Posts

Showing posts from October, 2017

WHY IS LINUX BEST OS FOR HACKING?

Image
TECHGNOR LINUX IS THE BEST OS FOR HACKING WHAT IS LINUX? Linux is an open source operating system for computers. Linux is a Unix-like operating system, meaning that it supports multitasking and multi-user operation. Linux is widely used for supercomputers, mainframe computers, and servers. Linux can also run on personal computers, mobile devices, tablet computers, routers, and other embedded systems. One of the most prominent examples of this is the Android mobile operating system, which is based on the Linux Kernel. Linux is capable of running many of the same applications and software as Windows and Mac OS X. Linux operating systems, software, and applications are commonly referred to as Linux distributions (distros for short). HACKING WITH LINUX Linux is an extremely popular operating system for hackers. There are two main reasons behind this. First off, Linux’s source code is freely available because it is an open source operating system. This means that Linux is very ea

INTERNET SERVER

Image
TECHGNOR INTERNET SERVER A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well. The process is an example of the client/server model. All computers that host Web sites must have Web server programs. Leading Web servers include Apache (the most widely-installed Web server), Microsoft's Internet Information Server (IIS) and nginx (pronounced engine X) from NGNIX. Other Web servers include Novell's NetWare server, Google Web Server (GWS) and IBM's family of Domino servers. Web servers often come as part of a larger package of Internet- and intranet-related programs for serving email, downloading requests for File Transfer Protocol (FTP) files, and building and publishing Web pages. Considerations in choosing a Web server include how well

MAN IN THE MIDDLE ATTACK

Image
TECHGNOR MAN IN THE MIDDLE ATTACK What is a Man-in-the-Middle (MITM) attack? A MITM attack happens when a communication between two systems is intercepted by an outside entity. This can happen in any form of online communication, such as email, social media, web surfing, etc. Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices. Taking away all the technicalities, the concept of an MITM attack can be described in a simple scenario. Imagine being brought back to the days of old when snail mail was rife. Jerry writes a letter to Jackie expressing his love for her after years of hiding his feelings. He sends the letter to the post office and it’s picked up by a nosy mailman. He opened it and, just for the hell of it, he decided to rewrite the letter before delivering the mail to Jackie. This results in Jackie hating Jerry for the rest of her life after “Jerry” called her a fat cow. The moral of the stor

CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER 2017

Image
TECHGNOR CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER 2017 AS,I TOLD FRIENDS I WILL BE PUBLISHING THE SNEEK PEAKS OF CLASH OF CLANS HUGE UPDATES COMING IN THIS OCTOBER.LET'S START SNEEK PEAK NO.1{VALK AND GOLEM} SNEEK PEAK NO.1{VALK AND GOLEM} SUPERCELL HAS JUST PROVIDED THIS OFFICIAL SNEEK PEAK OF GOLEM AT LVL 7 AND VALKRYIE AT LVL 6. SNEEK PEAK NO.2{NEW CLAN BADGES AND CLAN LEVEL} SNEEK PEAK NO.2{NEW CLAN BADGES AND CLAN LEVEL} SUPERCELL HAS JUST ANNOUNCED THAT THERE WILL BE NEW CLAN LEVELS UPTO 25 AND CLAN BADGES WILL BE ACCORDING TO CLAN LEAGUES. SNEEK PEAK NO.3{INTRODUCING BB FRIENDLY CHALLENGES} SNEEK PEAK NO.3{INTRODUCING BB FRIENDLY CHALLENGES} SUPERCELL HAS OFFICIALLY ANNOUNCED THAT BB FRIENDLY CHALLENGES WILL ALSO BE AVAILABLE AFTER THIS UPDATE. IT'S ALL THE SNEEK PEAK THAT HAS BEEN ANNOUNCED TILL NOW BY SUPERCELL.IT HAD ALSO BEEN MENTIONED THAT TH UPDATE WILL ALSO COME.BE TUNED FOR MORE NEWS. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE F

USB RUBBER DUCKY

Image
TECHGNOR USB RUBBER DUCKY The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute. Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator. Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as the first IT automation HID using an embedded dev-board, it has since grown into a full fledged commercial Keystroke Injection Attack Platform. The USB Rubber Ducky captured the imagination of hackers with its simple scripting language, formidable hardware, and covert design. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE JOIN THE FORUM

TECHGNOR:DISCUSSION FORUM

Image
TECHGNOR DISCUSSION FORUM HELLO,FRIENDS I JUST CREATED A DISCUSSION FORUM FOR ALL OF US TO LEARN AS WELL AS TEACH NEW PROGRAMMING,HACKING,AND GRAPHIC DESIGNING IDEAS.I WILL POST ABOUT THE SNEEK PEEKS OF CLASH OF CLANS THIS SUNDAY. JOIN THE FORUM FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE

FACEBOOK SHUTDOWN THE AI PROGRAM

Image
TECHGNOR FACEBOOK SHUTDOWN THE AI PROGRAM Facebook shut down an artificial intelligence engine after developers discovered that the AI had created its own unique language that humans can’t understand. Researchers at the Facebook AI Research Lab (FAIR) found that the chatbots had deviated from the script and were communicating in a new language developed without human input. It is as concerning as it is amazing – simultaneously a glimpse of both the awesome and horrifying potential of AI. Artificial Intelligence is not sentient—at least not yet. It may be someday, though – or it may approach something close enough to be dangerous. Ray Kurzweil warned years ago about the technological singularity. The Oxford dictionary defines “the singularity” as, “A hypothetical moment in time when artificial intelligence and other technologies have become so advanced that humanity undergoes a dramatic and irreversible change.” To be clear, we aren’t really talking about whether or not Alexa

INTRO VIDEO PART:2

TECHGNOR OUR INTRO VIDEO I HAD JUST CREATED A NEW ANIMATED INTRO VIDEO.HOPE YOU WILL ENJOY IT WATCHING.IT CLEARS THE MOTTO OF TECHGNOR.

INTRO VIDEO PART:1

TECHGNOR OUR INTRO VIDEO I HAD JUST CREATED A NEW ANIMATED INTRO VIDEO.HOPE YOU WILL ENJOY IT WATCHING.IT CLEARS THE MOTTO OF TECHGNOR.

PYTHON IS BEST FOR HACKING

Image
TECHGNOR PYTHON IS BEST The word “hacker” is an overloaded word. It has multiple meanings based on context. See the Jargon file for a long list of potential meanings. I’m going to focus on three ideas of “hacking” and why they all connect well with Python: A hacker can be someone who puts things together without care, usually performing the work quickly with an eye for the intended behavior, not the long term survivability of the thing. Often a programmer “hacks together a prototype” or other such forms. Python is great for this early hacking period, where code is often disposable and any solution is good for now. With a giant standard library, and a packaging system that puts prebuilt tools and frameworks at your fingertips, it is often very easy to hack something into existence. Another version of hacking is working with enthusiasm. Figuring out exactly where to improve your code, profiling options, putting things together and taking them apart again. Taking apart things ju

BEWARE:HERE IT'S RANSOMEWARE VIRUS

Image
TECHGNOR RANSOWARE VIRUS Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and Bitcoin are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one hi

METASPLOIT:THE BEST HACKING AND PENTESTING SOFTWARE.

Image
TECHGNOR METASPLOIT The Metasploit Project is an open source project that provides a public resource for researching security vulnerabilities and developing code that allows a network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first. The Metasploit Project offers penetration (pen) testing software and provides tools for automating the comparison of a program's vulnerability and its repaired (patched) version. Anti-forensic and advanced evasion tools are also offered, some of them built into the Metasploit Framework. Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system. It was originally created as a portable network tool in 2003 by HD Moore. The Metasploit Project also offers Metasploit Expres

Programming

Image
TECHGNOR PROGRAMMING. Programming is the process of taking an algorithm and encoding it into a notation, a programming language, so that it can be executed by a computer. Although many programming languages and many different types of computers exist, the important first step is the need to have the solution. Without an algorithm there can be no program. Computer science is not the study of programming. Programming, however, is an important part of what a computer scientist does. Programming is often the way that we create a representation for our solutions. Therefore, this language representation and the process of creating it becomes a fundamental part of the discipline. Algorithms describe the solution to a problem in terms of the data needed to represent the problem instance and the set of steps necessary to produce the intended result. Programming languages must provide a notational way to represent both the process and the data. To this end, languages provide control co

TECHGNOR

Image
TECHGNOR TECHGNOR WAS ESTABLISHED IN 2017.IT WAS ESTABLISHED BY PRINCE SHRESTHA.IT'S HEADQUARTER OFFICE IS IN NEPAL.IT'S MAIN OBJECTIVE IS TO ESTABLISH A TECHNICAL WORLD FULL OF PEACE AND HUMANITY.READ THE BELOW WRITTEN MESSAGE HI,I AM PRINCE SHRESTHA.I AM 14 YEARS OLD BOY.I WANT TO BE A TECHNICAL AND A COMPUTER MASTER.I WANT TO ESTABLISH MY OWN COMPANY AND CHANGE THIS WORLD.I HAVE INTERMEDIATE LEVEL OF HACKING,PROGRAMMING KNOWLEDGE.PLEASE SUPPORT ME. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE