Here is Everything You Wanted To Know About Deep Web And Tor

Tor and Deep web have never been more relevant than today, we have touched the matter of privacy in Windows 10 and talked about dark web before. Today let’s take a look at what Tor is and how to use it in the infographic below which was made by the folks at WIHT.

Click on the infographic to see in enlarged.


NEXT STORY: Which Browser is Most Secure? Chrome vs Edge vs Firefox

Which Browser is Most Secure? Chrome vs Edge vs Firefox

Web browsers are some of the most important apps that we use on a daily basis. To be a great choice, a browser should not only be feature rich, it should also focus on privacy as much as possible. The browser needs to be efficient as well as safe with regular updates and it should be aware of any phishing or malware that can potentially infect the PC. Folks at WhoIsHostingThis have made this interesting infographic that compares modern web browsers and tries to figure out which one is the most secure.

Click on the infographic to enlarge.

Which Browser is Most Secure?

NEXT STORY: Planning To Watch Pirated Game of Thrones? HBO is coming

Whatever You Do, Please Don’t Fall For This Genious Gmail Attack

Email phishing is not a new term, it has been around since almost email was in existence and now that common wisdom in people has increased about email attacks, hackers have started exploring other, smarter ways of luring people into their traps.

A twitter user Tom Scott shared a screenshot that reveals another new trick to get users into trouble.

Because Gmail is the most widely used email service and a lot of people access Gmail via their web browsers, the shady email appears like it has an attachment while it is just an embedded image that once clicked, takes users to a sign-in page that looks just like Google’s.

Just like Google’s page, the Sign-in page collects username and password, that once collected, can be used to do a lot of harm to targets.

While tech-savvy users may notice that the phishing page uses data URI with prefix “data:text/html” instead, there is a good chance that normal users will not notice it.

So, keep yourself safe folks and don’t click on attachments unless you were expecting it from the sender. Chrome 56.0.2924 tries to warn users by adding a “Not Secure” in the address line, but you will have to be safe yourself.

READ NEXT:  Samsung Galaxy A5 (2017), Galaxy A7 (2017) Go on Sale in India Today

For The Love Of God, Don’t Use These 10 VPN Apps On Android

VPNs are one of the most trusted ways of browsing the internet anonymously. These small apps let you access region locked content on the web, and most of them encrypt all your browsing traffic so that no one on your network can see what you are doing on the internet.

VPNs are especially easy to install on Android Devices and Google’s Chrome browser, and they don’t require the user to have the technical knowledge, but you might want to be a bit more careful from the next time you install any VPN apps on Android.

A group of researchers from CSIRO’s Data 61, UNSW Sydney, UC Berkeley and Malaysia’s UCSI conducted a research on VPN apps for Android. And they found that among a ton of VPN apps that are available on Google Play, many are insecure who inject ads on your pages, contain malware and even leak your personal data.

The researchers looked at 283 VPN apps on the Play Store, and they found that over 38 percent of these VPN apps contain some malware.

In addition to that, almost 18 percent of apps don’t even encrypt your browsing data and 16 percent VPN apps rerouted traffic through other users’ devices.

Here are 10 of the worst offenders, you can study about the research in detail in this PDF.

Many VPN companies spend a ton of money for Advertising, promotion and affiliate programs and this is why it is tough for average users to find an honest advice.

Before buying or installing any VPN apps, you should do some research so that you can be sure about the safety of your data.

READ NEXT: WhatsApp may soon let you edit sent messages.

Easiest Ways To Export Saved Passwords in Google Chrome

Even though Google Chrome is probably the most feature rich browser, sometimes, it can be tricky to find out something that should otherwise be straight-forward. One of them is importing and exporting passwords in Google Chrome.

Even though Google Chrome is probably the most feature rich browser, sometimes, it can be tricky to find out something that should otherwise be straight-forward. One of them is importing and exporting passwords in Google Chrome.

