#ክፍል 2
ፓይዘን
ጽሑፍ ማተም
የህትመት መግለጫው በርካታ የጽሑፍ መስመሮችን ለማውጣት ሊያገለግል ይችላል ፡፡
ለምሳሌ:
ማተሚያ ('hello world!')
ማተሚያ ('hello world!')
ማተሚያ ('አይፈለጌ መልእክት እና እንቁላል ...')
#ማስታወሻ
የፒቲን ኮድ ብዙውን ጊዜ ለሞቲክ ፓይቲን አስቂኝ ቡድን ማጣቀሻዎችን ይ containsል ፡፡ ለዚህም ነው “አይፈለጌ መልእክት” እና “እንቁላል” የሚሉት ቃላት ብዙውን ጊዜ “foo” እና “አሞሌ” በሌሎች የፕሮግራም ቋንቋዎች ውስጥ በሚጠቀሙባቸው በፓይዘን ውስጥ እንደ የቦታ ማስያዥያ ተለዋዋጮች የሚጠቀሙበት ፡፡
እያንዳንዱ የህትመት መግለጫ ጽሑፍ ከአዲስ መስመር ያወጣል ፡፡
# reር ያድርጉ
@ethio_techzone
ፓይዘን
ጽሑፍ ማተም
የህትመት መግለጫው በርካታ የጽሑፍ መስመሮችን ለማውጣት ሊያገለግል ይችላል ፡፡
ለምሳሌ:
ማተሚያ ('hello world!')
ማተሚያ ('hello world!')
ማተሚያ ('አይፈለጌ መልእክት እና እንቁላል ...')
#ማስታወሻ
የፒቲን ኮድ ብዙውን ጊዜ ለሞቲክ ፓይቲን አስቂኝ ቡድን ማጣቀሻዎችን ይ containsል ፡፡ ለዚህም ነው “አይፈለጌ መልእክት” እና “እንቁላል” የሚሉት ቃላት ብዙውን ጊዜ “foo” እና “አሞሌ” በሌሎች የፕሮግራም ቋንቋዎች ውስጥ በሚጠቀሙባቸው በፓይዘን ውስጥ እንደ የቦታ ማስያዥያ ተለዋዋጮች የሚጠቀሙበት ፡፡
እያንዳንዱ የህትመት መግለጫ ጽሑፍ ከአዲስ መስመር ያወጣል ፡፡
# reር ያድርጉ
@ethio_techzone
IDM_v6.38_b5_AIOsetup.zip
8 MB
IDM - Internet Download Manager v6.38
ለኮምፒውተር የሚሆን ፈጣን ማንኛዉኔም ፋይል ማውረጃ
ከሌላዉ የሚለየዉ የኢንተርኔቱን ፍጥነት ሙሉ አቅም ይጠቀማል።
የኢንተርኔት መቆራረጥ ምክያት ቢቆምብን እንኳን ባስፈለገን ሰአት ካቆመበት ማስቀጠል ይችላሉ
በነፃ Update ሳያደርጉ መጠቀም ይችላሉ።
!!! Cracked !!!
ለኮምፒውተር የሚሆን ፈጣን ማንኛዉኔም ፋይል ማውረጃ
ከሌላዉ የሚለየዉ የኢንተርኔቱን ፍጥነት ሙሉ አቅም ይጠቀማል።
የኢንተርኔት መቆራረጥ ምክያት ቢቆምብን እንኳን ባስፈለገን ሰአት ካቆመበት ማስቀጠል ይችላሉ
በነፃ Update ሳያደርጉ መጠቀም ይችላሉ።
!!! Cracked !!!
Telegram eye.apk
5.5 MB
ቴሌግራማችን መጠለፉና አለመጠለፉን የሚነግረን app እና ማን እንዳደረገን የሚነግር
#TikvahFamily
ሀሰተኛ ፎቶዎች/ምስሎችን እንዴት ልለይ ?
