Loi Liang Yang

409 posts

Loi Liang Yang banner
Loi Liang Yang

Loi Liang Yang

@Mrhackerloi

ACCOUNT RECOVERY SPECIALIST Expert service's 🥇🎖️ Blackmail tracking 📌 telegram link in my bio 👇

United States Katılım Nisan 2023
54 Takip Edilen891 Takipçiler
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
I am an ethical hacker and you are a normal computer guy is that clear? I am root but you are a user is that clear? I don't hack Whatsapp but I find vulnerability that can take your Whatsapp away from you is that clear? I save companies and people from external threat is that clear ? Quote this and say what you do .
English
0
0
1
81
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
The journey. Where did you start
Loi Liang Yang tweet media
English
0
0
1
53
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
Honestly, which one provides better security?
Loi Liang Yang tweet media
English
0
0
2
53
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
HOW TO TRACK PEOPLE WITH THEIR IMAGES Many photos taken with modern smartphones contain hidden information called GPS metadata. This data is stored in the image file using a format known as EXIF (Exchangeable Image File Format). Along with camera settings like time, date, and device model, EXIF data can also include the exact GPS coordinates of where the picture was taken. When someone takes a photo with location services enabled, the phone uses the Global Positioning System to record the latitude and longitude. These coordinates are automatically embedded into the image file’s metadata. If the image is shared without removing this metadata, anyone with basic tools or online metadata viewers can extract the GPS coordinates from the file. By entering those coordinates into a map service such as Google Maps, they can see the exact location where the photo was taken. Because of this, an image can
English
0
0
1
71
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
Router vs Switch vs Firewall
Loi Liang Yang tweet media
English
0
1
2
53
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
How Hackers login to any websites without password?! WordPress hacking
English
1
0
3
87
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
If you find your camera showing this sign do this
English
0
0
2
77
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
What’s the difference
Loi Liang Yang tweet media
English
0
0
2
84
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
Ransomware (Sec+) Ransomware is one of the most disruptive cyber threats today because it targets availability and access, not just data theft. Instead of stealing information quietly, ransomware encrypts files or entire systems and demands payment before access is restored. What makes ransomware especially dangerous is that it often starts with something very small and normal-looking, such as a phishing email, a malicious attachment, or a compromised update, and then escalates into a full system lockdown. In the image below, I show how a ransomware incident begins to reveal itself on a system after execution. The terminal shows a user noticing files suddenly becoming unreadable and renamed, followed by a simple check to confirm that the data is no longer accessible. This visual helps beginners understand that ransomware damage is obvious only after encryption has already happened, which is usually too late. What this shows is how ransomware changes the state of data completely. The files still exist, but they are no longer usable. Even though nothing appears deleted, the encryption makes the data effectively lost without the decryption key. This is why backups, when properly secured and offline, are often the only reliable recovery option
Loi Liang Yang tweet media
English
0
0
0
80
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
Sim card pin explained (Deep)
Loi Liang Yang tweet media
English
0
0
1
61
Loi Liang Yang
Loi Liang Yang@Mrhackerloi·
🚨STOP SCROLLING 🚨 Your phone can be hacked in 30 seconds if you do THIS 👇 ❌ Use public Wi-Fi without a VPN ❌ Click “urgent” links in emails ❌ Reuse the same password everywhere Hackers don’t “hack” — they WAIT for mistakes.
English
0
0
1
105