Searchnet Inc.
12 subscribers
42 photos
7 videos
6 files
79 links
Download Telegram
to view and join the conversation
Forwarded from Techmedok
Forwarded from Techmedok
Guys Alert... I got a call from the extension +966 that is Saudi Arabia just Now... I didn't attend it. It just rung for a second. If you get a call from an unfamiliar number that rings once and hangs up, don't call back. Especially if it is from a foreign number.

One Ring Scam or Wangiri Scam

The Federal Communications Commission is warning people about a phone scam, which they're calling the "one ring" or "Wangiri" scam. ("Wangiri" is Japanese for "one ring and drop.")

The scam works like this: A scammer places a robocall to a number and hangs up after one or two rings. They may call back several times. The idea is to get the caller to call the number back. When they do, the caller is prompted to pay long distance fees to connect the call, fees that are usually paid in part to the scammer.

The FCC says the numbers can come from anywhere. But recently, the agency is noticing a lot of international numbers. So if you aren't expecting a call from a number abroad, don't try and call the number back.

"News reports have indicated widespread overnight calling in New York State and Arizona," the FCC release says. Typically, they say, the scammers will target area codes in bursts.
As a general rule, the FCC recommends engaging as little as possible with incoming phone numbers you don't know.
"Do not call back numbers you do not recognize, especially those appearing to originate overseas," the FCC says. They also suggest filing an FCC complaint if you do end up getting one of those calls.

Share it to your Friends and Family to Spread Awareness about this scam... @searchnetinc @techtavern
Forwarded from Techmedok
A German programmer has 2 chances to correctly guess the password to his hard drive or he'll lose $220 million 😨...

While bitcoin's price has recorded historic growth - increasing by 92% in a month and about 340% in a year - one investor is locked out of accessing his riches because he forgot his password.

Stefan Thomas, a German-born programmer in San Francisco, told The New York Times this week that he forgot the password to his IronKey, a secure hard drive with the keys to his wallet with 7,002 bitcoins, or about $220 million (~₹ 1800 Crores) worth. IronKey gives users 10 guesses to get their password right before encrypting the hard drive's contents; Thomas has 2 more tries left.

"I would just lay in bed and think about it, Then I would go to the computer with some new strategy, and it wouldn't work, and I would be desperate again." said Thomas.

Don't forget you bitcoin wallet passwords 😂. Just write the password in multiple papers (2 or 3) and store that papers safely in different places. This technique might help you. Don't believe any online password savers as Cryptos is concerned...
Forwarded from Techmedok
🔰 Top Sites to Generate Fake Identity 🔰

• Fakena - fakena.me
• FauxID - fauxid.com
• Fakexy - fakexy.com
• Elfqrin - elfqrin.com/fakeid.php
• Fake Name Generator - fakenamegenerator.com
• Fake Person Generator - fakepersongenerator.com
• Fake Address Generator - fakeaddressgenerator.com

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Get most of the Udemy Courses for Free 🔰

• First go to https://real.discount.
• Search for your Course, or just look around.
• There will be many courses with 100% discount, get one of those or any if you want.
• Click on "Get Coupon".
• And you will be redirected to Udemy's website and a coupon will be applied automatically and you would get it for free !!!

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Best Sites to Find Data Breaches 🔰

• Have I Been Pwned - haveibeenpwned.com
• Dehashed - dehashed.com
• Leaked Source - leakedsource.ru
• Firefox Monitor - monitor.firefox.com
• Breach Alarm - breachalarm.com
• Breach Aware - breachaware.com
• Breach Directory - breachdirectory.tk

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
Snapdragon 870 Vs 888
Forwarded from Techmedok
🔰 Top 10 Highest grossing Mobile Games 🔰

1. Monster Strike - $ 8.24B
2. Honor of Kings - $ 7.81B
3. Puzzle & Dragons - $ 7.71B
4. Clash of Clans - $ 7B
5. Candy Crush Saga - $ 5.41B
6. Pokemon Go - $ 4.8B
7. Fate - $ 4.21B
8. PUBG mobile - $ 3.7B
9. Clash Royale - $ 3B
10. Game of war:Fire Age - $ 2.8B

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Dark Web - Beginner To Advanced [Part - 1] 🔰

DARK WEB : The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed. The dark web is a part of the internet that isn't indexed by search engines. You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. But not everything is illegal, the dark web also has a legitimate side. For example, you can join a chess club or BlackBook, a social network described as the “the Facebook of Tor.”

