Posts

Showing posts from October, 2017

Run command list

pbrush or mspaint - paint wab - windows address book regedit - Registry Editor mstsc - Remote Desktop Connection pinball - pinball taskmgr - Task Manager msinfo32 - System Information shutdown -s - window shutdown shutdown -r - window restart utilman - utility manager telnet - telnet client packager - object packer tcptest - TCP tester osk - on screen keyboard sysedit-system configuration editor intl.cpl -Synian & Language settings msimn - Outlook dialer - phone dialer command - command prompt calc - calculator wmplayer - Windows Media Player % temp% - Temp folder telephon.cpl - Telephony & Modem Option odbccp32.cpl - ODBC Data Source Administrator perfmon - Performance Monitor fsmgmt.msc - Shared Folders wscui.cpl - Security Center mmsys.cpl - Sound & Audio cliconfg - SQL Client Configuration spider-card game msconfig - System Configuration Utility sysdm.cpl - System Properties nusrmgr.cpl - User Accounts ntmsmgr.msc - Removable storage c

How to login Facebook account without password (Facebook hacking) 100% real

How to login Facebook account without password click here  video If you receive a message from any of your Facebook Fr   iends asking for urgent help to recover their Facebook account, since they've added you as one of their ' Trusted Contacts '—just don’t blindly believe it. Researchers have detected a new Facebook phishing scam that can even trick an experienced technical user into falling victim to the scam, helping an attacker gain access to your Facebook account. This latest social media scam is abusing "Trusted Contact"—a Facebook account recovery feature that sends secret access codes to a few of your close friends in order to help you regain access to your Facebook account in case you forget your password or lost access to your account. According to a public security alert published by AccessNow, the attack initiates by an already compromised account of one of your friends, asking for urgent help to get back into his/her Facebook account.  Th

Facebook testing 4k resolution for regular video

Image
According to a report, Facebook is testing Ultra-High-Resolution video uploads that use the 2160p UHD-1 standard for both uploaders and watchers. After launching a host of video-centric features over the last year, Facebook is now finally testing 4K quality of videos that can be played on the platform.According to a report in TechCrunch, Facebook is testing Ultra-High-Resolution video uploads that use the 2160p UHD-1 standard for both uploaders and watchers.The website also said some Facebook pages and profiles can post and watch 4K videos.Video hosting platform YouTube has been working with 4K video since 2010 with 4K live streaming rolling out last year.Facebook already supports 4K resolutions in its live 360 videos.The push to higher resolution video comes after considering Facebook’s push into original content with several original shows coming to the Watch tab. 📱 Click here to download app 📱

hp new product

Image
Apurva is truly living it, loving it and printing it with the HP Sprocket! Watch her eternalize her most treasured moments click here to download app

Awesome trick:you can listen to music on YouTube and still on your phone - here's now

Image
YouTube is a great and wonderful tool with one annoying flaw. Unless you have YouTube Red, using your phone while enjoying your favorite jam is impossible-or so we thought. Find out the loophole to enjoying YouTube playback while still being able to use your phone! If you're like me, you have those select few jams that you like to put on repeat but can't seem to find anywhere other than YouTube. While I don't mind having the app open in order to enjoy my favorite cuts and remixes, the inability to use my phone is a bit irritating. It seems like we may have another option to gain the perk of YouTube Red without paying the price. Check out the handy how-to below! For Android Users: 1. Open up www.youtube.com in your browser. 2. Hit the three dot menu in the upper right corner. Towards the bottom of the list will be a "Request desktop site option" - tap it to turn it on.  3. Pick the song you want to play. Accept any popups asking for permission for You

Bad Rabbit-Ransomware paraiyzes train stations, Air Ports And Media in Russia And Europe

