Wednesday, 9 March 2016

This is how you Stop Wi-Fi Stealing And Catch That Person Red-Handedly !!!!


Wifi stealing is the common problem we face in our everyday life. It even happens without our knowledge. However the control is in our hand and we can stop wifi stealing using the admin panel of our wifi router.

Often we are unable to locate an uninvited user who uses our Wi-Fi. If someone uses our wifi without our knowledge, that would be termed as wifi stealing.

Whatever be the case, to be on the safer side, we must know who is using my Wi-Fi without my permission and how can we stop them. So, here are the steps on –
How To Stop Wifi Stealing And Catch That Person:
Just Login to your router!!!!
Different routers support different login styles. So, I am listing a few of the logging in style, out of these, one might work for you:

Punch in the IP address of your router in your browser address bar directly like 192.168.0.1 (or)         192.168.1.1

If the above address does not work, you can also try (routerlogin.com) and it will redirect to your        router admin panel.

Enter the administrator username and password.

Once you are inside the admin panel, look for menu options like ‘Connected devices’ (or)             ‘Attached devices’.

If you are able to find that menu, you can see the MAC Address, IP Address and the Device name of all the devices which are connected to your network. This is how my Attached devices looks like in the below picture.

If you see some extra person’s name (or) some extra device then they are the one who might be          using your WiFi without your permission. Read on to know the steps to stop wifi stealing.



How to stop someone from wifi stealing?
Once you come to a conclusion that someone else is making use of your Wi-Fi resources, you can simply change the password of your Wi-Fi to a stronger password. You can also switch off your SSID broadcast.
If you want a stricter action, you can set up a filter based on the MAC address of the devices.



And by the way !! WiFi stands for Wireless Fidelity .























This is written from an inspired source and i'm not responsible for any Legalities .
                                                                                                                                      - Bhaskar

Thursday, 3 March 2016

Become a HACKER and make the world a safer place !!!!

I've written this article for anyone who wants to become a hacker, and wants to know how to get started and hacker isn't a negative word or a negative profession its all about exploring !!! Only a few dipshit fools get afraid and make's you panic by talking negatively about it because they get afraid that they will be made to stand naked infront of their lives for what they did behind the scenes!! and as well,  the real one's don't give a heck for it. Its fine if you have a problem with the name "hacker", you can even call yourself a "Pentester".


   
As you’ll get further into the Hacking community, and learn more about how it’s all put together, you’ll also realise very quickly that “There’s is no step-by-step tutorial for Hacking”. No single book is ever written about Hacking on how to this and that. Hacking is all about Knowledge, Skill and Persistence. You need to know a lot of things at the same time. You have to practice all your techniques and keep up with your knowledge so you not only will remember what you know, but also learn more. So, this is just a quick Introduction to the guide, I could go on about what else you need to know but let’s move on.

How to Get Started?

Now, this is the Million Dollar question, and we get a lot of request from people for writing about this particular topic. But as I explained above, I can’t link you a YouTube video or a PDF file with the tutorial on how to hack a Facebook account, or how to DDoS your friend and so on. What I can give you is some guidance on where to look in order to gain your knowledge.
First things first, You will have to read a lot of articles. Because it is crucial. Reading articles daily on everything related to Hacking and Computers in general, will let you on the path to become a good hacker very fast. Unlike all those newbie hackers asking several questions on hacking forums on “How do I hack?” “Where can I find hacking programs?” and many more stupid questions. So just read, try it out, and combine it with your own knowledge.

REQUIREMENTS to BECOME a HACKER:-

Now, to practice Hacking, you need a decent PC/Laptop with at least an i5 Processor, at least 8GB RAM and a lot of Hard Disk(1 TB is sufficient).
You need to know a lot about Computers and how they work will always be a benefit. As long as you know a little about PC’s its fine.
Then remember to become a hacker, you need to be smart. Would you download a file from an untrusted website on your dad’s computer? No, then don’t do it on your hacking computer. Know how to protect yourself from malicious programs in general. You need to have a lot of time, put in effort, and have PATIENCE. YOU DON’T BECOME A HACKER OVERNIGHT!
It is a must to learn at least 1-2 programming language. Make sure you pick the right one suited for you. If you don’t know how to program, you won’t understand how certain programs and hacking methods work etc. Programming will give you an understanding, and the ability to create YOUR OWN software AND give you the “power” to become a better hacker. You can write your own exploits (using Ruby), write your own scripts and so on.

