PrivacyPrivacy
_
Useful information×

Welcome to this interactive hacker simulator. Click the icons on the right to open the programs or press the numbers on your keyboard. Drag the windows with your mouse to organize them on your desktop.

How to avoid getting hacked?

There are some simple things you can do to keep from getting hacked. You don’t need to be a computer expert to take some of these simple steps that could save you time, frustration, and maybe even money.

Keep Everything Up to Date

Maybe you ignore those popups on your computer or phone telling you there is a new update available. Keep in mind that those updates are often security enhancements. When software developers learn that hackers have learned how to get into their software, they issue a more secure update. Be sure you are using the latest by accepting those invitations to update or turn on the auto-update feature when available.

Install Anti-Virus and Anti-Malware Software

You might think that you don’t need special software to keep your computer and information safe, but you do. Install anti-virus and anti-malware software from a reputable company, and again, be sure to keep it updated. Also, set it to scan your computer regularly to search for any new malicious programs.

Use Strong Passwords and Change Them Regularly

Weak passwords make a hacker’s work easy. People often use passwords that are quickly figured out or based on the name of a pet or loved one that is easily found online. Be sure to choose something no one could guess and include upper and lower case letters, numbers, and at least one symbol. Never use the same password on more than one site. If someone gains access to your password on one site, they could access your other accounts.

Use Two-Factor Authentication

Two-Factor Authentication is an amazing new security feature that too many people ignore. Many banks, email providers, and other websites allow you to enable this feature to keep unauthorized users out of your accounts. When you enter your username and password, the website sends a code to your phone or email account. You then enter that code to access the site. Most sites give you the option of “remembering” the computer you use every day. But if someone tries to access your account from another computer, a stolen password will not be enough for them to hack you.

Delete Suspicious Emails

Reputable companies will never ask you for a password via email. Family members will rarely ask for money to be wired to an unknown location. If an email sounds strange, there is a good chance it is malicious. Go ahead and delete it. If you are not sure, contact the sender directly via phone to check it out.

Secure Your Smartphone

Many people dislike the inconvenience of needing to enter a pin-code or password to use their smartphone. But it is worth it. If you were to lose your phone, without a pin-code or password, the person who finds it could have access to your accounts, passwords, and even payment information.

Interactive Programs

The interactive programs can be opened with the icons on the right of your screen. Try to interact with these programs because most of them responds to your actions.

Play that you mine Bitcoins, watch the surveillance camera, crack passwords, control a nuclear power plant, break into the Interpol database or find the best secret deals!

Passive Windows

hacker typer

Press the number buttons on your keyboard (0-9) to open the passive windows. These programs show a static or animated window on the center of your screen. You can drag them around with your mouse. Close them pressing the Space key.

Display "Access Denied" or "Permission Granted" warnings, start a self destruction countdown, play an animated neural network tracing or a Matrix code rain. Install a virus, download confidential data, trace a computer's location with satellites, and more!

Hacker Typer

Minimize or close all windows and start pressing random buttons on your keyboard to simulate that you're writing program. The hacker typer will add more than one character at once to the screen to make your writing look faster.

Open the "Remote Connection" program to simulating that you're hacking a top secret governmet server. This automated hacker typer will trigger server responses and will show various programs and warnings on the screen.

For a more detailed instruction guide please visit HTML-Online!

Find more online pranks at Pranx!

Main Server×
Server IP address: 23.86.111.0
Main gvt server. WARNING: Top secret!
Bitcoin Miner×
128.154.26.11 Connected to btcn.miner.bitcoin-heap.htmlg.com
Block: ...7e9Wq#001 Diff:147M Permission granted!
Initialized GPU #0 - #32: [OK] (1.092Ph/s) Started @ 17:22:01
Overclock set to 300% | BW:[ 55/ 13/ 4Mh/kWh]
Running BitCrane.exe in unsafe mode | STATUS: Miner running...
Wallet
BTC9
≈ $44622
ASICs
Accepted
Rejected
GH/s 5s
1
31825
351
334.54 Gh/s
32
57103
8767
35.99 Gh/s
Sum
8345694
32142
~157 Gh/s
2012.   WTXD - [17:23:16] Resp Siuyo$55 | No match Va#25 | Diff: 91/102
2013.   IOEG - [17:23:17] Resp Fxpke-62 | No match Xn@32 | Diff: 35/632
2014.   MTHX - [17:23:18] Resp Admxb)41 | No match Tt#28 | Diff: 49/964
2015.   ANUC - [17:23:20] Resp Bbkdf~45 | No match Mo_73 | Diff: 57/293
2016.   ZCFD - [17:23:21] Resp Fvyjb~97 | No match Np#79 | Diff: 34/296
2017.   QFKN - [17:23:22] Resp Kaswy*22 | No match Jh-60 | Diff: 14/474
2018.   AKUG - [17:23:22] Resp Gzgph$10 | No match Nh%32 | Diff: 30/264
2019.   HOYE - [17:23:23] Resp Xfupi)13 | No match Qu#71 | Diff: 43/416
2020.   AEZF - [17:23:23] Resp Woyjy~99 | No match Oy-76 | Diff: 28/939
2021.   AILP - [17:23:24] Resp Ooypn~40 | No match Kt*28 | Diff: 01/474
2022.   TOMK - [17:23:25] Resp Kehsw$11 | No match Lu^96 | Diff: 58/419
Mining...
Headquarter surveillance×
Connecting...
loading
2024-71-15
17:23:25
Password Cracker×
CrackResetPenetrate
Target: 23.86.111.0
Database: User table / Admin role
 
