Skip to main content

Posts

KV NTPC Deeptinagar Library Application

It is a Application builted on Java and XML in Android Studio mainly for Android OS. This is an educational purpose application. This is builted on WebView Method of Android Application. Donwload App:- Download Now Download Source Code:- Source Code Link used as WebView:- Visit KV Library For more information visit my YouTube Channel:- YouTube Channel
Recent posts

How to Detect Canary Tokens | Cyber Security First Video

How to Detect Canary Tokens | Cyber Security First Video How to Detect Canary Tokens | Cyber Security First Video Hello Guys, I am Abhishek Yadav your host. These is the First Video on Cyber Security. and it's the second part of my Video "How to Trace anyone IP, System and Location | CanaryTokens" which is in my Ethical Hacking Section Playlist. For Watching that video click these link :- Click Here For Watching!! For More Information Visit :- Home Page Another Link :- Host Site Follow Me at GitHub:- Host GitHub Site GitHub Repository Link for Detecting MS Word File :- GitHub Repository Link Don't Forget to Give Star on my GItHub Repository if you like it. Don't Forget to Download:- Download Here Decrypter:- Decrypter Thanks For Watching the Video. Don't Forget to Subscribe the YouTube Channel:- Subscribe And Also don't forget to like , comment, and Share the Video. Thank You Again.....

How to Trace anyone IP, System and Location | CanaryTokens

How to Trace anyone IP, System and Location | Canary Tokens Hello, Guys I am your Host and your Friend Abhishek Yadav. Today we talked about CanaryTokens So, For more practical Hacking videos please Subscribe the YouTube Channel. This Channel would upload the videos on interesting topics of Advanced Computer, Advanced Ethical Hacking and Cyber Security. Thanks For Watching!! Video would come soon...  Follow me at GitHub:- Follow Me!!! Visit My Site :- Visit the Site Visit Our Site :- Visit Our Offcial Site Canary Tokens Official Site:- Canary Token Official Site Thanks For Watching This Video Again!!!

John The Ripper | The Password Cracking Tool | The Password Recovery Tool

John The Ripper | The Password Cracking Tool | The Password Recovery Tool John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows  LM hashes , plus lots of other hashes and ciphers in the community-enhanced version. Official Site: OpenWall GitHub Repository Link:- GitHub Link!! Official Site:- Official Site Another Link:- My Own Site Follow me on GitHub!!!! GitHub Link:- Follow mw!!

Dragon Blood-Dragon Fly WPA3 Vulnurability-Explained | Network Security | Ethical Hacking

Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old, the Wi-Fi Alliance recently announced the new and more secure WPA3 protocol. One of the main advantages of WPA3 is that, thanks to its underlying Dragonfly handshake, it's near impossible to crack the password of a network. Unfortunately, we found that even with WPA3, an attacker within range of a victim can still recover the password of the network. This allows the adversary to steal sensitive information such as credit cards, password, emails, and so on, when the victim uses no extra layer of protection such as HTTPS. Fortunately, we expect that our work and coordination with the Wi-Fi Alliance will allow vendors to mitigate our attacks before WPA3 becomes widespread. The Dragonfly handsh ake, which forms the core of WPA3, is also used on certain Wi-Fi networks that require a username and password for access control. That is, Dragonfly is

Ethical Hacking & Security Against Cyber Crime

ETHICAL HACKING & SECURITY AGAINST CYBER CRIME ETHICAL HACKING & SECURITY AGAINST CYBER CRIME By ABHISHEK YADAV ABSTRACT This paper explores the fast growing Cyber world and its components over the internet. The fast growing Internet has benefited the modern society in form of e-commerce, e-mail, online banking or system, advertising, vast stores of reference material etc. But, there is also a dark side, internet become a common and easy tool for the criminal activity using the weak link and vulnerability of internet. In this paper the author concentrated over the several hacking activity that come under the Cyber crime. It is also highlights the role of ethical hacker to evacuate from the culprits and cybercrime and illustrate on proactive approach to minimize the threat of hacking and Cyber crime. Keywords: Hacking, Security, Cyber Crime, Ethical, Threat, Vulnerability. INTRODUCTION Security is a state of well being of information and infrastructure in w

HTML 5 and CSS3 Fundamentals,Making Webpages-Computer Markup Language-Fundamentals of Computer Science

HTML5 and CSS3 Fundamentals HTML5 and CSS3 Fundamentals Home About Contact Background Every Web Developer Needs to Know Introduction In this article I'll describe the World Wide Web from a high level perspective, focusing on how a web page is request and delivered from a web server to a web browser. Then, I want to talk about web browsers, how they interpret the HTML you write, differences between browsers, what are standards and to paraphrase the old joke "if Standards are so great, why are there so many of them?" Finally, I'll talk about the thought process behind HTML5 and CSS3, why they were introduced and what they hope to achieve. A Brief Technical Overview of the World Wide Web The World Wide Web started out as a means for sharing scientific resources like research documentation between governmental and academic institutions. It took time for the technologies and practices to evolve beyond its original pu