Online Hacker Simulator

With this website we want to raise awareness for online security and to promote ethical hacking. Always protect your system following the guidelines recommended for a safe Internet.

~

Start the Hacker Simulator »

~

This interactive online hacker app will let you simulate that you're hacking a computer or a digital network. Adjust the screen in the Start menu, open and minimize the windows and play with them. Unlike other hacker simulators, this one is more realistic because it's ASCII text based.

Panel can be closed, widened and moved to the top of the screen in the top right corner of each small window. These can be opened from the taskbar down below.


Using the neon green template

Settings

Press or tap the start menu in the bottom left corner of the screen to open the settings. Here you can pick the color scheme of the hacking simulator. There's Black and white, Dos, Pascal and neon green options available. Change the font style and size, adjust the size of the windows to fit your monitor. Speed up or slow down the animation, minimize all open windows to the tray or toggle them.

Hot Keys

Press the numbers on your keyboard to show window contents in an alert box in the middle of the screen.


Configure the settings from the Start menu

The Windows

  1. Terminal - When this window is active and a cursor is blinking on the screen the hacker typer is active. Start typing random buttons on your keyboard to add a code to this panel. It will feel and look that you're typing the hacking code.
  2. Directory - An animation that parses through a file system and cracks each folder.
  3. Encryptor - A program is being displayed line by line.
  4. Transfer - Amimated graph showing transfer speed.
  5. Scripts - Shows some random characters and numbers in a table.
  6. Receiver - Shows a distorted ASCII art image. By default it displays a skull but you can try to click the image, because the image might change.
  7. Compiler - Matrix code rain known from the Matrix movie (1999).
  8. Download - Large progress bar with a open folder icon above.
  9. Upload - Malware upload progress bar with skull icon.
  10. Access - Permission Granted text alert with blinking key ASCII art.
  11. Warning 1 - Access denied warning with a blinking sign.
  12. Warning 2 - Top secret sign with a lock icon.
  13. Help - The help screen you're reading right now.

How To Avoid Getting Hacked?

The only way to avoid getting hacked is to never go online. Every program, browser extenstion you have ever installed or website you have ever visited can track your online activity.

Below you will find useful tips to avoid hackers getting access to your usersnames and passwords, email, social media and other online accounts. Go through the checklist below for your peace of mind.

  1. Don't use the same password for more than one account. Especially not your name followed by "1234" or your birthday.
  2. Use secure passwords, not simple words or sequential numbers, containing upper and lowercase letters. Use an online password generator if necessary.
  3. Most systems offer two-step verification and login alerts. This will notify you about suspicios logins and ask you to enter a security code received to your phone or email.
  4. Update apps, operating systems regularly. Some programs might have auto-update setting available.
  5. Free programs are never free. Probably they're just a bait to intall a browser extension or reset your default browser. Always get them from trusted sites.
  6. When installing a software always pick "custom install". Never go with "Recommended settings" because that will probably install unwanted malwares too.
  7. Log off and turn off when you're done. You can also clear browser history.
  8. Save passwords to a computer only if you're the only one having access to the device. Others can reveal them very easily.
  9. Encrypt your files and always use secure (https://) connection.
  10. Windows has its own anti-virus but you can install and activate third parties like Avast, AVG or Avira. Sometimes these can also behave like viruses, especially if running the free version.
  11. Treat emails suspiciously if they're asking for personal data or to log in somewhere. Phishing sites imitate the design of login pages of known sites like Facebook or PayPal and collect your login credentials. Make sure that the URL of the website is matching.
  12. Use alias emails. One for business, one for personal and one to register to all kind of spammy sites. You can set them to forward the messages to your primary email.
  13. Check your privacy settings and make sure everyting is set according to your needs.
  14. Lock your phone with face ID, fingerprint, a secure PIN (not 1234) or a gesture pattern. Be able to wipe clean or track your device if lost or stolen.
  15. Dont's connect to open WiFi hotspots and secure your own at home.
  16. Use a VPN to be able to to send and receive data across shared or public networks as if your computing devices were directly connected to the private network.
  17. If you've been hacked then stay calm and try to connect and reset the passwords and wipe your data ASAP. Alert the relevant people if you can't: the site involved, your bank, or even the police.
  18. Always be suspicious!
NewsflashNorth Korea: The Most Eco-friendly Country NewsflashAnother Actress Steps Forward Accusing Tom Hanks of…