Monday, 15 October 2018

How to Secure Your Account(BitCoin)

Before reading this post you must have complete all the necessary steps from post one here.http://techymania.website/how-to-get-your-first-bitcoin-2/Secure AccountStep 1:Click Security Center on the left side of the pageStep 2:1. Click mobile verification and your mobile number2. Get one time password...
Share:

How to Get Your First (BitCoin)

Open Bitcoin AccountStep 1:Go to website- https://blockchain.info/wallet/#/Step 2:Click – Create new Blockchain Wallet and Fill the details (Remember email and passwords)Step 3:Get StartedStep 4:Click –Start Receiving BitcoinsStep 5:1. Copy the Bitcoin Address like this-1PnSjJtAaAEe4gpA6aenA6hQAvDt4ckRnXThis...
Share:

Block-Chain (What You Need To Know)

What is Blockchain?As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. In fact, this is pretty...
Share:

BitCoin (Some Alternatives)

Best AlternativesLitecoinPrice: $25.26Market Capitalization: $600 millionOf all the competing cryptocurrencies, Litecoin is the most similar to Bitcoin. It has been thought of as silver to Bitcoin’s gold, or MasterCard to Bitcoin’s Visa. It has also managed to gain the second-highest market capitalization amongst digital currencies. One key difference includes a different hashing algorithm designed...
Share:

BitCoin (Things You Need to Know)

Special About the Bitcoin System:The Bitcoin is a system which allows you to do anonymous currency transactions and no one will come to know about the payment or about all other info related to the payment, including who sent it, who received it, etc.Satoshi did it by making the system – a peer-to-peer network – controlled by no central authority but runby a network of contributors and freedom...
Share:

BitCoin History (What You Need To Know)

He is said to be from Japan but his mail ID was from Germany, plus the bitcoin software was not availablein Japanese. He developed the system and the Bitcoin software (that is used to run the system) in 2009 but disappeared into thin air in 2010. The other developers of the system stopped hearing from him in 2010, and plenty of speculation turned up about his real identity. Some even suggested...
Share:

BitCoin (What You Need To Know)

Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto.Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no needto give your real name. More merchants are beginning to accept them. You can buy webhosting...
Share:

Cryptocurrency Technologies (What You Need To Known About Series 2)

What is Crypto Currency?A cryptocurrency is a medium of exchange like normal currencies such as USD, but designed for thepurpose of exchanging digital information through a process made possible by certain principles ofcryptography. Cryptography is used to secure the transactions and to control the creation of new coins.Why Crypto Currency?Money exists to facilitate trade. Through the centuries trade...
Share:

Cryptocurrency Technologies (What You Need To Known About)

As the word suggests, cryptocurrencies make heavy use of cryptography. Cryptography provides amechanism for securely encoding the rules of a cryptocurrency system in the system itself. We canuse it to prevent tampering and equivocation, as well as to encode the rules for creation of new unitsof the currency into a mathematical protocol. Before we can properly understand cryptocurrenciesthen, we’ll...
Share:

Monday, 8 October 2018

Python (How to create a Host Checker) Complete Guide

Hello. Today we are going to make a Python up/down host checker "How to Make a Python host checker for Linux" that works on Linux only.You are going to need:– Python 3.4– Internet Connection– Computer with Windows or LinuxIf you haven't got installed Python yet, download it from the following link:https://www.python.org/downloads/You...
Share:

DNS Addressing (How to on Windows)

Introduction    InformationThis tutorial is to guide you, the user, in changing your DNS address to (hopefully) a better alternative.OpenDNS, one of said alternatives, will be used as our main example but there are many others out there. Now while OpenDNS is great, it isn't for everyone:...
Share:

Whatsapp (How to Create a Fake Account)

CREATE FAKE WHATSAPP LETS MAKE A FAKE WHATSAPP ACCOUNT!download this app named talk2downloadDownloadThis is a Philipiens app for chatting. We dont want to use it , but we need this app to get the international number.STEPS1. Download the app and verify the OTP2.After verifying the OTP swipe onthe...
Share:

How to Covering Tracks over Network (Hide Your Self From Them)

Covering Tracks over Network – Most important step of a Hack attack. Most Hackers know how to hack into networks as lots of tutorials are available over the internet regarding how to do information gathering, scanning or networks and vulnerability database. But you will hardly find anything likecovering...
Share:

Kick User(s) Off From Wifi

WiFi Kill allows you to boot people off your WiFi connection. What you need: ROOTED Android Phone Android 2.1 or higher Target WiFi network WiFi Kill APK (download here: http://forum.ponury.net/viewtopic.php?f=12&t=10 ) Connect to the target WiFi network with your Android phone. Open WiFi Kill app. Click the ON button The app will now scan the network for PC's Press the check box next...
Share:

Base64 (Complete Guide For Images Encryption)

Base64 and image filesFor those who don’t know base64 it’s an encoding format for any data. In that case with the images we can simply say, that base64 equals to text (string) representation of the image itself. In most cases you’ve image tags with src attribute pointing to the http source of the image.Overview of the problemLet’s say we’ve a HTML document with 100 images into. That’s a rare case...
Share:

Vulnerability Assessment (Short Guide)

Vulnerability assessment is a methodology that acknowledges and classifies the security bugs in a pc, network, or infrastructure.Some type of automated scanning product is used to look at the ports and companies on a vary of IP addresses. Most of those merchandise can even check for the kind of working system and utility software program operating and the variations, patch ranges, consumer accounts,...
Share:

Google dorks (Specific File(s))

Depends entirely on what you are looking for, here are some:"favorite links" Keyword(s)"favorite links""favorite sites" Keyword(s)"favorite sites""Keyword(s) sites""Keyword(s) website""Keyword(s)""list * Keyword(s) * sites""list * Keyword(s)""list of Keyword(s) sites""list of Keyword(s)""recommended links" Keyword(s)"recommended links""recommended sites" Keyword(s)"recommended sites"directory * Keyword(s)intitle:directory...
Share:

Full-stack Web Developer (Complete Guide)

Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. You can count on a full-stack web developer to design, code, implement and maintain a fully functional modern interactive website on his/her own (not just a static website with a few pages).Full-stack Web DeveloperWith the ever evolvement of the almighty World Wide...
Share:

URL Rewriting (Complete Guide)

Original URL:Eg:http://example.com/followers.php?id=techygangaRewriting URLEg:http://example.com/9lessons/followers.htaccess CodeRewriteEngine OnRewriteRule ^([a-zA-Z0-9_-]+)/\followers$ followers.php?id=$1RewriteRule ^([a-zA-Z0-9_-]+)/\following$ following.php?id...
Share:

SigPloit Framework (What You Need To Know)WYNTK

SigPloit Framework – Telecom Vulnerability Testing for SS7, GTP (3G), Diameter(4G), and SIP Made Easy SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use.What is SigPloitAs described on GitHub, SigPloit is...
Share:

Computer Strain (Save you eyes and Future)

No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer screen. Your eye savior, f.lux is here. First things first, what is f.lux and why do you need it? Why do you need f.lux ?Decreasing the brightness is not that attractive an option, because...
Share:

How to Change your Site from HTTP to HTTPS Complete guide

HTTP to HTTPSScenario :You want to force people coming to your site to use HTTPS. Either for the entire site or a small sub-section of it.NoteUsing mod_rewrite to do this isn't the recommended behavior. Fix :RewriteEngine On# This will enable the Rewrite capabilitiesRewriteCond %{HTTPS} !=on# This checks to make sure the connection is not already HTTPSRewriteRule ^/?(.*) https://%{SERVER_NAME}/$1...
Share:

Complete A-Z Kali Linux Commands

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker),...
Share:

Sample Text

Copyright © 2025 Promoting Unique Content | Powered by Blogger Design by ronangelo | Blogger Theme by NewBloggerThemes.com