Forwarded from Dhecybersoldier
A Complete Cyber Security Guide For Beginners 2021.part3.rar
1.1 GB
❤2👍1
Computer_Networking_Course_Network_Engineering_CompTIA_Network+.mp4
1 GB
🔰Computer Networking Course
☣ Worth - 200$ [ FREE ]
🌀 [CompTIA Network+ Exam Preparation] - Download This Course And Get All Information About Network Engeneering
➖ @ethicalhackingtoday ➖
☣ Worth - 200$ [ FREE ]
🌀 [CompTIA Network+ Exam Preparation] - Download This Course And Get All Information About Network Engeneering
➖ @ethicalhackingtoday ➖
❤8👍6
How to Recover Permanently Deleted Files in Windows 10
You can undelete files using Restore Previous Versions:
✅ Navigate to the folder or the location where you stored the file in the past (before being deleted). Make a right-click on the folder and select the option “Restore previous versions”.
✅ You will get an option to Restore the folder. This will restore the previous version of the file, hence providing you with the lost files. 👌
❗️If you don’t see an option “Restore previous versions,” don’t panic! 👉
☑️Navigate to Control Panel, or type Control Panel in Run Window (Windows Key + R).
☑️ Locate System >System Protection.
☑️ Select the drive and click Configure.
☑️ On the System Protection window, click on the button beside Turn on System Protection.
☑️ You will see “Restore previous versions” on a particular folder. So, repeat the steps above to Restore previous versions. 👆
#lifehack
You can undelete files using Restore Previous Versions:
✅ Navigate to the folder or the location where you stored the file in the past (before being deleted). Make a right-click on the folder and select the option “Restore previous versions”.
✅ You will get an option to Restore the folder. This will restore the previous version of the file, hence providing you with the lost files. 👌
❗️If you don’t see an option “Restore previous versions,” don’t panic! 👉
☑️Navigate to Control Panel, or type Control Panel in Run Window (Windows Key + R).
☑️ Locate System >System Protection.
☑️ Select the drive and click Configure.
☑️ On the System Protection window, click on the button beside Turn on System Protection.
☑️ You will see “Restore previous versions” on a particular folder. So, repeat the steps above to Restore previous versions. 👆
#lifehack
👍6
How to slow down the Internet speed for a certain site
When you download large files, it takes up the Internet channel by 100%. This time users of your Wi-Fi point cannot use the network. So it is better to slow down ⬇️ the Internet speed for the site from which you are downloading the file.
The file will take longer to download, but everyone will have the Internet. To do this, open the desired site and press the F12 key — the developer tools will open. Go to the "Network" tab, click on the arrow of the "No throttling" item and select "Add".
Click "Add custom profile" and enter the name, download speed, download speed and ping. Select the created profile and reload the page. Done! ✔️ Now you have slowed down the Internet speed for this site, and the traffic is distributed sparingly.
#lifehack
When you download large files, it takes up the Internet channel by 100%. This time users of your Wi-Fi point cannot use the network. So it is better to slow down ⬇️ the Internet speed for the site from which you are downloading the file.
The file will take longer to download, but everyone will have the Internet. To do this, open the desired site and press the F12 key — the developer tools will open. Go to the "Network" tab, click on the arrow of the "No throttling" item and select "Add".
Click "Add custom profile" and enter the name, download speed, download speed and ping. Select the created profile and reload the page. Done! ✔️ Now you have slowed down the Internet speed for this site, and the traffic is distributed sparingly.
#lifehack
❤3👍2
How to check if Telegram is hacked?
Although the messenger has a high degree of protection, it will never be superfluous to make sure of your security. After all, someone could get access to the account, and you didn't even notice it.
1️⃣ Open Telegram Settings.
2️⃣ Find the item "Privacy and security" or "Privacy".
3️⃣ Select "Active Sessions". If you suddenly have an unfamiliar device, turn it off.
Done ✅!
#security #telegram
Although the messenger has a high degree of protection, it will never be superfluous to make sure of your security. After all, someone could get access to the account, and you didn't even notice it.
1️⃣ Open Telegram Settings.
2️⃣ Find the item "Privacy and security" or "Privacy".
3️⃣ Select "Active Sessions". If you suddenly have an unfamiliar device, turn it off.
Done ✅!