Don’t Download Stuff from Unknown Sources:-

I want to point this topic out again because it is so dangerous. If you accidentally download malicious malware or have no clue that a hacker successfully planted a RAT or a Keylogger on your computer, you are screwed. Know what you are downloading. Make sure there is HTTPS in the URL. The “S” means the website is encrypted. NEVER EVER Download from untrusted sources. And there is NO such thing as a “Hacker Pack” or anything like that. If someone tries to sell or just give you a “Hacker Pack”, Don’t download it. There is most likely a Trojan or a virus in it. But if you still download or get the “Hacker Pack”, prepare to be screwed.

Anonymity:-

Anonymity is the most important thing as a Hacker. If you don’t have this 100% in place, you will then get a new room called a Jail Cell. And you most likely won’t get out depending on what you did. And you don’t want to be sitting in Jail for the new 1-2 or more years for being a Hacker.
There are a lot of ways to stay hidden on the Internet which also makes it difficult because it will then be easier to make Only One mistake. Use TOR(The Onion Routing). TOR is an anonymous web browser that gives you an IP address and lets you surf the web anonymously. Tor was used by the military until hackers got their hands on it. Don’t access your emails or any real identity stuff through TOR. The purpose of using this browser is to stay anonymous, so why access your real identity through it? TOR is not SUPER SAFE. It doesn’t provide end-to-end encryption, which means anyone with the knowledge of how to perform a man in the middle attack can see what data is being transferred, which puts you in danger. He can’t see where it’s coming from or where it’s going though. But still, he has a possibility to find out with enough knowledge.
I2P is safer than TOR. It provides end-to-end encryption and its security basically was developed from where TOR left off. Tails(Linux Distro) lets you surf the internet COMPLETELY anonymously. It leaves no trails on your computer, and it uses TOR to access the internet. Create an anonymous email and use STRONG passwords. And ALWAYS keep backup files of your stuff, just in case.
Don’t use TOR for pulling out any big hack, since it has been compromised by the NSA lately. Use I2P or any other darknet. Not only is I2P more secure, it is less famous too, which means less chance of spying eyes.

    VPNs and Proxy:-

A VPN is a Virtual Private Network. It creates a tunnel from your computer to the internet, and lets you surf the internet anonymously. The tunnel is encrypted so it’s safe for any intruders. Use VPN as it is up to date and is the most used way to stay hidden. A proxy is a server that is its own tunnel sort of speak. It is very similar to a VPN but proxies are out of date now, and I doubt you will find any useful and working proxy server today. If you do, it most likely won’t provide encryption and isn’t safe to use. So use a VPN.

Programming Languages:-

Here is the list of Programming Languages which you should learn:
  • C/C++(almost everything in windows is programmed in C/C++)
  • HTML(Used in Websites)
  • PHP(Server Side Script Language)
  • SQL(responsible for storing and managing sensitive and confidential data such as User Credentials, Personal info or even Bank details)
  • Python(for creating exploits and tools)
  • Ruby(for Exploit writing, and even Metasploit itself is programmed in Ruby)

Do’s and Dont’s :-

  • Don’t be that newbie guy on hacking forums who asks stupid questions.
  • Don’t download possible malware.
  • Learn some programming languages.
  • Make sure you are ANONYMOUS. The most powerful tool a hacker can have, is his anonymity.
  • Know the consequences of what you are doing.
  • Know the consequences of a successful attack, and a failed one.
  • Understand what you are doing, otherwise you can’t develop your methods and techniques, and you can’t add knowledge to your brain.