ሀገራችን ያለችበትን 'ከባድ ውጥረት' ሁላችንም የምናውቀው ነው። ይህን ተንተርሶ እጅግ በጣም ብዙ "ሀሰተኛ ፎቶዎች" እየተሰራጩ እንደሆነ ተመልክተናል።
ስለዚህ በማህበራዊ ሚዲያዎች ላይ የሚያጠራጥራችሁን ፎቶ ስትመለከቱ በቀላሉ የትኛውንም ሚዲያ ወይም ግለሰብ እንዲያጣራላችሁ ሳትጠብቁ በእጅ ስልካችሁ ማረጋግጥ ትችላላችሁ።
በቅደሚያ 'ሀሰተኛ' የመሰላችሁን ፎቶ/ምስል ወደ ስልካችሁ Save አድርጉት።
በቀላሉ ስልካችሁ ላይ "Google Chrome App" ካለ ፦
-www.google.com ግቡ
-ወደ Desktop Site ቀይሩት
-በቀኝ በኩል ከላይ Image የሚለውን ምረጡ
-የካሜራ ምልክቱን ተጫኑ የፎቶውን URL/ፎቶውን Upload አድርጉት።
ሀሰተኛ ፎቶዎች/ምስሎችን እንዴት ልለይ ?
ሀገራችን ያለችበትን 'ከባድ ውጥረት' ሁላችንም የምናውቀው ነው። ይህን ተንተርሶ እጅግ በጣም ብዙ "ሀሰተኛ ፎቶዎች" እየተሰራጩ እንደሆነ ተመልክተናል።
ስለዚህ በማህበራዊ ሚዲያዎች ላይ የሚያጠራጥራችሁን ፎቶ ስትመለከቱ በቀላሉ የትኛውንም ሚዲያ ወይም ግለሰብ እንዲያጣራላችሁ ሳትጠብቁ በእጅ ስልካችሁ ማረጋግጥ ትችላላችሁ።
በቅደሚያ 'ሀሰተኛ' የመሰላችሁን ፎቶ/ምስል ወደ ስልካችሁ Save አድርጉት።
በቀላሉ ስልካችሁ ላይ "Google Chrome App" ካለ ፦
-www.google.com ግቡ
-ወደ Desktop Site ቀይሩት
-በቀኝ በኩል ከላይ Image የሚለውን ምረጡ
-የካሜራ ምልክቱን ተጫኑ የፎቶውን URL/ፎቶውን Upload አድርጉት።
🔰What is Cryptography?🔰
🌀Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.
🌀Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQXG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.
🌀The process of transforming information into nonhuman readable form is called encryption.
🌀The process of reversing encryption is called decryption.
🌀Decryption is done using a secret key which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it will not make sense to them.
🌀The encrypted information is known as a cipher.
✨ Credit : gray hat hacker
Share and Support ❤️
➖ @ethio_techzone
🌀Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.
🌀Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQXG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done.
🌀The process of transforming information into nonhuman readable form is called encryption.
🌀The process of reversing encryption is called decryption.
🌀Decryption is done using a secret key which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manages to get the information, it will not make sense to them.
🌀The encrypted information is known as a cipher.
✨ Credit : gray hat hacker
Share and Support ❤️
➖ @ethio_techzone
🔰How To Remove Shortcut Virus From Your Pc🔰
By ©metasploitframeworks
November 2020
✅ Method 1.
- Clean up and remove Shortcut Virus by CMD -
1. Click on Start and select Run;
2. Type: CMD and Hit Enter to open Command Prompt;
3. Type the drive letter of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.)
4. Type: attrib g:. /d /s -h -r -s and hit Enter.
You’ll be able to see your files and data on Windows PC or USB flash drive now.
✅Method 2.
-Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software-
If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try
➡️Trojan Removal Tool;
➡️Shortcut virus fixfolder;
➡️Malwarebytes Anti-Malware, etc.
✅Method 3.
- Delete/Wipe Shortcut Virus from Registry -
1. Press Win+R and type: regedit to enter the registry;
2. Navigate to HKEYCURRENTUSER > Click on Software > Microsoft > Windows > CurrentVersion > Click Run;
3. Press Win + R, type: msconfig > Click OK;
4. In Startup, uncheck everything except for the anti-virus software.
5. Click OK > Click Restart now.
✅ Method 4
- Remove It By .bat File -
1. Open notepad
2. Copy & paste below given code
@ethio_techzone
attrib -h -s -r -a /s /d NameDrive:*.*
attrib -h -s -r -a /s /d NameDrive:.
attrib -h -s -r -a /s /d NameDrive:*.*
@ethio_techzone
3. Save the file with remove virus.bat
"Now replace the Namedrive with infected drive name , if you have more than 3 drive simply copy and paste the command"
4. Now simply close the file and run it.
-Once everything done …remove file from drive and folder too-
@ethio_techzone
November 2020
#Skills
By ©metasploitframeworks
November 2020
✅ Method 1.
