Forwarded from Hacking Python Course Coding
This media is not supported in your browser
VIEW IN TELEGRAM
π° How To make Azure RDP For 1 Hours | 100% Repeatable Method π°
Method: 1
1. Open New Incognito Window in Chrome.
2. Open This Link: https://docs.microsoft.com/en-us/learn/modules/create-windows-virtual-machine-in-azure/
3. Click on the Blue "Start" Button.
4. Scroll Down and Click Blue "Continue" till You Reach Unit 3 of 7.
5. Click on the White "Sign in to activate sandbox" Button. It Will Redirect You to Microsoft Page.
6. Click on "Create One!" Button
7. Now You have 2 Options Whether You Choose to Sign up through outlook or Hotmail or You Can Use Temp Mail From Tempmail.com
8. Fill in All necessary Details, Solve the Puzzle and Make New Account.
9. Wait for 1-2 Second Than Click on Next Button and Choose any Display Name & Country.
10. Select "Student" In Roles and "Beginner" in Level and "Azure" in Products and click ok.
11. Now Scroll and Click Continue till you reach Unit 5 of 7.
12. Now scroll a little bit and find and Click on Azure Portal written in blue under "Download the RDP file" Heading.
13. It will open a new tab. Now sign in with the Same Account Here and then click on the subscription button on the Azure portal.
14. As You can see there is not any active subscription. So go back to the fast tab and scroll up and click on the White "Activate Sandbox" Button.
15. Now wait for some loading then scroll down and click on continue till you finish the topic and then go back to the 2nd tab and reload You will Get Subscription For 1 Hour
Now You can Create RDP with This Method. Note: It shows sometimes an error that Sandbox Suspended Because of unusual activity. No Worry just change IP or wait for 1-2 hours It will Work again. (You can also make a new RDP on the old RDP It will save you from suspension ). For Educational purposes only.
β @TechM_8 β
Method: 1
1. Open New Incognito Window in Chrome.
2. Open This Link: https://docs.microsoft.com/en-us/learn/modules/create-windows-virtual-machine-in-azure/
3. Click on the Blue "Start" Button.
4. Scroll Down and Click Blue "Continue" till You Reach Unit 3 of 7.
5. Click on the White "Sign in to activate sandbox" Button. It Will Redirect You to Microsoft Page.
6. Click on "Create One!" Button
7. Now You have 2 Options Whether You Choose to Sign up through outlook or Hotmail or You Can Use Temp Mail From Tempmail.com
8. Fill in All necessary Details, Solve the Puzzle and Make New Account.
9. Wait for 1-2 Second Than Click on Next Button and Choose any Display Name & Country.
10. Select "Student" In Roles and "Beginner" in Level and "Azure" in Products and click ok.
11. Now Scroll and Click Continue till you reach Unit 5 of 7.
12. Now scroll a little bit and find and Click on Azure Portal written in blue under "Download the RDP file" Heading.
13. It will open a new tab. Now sign in with the Same Account Here and then click on the subscription button on the Azure portal.
14. As You can see there is not any active subscription. So go back to the fast tab and scroll up and click on the White "Activate Sandbox" Button.
15. Now wait for some loading then scroll down and click on continue till you finish the topic and then go back to the 2nd tab and reload You will Get Subscription For 1 Hour
Now You can Create RDP with This Method. Note: It shows sometimes an error that Sandbox Suspended Because of unusual activity. No Worry just change IP or wait for 1-2 hours It will Work again. (You can also make a new RDP on the old RDP It will save you from suspension ). For Educational purposes only.
β @TechM_8 β
π23β€3
Forwarded from Hacking Python Course Coding
This media is not supported in your browser
VIEW IN TELEGRAM
π4
β¨οΈHow to know the site you are using is safe or not?
πSafety tips to be safe
https://telegra.ph/How-to-check-if-a-site-is-secure-or-not-08-04
π’Share and support us for more π’
@TechM_8
πSafety tips to be safe
https://telegra.ph/How-to-check-if-a-site-is-secure-or-not-08-04
π’Share and support us for more π’
@TechM_8
π8
β¨οΈ How to change adminstration password in Windows 10 without knowing the current passwordπ€
Step 1: Open a desktop or mobile browser and visit live.com password reset page from here (https://account.live.com/password/reset).
Step 2: Enter the email address registered with that Microsoft account.