Conclusion:-

Remember, Hacking is all about Skill, Knowledge and Persistence. There are no tutorials on it. You need to know a ton of shit at the same time. Stay anonymous and don’t get in jail. Hackers are supposed to help each other, so share your knowledge as it will benefit you both. Don’t need to tell each other exactly how you do this and that, but an overview is fine.
Before you start this “journey”, sit down and ask yourself, “What do I want to accomplish as a hacker?”, decide what direction you want to go in. Set some ground rules for yourself, and possibly your partner if you have one, and work as a team. Remember that everything you need to know is ON THE INTERNET. Not in some silly article on a hack forum. (Unless you’re lucky and find your answer). But to find your answer, use Google as it is a very popular search engine, and gets millions of search query’s daily, and is a fantastic source to find information. Anything you need to know is on the internet. And your keyboard is your tool to achieve that mission.
And One More thing:
"Don’t ask anyone to be your teacher or guide. everything is on internet, so get up and start exploring instead of asking someone and waiting for days for his/her reply".

Tuesday, 15 December 2015

Here'z How you increase the RAM storage of your ANDROID DEVICE !!!!!



Increasing RAM space does not mean that you are internally adding some hardware to your Android phone. Its not possible for a normal person to alter the hardware of Android device so as to increaseits Ram. Its been risky and one need to be professional to change the hardware. And also manufacturer has some guidelines for this.  But don’t worry there is some simple way to increase ram in Android, you just need to follow few instruction's. And you can easily increase your RAM in maximum 10-15 minutes. Using this method or trick you can increase your ram upto 4 GB.

Requirements:-


(1.) SD card as you want but class 4 or higher SD Card will give excellent speed to your Phone.

(2.) Rooted smartphone (or) Rooted Tablet (If you want to increase RAM and Internal Memory of it.)

(3.) SD card reader.

(4.) Windows PC.

(5.) An internet connection for downloading a few softwares or you can get it from somewhere else           also.

Partitioning Your SD Card:-



First step you have to do is to partition your SD Card and for doing this you have to....

(1.) Download Mini tool Partition from the Internet.

(2.) Install the application on your PC and connect your SD card to your PC with Card Reader.

(3.) Open Mini Tool Partition in your PC and when the wizards open click on your SD Card and                select the Delete option. 
(Note: This will format your SD Card completely mean that it will erase your data permanently, so previous to doing this backup your data at any place in PC or other Storage device.)

(4.) When the Formatting of your SD Card is completed then, you have whole of space of your SD            Card as un allocated then Right click SD Card and select make option.

(5.) A popup box will open giving you options for making partition; select the partition as primary           and file system as FAT if SD Card is less than 4GB or FAT32 if your SD Card is more than 4GB.

(6.) Leave about 512 MB or more space (your choice) for making the next partition.

(7.)Then select done and do right click on un allocated space of your SD Card and again click make           option. Select Primary partition but change the file system to Ext2, Ext3 or Ext4.

      Note: (Ext2 is not compulsory as most ROM's work fine with it).




How To Make RAM Of SD Card Android:-


(1.) Click Apply Changes and then process goes on for the few minutes and then partition is                       completed.

(2.) Install Link2sd from Google Play or download and install the .apk format file from here to your          phone.

(3.) On the first launch of the app, it will question for root permissions and then, it will question you          the file system of the .ext partition that you had before made, choose the option as you had                  choose in the partitioning steps.

(4.) Sort the apps according to size and start linking them.


Conclusion:- It's busy world with busy complication's so this is a desperate measure for a           desperate complication which is faced by every android user.















































This is written from an inspired source for creating awareness and but not to hurt anyone and i'm not responsible for any legalities.
                                                                                                                              -Bhaskar.

Friday, 14 August 2015

CATCH THEM IN THE ACT WITH A SCREENSHOT !!!! By knowing who is trying to Unlock your mobile phone.

Are you suspicious that someone is trying to guess the password to your Android phone or tablet when you leave it lying around? Or do you just want another layer of security for your Android device?  Then you’ll want one of these four apps.
Each of these apps can take a picture of anyone who types a wrong password or PIN into your device while trying to unlock it, and they can send that picture to you remotely. Whoever was trying to sneak into your phone is busted. Additionally, it can also be used to hunt down criminals; when they try to unlock the phone, you’ll be send photographic evidence of the thief that you can submit to law enforcement officials.



