Skip to main content

How to Makes Private and Disappearing Chatrooms in 5 Seconds




There is no dearth of instant messaging applications these days and people are addicted to Facebook Messenger, WhatsApp, SnapChat, IM on Twitter, Hangouts and other apps for communicating to each other every moment. Recently, Facebook announced that now you don’t even need a Facebook account to use Messenger. But if you want to create your own DOS style chatroom right from your web browser that destroys itself when chat’s over, Hack.chat is the just the right thing for you.


When you use Hack.chat, there’s nothing to worry about privacy breach or sign-ins. Creating a chat room is dead simple and it could be disposed at any point after the completion of chat. I call it disposable as it doesn’t keep record of all unappropriated and private message you’ve ever sent.


How to create instant disposable chatrooms with Hack.chat?


Creating a private chatroom in Hack.chat is dead simple. All you need to do is go to the website URL and add  ? and the name of your chatroom. This would make the URL looks like this: https://hack.chat/?private-chat and make a personal chat room with name “random-channel.”
After creating that URL, you can send this to anyone and start chatting in moments. Because the channel you created is private and its name or information isn’t stored anywhere, no random person can appear in your Hack.chat.


Hack.chat has also provided some pre-existing channels to try out. Just head to the home page, click on any of them and add your name to start.

Comments

Popular posts from this blog

Kali Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A   -> apropos : Search Help manual pages (man -k)  -> apt-get : Search for and install software packages (Debian/Ubuntu)  -> aptitude : Search for and install software packages (Debian/Ubuntu)  -> aspell : Spell Checker  -> awk : Find and Replace text, database sort/validate/index B  -> basename : Strip directory and suffix from filenames  -> bash : GNU Bourne-Again SHell  -> bc : Arbitrary precision calculator language  -> bg : Send to background  -> break : Exit from a loop  -> builtin : Run a shell builtin  -> bzip2 : Compress or decompress named file(s) C   -> cal : Display a calendar  -> case : Conditionally perform a command  -> cat : Concatenate and print (display) the content of files  -> cd : Change Directory ...

Best iOS 9 Features That Will Change Your iPhone and iPad (CTech)

Take a look at the iOS 9 features and tell us your favorites: 1. Low power mode for extra and better battery life: I decided to write this iOS 9 feature before any other as it will be appreciated and loved by most of you. The new low power mode will make your phone run longer by disabling mail fetch, background app refresh, lower visual effects and automatic downloads. The great news is that you can still use almost all useful features of your phone like Wi-Fi, Location Services, Bluetooth, GPS etc. In the new power saver mode, the screen sleeps a little quicker along with other subtle changes to give you the extra juice. 2. iOS 9 update for everyone and smaller in size: This isn’t exactly an iOS 9 feature, but it’s surely worth mentioning. Usually, every new iOS version isn’t available for all previous generations of iOS devices.  But, iOS 9 will be available for devices like iPad 2, iPhone 4S,  iPad Mini and iPad touch 5th gen-...

The Top Ten Hacker Tools of 2015 (CTNews)

Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares. If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them.  Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll. 1. Nmap:  Network Mapper Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network...