Step 3: After that, you need to enter recovery email address or phone number to get the confirmation code. Provide the same and then click on the Nextbutton.
Step 4: Now, get the source that you provided in the above step and note down the code send by Microsoft.
Step 5: Move to the recovery page of Microsoft and then enter the security code, and further click on the Verify button.
Step 6: If the verification is successful, then you can set a new password for future login.
β£Share and Support Usβ£
Step 1: Open a desktop or mobile browser and visit live.com password reset page from here (https://account.live.com/password/reset).
Step 2: Enter the email address registered with that Microsoft account.
Step 3: After that, you need to enter recovery email address or phone number to get the confirmation code. Provide the same and then click on the Nextbutton.
Step 4: Now, get the source that you provided in the above step and note down the code send by Microsoft.
Step 5: Move to the recovery page of Microsoft and then enter the security code, and further click on the Verify button.
Step 6: If the verification is successful, then you can set a new password for future login.
β£Share and Support Usβ£
π18π₯3
βοΈ How to hide a virus in a picture?
Greetings to trojan readers!
Today we will consider one of the simplest ways to disguise malware. Despite his prostate, he works to this day. With the help of it, stealers, keyloggers and other nasty things are still masked.
1. Create a folder and drag our picture and virus there.
2. Go to iconvertcom and create an icon for our picture (in the format settings, choose from 16x16 to 256x256). Next, click on "Convert ICO" and download our icon.
3. Don't touch the icon yet. We return to the folder> select the image and the virus> add to the archive.
4. In the parameters of the archive, do the following. Click on "Create self-extracting archive" (general tab)> "SFX options" (additional tab)> Go to "Update" and click on "extract and update all files" and "overwrite all files without prompting".
5. Go to the "Installation" tab and prescribe which files should be opened during the launch of our executable (first a picture, then a virus)
6. Go to the "Mode" tab and click on "Unpack to a temporary folder" and "hide all"
6. Go to the "text and graphics" tab and load our icon (icon). So, we replaced the archive icon with the icon of our picture.
7. Now we have an executable (exemple.exe) with our photo icon. Pretty pale, so we'll use one trick.
We rename our file, namely we enter between the name and the point "gpj" (exemplegpj.exe). Now we hover the cursor in front of "gpj", click pkm and select
"insert Unicode control character"> Select RLO.
All. Our virus is disguised in a picture, and the file does not look like exemple.exe, but exemple.jpgββ
β@TechM_8β
Greetings to trojan readers!
Today we will consider one of the simplest ways to disguise malware. Despite his prostate, he works to this day. With the help of it, stealers, keyloggers and other nasty things are still masked.
1. Create a folder and drag our picture and virus there.
2. Go to iconvertcom and create an icon for our picture (in the format settings, choose from 16x16 to 256x256). Next, click on "Convert ICO" and download our icon.
3. Don't touch the icon yet. We return to the folder> select the image and the virus> add to the archive.
4. In the parameters of the archive, do the following. Click on "Create self-extracting archive" (general tab)> "SFX options" (additional tab)> Go to "Update" and click on "extract and update all files" and "overwrite all files without prompting".
5. Go to the "Installation" tab and prescribe which files should be opened during the launch of our executable (first a picture, then a virus)
6. Go to the "Mode" tab and click on "Unpack to a temporary folder" and "hide all"
6. Go to the "text and graphics" tab and load our icon (icon). So, we replaced the archive icon with the icon of our picture.
7. Now we have an executable (exemple.exe) with our photo icon. Pretty pale, so we'll use one trick.
We rename our file, namely we enter between the name and the point "gpj" (exemplegpj.exe). Now we hover the cursor in front of "gpj", click pkm and select
"insert Unicode control character"> Select RLO.