Whether for security or to stop snoopers, you need one of these apps.

How to Setup:

First, you’ll need to setup a password, PIN, or pattern protection for your lockscreen. You can customize the security on your default lock screen under Settings > Security > Screen Lock.



If you’re using a third-party lockscreen replacement app, you will want to remove it. These apps works by tapping in directly to the Android OS and waiting for an incorrect password or PIN to be entered. If that incorrect password or PIN is typed in a third-party lockscreen app rather than Android’s built-in lockscreen, these apps can’t detect that.
You can also follow these tips for improving your lockscreen security.
Ads by Google

Unlock Alert (It'sFree)

First up is a completely free, ad-free option that requires no sign-in and is as simple as it gets. It can capture an image via the front-facing camera and your location (if you have location tracking turned on in Android’s settings). It can then save this information to the phone, email it to you, or upload it to Dropbox. You can also have it delete the local copies after emailing or uploading it.

































However, it would not take a picture of me no matter how many times I entered the wrong password. It did capture my location extremely accurately, which is a plus for security purposes, but the lack of image is rather disappointing. I’m thinking this is an issue specific to my Galaxy S3, though, so you should still give it a shot on your device.










You can set a “Scare Screen” which will warn the snooper/thief that they’ve been photographed, but that’s probably unnecessary. All that happens with the Scare Screen turned off is a little notification appears in the notification bar — but that can’t be pulled down anyway without the correct password or PIN.
Also be sure to whitelist “unlockalertservice@bitourea.com” to be sure it doesn’t land in your spam folder, which is where it went for me.
GotYa!
GotYa! costs $2.99, but it also has a free trial version so you can try it out first. Upon setup, you’ll need to sign in with Google and grant it some permissions to your Drive. To send an email to yourself, you’ll need to grant it permission to view and manage your email too.

































It steps you thowards the setup, making it incredibly easy. Within seconds your phone is secured. You can then alter the settings at any time by swiping in from the left in the app.  You can turn on or off system notifications, take a picture every time the screen turns on after 3 failed logins, change GotYa!’s icon so that it doesn’t appear to be a security app, or set a password to protect GotYa! itself from being opened and changed without your permission.

The email you receive is well put together, with the image embedded in it and the location embedded in a Google Maps image with the option to open the location directly in Google Maps. This app is incredibly easy to use, and the free trial version seems to only be missing one feature — automatic uploading to Google Drive. You can purchase the upgrade in the app, though, if you really want.

Hidden Eye (Free, $0.99)

Hidden Eye shows a big difference between it’s free and paid versions. The free version doesn’t email you the location or picture, it has ads, and it doesn’t have Dropbox sync. To unlock those features and remove ads, it’ll cost you $0.99, which really isn’t bad. In the free and paid versions, though, you can have it play a certain ringtone if someone tries to unlock your phone three times.

































This app certainly gets the job done, but doesn’t do much in the way to differentiate itself unless you are an avid Dropbox user. The interface is pretty plain and drab, and the free version is quite limited. There is no notification, though, so if you don’t have the alarm set to ring after three failed attempts, it’s a great way to secretly catch noisy people.

Lockwatch (Free)

This app takes the cake for simplicity, while also including some standout features. However, you’ll need to pony up $2.99 for an in-app purchase to get the best features. For free, it will snap a picture of someone after a failed attempt and has the ability to delay sending if a correct password is entered within 10 seconds (in case you mistype your password).

































The premium features are rather interesting, though. It can also record 20 seconds of sound using your device’s microphone after the incorrect password is entered, send you an email if the SIM card is changed, take multiple photos at a time, send an SMS to a friend with location info if no data connection is available, and retry sending emails if the device moves from being offline to online.
Lockwatch, for me, was unable to take a picture — the same problem that Unlock Alert ran into. I’m not sure why this is, but the location was accurate. A strange feature about Lockwatch though is that you don’t have the ability to view the captured images and locations within the app; you can only access that information via the email you receive.

Which Is The Best?