Image
An advanced cyberattack has hit media outlets and infrastructure in Russia, Ukraine and Eastern Europe, causing mass disruption Cybersecurity researchers from Kaspersky described the malware, dubbed Bad Rabbit, in a blogpost on Tuesday, October 24. They explained how the previously unknown malware takes control of computer systems and encrypts data so that people can’t access it. A ransom is then demanded in order to unlock the computers. Security researchers are comparing the Bad Rabbit ransomware to WannaCry, which disabled 300,000 computers earlier this year. “Currently, it’s unclear as to whether or Bad Rabbit will be able to reap the same damage as WannaCry, but undoubtedly businesses will be holding their breath,” Jamie Graves, CEO of security firm ZoneFox, said in an email to  Newsweek . “This highlights the need for a robust security posture, based on both technology and education.” Victims of the Bad Rabbit ransomware include the Kiev Metro and Odessa International

contribution to IT (computer scientist)

Image
Pranav mistry  Pranav Mistry is an Indian computer scientist and inventor. He is from Palanpur, a small town situated in northern Gujarat in India. He is best known for his noteworthy work on Sixth Sense and Samsung Galaxy Gear. SixthSense is gesture interface device consist of data projector and camera combined in a neck worn pendant. He has worked with Microsoft, Google, CMU, NASA, UNESCO, Japan Science & Technology to name a few. Currently he is the head of Think Tank Team (TTT) and Director of Research of Samsung Research America. He has been honoured as one of the Young Global Leader 2013 by World Economic Forum. Vinod khosla (java created) Vinod Khosla is an Indian born businessman who is currently listed by Forbes magazine as an American billionaire, He was one of the co- founders of Sun Microsystems, a company which created the Java language and Network File System (NFS) after his departure as founding CEO and chairman in the early 1980s.

What is the computer language ????

One language used to express a thought inside a human being to a different person is used, each person has different language But the computer also has a language that allows humans to understand the computer * Loewr level language (LLL) Keeping the internal composition of the computer, the instruction code comes into being, it is called machine language which is in the Binary code. - This language can be easily understood by the computer, but this language is very difficult for a common man to learn. - It is very difficult to remember the code of this language - The programmer is very hard to work on this language - This language becomes minor mistakes #&# computer experts

Man arrested after 'good morning' post was mistranslated by facebook as 'attack them'

Image
My facebook page  like now  Social media monitoring combined with Facebook’s AI mistranslating a post led to a man being wrongfully arrested for “suspicion of incitement.” A smiling Palestinian construction worker posted a photo of himself leaning against a bulldozer and holding a cup of coffee and a cigarette. He posted the photo on Facebook along with “good morning” in Arabic. Israeli police, relying on Facebook’s translation service, believed the post said “attack them.” Haaretz reported, “The automatic translation service offered by Facebook uses its own proprietary algorithms. It translated ‘good morning’ as ‘attack them’ in Hebrew and ‘hurt them’ in English.” The Palestinian man’s photo showed a bulldozer on the construction site in the Beitar Illit settlement which is located on the West Bank near Jerusalem. Bulldozers have been used in terror attacks against Israelis in the past. Israeli police did not consult any Arabic-speaking officer, but instead relied co

RED ALERT! Facebook hacked! Your trusted friends can hacke your facebook account

Image
My applications If you receive a message from any of your Facebook Fr   iends asking for urgent help to recover their Facebook account, since they've added you as one of their ' Trusted Contacts '—just don’t blindly believe it. Researchers have detected a new Facebook phishing scam that can even trick an experienced technical user into falling victim to the scam, helping an attacker gain access to your Facebook account. This latest social media scam is abusing "Trusted Contact"—a Facebook account recovery feature that sends secret access codes to a few of your close friends in order to help you regain access to your Facebook account in case you forget your password or lost access to your account. According to a public security alert published by AccessNow, the attack initiates by an already compromised account of one of your friends, asking for urgent help to get back into his/her Facebook account.  The attacker explains that you are listed as one of his

Whatsapp new features will let users share a location in real time here's how it work