All. Our virus is disguised in a picture, and the file does not look like exemple.exe, but exemple.jpgββ
β@TechM_8β
π15π±3β€1
This media is not supported in your browser
VIEW IN TELEGRAM
π° GET 60 Days SkillShare Premium for FREE! April 2021 Method π°
Get EDU email from somewhere and go to below link
https://www.skillshare.com/schoolverification
Enjoy πβ€οΈ
β @TechM_8 β
Get EDU email from somewhere and go to below link
https://www.skillshare.com/schoolverification
Enjoy πβ€οΈ
β @TechM_8 β
π5β€βπ₯1β€1
Forwarded from Hacking Python Course Coding
This media is not supported in your browser
VIEW IN TELEGRAM
π5
πΊBasic Terms Of Hackingπ»
βͺοΈPhishing
βͺοΈMalware
βͺοΈSpoofing
βͺοΈEncryption
βͺοΈAdware
βͺοΈBrute Force Attack
βͺοΈKeylogger
βͺοΈBot
βͺοΈBotnet
βͺοΈRAT
βͺοΈBackdoor
βͺοΈFirewall
βͺοΈPayload
βͺοΈWorm
βͺοΈDdos
βͺοΈXSS
https://telegra.ph/Basic-Terms-of-Hacking-04-29
βͺοΈPhishing
βͺοΈMalware
βͺοΈSpoofing
βͺοΈEncryption
βͺοΈAdware
βͺοΈBrute Force Attack
βͺοΈKeylogger
βͺοΈBot
βͺοΈBotnet
βͺοΈRAT
βͺοΈBackdoor
βͺοΈFirewall
βͺοΈPayload
βͺοΈWorm
βͺοΈDdos
βͺοΈXSS
https://telegra.ph/Basic-Terms-of-Hacking-04-29
Telegraph
Basic Terms of Hacking
1. Phishing
π23π±3β€βπ₯2π€―2β€1
This media is not supported in your browser
VIEW IN TELEGRAM
βοΈ Difference between Virus, Worms and Trojan Horse.
In this article you will learn what is ransomware and will know the difference between viruses, worms and trojan horse.
https://telegra.ph/Ransomware-Virus-Worms-Trojan-05-10
In this article you will learn what is ransomware and will know the difference between viruses, worms and trojan horse.
https://telegra.ph/Ransomware-Virus-Worms-Trojan-05-10
Telegraph
Ransomware, Virus, Worms, Trojan
β’ Ransomware Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way that is not difficult for a knowledgeableβ¦
π10
π’ How to add a voice welcome message on your PC π’
βοΈ Your PC will welcome you on every startup.
https://telegra.ph/How-to-add-a-custom-voice-message-to-Windows-1078-02-28
βοΈ Your PC will welcome you on every startup.
https://telegra.ph/How-to-add-a-custom-voice-message-to-Windows-1078-02-28
Telegraph
How to add a custom voice message to Windows 10/7/8:
The method takes the help of a text file to play the computerized audio recording of any welcome message you would like to hear at Windows startup. You can follow the steps below to add the custom welcome message to Windows 10 or earlier versions. First ofβ¦
π9π€―3β€2
This media is not supported in your browser
VIEW IN TELEGRAM
THESE ARE THE MEANING OF THE FOLLOWING ABBREVIATIONS.
___________________________
1.) GOOGLE - Global Organization Of Oriented Group Language Of Earth.
2.) YAHOO - Yet Another Hierarchical Officious Oracle.
3.) WINDOW - Wide Interactive Network Development for Office work Solution.
4.) COMPUTER - Common Oriented Machine Particularly United and used under Technical and Educational Research.
5.) VIRUS - Vital Information Resources Under Siege.
6.) UMTS - Universal Mobile Telecommunicati ons System.
7.) AMOLED - Active-matrix organic light-emitting diode.
8.) OLED - Organic light-emitting diode.
9.) IMEI - International Mobile Equipment Identity.
10.) ESN - Electronic Serial Number.
11.) UPS - Uninterruptible power supply.
12. HDMI - High-Definition Multimedia Interface.
13.) VPN - Virtual private network.
14.) APN - Access Point Name.
15.) SIM - Subscriber Identity Module.
16.) LED - Light emitting diode.
17.) DLNA - Digital Living Network Alliance.
18.) RAM - Random access memory.
19.) ROM - Read only memory.
20.) VGA - Video Graphics Array.
21.) QVGA - Quarter Video Graphics Array.
22.) WVGA - Wide video graphics array.
23.) WXGA - Widescreen Extended Graphics Array.
24.) USB - Universal serial Bus.
25.) WLAN - Wireless Local Area Network.
26.) PPI - Pixels Per Inch.
27.) LCD - Liquid Crystal Display.
28.) HSDPA - High speed down-link packet access.
29.) HSUPA - High-Speed Uplink Packet Access.
30.) HSPA - High Speed Packet Access.
31.) GPRS - General Packet Radio Service.
