Zapier, the company that boasts of a 100% remote workforce is hiring.
Work remotely from anywhere in the world. See the 32 job openings and apply through the link below.
https://zapier.com/jobs/#job-openings
Work remotely from anywhere in the world. See the 32 job openings and apply through the link below.
https://zapier.com/jobs/#job-openings
lua code for an app that prints the tallies of numbers.
Unfortunately you have to test this one with the lua scripting apk
.
.
banner = "Written in lua by H.H"
Screen:Print('Tally 1.0')
Screen:Print(banner)
function tally(num)
Screen:Print(num..':')
num = tonumber(num)
if nil == num then return end
line = ""
while 4<num do
line = line.."++++\t"
num = num-5
end
for v=1,num do
line = line.."l"
end
num = 0
Screen:Print(line)
end
function go()
tally(input:GetText())
end
input = GUI:AddEditText(150,250,200,50,"")
print = GUI:AddButton(200,300,100,75,"Tally")
print:AddEventHandler("OnTouchUp",go)
--Timestamp 190219. Teaching tallies
.
.
we wish to see your projects too
@Roml3n @anonyguy
Unfortunately you have to test this one with the lua scripting apk
.
.
banner = "Written in lua by H.H"
Screen:Print('Tally 1.0')
Screen:Print(banner)
function tally(num)
Screen:Print(num..':')
num = tonumber(num)
if nil == num then return end
line = ""
while 4<num do
line = line.."++++\t"
num = num-5
end
for v=1,num do
line = line.."l"
end
num = 0
Screen:Print(line)
end
function go()
tally(input:GetText())
end
input = GUI:AddEditText(150,250,200,50,"")
print = GUI:AddButton(200,300,100,75,"Tally")
print:AddEventHandler("OnTouchUp",go)
--Timestamp 190219. Teaching tallies
.
.
we wish to see your projects too
@Roml3n @anonyguy
Arun (youtube.com/mrwhosetheboss) & Filip (youtube.com/everythingapplepro) are hosting a mega international giveaway of 5 8GB + 128GB Samsung Galaxy S10s. Click the link below to enter the giveaway. It's FREE!
https://wn.nr/R5FQG8
https://wn.nr/R5FQG8
the difference between white hats and black hats. Black hats don't care if they destroy everything as long as they get what they came for. But white hats have to be careful so they don't break anything. The people who hire them just want to "test" the network not destroy it.
In short black hats don't care about saving you.
This is why blackhatting is stronger. They get to test their skills in all waters without having to worry about breaking anything.
The lack of this wreckless ness however limits whitehats and keeps blackhats a step ahead.
.
I have also said there are no whitehats or blackhats.
If china fought Russia in a cyberwar, Russia would see the Chinese to be the blackhats instead of themselves. The Chinese would also think the same
Do stop tagging yourselves with hats
And...
.
#hack_teh_world
#for_teh_lulz
~halo
In short black hats don't care about saving you.
This is why blackhatting is stronger. They get to test their skills in all waters without having to worry about breaking anything.
The lack of this wreckless ness however limits whitehats and keeps blackhats a step ahead.
.
I have also said there are no whitehats or blackhats.
If china fought Russia in a cyberwar, Russia would see the Chinese to be the blackhats instead of themselves. The Chinese would also think the same
Do stop tagging yourselves with hats
And...
.
#hack_teh_world
#for_teh_lulz
~halo
OnePlus is holding a mobile filmmaking contest
3 winners will be picked;
1st place gets US$10000, 2 OnePlus devices and a gimbal
2nd place gets $4000, 2 OnePlus devices
3rd place gets $2000 and a OnePlus device
See more about this contest and how to sign up through the link below
https://forums.oneplus.com/threads/mobile-filmmaking-masterclass-part-1-whats-your-idea.1006641/
3 winners will be picked;
1st place gets US$10000, 2 OnePlus devices and a gimbal
2nd place gets $4000, 2 OnePlus devices
3rd place gets $2000 and a OnePlus device
See more about this contest and how to sign up through the link below
https://forums.oneplus.com/threads/mobile-filmmaking-masterclass-part-1-whats-your-idea.1006641/
The Benefits Of Spoofing MAC Address?
✴ It Allows You To Take Over Another Device's Identity.
✴ It Can Be Used To Get Free WiFi (From Neighbors Or Public WiFi Spot).
✴ ️It Enables You To Evade Network Intrusion Detection systems.
Copied
✴ It Allows You To Take Over Another Device's Identity.
✴ It Can Be Used To Get Free WiFi (From Neighbors Or Public WiFi Spot).
✴ ️It Enables You To Evade Network Intrusion Detection systems.
Copied
Want everything in black!? Go to the link below and check out the products.
