Posts

WHY IS LINUX BEST OS FOR HACKING?

Image
TECHGNOR LINUX IS THE BEST OS FOR HACKING WHAT IS LINUX? Linux is an open source operating system for computers. Linux is a Unix-like operating system, meaning that it supports multitasking and multi-user operation. Linux is widely used for supercomputers, mainframe computers, and servers. Linux can also run on personal computers, mobile devices, tablet computers, routers, and other embedded systems. One of the most prominent examples of this is the Android mobile operating system, which is based on the Linux Kernel. Linux is capable of running many of the same applications and software as Windows and Mac OS X. Linux operating systems, software, and applications are commonly referred to as Linux distributions (distros for short). HACKING WITH LINUX Linux is an extremely popular operating system for hackers. There are two main reasons behind this. First off, Linux’s source code is freely available because it is an open source operating system. This means that Linux is very ea

INTERNET SERVER

Image
TECHGNOR INTERNET SERVER A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well. The process is an example of the client/server model. All computers that host Web sites must have Web server programs. Leading Web servers include Apache (the most widely-installed Web server), Microsoft's Internet Information Server (IIS) and nginx (pronounced engine X) from NGNIX. Other Web servers include Novell's NetWare server, Google Web Server (GWS) and IBM's family of Domino servers. Web servers often come as part of a larger package of Internet- and intranet-related programs for serving email, downloading requests for File Transfer Protocol (FTP) files, and building and publishing Web pages. Considerations in choosing a Web server include how well

MAN IN THE MIDDLE ATTACK

Image
TECHGNOR MAN IN THE MIDDLE ATTACK What is a Man-in-the-Middle (MITM) attack? A MITM attack happens when a communication between two systems is intercepted by an outside entity. This can happen in any form of online communication, such as email, social media, web surfing, etc. Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices. Taking away all the technicalities, the concept of an MITM attack can be described in a simple scenario. Imagine being brought back to the days of old when snail mail was rife. Jerry writes a letter to Jackie expressing his love for her after years of hiding his feelings. He sends the letter to the post office and it’s picked up by a nosy mailman. He opened it and, just for the hell of it, he decided to rewrite the letter before delivering the mail to Jackie. This results in Jackie hating Jerry for the rest of her life after “Jerry” called her a fat cow. The moral of the stor

CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER 2017

Image
TECHGNOR CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER 2017 AS,I TOLD FRIENDS I WILL BE PUBLISHING THE SNEEK PEAKS OF CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER.LET'S START SNEEK PEAK NO.1{VALK AND GOLEM} SNEEK PEAK NO.1{VALK AND GOLEM} SUPERCELL HAS JUST PROVIDED THIS OFFICIAL SNEEK PEAK OF GOLEM AT LVL 7 AND VALKRYIE AT LVL 6. SNEEK PEAK NO.2{NEW CLAN BADGES AND CLAN LEVEL} SNEEK PEAK NO.2{NEW CLAN BADGES AND CLAN LEVEL} SUPERCELL HAS JUST ANNOUNCED THAT THERE WILL BE NEW CLAN LEVELS UPTO 25 AND CLAN BADGES WILL BE ACCORDING TO CLAN LEAGUES. SNEEK PEAK NO.3{INTRODUCING BB FRIENDLY CHALLENGES} SNEEK PEAK NO.3{INTRODUCING BB FRIENDLY CHALLENGES} SUPERCELL HAS OFFICIALLY ANNOUNCED THAT BB FRIENDLY CHALLENGES WILL ALSO BE AVAILABLE AFTER THIS UPDATE. IT'S ALL THE SNEEK PEAK THAT HAS BEEN ANNOUNCED TILL NOW BY SUPERCELL.IT HAD ALSO BEEN MENTIONED THAT TH UPDATE WILL ALSO COME.BE TUNED FOR MORE NEWS. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE F

USB RUBBER DUCKY

Image
TECHGNOR USB RUBBER DUCKY The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute. Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator. Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as the first IT automation HID using an embedded dev-board, it has since grown into a full fledged commercial Keystroke Injection Attack Platform. The USB Rubber Ducky captured the imagination of hackers with its simple scripting language, formidable hardware, and covert design. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE JOIN THE FORUM

TECHGNOR:DISCUSSION FORUM

Image
TECHGNOR DISCUSSION FORUM HELLO,FRIENDS I JUST CREATED A DISCUSSION FORUM FOR ALL OF US TO LEARN AS WELL AS TEACH NEW PROGRAMMING,HACKING,AND GRAPHIC DESIGNING IDEAS.I WILL POST ABOUT THE SNEEK PEEKS OF CLASH OF CLANS THIS SUNDAY. JOIN THE FORUM FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE

FACEBOOK SHUTDOWN THE AI PROGRAM

Image
TECHGNOR FACEBOOK SHUTDOWN THE AI PROGRAM Facebook shut down an artificial intelligence engine after developers discovered that the AI had created its own unique language that humans can’t understand. Researchers at the Facebook AI Research Lab (FAIR) found that the chatbots had deviated from the script and were communicating in a new language developed without human input. It is as concerning as it is amazing – simultaneously a glimpse of both the awesome and horrifying potential of AI. Artificial Intelligence is not sentient—at least not yet. It may be someday, though – or it may approach something close enough to be dangerous. Ray Kurzweil warned years ago about the technological singularity. The Oxford dictionary defines “the singularity” as, “A hypothetical moment in time when artificial intelligence and other technologies have become so advanced that humanity undergoes a dramatic and irreversible change.” To be clear, we aren’t really talking about whether or not Alexa