Wednesday 31 January 2018

How to Setup Your Own Personal Cloud Storage By Britec09

Harry


How to Setup Your Own Personal Cloud Storage By Britec09.

If You Want To Setup You Own Cloud Storage Media Server For Your Friends And Family Then This Is The Video For You. Britec09 Show You Step By Step Guide On How To Setup Your Raspberry Pi 3 With Open Media Vault On Raspberry Pi 3.

OpenMediaVault :-  https://www.openmediavault.org/ 

SD Memory Card Formatter :- https://goo.gl/hxtjB 

Etcher :- https://etcher.io/


SHARE BY GK

Vivo X20 Plus UD In Display Fingerprint Sensor

Harry

Vivo ने लॉन्च किया दुनिया का पहला इन-डिस्प्ले फिंगरप्रिंट सेंसर वाला स्मार्टफोन, कीमत जाने

आखिरकार लंबे वक्त से दुनिया कि सुर्खियो मे रहा दुनिया का पहला इन-डिस्प्ले सेंसर इंटिग्रेटेड स्मार्टफोन चीन मे लॉन्च हुआ. Vivo X20 Plus UD ने अपने इस स्मार्टफोन मे स्नैपटिक क्लियर ID 9500 ऑप्टिकल अंडर डिस्प्ले फिंगरप्रिंट सेंसर का इस्तेमाल किया है. इस स्मार्टफोन को विवो और स्नेप्टिक की साझेदारी के साथ मिलकर इसे लॉन्च किया गया है. आपको बता दे कि स्नेप्टिक अमेरिका कि सेंसर बनाने वाली कंपनी है. फिलहाल इस स्मार्टफोन को चीन मे लॉन्च किया गया है.

क्या होगी इसकी कीमत: Vivo X20 Plus UD कि कीमत कि बात करे तो चीन मे इस स्मार्टफोन कि शुरुआती कीमत CNY 3,598 (लगभग 36,100 रुपये) है. और ये स्मार्टफोन चीन मे 1 फरवरी से इसकी बिक्री शुरु हो जाएगी.

वीवो X20 प्लस UD स्पेसिफिकेशन:

विवो के इस फिंगरप्रिंट सेंसर वाले डिस्प्ले मे 6.43 इंच की बड़ी फुल एचडी स्क्रीन दी गई है.इस स्मार्टफोन मे आपको 2.2GHz का स्नैपड्रैगन 660 प्रोसेसर मिल जाएगा.इसके स्टोरेज की बात करे तो इसमे 4GB रैम के साथ 128GB कि इंटरनल मेमोरी क्षमता दी गई है.कैमरे सेशन कि बात करे तो 12 मेगापिक्सल का डुअल कैमरा सेटअप दिया है. और फ्रंट के लिए इसमे भी 12 मेगापिक्सल का कैमरा मौजूद है.पॉवर के लिए 3,905mAh की बैटरी दी गई है.

आपको हमारे दवारा दी गई खबर कैसी लगी, अपनी राय हमारे कमेंट बॉक्स जरुर दे. हमे आपके साथ कि जरुरत है. धन्यवाद

Tuesday 30 January 2018

TYBCOM Financial Accounts Sem 6 Course By Graduate Guru

Harry

In This Videos Playlist We Come Towards The Concluding Sessions Of The Financial Accounting Subject, Where Burhan Sir Teaches The Concept Of Valuation Of Goodwill, Valuation Of Shares, Profit Prior To Incorporation, Buyback Of Equity Shares Foreign Currency Transactions & Etc. The Importance of Financial Accounting in Our Life. Make Learning Theory & Particle Subjects. Financial Accounting Simpler and Interesting With Our Best. (Mumbai University Pattern).


1. TYBCOM - Financial Accounts - Valuation of Goodwill By Graduate Guru.




2. TYBCOM - Financial Accounts - Valuation of Shares By Graduate Guru.




3. TYBCOM-Financial Accounts Profit Prior to Incorporation By Graduate Guru.




4. TYBCOM - Financial Accounts BuyBack of Equity Shares By Graduate Guru.




5. TYBCOM - Financial Accounts Foreign Currency Transactions By Graduate Guru.




SHARE BY GK

WOL-E | Wake On LAN Tool Suite on Kali Linux 2017.3 By SSTec Tutorials

Harry


WOL-E | Wake On LAN Tool Suite on Kali Linux 2017.3 By SSTec Tutorials.

WOL-E Is A Suite of Tools for the Wake on LAN Feature of Network Attached Computers; This Is Now Enabled By Default on Many Apple Computers. Basically This Tool Use to Wake Up Any Clients Device on Your LAN Network Remotely & Also This Tool Use To Detect Apple Clients Or Device On Your LAN Network.

Also This Suite Has Many Features Like:
  • Wake up Clients
  • WOL Attempts on the Network and Saving Them to Disk
  • Sniffing WOL Credentials on the Network and Saving Them to Disk
  • Waking Up Single Clients
  • Scanning For Apple Devices on the Network for WOL Enabling
  • Sending Bulk WOL Requests to All Detected Apple Clients

Sunday 28 January 2018

Step by step Chain Core Installation

Harry
Chain Core is enterprise-grade blockchain infrastructure that enables organizations to build better financial services from the ground up. The Chain Protocol defines how assets are issued, transferred, and controlled on a blockchain network. It allows a single entity or a group of organizations to operate a network, supports the coexistence of multiple types of assets, and is interoperable with other independent networks. Issue and transfer financial assets on permissioned blockchain infrastructure.

Using Chain Core, institutions can launch and operate a blockchain network, or connect to a growing list of other networks that are transforming how assets move around the world. The Chain Protocol defines how assets are issued, transferred, and controlled on a blockchain network. It allows a single entity or a group of organizations to operate a network, supports the coexistence of multiple types of assets, and is interoperable with other independent networks.

Advantages:
  • Fast & performant
  • Scalable & available
  • Connectable & extensible
Designed for developers with following feature:
  • Developer dashboard
  • Intelligent queries
  • Multi-language support




Environment:

  • OS: CentOS Linux release 7.4.1708
  • Memory: 2G
  • HDD: 120G
  • Platform: x86_64

Dependent packages:
  • golang.x86_64
  • postgresql.x86_64(version 9.6 or greater)
  • postgresql-server.x86_64 (version 9.6 or greater)
  • cmake.x86_64 
  • protoc-3.5.1-linux-x86_64.zip
  • git.x86_64

Install  golang, cmake and git with yum command
yum -y install golang cmake git



Make sure postgresql 9.6 or higher is available in default yum repository. If they are not available visit URL https://www.postgresql.org/download/linux/redhat/
Once you open the URL select appropriate options and execute the yum command listed on the page.



Install new repo for postgresql-9.6
yum install https://download.postgresql.org/pub/repos/yum/9.6/redhat/rhel-7-x86_64/pgdg-centos96-9.6-3.noarch.rpm



Install the client packages:
yum install postgresql96


Install the server packages:
yum install postgresql96-server



After installation is finished. Initialize postgresql database and enable postgresql at startup with command below
/usr/pgsql-9.6/bin/postgresql96-setup initdb
systemctl enable postgresql-9.6
systemctl start postgresql-9.6



Download protoc package from the URL below
cd /usr/local/src/
wget https://github.com/google/protobuf/releases/download/v3.2.0/protoc-3.2.0-linux-x86_64.zip


Unzip the downloaded compressed file with command below
unzip protoc-3.2.0-linux-x86_64.zip



Copy binary from bin directory to /usr/local/bin and content of include to /usr/local/include/
cp bin/* /usr/local/bin/
cp -r include/* /usr/local/include/



Make directory for chain source and export it as CHAIN environment variable.
cd /opt
mkdir chain
export CHAIN=/opt/chain/



git clone chain repo.
git clone git://github.com/chain/chain $CHAIN



Create chain owner OS user
useradd chain
passwd chain


Configure Postgresql database

Create chain postgresql database user
create user chain with createdb password 'AL********V$';
Create chain and core database
create database chain;
create database core;


Change owner of core, chain database as chain.
alter database chain owner to chain;
alter database core owner to chain;
Verify the change with \l command



Modify pg_hba.conf file with vi editor
vi /var/lib/pgsql/9.6/data/pg_hba.conf  

Permit user chain to access chain, core database without password.
OLD VALUES:
host    all             all             127.0.0.1/32            ident
host    all             all             ::1/128                 ident

NEW VALUES:
host    chain,core       chain           127.0.0.1/32            trust
host    chain,core       chain           ::1/128                 trust

Before:

After:

Once you modify restart postgresql server
systemctl restart postgresql-9.6


Enter chain source directory and build cored and corectl with command below
cd /opt/chain/
./bin/build-cored-release chain-core-server-1.2.0 .


Change ownership of chain source directory to chain owner.
chown -R chain:chain /opt/chain 


Switch user as chain ans start cored process
su - chain
cd /opt/chain
./cored


Create token with command below. Example below creates token for dillidba tokenname. You can use any name for tokenname.
su - chain
cd /opt/chain/
./corectl create-token dillidba



Configure and allow default port 1999 to access chain core.
firewall-cmd --get-active-zone
firewall-cmd --zone=public --add-port=1999/tcp --permanent
firewall-cmd --reload




Open http://IPaddress:1999 port to access chain core.
http://192.168.100.104:1999



Landing page will be for the token login.



Type token login created above and click on Log In.



Now you will have 3 option.
  • Create New blockchain network
  • Join existing blockchain network
  • Join the Chain testnet



If we Clicked on Create new blockchain network then following 5-minute tutorial will be displayed. We have option to skip or go with the tutorial.



