Forwarded from Dhecybersoldier
Please open Telegram to view this post
VIEW IN TELEGRAM
Computer_Networking_Course_Network_Engineering_CompTIA_Network+.mp4
1 GB
π°Computer Networking Course
β£ Worth - 200$ [ FREE ]
π [CompTIA Network+ Exam Preparation] - Download This Course And Get All Information About Network Engeneering
β @ethicalhackingtoday β
β£ Worth - 200$ [ FREE ]
π [CompTIA Network+ Exam Preparation] - Download This Course And Get All Information About Network Engeneering
β @ethicalhackingtoday β
β€9π6
How to Recover Permanently Deleted Files in Windows 10
You can undelete files using Restore Previous Versions:
β Navigate to the folder or the location where you stored the file in the past (before being deleted). Make a right-click on the folder and select the option βRestore previous versionsβ.
β You will get an option to Restore the folder. This will restore the previous version of the file, hence providing you with the lost files. π
βοΈIf you donβt see an option βRestore previous versions,β donβt panic! π
βοΈNavigate to Control Panel, or type Control Panel in Run Window (Windows Key + R).
βοΈ Locate System >System Protection.
βοΈ Select the drive and click Configure.
βοΈ On the System Protection window, click on the button beside Turn on System Protection.
βοΈ You will see βRestore previous versionsβ on a particular folder. So, repeat the steps above to Restore previous versions. π
#lifehack
You can undelete files using Restore Previous Versions:
β Navigate to the folder or the location where you stored the file in the past (before being deleted). Make a right-click on the folder and select the option βRestore previous versionsβ.
β You will get an option to Restore the folder. This will restore the previous version of the file, hence providing you with the lost files. π
βοΈIf you donβt see an option βRestore previous versions,β donβt panic! π
βοΈNavigate to Control Panel, or type Control Panel in Run Window (Windows Key + R).
βοΈ Locate System >System Protection.
βοΈ Select the drive and click Configure.
βοΈ On the System Protection window, click on the button beside Turn on System Protection.
βοΈ You will see βRestore previous versionsβ on a particular folder. So, repeat the steps above to Restore previous versions. π
#lifehack
π6
How to slow down the Internet speed for a certain site
When you download large files, it takes up the Internet channel by 100%. This time users of your Wi-Fi point cannot use the network. So it is better to slow down β¬οΈ the Internet speed for the site from which you are downloading the file.
The file will take longer to download, but everyone will have the Internet. To do this, open the desired site and press the F12 key β the developer tools will open. Go to the "Network" tab, click on the arrow of the "No throttling" item and select "Add".
Click "Add custom profile" and enter the name, download speed, download speed and ping. Select the created profile and reload the page. Done! βοΈ Now you have slowed down the Internet speed for this site, and the traffic is distributed sparingly.
#lifehack
When you download large files, it takes up the Internet channel by 100%. This time users of your Wi-Fi point cannot use the network. So it is better to slow down β¬οΈ the Internet speed for the site from which you are downloading the file.
The file will take longer to download, but everyone will have the Internet. To do this, open the desired site and press the F12 key β the developer tools will open. Go to the "Network" tab, click on the arrow of the "No throttling" item and select "Add".
Click "Add custom profile" and enter the name, download speed, download speed and ping. Select the created profile and reload the page. Done! βοΈ Now you have slowed down the Internet speed for this site, and the traffic is distributed sparingly.
#lifehack
β€3π2
How to check if Telegram is hacked?
Although the messenger has a high degree of protection, it will never be superfluous to make sure of your security. After all, someone could get access to the account, and you didn't even notice it.
1οΈβ£ Open Telegram Settings.
2οΈβ£ Find the item "Privacy and security" or "Privacy".
3οΈβ£ Select "Active Sessions". If you suddenly have an unfamiliar device, turn it off.
Done β !
#security #telegram
Although the messenger has a high degree of protection, it will never be superfluous to make sure of your security. After all, someone could get access to the account, and you didn't even notice it.
1οΈβ£ Open Telegram Settings.
2οΈβ£ Find the item "Privacy and security" or "Privacy".
3οΈβ£ Select "Active Sessions". If you suddenly have an unfamiliar device, turn it off.
Done β !
#security #telegram
β€7π1
Some cool Wikipedia articles you should read it:
πΉ Device Fingerprint
https://en.wikipedia.org/wiki/Device_fingerprint
π² Web Tracking
https://en.wikipedia.org/wiki/Web_tracking
π Anonymous Web Browsing
https://en.wikipedia.org/wiki/Anonymous_web_browsing
πͺ Evercookie
https://en.wikipedia.org/wiki/Evercookie
π‘ Internet Privacy
https://en.wikipedia.org/wiki/Internet_privacy
γοΈ Browser Security
https://en.wikipedia.org/wiki/Browser_security
π΅οΈββοΈ Browser Sniffing
https://en.wikipedia.org/wiki/Browser_sniffing
πΉ Device Fingerprint
https://en.wikipedia.org/wiki/Device_fingerprint
π² Web Tracking
https://en.wikipedia.org/wiki/Web_tracking
π Anonymous Web Browsing
https://en.wikipedia.org/wiki/Anonymous_web_browsing
πͺ Evercookie
https://en.wikipedia.org/wiki/Evercookie
π‘ Internet Privacy
https://en.wikipedia.org/wiki/Internet_privacy
γοΈ Browser Security
https://en.wikipedia.org/wiki/Browser_security
π΅οΈββοΈ Browser Sniffing
https://en.wikipedia.org/wiki/Browser_sniffing
π8β€1
Top 16 Hacking Tools
1. Burpsuite
2. Metasploit
3. Powershell-Suite
4. nmap
5. Wireshark
6. Mimikazt
7. Hashcat
8. John the Ripper
9. Hydra
10. Aircrack-ng
11. Fuzzdb
13. gobuster
14. Acunetix
15. Nessus
16. Cobalt Strike
1. Burpsuite
2. Metasploit
3. Powershell-Suite
4. nmap
5. Wireshark
6. Mimikazt
7. Hashcat
8. John the Ripper
9. Hydra
10. Aircrack-ng
11. Fuzzdb
13. gobuster
14. Acunetix
15. Nessus
16. Cobalt Strike
β€7π4
OVERVIEW OF SOME EMAIL PROVIDERS π§
Disposable email provider
MAILINATOR
Restrictions: Public email addresses
Link : https://www.mailinator.com/
GUERRILLA MAIL
Restrictions: Not a permanent email, 150 MB attachment limit.
Link : https://www.guerrillamail.com/
EMAIL ON DECK
Restrictions: Not a permanent email
Link : https://www.emailondeck.com/
TEMPINBOX
Restrictions: Public email addresses, receiving only
Link : http://tempinbox.com/
MAILNESIA
Restrictions: Public email addresses, receiving only
Link : http://mailnesia.com/
Provider to receive and send
PROTONMAIL
Restrictions: 500 MB of storage space, send 150 emails a day plus free VPN (only one location)
Link : https://protonmail.com/
GMX MAIL
Restrictions: 50MB attachments
Link : https://www.gmx.com/consentpage
TUTANOTA
Restrictions: 1GB of storage space
Link : https://tutanota.com/
YANDEX
Restrictions: β?
Link : https://passport.yandex.com/auth?retpath=https%3A%2F%2Fpassport.yandex.com%2Fprofile&noreturn=1
Disposable email provider
MAILINATOR
Restrictions: Public email addresses
Link : https://www.mailinator.com/
GUERRILLA MAIL
Restrictions: Not a permanent email, 150 MB attachment limit.
Link : https://www.guerrillamail.com/
EMAIL ON DECK
Restrictions: Not a permanent email
Link : https://www.emailondeck.com/
TEMPINBOX
Restrictions: Public email addresses, receiving only
Link : http://tempinbox.com/
MAILNESIA
Restrictions: Public email addresses, receiving only
Link : http://mailnesia.com/
Provider to receive and send
PROTONMAIL
Restrictions: 500 MB of storage space, send 150 emails a day plus free VPN (only one location)
Link : https://protonmail.com/
GMX MAIL
Restrictions: 50MB attachments
Link : https://www.gmx.com/consentpage
TUTANOTA
Restrictions: 1GB of storage space
Link : https://tutanota.com/
YANDEX
Restrictions: β?
Link : https://passport.yandex.com/auth?retpath=https%3A%2F%2Fpassport.yandex.com%2Fprofile&noreturn=1
π5β€3
Search Engine For Hackers
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
π₯5π3β€2π2
π HOW TO UNINSTALL MICROSOFT EDGE BROWSER π
As you can see the guy is saying that you CAN NOT remove MSEdge. Oh really? I uninstalled it πββοΈ
C:\Program Files (x86)\Microsoft\Edge\Application\
Still in File Explorer, open the file folder with the Edge version number.
Go to your version and then into "Installer" directory.
Shift+Right Click -> Open PowerShell.exe
.\setup.exe --uninstall --system-level --verbose-logging --force-uninstall
Wait 1-3 minutes and you'll see MSEdge is vanished πͺ
As you can see the guy is saying that you CAN NOT remove MSEdge. Oh really? I uninstalled it πββοΈ
C:\Program Files (x86)\Microsoft\Edge\Application\
Still in File Explorer, open the file folder with the Edge version number.
Go to your version and then into "Installer" directory.
Shift+Right Click -> Open PowerShell.exe
.\setup.exe --uninstall --system-level --verbose-logging --force-uninstall
Wait 1-3 minutes and you'll see MSEdge is vanished πͺ
π4
βοΈ What is password salting ?
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.
Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks.
βοΈ Password hashing and why salting is required
Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.
When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.
Share and Support
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.
Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks.
βοΈ Password hashing and why salting is required
Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.
When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.
Share and Support
π8
What are Hacking Tools?
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution.
π Which are the Best Ethical Hacking Tools?
Below are some of the Best Ethical Hacking Tools:
Netsparker
Acunetix
SolarWinds Security Event Manager
Traceroute NG
Burp Suite
Ettercap
Aircrack
Angry IP Scanner
β How to use Hacking Software?
Here is how you can use hacking software:
Step 1) Download and install any hacking software you like from the above-given hacking websites list
Step 2) Once installed, launch the software
Step 3) Select and set the startup options for the hacking tool
Step 4) Explore the interface and functionalities of the hacker tool
Step 5) Start testing the software using a preconfigured external browser
Step 6) Using hacking software, you can also scan a website or perform penetration testing
β‘ Is it Legal to use Hacking Tools?
It is legal to use Hacking tools for whitehat hacking purposes. Itβs important that you take written permission from the target site before you launch a penetration attack. Without a permission any good intented hacking attempt will land you in legal trouble.
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution.
π Which are the Best Ethical Hacking Tools?
Below are some of the Best Ethical Hacking Tools:
Netsparker
Acunetix
SolarWinds Security Event Manager
Traceroute NG
Burp Suite
Ettercap
Aircrack
Angry IP Scanner
β How to use Hacking Software?
Here is how you can use hacking software:
Step 1) Download and install any hacking software you like from the above-given hacking websites list
Step 2) Once installed, launch the software
Step 3) Select and set the startup options for the hacking tool
Step 4) Explore the interface and functionalities of the hacker tool
Step 5) Start testing the software using a preconfigured external browser
Step 6) Using hacking software, you can also scan a website or perform penetration testing
β‘ Is it Legal to use Hacking Tools?
It is legal to use Hacking tools for whitehat hacking purposes. Itβs important that you take written permission from the target site before you launch a penetration attack. Without a permission any good intented hacking attempt will land you in legal trouble.
π6β€2π1