Posts

Top 5 World’s Most Difficult Programming Languages

Image
1.Malbolge Malbolge is one of the toughest programming languages. As a matter of fact, after its arrival, it took 2 years for writing first Malbolge program, just imagine now how difficult it is? It is said to be that the author of Malbolge programming language has never written a single program. It is public domain esoteric programming language created by Ben Olmsted in 1998. Hello world program in Malbolge (=<`#9]~6ZY32Vx/4Rs+0No-&Jk)”Fh}|Bcy?`=*z]Kw%oG4UUS0/@-ejc(:’8dc 2.Cow programming language Cow programming language is released sometime in early 2013. It was designed with the bovine in the mind. Cows posses limited vocabulary skills, so the developers inherit the words known by them. The instructions language consists different variations of ‘moo’ that is, moO, MoO, mOo, mOO, Moo, and so on. It is a case-sensitive language and the other words & symbols in between the instructions of the language are ignored. Hello world program in Cow prog...

Change Windows Password Without Knowing Old Password

How To Change Windows Password Without Knowing Old One:- You want to change your Windows password, but you don’t know the current one. If you are already logged into the system, it is possible. Let’s take a situation. You want to prank your friend. He has logged into his system and lets you use it. He leaves. So by the time he comes back, you want to set something up that can shock him by a bit. For that, you can change his windows password even without knowing his current one. This can be easily done with Command Prompt . But most people wouldn’t be familiar with using Command Prompt . That’s when you need some other way using which you can change the windows password without using any commands. That some other way is exactly what’s been explained through the following steps. STEP 1 Right click on the Windows icon and select Manage option from the context menu that appears.  STEP 2 Find and expand the entry named Local Users and Groups from the left window p...

Top 11 Ways To Look Like A Hacker and become Popular among Friends

Some people don’t want to learn things like a hacker. But they want some simple tricks for impressing your friends. In this post we collect some simple and funny way, you can look like a hacker from learning these tricks. 1. Type Like a Hacker Hackertyper Hackertyper is a really interesting prank website that gives you the ability to be like a hacker. Open Hackertyper.com in your browser and type anything. Press alt button twice for showing Access Granted message in your Browser . 2. Steal the Saved Login Password from Chrome Browser Type chrome://settings/passwords in your URL address bar and press enter. Now you see the all saved passwords list in your chrome browser. With this simple trick, you can simply hack saved login password in any chrome browser. 3. Change Command Prompt Color and type some Commands   Change Command Prompt text color into green by typing color a command in CMD Program. You can also change background color and transparency of command pr...

How to Remove Shortcut virus Permanently from Pendrive

What is Shortcut Virus? Generally, in the Shortcut Virus, our PC or pen drive gets infected by some malicious program and as a result , all of our files and folders are changed into the shortcut files and original ones got hidden, this malicious program is generally known as Shortcut virus. If your PC or pen drive is affected by it then all of your files and folders will be hidden and you will not be able to use them which is absolutely not good. This virus spread from one computer to another like viral through pen drives,flash drives, memory cards exchanges or through internet/Bluetooth connections. The most common virus found in removable drives is autorun.inf which keeps on multiplying and infect your system by creating unlimited shortcuts of files and folders.Here I post 3 methods for removing shortcuts virus from pen drive. Methods to Remove Shortcut Virus: Antivirus to remove Shortcut virus Shortcut Virus Remover ANTIVIRUS to Remove Shortcut Virus   I...

What is Hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.The person who is consistently engaging in hacking activities. and has accepted hacking as a lifestyle and philosophy of their choice. is called a hacker. Since the word "Hack" has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an "art" from. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills.

Best CMD commands used in Hacking

Like you all know command prompt is one of the most powerful tool in Window PC. You can do almost anything in your Window PC from this tool. Here we make a list of best Cmd Commands used in Hacking. If you wanna be a hacker learn these commands carefully. Let’s start easy… 1. ping This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command. ping x.x.x.x (x is the IP address). You can try pinging 8.8.8.8 which belongs to Google or ping www.google.com (www.google.com is the website you want to ping, but you don’t know the IP) 2. tracert   This command will give you the hops that a packet will travel to reach its final destination. This command is really helpful if you know the route a packet takes before it goes to the target box.  tracert x.x.x.x (x is the IP address) or tracert www.google.com (www.google.com is the website you don’t know the IP) 3. nslookup  This comm...