Getting Geek reader Susan wrote asked :

Hi Getting Geek team,

I hope that you are having a great day. I use Google Chrome and I have saved all my bookmarks and passwords in it. recently, I needed to print out all my passwords to put them into a safe. But, even after spending quite some time in settings, I could not find out how to do it.

So, how can I export passwords in Google Chrome ?

Thanks, Susan

Exporting Passwords in Google Chrome

Google Chrome offers you to save passwords and if you have signed-in to your Google Account, you can later access them from any other device. By default, you can see individual saved passwords in Google Chrome by going to the following address in your browser:


However, as you can see, there is no option to import or export passwords, you can view the password by clicking on the tiny Show button next to the bullets and that it. But don’t worry, there is a Google Chrome flag that will allow us to activate import and export buttons on the dialog box. To do this, go to the following URL in your browser:


You will see a quite long list of experimental features that you can enable from here, simply press CTRL+F on your keyboard and type the following to jump quickly to the desired setting.



export passwords in chrome
Pro-tip: You can press CTRL+F to search quickly in the page

Under the Password import and export, select Enabled from the drop-down menu and restart your browser.

enable password export in google chrome

Now, Open settings from Chrome menu and click on Show Advance Settings at the bottom of the page.

Now, under Passwords and Forms, click on Manage Passwords In the next screen, scroll to the bottom of the list and you should see that Import and Export buttons are visible. Now that we are almost done, to export the passwords saved in Chrome, click on Export then enter your Windows sign-in passwords and you will be good to go.

import and export passwords in google chrome

Utilities to Export Passwords saved in Google Chrome

In case you don’t want to use built-in options, you can still export and view passwords using a NirSoft utility called ChromePass. To export all passwords using this tool, simply do the following:

  • Download ChromePass and extract the zip file.
  • Open the app and if asked, enter your Windows Password to see all passwords saved in Google Chrome.
nirsoft chromepass password exporting
ChromePass is free and it works on Windows
  • Press CTRL+A on your keyboard to select all entries at once.
  • Click on File> Save Selected Items and then enter a name for your file.

ChromePass is fast and easy, but, it is only available for Windows. So, if you are using Linux or macOS, the previous method should be the way to go.

Do you know about any other way of exporting passwords in Google Chrome? Which one do you prefer? Share with others in the comments below.

Microsoft is Testing An App to Unlock Windows 10 PCs over Bluetooth

Microsoft is working on a new way to unlock the Windows 10 PC using Bluetooth. Windows 10 phone Sign-in is available on Windows Store.

In recent years, Microsoft has improved Windows sign-in process by adding some more ways to unlock the devices. Some of them are the Picture password that was introduced with Windows 8 and Windows Hello that is relatively new and was introduced in Windows 10.

In above those, the former needs a working Touch Screen to function. The latter (Windows Hello) works by detecting the face using a special camera on the front of the Device, very few computers (such as Microsoft’s Surface Book) have a Windows Hello camera and because of that, it is available to very few users.

Microsoft is working on a new way to unlock the Windows 10 PCs and, this time, it is using Bluetooth. The Redmond Giant has already created an App called Phone Sign-in.

The App is currently in Beta state and it is available to everyone in Windows Store. Windows 10 Phone sign-in beta works using Bluetooth of the Phone and the computer. Whenever both the devices are near to each other, the computer will unlock itself automatically.

Additionally, the app can use NFC or webcam also to do its job.

Google and Apple both have some kind of software feature to co-ordinate their mobile devices with their Desktop Operating systems. Apple’s iOS, for example, supports a feature called Hand-Off to switch between Mac and iPhone. Google also has some software features to unlock Chromebooks with a paired Android Smartphones.

Microsoft is a bit late on this front and it is also interesting that it is currently only available for its mobile OS,

Windows 10 phone Sign-in App is currently only available for Windows Phones. Which, despite having some interesting perks, has no competition to offer to Android or iOS. Also, there is no word about it being made available for Android or iOS.

