Category Archives: Computer Tricks

Best Network Packet Injector Tool

T50: Very Fast Network Stress Tool


It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector.

Or you can say that it is a kind of a packet injection free which is generated by Brazilian Nelson Brito who is capable of DoS and DDoS attacks by using the theory of stress testing.


With the help of this tool, you can send a very high number of requests for packets just like that the target will not be capable of gathering all over the requests as well as answer them slowly that’s why the target may fall or may be slow down.

Recently, the T50 is capable of copying the following requests:
  • More than one million(1,000,000) packets per second of SYN Flood i.e; +50% of the network uplink on a network 1000BASE-T which is also known as Gigabit Ethernet.
  • More than 120,000 packets per second of SYN Flood i.e; +60% of the network uplink in a 100BASE-TX(Fast Ethernet).


Whereas the T50 can also send requests for packets of the protocols ICMP, IGMP, UDP and TCP sequence with the difference of microseconds.
GNU General Public License version 2.0 (GPLv2)
  • It supports many network protocols including TCP, UDP, and ICMP
  • It has more than 1,000,000 pps in gigabit networks.
  • It can simulate the attacks of DoS and DDoS



Hack Any WPA2/WEP/WPA Wifi Using Dumpper And Jumpstart [Latest Trick]

Step By Step Guide To Use WinPcap, Dumpper And JumpStart and Get Password:

Download the Dumper File Here

WinPcap: Download here

JumpStart: Download here


NOTE: You need to have Microsoft .NET Framework installed on your computer as well, or this will not work.


Disclaimer: I (The creator of the post has already stated this, but I’d like to go over it again) do not take any responsibility for your actions regarding this tutorial. This was made by the creator to demonstrate weaknesses in wireless networks and for educational purposes only. Breaching other people’s wireless networks without permission is against the law. If you want to test this tutorial, try it on your own home network.


We will be using Dumpper and Jumpstart and other suites to hijack WPA2/WEP/WPA WiFi networks. It’ll let you join without a password, then you can get the password from inside the network. I’ll show you how towards the end of the tutorial. First, download all of the programs above. Now, follow these instructions for setting it up:


Note: Dont STOP the Process. It Takes Several Minutes . Probably 4~5 Hours.(Works Only in Laptops).

Update: We have also Added the Process to Hack Wifi in Desktops Below.


Hack WiFi with Dumpper and Jumpstart:

Download and install JumpStart, WinPcap, and Dumpper

Open Dumpper. It’ll be in Spanish, so go to the far right tab and select ‘English’ in between the other two options.Your programs are set up and ready to go, now begin the process:


  • In the ‘Networks’ tab, select the network adapter you wish to use. Hit the ‘Scan’ button now.
  • After it completes the scan, go over to the ‘Wps’ tab. In the area that says ‘Connect using JumpStart’, hit ‘Browse’ to select the location of where you installed JumpStart in the previous set-up steps. (By default, it installs in C:\Program Files (x86)\Jumpstart. Don’t open it, just select the ‘Jumpstart’ folder and click ‘OK’)
  • In the area ‘Show default pin’, select ‘All networks’ isntead of ‘Only known networks’.
  • Hit the ‘Scan’ button.
  • Select the network you wish to penetrate. Remember the ‘Pin’ corresponding to your network in the scan results, this will be needed for later.
  • In the previous area ‘Connect using Jumpstart’, hit the ‘Start JumpStart’ button.
  • Under ‘What do you want to do?’, select ‘Join a wireless network’ and hit ‘Next’
  • Under ‘Which setup method do you want to use?’, select “Enter the PIN from my access point” and enter the PIN next to your network in the scan section back in the previous scan results.
  • Finally, select the targeted network from before and hit ‘Next’.Now you’re happily connected to that WiFi network you just penetrated. Do you want to see the password so you can get on from other devices without doing this process? Sure! Follow these simple steps:
  • Open the menu where you join WiFi networks/view the network you’re connected to.
  • Right click on the network you just joined and hit ‘Properties’
  • Under the ‘Security’ tab, you can see the password, but it’s just dots. Check the ‘Show characters’ box under it.
  • The password will then reveal itself.