Use the code ROML3N to get 20% off everything
💲 matteblackeverythin.com
Use the code ROML3N to get 20% off everything
💲 matteblackeverythin.com
SHOULD I ROOT MY FON?
.
Rooting your phone gives you access to more features. But most importantly it voids your warranty. This means that if the FON is new, you can't return it for a new one after you brick it.
So lets be realistic
.
Google does not allow us to use Android with ROOT by default because they are trying to protect the users. We here are hackers. We need ROOT. We don't need protection. In fact it's the others ;) who need protection. You probably bought your FON from someone else or stole it like me. Bottom line is even if you plan to return it, you don't have a receipt right now. So forget about warranties and seriously ROOT UR DEVICE. u are doomed anyways.
.
Anyway install termux a Linux shell for Android. We will install a c compiler along with nmap for port scanning, netcat and ssh for connecting to our target.
So uh, I hope ur serious this time. A new series where I teach a little c (Jack has already taught the majority of it) will come up.
Stay tuned...
~halo
.
Rooting your phone gives you access to more features. But most importantly it voids your warranty. This means that if the FON is new, you can't return it for a new one after you brick it.
So lets be realistic
.
Google does not allow us to use Android with ROOT by default because they are trying to protect the users. We here are hackers. We need ROOT. We don't need protection. In fact it's the others ;) who need protection. You probably bought your FON from someone else or stole it like me. Bottom line is even if you plan to return it, you don't have a receipt right now. So forget about warranties and seriously ROOT UR DEVICE. u are doomed anyways.
.
Anyway install termux a Linux shell for Android. We will install a c compiler along with nmap for port scanning, netcat and ssh for connecting to our target.
So uh, I hope ur serious this time. A new series where I teach a little c (Jack has already taught the majority of it) will come up.
Stay tuned...
~halo
Forwarded from Tech Byte™
Are you a prankster? Do you want to become one?
Here are some cool techy pranks you could perform on your friends, and finally get to do the maniacal evil laughter you've always wanted to do. Come on, everyone has that evil laughter. 😈
http://telegra.ph/Techy-Pranks-to-Try-on-your-Friends---or-Frenemies-05-16
Here are some cool techy pranks you could perform on your friends, and finally get to do the maniacal evil laughter you've always wanted to do. Come on, everyone has that evil laughter. 😈
http://telegra.ph/Techy-Pranks-to-Try-on-your-Friends---or-Frenemies-05-16
Telegraph
Techy Pranks to Try on your Friends - or Frenemies!
Pranks are awesome. They are one of those few things in life that most people can agree on being great. Pranks are in the same league with cat videos and free stuff – everyone loves 'em. (Except for that one guy you know, who's still sore from your last prank.)…
If a class was filled with every programming language, who would each programming language be? 😅
Assembly: He’s the nerd. He speaks very quickly and uses short sentences. Very few people talk to him. He’s considered to be an autist asperger by a majority of the class because he finishes the exams so quickly it’s insane and he faces a lot of difficulties in speaking with others. He’s at school but already dressed like an engineer.
Ada: She’s a foureyes nerd. When she gets the answer she’s doesn’t make any mistake. Ada often corrects the teacher when she writes a line a little ambiguous. She’s building a rocketship in her backyard and she’s always speaking about this weird hobby.
Python: He’s Mr Popular. He likes skate, brags about all the parties he’s invited to. He’s good in all the subjects taught in class but he’ll do them a bit slower than the others. Everyone loves him because he explains things so well, sometimes the teacher herself asks Python to explain some part of the course. He’s dressed with a hoodie, a baggy and glasses on the top of the head ;)
Java: She is one of the toppers of the class and very popular. She’s very good in all the topics. The teacher loves her but she’s a very talkative person.
Scala/Kotlin: They are twin sisters and the best friends of Java. Unfortunately, they are not as popular and it’s often Java who takes the lead in the group. It’s very difficult to distinguish one from another. Both are far less talkative than Java but Scala speaks a bit differently than Kotlin and Java.
C: He’s the topper of the class. He’s so fast in completing the exams that the teacher really thinks he’s copying Assembly’s work. He has a little brother C++ and they share a lot in common together. He’s the chess major and often plays chess with Assembly and his big brother.
Go: He’s the new kid on the bloc. He doesn’t like C++ and his friends and he wants to prove he can do better than them. Of course, he prefers playing Go over Chess.
APL: He’s a lonely guy. No one understands him when he speaks. Even the teacher is surprised when APL shows a correct answer after several lines of incomprehensible pictograms. People think that he was born in a foreign country… or a foreign planet ?
HTML/CSS: These twin brothers are very different. One is dressed in black and white and the other is dressed with everything except black and white. HTML is very talkative and annoying and the CSS is very artistic. CSS is the best student in Art lessons and HTML performs well in written expression.