- Clean up and remove Shortcut Virus by CMD -
1. Click on Start and select Run;
2. Type: CMD and Hit Enter to open Command Prompt;
3. Type the drive letter of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.)
4. Type: attrib g:. /d /s -h -r -s and hit Enter.
You’ll be able to see your files and data on Windows PC or USB flash drive now.
✅Method 2.
-Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software-
If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try
➡️Trojan Removal Tool;
➡️Shortcut virus fixfolder;
➡️Malwarebytes Anti-Malware, etc.
✅Method 3.
- Delete/Wipe Shortcut Virus from Registry -
1. Press Win+R and type: regedit to enter the registry;
2. Navigate to HKEYCURRENTUSER > Click on Software > Microsoft > Windows > CurrentVersion > Click Run;
3. Press Win + R, type: msconfig > Click OK;
4. In Startup, uncheck everything except for the anti-virus software.
5. Click OK > Click Restart now.
✅ Method 4
- Remove It By .bat File -
1. Open notepad
2. Copy & paste below given code
@ethio_techzone
attrib -h -s -r -a /s /d NameDrive:*.*
attrib -h -s -r -a /s /d NameDrive:.
attrib -h -s -r -a /s /d NameDrive:*.*
@ethio_techzone
3. Save the file with remove virus.bat
"Now replace the Namedrive with infected drive name , if you have more than 3 drive simply copy and paste the command"
4. Now simply close the file and run it.
-Once everything done …remove file from drive and folder too-
@ethio_techzone
November 2020
#Skills
🔸Termux make-call
🔺 Now open Termux and follow these steps
installation
$
$
$
$
❗️9999999999 = Number of Victem
@ethio_techzone
@ethio_techzone
▬ Share ▬
🔺 Now open Termux and follow these steps
installation
$
apt update
$
apt upgrade
$
apt install termux-api
call process :
$
termux-telephony-call 9999999999
❗️9999999999 = Number of Victem
@ethio_techzone
@ethio_techzone
▬ Share ▬
Z-Phisher multiple phishing tool.
$ apt update && apt upgrade
$ apt install git
$ git clone git://github.com/htr-tech/zphisher.git
$ cd zphisher
$ bash zphisher.sh
$ apt update && apt upgrade
$ apt install git
$ git clone git://github.com/htr-tech/zphisher.git
$ cd zphisher
$ bash zphisher.sh
🟥🔲🔳Hack Facebook Account Password Using Brute Force▫️🔲🔳
By ©@metasploit_frameworks
September 2020
1️⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2️⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List! (Below)
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py *
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
🔶🔹🔸🟥🟡🟧🟢🟪🟤🟩🟣🟦🔸🔹🔶
Cracked SEO tools
Collection Found on Mega Cloud
Full Cracked Seo Tools Free
Link:
https://mega.nz/#F!if5UFSpI!F4CbGikZA2A_g2pJ14qjbw
⏯Nb: This is strickly for educational purposes only
🟥🔲🔳Hack Facebook Account Password Using Brute Force▫️🔲🔳
@ethio_techzone
Sept 2020.
By ©@metasploit_frameworks
September 2020
1️⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
2️⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”
But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.
Requirement
A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List! (Below)
STEPS
Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize
Step 2. Add facebook.py using the command below
~# chmod +x facebook.py *
~# python facebook.py
Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,
Step 4. Now Give The "Path" Of Your CrackStation Word list
Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
🔶🔹🔸🟥🟡🟧🟢🟪🟤🟩🟣🟦🔸🔹🔶
Cracked SEO tools
Collection Found on Mega Cloud
Full Cracked Seo Tools Free
Link:
https://mega.nz/#F!if5UFSpI!F4CbGikZA2A_g2pJ14qjbw
⏯Nb: This is strickly for educational purposes only
🟥🔲🔳Hack Facebook Account Password Using Brute Force▫️🔲🔳
@ethio_techzone
Sept 2020.
