Facebook Account Theft and Protection




Hijacking a Facebook Account Even if the hijacking is not successful, how can that account be locked? You do not have to do anything. Here are just a few of the steps I took.

1. Facebook - I first log in to the browser.

2. Click Forget Password to forget the password without doing anything.

3. So do you want to fill in the email? You will be asked to enter your username and friend name.
I think everyone knows that.

4. Just type in the jigsaw of the account you want to hack here. And when you do a search, that account appears.


5. Is this your account? So, Yes, This is my account
 You have a choice.

6. He then asked if he could restate his password.
 Do not press anything. Here's an option that most people are not aware of.
I have no longer use this account.

7. If you click on I have no longer use this account, another box will pop up asking you to enter your email address. You have to fill it in exactly twice. Please note that the email you enter must be an email account that has never had a Facebook account. I logged in with a Gmail account email, and one of the nice things was that I entered the email but Facebook did not send the message. This is the security layer that he blocked.

8. The next page that pops up is Google Accounts? You will be asked if you would like to send the code to the email only. So you have to choose the user google account that will use google account.

9. The next box that pops up is just entering the new email.

10. The next step is to fill in the Security Question. This layer alone is well protected by Facebook. If this is not the case then maybe this is the way to go.

11. If you do not know the answer to the Security Question, please enter any answer you think is incorrect.

12. You will be asked to enter a new password. Enter the password you want to enter there and you're done.

13. You will be asked to reactivate your account within 24 hours. There, it is certain that the account is completely locked. He also shut down while using it. After 24 hours, just log in with your changed password and your account will be personalized. Not even 24 hours. 23 hours and 59 minutes.

The second way

There is another way. Help your friends on Facebook
Defines a request request This step is usually included before the Security Question step. Here are three accounts that you can use to make friends with him
You need to have an account without having to go through any steps.
The second way is to see how easier it is
  You may have forgotten to memorize every step of the way, so you may miss some steps. However, if you follow these steps patiently, it will not be difficult to get an account. Here is a step by step.
This is to prevent you from clicking Send code. Just send code
If you click on it, the hacked path will be damaged. It will reopen even if the code is sent to the original account owner's Gmail. So the hacked path is gone. However, within 24 hours, he and If you do not use Facebook, you may be able to overcome this problem. This very simple hacking method is becoming quite popular in the West. It's hacked without any software, so there are two main things to protect.

1. Keep your Facebook Facebook email private

2. Take the security question really seriously. The security question is even more important. Some say they are finished, some are born, some are born. Cool၊ And so on. If you have a strong security question, your account will be less likely to be stolen.
 And keep your email confidential. This is not easy. Because the person who is going to hack you already knows the email. The email was easily hacked. So the question is the security layer
The above-mentioned prevention method is to prevent the above-mentioned theft. It is your job to discover what that is and to bring it about.
After Facebook was accused of poor security, the question was asked to make it clear that it was the victim's responsibility. Facebook can do no more.


If you protect it beyond that, it will be difficult for you to get in. However, there are those who suggest that the security question should be taken to the next level, so the author wants to raise the security question.

Post a Comment

0 Comments