Hacking The Wifi on Desktops?
So Many People are Doing this Hack in their Desktops.But unfortunately Desktops are not compatible for using this Hack.But Don’t worry, Here is the trick to do the same Hacking process in Destops even. You just need to buy the Wireless Adapter and Install it in your desktop.

It is worth the product and it is only last thing you need. After getting the Product Proceed as Above to hack WiFi with Dumpper and Jumpstart.You will not regret it later for buying.

Doubts? Please use the comments section and feel free to ask any question. I will definitely get it solved.



BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.


BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket connections and creates a command-line interface for sending commands to the remote system.

The JavaScript backdoor in BrowserBackdoor can be used on all browsers that support WebSockets.

First clone BrowserBackdoorServer repository from github, to do so type:


Follow the below steps one by one:

cd client

npm install


Now go to the client folder and open index.html file in leafpad and edit the following line now type your kali Linux ip screenshot is given below.

After finishing the above task it will create the Browser backdoor script folder for windows and Linux users


Now type the following command step by step

npm install electron-packager -g

electron-packager . –all


Now go to the server folder in browser-backdoor directory and the following command

Bundle install


After that start browser backdoor by typing in terminal:

ruby bbsconsole.rb

Now send the Brwoserbackdoor-win32-x64 to the victim using any social engineering method when the victim clink on BrowserBackdoor file you can get the victim session example are given below.

Now type the session command to check the active session it will show you the session with id no.

Type the target command with session id to interact with current session sees the following example

Target 0

 Now if you want to more option type the help command you can get the list of all available command


NOTE: This post is only to make people aware of this backdoor i.e. Educational purpose only.



Today we’ll be hacking Facebook profiles active on your local network.
You may think, “How is this useful, nobody but me is using my network.” Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack their precious Facebook profile!



We are going to use a well known method called “The cookie injection method.” This might be far off from becoming “elite”, but you need to get familiar with your Linux distribution first.

Step 1: Get the Right “Stuff”

For this hack, you’ll need a few things. Nothing special, but you’ll need these stuff.

My best suggestion is that you first install BackTrack, Kali Linux, or Bugtraq because they have almost everything we need.

For this little magic trick, we’ll need:

  • A working Linux distribution (preferably Kali, Backtrack or Bugtraq)
  • Wireshark (a packet sniffer)
  • Firefox (web browser)
  • Nmap (scanner)
  • Greasemonkey (addon for Firefox)
  • Cookie injector (script for Greasemonkey)*

Now let’s start doing some magic! :D*

Step 2: Network Scan

First, to actually connect to a target, we’ll need an IP address. In order to get that, you’ll need to do a network scan with Nmap. So go ahead and boot up your terminal and enter the following command:

  • nmap -F 192.168.xx.xx/24

Note: If this doesn’t work, use 10.0.x.x/24 instead.

This command will scan your network for any IP addresses connected to it. The -F gives the console the instruction to use “Fast mode.” If done correctly, you should see something like this:



That’s how your Nmap scan should look like.

Step 3: Starting the “Man-in-the-Middle Attack”

Now we’re going to start a man-in-the-middle attack, MITM for short.

In MITM attack, we spoof our MAC address so that when a server responds, person sends a message to the other, he won’t be receiving that message, but he will receive messages that we send, as we’re the Man in the middle.

This might help you understand:


A man-in-the-middle attack!

Starting the Attack

To start, enter the following command in a NEW terminal window:

  • sudo echo 1 >> /proc/sys/net/ipv4/ip_forward

This will forward your IP address. Now we’re starting the MITM by opening a NEW terminal window and entering this command:

  • sudo arpspoof -i [Interface] -t [target] [default gateway]

If you don’t know your interface and default gateway, start a new terminal and enter: ipconfig.


This is the result form the arpspoof.

Open (once again -_-) a new terminal window and enter the following command:

  • sudo arpspoof -i [interface] -t [default gateway] [target]


Another result from the arpspoof!

Note: After you entered both the arpspoof commands DON’T CLOSE THE TERMINALS.

Step 4: Firefox and Wireshark (Almost Done!)

We need a few more things in order to complete this hack!

