Skip to main content

Posts

Showing posts from January, 2017

How to enable USB authentication in facebook.

Facebook has added support for USB  key two-factor authentication  to improve account security. Here are the steps to enable USB key authentication on your Facebook account: Step 1:  Go to the Security settings page and expand the Logins Approval section. Step 2:  In the Security Keys section, click the Add Key link and the Add Key button in the dialog that appears. Step 3:  When the prompt appears, plug in your USB key and tap its button when its light starts blinking. Step 4:  Once your key has been added, you’ll be prompted to re-enter your password to confirm the addition and to select a name to represent the physical key. Step 5:  When the process is completed, your newly added key will be visible under the Security Keys section. If you’re not used to physical authentication keys, here are a few good practices: Have backups keys:  Just like everything else that fits in your pocket, keys can get lost (or possibly stolen). Therefore, you should have backup keys. Facebook

Linux AIO multiple linux flavours in one

Linux AIO is a multiboot ISO carrying different flavors of a single Linux distribution and eases you from the pain of keeping different bootable USBs. The latest Linux AIO Ubuntu 16.10 is now available for download in both 64-bit and 32-bit versions. It features various Ubuntu flavors including Ubuntu GNOME, Kubuntu, Lubuntu, Ubuntu MATE, and Xubuntu. Ubuntu is the most popular derivative of the Debian Linux distribution. And as you might be already knowing, it comes in many flavors. These flavors sport the same Ubuntu base system but have different desktop environments. Normally, you just download and install the basic one with Unity desktop, but the other flavors featuring desktop environments like KDE, GNOME, Xfce, MATE, etc., are also worth trying. It would be troublesome if you were to download the ISO for different flavors. Well, you can do so, and you can even create a  multiboot USB  which is a single bootable USB or DVD carrying more than one Linux distribution. Alternative

How to recover corrupted pen drivr or sdcard using cmd or explorer

In this article, I am going to tell you about various methods which will help you to repair your corrupted SD card or Pen drive. Very often we face this problem of a corrupted storage device and this guide will surely answer all your questions. Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason the files on it can’t be

How to secure your social media accounts

How To  Secure Your All Social Media Accounts  From Hackers? Social Media is a tool in every single person’s hand to share his/her feeling and idea to the world. But if your  social media account will hacked?  Then  where to go?  How to recover that account? And mostly asked Question is How To secure social media accounts Like Facebook, Gmail, Twitter and Instagram from hackers .So in this post i’ll tell you how to secure social media accounts from hackers.So in this article i’ll show you which methods hackers use to hack your accounts. How Hackers Hack Your Facebook/Gmail/Twitter Accounts.   #1. Phishing. Phishing is a Most common method used for hacking like  facebook hacking . mostly readers don’t have a single knowledge about that  What Is Phishing?  phishing is trick to make a fake login page of any social media site like facebook or gmail or any other. as the hacker send you the fake login page of social sites in your gmail or in anyother site. as you enter your “ Email Addre

Create un deletable and unnamed folder

Just create a folder using a trick, put your some files and sub folders within the created folder, but what’s Next? No one can Delete/Rename that folder, untill or unless you command that folder to detele or rename. If you are one of those, seeking fun with friends then this trick is the correct choice to have fun with your friends, however this trick is not only for fun but also you can protect your valuable data, there are many such situation occur at the time of using your own computer i.e, deleted all the folder and by mistakely you deleted your valuable files, which hurts alot. To know the trick to protect your valuable files then just follow the below steps that how can you create a folder that cannot be deleted or renamed. Step starts from  CMD  as  Command Prompt  from your computer, get the details instruction from the below steps. Step1 .  Open  CMD  as  Command Prompt . (Go to  Start  and type CMD) Command Prompt Note:  After this step make sure that you will not selec

Get started with kali linux

This post is for so many of the people in the community asking for and having problems installing Kali Linux. Here is a guide to getting started with Kali Linux. First of all, there are two ways to install and use Kali Linux, a complete installation, or in some Virtual Box like  VMware  or  Virtual box . You can download VMware or Virtual Box by clicking on their respective names. I personally prefer Virtual Box because it has almost all the features of VMware and is a freeware (OMFG ITS FREE!). And download Kali from here. There is only difference of a few steps; that will be added for Virtual Machine users. So, I’m just going to demonstrate for Virtual Box users. Now a very important step, you have to enable visualization from your BIOS. This is different for all motherboards, so Google how to do it for your specific motherboard. Then just follow the screenshots below. Now that you have Virtual Box and Kali Linux, it’s time to get things going. Open Virtual Box, it’ll look someth