Posts

What is programing language ?

Image
. Hello friends today I will tell you what are the benefits of learning programming language and whether it can be made a career or not. But guys, if you don't know what a programming language is, I'll tell you. .What is a programming language -  Friendly programming languages ​​are those which are ordered by an operating system to a computer or mobile to do so and then your computer performs your work by following that command. Meaning that computers 0 and 1 have only known language. When you run something in a computer, you use the help of an operating system. And these operating systems are built from the programming language itself. So this is how a programming language works. .now let's talk about whether a career can be made with programming language - Friends, let me tell you that you can make a career with programming language. Friends learn programming language, you can create websites, Android apps etc. and you can earn a lot of money. Friends, in today's era,...

What is Wireshark (basic)

Image
 What is Wireshark ? Hello friends, today we will know what is Wireshark - . Wireshark is an open source packet capture analyzer. .Wireshark - Suppose when you run the Internet in your mobile or in your computer, where your data goes or you are downloading a song from the Internet, it comes as a packet in your mobile and those packets together make a file. When you download a song, when those packets come to you, then those packets contain a lot of information about you. Such as where your packets are going, what is the IP address of your mobile and much more information. Now suppose that someone is capturing your packet, then your data will also be visible to them.     .  This is the work of wireshark. Wireshark captures your packets. Wireshark is a software. friends, this was the original subject of WireShark, if you liked it, comment. Thank you                     Have a good day . 😎

What is tcp

Image
 What is tcp Friends, today we will know what is TCP - . Friends TCP has a flower form Transmission Control Protocol. Know how TCP works - . Friends, every computer has its own IP. When you run the Internet in your computer, when you download a webpage or a file, it reaches you in the form of packets. I mean to say that if you serve any webpage from the internet, they come in your browser as packets and then load in your browser. And when you send or download a file, the packets of that file will be loaded in your browser and when all those packets are loaded then you will see that file. So this is what TCP means when files are being downloaded in your computer and unfortunately your connection is broken, then the packets you are loading are stopped and that file is not fully downloaded and when your When the connection returns, those packets start loading into your computer. So when your connection was broken and returned, TCP reloads the packets you had between them. So friends, ...

NASA's first hacker

Image
 NASA's first hacker . Friends, this is the story of Jonathan James, who first hacked NASA, let's learn about Jonathan James About jonathan james - Jonathan James was born on 12 December 1983 in the US. He was fond of computers since childhood. His brain is said to be very fast in computers, when boys his age played, Jonathan James was involved in coding. And on May 18, 2008, Jonathan James committed suicide. His entire hacking trip.  . When Jonathan James learned coding it was when he decided to test his skills and Jonathan James thought of hacking his school computer. He created a hacking program of his own and sent programs designed for school computers and his programs were also successful. And then Jonathan James thought of hacking something big, then he looked at NASA's computers. So Jonathan James sent the program made on NASA's computer. They also hacked NASA's computers and removed some software in those computers that caused great damage to NASA. People wo...

What is artificial intelligence (A.I)

Image
AI (artificial intelligence) a threat to humans? . Friends, technology is increasing in today's times, now it is not our earlier technology, since mobile and computers have come with internet, our work has become even easier, I mean to say that all today Something has gone online. . The dreaded experiment of 2017 that created panic in the world. Friends, some Facebook engineers were engaged in making a project. They were creating a chatboard, which means that you must have ever used a chatboard in which you did hello or hi and from there it comes automatically, the same chatboard. They were making some chatboards in which machines were making laughing, Ronna, angry and talking. So an idea came to the mind of a developer that when the program was talked to each other, they were surprised because when program A was introduced in program B, they were speaking like program A - what All I can do is Program B - Program a zero for me Zero dot dot dot for me. They did not understand what t...

how to hack mobile with termux

Image
  How to hack mobile with termux   ! This video is education purpose, don't abuse it . Thanks for watching my video