If we skip the tutorial and following is the page to create new Account, Assests and Transactions.




Saturday 27 January 2018

Python For Ethical Hacking By HackerSploit

Harry



Python For Ethical Hacking By HackerSploit.

In This Video Series Hacker Sploit Teaching You How To Use Python To Create Network Tools And Ethical Hacking Scripts. This Series Will Take You From Beginner To Intermediate/Advanced In Python.

Python Is An Interpreted High-Level Programming Language For General-Purpose Programming. Created By Guido Van Rossum And First Released In 1991, Python Has A Design Philosophy That Emphasizes Code Readability, And A Syntax That Allows Programmers To Express Concepts In Fewer Lines Of Code, Notably Using Significant White Space. It Provides Constructs That Enable Clear Programming On both Small and Large Scales... Read More


SHARE BY GK

Friday 26 January 2018

Generating A PHP Backdoor with Weevely - Post Exploitation By HackerSploit

Harry


Generating A PHP Backdoor with Weevely - Post Exploitation By HackerSploit.

In This Video We Learning How to Generate A PHP Backdoor With Weevely for Post Exploitation.

Weevely Is A Stealth PHP Web Shell That Simulate Telnet-Like Connection. It Is An Essential Tool For Web Application Post Exploitation, And Can Be Used As Stealth Backdoor Or As A Web Shell To Manage Legit Web Accounts, Even Free Hosted Ones.

Kali Linux Is A Debian-Based Linux Distribution Aimed At Advanced Penetration Testing And Security Auditing. Kali Contains Several Hundred Tools Which Are Geared Towards Various Information Security Tasks, Such As Penetration Testing, Security Research, Computer Forensics And Reverse Engineering.

Weevely Command Examples :
  • weevely generate s3cr3t (Backdoor file 'weevely.php' created with password 's3cr3t')
  • weevely http://192.168.1.202/weevely.php s3cr3t

SHARE BY GK

You Can Still Upgrade To Windows 10 For FREE in 2018 By Britec09

Harry


You Can Still Upgrade To Windows 10 For FREE in 2018 By Britec09.

If You Missed The Update Deadline To Upgrade To Windows 10 For Free From Windows 7, Windows 8 And Windows 8.1 Then Do Not Worry, You Still Have A Chance To Upgrade For Free, Just Watch The Whole Video To See How To Upgrade To Windows 10.

Don't Want To Lose Your Data? Not a Problem, Using This Method Says All Your Programs and Data, But It’s Always Best To Make A Backup Of Your Data Before You Start.

So If You’re Looking to Upgrade to Windows 10 For Free This Is Your Last Chance.
  • Upgrade from Windows 7 to Windows 10 32 bit or 64 bit.
  • Upgrade from Windows 8 to Windows 10 32 bit or 64 bit.
  • Upgrade from Windows 8.1 to Windows 10 32 bit or 64 bit.

Remember If You’re Upgrading a 32bit Windows Operating System Your Only Be Able to Upgrade to Windows 10 32bit OS.


SHARE BY GK

Thursday 25 January 2018

How to Download Any Web page As PDF | Google Chrome By Geeks Tutorial

Harry


How to Download Any Web page As PDF | Google Chrome By Geeks Tutorial.

This Quick Video Will Show You, How To Download Any Web Page Into A PDF File, With Just A Click Using Google Chrome!

Save as PDF (Chrome Extension) :- https://goo.gl/zmSsCt

Save as PDF (Firefox Add-On) :- https://goo.gl/U2fxcs


SHARE BY GK

Wednesday 24 January 2018

Fix DPC Watchdog Violation BSOD Stop Error By Britec09

Harry


Fix DPC Watchdog Violation BSOD Stop Error By Britec09.

Looking To Repair Your Computer from a Blue Screen of Death? Getting Error Message:
  • DPC_Watchdog Blue Screen
  • DPC_Watchdog_Violation
  • DPC Watchdog Bsod
  • DPC Watchdog Error Code

Running Windows 10, Windows 8.1, Windows 8, Windows 7. Windows Vista, Windows XP ?

Well Let’s See If We Can Fix This Issue, When Does The Error Happen? When Gaming? When You Boot Up? When You Turn The Computer On? After You Updated Windows? After You Installed Software? After You Installed Drivers? Any of the above Can Be Resolved As Long As It’s Not a Hardware Problem Where Your Hardware Is Failing.

Make Sure You Backup Your Data Before You Continue And Make A Restore Point Using System Restore.