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
◽️ Termux Update ለማድረግ
$ clear
$ apt update && apt upgrade
$ pkg update
$ pkg update && pkg upgrade
$ pkg install python
$ pkg install python2
$ pkg install git ruby
$ pkg install figlet
$ gem install lolcat
$ pip2 install --upgrade pip
$ pip2 install -r
▬ Share ▬
@ethio_techzone
@ethio_techzone
$ clear
$ apt update && apt upgrade
$ pkg update
$ pkg update && pkg upgrade
$ pkg install python
$ pkg install python2
$ pkg install git ruby
$ pkg install figlet
$ gem install lolcat
$ pip2 install --upgrade pip
$ pip2 install -r
▬ Share ▬
@ethio_techzone
@ethio_techzone
💥ሰላም👋 የ KB Tech ቤተሰቦች በ ዛሬው ቪዲዮ Html code ሚቶረጉም App አሰራር እናያለን
https://youtu.be/IvxYOI4Aw5A
Subscribe, Like, Share
Join and share
@KBTech2
@programingandhacking
https://youtu.be/IvxYOI4Aw5A
Subscribe, Like, Share
Join and share
@KBTech2
@programingandhacking
YouTube
Html code ሚቶረጉም App አሰራር | Html viewer app in sketchware
Html code ሚቶረጉም App አሰራር
**Subscribe, Like, Share**
Join my telegram channel
https://t.me/KBTech2
**Subscribe, Like, Share**
Join my telegram channel
https://t.me/KBTech2
🔰FACEBOOK PHISHING HACKING🔰
Requirements
1.Live internet connection
2.Phone,computer
STEPS
🔷 Launched your web browser and Open this website SHADOWAVE
🔹Being a new user click on sign up.Fill the form
Now select sign up and wait for the page to load
🔷 Now select any of the option available: Facebook profile Facebook app
Now create your page and fill
🔷 After filling the form select create and select click here
🔷 Copy the link and send it to your victim
⚠️ Make a smart link human hacking 😊
Eg. click on this link login into your Facebook account and get 500 likes on your photo
After sending links you wait to get a victim if someone falls in the trap.
You log in into your shadow wave account and check here.You can enable notification
❌FOR EDUCATIONAL PURPOSE ONLY
© Hackbox
➖ @programingandhacking ➖
Requirements
1.Live internet connection
2.Phone,computer
STEPS
🔷 Launched your web browser and Open this website SHADOWAVE
🔹Being a new user click on sign up.Fill the form
Now select sign up and wait for the page to load
🔷 Now select any of the option available: Facebook profile Facebook app
Now create your page and fill
🔷 After filling the form select create and select click here
🔷 Copy the link and send it to your victim
⚠️ Make a smart link human hacking 😊
Eg. click on this link login into your Facebook account and get 500 likes on your photo
After sending links you wait to get a victim if someone falls in the trap.
You log in into your shadow wave account and check here.You can enable notification
❌FOR EDUCATIONAL PURPOSE ONLY
© Hackbox
➖ @programingandhacking ➖
Forwarded from Airdrop Hunter (厶工尺凵从 ×_×)
🆔: How To Get Popular & Get Real Followers On Instagram For Free Without Surveying Or Stress
✏️: 100% Working(Tested✅)
Click on the link👇and follow instruction
http://t.me/likefollowbot?start=980006015
http://t.me/likefollowbot?start=980006015
And Then Start Gaining Followers✅
Don't Forget To Join My Channel👇
➖➖➖@capl_pict➖➖➖➖
✏️: 100% Working(Tested✅)
Click on the link👇and follow instruction
http://t.me/likefollowbot?start=980006015
http://t.me/likefollowbot?start=980006015
And Then Start Gaining Followers✅
Don't Forget To Join My Channel👇
➖➖➖@capl_pict➖➖➖➖
PROGRAMMERS TECH via @vid
YouTube
learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)
hide yourself, become anonymous with Kali Linux and ProxyChains, learn more here: (30% OFF): https://bit.ly/itprotvnetchuck or use code "networkchuck" (affiliate link)
**This video and my entire CEHv10 journey is sponsored by ITProTV
watch the entire series:…
**This video and my entire CEHv10 journey is sponsored by ITProTV
watch the entire series:…
🛑🎩INTERESTING FACTS ABOUT GOOGLE🛑🎩
----------------------------------------------------------------------------------------------------
HACKING TRICKS & TUTORIALS By
----------------------------------------------------------------------------------------------------
1. The name GOOGLE was an accident. A spelling mistake
made by the original founders who thought they were going for
GOOGOL. Googol is a mathematical term 1 followed by one hundred zeroes.