First install Firefox, then Greasemonkey and the cookie injector script. Then, install Wireshark, which you can do by entering this command into a terminal window:

  • sudo apt-get install wireshark

After that, open up a Wireshark session (open a terminal and enter sudo Wireshark as command). Select your interface and start capturing. At the top, you should see an input box where you can add filters. Now enter this filter:

  • http.cookie contains DATR

Now you should get a list in Wireshark. Search for a cookie that contains the text GET. Locate it, click on it with the left mouse button, select copy, select bytes, select printable text only.


Wireshark result. The one you need is in the black circle.

Now go to Wireshark and go to Facebook. Make sure you’re NOT logged in. If you are, go to settings and delete all the cookies. Then go back to the Facebook log-in page, press [ALT]+C, and paste the cookie. Press OK and refresh the page.


Here you can clearly see the cookie injector script input box.

If my magic worked, you should see the main Facebook timeline. If not, then you’ve done something wrong.

My Final Comments

This hack may seem advanced, but it’s actually really easy. Once you break down all the steps, it’s a piece of cake! 😀

Now that you’ve done this, it should be clear that Facebook security isn’t very strong 😛

Quick note: This only works if your target is actually browsing through Facebook over http (not https) at the time you’re doing the hack.

Note: All contents are provided for educational purposes only. 

External Links:

HTTP Protocol:
TCP Protocol:
ARP Poisoning:


How to Enforce Secure Password Policy in Windows 7 and 8

We rely on security features like 2- factor authentication to safeguard our online data, but we tend to ignore the password policy of our personal computers (I doubt many know what it is exactly). Your Windows logon password is as important if not more, and hence not paying attention to it won’t be a wise thing to do.


It’s not that Windows doesn’t provide the option to make password policy better; it’s just that most of us are not aware of the feature. We set passwords at our convenience and then forget to change it on a timely basis.

So let me show you all the password policies that you can apply in Windows 7 and 8 to increase your computer’s security. We will also try to understand what these policies mean and how they work.

Enforcing Secure Password Policy

Open Start Menu and type in Local Security Policy to search and open it. When the Window opens up, navigate to Security Settings –> Account Policies –> Password Policy. Here you will see all the password rules that you can enforce on all the accounts that are configured on the system.


So let’s have a look what each of these policies means and how to configure them.

Enforce Password history

This particular module will keep an eye on the password that you use on your computer and store them in the history. Now when you change your password the next time, it will prompt you if you are using any of your old passwords and compel you to use a new one. Windows can record last 24 passwords, but it’s ideal to set it for last 8 passwords. To set the value, open the policy and set the value between 0 and 24.

Maximum Password Age

This particular policy will determine as to how many days you can use a password before you are forced to change it. The maximum password age can be set between 1 to 999 days. So when the user forgets to change the password in that particular time period, the system will enforce the user to change the password.


To disable the policy, simply change the value to 0 and the user’s password would never expire.

Minimum Password Age

This policy enforces the minimum number of days a user has to use a password before he can reset it. Ideally the value should not be more than 1 day, but just like the Maximum Password Age, it can be set to a number between 1 and 999 days. However, make sure that the value is less than the maximum password value.

Minimum Password Length

As the name implies, this policy makes sure that the password used by the users is of an ideal length. The ideal length of a password should be at least 8 characters but it can be any value between 1 and 14.

Password Must Meet Complexity Requirements

This is one of the most important parameters you must configure if you want the user to set a secure password that can be difficult to bypass.


If this policy is enabled, passwords must meet the following minimum requirements:

  • Not contain the user’s account name or parts of the user’s full name that exceed two consecutive characters
  • Be at least six characters in length
  • Contain characters from three of the following four categories:
  • English uppercase characters (A through Z)
  • English lowercase characters (a through z)
  • Base 10 digits (0 through 9)
  • Non-alphabetic characters (for example, !, $, #, %)
  • Complexity requirements are enforced when passwords are changed or created.

Store Password Using Reversible Encryption

This security setting determines whether the operating system stores passwords using reversible encryption. I don’t know much about the technical details related to the policy but the bottom line is that it will encrypt the password when it’s stored on the system.


So these were the 6 policies that you can enable on your Windows system to make sure that secured password policies are applied and your data remains safe from unauthorized access.

These policies might not be that useful for a normal end user, but if you are running a small business and use Windows PCs in your office then it is important that you as an admin must enable this for all the users.

