**Latest Whatsapp Tricks in 2018 | How to read WhatsApp Deleted Message?

By Admin
Hello friends, Here we are going to talk about Whatsapp Latest tricks in 2018. How to read WhatsApp Deleted Message? That is, if someone has sent us the message and deleted the message using the WhatsApp Delete for everyone feature. So how can you read it?

WhatsApp Deleted Message@myteachworld.com

For some time there was a feature update of WhatsApp, in which we were able to see the new messaging feature. According to this feature, if we send a message to someone, then we can delete that message by using Delete for everyone feature within 7 minutes of the message. If we send a message to someone, then this feature is best for us because we sent the wrong message to anyone without any notice. But if we send and delete a message, then there is a confusion in our mind. What was in the message, which he deleted. In this case if you want to know what was written in the Deleted messsage you have. So you follow these tips. And read this post to the last.

How to read the Whatsapp Deleted Message? Step by Step follow me

WhatsApp Latest features mostly work in Android 4.4 or above and have smartphones with Android 4.4 or higher , So if someone messages them on WhatsApp, they get a notification on locked screen. If we want, we can read this message only on the locked screen. But when the sender deletes that message. So we can not read that message through Notification. Because the default notification system is WhatsApp in our phone. But if we could save Notification before Sender deleted the message, then we could read deleted message. But in such a WhatsApp notification we will not be able to see. For this, we have to use any third party application.


Notification history is a third-party Android application. That does not get inbuilt from our Android, it has to download the Play Store.
Now you download WhatsApp Notification History App from the link given below and install it.

WhatsApp Notification History App    
Download Now
 When we install WhatsApp Notification history app in our Smartphone. Then after that we have to enable some of the primary features and then it saves every single Notification in the phone like the WhatsApp default notification system. WhatsApp Notification history app keeps saving with date and time, whatever new notification comes in the phone. And this complete process is called the notification lock feature.
In such a case, if you have deleted someone after you've sent a message on WhatsApp. So you can read the WhatsApp Notification history feature using Message.

Note : Whenever we install a third-party app in our Smartphone, we have to grant System Permission according to System privacy. Granting this permission is beneficial for us and also harmful. If we talk about this WhatsApp Notification app, the biggest advantage is that we can read deleted WhatsApp message. But with this limitation of this app and lots of use it is also very damaged.
 Let's start now.

Step1 : After installing App, we need to do some basic setup so that it can see the notification coming to our phone. To do this, you will have to open the App and enable notification by going to Setting.

WhatsApp Deleted Message@myteachworld.com

Step2 : After activating the feature, setup of the WhatsApp notification history app will be completed. Now it will continue to save all the phone's notification.

Step3 : Now, as soon as you send a message from Sender WhatsApp Account, you will delete it using the "Delete for everyone" feature.

WhatsApp Deleted Message@myteachworld.com

Step4 : As soon as you delete the message using this feature, this message will be deleted immediately from receiver WhatsApp account. Now if the receiver has to see the deleted message, then he will have to go to the WhatsApp Notification history App and click on the WhatsApp option.

WhatsApp Deleted Message@myteachworld.com

Finally now you will see all the WhatsApp notifications here. In this way you can see any deleted message.
Now this is the end of post. If you like this post then don"t forget to share it. Thank u and Good bye.

New Future Technology in 2018 | Upcoming future Technologies | MyTeachWorld

By Admin
Humans have jumped so fast in the field of science and technology that has no answer.
Today, for the past two years, this technology is in front of you, then the person who thinks about it and what disturbs him, which he wants to solve in an automatic way, then he invented it for the first time that he had heard it earlier. But today it is a trend. By which people are earning more and even in the same way, which gives incredible new technology and you will also be very eager to know which new technology can be found in 2018 So, let's start.

New Future Technology in 2018@myteachworld.com


Holographic smart Phone 

Most people will know about 3D images, and you will also see 3D movies, just like the Holographic smart phone has a 3D camera which can show all the pictures with all the direction. The front camera is movable in it and as soon as we look at its eyes, it moves in the same direction. If we play video games in our mobile then the 3D video game has its own fun. When we do any online shopping, our product will look absolutely clear and we can see it all around.

Holographic Smart Phone@myteachworld.com

High power Wireless charger

Now a lot of companies are making wireless chargers in the market and people are liking it too. But how do you charge? 
We keep our phone above the charging pad so that it starts charging slowly slowly. But a team of Advanced Institute of Science and Technology has created a charger so that we can charge the battery with high power at a distance of 15 feet without pad. This device has so much power that it can charge at least 30 phones more than 15 feet away and can charge a laptop too. The name of this device is Dipole Coil Resonant System Which creates a strong magnetic field. Now it is only to see how long it will come in India and after that, the problems of mobile charging like that will end.