2. Google started in January, 1996 as a research project at Stanford University by Ph.D
students Larry Page and Sergey Brin.
3. 97% of Google revenue comes from their advertising services.
4. The biggest break in search came when Google introduced
their improved spell checker seen as 'Did you mean?'. This feature doubled their traffic.
5. The infamous 'I’m feeling lucky' button is nearly never used.
However, in trials it was found that removing it would somehow
reduce the Google experience. Users wanted it kept. It was a
comfort button.
----------------------------------------------------------------------------------------------------
HACKING TRICKS & TUTORIALS By
----------------------------------------------------------------------------------------------------
1. The name GOOGLE was an accident. A spelling mistake
made by the original founders who thought they were going for
GOOGOL. Googol is a mathematical term 1 followed by one hundred zeroes.
2. Google started in January, 1996 as a research project at Stanford University by Ph.D
students Larry Page and Sergey Brin.
3. 97% of Google revenue comes from their advertising services.
4. The biggest break in search came when Google introduced
their improved spell checker seen as 'Did you mean?'. This feature doubled their traffic.
5. The infamous 'I’m feeling lucky' button is nearly never used.
However, in trials it was found that removing it would somehow
reduce the Google experience. Users wanted it kept. It was a
comfort button.
🔰TELEGRAM VERIFIED HACKED APPS CHANNEL🔰
●This Channel Is Private And Doesn't Exist For Normal Members,
●This Channel Is Telegram Certified Hacked Apps Channel
🔗 Link :-
https://t.me/joinchat/UXYviRbYZOPvco52
⭕ Deleting In 5 Minutes Join This Private Channel Fast
●This Channel Is Private And Doesn't Exist For Normal Members,
●This Channel Is Telegram Certified Hacked Apps Channel
🔗 Link :-
https://t.me/joinchat/UXYviRbYZOPvco52
⭕ Deleting In 5 Minutes Join This Private Channel Fast
✳️ሰላም ውድ የ Mame Tech ቤተሰቦች ዛሬ ስለ ሳይበር ወንጀለኞች አጠር ያለች ማብራሪያ ይዤላቹ መጥቻለው።
🔻የሳይበር ወንጀለኞች በተለያዩ መንገዶች የተለያዩ የሳይበር ጥቃቶችን ይፈፅማሉ። በሀገራችን የሳይበር ጥቃት ከተፈፀመባቸው ድርጅቶች አንዱ Ethio Telecom ነው።
🔻በ2020 በተደረገው ጥናት መሰረት የሳይበር ጥቃት የሚፈፀምበት አንዱ መንገድ የተለያዩ የ Mobile እና የ Computer Virus በማዘጋጀት የተለያዩ ጥቃቶችን በመፈፀም ላይ ይገኛሉ።
ምን አይነት ቫይረሶች ናቸው ለሚለው...