WORKING OF TOR : The Tor browser routes your web page requests through a series of proxy servers operated by thousands of volunteers around the globe, rendering your IP address unidentifiable and untraceable.

DARKWEB SEARCH ENGINES : Dark web search engines exist, but even the best are challenged to keep up with the constantly shifting landscape. The experience is reminiscent of searching the web in the late 1990s. Even one of the best search engines, called Grams, returns results that are repetitive and often irrelevant to the query. Link lists like The Hidden Wiki are another option, but even indices also return a frustrating number of timed-out connections and 404 errors.

SURFACE WEB VS DARK WEB :
Dark web sites look pretty much like any other site, but there are important differences. One is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion. That’s a special top level domain suffix designating an anonymous hidden service reachable via the Tor network. Browsers with the appropriate proxy can reach these sites, but others can’t. Dark web sites also use a scrambled naming structure that creates URLs that are often impossible to remember. For example, a popular commerce site called Dream Market goes by the unintelligible address of “eajwlvm3z2lcca76.onion”. Many dark websites are set up by scammers, who constantly move around to avoid the wrath of their victims. Even commerce sites that may have existed for a year or more can suddenly disappear if the owners decide to cash in and flee with the escrow money they’re holding on behalf of customers.

In 2015, Daniel Moore and Thomas Rid, researchers at King's College in London, studied 2,723 sites on the dark web during a five-week period. The researchers said 57 percent of those sites hosted illicit and illegal material.

COMMERCE ON DARKWEB : Nearly all dark web commerce sites conduct transactions in bitcoin, but that doesn’t mean it’s safe to do business there. Both buyers and sellers are anonymous, the credibility of any ratings system is dubious. Even completing a transaction is no guarantee that the goods will arrive. Many need to cross international borders, and customs officials are cracking down on suspicious packages.

Part - 2 : https://t.me/searchnetinc/305
Part -3 : https://t.me/searchnetinc/308

Searchnet Inc. Exclusive

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Dark Web - Beginner To Advanced [Part - 2] 🔰

How to surf Darkweb :

1. Get yourself a good VPN service. That means one that doesn’t keep logs, has no DNS leaks, is fast. We recommend Nordvpn or Express VPN as the best VPN available on the
market with its amazing features and military grade encryption.

2. Download and install the Tor browser bundle. Before you do though, check that your VPN is running. Also be sure to
download Tor from the official Tor project website.

Download Tor : https://www.torproject.org/download/

3. Start browsing .onion websites. When you open Tor on your computer, you’ll automatically be directed to the search engine
DuckDuckGo. While DuckDuckGo is designed to provide extra privacy and encryption while searching the web, you shouldn’t think of it as the dark web version of Google. That’s because even in Tor, DuckDuckGo searches the clear web. That means if you do a keyword search, you’re results are going to be basically the same as what you would find on the regular internet. Fortunately, there are Dark Web search engines (mentioned in the end) that will bring you to .onion sites.

Just make sure to always turn on your VPN before opening Tor and starting a web surfing session.

Surfing the Dark Web Isn’t Illegal, but It Can be Dangerous

You can’t be charged with a criminal offense for simply searching the Dark Web, but you can get in trouble for using it to carry out illegal activity. Headlines about police operations that involved the Dark Web and child pornography, drugs, or
hackers dumping stolen data are not infrequent.

Is the Tor Browser Completely Anonymous ?

In 2014 the FBI – with assistance from researchers at Carnegie Mellon University – developed an exploit based on a Firefox
JavaScript flaw that successfully de-anonymized some Tor users, including the operators of the popular Silk Road website. [History of Silk Road would be posted following this Dark Web Series]. Although the vulnerability that allowed those attacks was fixed within days of its discovery, the incident nonetheless created fear among Tor users that it may not be 100% secure after all.

