Hack Facebook Method 3 - Using Computer Algorithms

Your password can be the very thing that allows hackers and other unscrupulous individuals into your system. It is important that you understand some of the complex algorithms to see how these work, just so you can make the necessary precautions and ensure that your facebook account and personal data stay safe for long. You should determine which one is most commonly used in your area, and try to invest in programs and methods that counter it.

Rule of Thumb for Facebook

Generally, if you pick a very easy password to remember, it will most likely be easier for the hacker to guess. Guessing or brute force attack will easily let the hacker into your computer, so the rule of thumb is to make passwords quite difficult to decipher. However, you should also refrain from choosing passwords that are very hard to remember, since these can minimize the safety of your computer and system. Users will need to electronically store the password or write it down for later use. Users might also have to use password resets all the time, if they forget and users will also re-use the password time and again. Users tend to subvert the system, by using very strict password strength requirements, such as mixing upper and lowercase letters, including digits and using words that are not readable.

Simple Password Transmission

Passwords are very prone to snooping or interception, while these are transmitted into the authenticating person or system. Once the password is brought as an electrical signal on an unsecured physical wiring between the central system that controls the database and the user access point, wiretapping can easily give out the facebook password. Any person who can watch the packets that have the logon data can easily snoop around without being caught.

Email is usually sent as cleartext, which makes it very easy to deliver to just any person curious enough to find out more. The email will be saved in 2 computers as cleartext, the recipient's and the sender's. Once it goes through intermediate systems during delivery, it will most likely be saved in one of the systems temporarily. Emailed passwords is a very unsafe way to distribute.

Via Encrypted Channels

If you use cryptographic protection, you reduce the snooping of passwords. The TLS or Transport Layer Security feature made into several internet browsers will let the user know of a SSL or TLS secure exchange with a serve by showing a closed lock image. There are also hash-based challenge-response methods. This requires the user to prove to the serve that the shared secret or password is already known. The stored form is then acquired by the server.

On Authentication

Remote authentication is also done by several systems. The attacker usually needs only the hash, instead of the original password so he can authenticate from a remote source. Zero-knowledge password proof can also be done, wherein knowledge of the password is proven without having to present it. There are also augmented systems like SRP-6 and AMP which can get rid of the limitation of hash-based methods. The hashed and unhashed password is used in this operation. 


  1. I DNT UNDERSTAND PLZ SEND ME A MAIL ABOUT FB HACKING I HV 1 person & i want to hack him plz tell me ID : owaizaziz@yahoo.com

  2. hello please help to hack my girlfriends facebook passwords because i want to make her away from her network...............plz send me way in my email id thulbabu@gmail.com

  3. hack me.....ID-zamin.hac@gmail.com