Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

what are Auxiliary Storage Devices ? (squential vs Random auxiliary storage)

              Auxiliary storage, secondary storage, or external storage are devices that store noncritical system data like documents, multimedia and programs, which are used whenever they are required. These files are invoked from the auxiliary storage when needed and then transferred to the primary storage so that the CPU can process them. The results of the process can also be sent back to the auxiliary storage for later retrieval. These storage devices hold data and programs for future use and are considered nonvolatile storage that retains information even when power is not available. The best example of auxiliary storage is hard disk drives and optical storage media like CDs, DVDs, and Blue ray. Other auxiliary storage belongs to the peripheral devices category as well, such as flash drives and any type of memory card. ž   Auxiliary storage devices can be categorized in two types based on data access.  1. Sequential Access ...

How to hack facebook without password and login (100% working) 2017 (undetectable phishing site)

PROCESS:-

1. goto the site(z-shadow.co)  and signup
2. after that , login and copy the link that you will get from the facebook icon.
3. now send the copied link to your victim from any media like facebook
4. after the victim clicks the link goto the website(z-shadow.co) and click on my Victims.
5. you get the username and passowrd there .
6. enjoy :)

watch video:-

https://www.youtube.com/watch?v=rkgR7-0prUk


HAVE A LINUX MACHINE ??
here's another method for you :) :-
https://www.youtube.com/watch?v=Sp4SGxzFQs0



catch me on facebook :- https://www.facebook.com/anonymousnepale

keywords:
hack facebook
100%working method
easily hack facebook
hack facebook from mobile
facebook hacking video



Comments