In Past, Microsoft has not made any of its authenticator apps available for iOS or Android and therefore, chances of it being made for other platforms are pretty low.

If you are a Windows Phone owner, you can try the app from here.

For more updates, don’t forget to subscribe to Getting Geek.

Indian Hackers Replied to Pakistan by hacking 50 Pak Websites

An Indian Hackers Group Called “Mallu Cyber Solders” have hacked 46 Pakistani websites including and

An Indian Cyber Group Called “Mallu Cyber Solders” have hacked 46 Pakistani websites including and

The Group hacked the websites and then added several messages on Pak websites such as “Better stay away from Indian Cyber Space” and a burning flag of Pakistan. This is not the first time when this group has hacked Pakistani Websites, on 15th august the team hacked almost 100 Pakistani websites.

This attack is in reply of an incident of Hacking official website on Indian state Kerala. On 27th September a group of Pakistani hackers hacked into Kerala’s Official Website located at, the Pakistani Hackers defaced the homepage by adding a photo of burning flag of India and a message saying “Security is just an illusion”

The Officials are investigating the matter.

For more updates don’t forget to subscribe to Getting Geek.

How not to become a Script Kiddie

Script Kiddies are people who are trying to do hack even if they don’t have knowledge. Most script kiddies don’t really understand what hacking means.

There are a lots of classifications of hackers, major being  Black Hat, White Hat and Grey Hat hackers.

We generally have two kind of thoughts when we think of hackers, the first one is hate, and the other one is the desire  to become one. There is nothing major wrong in any of these thoughts. At least for me.

Go into any CS Class, either in college or in a school, or on any social media group or forum. You will see many people claiming themselves to be a hacker or  they can teach others how to hack. Asking for an example? I did a search on Facebook for term hackers and here is what I found:

hackers and script kiddies
Too many hackers?

Hundreds of communities, groups and Facebook pages.

Are all of these people hackers?


They are not hackers. Most of them are script kiddies.

People who are interested in hacking or people who are in a stupid illusion that they are hackers.

Before digging deep in Hacking, let’s find out one basic question.

Who are script kiddies?

Script Kiddies are people who are trying to  hack even if they don’t have knowledge. These are people who are using search engines to find guides to hack something. Be it non-lethal or highly lethal such as trying to hack a Facebook profile.

Script Kiddies use readymade scripts or programs made by other people. They don’t understand how that thing works, but they have Google and some dirty guides to do hacks. Most script kiddies don’t really understand what hacking means.

script kiddies
Stay away from people who use these kind of images.

Are you a script kiddie?

Knowing yourself is a tough task. To tell whether you are a script kiddie or not, you will have to ask yourself, are you using search engines to search hacking guides? Are you member of Hacking related groups on Facebook? Do you know how does internet work? Do you know any of the programming languages?

Ask yourself these questions and you will get to know if you are a script kiddie or not.

A Script Kiddie is just a stupid person trying show himself smart
Damn it., Script Kiddies call themselves hacker. I study in a CS Collage and I see 3 self-proclaimed hackers sitting in my class every day. They run several BlogSpot and WordPress Blogs and use a really stupid looking Profile Picture on WhatsApp and Facebook. This is how it works. Being script kiddie is easy, Join a few groups, browse a few cyber security blogs and learn how to use fishing and Tadaa… you are a script kiddie.

How not to become one?

It is a bit tougher than being a script kiddie. First you will have to understand that you will not become a hacker overnight. It takes time, passion, hard work to become a real cyber security expert.

Learn a Programming Language

Programming is worth learning
Programming is worth learning

You can’t be a good hacker if you don’t know how to code. Everyone should learn to code. You will find our Infographics useful in deciding what programming language to learn. Learning how to program will help you in developing your own tools. In modifying the open source tools and most important it will help you in understanding how programs work.

