Tag: CARDING

How to Install Tor Browser

How to Install Tor Browser Step 1:Goto browser and search tor project and select the option of download for windows,linux or dos. Step 2:After downloading tor open it and connect it you can also configure it and set proxy for more security . Step 3:We should set VPN also for much more security as tor…
Read more

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

What is Password Cracking?

What is Password Cracking? Password cracking is the process of guessing or recovering a password from stored locations or from data transmission system. It is used to get a password for unauthorized access or to recover a forgotten password. In penetration testing, it is used to check the security of an application. In recent years,…
Read more

Operators in C Language

Operators in C Language C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform a certain mathematical or logical manipulation. Operators are used in programs to manipulate data and variables. C operators can be classified into the following types: Arithmetic operators Relational operators Logical operators…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

Google Hacks

Google dorks are used to find hidden information and we can find anything easily by using it. Because Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on the target. The basic syntax for google dorks: operator_name:keyword Because of google dorks it becomes easy to…
Read more

Algorithm and Flowchart

Algorithms and flowcharts are two different tools used for creating new programs, especially in computer programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way.  Algorithm To write a logical step-by-step method to solve the problem is called algorithm, in other words,…
Read more

what is port forwarding?

what is port forwarding? the port forwarding is a way to send and receive data packets from a public source. it is a complicated topic. you might never understand it if you won’t perform it on your own system. By port forwarding, we can redirect traffic to a specific destination. example: you play Minecraft. it…
Read more

Neworking

Networking A networking is a collection of computers linked to one another allowing information an resources to be shared between them. Setting Up A Network: A Network is setup by connecting the various computers through the cables, connectors and connectivity devices such as hubs or switches along with which necessary protocols for enabling communication between…
Read more

Dark Web Access

Dark Web Access Do you wish to enter into the world of darkness? – The Dark Web. Then make sure you are protected and safe with the VPN to remain anonymous online. If you aren’t connected with the Best VPN, then you may land in trouble even if you are using Tor browser. First, set…
Read more