SHARE BY GK

Tuesday 23 January 2018

Jinnia tan mere te lagia - Baba Farid Ji

Harry

ਜਿੰਨੀਆ ਤਨ ਮੇਰੇ ਤੇ ਲਗੀਆ ,
ਤੇਰੇ ਇਕ ਲਗੇ ਤਾ ਤੂੰ ਜਾਨੇ ,
ਗੁਲਾਮ ਫਰੀਦਾ ਦਿਲ ਉਥੇ ਦੇਈਏ ,
ਜਿਥੇ ਅਗਲਾ ਕਦਰ ਵੀ ਜਾਨੇ | 

Bulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ - ਰਾਤੀਂ ਜਾਗੇਂ ਕਰੇਂ ਇਬਾਦਤ

Harry

Bulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ - ਰਾਤੀਂ ਜਾਗੇਂ ਕਰੇਂ ਇਬਾਦਤ

ਰਾਤੀਂ ਜਾਗੇਂ ਕਰੇਂ ਇਬਾਦਤ
ਰਾਤੀਂ ਜਾਗਣ ਕੁੱਤੇ
ਤੈਥੋਂ ੳਤੇ
ਭੋਂਕਣੋਂ ਬੰਦ ਮੂਲ ਨਾ ਹੁੰਦੇ
ਜਾ ਰੜੀ ਤੇ ਸੁੱਤੇ
ਤੈਥੋਂ ਉੱਤੇ
ਖ਼ਸਮ ਆਪਣੇ ਦਾ ਦਰ ਨਾ ਛੱਡਦੇ
ਭਾਂਵੇਂ ਵੱਜਣ ਜੁੱਤੇ
ਤੈਥੋਂ ਉੱਤੇ
ਬੁਲ੍ਹੇ ਸ਼ਾਹ ਕੋਈ ਰਖ਼ਤ ਵਿਹਾਜ ਲੈ
ਬਾਜ਼ੀ ਲੈ ਗਏ ਕੁੱਤੇ
ਤੈਥੋਂ ਉੱਤੇ

ਔਖੇ ਲਫ਼ਜ਼ਾਂ ਦੇ ਮਾਅਨੇ
ਰੜੀ। ਖੁੱਲਾ ਮੈਦਾਨ
ਖ਼ਸਮ। ਮਾਲਿਕ
ਰਖ਼ਤ। ਸਾਮਾਨ
ਵਿਹਾਜ। ਖ਼ਰੀਦਣਾBulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ - ਰਾਤੀਂ ਜਾਗੇਂ ਕਰੇਂ ਇਬਾਦਤ

Bulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ - ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ

Harry

Bulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ - ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ

ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਕਿਹਨੂੰ ਕੂਕ ਸੁਣਾਵਾਂ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਚੋਰੀ ਚੋਰੀ ਨਿੱਕਲ ਗਿਆ
ਪਿਆ ਜਗਤ ਵਿੱਚ ਸ਼ੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੁਸਲਮਾਨ ਸੱਵੀਆਂ ਤੋਂ ਡਰਦੇ
ਹਿੰਦੂ ਡਰਦੇ ਗੋਰ
ਦੋਵੇਂ ਇਸ ਦੇ ਵਿੱਚ ਮਰਦੇ
ਇਹੋ ਦੋਹਾਂ ਦੀ ਖੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਕਿਤੇ ਰਾਮ ਦਾਸ ਕਿਤੇ ਫ਼ਤਿਹ ਮੁਹੰਮਦ
ਇਹੋ ਕਦੀਮੀ ਸ਼ੋਰ
ਮਿਟ ਗਿਆ ਦੋਹਾਂ ਦਾ ਝਗੜਾ
ਨਿਕਲ ਪਿਆ ਕੋਈ ਹੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਅਰਸ਼ ਮੁਨੱਵਰ ਬਾਂਗਾਂ ਮਿਲੀਆਂ
ਸੁਣੀਆਂ ਤਖ਼ਤ ਲਹੌਰ
ਸ਼ਾਹ ਇਨਾਇਤ ਕੁੰਡੀਆਂ ਪਾਈਆਂ
ਲੁਕ ਛੁਪ ਖਿੱਚਦਾ ਡੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ
ਮੇਰੀ ਬੁੱਕਲ ਦੇ ਵਿੱਚ ਚੋਰ

ਔਖੇ ਲਫ਼ਜ਼ਾਂ ਦੇ ਮਾਅਨੇ
ਜਗਤ- ਦੁਨੀਆ, ਜਹਾਨ
ਸਿਵਿਆਂ- ਹਿੰਦੂਆਂ ਦੀਆਂ ਮੜ੍ਹੀਆਂ, ਜਿਥੇ ਮੁਰਦੇ ਸਾੜੇ ਜਾਂਦੇ ਨੇਂ
ਗੋਰ- ਕਬਰ
ਖੋਰ- ਦੁਸ਼ਮਣੀ, ਕਿਸੇ ਸ਼ੈਅ ਦੇ ਖੁਰਨ ਦਾ ਅਮਲ
ਕੁੰਡੀਆਂ- ਡੋਰਾਂ, ਮੱਛੀ ਨੂੰ ਫੜਨ ਲਈ ਕੁੰਡੀ ਵਰਤੀ ਜਾਂਦੀ ਹੈ।

Top 27 Android Hacking Application

Harry

1. Spoofapp :- Spoofapp Is A Caller ID Spoofing, Voice Changing And Call Recording Mobile App For Your iphone, Blackberry And Android Phone. It’s A Decent Mobile App to Help Protect Your Privacy on the Phone. However, It Has Been Banned From The Play Store For Allegedly Being In Conflict With The Truth In Caller ID Act Of 2009.

