Skip to main content

Posts

Showing posts from 2019

SSD Upgradation

There are multiple ways to do this SSD Upgradation. Some are as follows. 1. Beginner's Method. 2. Cloning Method. There's no better way to speed up and upgrade a laptop than to replace its mechanical drive with an SSD (Solid State Drive). Sure, you can de-fragment your hard drive in Windows 10, but it won't improve your performance like an SSD would. coming to the point, Let's discuss about these two methods. 1. Beginner's Method:           a. Backup the data needed from the old HDD           b. Turn the computer off and remove the back panel.          c. Look for any screws securing your drive to the laptop.          d. Lift the old drive up and pull it out.          e. In its place, install the SSD and put the back panel on. Note:  If SSD looks same as HDD, then follow step e. If not insert SSD on the respective slot and put the back panel on.  Look alike scenario If not scenario              f. Put OS onto

Top 5 Advanced Operating Systems For Hacking

I personally realize that you can never stop hackers to hack something, you can just make his task harder by putting some extra security. if you are really interested in Hacking, You need to be known Which Operating systems are used by Hackers.  Here we Include best operating system used by Ethical Hackers for penetration testing. With the help of these tools Ethical Hackers and IT Professional find vulnerabilities in network and system.  Don’t waste your time and choose your Hacking OS very carefully that fit with your needs.             Linux is an extremely popular operating system for hackers. First off, Linux's source code is freely available because it is an open source operating system. This means that Linux is very easy to modify or customize. Second, there are countless Linux security OS available that can double as Linux hacking software. Top 5 Advanced Operating Systems for hacking  2019 Top 5 Advanced Operating Systems For Hacking: I have basicall

Want to capture audio using a link

In-order to capture audio using a link the application used would be "Say hello" Since it's a hacking tip obviously these steps has to be done or followed from the Kali-Linux, about Kali-Linux we have discussed a little bit on the previous post. Here let me demonstrate everything about this application. Say hello is a wonderful application to capture audio from target using a link, It has two powerful port forwarding feature for accomplishing this task. 1. Serveo 2. Ngrok. Both are classic servers used for Port forwarding. The command used for executing and downloading the application into Kali-Linux are as follows: 1. for downloading the setup use this command on the Kali-Linux terminal (or) in termux, a small package which can be installed on mobile phones for hacking & cracking purpose  "git clone https://github.com/thelinuxchoice/sayhello"  2. then navigate into the folder for which the command used would be                  "cd s

Difference between HDD & SSD

HDD & SSD  HDD -- Hard Disk Drive SSD -- Solid State Drive Solid state drives and hard disk drives are similar in their physical specifications, but they store data very differently. There are advantages and disadvantages to each type of drive, and deciding on which type is right for you comes down to what you use your computer for. Hope this post shows you how each type of storage drive works and what it means for you. HDD: Hard Disk Drive: This technology behind HDD is well-known and well-tested and it's for more than 5-6 decades, steadily increasing their storage capacity and decreasing their physical size. HDDs rely on spinning disks or platters to read and write data. HDD       How Hard Drives works:                        Hard disk drives consist of one or more magnetically sensitive platters, an actuator arm with a read/write head on it for each platter, and a motor to spin the platters and move the arms. There is also an I/O controller a

Difference between Cracking and Hacking

          Hackers and Crackers  Mostly we are of the opinion that hackers are a threat to our computers and can take out whatever secret information they want to. But really that is not the case and here we bring you the exact difference between what a hacker and a cracker is. Hope this post from us would bring end to all the myths regarding hackers. The Hackers and the Crackers are precisely the people who have extensive knowledge about computers and networks ranging from how they are built, how they work, the programming, the codes and everything else that relates to the security.  Generally people are sometimes thinking that Hackers and Crackers has has no  difference, however this is not true. Both works for opposite interests. While one may work for good and the other obviously with completely negative shade i.e malicious and criminal mindset. Here is where the line is drawn actually between the hackers & crackers.           In-other words we can define a hacke

What Kali Linux Impersonate windows 10, Is it True?

Kali Linux As maximum people knows that Kali Linux is meant for the penetration testing, which colloquially known as a pentest, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Now Kali-Linux came with an impressive and classic option on their latest version 2019.4. Kali-Linux 2019.4 was the latest version released last week with an option in which Kali Linux Impersonate windows 10, the name of the option is "Undercover Mode" which is available from 2019.4.Kali is a Linux distribution created for ethical hacking and penetration testing and is commonly used by researchers and red teamers to perform security tests against an organization. As most people are used to seeing Windows and macOS devices being used, it may look suspicious to see a user running Kali Linux with it's distinctive dragon logo and a Linux environment in an office lobby or other public setting.Wit

Top 5 free VPN

VPN  What is VPN and why it is needed?      A VPN or Virtual Private Network, allows us to create a secure connection to another network over the Internet. It can be used to access region-restricted websites, shield your browsing activity from others on public Wi-Fi and more. In-other words A VPN is a private network that uses a public network (Internet) to connect remote sites or users together. VPN uses " Virtual" connections routed through the internet from the business's private network or third-party VPN service to the remote site or person. It is a network constructed using pulic wires (Internet) to connect remote users or regional offices to a company's private, internal network. How we get VPN ?      We can get VPN through multiple ways.          1. Downloading manually from Internet.          2. Using window's in-built VPN.       Now a days maximum members are using only third-party VPN software. Now we can g