Skip to main content

Posts

WHAT IS VPN AND HOW VPN TUNNELING WORKS?

Virtual Private Network (or VPN) TUNNEL EXPLAINED Now, a days Internet is openly used by everyone. Either it is used in their Smartphones or Computer. But where is our freedom to search freely on the Internet? We are not safe when we are using the Internet globally, Someone is watching us and they see what we are searching for Censorship and regulations threatening is growing freedom and security, we've seen an increasing number of services become available to protect your online web browsing... Virtual Private Network (or VPN), In simple words, We can say the ability to bypass government censorship and geo-blocked websites and services and do so without giving away who is doing the bypassing. It creates what is known as a tunnel between you and the internet, encrypting your internet connection and stopping ISPs, hackers, and even the government from s earching through your browsing activity.   WHAT IS A VPN Tunnel?  In simple words, While you connect through a VPN. It creates a c
Recent posts

How to Bypass Mega Transfer Quota Download Limit - FIXED!

FIXED!  Q!. How to Bypass Mega Transfer Quota Download Limit - FIXED! Step 1: Download Proton vpn from https://protonvpn.com/ and then Click on "Get Proton vpn Now", it will Redirect to download page. Then, click on "Get Free". Step 2: Now, Create an Account and Then you will get the Download file.    Step 3: Install Proton vpn and Also Download & Install MEGA sync.  Step 4: You can see the Mega Transfer Quota Counter is Started. Step 5: Exit your MEGAsync application.   Step 6: Then open Proton vpn and Connect to any Country.   Step 7: Then Start MEGA sync application again, after that you see you Downloading is working.

Some Important terms in Ethical Hacking ? You Should Know ?

  Ethical Hacking - Terminologies Adware The Adware is a software that target's pre-chosen ads to display on your system. Backdoor  The backdoor is a hidden door to enter in the system by bypassing security measures, such as login protections. Cracker A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features. Buffer Overflow  Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold. Denial of service attack (DoS) A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. DDoS    Distributed denial of service attack.

What is HTTP, SSL, TLS? About Internet Protocol Suite ? You should Know ?

HTTP/HTTPS/SSL/TLS - Application layer Internet Protocol Suite HTTP The HTTP stands for Hypertext Transfer Protocol. HTTP is set of rules and standards which dedicate how any information can be transmitted on the World Wide Web. HTTP provides standard rules for web browsers & servers to communicate. HTTPS   The HTTPS stands for Hypertext Transfer Protocol Secure. It is an advanced secure version of HTTP. It is a combination of SSL/TLS protocol and HTTP. It provides encrypted and secure identification of a network server. It allows you to create a secure connection between the server and the browser. SSL & TLS The SSL stands for Secure Socket Layer while TLS stands for Transport Layer Security. SSL and TLS are the protocols used to provide security between web browser and web server.  In SSL (Secure Socket Layer), Message digest is used to create a master secret and It provides the basic security services which are Authentication and Confidentiality.  In TLS (Transport Layer S

What Configuration is required for hacking ? You Should Know ?

What kind of Hardware or Devices are required to learn Ethical Hacking ?   You can buy Computer or Laptop or Raspberry PI for Hacking, and the rest are depending on your work. If I am talking about my configurations then, I have nothing at that time when I was starting. But I describe my first laptop configuration right below you can check and take better idea, Which is best for you.  My First Laptop Config: 1. Brand: HP 2. Model: Pro Book 445 G1  3. Colors: Anodized Aluminum  4. Operating System: (Windows 7/ Windows 10/ Kali Linux) (**NOTE: I am able to dual boot easily with Windows 10 and Kali Linux, I used different operating system in HP Pro Book.) 5. Processor: AMD Dual Core A6-5350M 6. Graphic Processor: AMD Radeon HD 8450G 7. RAM: 8 GB DDR3 8. HDD Capacity: 320 GB   You can check REFERENCE about my first Laptop.   REFERENCES: https://www.91mobiles.com/hp-445-g1-amd-elite-8-gb-320-gb-ubuntu-laptop-price-in-india-62351

Myth about Hackers ? You should Know ?

What is hacking? How many types of hackers are there? Is hacking illegal ? In which hackers discover loopholes and vulnerabilities/bugs of systems, networks to gain unauthorized access to the system by using those Vulnerabilities. Now a days hacking is also legal and illegal. Types of Hackers: 1. White Hat Hacker: They are also known as Ethical Hacker or a Penetration Tester. These people use the same technique used by the black hat hat hackers. They also hack systems, but with permissions. They focus on security and protecting IT systems. White Hat is legal. 2. Black Hat Hacker: They are also known as an Unethical Hacker or a Security Crackers. These people hack the system illegally to steal money or to achieve their own illegal goals. They find weak security companies like: Banks or other companies, and steal money or credit card information. Black Hat Hacking is illegal. 3. Gray Hat Hacker: These kind of hackers are mixture of Black Hat Hackers and White Hat Hackers. They can ha