How to host website on your own PC

Your website using your own home PC , hosting form your PC will give you little bit experience of how hosting services work.You can try it for small website or personal work.To run your PC as server there are lot of software but top most popular is WAMP server and XAMP server.Here i’m using WAMP server.


Why you should use your PC for hosting???

  • Free of cost
  • Total over control in your hand
  • You can use it for fun(for experiments).

Why you should not use your PC for hosting???

  • Hosting means your PC is running 24×7 non-stop.If somehow your PC is shutdown or powered off then your website is offline from all over internet.
  • Running your PC 24×7 for website is not a good idea.
  • If your PC got corrupted then your website will too.
  • There is no surety that your ISP will providing 24×7 internet without disconnection and same applicable for power .

So,Let’s start our hosting :

Here I’m using WAMP server , you can download latest version form here.and install it.after then add the security exception for Apache in Windows Firewall.

Now after installation :

  1. Go to your browser and type localhost .Just only to make sure that you properly install and configured WAMP.(If localhost opens WAMP homepage in your browser it means you are ready to rock with your PC).
  2. Now click on WAMP icon placed in taskbar like this and then click on www directory.   d2
  3. Copy your website content and pages in www directory.Example :I made a webpage and copied it in www directory.
  4. Now go back to your browser and type localhost/mywebsite (replace mywebsite with your website page)in URL bar.You see your website like this :


Congrats your website is up and running.

But this is only works on LAN .If you want to host it on WAN then you need a static ip(i.e. A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet.).Use your IP in URL bar instead of localhost then it will works on WAN means you can access your website anywhere in the world.

Troubleshooting :

  • Make sure you installed WAMP correctly
  • If you are unable to see localhost page then just turn off your firewall and then try.
  • If your website is not responding then please double check URL (discussed in step 4)

Also Read: How to Host a Folder as an FTP Server on Windows

If this post helps you in anyway then please show your support by liking us

How to Easily Take Ownership of Any File or Folder on Windows

If you have to work in a shared system environment you might be aware of the fact that taking ownership of a file or a folder on Windows can be a complicated chore. Even the seemingly simple task of adding URLs to a Windows Host file requires the user to become an owner of the file by going into the file security settings and acquiring full access permissions to work on it. Having so many steps to complete, even when you have an admin account can be a bit frustrating.


If it’s just one file, making a change might not be too time consuming, but if you do this on a regular basis, then use this simple tool called TakeOwnershipPro to easily deal with file ownership issues.

TakeOwnershipPro for Windows

TakeOwnershipPro is a free, lightweight program that makes the process of gaining file ownership take not more than a mouse click. To get started, you can download the setup file and install it on your system. The installer is clean, with no third-party apps attached, so you can simply follow the onscreen instructions to complete the installation.

Now if you need to take ownership of any folder, launch TakeOwnershipPro, click the Add button to choose the folder or file of which you want to take ownership, or simply drag and drop the file from Windows Explorer.



Now all you need to do is click Take Ownership and wait for the tool to do its magic. Don’t forget to check the option Include subfolders and files if you wish to take ownership of everything that’s in the folder you selected.

The tool also adds itself to the Windows right-click context menu, so you can simply right click on a file or a folder to take ownership. If the User Account Control dialog box appears, click Yes to allow TakeOwnershipPro to run and make changes.



How the Tool Works

The tool simply automates the task of taking ownership of a file through its folder security settings, but most everyday Windows users are unaware of what this means. TakeOwnershipPro adds ‘Everyone’ as an owner and gives full control of that particular folder to the user.



If you wish to delete the complete ownership of the file, all you have to do is go into the Advanced Security Settings and delete the Everyone permission that has been added by TakeOwnershipPro


That was how you can easily take ownership of any file or folder. The app works on Windows 7 and above and is free to use without any limitations. So next time you get a message from Windows saying you don’t have permission to access a particular file or folder, all you need to do is use TakeOwnershipPro and show Windows who’s boss.

Feel free to ask for any further help in comments….

3 Ways to Remotely Control YouTube on PC from Your Android Device

Maybe you’re sick or tired working all day. At the end of the day, you need something for entertainment. Something that cheers you up for the next day. For me, my entertainment centre is YouTube. It fulfils my two basic entertainment necessities. First is cool music and, of course, second is dope videos. So, at the end of the day, I watch YouTube on my PC by remotely controlling it while I lie on my bed.