LaTeX: She’s friend of HTML. The teacher likes her because she has a gift of writing. LaTeX likes the mathematical courses because she can draw fancy greek letters. The teacher knows this well and she is often asked to write a formula on the black board.
VBA: He’s in the back, looking through the windows. Not really interested in the courses taught in class. In the exams, he answers always with a table.
C#: He’s in the back playing yet another game on his smartphone. He likes being next to the windows also.
JavaScript: People often mix up Java and JavaScript because they have a similar name. But they are definitly not the same. Javascript spends a lot of time with HTML and CSS. He’s as artistic as CSS but he prefers things that move. He likes actions and movies. CSS dreams to be a painter wheras JavaScript wants to be a film-maker.
Haskell: He’s a goth. Dressed up in dark. Doesn’t talk to anyone. He doesn’t understand why others write pages when he can write a couple of lines to answer the same question.
Julia: She’s the newest student here. She doesn’t have any friends yet but her secret aim is to be as popular as Python and as fast as C.
Lua: Little Johnny.
And there is ++++[++++>---<]>-.---[----->+<]>-.+++[->+++<]>++.++++++++.+++++.--------.-[--->+<]>--.+[->+++<]>+.++++++++.
I hope I didn’t gone too far! It was really fun to write
By : Udobad Mikado Edidiong
Assembly: He’s the nerd. He speaks very quickly and uses short sentences. Very few people talk to him. He’s considered to be an autist asperger by a majority of the class because he finishes the exams so quickly it’s insane and he faces a lot of difficulties in speaking with others. He’s at school but already dressed like an engineer.
Ada: She’s a foureyes nerd. When she gets the answer she’s doesn’t make any mistake. Ada often corrects the teacher when she writes a line a little ambiguous. She’s building a rocketship in her backyard and she’s always speaking about this weird hobby.
Python: He’s Mr Popular. He likes skate, brags about all the parties he’s invited to. He’s good in all the subjects taught in class but he’ll do them a bit slower than the others. Everyone loves him because he explains things so well, sometimes the teacher herself asks Python to explain some part of the course. He’s dressed with a hoodie, a baggy and glasses on the top of the head ;)
Java: She is one of the toppers of the class and very popular. She’s very good in all the topics. The teacher loves her but she’s a very talkative person.
Scala/Kotlin: They are twin sisters and the best friends of Java. Unfortunately, they are not as popular and it’s often Java who takes the lead in the group. It’s very difficult to distinguish one from another. Both are far less talkative than Java but Scala speaks a bit differently than Kotlin and Java.
C: He’s the topper of the class. He’s so fast in completing the exams that the teacher really thinks he’s copying Assembly’s work. He has a little brother C++ and they share a lot in common together. He’s the chess major and often plays chess with Assembly and his big brother.
Go: He’s the new kid on the bloc. He doesn’t like C++ and his friends and he wants to prove he can do better than them. Of course, he prefers playing Go over Chess.
APL: He’s a lonely guy. No one understands him when he speaks. Even the teacher is surprised when APL shows a correct answer after several lines of incomprehensible pictograms. People think that he was born in a foreign country… or a foreign planet ?
HTML/CSS: These twin brothers are very different. One is dressed in black and white and the other is dressed with everything except black and white. HTML is very talkative and annoying and the CSS is very artistic. CSS is the best student in Art lessons and HTML performs well in written expression.
LaTeX: She’s friend of HTML. The teacher likes her because she has a gift of writing. LaTeX likes the mathematical courses because she can draw fancy greek letters. The teacher knows this well and she is often asked to write a formula on the black board.
VBA: He’s in the back, looking through the windows. Not really interested in the courses taught in class. In the exams, he answers always with a table.
C#: He’s in the back playing yet another game on his smartphone. He likes being next to the windows also.
JavaScript: People often mix up Java and JavaScript because they have a similar name. But they are definitly not the same. Javascript spends a lot of time with HTML and CSS. He’s as artistic as CSS but he prefers things that move. He likes actions and movies. CSS dreams to be a painter wheras JavaScript wants to be a film-maker.
Haskell: He’s a goth. Dressed up in dark. Doesn’t talk to anyone. He doesn’t understand why others write pages when he can write a couple of lines to answer the same question.
Julia: She’s the newest student here. She doesn’t have any friends yet but her secret aim is to be as popular as Python and as fast as C.
Lua: Little Johnny.
And there is ++++[++++>---<]>-.---[----->+<]>-.+++[->+++<]>++.++++++++.+++++.--------.-[--->+<]>--.+[->+++<]>+.++++++++.
