Posts

Showing posts from April, 2018

Top 5 World’s Most Difficult Programming Languages

Image
1.Malbolge Malbolge is one of the toughest programming languages. As a matter of fact, after its arrival, it took 2 years for writing first Malbolge program, just imagine now how difficult it is? It is said to be that the author of Malbolge programming language has never written a single program. It is public domain esoteric programming language created by Ben Olmsted in 1998. Hello world program in Malbolge (=<`#9]~6ZY32Vx/4Rs+0No-&Jk)”Fh}|Bcy?`=*z]Kw%oG4UUS0/@-ejc(:’8dc 2.Cow programming language Cow programming language is released sometime in early 2013. It was designed with the bovine in the mind. Cows posses limited vocabulary skills, so the developers inherit the words known by them. The instructions language consists different variations of ‘moo’ that is, moO, MoO, mOo, mOO, Moo, and so on. It is a case-sensitive language and the other words & symbols in between the instructions of the language are ignored. Hello world program in Cow prog...

How to Delete the Windows.old folder in Windows 7/8/10

Image
If you have tried upgrading your Windows PC and it has failed a couple of times due to various annoying reasons, you’ve probably come to realize that there is a large chunk of disk space being eaten up by a folder called Windows.old. Windows.old is automatically generated whenever you perform an installation of Windows with a previous version of the OS already installed. It creates this Windows.old folder in the root of the Windows partition and stores the previous operating system files and data.  In case you try to upgrade from Windows Vista to Windows 7 or Windows 7 to Windows 10 and it fails, you can always revert back to Windows Vista or 7 safely. The only issue with this is that every time the install fails, another copy of the previous OS is copied into Windows.old. So, if your upgrade install failed 2 or 3 times, that Windows.old folder can become very large, very fast! On top of that, the folder is not automatically deleted once you are up and running wi...

WHAT IS A BOTNET? How to Detect and Prevent it ?

A botnet is a network of computers that are compromised and are under the control of an attacker. Every individual device in a botnet is called as a bot. A bot is usually formed when a computer is infected with malware. This malware allows the crooks to control the computer remotely without the knowledge of the owner of the computer. The attackers who control these botnets are referred to as “bot masters” or “bot herders” . Attackers generally use botnets for a lot of purposes, most of them being criminal. The most common applications for botnets include denial-of-service attacks, email spam campaigns, data theft and spreading adware/spyware. A botnet attack starts with a bot recruitment. Bot masters usually recruit these bots by spreading worms, botnet viruses, or other malware. It is also possible to use web browser hacking and infect computers which contain a bot malware. Once a computer is infected with a botnet virus, it will connect to the bot master’s command an...

Create Fake File in Window PC in Any Size and Any Format

In Windows PC, there are many commands and Hidden features that we don’t know. In this post, I tell you How can you make a fake file of any size in any format. From this Windows Trick you can make fake music file, documents file, movie file, audio file in any size whatever you want. Benefits of this Tricks: 1. You can make any type of file at any size in just seconds. 2. Troll your friends. 3. Fill any empty Pendrive in just seconds. So how this work This Window  trick work on Windows Command names FSUTIL. Fsutil is command line utility, this command provides some technical information of disk drives. 1. Press windows button and type cmd, Select cmd.exe and  right click on it Run as administrator. 2. Type fustil command and see below for example. fsutil file createnew C:techsolution97.mp4 500000000 change “techsolution97” with your file name change”.mp4″ with your file extension change “50000000” with your file size in bit

Change Windows Password Without Knowing Old Password

How To Change Windows Password Without Knowing Old One:- You want to change your Windows password, but you don’t know the current one. If you are already logged into the system, it is possible. Let’s take a situation. You want to prank your friend. He has logged into his system and lets you use it. He leaves. So by the time he comes back, you want to set something up that can shock him by a bit. For that, you can change his windows password even without knowing his current one. This can be easily done with Command Prompt . But most people wouldn’t be familiar with using Command Prompt . That’s when you need some other way using which you can change the windows password without using any commands. That some other way is exactly what’s been explained through the following steps. STEP 1 Right click on the Windows icon and select Manage option from the context menu that appears.  STEP 2 Find and expand the entry named Local Users and Groups from the left window p...

Top 11 Ways To Look Like A Hacker and become Popular among Friends

Some people don’t want to learn things like a hacker. But they want some simple tricks for impressing your friends. In this post we collect some simple and funny way, you can look like a hacker from learning these tricks. 1. Type Like a Hacker Hackertyper Hackertyper is a really interesting prank website that gives you the ability to be like a hacker. Open Hackertyper.com in your browser and type anything. Press alt button twice for showing Access Granted message in your Browser . 2. Steal the Saved Login Password from Chrome Browser Type chrome://settings/passwords in your URL address bar and press enter. Now you see the all saved passwords list in your chrome browser. With this simple trick, you can simply hack saved login password in any chrome browser. 3. Change Command Prompt Color and type some Commands   Change Command Prompt text color into green by typing color a command in CMD Program. You can also change background color and transparency of command pr...

How to Remove Shortcut virus Permanently from Pendrive

What is Shortcut Virus? Generally, in the Shortcut Virus, our PC or pen drive gets infected by some malicious program and as a result , all of our files and folders are changed into the shortcut files and original ones got hidden, this malicious program is generally known as Shortcut virus. If your PC or pen drive is affected by it then all of your files and folders will be hidden and you will not be able to use them which is absolutely not good. This virus spread from one computer to another like viral through pen drives,flash drives, memory cards exchanges or through internet/Bluetooth connections. The most common virus found in removable drives is autorun.inf which keeps on multiplying and infect your system by creating unlimited shortcuts of files and folders.Here I post 3 methods for removing shortcuts virus from pen drive. Methods to Remove Shortcut Virus: Antivirus to remove Shortcut virus Shortcut Virus Remover ANTIVIRUS to Remove Shortcut Virus   I...

