Posts

Showing posts from September, 2020

Best Food for Skin || Best food to increase STAMINA || Best Food For hair growth

Image
1. BEST FOOD FOR SKIN . Brocoli . Water based Fruits . Nuts . Citrus fruits . Papaya . Salmon . Mackerel . fatty fish . Carrots . Apricots . Orange 2. Best food to increase STAMINA . Eggs . Green vegetables . Banana . Almonds . Brown rice . Fish . Peanut Butter .  Citrus Fruits 3. Best Food For hair growth . Eggs . Berries . Spinach . Sweet potatoes . Avocados . walnuts . Meat . Yogurt . Blueberries

Health Related Tips

Image
  1. Cold Water Benefits . Drinking 2 cups of cold water on a empty stomach can boost metabolism by 30%. 2. Concentration on work. Chew some peppermint gum. the taste of peppermint has been proven to stimulates Brain activity and help Increase our Focus. 3.KIWI. World's Strongest Food is kiwi. Taking Kiwi reduces eye problems and Increase eyesights. 4. Gram Flour. Gram floue ( Besan ) With lemon water mixed removes Pimples and adds glow to the skin. 5. Pomegranate Juice Pomegranate juice helps to gain weight and increases Blood in Huamn Beings.

Six Powerful Attacks In Cyber world .

Image
  Six Big Attacks 1. DDOS Attack   * A Distributed Denial of Service  A ttack  is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. 2. Phishing. * Phishing attack  attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more . 3. Backdoor. * A Backdoor  is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.  A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.  4. Man in the middle attack. * A Man In The Middle attack  (MITM) is an attack against a cryptographic protocol. As the name implies, in this attack the attacker sits in the middle and negotiates different cryptographic parameters with the client and the server  . 5. SQL injection. * A SQL injection  attack consists of insertion or “injection” of a SQL query v

Some HAcKing Terms ! Generally Used

Image
INFOSEC   *Information security, which is the practices of Preventing unauthorized access, use, Disclosure, disruption, Modification, Inspection, Recording or destruction of information . type information or data may take any form, e.g. Electronic or physical. Infosec can also be a person who practices ethical security. OPSEC *Operation security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determine if information obtained by Adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. RED TEAM *The Red Team is an Independent  Group that Challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective In organization With Strong Culture and Fixed ways of Approaching Problems. BLUE TEAM *A Blue team is a group of individuals

How to activate debut video capture

Image
FOLLOW THESE STEPS FOR USING  DEBUT VIDEO CAPTURE SOFTWARE FOR FREE:- NO NEED TO SERIAL KEY OR REGISTARTION KEY :- 1. DOWNLOAD THE DEBUT VIDEO CAPTURE SOFTWARE FROM THE OFFICAL WEBSITE.    https://www.nchsoftware.com/capture/index.html 2. THEN INSTALL IT. 3. press win + r to open RUN.   4. Type --> "regedit"    Press Enter 5. PRESS HKEY_CURRENT_USER 6. THEN GO TO THE FILE LOCATION "NCH SUITE" THEN DEBUT 7. AND CLICK ON REGISTATION KEY 8. DELETE ALL THE FILES EXCEPT DEFAULT(NO USER ). 9. THEN CLOSED IT .  10. USE DEBUT VIDEO CAPTURE SOFTWARE WITHOUT ANY Registation KEY.