2. Andosid :- The DOS Tool For Android Phones Allows Security Professionals To Simulate A DOS Attack (An Http Post Flood Attack To Be Exact) And Of Course A Ddos On A Web Server, From Mobile Phones.

3. Faceniff :- Allows You To Sniff And Intercept Web Session Profiles Over The Wi-Fi That Your Mobile Is Connected To. It Is Possible To Hijack Sessions Only When Wi-Fi Is Not Using EAP, But It Should Work Over Any Private Networks.

4. Nmapper :- (Network Mapper) Is A Security Scanner Originally Written By Gordon Lyon Used To Discover Hosts And Services On A Computer Network, Thus Creating A “Map” Of The Network. To Accomplish Its Goal, Nmapper Sends Specially Crafted Packets To The Target Host And Then Analyses The Responses.

5. Anti-Android Network Toolkit :- Zanti Is A Comprehensive Network Diagnostics Toolkit That Enables Complex Audits And Penetration Tests At The Push Of A Button. It Provides Cloud-Based Reporting That Walks You Through Simple Guidelines To Ensure Network Safety.

6. SSH Droid :- SSH Droid Is A SSH Server Implementation for Android. This Application Will Let You Connect To Your Device From A PC And Execute Commands (Like “Terminal” And “Adb Shell”) Or Edit Files (Through SFTP, Winscp, Cyber Duck, Etc).

7. Wi-Fi Analyzer :- Turns Your Android Phone Into A Wi-Fi Analyzer. Shows The Wi-Fi Channels Around You. Helps You To Find A Less Crowded Channel For Your Wireless Router.

8. Network Discovery :- Discover Hosts And Scan Their Ports In Your Wi-Fi Network. A Great Tool for Testing Your Network Security.

9. Connect Bot :- Connect Bot Is A Powerful Open-Source Secure Shell (SSH) Client. It Can Manage Simultaneous SSH Sessions, Create Secure Tunnels, and Copy/Paste between Other Applications. This Client Allows You To Connect To Secure Shell Servers That Typically Run On UNIX-Based Servers.

10. Dsploit :- Android Network Analysis and Penetration Suite Offering the Most Complete and Advanced Professional Toolkit to Perform Network Security Assessments on a Mobile Device.

11. Hackode :- The Hacker’s Toolbox Is an Application for Penetration Tester, Ethical Hackers, IT Administrator and Cyber Security Professional to Perform Different Tasks like Reconnaissance, Scanning Performing Exploits Etc.

12. Androrat :- Remote Administration Tool for Android. Androrat Is A Client/Server Application Developed In Java Android For The Client Side And In Java/Swing For The Server.

13. APK Inspector :- APK Inspector Is A Powerful GUI Tool For Analysts To Analyze The Android Applications. The Goal Of This Project Is To Aide Analysts And Reverse Engineers To Visualize Compiled Android Packages And Their Corresponding DEX Code.

14. Droid Box :- Droid Box Is Developed To Offer Dynamic Analysis Of Android Applications.

15. Burp Suite :- Burp Suite Is An Integrated Platform For Performing Security Testing Of Web Applications. It’s Various Tools Work Seamlessly Together to Support the Entire Testing Process, From Initial Mapping and Analysis of an Application’s Attack Surface, Through to Finding and Exploiting Security Vulnerabilities.

16. Droid Sheep :- Droid Sheep Can Be Easily Used By Anybody Who Has An Android Device And Only The Provider Of The Web Service Can Protect The Users. So Anybody Can Test The Security Of His Account By Himself And Can Decide Whether To Keep On Using The Web Service.

17. Appuse :- Android Pentest Platform Unified Standalone Environment Appsec Labs Recently Developed the Appuse Virtual Machine. This System Is A Unique, Free, Platform For Mobile Application Security Testing In The Android Environment, And It Includes Unique Custom-Made Tools Created By Appsec Labs.

18. Shark for Root :- Traffic Sniffer, Works On 3G and Wi-Fi (Works on Froyo Tethered Mode Too). To Open Dump Use Wire Shark Or Similar Software, For Preview Dump On Phone Use Shark Reader. Based On Tcpdump.

19. Fing :- Find Out Which Devices Are Connected To Your Wi-Fi Network, In Just A Few Seconds. Fast and Accurate, Fing Is A Professional App for Network Analysis. A Simple And Intuitive Interface Helps You Evaluate Security Levels, Detect Intruders And Resolve Network Issues.

