Posts

Showing posts from August, 2018

Why Programmers should prefer command-line-mode than Graphical-mode...??

Image
1. Better Control                                   Command line interface gives you better control than the GUI. Whether you are writing a code or just trying to instruct the computer to execute an action, you can be sure of the command lines. They are capable of performing any action.You can use CLI to perform simple tasks such as opening files or even more complex actions such as manipulating the server and database. CLI gives you ultimate power over the computer and any other application that you intend to use for programming. 2. Speed  We all appreciate the essence of speed in programming. It helps a programmer to do more within a limited time. Another key reason why serious programmers opt to use CLI is speed. There is no doubt that navigating through different icons on your computer can be slow and tedious. Some icons may be small and you may spend a couple of seconds bef...

Top Operating System preferred by Hackers. Check it out!!

Image
So today I come up with the operating systems that hackers used for hacking. The top on this list is the Kali Linux which has almost all type of hacking tools that are totally free for everyone. All operating systems are based on Linux kernel, we know the reason behind this fact, that Linux is free and open source. Kali Linux Kali Linux comes from the creators of BackTrack Yes you guessed it they are  Offensive Security  team. Kali Linux is the most versatile and advanced penetration testing distro. Kali Linux updates its tools, and it is available for many different platforms like VMware, ARM, and many more, one of my favorite is Kali Linux on Raspberry Pi. You can find all over  here .   BackBox BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. BackBox is lightweight OS and requires less hardware specification. Designed to be fast, easy to use and provide a minimal yet comp...

What does Spamming & Doxing means..? Check it Out..!!

Image
                        Spam, as I’m sure you're aware, is Unsolicited messages most often coming in email, like the one you can see here trying to get you to buy pharmaceuticals or some other nonsense. But they also come through instant messages, forums, social media, even text messages now, blogs, wikis, and pretty much anywhere else that they can think of in order to spam you . Mostly it’s to advertise some sort of product. You would think that spamming wouldn’t work, but the barrier to entry to become a spammer is low. So spamming remains economically viable because spammers have very small operating costs, and is difficult to hold senders accountable for their mass mailings. It’s relatively easy to hide where the emails are coming from. If you send millions upon millions of emails, enough of a small, small percentage take the bait. The email protocols we use today and have always used were designed in a time of t...

How can your phone calls and text messages can be hacked..? Check it out..!!

Image
Yes..!! you are thinking right, Your phone calls and text messages can be hacked now the question arrises, How, how it can, and who can hack it..?                  A vulnerability means hackers can read texts, listen to calls and track mobile phone users. What are the implications and how can you protect yourself from snooping? Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure. The exploit centres on a global system that connects mobile phone networks, and can give hackers, governments or anyone else with access to it remote surveillance powers that the user cannot do anything about. But how can this happen, is it currently being used and what can you do about it? What is being hacked into? Signalling System No 7 (SS7) , which is called Common Channel Signalling Syst...