Skip to main content

Posts

Showing posts from 2017

Keyboards shortcuts

Keyboard shortcuts make our life very easy, but many seem to care less about them. In this article we will see the basic keyboard shortcuts everyone should know. SHORTCUT KEYSDESCRIPTION Alt + F File menu options in current program. Alt + E Edit options in current program Alt + Tab Switch between open programs F1 Universal Help in almost every Windows program .F2 Rename a selected file F5 Refresh the current program windowCtrl + N Create a new, blank document in some software programs Ctrl + O Open a file in current software program Ctrl + A Select all text .Ctrl + B Change selected text to be Bold Ctrl + I Change selected text to be in Italics Ctrl + U Change selected text to be Underlined Ctrl + F Open find window for current document or window./ Search. Ctrl + S Save current document file .Ctrl + X Cut selected item. Shift + Del Cut selected item. Ctrl + C Copy selected item. Ctrl + Ins Copy selected item Ctrl + V Paste Shift + InsPaste Ctrl

Points on hacking

So after a long time these are the  common terms used in the hacker community. These definitions are a must to a wanna be ethical hacker and helps a lot for a programming enthusiast. Common Terms Of Hacking World: 1#DDoS:  DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack. 2# VPS:  It stands for  V irtual  p rivate  s erver (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS. 3# SE:  Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. 4# HTT

How To Bait and Catch The Anonymous Person Harassing You On The Internet

Ready for some pretty creepy statistics? 53% of online harassment is committed by someone with prior relationship with the abused. 70% of reported incidents of stalking in the UK had an online component. Here’s the  bad news:  If someone is really determined to find you, it’s not difficult for them to track you down. And to make matters worse, Facebook hasn’t made it easy for its users to protect themselves. The good news?  We can tell you how to change this to protect yourself and keep your Facebook private. There are  many ways  someone can track you down and the chances and ease of this happening will depend heavily on your personal circumstances and that of your abuser/stalker. Keep reading to find out 4 ways someone can track you on Facebook, how easy it is, and most importantly, what you can do about it. 1. Status Updates & Public Profile How They Can Find You You would be surprised how much of your profile is public. Most Facebook users aren’t completel

Learn Computer Science And Programming With Google’s New Education Website

Google has launched a new computer science education website that acts as the ultimate place for getting in touch with Google’s effort in this field. Go ahead, check out Google’s new CS EDU website. today, we are going to tell you about Google’s latest effort to promote computer science and programming. Google has just launched a new  Google Education website  that is basically a collection of different programming tools and other basic resources for you and your kid. This one-stop place for learning includes some well-known learning programs like Google’s Made with Code, igniteCS and CS First. Apart from learning computer science, you can also use this portal to explore scholarships by visiting the ‘Participate in Academic Opportunities’ page. You can also explore multiple Google contests and internships by clicking on the ‘Access Career Opportunities’ link. We all know that learning computer science is a way to explore opportunities and implement your innovative ideas. With th

How to enable USB authentication in facebook.

Facebook has added support for USB  key two-factor authentication  to improve account security. Here are the steps to enable USB key authentication on your Facebook account: Step 1:  Go to the Security settings page and expand the Logins Approval section. Step 2:  In the Security Keys section, click the Add Key link and the Add Key button in the dialog that appears. Step 3:  When the prompt appears, plug in your USB key and tap its button when its light starts blinking. Step 4:  Once your key has been added, you’ll be prompted to re-enter your password to confirm the addition and to select a name to represent the physical key. Step 5:  When the process is completed, your newly added key will be visible under the Security Keys section. If you’re not used to physical authentication keys, here are a few good practices: Have backups keys:  Just like everything else that fits in your pocket, keys can get lost (or possibly stolen). Therefore, you should have backup keys. Facebook

Linux AIO multiple linux flavours in one

Linux AIO is a multiboot ISO carrying different flavors of a single Linux distribution and eases you from the pain of keeping different bootable USBs. The latest Linux AIO Ubuntu 16.10 is now available for download in both 64-bit and 32-bit versions. It features various Ubuntu flavors including Ubuntu GNOME, Kubuntu, Lubuntu, Ubuntu MATE, and Xubuntu. Ubuntu is the most popular derivative of the Debian Linux distribution. And as you might be already knowing, it comes in many flavors. These flavors sport the same Ubuntu base system but have different desktop environments. Normally, you just download and install the basic one with Unity desktop, but the other flavors featuring desktop environments like KDE, GNOME, Xfce, MATE, etc., are also worth trying. It would be troublesome if you were to download the ISO for different flavors. Well, you can do so, and you can even create a  multiboot USB  which is a single bootable USB or DVD carrying more than one Linux distribution. Alternative

How to recover corrupted pen drivr or sdcard using cmd or explorer

In this article, I am going to tell you about various methods which will help you to repair your corrupted SD card or Pen drive. Very often we face this problem of a corrupted storage device and this guide will surely answer all your questions. Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason the files on it can’t be

How to secure your social media accounts

How To  Secure Your All Social Media Accounts  From Hackers? Social Media is a tool in every single person’s hand to share his/her feeling and idea to the world. But if your  social media account will hacked?  Then  where to go?  How to recover that account? And mostly asked Question is How To secure social media accounts Like Facebook, Gmail, Twitter and Instagram from hackers .So in this post i’ll tell you how to secure social media accounts from hackers.So in this article i’ll show you which methods hackers use to hack your accounts. How Hackers Hack Your Facebook/Gmail/Twitter Accounts.   #1. Phishing. Phishing is a Most common method used for hacking like  facebook hacking . mostly readers don’t have a single knowledge about that  What Is Phishing?  phishing is trick to make a fake login page of any social media site like facebook or gmail or any other. as the hacker send you the fake login page of social sites in your gmail or in anyother site. as you enter your “ Email Addre

Create un deletable and unnamed folder

Just create a folder using a trick, put your some files and sub folders within the created folder, but what’s Next? No one can Delete/Rename that folder, untill or unless you command that folder to detele or rename. If you are one of those, seeking fun with friends then this trick is the correct choice to have fun with your friends, however this trick is not only for fun but also you can protect your valuable data, there are many such situation occur at the time of using your own computer i.e, deleted all the folder and by mistakely you deleted your valuable files, which hurts alot. To know the trick to protect your valuable files then just follow the below steps that how can you create a folder that cannot be deleted or renamed. Step starts from  CMD  as  Command Prompt  from your computer, get the details instruction from the below steps. Step1 .  Open  CMD  as  Command Prompt . (Go to  Start  and type CMD) Command Prompt Note:  After this step make sure that you will not selec

Get started with kali linux

This post is for so many of the people in the community asking for and having problems installing Kali Linux. Here is a guide to getting started with Kali Linux. First of all, there are two ways to install and use Kali Linux, a complete installation, or in some Virtual Box like  VMware  or  Virtual box . You can download VMware or Virtual Box by clicking on their respective names. I personally prefer Virtual Box because it has almost all the features of VMware and is a freeware (OMFG ITS FREE!). And download Kali from here. There is only difference of a few steps; that will be added for Virtual Machine users. So, I’m just going to demonstrate for Virtual Box users. Now a very important step, you have to enable visualization from your BIOS. This is different for all motherboards, so Google how to do it for your specific motherboard. Then just follow the screenshots below. Now that you have Virtual Box and Kali Linux, it’s time to get things going. Open Virtual Box, it’ll look someth