I hope I didn’t gone too far! It was really fun to write
By : Udobad Mikado Edidiong
paypal loading running for 50% minimum $50 for $25 Worth BTC/LTC @anonyguy
i) Defense is more difficult than offense. For defense you have to find and close 100 doors which an attacker can use to get into the Server, For offense the attacker has to find one single way to get in.
ii) WebApplications now days have became extremely complex with new features being added on daily basis. It's almost impossible to achieve complexity and Security at the same time.
iii) Automated Scanners and Web Application Firewalls won't necessarily protect your Webapplications. As both of them do not understand Business Logic of the Application. Defense in depth principle should be followed where Security should be ensured at all layers. Independent Securtiy Researcher Rafay Baloch
ii) WebApplications now days have became extremely complex with new features being added on daily basis. It's almost impossible to achieve complexity and Security at the same time.
iii) Automated Scanners and Web Application Firewalls won't necessarily protect your Webapplications. As both of them do not understand Business Logic of the Application. Defense in depth principle should be followed where Security should be ensured at all layers. Independent Securtiy Researcher Rafay Baloch
Are you wondering about all the data that google stores? Are you tired of copy pasting all of your gmail's messages to add to a offline drive? Or do you want to download all files from google drive? It even includes google maps data, history, locations, bookmarks, and whatnot.
https://takeout.google.com
Google, always taking your stuff. Atleast now you know how to get it back..
https://takeout.google.com
Google, always taking your stuff. Atleast now you know how to get it back..
Marques Brownlee (t.co/MKBHD) explains the Google ban on Huawei. Watch his video
https://youtu.be/qZGpmWrVSaU
https://youtu.be/qZGpmWrVSaU
YouTube
The Huawei Ban: Explained!
Huawei flagships without Google or Android? This is everything you
need to know.
Fingers crossed Huawei can resolve things. For the sake of competition.
Sources:
https://www.cnbc.com/2019/05/21/google-will-work-with-huawei-for-next-90-days-after-restrictions…
need to know.
Fingers crossed Huawei can resolve things. For the sake of competition.
Sources:
https://www.cnbc.com/2019/05/21/google-will-work-with-huawei-for-next-90-days-after-restrictions…
Got together with a group of other hackers where we hacked a site using sqli
We found out the passwords in the dB were salted before hashing cos even when we shared them amongst ourselves to brute force, it took a lot of time
Then one of the guys had a brilliant suggestion
Instead of wasting time cracking the admin password, we should just change the reset email
We did that and went to forgot password
The reset link was sent to my email which we used to 'take ctrl from da admin'
Now we could deface the site but that's not what we came for anyway, so we grabbed the loot (booty) and got out if there
;)
Working in a team can speed things up
#for_teh_lulz
this is jhonny
We found out the passwords in the dB were salted before hashing cos even when we shared them amongst ourselves to brute force, it took a lot of time
Then one of the guys had a brilliant suggestion
Instead of wasting time cracking the admin password, we should just change the reset email
We did that and went to forgot password
The reset link was sent to my email which we used to 'take ctrl from da admin'
Now we could deface the site but that's not what we came for anyway, so we grabbed the loot (booty) and got out if there
;)
Working in a team can speed things up
#for_teh_lulz
this is jhonny
Your PC doesn't have enough juice yo run Photoshop? Or maybe you don't have a PC to make cool Photoshop edits? Worry no more. Visit the link below to edit your photos with ease online, without the need to pay a single dollar, or a PC.
https://www.photopea.com/
https://www.photopea.com/
Forwarded from Tech Byte™
For our new members, here are some of our best tutorials you might have missed!
How to Send any File on WhatsApp
How to Set Screen Lock Pattern on Windows PC
How to Fix “App Not Installed” Error
How to Make Clothes See-through in Photoshop
How to Hack Facebook 1. Credentials Harvester Attack
How to Hack WiFi 1. Aircrack-ng
How to Hack Facebook 2. Phishing
How to Jailbreak an iPhone/Pod/Pad
How to Access the Dark Web 1. Tor
How to Access the Dark Web 2. Orfox on Android
How to Access the Dark Web 2.1. Fire.onion on Android
How to View Stored Passwords 1. in Firefox
How to Write Computer Viruses 1. using Notepad
How to Install Kali Linux 2.0
How to Get the Most out of Google Search
How to Send any File on WhatsApp
How to Set Screen Lock Pattern on Windows PC
How to Fix “App Not Installed” Error
How to Make Clothes See-through in Photoshop
How to Hack Facebook 1. Credentials Harvester Attack
How to Hack WiFi 1. Aircrack-ng
How to Hack Facebook 2. Phishing
How to Jailbreak an iPhone/Pod/Pad
How to Access the Dark Web 1. Tor
How to Access the Dark Web 2. Orfox on Android
How to Access the Dark Web 2.1. Fire.onion on Android
How to View Stored Passwords 1. in Firefox
How to Write Computer Viruses 1. using Notepad
How to Install Kali Linux 2.0
How to Get the Most out of Google Search