Similarly, in October 2017 the security firm "We Are Segment" identified a vulnerability in Tor that was affecting some Mac and Linux users. This vulnerability, which became known as TorMoil, caused IP addresses to be leaked when users accessed URLs that began with file://, rather than http:// or https://. "We Are Segment" notified the Tor developers, who promptly fixed the error by updating to a new version of the web browser.

In order to address these issues, the Tor Project has recently improved security and privacy by strengthening its encryption. It also gives web developers the tools to build fully anonymous Darknet sites (known as hidden services, or rendezvous
points) that can only be discovered by those who know the site’s URL.

How and Where to get .onion Website Address ?


Well... The easiest way is to use The Hidden Wiki. It contains list of famous Dark Website and they listed category wise. Some links may timeout due to the shifting of new address by website owners. Or use a dark web Search Engines which are discussed below.

The Hidden Wiki : http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page

Dark Web Search Engines :

Ahmia - http://msydqstlz2kzerdg.onion/
QUO - http://quosl6t6c64mnn7d.onion/
Not Evil - http://hss3uro2hsxfogfq.onion/

Dark Web Directories :


Under Dir - http://underdiriled6lvdfgiw4e5urfofuslnz7ewictzf76h4qb73fxbsxad.onion/
Tor Links - http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/

These Websites May not work over time as it has possibilities to move to another URL. In that case search the web for "Darkweb Links".

Disclaimer : Only for Educational Purposes. We are not responsible for any of your acts.

Part - 1 : https://t.me/searchnetinc/296
Part - 3 : https://t.me/searchnetinc/308

Searchnet Inc. Exclusive

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Dark Web - Beginner To Advanced [Part-3] 🔰

Reasons to Use or Avoid the Dark Web

Aside from illegal purchases and sales, there are legitimate reasons to use the dark web. People within closed societies and facing severe censorship can make use of the dark web to communicate with others outside of their society. Also, people within open societies might use the dark web if they’re concerned about govt activity (as snooping and data collection is growing worldwide).

Nevertheless, nearly all activity over the dark web is illegal. That is easily explained by the fact that the dark web offers a level of identity security that the regular Internet not provide. The dark web is attractive to criminals looking to protect their identities from being able to evade detection. Since its inception, the dark web has gained notoriety for notable hacks and data breaches that have been associated with its usage.

For example, in 2015, user information was stolen from Ashley Madison, a website that connects people with possibilities to cheat on their partners. The stolen data was originally shared on the dark web, but it was later on retrieved and distributed to the public.

In 2016, the United States Lawyer General Loretta Lynch cautioned that weapon sales taking place on the dark web were becoming more common. Buyers and vendors can avoid any local or federal rules when purchasing arms on the dark web. Illegal pornography is also commonly shared on the dark web.

Due to the fact, the dark web is usually used for illicit purposes, and it seems sensible that the majority of the general populace does not have any reason to access it. Nevertheless, as cryptocurrencies become more common in the financial world, the dark web may become a feature of everyday life. It’s important to bear in mind that, no matter how commonplace the dark web becomes soon, it may usually provide criminals a way of eluding catch, and true anonymity is never guaranteed.

Part - 4 will be posted tomorrow 8:30 PM IST [3:00 PM UTC]...

Part - 1 : https://t.me/searchnetinc/296
Part - 2 : https://t.me/searchnetinc/305

Searchnet Inc. Exclusive

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Dark Web - Beginner To Advanced [Part-4] 🔰

Caution : Read At your Own Risk !!! I am Serious...

WHAT HAPPENS INSIDE A RED ROOM IN DARK WEB ?

To enter a red room user should pay an entry fee. All the transactions of the red room will take place through Bitcoins only. Once the user pays the bitcoins they will receive a code. The user has to use the code and enter the red room and can demand the action of his choice.

Once the user enters the site they can demand actions like torture or even kill the person displayed in the screen. In the red room, there will be a person whose hands are tied and the face will be covered.

The user can demand action of cutting the hands, sexually harassed the person, torture the person or even kill the person. The user can torture the person according to the bitcoins he has paid.