Image
WhatsApp already lets users share their location with their contacts. But, the Facebook owned messaging platform makes things easier by rolling out a new location sharing feature. WhatsApp, on Tuesday, introduces a real-time location sharing feature. With this feature, all the WhatsApp users will not only be able to know their friend's location but also keep a tab on them until they reach their destination. By introducing this feature, WhatsApp is basically aiming to let people know that their friends and family members are safe. Explaining the key thought behind introducing this real-time location sharing feature WhatsApp notes, "Whether you're meeting up with friends, letting loved ones know you're safe, or sharing your commute." The Facebook-owned messaging platform further notes that the live location feature "is a simple and secure way to let people know where you are." For instance, consider a situation where you are out alone, maybe for a

Ships are just as easy to hack as anything else

Image
Modern-day ships aren't that hard to hack according to Ken Munro, a security researcher at Pen Test Partners, a UK cyber-security company. Speaking at a conference in Athens, Greece, Munro detailed some of the most appalling security lapses he found while investigating naval ships that had equipment exposed online. His research focused on using basic tools, known by all capable security researchers, but also threat actors alike. Just by using Shodan, a search engine that identifies anything connected to the Internet, Munro found ship equipment all over the world, but sadly, not all of it was properly configured. The good ol' admin/1234 account Some of the most sensitive equipment he found were satellite antennas mounted on ships to provide around the clock radio, Internet, GSM, and other communications. One such model was the Cobham Sailor 900, for which exists a public exploit that makes hacking it a child's play for any knowledgeable attacker. In many case

Ukraine police warns of new notpertye-style large scale cyber attack

Image
Remember NotPetya? The Ransomware that shut down thousands of businesses, organisations and banks in Ukraine as well as different parts of Europe in June this year. Now, Ukrainian government authorities are once again warning its citizens to brace themselves for next wave of "large-scale" NotPetya-like cyber attack. According to a press release published Thursday by the Secret Service of Ukraine (SBU), the next major cyber attack could take place between October 13 and 17 when Ukraine celebrates Defender of Ukraine Day (in Ukrainian: День захисника України, Den' zakhysnyka Ukrayiny). Authorities warn the cyber attack can once again be conducted through a malicious software update against state government institutions and private companies.

Lower level languages (LLL)

Image
One language used to express a thought inside a human being to a different person is used, each person has different language But the computer also has a language that allows humans to understand the computer * Loewr level language (LLL) Keeping the internal composition of the computer, the instruction code comes into being, it is called machine language which is in the Binary code. - This language can be easily understood by the computer, but this language is very difficult for a common man to learn. - It is very difficult to remember the code of this language - The programmer is very hard to work on this language - This language becomes minor mistakes                    -hackingrv.blogspot.com

Windows phone is officially dead 😞

Image
Microsoft's Corporate Vice President for Windows, Joe Belfiore, has today clarified the company's stance with Windows 10 Mobile and what it's currently doing in the mobile space. In a series of tweets on Twitter, Belfiore states that as an individual end-user, he has switched to Android, and that Windows 10 Mobile is no longer a focus for Microsoft. Belfiore confirms what we have been reporting in the past; that from here on out, Microsoft will continue to service Windows 10 Mobile with bug fixes and security patches, mainly for the enterprise market who adopted Windows 10 Mobile for work. Microsoft is not planning to bring any new consumer facing features to Windows 10 Mobile, nor is it planning to release any new hardware. As such, it's safe to assume that Windows 10 Mobile, and Windows phone in its current form, is "dead." Microsoft has now officially stated that it has no plans to continue developing new features for the platform, but will continue

what is the Marianas Web?

Image
what is Marianas Web Question 1 - Marianas can not search the Web, then who created it? But everyone says that Aliens has made him. Question 2 - If it can not search the web Then how did humans know about this web?           By looking at man questions, it seems that there is nothing in the world named Marianas Web! Either it may happen or someone has joked about it           - But I do not believe that there is such a web in this world because if anybody can not discover the human world, then the human being knows about it. (Now the quantum computer has not been considered)         - What do you say about this web page, please comment below, please share this page with your friend. What are the answers?

