 change facebook name before 60 days limit@myteachworld.com


Step4; Now a new page will open in which some options will appear, click on “let us know”.

 change facebook name before 60 days limit@myteachworld.com


Step5; Now you will open a page like form that will fill you up.

 change facebook name before 60 days limit@myteachworld.com


  1. New First Name: You have to enter your new name.
  2. New Middle Name: If you want to enter the name then put it, otherwise leave it blank.
  3. New Surname: In it you have to enter your new surname.
  4. Now select a “ legal name change” option in pick one.
  5. You have to upload your document in your id. This is the most important option. You have to upload your original documents. By clicking Choose file you can upload Aadhar Card, PAN Card, Passport, Driving License, Marriage Certificate, Birth Certificate, Voter ID Card etc in the documents.
  6.  After filling all options properly, click on the send.

Now your name will change in 24 hours and you will know the message through. In  this way, you can change your Facebook account name even before 60 days limit.
If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. 
.....................................................................................................................THANK YOU.....................................................................................................

[Facebook Trick] How To Make Stylish Name id on Facebook?

By Admin
Hello Guys  In this post I will tell you how to create a stylish name i’d on Facebook? Many people want to create id from stylish font on facebook , But they do not find stylish facebook acceptable fonts. If you also want to keep your Facebook account name stylish but do not accept it, do not take tension. I have given some acceptable Facebook names .


facebook stylish name @myteachworld


Method 1:

Latest Facebook Stylish Name list for Girls and Boys:

Acceptable Names for Girls:


  • Dəsıı Luk Gıırł
  • Em-so’Loŋəly Bʀokəŋ’Aŋgəl 
  • Chułbułıı Chørıı
  • Bakk Bakk Quəən
  • Təəkhıı Mıırchı
  • Cup'Cakə
  • Pərsonııfıəd Hotılıcıou'x
  • Myx'tərııøux Gıırl
  • Pərsonıfııed Fəəlııng'x Dəstroyər
  • Zaalıım Gıırl
  • Chatpatıı Kudıı
  • Dıl ChuranəwalıHu Bs Təri MaiDıllıwalı
  • Luv'Yuh Babııə
  • Naughty Kudı 
  • Həartləss Gıırl
  • Ladkı BəautıPhul


Acceptable Names for Boys:


  • Tu-mere’BaBy Doll-mai’tera Teddy-Bear
  • Çhócklåtÿ Bõÿ
  • MƛîȠ-rāậj DīlǿǿȠ’pḗ Kārtā-ħǖ
  • Whèn Yóü-Sèe Mè-Säy MashâAllah
  • MeriiEk’khaasiyat-heMain maarta’Kamhu-AurGhaseetta Zayada’Hu
  • Ek’ßãr-ĐȝĶh Lēĝĭ’nã-tø Pãĝãł Ħø’jãyē-gĭ
  • U Can Cʌll-mɘ Mɽ-xBįĝřâ SĦéhzåđâ
  • Mąiň ąpňą fąvöurįťę hőőņShuɽʋ’Tʋŋə KııYʌ-Khʌtʌm Mʌııŋ Kʌɽʋngʌ
  • Kʋɽııyoŋ Kʌ Sʜaʜzʌʌdʌ
  • ßräñdéd Kämíñä
  • Bɽaŋded Dɘvɪl
  • ηθτγ βΦγТнє-Ряіисє Оғ-ғѧсэвооk
  • Tʋ’jʋɖa-Hʋvii Paɽ’teɽii Yaaɖ Jʋɖa’ŋa-Hʋvii
  • Ąloŋə Iıŋ Mılıoŋs
  • Cħocoɭʌty Kʌmııŋʌ
  • Swɘɘt Poɩsoŋ
  • Sīīləŋt KīīlərΗξλζτ ΗξλκεζMy’girlfrieñÐ-sãys I’Am-a Nøwty Bøy
  • Swəət Dəvɪ’ɪl
  • Həʌɽtləss ʌlcoholıc
  • Єк-йџмвєя-қд-тндякіі Вєѕђядм Кдміид Сђѳяѧ
  • Jisdıŋ-meri Hʌtegiŋʌ Usdıŋ Tumsʌbkı-Fʌtegi
  • Twıŋkle-Twıŋkle Little-star’Hot GirL-ıŋ’ɱy Car
  • Returŋ From’Hell Just’To loveYou’Agaııŋ
  • Nʌlʌyʌk Lʌðkʌ
  • Gɪɪʀl’x-Iʌɱ Yəʋʀ Nəxt BóyfʀiəŋdMƛîȠ-rāậj DīlǿǿȠ’pḗ Kārtā-ħǖ
  • Add’Krle Mujhe’Kasam Se’Peyar Hojayega’Tujhe
  • Tu’merı-ßaßy Doll’meı-Tera Teddy-ßear
  • Hąr’sţơry-ką Eŋđ Mųjhsê’hĭ Ħoţą-hąĭ
  • MēɽA-Ðɪɭ Tʋmhaɽe ɭɪye’hɪ ÐħaɗktA-Ħaɪ
  • Yơử’Kŋow-mȜh I’m’ửŋīiquȜ Kʌmīiŋʌ
  • Ałčohøłık Bøý
  • TwıŋkleTwıŋkle Little-star’Hot Chori-ıŋ’ɱy Car
  • ΔΞ’Δ’ξΜσ βυτ ίηηΘζεήτ βΩψ’Δ’ΞΔ
  • Excuse’Me-Gıırls No’Autograph-Plz
  • λττιτυδξ κιζζεπ
  • Квнї’ѕоғт Квнї’яцԁє Кїггєя- мєяѧ’Ѧттїтцԁє 
  • YouDoŋ’t-Kŋow Ðaŋ’geʀous-Boy Ix-Mah
  • Xecoŋd-Ŋame
  • Log’Apŋì-Zìŋdagi Baŋate-Hai’Maí Apŋi-Jàŋŋat’Baŋata Huŋ
  • Тнє Нєаят-Яоввєя Воу
  • Ŋame-Bata’diya Toh-Pechaaŋ Buʀa’maaŋ Jayegıı
  • GhamaŋdiLaɖkia’mujhse-ɖøørRahe Kyøki’maŋaŋa-mujhe Âtaŋâhī ØrBhav’maiKisiko-ɖetâŋahi
  • Pasʌnd-aya’to Dıl-ɱə’waɽŋa Dəɱagh-ɱəbi’ŋi
  • Єк-йџмвєя-қд-тндякіі Вєѕђядм- Кдміид
  • GıŗlfrieŋdTo’kamıŋy Bhi-bŋaty Haıŋ-bacha’hu Bachı’hı-fsauŋGa
  • Маіи-јав’идѕнє-мє Ђотд-нци- Тавђі’то Ђоѕђ-мє-ђота’ђци
  • Tu’Merıı-Sıızuĸa Maıŋ’Tera-Ŋobıta
  • ΞυηκηοωηΞ βογ
  • Кіѕікє-ђатн’ӣа- Даієԍа Үє Ѓабка
  • Nıŋty-ŋıŋe Perseŋt Zʌʌlɪɪɱ LʌʀKʌ
  • Тєяі-әіяґғяієиб-мєяі’Ғди
  • Ѕтор-ђєя’іғ Уєщ-сди’I’m-coǾol I’m-høt >I’m-ęverythıŋg You’rę-ŋøt
  • Soɽɽy’gııɽlx Iıı-eɱ’buʑy
  • Mʌii’DikhtaHuŋ-Sweet Innocent’Swamii->TypeKa Lekiŋ’Hu-Bada Harʌmii’Type-Ka
  • Ðʌɳgɽoų’x
  • Maıŋ’wahı-hʋŋ Jıse’Deĸhĸar-terı ßehŋ’Sɱıle-Detı Haı
  • ɱere’Bareɱe-ıtŋamatSochŋa Ðılɱe’Aata-Hʋŋ SaɱajH’ɱê-ŋaHı
  • Addııçtēď Tő-Yőuŕ Şpıçy-lıp’x
  • Walkıŋg’ıŋ Dah Dead’eŋds
  • Maıŋ-IsĦáq’Zẳẳdẳ Apŋı IsĦáq’Zẳẳdı-KẳFẳsĥiøñâble Śtýlíśh Chøċŀʌt ßøý
  • Ek’ßãr-ĐȝĶh Lēĝĭ’nã-tø Pãĝãł Ħø’jãyē-gĭ
  • Lɩpstɩc Rəɱovər
  • Moŋ X’təɽ
  • Kʌɱɩŋʌ
  • BʌdTämêêz Lʌfuŋter Chõkrá
  • Cʜocoɭʌtƴ Ɓoƴ
  • Uɳknowɳ Kamɩɩɳa
  • Ԁойт’Ѕђош Мз’ця ДттітцфзԑТђе-иэхт-ряіисе- Оғ Чоця- Ђэаят
  • Èk’bàar-dèkh legi Na’to-pàgal Hò’jayègi
  • Ї’м Тђє-ѕтчгїѕђ-Ряїйсє Оғ Ѕомєопз’ѕ-Нєаят
  • Tɘɽʌ Dhyaɳ’KIıdhaɽ-Haıı ye’Tɘɽʌ-Hɘɽo >Iıdaɽ’HaIı Pʌʟa
  • Kơı’ɱửjħko’ʌỳsȜ ɱıłá-haıı’ JȜsı Båŋjåɽe’ko’għáɽ
  • ßlâçklîstêd Kîllêr
  • IñtêrnåtiØnål Łipšløçkēr
  • Вдвїеє-уоц’аяє Му’рдѕѕщояб-нощ Сай’Ї Ғояҩєт-Чфц
  • Maıŋ-IsĦáq’Zẳẳdẳ Apŋı IsĦáq’Zẳẳdı- Kẳ
  • Add’Krle Mujhe’Kasam Se’Peyar Hojayega’Tujhe
  • Maıŋ’wahıı-huŋ Jısko’kabhı-Tu Lıŋe’maɽtı-thı ßoss
  • Тңӡяє-дяє Ӣѻ’ѿѻяԁ-їӣ-Ԁїсҭіѻӣдяу
  • Ғөя’ԁєѕҫяївіӣҩ Двѻцҭӎє
  • MeriiEk’khaasiyat-heMain maarta’Kamhu- AurGhaseetta Zayada’Hu
  • Tʋ’jʋɖa-HʋyIl Paɽ’teɽIl-Yaaɖ Jʋɖa’ŋa-HʋyIl
  • Ŋaam-Bata’dya Toh-Pechaaŋ Buʀa Maaŋ-Jayegıı
  • Mŗ Romantic
READ MORE:


Method2: Facebook Stylish Name Converter:


Change Fb Name In A Stylish Font By Myteachworld.com

Name Styler

Result

1.

2.




Step1; First of all type your name in the script above, now click on ‘Convert Text’.

Note : Remembering the name is required to write in all the small letters. 

Step2; Now copy the convert name, Screenshot is given below.


facebook stylish name @myteachworld

How to change name in facebook?

Step1; First of all, login to the Facebook account, click on facebook.com to login.

Step2; Now Go to Settings>>Privacy>>General  option in Facebook account.

facebook stylish name @myteachworld


Step3; Now you paste the copied stylish name here and click on “Review Changes”

facebook stylish name @myteachworld


Step4; Last step is type the password and click on “Save Changes”

facebook stylish name @myteachworld


You will now see that your Facebook account name has changed successfully.
If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. 
.....................................................................................................................THANK YOU.....................................................................................................

[BlueBorne Bluetooth Hacking Attack] What is BlueBorne Exploit?

By Admin
 Hello guys , In this post today i am going to teach you  about “Blue Borne Exploit”  what is Blue Born Exploit, and how can we avoid this? Friends Recently, Armes Lab has a Bluetooth vulnerability search, named Blue Born. The device which is Bluetooth enabled by this attack can be hacked. The attack vector “BlueBorne” Exposes almost every connected device.
Blue Borne is an attack vector by which hackers can leverage blutooth connection to penetrate and take complete control over targeted devices. Blue Borne affects ordinary computers, mobile phone and the expanding realm of lot devices. The new attack vector endangering major mobile, desktop and lot operating system , including Android ,Windows, iOS , Linux and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airbone) and attacks devices via Blutooth. The attack does not require any malicious file, link or the targeted devices to be paired to the attacker device, or even to be set discoverable mode. The attacker locates active Bluetooth connections and device can be identified.


BlueBorne Bluetooth Hacking Attack@myteachworld.com


It allows an attacker to strike completely undetected , it attack occur without victim’s knowledge.
Suppose a hacker has accessed your smartphone via Blue Brone Attack, then he can take away all the data on your phone and transfer it to his system. Hackers can send viruses or malware to your system, hackers can be hacked from any other device through your device via Bluetooth.
Blue Borne provide a number of opportunities for the attacker. Frist spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second , it allows the attack to bypass current security measures and remain undetected. The attacker obtains the device’s MAC address. Which is a unique identifier of that specific device. By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly.
This is true hacking attack, and this Zero Day vulnerability has been discovered by Armes Lab.

Read More:


How do you find Blue Born vulnerability in your device?

All Android phones, tablets, and wearables(except those using only Bluetooth low energy) of all version are affected by four vulnerabilities found in the Android operating system, two of which allow remote code execution(CVE-2017-0781 and CVE-2017-0782). One results in information leak(CVE-2017-0785) and the last allows an attacker to perform a Man-in-the-middle-attack(CVE-2017-0783).