What is Hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.The person who is consistently engaging in hacking activities. and has accepted hacking as a lifestyle and philosophy of their choice. is called a hacker. Since the word "Hack" has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an "art" from. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills.

Best CMD commands used in Hacking

Like you all know command prompt is one of the most powerful tool in Window PC. You can do almost anything in your Window PC from this tool. Here we make a list of best Cmd Commands used in Hacking. If you wanna be a hacker learn these commands carefully. Let’s start easy… 1. ping This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command. ping x.x.x.x (x is the IP address). You can try pinging 8.8.8.8 which belongs to Google or ping www.google.com (www.google.com is the website you want to ping, but you don’t know the IP) 2. tracert   This command will give you the hops that a packet will travel to reach its final destination. This command is really helpful if you know the route a packet takes before it goes to the target box.  tracert x.x.x.x (x is the IP address) or tracert www.google.com (www.google.com is the website you don’t know the IP) 3. nslookup  This comm...

How to Clear Storage Space in Android in 6 Ways

1. Erase offline unwanted areas in Google Maps Downloading a map in the Google Maps app helps a lot to navigate when your device is offline. You can clearly check how much storage space your offline maps have taken by going to Google Maps and tapping the hamburger button in the top corner, then select  Offline areas . The storage used by each offline map is displayed below its name, select the map and select Delete to get back your storage space. 2. Unload your least-used apps I love the fact that I can download and install Android apps to my devices remotely from a desktop Web browser. The downside? My Android handsets tend to be overstuffed with too many apps, many of them used only once (or even never). 3. Clear all cached app data If you go to settings and dig into the Apps storage setting screen and then tap on an individual app, you will notice that each app has its own bulk of ‘cached’ data which varies from a few KB’s...

What is A Firewall and Reasons Why You Should Use it

We all heard about firewall at some point of time, what are they used for?Do they stop Viruses? Well actually, there is a great chance that you are now using a firewall,  if  your are running a modern OS on your computer, there is be one built in, or else your security suite will have a firewall. But what is this firewall for? Keep reading for reasons why you do, need it. What Is a Firewall? Lets start it with what a firewall actually is. You should understand that there are no sparks, no flames, no fuel of any kind of that stuff involved, A firewall is a shield or barrier which is intended to protect your PC, phone or tablet from data-based malware dangers that exist everywhere on the Internet.  Data is usually exchanged between your computer and servers and routers in cyberspace while you are using internet, and the purpose of firewalls is to monitor this data (sent in packets) and check if they are safe...

6 Private Search Engines That Do Not Track You

Image
1.DuckDuckGo DuckDuckGo is a very secure search engine that never tracks your searches while providing you really good search experience. The main purpose of building this search engine is for people who likes to remain private while searching, and delivers instant results without tailored ads on the search pages. DuckDuckGo gets around 10M+ searches a day. DUCKDUCKGO.COM 2.WolframAlpha This is a great computable search engine which provides very accurate answers and offers open knowledge. WolframAlpha’s main purpose is to serve knowledge and nonetheless it does not track what you search for. WolframAlpha performs dynamic calculations using built-in algorithms and delivers an expert knowledge about calculations, people, money & finance, health & medicines, music & movies and much more. WolframAlpha.COM 3.Startpage Startpage is a powerful search engine which provides accurate results while protecting your searches and avoiding tracking your s...

6 Different Ways to Download Videos from YouTube to your PC and Mobile

1. Add SS before youtube This is one of the most popular  method on the internet for downloading youtube videos on PC and mobile. To download videos, just need to add a “ss” before the “youtube” in your URL, turn it into “ssyoutube”. For example, the URL of https://www.youtube.com/watch?v=TmprPSZFBpk, now add a “ss”, the URL changed to https://www.ssyoutube.com/watch?v=TmprPSZFBpk.  2. ClipConverter [Web] ClipConverter is a fast and easy-to-use Web app that’s not only a video downloader, it’s also a video converter. With support for video sites such as Dailymotion, Vimeo, Metacafe, and MySpace, ClipConverter is not a YouTube-only service, and can grab and convert any video using only a link. Copy and paste the video’s link into the box, and choose one of the available options below. 3. From Kiss Method This method is the only one just for YouTube, of all the methods mentioned here. To download videos, just need to add a “kiss” before the “youtube” in you...

This USB Stick Will Instantly Destroy Your Computer

Image
For just a few bucks, you can pick up a USB stick that destroys almost anything that it’s plugged into. Laptops, PCs, televisions, photo booths — you name it. Once a proof-of-concept, the pocket-sized USB stick now fits in any security tester’s repertoire of tools and hacks, says the Hong Kong-based company that developed it. It works like this: when the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges — all in the matter of seconds. On unprotected equipment, the device’s makers say it will “instantly and permanently disable unprotected hardware”. You might be forgiven for thinking, “Well, why exactly?” The lesson here is simple enough. If a device has an exposed USB port — such as a copy machine or even an airline entertainment system — it can be used and abused, not just by a hacker or malicious actor, but also electrical attacks. “Any public facing USB port should be considered an attack vector,”...

Popular posts from this blog

Top 5 World’s Most Difficult Programming Languages

How to Delete the Windows.old folder in Windows 7/8/10

6 Private Search Engines That Do Not Track You