RED ALERT:The Pirate Bay caught Running Browser. Based Cryptocurrency miner

Image
The world's popular torrent download website,  The Pirate Bay , has again been in a new controversy—this time over secretly planting an in-browser cryptocurrency miner on its website that utilizes its visitors' CPU processing power in order to mine digital currencies. The Pirate Bay is the most popular and most visited file-sharing website predominantly used to share copyrighted material free of charge. The site has usually been in the news for copyright infringement by movie studios, music producers and software creators.  The Pirate Bay has recently been caught generating revenue by secretly utilizing CPU power of its millions of visitors to mine a Bitcoin alternative called  Monero  without their knowledge. The modern Internet depends on advertising revenue to survive, which apparently sometimes spoils users' experience. But The Pirate Bay is trying to choose a different approach. Visitors to the Pirate Bay recently discovered a JavaScript-based cryptocurrency mi

It's 3 billion! yes, Every Single yahoo account was hacked in 2013 data breach

Image
The largest known hack of user data in the history just got tripled in size. Yahoo, the internet company that's acquired by Verizon this year, now believes the total number of accounts compromised in the August 2013 data breach, which was disclosed in December last year, was not 1 billion—it's  3 Billion . Yes, the record-breaking Yahoo data breach affected every user on its service at the time. Late last year, Yahoo revealed the company had suffered a massive data breach in August 2013, which affected 1 billion user accounts. The 2013 hack exposed user account information, including names, email addresses, telephone numbers, dates of births, hashed passwords (using MD5), and, in some cases,  "encrypted or unencrypted security questions and answers,"  Yahoo said in 2016.  At that time, Yahoo did confirm that hackers did not obtain bank account details or credit card information tied to the Yahoo accounts. The data breach was attributed to state-sponsored hacke

Google pixel buds are wireless earbuds that translate conversations in real time

Image
SAN FRANCISCO—To accompany the new Pixel smartphones announced Wednesday, Google debuted new wireless earbuds, dubbed "Pixel Buds." These are Google's first wireless earbuds that are built to be used with Pixel smartphones, but they also give users access to Google Translate so they can have conversations with people who speak a different language. Unlike Apple's AirPods, the Pixel Buds have a wire connecting the two earpieces. However, that wire doesn't connect to a smartphone or other device. Pixel Buds will pair via Bluetooth to the new Pixel smartphones—and presumably any other devices that accept Bluetooth wireless earbuds. All of the Pixel Buds' controls are built in to the right earpiece, which is a common hardware solution on wireless earbuds. You can access Google Assistant by tapping or pressing on the right earbud, and the Assistant will be able to read notifications and messages to you through the Buds. But the most intriguing feature of th

JUDGE: FBI doesn't have to reveal how it unlocked iPhone used by San Bernardino Terrorist

Image
Remember the infamous encryption fight between the FBI and Apple for unlocking an iPhone belonging to terrorist Syed Farook behind the San Bernardino 2015 mass shooting that killed 14 people? The same Apple vs. FBI case where Apple refused to help feds access data on the locked iPhone and, later the Federal Bureau of Investigation reportedly paid over a million dollars to a vendor for unlocking the shooter's iPhone. For keeping the iPhone hack secret, three news organizations—The Associated Press, USA Today, and Vice Media—sued the FBI last year under the Freedom of Information Act (FOIA) and forced the agency to reveal the name of the company and the amount it was paid to unlock the iPhone. However, unfortunately, they failed. A US federal judge ruled Saturday that the FBI does not have to disclose the name of or how much it paid a private company for an iPhone hacking tool that unlocked Farook's iPhone. Apple vs. FBI was one of the biggest legal battles in which Apple was