In my testing, GotYa! was the best. Its free version provided all the features I needed, its interface was slick and easy to use, and it successfully captured both my image and location. Whichever works best on your device, though, is up to personal preference.
For even more security, you should enable Android Device Manager or one of the great third-party security apps out there. These apps allow you to better track your devices location if it’s stolen and even remote lock or wipe it.



























This is written just for the acknowledgement of the readers to provide information from an inspired source but not to hurt anyone . So i'm not responsible for any legalities. 
                                                                                                                          Bhaskar
                                                                                                              

Tuesday, 11 August 2015

BE CAREFUL WITH WINDOWS 10 !!!! IT MAY LAND YOU IN TROUBLE'S.

Beware: A Dangerous Windows 10 Ransomware Scam Is Spreading Online with Windows 10 !!!!!!!



A Windows 10 Ransomware scam has been reported by Cisco security blog. This phishing scam sends fake emails that look just like ones from Microsoft, encouraging the users to download a .zip file for Windows 10 installation.
Windows 10 is now released and people are installing it on their PCs in huge numbers. According to the media reports, more than 67 million people have installed Windows 10 on their PCs. For those who were left behind in the upgrade process, Microsoft even decided to help them out with Windows 10 media creation tool. Unfortunately, scammers are taking the advantage of the desperation of Windows users- that has resulted in a newly reported Windows 10 ransomware scam.

How does this Windows 10 Ransomware target users?

According to the Cisco’s security team, they have found a new scamming campaign that spreads CTB-Locker ransomware. This trouble comes in the form of a fake Microsoft email, telling Windows users that their Windows 10download is ready.
These messages in Windows 10 ransomware scam mimic the emails sent by Microsoft, along with some text mistakes and changes. However, scammers have managed to spoof the address of origin as update@microsoft.com. To make the messages look more authentic, attackers are using the same color scheme used by Microsoft to fool the users. Thus, these emails look more legitimate.

The mail is also coupled with a Microsoft disclaimer and a message that files are virus-free. The origin of these emails has been traced back to Thailand.
This is what will happen if you run the CTB-Locker file?
Falling into this Windows 10 Ransomware trap, users download the .zip attachment. After extracting the files and run the executable program, your computer will be immediately locked by CTB-Locker ransomware. This ransomware tells the users to submit the payment within 96 hours, and failing to do so will result in the permanent encryption of PC files.

                         CTB-Locker uses elliptical curve encryption which provides same private/public key encryption with a different kind of algorithm. This new algorithm results in lower overhead and same security at a smaller key space.
Cisco’s security blog has written that this Windows 10 ransomware threat will increase until the attackers find new ways to monetize the compromised PCs. It advises the users to store their data as an offline backup. This Windows 10 ransomware phishing attack shows that such launches and events are targeted to trap users.
WINDOWS 10 also diables pirated games and unauthorised softwares !!! 

According to the Microsoft’s new Services Terms effective August 1st, Microsoft can stop you from using unauthorized hardware or from playing counterfeit games. Microsoft services such as Office 365, Outlook.com, Skype, OneDrive, Xbox Live, MSN, and Bing are also covered by the new services terms.

The terms are also applicable to software using a Microsoft account, which would mean that it would also have an effect on most Windows 10 users. Majority of the users use Microsoft’s latest OS with an account from the Redmond company, even though when they have an option to use it without an account.

Microsoft now clearly states in the terms that the updates released could have some serious effects. In the terms, the company states it might, “download software updates or configuration changes, including those that prevent you from accessing the Services, playing counterfeit games, or using unauthorized hardware peripheral devices.”

Further, there is no clarity on what the company means when it says unauthorized hardware peripheral devices. It could mean that the company may disable e.g. Xbox controllers that are uncertified by Microsoft. There is more clarity on counterfeit games, as this is pirated software.

Non Windows 10 users could fall prey to these new terms. The Microsoft’s new terms are also applicable to updates to Skype, OneDrive app, OneNote app, Windows Photo Gallery, Windows Games, Windows Live Mail, Maps, and Windows Movie Maker.