All Windows computers since WindowS Vista are affected by the ”Blutooth Pineapple” vulnerability which allow an attacker to perform a MAN-IN-THE-MIDDLE-ATTACK(CVE-2017-8628).

All Linux device running BlueZ are affected by the information leak vulnerability(CVE-2017-1000250). All Linux device from version 3.3-rc1 (released in October 2011) are affected by the remote code execution vulnerability(CVE-2017-1000251)

To find Blue Born vulnerability in your device, install the app given below.


Download BlueBorne Vulnerability Scanner 

BlueBorne Bluetooth Hacking Attack@myteachworld.com



If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you

[DNS Spoofing Attack] What is DNS Spoofing And How to DNS spoof with KaliLinux?

By Admin
Hello guys once again welcome here in this advance hacking blog. I'm going to teach you full detailed guide on DNS Spoofing and How to DNS Spoof with KaliLinux . So friends know first what is DNS?

DNS Spoofing@mytechworld.com


What is DNS(Domain Name System)?

A Domain Name System server translate a human readable domain name (like as XYZ.com) into a numerical IP address that is used to route communications between nodes.
Friends, the website that we open in our browser, the system does not understand the names of those websites, it understands the Ip address. Every website has its own 1 unique IP address. The main work of the dns system is Translator, it is not necessary that you can open the website only by its name, you can also open the website through ip address.  As you all know that it is very difficult to remember the ip of all the websites, The main reason of creating the domain name system was this.

DNS spoofing is a part of computer hacking. A domain name is diverted to an incorrect IP address via DNS spoofing. A domain name is diverted to an incorrect IP address via DNS spoofing. Because of this, traffic of victim system is diverted to the attacker system.
So let's see how the DNS spoof attack ?

MOST READ:


How to DNS Spoof with KaliLinux (Step by Step Follow me)

There are many tools to attack DNS spoofing but I will use the Ettercap tool here which is by default in Kali linux. Ettercap is a very easy and popular tool.

Step1; Before using this tool some configuration settings have to be done, first of all you have to open the terminal window in the Kali linux machine.

Step2; Type the following command in your terminal window and press enter.
Command:
leafpad /etc/ettercap/etter.conf

Step3; Now  will open a leafpad window, scroll down there and setup ip table in linux portion. Screenshots are given below

DNS Spoofing@myteachworld.com


Step4; Activate the both commands that are below the ip table. To activate the command  remove the # symbol and save the file.

Step5; You are doing this attack on the local network, check your local IP and copy it.

Note- Type the ifconfig command to check ip of your local network. 
Step6; Now again type the following command in your terminal window and press enter.
Command:
leafpad /etc/ettercap/etter.dns

Step7; Now  will be again open a leafpad window, scroll down there and Here you have to set the target, you will be seeing Microsoft.com, you can change it, I did xyz.com, now as the Victim will open xyz.com, then here victim will redirect to whatever ip is located.
 Screenshots are given below

DNS Spoofing@myteachworld.com


Step8; Now save the file and close it.

Step9; Now you type the following command in your terminal window and press enter.
Command:
ettercap –G

You will now see that the ettercap in front of you is open in GUI mode.

Step10; Now Click “Sniff->Unified Sniffing, It will list the available network interface as shown below.

DNS Spoofing@myteachworld.com


Step11;  And you have chose the interface the following window will open .

DNS Spoofing@myteachworld.com


Step12; Now the next step is add  the target  for performing the ARP poisoning.

Step13; Now  Click on“Hosts >Scan for Host”, and you will see start to scan the hosts present in the network.

Step14; Now among the list, select “192.168.1.44” and click “Add to Target 1” and select “192.168.1.10” and click on “Add to Target 2”

Step15; Now select “Mitm >Arp Poisoning”, dialog box will open and Select “Sniff Remote Connection” and click on “ok”. Then click “Start->Start Sniffing.

Step16; Next step is Click on “Plugins >Manage Plugins” and Select the “dns_spoof” plugin and double click to activate it.

Step17; You can see that it returns a local machine’s IP address which we have given in the configuration.

Step18; ARP Poisoning and DNS Spoofing. Once everything is done, remember to stop MITM attack, you goto the Mitm tab and click on “Stop mitm attack”

So friends this is the end of the article ,if you like this post please share it your friends.If you face some problem in any steps please drop your email by going to contact us section of this site. thank you