Posts

Showing posts from September, 2020

Mobile overheating main 5 reasons 😦😦

Image
5 main reasons for mobile overheating. Hello friends today, I will tell you why mobile is hotter. Mobile is more hot than your 5 mistakes - (1) Keeping the mobile RAM more full -  When you keep your mobile memory full, then your mobile starts heating up. Suppose you have a mobile of 2 or 3 GB ram and you can keep your mobile memory If you fill up the entire 2 GB, then your mobile processor takes more time to load the apps or any other files in your mobile phone and when your mobile processor takes more time, your mobile battery will load a lot. And in the meantime your mobile battery will start heating up and then some parts of your mobile will also become hot. This is why your mobile is more hot. (2) Using apps of higher size -  Whenever you use an app of higher size, then that app takes up more space in your mobile storage and your mobile processor comes under pressure and your mobile starts heating up. . (3) Running the Internet for a long time -  When you run the Internet for a lon

When did Android come ? 🤔

Image
When did Android come ?  Hello friends, today I will tell you who made Android and when the first version of Android was launched. But friends before that know what Android is. What is Android -  Android is an operating system that is an open source modified version of the Linux kernel. . The first version of Android was made in alpha 1.0 which came out on September 23. 2008 . Lists of all versions of Android and their arrival date - (1.) Alpha 1.0  (september 23. 2008 .) (2.) Beta 1.1  (February 9. 2009.) (3.) Cupcake 1.5   (April 27. 2009 .) (4.) Donut 1.6  (September 15. 2009 ) (5.) Eclair 2.0 – 2.1   (October 26. 2009 ) (6.) Froyo 2.2 –v2.2.3  (may 20. 2010 ) (7.) Gingerbread 2.3 – 2.3.7    (December 06. 2010 ) (8.) Honeycomb 3.0 – 3.2.6   (February 22. 2011 ) (9.) Ice cream sandwich 4.0 – 4.0.4  (October 18. 2011 ) (10.) Jelly bean 4.1 – 4.3.1   (July 09. 2012 ) (11) KitKat 4.4 – 4.4.4  (October 31. 2013 ) (12) Lolipop 5.0 – 5.1.1  (November 12. 2014 ) (13) Marshma

😲How to increase views on Blogger with termux

Image
how to increase views on blogger with termux😲 .hello friends, today I will teach you how to increase views on Blogger, if you want to learn, then watch this video below 👇 👍 Thankyou friends on see my Blog 😊😊               Have a nice day

hack insta with phishing

Image
Instagram hack with phishing attack - .Friends, today I will tell you how to hack someone's Instagram I'd by phishing So guys, you can hack someone's Instagram I'd by watching the video below - this video is for education testing Friends, you cannot use it illegally, if you use it for wrong things, then it will be a crime. thanks for watching my blog                                                   have a nice day

How to hack Facebook with a phishing attack -

Image
  How to hack Facebook with phishing attack Hello friends, today I will tell you how to hack Facebook First of all, download Termux in your mobile, you can also do it from Play Store. If you do not have knowledge of termux then you can see this blog of mine https://www.cyberplayx.ml/2020/09/termux-termux-termux-terminal-emulator.html If you are fishing in the beginning, by watching this video, you can do Facebook fishing Thankyou for watching my website          Have a nice day

world's first computer virus ?

Image
Hello friends, I am present today with a new topic. You may have heard the name of the virus, I'm not talking about a virus in a man's body, I'm talking about a computer virus, if you don't know what a virus is, on the link to  -  https://www.cyberplayx.ml/2020/09/what-is-computer-virus.html?m=1   Click what is a virus?  Today I will tell you what was the name of the world's first computer virus and who created it. Name of the world's first computer virus -  .Friends, the world's first computer virus was named 'Creeper'. Who created the world's first computer virus -  .The world's first computer virus was created by "Ray Tom Lisson". He was a computer programmer. The virus did not cause any harm to the computer. When the virus went into someone's computer, it would print a message that said " I am a creeper Catch me if you can  ". So how was it, comment on this subject and tell. Thank you for viewing the blog.        

