In this article, I will tell you how to hack Facebook from the phone. Friends here I will not use any other device like a computer, laptop, or tablet. Here I will show you the hacking of Facebook with Android phones. Friends, before I do that let me tell you that hacking is a serious … Continue reading How To Hack Facebook By Phone? Termux Hacking through Phishing.
In this article, I will explain what is bitcoin and bitcoin mining and bitcoin working too. I will also discuss the history of bitcoin. How it was invented and how it came into existence. Is it legal to invest in cryptocurrencies like bitcoin? So let's start with the history of bitcoin- What is Cryptocurrency? A … Continue reading What is Bitcoin and Bitcoin Mining? How Does Bitcoin Works?
Twitter is one of the famous social media platforms where you can follow all the famous tycoons and big personalities. But on Wednesday, July 15, 2020, a massive incident took place which creates a controversy when the world’s most recognizable person executives and celebrities account hacked. it does put a question on the high security, … Continue reading Who Hacked Twitter? How Twitter Accounts Were Hacked? A Teen Boy with 2 others Hacked the Twitter Account.
In this article, I will explain about How to hack any web camera through a mobile phone?’ Friends, it’s very easy to hack a web camera of any laptop, computer, and mob camera of the android phone. So, friends, this information is only for educational purposes. Don't misuse this info to deceive someone or must … Continue reading How To Hack Mobile Front Camera with Proof. Termux Camera Hacking Without Victim’s Knowledge – Linux Kings
In this article, I will tell you, How to do Mobile Root. Rooting a mobile is a very easy process. By rooting a mobile device we can get some advanced features in our and can customize our rooted device. But from the security purpose, mobile companies don't recommend us to root our phone. Because if … Continue reading How to Root A Phone With KingRoot. Best Software to Root phone
In this post, I will describe to you about How CarryMinati youtube Channel was hacked. Friends as you know recently many Big celebrities twitter account were hacked. Now Hacker Chose the Biggest video platform to hack. And Here the choose the Indian youtube star CarryMinati Yersternight on 24th July His second gaming channel was hacked. … Continue reading Carryislive HACKED?? How Hackers hacked Carryislive? Hackers advertised Bitcoin on Carryislive.
In this article, I will explain all terms of Computer Viruses like What is Malware? The Types of Malware, and How this malware can infect our system/PC. Let’s discuss these terms – What is Malware in computers? Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, … Continue reading What is Malware in Computers? Different Types Of Malware.
In this article I will explain about all terms of Hacking like What is Hacking? Who is a hacker? The Types of Hackers, What is Computer Hacking and How to become hacker. So Let’s discuss about these terms - What Is Hacking? Hacking is in some ways the online equivalent to burglary; in other … Continue reading What Is Hacking? Who Is Hacker? What Are The Types Of HACKER? WhiteHat, BlackHat and GrayHat Hacker ?
In this article I will explain all about OSPF that What is OSPF? and How to configure OSPF with Cisco routers? Also the working of routers with OSPF. So, OSPF stands for Open Shortest Path First. The OSPF protocol is an intra-domain routing protocol based on link state routing. Its domain is also an autonomous … Continue reading What is OSPF Protocol? How does it work? OSPF Routing Protocol with Examples.
In this article, I'll explain 'What is the RIP Routing?' How to use Rip Routing? and How to configure RIP Routing on Cisco Router. I'll discuss this topic with the help of the RIP routing lab setup that I configured in the Cisco Packet Tracer. So, before learning the configuration, we must have some basic … Continue reading What is RIP routing? Learn RIP Routing Configuration on router with example in a few steps.
In this article I will explain 'How to install Telnet server in Linux operating system?' and how does telnet works in Linux. 'How does a client uses Telnet in the terminal?' So to learn this please read all steps very carefully. I already posted an article on 'How to configure telnet on a Cisco router?' … Continue reading How to install telnet on Linux OS? Learn in very simple steps.
In this article, You will learn about Insta hacking. Today you will learn how a person can easily hack Instagram without the knowledge of the victim. Here you must know some basic info about your victim like user name, date of birth, nickname, contact no. etc. and as much as the information you can gather, … Continue reading How To Hack Instagram using Android Phone. Easiest trick to hack Instagram.
In this post, we will 'How are the public and private keys generated?' Here you will learn about asymmetric cryptography. Besides this, you will also learn about the ways of encryption and decryption of a text file in different ways by using public and private keys along with, the usage of private keys with the … Continue reading How are the public and private keys Generated? Encryption and Decryption of the file using Asymmetric Cryptography.
In this article, we will learn the different ways of setting a password on the Cisco router with the help of cisco packet tracer lab. But first, the question arises that Why we need to put different types of security for different users? From the point of view of the running status of the network … Continue reading How to configure different types of security on Router? How to set passwords on Router?
In this article, I'll explain the simple configuration of EIGRP protocol on Cisco routers. But before to this, we must have an idea about EIGRP protocol that What is EIGRP Protocol? How to use it? Where can we use this protocol? Friends if you want to earn all the information about EIGRP then please read … Continue reading How to Configure EIGRP Routing on Cisco Router? Simple Explanation of Eigrp Protocol?
In this article I will explain, What is disk stripping? Or How can we create Logical volume management or LVM in Linux? But before this, You must know that What is LVM? Friends if knows the answer then before reading next please write in the comment box and if don't know just continue your study. … Continue reading How to create LVM or Logical volume Management in Linux?
In this article, I will explain, 'How we can create Raid5 with the spare disks?' So here you will learn, what are the requirements to create RAID5 and you will also know about spare devices. Already I have discussed about Raid and its levels in my previous post. You can read it. Click here. In this article, … Continue reading How to create RAID5 with spare device in RHEL/CentOS? What is Spare device in CentOS/RHEL?
In this article, we will learn "How to configure Static on Cisco Router". Here we can learn static routing protocol on router. So, first of all, we should know What is Static Routing or Protocol? Dear one if you know the answer please mention it in the comment box and if don't know then continue … Continue reading How to Configure Static Routing on Cisco Router?
In this article, I'll explain "What is Raid or Disk Stripping" in Linux. As we all know data storage is very important for every business organization. Because Data is the important information of any organization. So it is very important to keep the security of data. So if a disk failure occurs then original data … Continue reading What is RAID Array?Different Levels of Raid in Linux? How to Configure Different Levels of RAID in Linux?
In this article, I will explain about compression and decompression of files in Linux. Here we will learn all methods of compressing and decompressing of files in Linux. So first of all, you must have a question in your mind that, "Why do we need compress or decompress a file or folder?" if you have … Continue reading How to Compress And Decompress Files in Linux. Different Ways of Compressing and Combining Multiple Files in Linux.