Once the user requires more action to be done the site will demand more bitcoin. If the user pays it, they can stay in the red room. The more he pays the more he can demand.

REAL-TIME STORIES OF RED ROOM...

The red room is just an animation game that was popular over the mid-2000s in Japanese internet communities. This was lead to Sasebo slashing. There are several real-time stories that happened in the dark web.

Peter Scully’s Red Room: Peter Gerard Scully is an Australian, who entered the Philippines in 2011. Scully asked his girlfriend to get him two girls one aged 9 and other aged 12. He also took 8 girls and an 18-month-old infant from the streets by saying helping the street kids.

He tortured the 8 girls and the 18-month-old infant sexually and killed them in front of a live cam. Those videos were viewed by the Australian and Philippines police. The detectives managed to track the snuff videos took by Scully.

Scully was accused of killing an 11-year-old girl and 8 girls including an 18 months old infant for sexually harassed, tortured and murdered. According to the victim’s statement, Scully had forced the girls to dig their own grave after being tortured brutally and sexually.

There are plenty of rumors about the video of Scully as what the video contains but they remain as rumors still. Scully also operated a secret child pornography site in the dark web called “No limits fun”, where he sold videos for up to $10000.

The videos were released under the name of “The Daisy’s destruction” which shook the internet world and it is considered to be one of the horrific child abuse cases till now.

IS RED ROOM A SCAM ?

There are many red room sites in the dark web but almost all the sites are just a scam.

With this post we are pausing with Dark Web Series. From Feb 1, 2021 a new series will be posted. "Silk Road : The story of the Criminal Empire" Series will be posted from Monday... Stay Tuned !!!

Searchnet Inc. Exclusive

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
🔰 Most Common types Of Encryption Algorithms 🔰

There are several types of encryption, each developed with different needs and security needs in mind. Here are the most common types of encryption.

Data Encryption Standard [DES] Algorithm

Data Encryption Standard is considered a low-level encryption standard. It is 56 bit encryption. The U.S. government established the standard in 1977. Due to advances in technology and decreases in the cost of hardware, DES is essentially obsolete for protecting sensitive data.

Rivest Shamir Adleman [RSA] Algorithm

RSA takes its name from the familial initials of three computer scientists. It uses a strong and popular algorithm for encryption. RSA is popular due to its key length and therefore widely used for secure data transmission.

Advanced Encryption Standard [AES] Algorithm

AES uses symmetric key Encryption, which uses only one secret key to Cipher and Decipher Information. AES is the first and only publicity accessible cipher approved by the US National Security Agency.

Message Digest [MD5] Algorithm

MD5 is mainly used to verify the integrity of the file. MD5 produces a Checksum on both the sets and then it is compared to verify the integrity of the file. It is also used in hash functions to produce hashes. MD5 isn't useful for advanced encryption application as it has many flaws.

TwoFish Algorithm

Twofish is also uses Symmetric Key Encryption. It is considered one of the fastest encryption algorithms and is free for anyone to use.

♻️ Share ♻️ and 👍 Support 👍 us...
🖥 Join us - @searchnetinc
📖 Tech Library - @snitechlibrary
🤖 Channel Bot - @searchnetincbot
💬 Chat Group - @techtavern
Forwarded from Techmedok
Finally, Our blog has been launched!!
Thank you for your patience, visit techmedok.com for tech news and posts on various topics. From today, daily tech news would be posted on our blog and the link will be shared here !!!

@techmedok
Forwarded from Techmedok
qBittorrent vs uTorrent – Let’s settle the war

https://techmedok.com/comparision/qbittorrent-vs-utorrent/

@techmedok
Forwarded from Techmedok
Forwarded from Techmedok
Windows 11 – Facts and concerns

https://techmedok.com/technology/windows-11/

@techmedok
Forwarded from Techmedok
Android 12 – 12 Amazing Features!

https://techmedok.com/technology/android-12/

@techmedok
Forwarded from Techmedok
Neuralink - Experiments on our brain

https://techmedok.com/technology/neuralink/

@techmedok