So, here I’ll show you 3 ways to remotely control YouTube on PC from your Android device.

1. Control from YouTube App

If you’ve got a smart TV you’ll probably be knowing about Well, this link also works for PC browsers. And the best thing is that it works same as that on TV. The process is same as you do on your smart TV. I’ll show a walk-through for PC.

Go to the link in your browser on PC and hit sign in from the sidebar menu. You’ll get the following pop-up.


Now, go to Choose your account and enter the code you got in the previous screen. Now, go to settings in /tv and hit pair device. You’ll get a 12 digit code. Now, open the YouTube Android app. Go to Settings > Connected TVs > Add a TV.

After adding the code, the device will be paired. You’ll get the chromecast icon in the menu bar. Now tap on it and it will let you choose the TV you want to connect to. Make sure that is running in your web browser on PC.

Next you just have to search or play a YouTube video. You can make a queue or directly play the video. The video will start playing on The video will not be played in the YouTube app. You’ll just see the cover image of the video.

You can handle everything from your YouTube app. Increasing the volume in the app will increase the volume on your PC. A tiny tip: Keep the browser in full-screen mode (F11) for a TV-like experience.


2. Unified Remote

Unified Remote is the most popular Android app to remotely control PC. With Unified Remote, you can control everything on PC. But, focusing hear on YouTube. You get special remote for YouTube (Web). This remote is only available in the Full version of Unified remote, which you need to buy. It has got all basic inputs and of course, you can control it via cursor if you don’t want to buy.


Press the play button in the toolbar at the bottom. It will directly open in your browser.

3. Control YouTube via VLC Media Player

VLC media player is considered as swiss army knife of media players. And it definitely can run YouTube videos. It simple as pressing Ctrl + N, entering youtube URL and hitting play. There you have your Youtube video running. Here’s a quick guide for saving online videos without any tools.

The best advantage of playing Youtube on VLC is that you can apply all VLC features on the video and best of all “no ads”. Other than that you can remotely control it via VLC Remote Android app.

Before doing so, you need to set the Http lua password in VLC media player on PC. For doing so go to Tools > Preferences. Select All settings at the bottom. Now select Main Interface > Lua from the sidebar. Under Lua HTTP, enter a password of your choice. This same password you’ll also need to enter in the VLC remote app on your phone.


Now, download VLC Remote and VLC Support Helper. Make sure your PC and android device are on the same Wi-Fi connection. Install VLC remote on your Android device. Next, install VLC support helper and open it. You only have to press one button Setup VLC. That’s it. Windows firewall will ask for permission to give Internet access to VLC media player. Hit Allow.

Now, you should see your device in VLC Remote in Found Computers section. Tap on it and enter the password you added previously in VLC media player on your PC. Hit Ok and your device is connected with VLC on PC. Now, controlling VLC on PC is very simple.

Tap on your recently added computer. Go to Browse tab and tap on the YouTube icon. Now search and play any video. In the next screen, while playing the video, hit the play button in the bottom-right corner. This will send a trigger to VLC on PC to play the particular YouTube video.

You can fully control the video from VLC remote under Control Section. The Advanced tab has the core features of VLC media player for you to use.

How Will You Remotely Control YouTube?

I’m a geek that likes to remotely control things. I’d use the first way. Let us know in our forum which method would be the best for you. Also, are there any other methods or hacks you might have used? We’d like to hear.

How to Setup SSH Tunneling to Bypass a Firewall

Today, data breaches, hacking and snooping are happening frequently. Not a day goes by without news of a company’s database getting leaked or some government censoring or controlling more part of the internet. And there is always a Nigerian prince wanting your help to free his million dollar assets.

To protect your identity and other sensitive information from all these, you need to secure your browsing, especially when using a public WiFi network. The ideal solution is using a VPN which we have already covered on several instances.


But what if you are behind office, library or school firewall? While VPN will work (sometimes) but the services are paid and the free ones have dark sides. SSH tunnelling is one of the alternative to this which enables you to bypass a restrictive firewall without getting caught.

What is SSH Tunneling?

SSH tunnelling is a somewhat like VPN. In VPN, you connect to a VPN server and all your traffic is encrypted and gets routed through that server. The premise is same but instead of  a VPN server you have your home PC or router, acting as a server, for traffic routing and it takes few more steps to setup.


For readers who like technical details, the client side computer will connect to an SSH server through port 22. Most firewalls allow communication over port 22, as it is the port used by HTTPS and cannot decipher what is being transmitted over the HTTPS connection as it’s encrypted. Also, SSH also uses the same port so most firewalls allow it. I say most because some really good ones can still catch it, for which, read the cautionary  below.


A Word of Caution
Before you starting poking in network settings at your workplace, do review its policy regarding this. Depending on the company, you will, at most, get a warning or worst get fired from a job. Moreover, if you work in company involving sensitive work like a government department or bank or nuclear power station, it is wise not to do this as it may lead to compromised security, leading to some of the aforementioned hacks. If an IT admin decides to inspect, he or she will only see traffic flowing via port 22 to and from your PC but will not be able to see what the traffic is due to encryption. So if you get caught and get rebuked for trying this, no fingers should be pointed at us.
Moreover, it’s not guaranteed that this method will penetrate all firewalls. Most firewalls allow this because they can’t differentiate between an SSH &  HTTPS packet. But a really sophisticated firewall will even sniff this out and block the connection.


The Server Side: FreeSSHD

In a VPN connection, you connect to a VPN server, in the same way in SSH tunnelling you need an SSH server. There are free SSH servers available but as our main concern here is security, it’s not wise to trust an unknown entity with your data. So we will be setting up a server on the home PC. Hosting an SSH server doesn’t require powerful guts so any old or low-cost PC is good enough for the job. FreeSSHD, a free app that is used. Let’s set it up.

Step 1: Download and install FreeSSHD. At the end of the installation, select Yes for Private Keys and select No for Do you want to run FreeSSHd as a system service.

Step 2: Open FreeSSHD and open the settings window by double clicking the icon in the taskbar. There should be a green tick indicating SSH server is running.


Step 3: Click the Users tab > Add to add a new user. In the newly opened window, enter the username of your choice. In Password, select Password stored as SHA1 hash from the drop down menu and enter a password of your liking. Tick the check boxes for Shell &Tunneling.


Step 4: In Encryption tab select AES(128,192 and 256 bits) option then click the SSH andTunneling tabs and modify the options as per the images below.


Settings for SSH tab


Settings for Tunneling Tab

The Client Side: PuTTY

To connect to the SSH server, a client app is required. For that, we will be using the awesome and free PuTTY client app. It’s simple and doesn’t require installation, perfect for work PCs which usually don’t let you install programs.

Download and open PuTTY. In the Host Name enter the IP address or hostname of the PC on which SSH server is running, select SSH under Protocol and click on Open. A black window will appear asking you to enter the username. This means the connection to the SSH server is successful. Enter the username you set in Step 3 followed by the password (which will not appear as you type).


If you get connection refused or connection timed out error, follow the next steps to allow the port in Windows firewall.

Open the Windows firewall (on the FreeSSHD server PC) and go Advanced Settings. In the Advanced Settings window click on Inbound Rules > New Rule. Now follow the steps as per the screenshots below.


Select Port for the type of rule.


Select TCP and enter 22 for port number.


Select Allow the connection.

b12Tick all the three options.

If you still get a connection error, try to ping your SSH server from CMD. If you get a request timed out message then most probably the firewall is tightly secured and, unfortunately, you can’t do anything.

Opera Browser now offer free and unlimited VPN Service


Unlike several other free VPN services, Opera’s built-in free VPN service will offer you unlimited data usage as well. You just have to turn on a virtual switch in the Settings menu to enable the feature.

So you required to install no third-party extensions, pay no monthly fee as well as set no limit on data usage.

Opera’s Free VPN service uses 256-bit encryption to hide all your connection details and replaces your IP address with a virtual one, making it difficult for the government or anyone to trace your location, identify your computer or block content they do not want you to see.

How to Try Opera’s Free VPN

To give Opera’s Free VPN a try, install the latest developer version of Opera for Windows and Mac, look for the ‘Privacy & Security’ tab and toggle this feature ON.

Since Operas Free VPN service is available in the latest developer version of Opera, the service lets you switch between three virtual locations: The United States, Canada, and Germany.

However, the company says it will add more countries in the stable version of its browser.
Enjoy 🙂