Mobile overheating main 5 reasons 😦😦

Image
5 main reasons for mobile overheating. Hello friends today, I will tell you why mobile is hotter. Mobile is more hot than your 5 mistakes - (1) Keeping the mobile RAM more full -  When you keep your mobile memory full, then your mobile starts heating up. Suppose you have a mobile of 2 or 3 GB ram and you can keep your mobile memory If you fill up the entire 2 GB, then your mobile processor takes more time to load the apps or any other files in your mobile phone and when your mobile processor takes more time, your mobile battery will load a lot. And in the meantime your mobile battery will start heating up and then some parts of your mobile will also become hot. This is why your mobile is more hot. (2) Using apps of higher size -  Whenever you use an app of higher size, then that app takes up more space in your mobile storage and your mobile processor comes under pressure and your mobile starts heating up. . (3) Running the Internet for a long time -  When you run the Inte...

When did Android come ? 🤔

Image
When did Android come ?  Hello friends, today I will tell you who made Android and when the first version of Android was launched. But friends before that know what Android is. What is Android -  Android is an operating system that is an open source modified version of the Linux kernel. . The first version of Android was made in alpha 1.0 which came out on September 23. 2008 . Lists of all versions of Android and their arrival date - (1.) Alpha 1.0  (september 23. 2008 .) (2.) Beta 1.1  (February 9. 2009.) (3.) Cupcake 1.5   (April 27. 2009 .) (4.) Donut 1.6  (September 15. 2009 ) (5.) Eclair 2.0 – 2.1   (October 26. 2009 ) (6.) Froyo 2.2 –v2.2.3  (may 20. 2010 ) (7.) Gingerbread 2.3 – 2.3.7    (December 06. 2010 ) (8.) Honeycomb 3.0 – 3.2.6   (February 22. 2011 ) (9.) Ice cream sandwich 4.0 – 4.0.4  (October 18. 2011 ) (10.) Jelly bean 4.1 – 4.3.1   (July 09. 2012 ) (11) KitKat 4.4 – 4.4....

😲How to increase views on Blogger with termux

Image
how to increase views on blogger with termux😲 .hello friends, today I will teach you how to increase views on Blogger, if you want to learn, then watch this video below 👇 👍 Thankyou friends on see my Blog 😊😊               Have a nice day

hack insta with phishing

Image
Instagram hack with phishing attack - .Friends, today I will tell you how to hack someone's Instagram I'd by phishing So guys, you can hack someone's Instagram I'd by watching the video below - this video is for education testing Friends, you cannot use it illegally, if you use it for wrong things, then it will be a crime. thanks for watching my blog                                                   have a nice day

How to hack Facebook with a phishing attack -

Image
  How to hack Facebook with phishing attack Hello friends, today I will tell you how to hack Facebook First of all, download Termux in your mobile, you can also do it from Play Store. If you do not have knowledge of termux then you can see this blog of mine https://www.cyberplayx.ml/2020/09/termux-termux-termux-terminal-emulator.html If you are fishing in the beginning, by watching this video, you can do Facebook fishing Thankyou for watching my website          Have a nice day

world's first computer virus ?

Image
Hello friends, I am present today with a new topic. You may have heard the name of the virus, I'm not talking about a virus in a man's body, I'm talking about a computer virus, if you don't know what a virus is, on the link to  -  https://www.cyberplayx.ml/2020/09/what-is-computer-virus.html?m=1   Click what is a virus?  Today I will tell you what was the name of the world's first computer virus and who created it. Name of the world's first computer virus -  .Friends, the world's first computer virus was named 'Creeper'. Who created the world's first computer virus -  .The world's first computer virus was created by "Ray Tom Lisson". He was a computer programmer. The virus did not cause any harm to the computer. When the virus went into someone's computer, it would print a message that said " I am a creeper Catch me if you can  ". So how was it, comment on this subject and tell. Thank you for viewing the blog.         ...

What is a computer virus ?