StoreDot Battery

A company called StoreDot showed a prototype in which he had created a super fast charging battery, which is fully charged within 30 seconds and its backup time was also 5-6 hours. These batteries are not too expensive and can be bought in less money as they have said. As soon as this battery comes, the problem of mobile charging of people will be eliminated as absolutely.


Earlier we used to think that whether humans can fly in the sky without airplane. So here a company has created a device that can be easily accessible to the top of the sky when binded on the back and As well as control your movement. This jetpack device is filled with hydrogen peroxide fuel, which can take man up to 250 foot above the speed of 75 miles per hour. Who says that it is difficult to walk the sky. Everything is possible.



In a Hollywood movie StarWars you will see such speeder bike, this bike is exactly the same as the 240 HP engine and two rotor motors, which fly in the air up to 12 feet above the ground. There are no wheels in any way. Those who are working on it, say that we will launch this bike very soon and it is not too much work to run it.


So friends this is the end of the article ,if you like this post please share it your friends. thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh

[GDPR] What is GDPR? (General Data Protection Regulation) | MyTeachWorld

By Admin
Hello guys , In this post I'm going to teach you full detailed guide on GDPR?  Do you know that? Why is it so important for all Internet users to know about GDPR
Must read it For years, internet has changed our communication methods to a great extent. It has also changed the tasks of our daily lives to a great extent. In the present time we send emails to communicate, share documents, pay our bills and buy our own needs online without thinking again. In doing so, we have to share our personal details with our companies.

Have you ever thought of how much you share your personal data online? Or what happens to those shared data or information? Yes, in your friends, your banking information, contacts, addresses, social media posts, even your IP address, from which sites you visit, these information is digitally stored, whether you wish or not. By doing so, the companies say that they collect all these information because they will help you to understand them so that they can serve you well. They get targeted and relevant information from them so that they can provide you with a better customer experience.
But is this data really used only for good customer experience? Recently just a moment ago, all of you have heard about the Facebook Cambridge Analytica Scandal, where millions of personal information were leak, many believe that last year US Elections used all these information.
Therefore, many countries have expressed concern about the protection of data. Because the security of their data is the first responsibility for any country. The future of that country depends on it. Sometimes a loss of billions of rupees has to be borne. Therefore, the GDPR (General Data Protection Regulation) has been updated again for its data protection and its term and conditions, policy has been significantly improved earlier. There are so many of us who do not have any information about this matter, so considering the seriousness of this matter, I thought today that why are you people GDPR? Provide complete information on the subject so that you can also raise voice for the protection of your data. So let's begin without delay.



What is GDPR(General Data Protection Regulation)?

General Data Protection Regulation this is a set of rules that some have been designed in such a way that it is not only the EU citizens but all the people who use the internet have more control over controlling their personal data. Its main objective is to simplify the business's regulatory environment so that both citizens and businesses have the best advantage in this digital economy.

These reforms have been designed in such a way that it can show us to our mythological world and implement our laws and obligations properly - which includes a lot of things such as personal data, privacy and consent etc. 

If we think fundamentally then almost all aspects of our life revolve around these data. Whether it is social media companies, banks, retailers, and governments - all services are collected first and then analyzed. Your name, address, credit card number and more are collected, analyse and after that they are stored by organizasations.
In May 25, 2018, under the new European privacy regulation, The General Data Protection Regulation (GDPR) was brought into effect.
This regulation was implicated in all local privacy laws throughout the EU and EEA regions. It applies to all the companies that deal with people and store their personal information. These are not only restricted to European companies but it also applies to the rest of the continents. This gives more people more control over their personal data.

What are the rights of Individuals under GDPR?

  • The right to access : Here are the rights given to the people, with the help of which they can request to access their personal data and they can also ask how the company is using the data provided by them. When asked, the company has to provide that individual in a copy, free of charge electronic format of his personal data.
  • The right to be forgotten : If the consumer is not a customer of any company, then he can request the company not to use his personal information so that the company has to delete that data.
  • The right to data portability : It is right for Individuals to transfer their data from one service provider to another. And this should be in the commonly used way and in machine-readable format.
  • The right to be informed : If a company is collecting data of a person then that company will have to send this news to that person and only after his consent they can do this work.
  • The right to have information corrected : According to this right persons can update their data if it is out of date or incomplete or incorrect.
  • The right to restrict processing : Individuals can stop processing their data if they wish. His record will be in one place and will not be used.
  • The right to object : Considering this right a person can stop processing his data in direct marketing. If any processing is going on, then they will have to take action when the stop is requested.
  • The right to be notified : If for some reason the data is breach, then it is the liability of the company that they notify the persons within 72 Horse. It has the right to know that person.

