Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  Computer Techs technology Blog  > 

2018-05-07 13:33
Resetting Password Of Kali Linux 2.01. When grub loader opens select "advance mode" and hite enter2. and select "advance recovery mode" and press "E"3. Replace "ro" to "rw" (i.e., read write… Read More
2018-04-05 15:20
8 Deadly Commands in Linux you should never useMany of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work otherwise. On other L… Read More
2018-04-05 15:02
File CommandsFile Administration ls [option(s)] [file(s)]If you run ls without any additional parameters, the program will list the contents of the current directory in s… Read More
2018-04-05 15:00
1. lsThe ls command - the list command - functions in the Linux terminal to show all of the major directories filed under a given file system. For example, the command:$ls /applica… Read More
2018-04-05 13:03
How to Send Anonymous Email to AnyoneThere are plenty of free web service that allow you to send anonymous email . In this post We provide you the list of top 6 anonymous email service.Let&r&hell…Read More
2018-04-05 12:57
How to Become a Good Professional Hacker?If you are reading this, you want to become professional hacker, right? Well, prepare for a long journey. First thing you need is a passion, I hope y… Read More
2018-04-05 12:49
To enter in safe mode just open "Run" using "Win + R" key and type "msconfig" and hit enter and something will pop up just select "boot" and check "safe mode" and restart your system Read More
2018-04-05 12:48
Q.Wanna Cry malware/ransomeware?Ans It is basically a malware or vulnerability that attacks using "smb" network service on old systems like windows xp,windows 7. And one of the most fascinat… Read More
2018-04-05 12:46
what is winsnare? how to remove it completelyAns It is a virus that comes with any software indirectly.what is bikaq rss? how to remove it completelyAns It is browser extension for browser l… Read More
2018-04-05 12:39
tracert --> command used to trace the path of a packet.tracert -h --> it will give the ip address of that router or source Read More
2018-04-05 12:37
nmap -sP 192.168.32.1/24 or n  //n-->prefix numberNo. of addresses --> 2^(32-n)first address --> place n leftmost bits same and change (32-n) rightmost bits to 0.last address … Read More
2018-04-05 12:35
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using… Read More
2018-04-05 12:34
ARP --> Address Resolution Protocol E.g. BetterCAP --> tool used to perform ARP.MITM --> Man in the middle attackSSl servers are used to prevent the MITM.Sniffing --> It is the p… Read More
2018-04-05 12:31
Dynamic Source Routing (DSR)Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks. The protocol can also function with cellular teleph… Read More
2018-04-04 19:44
How Do I Low-Level Format a SATA or ATA (IDE) Hard Drive?What does "low level format" a SATA or ATA (IDE) drive mean?Actually the term "low level" is a bit of a misnomer. The low-level proce… Read More
2018-04-04 19:42
To make pendrive write protected or disable write protection follow following steps1.First check if this "StorageDevicePolicies" folder exist or not.2.If this folder is not exist then first… Read More
2018-04-04 12:28
How to remove Superfishand its certificate from your Lenovo® PCWhat is Superfish?Superfish is a piece of software that Lenovo has admitted to pre-installing on many of its… Read More
2018-04-04 06:33
When we switch on the system, we see most of the times in during startup many services run in background in windows some of the services are not necessary. Those services take a lot of disk… Read More
2018-04-04 06:31
Most of time we use windows and we run many softwares and files in windows and most of the files leaves some useless files on your system which take your useful space in your system. So, to… Read More
2018-04-04 02:51
At its most basic use, meterpreter is a Linux terminal on the victim's computer. As such, many of our basic Linux commands can be used on the meterpreter even if it's on a Windows or other o… Read More
2018-04-04 02:48
arp_scanner.rb - Script for performing an ARP's Scan Discovery.autoroute.rb - Meterpreter session without having to background the current session.checkvm.rb - Script for detecting if target… Read More

Share the post

Computer Techs

×

Subscribe to Computer Techs

Get updates delivered right to your inbox!

Thank you for your subscription

×