20. Drozer :- Drozer Enables You To Search For Security Vulnerabilities In Apps And Devices By Assuming The Role Of An App And Interacting With The Dalvik VM, Other Apps’ IPC Endpoints And The Underlying OS. Drozer Provides Tools To Help You Use And Share Public Android Exploits. It Helps You To Deploy A Drozer Agent By Using Weasel – MWR’s Advanced Exploitation Payload.

21. Wi-Fi Kill :- Second App, Developed Also By B.Ponury Is An App Which Can Kill Connections And Kick Site-Hoggers From The Site. This App Definitely Kick Then Net User from the Site So He Cannot Use It Anymore. The App Also Offers The List Of Viewed Sites By The Hogger.

22. Droid Sniff :- Similar To Droid Sheep But With A Newer And Nicer Interface Is Droid Sniff – Sniffing App Not Only For Face Book. This App Shows You What Is The Hogger Looking For And Then You Can “Take” His Control, Steal The Cookies And Rock’n’roll. Works Perfectly.

23. Network Spoofer :- The Last App, Called Network Spoofer Is Very Similar To Dsploit but it’s Easier to Use. Only Hitch Is That You Need To Have At Least 500MB Of Free Data. It Offers You A Lot Of Troll Features – Change Google Searches, Flip Images, Redirect Websites, Swap YouTube Videos And Others.

24. Droid SQLI :- Allows You to Test Your Mysql Based Web Application against SQL Injection Attacks. Droidsqli Supports the Following Injection Techniques: Time Based Injection, Blind Injection, and Error Based Injection, Normal Injection.

25. Sqlmapchik :- Is A Cross-Platform Sqlmap GUI For The Extremely Popular Sqlmap Tool

26. Whatsapp Viewer :- Is A Simple Forensic Tool. It Gives The Access To Whatsapp Chat Directly From Sqlite Databases, Even From Encrypted Databases.

27. WhatsAPI :- Is A Platform That Allows You To Send Bulk Messages Through PHP. The Script Itself Is Simple.

Note :- You Can Find This Android Application on Google.

Source :- Internet or AnonymouzSeC Telegram.


SHARE BY GK

Monday 22 January 2018

Visual Basic .NET Tutorial for Beginners By ProgrammingKnowledge

Harry



Visual Basic .NET Tutorial for Beginners By Programming Knowledge.

Visual Basic .NET Is An Object-Oriented Programming Language Designed by Microsoft. With The Word “Basic” Being In The Name Of The Language, You Can Already See That This Is A Language For Beginners. Although The Language Is Aimed At Noobs And Novices, You Should Not Underestimate The Power Of The Language Itself. There Are People Who Criticize VB.NET Because Of The Simplicity Of The Syntax, But VB.NET Has The Ability To Create Very Powerful And Sophisticated Applications. VB.NET Is A Great Place To Start Because Of How Easy And Straight Forward It Is. The Syntax Is Easy And You Will Not Find Yourself Writing Hundreds Of Lines Of Code As There Are Many Shortcuts That Make Coding So Much Easier In This Language.

Create A "Hello, World" App,VB.Net Tutorial For Beginners - Learn VB.Net Programming In Simple And Easy Steps Starting From Environment Setup, Basic Syntax, Data Types, Type Conversion, Variables, Constants, Operators, Decision Making, Loops, Methods, Arrays, Strings, Subs, File Handling, Exception Handling, Basic Controls, Dialog Boxes, Advanced Forms, Event Handling, Classes, Objects, Web Programming, Database Access, Excel Sheet And XML Processing, Creating Your First Visual Basic Program, Visual Basic 2010 Tutorial, Microsoft Visual Basic .NET Tutorials For Beginners ,VB.Net Tutorial Tutorials.


SHARE BY GK

How To Install Cerberus V2 Linux OS on Vmware Workstation By SSTec Tutorials

Harry


How To Install Cerberus V2 Linux OS on Vmware Workstation By SSTec Tutorials.

Cerberus Is a Penetration Testing Distribution Focusing on Automation and Anonymity; It Aims To Have the Best Tools Available on the Hacking Scene Tools Like: Fuzz bunch, Dandespritz, Cobalt Strike, Armitage, Metasploit Framework and Metasploit Community Version Set up and Ready for Use!!It Includes Custom Scripts, Custom Themes, And Custom Icons! Cerberus Distribution Is Based On Defiant Testing; It Has The Capability To Use 3 Repositories To Install Packages From Kali Repo, Debian Repo And Cybersec Repo! Cerberus Is An Angry Titan Unleashed To Destroy Or To Help Pen Testers To Analyze And Study New Exploits, Cerberus Can Be A Weapon Or A Tool To Learn And Become A Better Pen Tester! One of the Best Distributions on the Market Right Now!

