Programming

192 Publication

We generate a fake identity with a work number, credit card and mail

There are quite a lot of resources for generating a personality, but why are they needed at all? First of all, for registration on sites where you need to specify a maximum of personal information. Such services save you time by generating fake data for you. The main disadvantage of sites for generating personalities is the lack of a real number and mail, because at the time of registration these We generate a fake identity with a work number, credit card and mail

How to hack a Wi-Fi router?

Hi, guy, welcome back to another great post, so guy, as we all know, hacking a router or Wi-Fi is a bit complicated, and it's impossible to hack it easily. So today I'm here with one of the best tricks with which you can easily hack any wifi router panel with this tool and trick, So let's get started. How to hack a Wi-Fi router?

How to find surveillance cameras around the world

BiG Brother is a tool that can be used to search for CCTV cameras with open ports around the world. Currently, only 3 brands of CCTV cameras are supported: Sony, Canon and Panasonic. However, in the near future the author plans to add the following brands: Alphafinity, INSTAR, Milesight, Vacron and VideoIQ. It is also possible to save and export the result of the investigation during .csv or .txt How to find surveillance cameras around the world

? Android phones can be listened to using motion sensors

? Android phones can be listened to using motion sensors A group of scientists from five American universities has developed a side-channel EarSpy attack, with which you can listen to Android devices: recognize the gender and identity of the caller, as well as partially disassemble the contents of the conversation. Wiretapping is proposed to be carried out using motion sensors that are able to ? Android phones can be listened to using motion sensors

How to become a hacker from scratch

So let's start with me (sorry for my vanity).This is a translation of a very interesting foreign article.About the translation (it is not complete).Don't rush to leave.It is not complete because there are many other articles in one article, and there are more articles in these articles.The translation of the sub-articles and sub-articles will be in another topic (because I am not omnipotent).Stop How to become a hacker from scratch

Ethical hacking

Ethical hacking: how to hack systems and at the same time earn legally Who is a hacker? Most people who are far from programming are a malicious criminal who breaks into the security systems of banks to steal money. Something like Hugh Jackman's character from the movie "Password is a Swordfish", who breaks the Vernam cipher to steal $9.5 billion from the government fund. Here we will Ethical hacking

PL/SQL Programming Language

PL/SQL Programming language Wikipedia Programming language, a procedural extension of the SQL language developed by Oracle Corporation. It is based on the language of Hell. PL/SQL is embedded in the following DBMS: Oracle Database, TimesTen and IBM DB2. Year of release: 1992 PL/SQL Programming Language