Skip to main content

Posts

Showing posts from March, 2021

How to Hack Your Friends Screen Lock

Password Hacked:        Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it.  You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device. Please follow each steps carefully to get perfect run of this tool : First , open your play store on your android mobile phone and then search  TERMUX  and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection. type pkg update  then hit enter. Now type pkg upgrade  then it will automatically upgrade your envoirment. Then you have to clone this tool in termux, Tool link (LockPh

How to Hack Your Friends Camera

  Camera Phishing:      Hello, Friends, today have tried to tell you an interesting hack about the camera of your friends and impress them with the help of an Amazing tool here no pc or computer is required so we are starting some simple steps which help you to do cam-phishing . First , open your play store on your android mobile phone and then search TERMUX and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute  you have to on your network connection. Write pkg update then it starts executing and after if it gives you the option to check yes or no then type Y else it will automatically execute. Write pkg upgrade then it will execute some functions. Then you have to write  https://github.com/techchipnet/CamPhish.git and after that press enter. then exit you will come out of termux then again open termux and then again write all steps from 3 to 5  press enter . then write

C programming basics - part 1

Data Types: There are two data types in C programming language - (1)- Primary Data Types  (2)- Secondary Data Types   (1)- Primary Data Types :      Primary data types are those data types which are defined already in the           language. They can be used directly in the program. These data types one of the main important thing in C programming.  There are mainly three types primary data types----- a)- int : For integer values range = -32767 to 32768 b)- float : For float values range = c)- char : For character values range = -127 to 128

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou

Why you should start programming with C?

         You must have listened about C programming from many peoples, yes C is a mid level programming language It contains both language features HLL & LLL so it is called mid level language. So today we will talk about some history & uses of this C programming language.     C was developed at AT & T's Bell Laboratories of USA in 1972. It was designed & written by a man Dennis Ritchie & we also call him father modern programming languages. In the late seventies(70s) began to replace the more familiar languages of that time like PL/I, ALGOL, etc. No one pushed C.       Thus without any advertisements C reputation spread & its pool of users grew. Ritchie seems to have been rather surprised that so many programmers preferred C to older languages like FORTRAN or PL/I, or the newer once PASCAL & APL. But that's what happened. Possibly why C seems so popular is because it was reliable, simple & easy to use at that time. WHY YOU SHOULD LEARN C: C is

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than the Low Level Language Progra

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios with dark web it's too complex for a beginner level guy to ge

Know Operating Systems (Briefly)

OPERATING SYSTEM :     Today's lot of operating systems have arrived in the marketplace, but some OS gets failed because of their specifications or trends. Let me tell you what is an Operating System in short " an operating system is just a system software which help us to communicate with a machine using graphical or command line interface."     That's means when someone using his/her smartphone or computer or any type of device that's sure this device has an operating system and there is a proper way to use this device. Every Operating system has its own way or type of using it.    An OS is also making a vital role in the device because there are lot of things in a device which depends on the OS like bluetooth-connectivity, wireless-connections, display and many more things.   WORKING PROCESS :   Basically an OS is a system software so it contains all information about the hardware of this device.    Now it will use this information so it b

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re interacting with an