1⃣. Clop Ransomware
🔻ይህ ቫይረስ በጣም አደገኛ ቫይረስ ሲሆን በኮምፒውተራችን ከገባ ቡሀላ የተለያዩ መረጃዎችን በመዝጋት እንዳንጠቀም የሚያደርግ ነው። የተዘጉትን መረጃዎች ማገኘት የምንችለው የሳይበር ጥቃት ፈፃሚዎቹ የሚጠይቁንን ክፍያ ከፈፀምን ቡሀላ ነው። ለምሳሌ በዚህ ቫይረሰ የተጠቁ ድርጅቶች Ethio Telecom ልንጠቅስ እንችላለን።
2⃣ Hidden Ransomware
🔻ይህ ቫይረስ ለየት የሚያደርገው ነገር ቢኖር በEmail የሚላክና በየትኛውም Antivirus ሊታይ የማይችል ቫይረስ ነው። ይህም የተለያዩ መረጃዎችን በመዝጋት እንዳንጠቀም የሚያደርግ ነው። የተዘጉትን መረጃዎች ማገኘት የምንችለው የሳይበር ጥቃት ፈፃሚዎቹ የሚጠይቁንን ክፍያ ከከፈልን ቡሀላ ነው።
3⃣. Zeus Gameover
🔻ይህ ቫይረስ በኮምፕዩተራችን ከገባ ቡሀላ የተለያዩ ሚስጥራዊ መረጃዎችን (Email, Bank account detail Info bla bla) በመስረቅ ለተፈለገው ሰው መረጃዎችን Email የሚያደርግ አደገኛ ቫይረስ ነው።
4⃣. News Malware Attacks
🔻 ይህን ቫይረስ ወደ ኮምፒውተራችሁ እንዲገባ ለማድረግ የሚጠቀሙበት መንገድ አደገኛ ያደርገዋል።
‼️ማሳሰቢያ ‼️
⚠️በ Email የሚላኩ መልዕክቶችን ከማን እንደተላኩ ካላወቁ መልዕክቱን ይጠንቀቁት።
💯 @Mame_Tech1 || ማሜ ቴክ 💯
🔻የሳይበር ወንጀለኞች በተለያዩ መንገዶች የተለያዩ የሳይበር ጥቃቶችን ይፈፅማሉ። በሀገራችን የሳይበር ጥቃት ከተፈፀመባቸው ድርጅቶች አንዱ Ethio Telecom ነው።
🔻በ2020 በተደረገው ጥናት መሰረት የሳይበር ጥቃት የሚፈፀምበት አንዱ መንገድ የተለያዩ የ Mobile እና የ Computer Virus በማዘጋጀት የተለያዩ ጥቃቶችን በመፈፀም ላይ ይገኛሉ።
ምን አይነት ቫይረሶች ናቸው ለሚለው...
1⃣. Clop Ransomware
🔻ይህ ቫይረስ በጣም አደገኛ ቫይረስ ሲሆን በኮምፒውተራችን ከገባ ቡሀላ የተለያዩ መረጃዎችን በመዝጋት እንዳንጠቀም የሚያደርግ ነው። የተዘጉትን መረጃዎች ማገኘት የምንችለው የሳይበር ጥቃት ፈፃሚዎቹ የሚጠይቁንን ክፍያ ከፈፀምን ቡሀላ ነው። ለምሳሌ በዚህ ቫይረሰ የተጠቁ ድርጅቶች Ethio Telecom ልንጠቅስ እንችላለን።
2⃣ Hidden Ransomware
🔻ይህ ቫይረስ ለየት የሚያደርገው ነገር ቢኖር በEmail የሚላክና በየትኛውም Antivirus ሊታይ የማይችል ቫይረስ ነው። ይህም የተለያዩ መረጃዎችን በመዝጋት እንዳንጠቀም የሚያደርግ ነው። የተዘጉትን መረጃዎች ማገኘት የምንችለው የሳይበር ጥቃት ፈፃሚዎቹ የሚጠይቁንን ክፍያ ከከፈልን ቡሀላ ነው።
3⃣. Zeus Gameover
🔻ይህ ቫይረስ በኮምፕዩተራችን ከገባ ቡሀላ የተለያዩ ሚስጥራዊ መረጃዎችን (Email, Bank account detail Info bla bla) በመስረቅ ለተፈለገው ሰው መረጃዎችን Email የሚያደርግ አደገኛ ቫይረስ ነው።
4⃣. News Malware Attacks
🔻 ይህን ቫይረስ ወደ ኮምፒውተራችሁ እንዲገባ ለማድረግ የሚጠቀሙበት መንገድ አደገኛ ያደርገዋል።
‼️ማሳሰቢያ ‼️
⚠️በ Email የሚላኩ መልዕክቶችን ከማን እንደተላኩ ካላወቁ መልዕክቱን ይጠንቀቁት።
💯 @Mame_Tech1 || ማሜ ቴክ 💯
📹 VidMate – HD video downloader (MOD, Premium) v4.4801
📱Requirements: Varies with device
ℹ️ VidMate is the best YouTube downloader app for android. Free download videos from YouTube, Facebook, Instagram, WhatsApp status and Tiktok. Download Vidmate App for Android and enjoy your favorites on the go!