32.) EDGE - Enhanced Data Rates for Globa Evolution.
33.) NFC - Near field communication.
34.) OTG - On-the-go.
35.) S-LCD - Super Liquid Crystal Display.
36.) O.S - Operating system.
37.) SNS - Social network service.
38.) H.S - HOTSPOT.
39.) P.O.I - Point of interest.
40.) GPS - Global Positioning System.
41.) DVD - Digital Video Disk.
42.) DTP - Desk top publishing.
43.) DNSE - Digital natural sound engine.
44.) OVI - Ohio Video Intranet.
45.) CDMA - Code Division Multiple Access.
46.) WCDMA - Wide-band Code Division Multiple Access.
47.) GSM - Global System for Mobile Communications.
48.) WI-FI - Wireless Fidelity.
49.) DIVX - Digital internet video access.
50.) APK - Authenticated public key.
51.) J2ME - Java 2 micro edition.
52.) SIS - Installation
53.) DELL - Digital electronic link library.
54.) ACER - Acquisition Collaboration Experimentation Reflection.
55.) RSS - Really simple syndication.
56.) TFT - Thin film
57.) AMR- Adaptive Multi-Rate.
58.) MPEG - moving pictures experts group.
59.) IVRS - Interactive Voice Response System.
60.) HP - Hewlett
Packard.
___________________________
1.) GOOGLE - Global Organization Of Oriented Group Language Of Earth.
2.) YAHOO - Yet Another Hierarchical Officious Oracle.
3.) WINDOW - Wide Interactive Network Development for Office work Solution.
4.) COMPUTER - Common Oriented Machine Particularly United and used under Technical and Educational Research.
5.) VIRUS - Vital Information Resources Under Siege.
6.) UMTS - Universal Mobile Telecommunicati ons System.
7.) AMOLED - Active-matrix organic light-emitting diode.
8.) OLED - Organic light-emitting diode.
9.) IMEI - International Mobile Equipment Identity.
10.) ESN - Electronic Serial Number.
11.) UPS - Uninterruptible power supply.
12. HDMI - High-Definition Multimedia Interface.
13.) VPN - Virtual private network.
14.) APN - Access Point Name.
15.) SIM - Subscriber Identity Module.
16.) LED - Light emitting diode.
17.) DLNA - Digital Living Network Alliance.
18.) RAM - Random access memory.
19.) ROM - Read only memory.
20.) VGA - Video Graphics Array.
21.) QVGA - Quarter Video Graphics Array.
22.) WVGA - Wide video graphics array.
23.) WXGA - Widescreen Extended Graphics Array.
24.) USB - Universal serial Bus.
25.) WLAN - Wireless Local Area Network.
26.) PPI - Pixels Per Inch.
27.) LCD - Liquid Crystal Display.
28.) HSDPA - High speed down-link packet access.
29.) HSUPA - High-Speed Uplink Packet Access.
30.) HSPA - High Speed Packet Access.
31.) GPRS - General Packet Radio Service.
32.) EDGE - Enhanced Data Rates for Globa Evolution.
33.) NFC - Near field communication.
34.) OTG - On-the-go.
35.) S-LCD - Super Liquid Crystal Display.
36.) O.S - Operating system.
37.) SNS - Social network service.
38.) H.S - HOTSPOT.
39.) P.O.I - Point of interest.
40.) GPS - Global Positioning System.
41.) DVD - Digital Video Disk.
42.) DTP - Desk top publishing.
43.) DNSE - Digital natural sound engine.
44.) OVI - Ohio Video Intranet.
45.) CDMA - Code Division Multiple Access.
46.) WCDMA - Wide-band Code Division Multiple Access.
47.) GSM - Global System for Mobile Communications.
48.) WI-FI - Wireless Fidelity.
49.) DIVX - Digital internet video access.
50.) APK - Authenticated public key.
51.) J2ME - Java 2 micro edition.
52.) SIS - Installation
53.) DELL - Digital electronic link library.
54.) ACER - Acquisition Collaboration Experimentation Reflection.
55.) RSS - Really simple syndication.
56.) TFT - Thin film
57.) AMR- Adaptive Multi-Rate.
58.) MPEG - moving pictures experts group.
59.) IVRS - Interactive Voice Response System.
60.) HP - Hewlett
Packard.
π60β€7π₯7π€―4β€βπ₯3