What impact will GDPR have on bloggers?

As we know that if we want to know the information about the blog or website on the Internet, then we used WHOIS, which provided us with any blog or website information, because many hosting services providers such data Public, this is not the personal information of the owners and the private. But now with GDPR, any hosting company or wordpress will not even publicize any user's data. If he does, then he will have to pay a fine determined by his GDPR. The user will also get full control over his personal data. Companies must also follow the law of GDPR, except for many earlier laws which will make their work easier.

I sincerely hope that I gave you full information about GDPR and hope you guys have understood the effect of the GDPR. I am convinced of all the readers that you too share this information with your neighbors, relatives, your friends, so that we will be aware of our interactions and will all benefit from it. I need people's support from you so that I can bring you even more new information.

***********************************THANK YOU**************************************

[Honeypot] What Is Honeypot | How To Setup Honeypot In Kali Linux 2018?

By Admin
Hello friends once again welcome here in this advance hacking blog. Now today i am going to talk about "Honeypot" If you belong to ethical hacking, cybersecurity, then read this article to the last.


What is Honeypot?

A honeypot is a computer system that is set up to act as a decoy to lure cyber attackers and to detect, deflect or study attempts to gain unauthorized access to information systems.
Generally, ahoneypot consists of data ( like as a network site) that appears to be a legitimate part of the site , but is actually isolated and monitored and that seems to contain information or a resource of value to attackers, who are then blocked.
This is similar to the police baiting a criminal, conducting undercover surveillance and finally punishing the criminal.
A honeypot is a security resources who’s value lies in being probed, attacked or compromised.


Honeypots are weapons against spammers, honeypot detections systems are spammer-employed counter-weapons. As detection systems would likely use unique characteristics of specific honeypots to identify them. A suspected employee of a company can be identified by Honey Pot, his activities can be tracked.

Honey Pots can be setup inside , outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense , they are variants of standard IDS(intruder detection system) but with more of a focus on information gathering and deception.

Type of honeypots:

Honeypots can be classified based on their deployment(use/action) and based on their level of involvement. Based on deployment, honeypots may be classified as:
  • Production Honeypots
  • Research Honeypots
Production Honeypots: Production honeypots are easy to use , capture only limited informations and are used primarily by corporations. Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security. Normally , production honeypots are low interaction honeypots, which are easier to deploy. They give less information about the attacks or attackers than research honeypots.

Research Honeypots: Research Honeypots are run to gather information about the motives and tactics of the black hat community targeting different networks. These honeypots do not add direct value to a specific organization; instead, they are used to research the threats that organizations face and to learn how to better protect against those threats. Research honeypots are complex to deploy and maintain, capture extensive information, and are used primarily by research, military or government organizations.

Based on design criteria, honeypots can be classified as:

1. Pure Honeypots
2. High-interaction honeypots
3. Low-interaction honeypots

How To Set Up Honeypot On Kali Linux Step by Step follow me?

To set up HoneyPots, a tool will need a tool called pentbox in kaliLinux

Step1; First you have to download the paintbox tool whose link is given below.
git clone https://github.com/whitehatpanda/pentbox-1.8
Step2; Now after downloading the tool simply execute this command cd pentbox-1.8 and hit enter button.


Step3;  Now give this command ls for going to the pentbox folder.


Step4;  Now you well see a ruby script called pentbox.rb and you need to execute this script by entering this given below command and press enter button.


Step5;  Now you will show options in terminal window , you need to choose option no. 2 which is network tools. So type the no. 2 and press enter button. 


Step6; Now After that again some option you'll see simply choose option no. 3 which is honeypot.So type no. 3 in terminal and press enter button.


Step7; Now Here you'll need to choose a option two options Auto configuration and second one is manual configuration. So Choose any one of them according to your need but here i m choosing auto configuration mode.

Step8; So for auto configuration enter 1 and you'll see that the honeypot will start on port no. 80 or anything which can active for monitor your system.

Step9; Now for checking that honeypot set up working or not simply copy your ip address by executing given below command and enter that ip in any of your web browser and press enter.

So after entering the ip address go towards the terminal windows and here now you'll see the full detail of the hacker.

If you want to know the actual ip of the victim or the hacker so you just need to make your ip static and send it to anyone if someone click on that link all his information automatically copied in your system in log format.If you can make your ip static then trace anyone all over the worlds with this simple honeypot method.

So guys this is the basic set up of any honeypot solution. If you liked this post, please do not forget to share it, without your support, I can not reach this knowledge even further, so help me by sharing my post so that I can bring you a tricks more than one To share the post ,you can use the share buttons given below, and , If you face some problem in any steps please drop your email by going to contact us section of this site. thank you so much ,stay tune with this blog and blog's admin Mr. Aditya Singh