📥 Download Link:
🔗 https://modappsstore.in/vidmate
📱Requirements: Varies with device
ℹ️ VidMate is the best YouTube downloader app for android. Free download videos from YouTube, Facebook, Instagram, WhatsApp status and Tiktok. Download Vidmate App for Android and enjoy your favorites on the go!
📥 Download Link:
🔗 https://modappsstore.in/vidmate
....🔥Termux banner🔥...
◦◦◦◦◦◦◦◦◦◦EVIL EYE◦◦◦◦◦◦◦◦◦◦◦◦
----------------------------------------------
📜ሰላም እንዴት ናችሁ እንኳን ለ ገና በአል አደረሳችሁ በዚህ tutorial እንዴት termux ላይ termux banner (ስማችንን በ ትልቁ ከላይ )በ አይን ምስል ላይ ማድረግ እንደምንችል ነው
----------------------------------------------
\INSTALL REQUIREMENTS/
......\መጫን ያለብን ነገሮች/.......
➠
➠
----------------------------------------------
➠
➠
◼️ ለ tool ፍቃድ ይሰጥልናል
➠
◼️ ለ tool የሚያስፈለገውን package ይጭናል እነርሱም lolcat , figlet , cowsay , nano , ruby , toilet ይጭናል ( mobile data የምትጠቀሙ 100 mb ይፈልጋል )
➠
◼️ tool run ያደርግልናል
🔘 በመቀጠል cowsay ሲል የፈለጋችሁትን የቡድን ስም ስጡት ለምሳሌ Ethio termux user እሱም ዳር ላይ በ ትንሹ ይፅፋል Banner name s ሲል ደግሞ በትልቁ የሚፅፈውን ፃፋለት
----------------------------------------------
⚖ DON'T COPY PASTE WITHOUT CREDIT ! ! !
----------------------------------------------
🛡 WE SUGGEST ETHICAL HACKER
------------------------------------
....THANKS FOR READING....
------------------------------------
🔺share and support us🔻
⛓For any comment : @ethiotermuxuserdiscussion
◦◦◦◦◦◦◦◦◦◦EVIL EYE◦◦◦◦◦◦◦◦◦◦◦◦
----------------------------------------------
📜ሰላም እንዴት ናችሁ እንኳን ለ ገና በአል አደረሳችሁ በዚህ tutorial እንዴት termux ላይ termux banner (ስማችንን በ ትልቁ ከላይ )በ አይን ምስል ላይ ማድረግ እንደምንችል ነው
----------------------------------------------
\INSTALL REQUIREMENTS/
......\መጫን ያለብን ነገሮች/.......
➠
pkg install git
➠
git clone https://github.com/Bhai4You/Termux-Banner
----------------------------------------------
➠
cd Termux-Banner
◼️
termux banner ያለበትን folder ይከፍትልናል ➠
chmod +x *
◼️ ለ tool ፍቃድ ይሰጥልናል
➠
bash requirement.sh
◼️ ለ tool የሚያስፈለገውን package ይጭናል እነርሱም lolcat , figlet , cowsay , nano , ruby , toilet ይጭናል ( mobile data የምትጠቀሙ 100 mb ይፈልጋል )
➠
bash t-ban.sh
◼️ tool run ያደርግልናል
🔘 በመቀጠል cowsay ሲል የፈለጋችሁትን የቡድን ስም ስጡት ለምሳሌ Ethio termux user እሱም ዳር ላይ በ ትንሹ ይፅፋል Banner name s ሲል ደግሞ በትልቁ የሚፅፈውን ፃፋለት
----------------------------------------------
⚖ DON'T COPY PASTE WITHOUT CREDIT ! ! !
----------------------------------------------
🛡 WE SUGGEST ETHICAL HACKER
------------------------------------
....THANKS FOR READING....
------------------------------------
🔺share and support us🔻
⛓For any comment : @ethiotermuxuserdiscussion