#security #telegram
❤7👍1
Some cool Wikipedia articles you should read it:
👹 Device Fingerprint
https://en.wikipedia.org/wiki/Device_fingerprint
🖲 Web Tracking
https://en.wikipedia.org/wiki/Web_tracking
🌐 Anonymous Web Browsing
https://en.wikipedia.org/wiki/Anonymous_web_browsing
🍪 Evercookie
https://en.wikipedia.org/wiki/Evercookie
🛡 Internet Privacy
https://en.wikipedia.org/wiki/Internet_privacy
㊙️ Browser Security
https://en.wikipedia.org/wiki/Browser_security
🕵️♀️ Browser Sniffing
https://en.wikipedia.org/wiki/Browser_sniffing
👹 Device Fingerprint
https://en.wikipedia.org/wiki/Device_fingerprint
🖲 Web Tracking
https://en.wikipedia.org/wiki/Web_tracking
🌐 Anonymous Web Browsing
https://en.wikipedia.org/wiki/Anonymous_web_browsing
🍪 Evercookie
https://en.wikipedia.org/wiki/Evercookie
🛡 Internet Privacy
https://en.wikipedia.org/wiki/Internet_privacy
㊙️ Browser Security
https://en.wikipedia.org/wiki/Browser_security
🕵️♀️ Browser Sniffing
https://en.wikipedia.org/wiki/Browser_sniffing
👍8❤1
Top 16 Hacking Tools
1. Burpsuite
2. Metasploit
3. Powershell-Suite
4. nmap
5. Wireshark
6. Mimikazt
7. Hashcat
8. John the Ripper
9. Hydra
10. Aircrack-ng
11. Fuzzdb
13. gobuster
14. Acunetix
15. Nessus
16. Cobalt Strike
1. Burpsuite
2. Metasploit
3. Powershell-Suite
4. nmap
5. Wireshark
6. Mimikazt
7. Hashcat
8. John the Ripper
9. Hydra
10. Aircrack-ng
11. Fuzzdb
13. gobuster
14. Acunetix
15. Nessus
16. Cobalt Strike
❤6👍4
OVERVIEW OF SOME EMAIL PROVIDERS 📧
Disposable email provider
MAILINATOR
Restrictions: Public email addresses
Link : https://www.mailinator.com/
GUERRILLA MAIL
Restrictions: Not a permanent email, 150 MB attachment limit.
Link : https://www.guerrillamail.com/
EMAIL ON DECK
Restrictions: Not a permanent email
Link : https://www.emailondeck.com/
TEMPINBOX
Restrictions: Public email addresses, receiving only
Link : http://tempinbox.com/
MAILNESIA
Restrictions: Public email addresses, receiving only
Link : http://mailnesia.com/
Provider to receive and send
PROTONMAIL
Restrictions: 500 MB of storage space, send 150 emails a day plus free VPN (only one location)
Link : https://protonmail.com/
GMX MAIL
Restrictions: 50MB attachments
Link : https://www.gmx.com/consentpage
TUTANOTA
Restrictions: 1GB of storage space
Link : https://tutanota.com/
YANDEX
Restrictions: ?
Link : https://passport.yandex.com/auth?retpath=https%3A%2F%2Fpassport.yandex.com%2Fprofile&noreturn=1
Disposable email provider
MAILINATOR
Restrictions: Public email addresses
Link : https://www.mailinator.com/
GUERRILLA MAIL
Restrictions: Not a permanent email, 150 MB attachment limit.
Link : https://www.guerrillamail.com/
EMAIL ON DECK
Restrictions: Not a permanent email
Link : https://www.emailondeck.com/
TEMPINBOX
Restrictions: Public email addresses, receiving only
Link : http://tempinbox.com/
MAILNESIA
Restrictions: Public email addresses, receiving only
Link : http://mailnesia.com/
Provider to receive and send
PROTONMAIL
Restrictions: 500 MB of storage space, send 150 emails a day plus free VPN (only one location)
Link : https://protonmail.com/
GMX MAIL
Restrictions: 50MB attachments
Link : https://www.gmx.com/consentpage
TUTANOTA
Restrictions: 1GB of storage space
Link : https://tutanota.com/
YANDEX
Restrictions: ?
Link : https://passport.yandex.com/auth?retpath=https%3A%2F%2Fpassport.yandex.com%2Fprofile&noreturn=1
👍5❤2
Search Engine For Hackers
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
🔥5👏3❤2👍2
💠 HOW TO UNINSTALL MICROSOFT EDGE BROWSER 💠
As you can see the guy is saying that you CAN NOT remove MSEdge. Oh really? I uninstalled it 💁♂️
C:\Program Files (x86)\Microsoft\Edge\Application\
Still in File Explorer, open the file folder with the Edge version number.
Go to your version and then into "Installer" directory.
Shift+Right Click -> Open PowerShell.exe
.\setup.exe --uninstall --system-level --verbose-logging --force-uninstall
Wait 1-3 minutes and you'll see MSEdge is vanished 🪄
As you can see the guy is saying that you CAN NOT remove MSEdge. Oh really? I uninstalled it 💁♂️
C:\Program Files (x86)\Microsoft\Edge\Application\
Still in File Explorer, open the file folder with the Edge version number.
Go to your version and then into "Installer" directory.
Shift+Right Click -> Open PowerShell.exe
.\setup.exe --uninstall --system-level --verbose-logging --force-uninstall
Wait 1-3 minutes and you'll see MSEdge is vanished 🪄
👍4
❇️ What is password salting ?
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.
Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks.
❇️ Password hashing and why salting is required
Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.
When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.
Share and Support
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.
Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks.
❇️ Password hashing and why salting is required
Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.
When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.
Share and Support
👍6