What is a computer virus ?

Image
What is a computer virus ? . Hello friends, today on this new topic you will know what happens in your computer or mobile, what you say is virus or worm. Friends, I went to my friend's wedding once and I heard someone say that a virus has come in my phone and it is a worm, so I told him how you can easily say that this virus If there is a worm, he said that I have heard from people that the virus that occurs in a mobile or computer is called a worm. Then I said that brother do not call the virus that is in the mobile or computer, then he replied that what is it called. When I explained it to him, he was stunned to hear this. So now you also hear what I understand about this virus - What is a virus in real -  . Friends virus is a type of program or software that is created by coding. It is made from computer itself. How the virus spoils the computer or mobile -  . friends, when the virus goes into the computer or mobile, the files that are directly in the computer

What is ss7 attack ?

Image
Hello friends today I will tell you what is ss7 attack ? Before that, let us know what ss7 is - ss7 means 'signalling system 7' is a kind of protocol. Let's say with an example in easy language, assume that someone is a network provider named (A) and he provides the people with a singling system and one day he makes a call or text message to someone named (B). The process that calls or text messages between a network provider named (A) and a person named (B) or what works between them is called ss7. Now let's talk about what ss7 attack is -  friends germany karsten nohl in 2014, who was a researcher he used to work for a network protocol company, he brought ss7 in front of the world there is some flaw inside ss7 and if they If not fixed, hackers can attack hacking on ss7, if that company did not believe them, then they proved hacking attack on ss7 in 60 minutes to prove this flaw, then the world came to know how to attack it. is . Have you ever heard th

What is Termax and how to use it?

Image
  What is Termax and how to use it? Friends, today I will tell you what is termux. Friends termux is a terminal emulator that provides linux environments such as kali linux, and parrot os. If you are fond of hacking, then you must know about them. Tools like Nump, Hydra can also be installed with the help of Termx app. So guys, this was an introduction to termux, now I will tell you how to use termux. . Therefore it is very easy to run Termx. I will give you some basic commands, after that you will run Turmex and if you install and run each tool of Turmex at the same time, without any problem, stay on our blog. How to run Termax - Friends run Turmex with the command. Original order used in Tarmac - 1. Apt update   - Friends, when you open termux after first install then you have to apply these commands, after that your termux will be updated. 2. apt upgrade   - After Termx is updated, you must implement this command, after which your Termx will be upgraded

How to become a ethical hacker ?

Image
How to become a ethical hacker ? Friends, when you hear the word hacking, the picture that comes from your mind is related to crime, hacking is done for good deeds too, hacking is maligned because of criminals, if you do not know. What is hacking, then stop this blog, today i will tell you how to become a moral hacker. Friends, Ethical hacking is not easy and it is not difficult if you practice. Although many websites will be found on the Internet from which you can learn hacking, but those websites are taught at an advanced level. If you do not know even basic, you cannot learn hacking, then let me tell you that it is very important to have some basic knowledge to become an ethical hacker - Basic computer Network skills. Programming Language. Database skills. Linux skills. 1. Basic Computer Knowledge -   If you do not have the basic computer knowledge, you cannot be an ethical hacker - such as how you run the Internet in a computer, how to mail someone, what the doze command is and a

what is hacking ?

Image
What is hacking? Friends, today or tomorrow you must have heard the word hacking from someone's mouth or you have seen the hacking scene in many movies, in which a person steals data from a computer, hacking people do wrong and also do the right thing. Today we will know what is hacking and what are the types of hackers. What is real hacking -   Real hacking would be a real hacking to check and fix flaws in a website or any other social platform. There are three types of hackers - 1. Black Hat. 2. white hat. 3. Gray Hat. black hat - These are hackers who do evil things. These hackers hack money from government websites, government institutions and even social accounts, government banks, logo mobiles and people's bank accounts without anyone's permission. Have you ever heard discussions with people around you or have you noticed in the newspaper that the person's bank account has been hacked and money has been withdrawn, people have fraudulent links or from a Gmail accou