This Is Full Step By Step Video Tutorial of Installing Cerberus v2 Linux on VMware Workstation. This is Also the Same Process to Install of Cerber Os V2 on Laptop or Desktop Hard Disk. Follow Steps on this Video and You will Get Successfully Install Cerberus Linux on VMware.

SSTec Tutorials & Cyber Sec Team Present The Cerberus V2 OS For Penetration Testing of Security Professionals. With 100 + External Security Tools & Script and All Built in Kali Linux 2017.3 Tools on Full Customized Interface.

Cerberus V2 Download Trial :- https://goo.gl/4ELJ2s

Cerberus V2 Download Full Version (Paid) :-  https://goo.gl/uEXZj9 

Apply Code :- sstectutorials


SHARE BY GK

Sunday 21 January 2018

ਗੁਰਮੁਖ ਜਨਮ ਸਵਾਰ ਦਰਗਹ ਚਲਿਆ

Harry

ਗੁਰਮੁਖ ਜਨਮ ਸਵਾਰ ਦਰਗਹ ਚਲਿਆ॥ (19-14-1)
ਸਚੀ ਦਰਗਹ ਜਾਇ ਸਚਾ ਪਿੜ ਮਲਿਆ॥ (19-14-2)

Bulleh Shah Maati Maati Di Gulzaar ਬੁੱਲੇ ਸ਼ਾਹ >> ਮਾਟੀ ਮਾਟੀ

Harry

Kavi ਕਵੀ >> Bulleh Shah ਬੁੱਲੇ ਸ਼ਾਹ >> ਮਾਟੀ
ਮਾਟੀ

ਮਾਟੀ ਕੁਦਮ ਕਰੇਂਦੀ ਯਾਰ
ਵਹ ਵਾਹ ਮਾਟੀ ਦੀ ਗੁਲਜ਼ਾਰ
ਮਾਟੀ ਘੋੜਾ ਮਾਟੀ ਜੋੜਾ, ਮਾਟੀ ਦਾ ਅਸਵਾਰ
ਮਾਟੀ ਮਾਟੀ ਨੂੰ ਦੋੜਾਵੇ, ਮਾਟੀ ਦਾ ਖੜਕਾਰ
ਮਾਟੀ ਮਾਟੀ ਨੂੰ ਮਾਰਨ ਲੱਗੀ, ਮਾਟੀ ਦੇ ਹਥਿਆਰ
ਜਿਸ ਮਾਟੀ ਪਰ ਬਹੁਤੀ ਮਾਟੀ, ਸੋ ਮਾਟੀ ਹੰਕਾਰ
ਮਾਟੀ ਬਾਗ ਬਗੀਚਾ ਮਾਟੀ, ਮਾਟੀ ਦੀ ਗੁਲਜ਼ਾਰ
ਮਾਟੀ ਮਾਟੀ ਨੂੰ ਦੇਖਣ ਆਈ, ਮਾਟੀ ਦੀ ਏ ਬਹਾਰ
ਹੱਸ ਖੇਡ ਫ਼ਿਰ ਮਾਟੀ ਹੋਵੇ, ਪੈਂਦੀ ਪਾਉਂ ਪਸਾਰ
ਬੁੱਲਾ ਜੇ ਇਹ ਬੁਝਾਰਤ ਬੁੱਝੇ, ਤਾਂ ਲਾਹਿ ਸਿਰੋਂ ਭੁਇੰ ਮਾਰ

Saturday 20 January 2018

Database Link

Harry

Database Link

Database Link:- Database Link is a Database Object ,that is used for accessing one database from another database.In other word database link is a schema object in one database permit you to access objects on another database.

Type of Database Link:- There are 2 types of Database Link

1) Private Database Link
2) Public Database Link

Where we can Use:- We can access table,view and other PLSQL objects by using database link.Also we can perform DML operations by using database link.
                                    
1) Private Database Link:- Private Database Link are database link that can be accessed only by creator or you can say visible for only creator.
Syntax :-

CREATE DATABASE LINK <db_link_name>
CONNECT TO <user> IDENTIFIED BY <password>
USING '<remote_db_name>';

Example :- There are 2 Database have below tns entries

prod1db =
  (DESCRIPTION =
    (ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.81.128)(PORT = 1521))
    (CONNECT_DATA = (SERVICE_NAME = ORCL))
  )


prod2db =
  (DESCRIPTION =
    (ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.81.129)(PORT = 1521))
    (CONNECT_DATA = (SERVICE_NAME = ORCL))
  ) 
 

Below create statement will create database link from prod1db to prod2db

CREATE DATABASE LINK prod2ln
CONNECT TO system IDENTIFIED BY <password>
USING 'prod2db';

same can be created by below statement as

CREATE DATABASE LINK prod2ln
CONNECT TO system IDENTIFIED BY <password>
USING '(DESCRIPTION =
       (ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.81.129)(PORT = 1521))
       (CONNECT_DATA = (SERVICE_NAME = ORCL))
       )';

                       
2) Public Database Link :-Public Database Link  are database link that can be accessed by any user or you can say visible to all users.