How to Clear Storage Space in Android in 6 Ways

1. Erase offline unwanted areas in Google Maps Downloading a map in the Google Maps app helps a lot to navigate when your device is offline. You can clearly check how much storage space your offline maps have taken by going to Google Maps and tapping the hamburger button in the top corner, then select  Offline areas . The storage used by each offline map is displayed below its name, select the map and select Delete to get back your storage space. 2. Unload your least-used apps I love the fact that I can download and install Android apps to my devices remotely from a desktop Web browser. The downside? My Android handsets tend to be overstuffed with too many apps, many of them used only once (or even never). 3. Clear all cached app data If you go to settings and dig into the Apps storage setting screen and then tap on an individual app, you will notice that each app has its own bulk of ‘cached’ data which varies from a few KB’s...

What is A Firewall and Reasons Why You Should Use it

We all heard about firewall at some point of time, what are they used for?Do they stop Viruses? Well actually, there is a great chance that you are now using a firewall,  if  your are running a modern OS on your computer, there is be one built in, or else your security suite will have a firewall. But what is this firewall for? Keep reading for reasons why you do, need it. What Is a Firewall? Lets start it with what a firewall actually is. You should understand that there are no sparks, no flames, no fuel of any kind of that stuff involved, A firewall is a shield or barrier which is intended to protect your PC, phone or tablet from data-based malware dangers that exist everywhere on the Internet.  Data is usually exchanged between your computer and servers and routers in cyberspace while you are using internet, and the purpose of firewalls is to monitor this data (sent in packets) and check if they are safe...

6 Private Search Engines That Do Not Track You

Image
1.DuckDuckGo DuckDuckGo is a very secure search engine that never tracks your searches while providing you really good search experience. The main purpose of building this search engine is for people who likes to remain private while searching, and delivers instant results without tailored ads on the search pages. DuckDuckGo gets around 10M+ searches a day. DUCKDUCKGO.COM 2.WolframAlpha This is a great computable search engine which provides very accurate answers and offers open knowledge. WolframAlpha’s main purpose is to serve knowledge and nonetheless it does not track what you search for. WolframAlpha performs dynamic calculations using built-in algorithms and delivers an expert knowledge about calculations, people, money & finance, health & medicines, music & movies and much more. WolframAlpha.COM 3.Startpage Startpage is a powerful search engine which provides accurate results while protecting your searches and avoiding tracking your s...

6 Different Ways to Download Videos from YouTube to your PC and Mobile

1. Add SS before youtube This is one of the most popular  method on the internet for downloading youtube videos on PC and mobile. To download videos, just need to add a “ss” before the “youtube” in your URL, turn it into “ssyoutube”. For example, the URL of https://www.youtube.com/watch?v=TmprPSZFBpk, now add a “ss”, the URL changed to https://www.ssyoutube.com/watch?v=TmprPSZFBpk.  2. ClipConverter [Web] ClipConverter is a fast and easy-to-use Web app that’s not only a video downloader, it’s also a video converter. With support for video sites such as Dailymotion, Vimeo, Metacafe, and MySpace, ClipConverter is not a YouTube-only service, and can grab and convert any video using only a link. Copy and paste the video’s link into the box, and choose one of the available options below. 3. From Kiss Method This method is the only one just for YouTube, of all the methods mentioned here. To download videos, just need to add a “kiss” before the “youtube” in you...

This USB Stick Will Instantly Destroy Your Computer

Image
For just a few bucks, you can pick up a USB stick that destroys almost anything that it’s plugged into. Laptops, PCs, televisions, photo booths — you name it. Once a proof-of-concept, the pocket-sized USB stick now fits in any security tester’s repertoire of tools and hacks, says the Hong Kong-based company that developed it. It works like this: when the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges — all in the matter of seconds. On unprotected equipment, the device’s makers say it will “instantly and permanently disable unprotected hardware”. You might be forgiven for thinking, “Well, why exactly?” The lesson here is simple enough. If a device has an exposed USB port — such as a copy machine or even an airline entertainment system — it can be used and abused, not just by a hacker or malicious actor, but also electrical attacks. “Any public facing USB port should be considered an attack vector,”...

Popular posts from this blog

How to Delete the Windows.old folder in Windows 7/8/10

6 Private Search Engines That Do Not Track You

Top 5 World’s Most Difficult Programming Languages