There has a lot of murmuring and talks hovering over the privacy settings of Windows 10 from the time of its release. For instance, when the operating system is installed, it uses the default express settings, which according to some users contain some settings regarded as privacy concerns, such as the use of Cortana, the use of a Microsoft account, automatic updates, and the accumulating of telemetry and privacy by Microsoft.

SOLUTION: 
So what can you do to enjoy the advantages of Windows 10 without giving away too much of your information? Here are some tips to help you protect your details.

Installation options
If you’re yet to install Windows 10 you’re probably keen to get started, but don’t just accept the Express Settings option in a bid to be up and running as soon as possible. The Express option allows the OS to share speech, typing, contacts, calendar, and location data and advertising ID information to Microsoft and its partners.

If you choose the Custom install option you can turn most of these off to guard your privacy. These can also be turned off later from SettingsPrivacyGeneral.





























Stop Sharing Updates
As we pointed out last week Windows 10 will try to use your network connection to share updates with other systems. This uses a P2P-type system called Windows Update Delivery Optimization (WUDO). To stop this open up Settings and click Update & Security. In the Windows Update section on the left select Advanced optionsand click Choose how updates are delivered.
You can switch off WUDO by flicking the toggle switch to the Off position. Or if you have other PCs on your network you can continue to share updates with these but not with the outside 
world by leaving this toggle in the On position and selecting PCs on my local network.

Cutting Feedback
If your system or a piece of software you’re running crashes, the OS will send diagnostic data back to the software vendor. There’s a risk that these could include memory dumps which contain personally identifiable data.
You can’t stop Windows sending these reports but you can reduce the amount sent by going to Feedback & diagnostics from Privacy settings and changing the Diagnostic and usage data drop-down to Basic.

Taming Cortana
Windows 10’s digital assistant might look nice and friendly, but in order to be responsive to your needs it uses machine learning.

This means Cortana can snoop into your emails and contacts, if you’d rather it didn’t do this turn the assistant off. To do this go to Settings and select Privacy, Speech, Inking & typing and then click the Stop getting to know me button.





























Keep It Local
Microsoft is very keen to get you to sign in using a Microsoft ID so that you can synchronise information with other machines, but doing this means some of your details will be stored in Microsoft’s cloud.
It is still possible to use a local ID to access Windows 10 but in order to do so you need to have your internet disconnected during installation up to the point where you’re prompted to create a Microsoft account.

Limiting Account Information Sharing
By default Windows 10 will happily share some of your account details, including your picture and your name, with third-party apps. You can stop this from happening in the Account Info section of Privacy settings.


























































This is written just for the acknowledgement of the readers from an inspired source but not to hurt anyone . So i'm not responsible for any legalities. 
                                                                                                                       Bhaskar.

Tuesday, 28 July 2015

"RESPECTING FEMALES IS A GOOD HABIT BUT TRUSTING THEM IS COMPLETELY A DIFFERENT STORY"- Here are 10 reason's for those who ask 'why?'!!!

Playing the blame game never does anybody any good. The nation is constantly trying to fight against all odds, become a better place to live in and yet reaching nowhere. And that’s probably because there’s a conflict going on within that’s pulling us back more than it is propelling us forward. Men and women seem to be at war with each other and that just makes every effort worthless. Many prominent personalities always tried to make men understand the plight of women in this country and why they should be equally supportive of women’s rights and it is only fair that this time we look at the other side. Turns out, men have their own reasons (however much legitimate or foolish they may seem to others) for not being able to trust women anymore, let alone understanding them!!! I'm not trying to stereotype every woman in the world or paint them all with the same brush, just being honest in giving the women out there a piece of our minds, with all due respect! Read on as I try and decode exactly why men have lost complete trust in the other gender.
1. Men, especially those who have been in relationships, swear by the fact that there is no way to             gauge what goes on inside a woman’s mind. They don’t say what they mean and don’t mean               what they say. You can never know what they really want. Understanding a woman is one                   thing a lot of men have just given up on! Yes, it is a stereotype but well,  looks like there’s a               reason why some stereotypes exist.