Become a Power User First

PoweUsers are people who use some more advance tools to accomplish task. They don’t always know how to program or how to hack, instead they are good at day-to-day tasks related to computer. By being a power user you will be able to use advance tools that most normal people cannot use. There is no course or school who can teach you how to become a power user. You will have to use your own wisdom and understanding to become one. Being a power user will help you in getting rid of the script kiddie tag from yourself.

For starters you can start with   AutoHotKey.

Don’t use Hacking tools without understanding them

Using OphCrack to crack windows password will not make you a hacker. Making a tool to Crack Windows password will. Don’t rely on tools made by other hackers. If you are using them, try to understand how they work.

Stop Self Promotion

This should have been the first point on the list. Do not ever claim yourself as a hacker or a cyber-security expert. Even if you are not a script kiddie, it is really stupid to show off your skills and if you are a script kiddie, you are just lying through your teeth. Do not threaten other people about your hacking skills.

script kiddies

Learn how Computers and other Tech works

Computers are tough to understand and so are the software. To become a real hacker and get rid of script kiddie tag, you should study them as much as possible. To find loopholes in a software or a network, you should first study how they work. For beginners you can study what is Windows Experience Index and so on. Keep Wikipedia on top of your reference list. I am recommending it due to its neutral point of view about things. You should also learn assembly language, Linux and Windows Server to become good at hacking.

Understand Virtualization, Dockers and UNIX

To test what you have made you should have a proper test bench. In order to make that you should use Virtual PCs. Most of the servers and internet based tech is based on Linux or other UNIX like OS so having good knowledge will help you.

Partial Knowledge is always dangerous

Be it script kiddie or a trained hacker, you need to be wise. You should always know (and obey) Cyber laws. Hacks are good if you use them for good, otherwise no matter how good you are you will always be caught. Cyber Laws are strict and doing harm of others has always been a bad idea. Even if you have graduated yourself from a Script Kiddie and became a hacker. Do not use them as a creepy selfish person. Cyber Security is a good career option and you should go for it instead of messing up with lives of other people.

For any questions or suggestions, drop a comment below.

Learn How to Hack Windows Experience Index

In the Windows Experience index the base score is based on the lowest score of any component.

Starting from Windows Vista, Microsoft introduced a kind of bench-marking system in its Operating System. In Windows Vista and 7 users can rate their PC using the Windows Experience Index. The Highest possible score in Windows Vista is 5 while Windows 7 machines can go up to 7.9 in the experience index.

In the Windows Experience index the base score is based on the lowest score of any component. Such as in the test PC it was 4.4 based because of the Graphics subscore.

However it is not so tough to manipulate these numbers and change these scores according to your will. You can change these just to fool anyone.


To make things simplified we would recommend you to run Windows Experience Index first (If you have not done so) if you have done that you can skip this section.

To do those open Control panels go to System and security and then click on Check the Windows Experience Index

After that click on Rate This computer

Note that your Computer may take several minutes in rating the system

You will see a screen similar to this.

hack windows experience index


To manipulate these scores head to Windows installation drive (C: in our case). Then go to

Windows > Performance > WinSAT > DataStore

You will able to see several indexing files there.

You will need to open the file ending with “Formal.Assessment (Initial).WinSAT”

Open the file in notepad. You will see the following window:

hack windows experience index

In the notepad window you don’t need to do too down to hunt anything, simply change the values according to your will in the upper area. The values are written between tags. Such as


Change the values between tags and save the files. Next time you will open the Windows< Experience Index the values will be changed.

hack windows experience index

OFF THE ROAD TIP: For more fun we suggest everyone to keep their Scores realistic ( Not 7.9 Exactly )

To revert the changes you can re-run the assessment.

Which is the Most Secure Web Browser

Web Browsers have been around for many years, and you are using one right now. do you think that they are secure? if yes, you are going to be shocked.

Web Browsers have been around for many years, and you are using one right now. Do you think that they are secure? if yes, you are going to be shocked. Security researchers are consistently doing their research on Web Browser Vulnerabilities and it seems that we are not always secure online. Here is an interesting infographic which will help you in picking most secure Web Browser.