Syntax :-

CREATE PUBLIC DATABASE LINK <db_link_name>
CONNECT TO <user> IDENTIFIED BY <password>
USING '<remote_db_name>';

Example:-

CREATE PUBLIC DATABASE LINK prod2pln
CONNECT TO system IDENTIFIED BY <password>
USING 'prod2db';

Example of using DATABASE Link:-
Example1:- Create a table on primary database with same structure and data available on remote database using database link.

CREATE TABLE EMPLOYEE AS SELECT * FROM EMPLOYEE@prod2pln;

Example2:- How can I see tables available in remote database using database link.

SELECT * FROM TAB@prod2pln;

Example3
:- Delete records from EMPLOYEE table which is available at remote database using database link.


DELETE FROM EMPLOYEE@prod2pln;

Example3
:-Update salary by 10000 of HR department employee , table is available at remote database


UPDATE EMPLOYEE@prod2pln set salary=10000 where department='HR';

How To Create A WI-Fi Jammer By HackNet

Harry


How To Create A WI-Fi Jammer By HackNet.

This Guide Will Explain How To Create A Wi-Fi Jammer Affordable And Functional, For More Information On The Functioning And Use To Watch The Videos On The YouTube Channel Of Hacknet.

Requirements:
  • Computer
  • Node MCU
  • The File .Bin
  • Source of Energy (Ex: Power bank) 
  • Tab Esp8266
  • Micro USB Cable

Configuration Guide:
  • Download the Necessary Files (Linked at the Bottom of the Post).
  • Connect The Board Esp8266 To The PC With The Micro USB Cable.
  • Open Node MCU And Select The Item "COM Port" To "COM6"(May Vary Depending On The Coupon, Generally Is Never COM1).
  • From Node MCU navigate to "Config" And Pressing the First Gear to the Right; Select the Location Where You Saved the File .Bin.
  • From Node MCU Switch To "Advanced" And "Flash Speed" Select The "80 MHz".
  • From Node MCU Scroll to "Operation" And Press "Flash (F)".

Coupon Configured With Success.

Guide To Use:
  • Connect The Board To A Power Source.
  • Connect Any Device To Wi-Fi Created By The Board.
  • SSID (Default): Pwned
  • Password (Default): Deauther
  • Access to the Browser on the Device and Connect To the IP "192.168.4.1".
  • Access to Run Properly. From This Point on Is Very Intuitive To Use, For More Info, Watch the Video on the YouTube Channel of Hacknet.

Necessary Links:

SHARE BY GK

Android Smart Phone Shortcuts Codes

Harry

*#*#4636#*#* Display Information about Phone, Battery and Usage Statistics.

*#*#7780#*#* Resting Your Phone to Factory State-Only Deletes Application Data and Applications.

*2767*3855# it’s A Complete Wiping of Your Mobile Also It Reinstalls the Phones Firmware.

*#*#34971539#*#* Shows Completes Information about the Camera.

*#*#7594#*#* Changing the Power Button Behavior-Enables Direct Power off Once the Code Enabled.

*#*#273283*255*663282*#*#* For A Quick Backup to All Your Media Files.

*#*#197328640#*#* Enabling Test Mode for Service Activity.

*#*#232339#*#* OR *#*#526#*#* Wireless Land Tests.

*#*#232338#*#* Displays Wi-Fi Mac-Address.

*#*#1472365#*#* For A Quick GPS Test.

*#*#1575#*#* A Different Type GPS Test.

*#*#0283#*#* Packet Loopback Test.

*#*#0*#*#* LCD Display Test.

*#*#0673#*#* OR *#*#0289#*#* Audio Test.

*#*#0842#*#* Vibration and Backlight Test.

*#*#2663#*#* Displays Touch-Screen Version.

*#*#2664#*#* Touch-Screen Test.

*#*#0588#*#* Proximity Sensor Test.

*#*#3264#*#* Ram Version.

*#*#232331#*#* Bluetooth Test.

*#*#7262626#*#* Field Test.

*#*#232337#*# Displays Bluetooth Device Address.

*#*#8255#*#* For Google Talk Service Monitoring.

*#*#4986*2650468#*#* PDA, Phone, Hardware, RF Call Date Firmware Info.

*#*#1234#*#* PDA and Phone Firmware Info.

*#*#1111#*#* FTA Software Version.

*#*#2222#*#* FTA Hardware Version.

*#*#44336#*#* Displays Build Time and Change List Number.

*#06# Displays IMEI Number.

*#*#8351#*#* Enables Voice Dialing Logging Mode.

*#*#8350#*#* Disables Voice Dialing Logging Mode.

##778 (+Call) Brings Up Epst Menu.


SHARE BY GK