 
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
Status: Standby
Start brute force attack
Legal notice: Using Password Cracker™ for harmful and illegal activities is strictly prohibited and punishable by death!
Nuclear Plant×
31.4
31
701
2034.5
13
71392
0
15.7
120
2762
0
1632
168
0
1548
2364
2225
220
250.5
0
1002
616
83
602
2003
642
970
1554
373
116.5
0
62
639
2191
111.3
306
1573
Remote Connection×
Advertisements×
Compiler×

Calculating Space Requirements

....Searching...

Going Deeper....

Access Granted..

0.13966753 0.13927319 0.63212057 0.85287936 0.94672033 0.91883372 0.95500401 0.46935263

Authorized...

Encryption Unsuccesful Attempting Retry...

Going Deeper....

Compilation of Data Structures Complete..

0.89484323 0.32955040 0.82422745 0.44466786 0.80762987 0.23142056 0.93459532 0.44100927 0.46092300 0.57529647

Compression Complete.

Encryption Unsuccesful Attempting Retry...

0.84537485 0.18525218 0.71690087 0.19376496 0.75174830 0.96954999 0.31429925 0.45887312 0.38750994

Going Deeper....

0.86764031 0.88585740 0.26920813 0.27363693 0.77445566 0.82710192 0.62029241

Authorizing

0.54793921 0.29954576 0.25699574 0.64800369

Compilation of Data Structures Complete..

Authorizing

0.34655686 0.80763646 0.56748253 0.47031422 0.52794600 0.063864380 0.20341544 0.83804660 0.029349688 0.65288509 0.71102961 0.017520543 0.012095547 0.85447954 0.21769991 0.59892687 0.20648328 0.82046085

Going Deeper....

0.32343912 0.029021429 0.79985092 0.051757427 0.021711303 0.54864503 0.86584341 0.83135160 0.70702631 0.24686167 0.091559360 0.53583284 0.52483252 0.71571317 0.22472414 0.55450385 0.63939978 0.19067531 0.25804722 0.31962700 0.66435766

....Searching...

Entering Security Console...

0.71284082 0.18878703

Compilation of Data Structures Complete..

Entering Location http://ab.ret45-33/?timing=1ww

Performing DNS Lookups forTexture

....Searching...

Encryption Unsuccesful Attempting Retry...

Compression Complete.

Compression Complete.

0.71806438 0.41785202 0.31388594 0.37871556 0.71113725 0.61099655 0.017212729 0.24288452

Compressing Data Structure

Entering Location http://wwjd.com?au&2

Authorized...

Waiting for response...

Entering Location TPS Reports

Searching Texture

Estimating Approximate Location of http://ab.ret45-33/?timing=1ww

Authorizing

0.58089898 0.96441165 0.29221349 0.39530319 0.39491749 0.15341601 0.92888884 0.080407212 0.63001458 0.077006568 0.59375507 0.86361307 0.25527470 0.20237571 0.14413226 0.12945791 0.77887400 0.24537403 0.58163699

Compilation Started of Data Structure

....Searching...

0.55641353 0.31678431 0.22817927 0.58967249 0.85541658 0.22116047 0.85794313 0.068253571 0.59085986

Searching http://ab.ret45-33/?timing=1ww

Searching Data Structure

Waiting for response...

0.038463509 0.62832032 0.48975161 0.55637836 0.88184831

Performing DNS Lookups forTPS Reports

Compressing http://ab.ret45-33/?timing=1ww

Estimating Approximate Location of http://ab.ret45-33/?timing=1ww

Encryption Unsuccesful Attempting Retry...