2. Another reason why men have so many grudges against women is because every guy at some point in his life has gotten FRIENDZONED . We men think it is rather insensitive of  women     to knowingly mislead guys into believing they’re interested when they’re really not. And the       world knows it—once in the Friendzone, always in the Friendzone. It only makes those               women look insensitive and selfish. The worst part is, they don’t even seem to acknowledge         that they do deliberately mislead us as per their own convenience.

   

3. Today, women have all the sympathy in the world. No denying that we need to make this                 Country a better place for our women but not at the cost of ourselves being neglected in the                 process. Women don’t necessarily deserve sympathy for everything. We’re moving towards a             direction where women are getting leverages at the cost of us. It disappoints to see how the world       is getting biased towards them every day while our problems are not even considered genuine. Do       you ever see people talking about crimes against men?Think about it because even this became           worse in the educational field. 




4. The laws are horribly biased towards women. DOWRY is a criminal offence but demanding           ALIMONY is not. If a woman files a molestation case against a man, it is instantly assumed that         he’s guilty. As a matter of fact , always a women's enemy is a women because in the cases of               dowry the mother -in -law starts quenching the bridegroom for dowry. So the mother -in-law gives     a kickstart and then the other's join. Saddest part is that only the men get blamed all the time.

5. The nation is much more informed now and according to every recent survey and study, most rape and dowry cases filed by women are false. Now, we also know a lot of genuine cases go                       unreported and in no way are we trying to dilute the gravity of crimes against women in the                 country but let’s face it, a lot of women do misuse laws against men just because they can. And as       unfortunate as it is, this has created a huge gap of mistrust between men and women. It is                     understandable why men constantly feel insecure and afraid of falling prey to such women.



6. We men totally support women fighting back and protesting against crimes, we really do. But what we often get in return is a tag of being ‘potential rapists’. A ride in the public transport is in-               complete for men without hostile glances from female passengers. We’re constantly judged and           looked at as if we’re trying to molest them. We’re stereotyped at every point. All men are not             rapists but women just don’t seem to get it.


7.  Most men have also had enough of hypocrisy. It has become a fad to rant about how women are   objectified all their lives by men, conveniently ignoring how an Indian man is insensitively                  reduced to his family wealth, bank balance and the company he works in. We know women have        it difficult in India but men don’t have it easy either and it wouldn’t hurt if women could just              acknowledge and understand it.



8. Most women who call themselves feminists have a very warped idea of the movement.They either want superiority of women over men in the name of feminism or just switch sides as per their             convenience. They want equal pay, equal rights, equal opportunities,respect, freedom (which we         men totally support) but also want the reserved Ladies seat in the Delhi metro. They still expect           men to pay the bill on dates, still want their chairs to be pulled and still want to be able to play the     ‘woman card’ to have it easy. It just looks like women today want to lead an easy life at the cost of      men. It  is definitely not equality that they want and it’s quite evident to the other gender.


9. We men are not against feminism as we are against the way women are going about it, to be honest. Feminism is about giving women equal rights. It has nothing to do with hating       men. But sadly, that’s exactly what feminism has come to be – misandry. It looks like             they’re fighting against men instead of fighting against patriarchy, along with men. Their       attitude has become rather spiteful in the recent times. While men are constantly trying to     lend support and make women feel safe, they’re being made to feel like they are the             problem.
                         



10. Men are largely misunderstood, no matter what they do. A casual internet joke on women is enough to stir up a storm. Thanks to the sudden wave of feminism, a guy cannot even voice his preferences in women openly with the fear of being slammed for‘objectifying’ women or being labeled as a douchebag. It is perfectly fine for girls to prefer ‘tall, dark, handsome men’ but the moment a guy says he finds skinny girls hotter, all hell breaks loose!!!


CONCLUSION:
And now that I've said all that I wanted to say. I wouldn’t stay far behind in acknowledging that there are always two sides to a story. I know women, too, might have a lot to say about this. But i'm just trying to bridge the gap between the two genders and if one of you women reading this wants to step up and say something, i'm all ears. Let’s put an end to this gender war. If you know how to make things better, the comment box is all yours !!!















This is just written from an inspired source for the acknowledgement of the readers , but not to hurt anyone and i'm not liable for any legalities. 
                                                                                                                            -Bhaskar