Image
What is a computer virus ? . Hello friends, today on this new topic you will know what happens in your computer or mobile, what you say is virus or worm. Friends, I went to my friend's wedding once and I heard someone say that a virus has come in my phone and it is a worm, so I told him how you can easily say that this virus If there is a worm, he said that I have heard from people that the virus that occurs in a mobile or computer is called a worm. Then I said that brother do not call the virus that is in the mobile or computer, then he replied that what is it called. When I explained it to him, he was stunned to hear this. So now you also hear what I understand about this virus - What is a virus in real -  . Friends virus is a type of program or software that is created by coding. It is made from computer itself. How the virus spoils the computer or mobile -  . friends, when the virus goes into the computer or mobile, the files that are directly in the comp...

What is ss7 attack ?

Image
Hello friends today I will tell you what is ss7 attack ? Before that, let us know what ss7 is - ss7 means 'signalling system 7' is a kind of protocol. Let's say with an example in easy language, assume that someone is a network provider named (A) and he provides the people with a singling system and one day he makes a call or text message to someone named (B). The process that calls or text messages between a network provider named (A) and a person named (B) or what works between them is called ss7. Now let's talk about what ss7 attack is -  friends germany karsten nohl in 2014, who was a researcher he used to work for a network protocol company, he brought ss7 in front of the world there is some flaw inside ss7 and if they If not fixed, hackers can attack hacking on ss7, if that company did not believe them, then they proved hacking attack on ss7 in 60 minutes to prove this flaw, then the world came to know how to attack it. is . Have you ever heard th...

What is Termax and how to use it?

Image
  What is Termax and how to use it? Friends, today I will tell you what is termux. Friends termux is a terminal emulator that provides linux environments such as kali linux, and parrot os. If you are fond of hacking, then you must know about them. Tools like Nump, Hydra can also be installed with the help of Termx app. So guys, this was an introduction to termux, now I will tell you how to use termux. . Therefore it is very easy to run Termx. I will give you some basic commands, after that you will run Turmex and if you install and run each tool of Turmex at the same time, without any problem, stay on our blog. How to run Termax - Friends run Turmex with the command. Original order used in Tarmac - 1. Apt update   - Friends, when you open termux after first install then you have to apply these commands, after that your termux will be updated. 2. apt upgrade   - After Termx is updated, you must implement this command, after which you...

How to become a ethical hacker ?

Image
How to become a ethical hacker ? Friends, when you hear the word hacking, the picture that comes from your mind is related to crime, hacking is done for good deeds too, hacking is maligned because of criminals, if you do not know. What is hacking, then stop this blog, today i will tell you how to become a moral hacker. Friends, Ethical hacking is not easy and it is not difficult if you practice. Although many websites will be found on the Internet from which you can learn hacking, but those websites are taught at an advanced level. If you do not know even basic, you cannot learn hacking, then let me tell you that it is very important to have some basic knowledge to become an ethical hacker - Basic computer Network skills. Programming Language. Database skills. Linux skills. 1. Basic Computer Knowledge -   If you do not have the basic computer knowledge, you cannot be an ethical hacker - such as how you run the Internet in a computer, how to mail someone, what the doze command is a...

what is hacking ?

Image
What is hacking? Friends, today or tomorrow you must have heard the word hacking from someone's mouth or you have seen the hacking scene in many movies, in which a person steals data from a computer, hacking people do wrong and also do the right thing. Today we will know what is hacking and what are the types of hackers. What is real hacking -   Real hacking would be a real hacking to check and fix flaws in a website or any other social platform. There are three types of hackers - 1. Black Hat. 2. white hat. 3. Gray Hat. black hat - These are hackers who do evil things. These hackers hack money from government websites, government institutions and even social accounts, government banks, logo mobiles and people's bank accounts without anyone's permission. Have you ever heard discussions with people around you or have you noticed in the newspaper that the person's bank account has been hacked and money has been withdrawn, people have fraudulent links or from a Gmail accou...