Analyzing .... Searching ...

Compression Complete.

0.44059998 0.87063083 0.81150291 0.51158394 0.47210648 0.097417721 0.11158249 0.60193784 0.73374842 0.94328335 0.061004507 0.37983845 0.76380158 0.51581344 0.89761031 0.27359628 0.33993881

Estimating Approximate Location of Texture

Waiting for response...

0.31775149 0.62004715 0.055026866 0.61567344 0.81463286 0.57511500 0.90739797 0.60819070 0.71857208 0.44536537 0.85449235 0.58729283 0.37921981 0.050307855 0.87189541 0.19206349 0.62002984

Calculating Space Requirements

0.55262404 0.60492435 0.097379211

Going Deeper....

Encryption Unsuccesful Attempting Retry...

0.21385063 0.60217143 0.21092644 0.22957752 0.068229358 0.13296672

Entering Location TPS Reports

Compression Complete.

Authorizing

0.73756477 0.29146880 0.47818405 0.019257441 0.32232337 0.63597440 0.61282094 0.25902526 0.46344683

Waiting for response...

Entering Location http://zanb.se/?23&88&far=2

Going Deeper....

0.91492457 0.75050977 0.83618881 0.74130485 0.70377339 0.94370491 0.42825246 0.63282899 0.080860607

Encryption Unsuccesful Attempting Retry...

0.45584174

Compilation of Data Structures Complete..

0.14714369 0.89192322 0.31450831 0.37883533 0.49927796

....Searching...

0.75013920

Authorizing

Entering Security Console...

Authorized...

0.32330815 0.028483039 0.48303536 0.96903512 0.74485697 0.74622805 0.94607513 0.67007018 0.49606475 0.58904017 0.98339313 0.83805338 0.18030753 0.64636219

Compression Complete.

0.58286772 0.50069389 0.49756322 0.28549075 0.35004645 0.67009749 0.52289966 0.16240046 0.89200849 0.076069194 0.48899135 0.44098513 0.89127066 0.10946513 0.78007915 0.74454140

Going Deeper....

Waiting for response...

Calculating Space Requirements

Compilation Started of .... Searching ...

Compression Complete.

Authorized...

Compilation Started of Data Structure

Access Granted..

Compression Complete.

0.32541499 0.85225315 0.50385570 0.90803575 0.10207637 0.12762412 0.30183370 0.75733473 0.029863900

Performing DNS Lookups forTexture

Going Deeper....

Analyzing TPS Reports

Searching Data Structure

....Searching...

0.53436536 0.47623272 0.60887969 0.62734592 0.95045254 0.50094547 0.26746368 0.18495553 0.99644615 0.91670996 0.38414072 0.15736364 0.96167059 0.90823220 0.56210727 0.77859037 0.66384070 0.82653443

Authorizing

0.32101179 0.60070767 0.80049771 0.80009025
Program Console×
penetrate" == typeof $.accessRequest &&
   ($.accessRqst = !0),
   function(a, b, c) {
      function d(c) {
         var d = b.console;
         f[c] || (f[c] = !0,
         a.migrateWarnings.push(c),
         d && d.warn && !a.accessRqst &&
         (d.warn("BankTransfer: " + c),
         a.migrateTrace && d.trace && d.trace()))
      }
      function e(b, c, e, f) {
         if (Object.defineProperty) try {
   
× 🗙 Access Denied
× Permission Granted unlocked
× Self Destruct
523
Sequence engaged
×
Neural Network Tracing
×
Installing Malware
skull
×
Downloading Confidential Data
highly classified
×

Establishing
satellite connection

globe triangle satellite satellite satellite
hacker map
 Start
?Useful information
Main Server
BBitcoin Miner
Headquarter surveillance
*|Password Cracker
Nuclear Plant
Remote Connection
$Advertisements
Compiler
>.Program Console
Pranx home

Hacker Simulator and Typer

Start typing random text on your keyboard to simulate that you're hacking a computer.

Discover the programs clicking the icons on the right or press the numbers on your keyboard to show various windows.

hacker typer

Read more...

With this hacker simulator game we want to raise awareness for computer and internet security. Learn more about ethical white hat hacking here.

?Useful informationMain ServerBBitcoin MinerHeadquarter surveillance*|Password CrackerNuclear PlantRemote Connection$AdvertisementsCompiler>.Program Console
Sorry, you are using ad blocker. Disable AdBlock How? No match SUCCESS Running brute-force attack Please wait for the solution SUCCESS: Admin password found Password Status: Standby Start brute force attack Locating Tracking IP Location found Tracking SIM Minimize Maximize Close