Posts

Showing posts from 2020

कोरोना वायरस का असर क्या भारतीय बाज़ार पर पड़ेगा?

अर्थव्यवस्था तबाह हो सकती है? कोरोना वायरस का असर क्या भारतीय बाज़ार पर पड़ेगा? इस सवाल का छोटा सा जवाब है, हाँ. संयुक्त राष्ट्र की कॉन्फ्रेंस ऑन ट्रेड एंड डेवेलपमेंट (UNCTAD) ने ख़बर दी है कि कोरोना वायरस से प्रभावित दुनिया की 15 सबसे बड़ी अर्थव्यवस्थाओं में से एक भारत भी है. चीन में उत्पादन में आई कमी का असर भारत से व्यापार पर भी पड़ा है और इससे भारत की अर्थव्यवस्था को क़रीब 34.8 करोड़ डॉलर तक का नुक़सान उठाना पड़ सकता है. यूरोप के आर्थिक सहयोग और विकास संगठन यानी ओईसीडी ने भी 2020-21 में भारत की अर्थव्यवस्था के विकास की गति का पूर्वानुमान 1.1 प्रतिशत घटा दिया है. ओईसीडी ने पहले अनुमान लगाया था कि भारत की अर्थव्यवस्था की विकास दर 6.2 प्रतिशत रहेगी लेकिन अब उसने इसे कम करके 5.1 प्रतिशत कर दिया है. भारत सरकार, देश की जनता को ये भरोसा दिला रही है कि उन्हें घबराने की कोई ज़रूरत नहीं. हालांकि, विपक्षी दलों ने कोरोना वायरस के भारतीय अर्थव्यवस्था पर प्रभाव के बारे में सरकार से सवाल पूछने शुरू कर दिए हैं. तेलुगू देशम पार्टी (TDP) के सांसद जयादेव गल्ला ने इस बारे में अप

IMACT OF LOCKDOWN ON INDIAN ECONOMY

       It is Necessary to note that countries that have so far done a relatively good job of containing the covid19 pandemic have refrained from imposing a complete, nation-wide, curfew-like lockdown.  These include Singapore, Taiwan, Germany, and Turkey. Even China, where it all started, placed only the  Hubei province  under complete lockdown, not the whole country. But Prime Minister  Narendra Modi  has put 1.3 billion people under a curfew-like lockdown. Since the authorities are using the word ‘curfew’ in the context of issuing  passes , it is fair to call it a national curfew. A national curfew for 21 days will definitely go a long way in reducing the transmission of the deadly virus.  But what happens after 21 days? The virus won’t disappear after that. Not until we get a vaccine, and it will take at least a few months to vaccinate every Indian even after a vaccine has been developed.  A few months is a very optimistic estimate. In other words, we are in this mess

Apple Phone password crack - Elcomsoft

 Elcomsoft Phone Password Break Elcomsoft Phone Password Breaker is a legal gadget that’s used by many government organizations itself. The original intention of Elcomsoft was to extricate scientific information. But it’s the ability to remotely mimic any targeted gadget turned into one of the most popular hacking apps for iOS. It’s also for this reason that this hacking tool leans more towards a gadget than a programming tool. The iPhone hacking program helps you break passwords, decrypt iOS backups with GPU acceleration, decrypt iCloud Keychain and messages with media files and documents from iCloud. You can even use this iPhone hacking tool to acquire data from Microsoft accounts and download iCloud backups, hack app data and sync data with or without an Apple ID password. https://www.elcomsoft.com/eppb.html

Hack Apple Iphone using ispy Now

iSpy - Best Hacking Application For iOS With version 2.0 soon to be released, iSpy is one of the must-have hacking tools for hackers learning reverse engineering and dynamic analysis of iOS applications. The iOS hacking app has an easy to use web GUI and can be used in various programming functions such as Cycript integration, class dumps, automatic jailbreak-detection bypasses, automatic SSL certificate pinning bypasses, re-implemented objc_msgSend for logging and tracing function calls in real-time. https://github.com/BishopFox/iSpy

How to download paid games from Apple store - ios

xSellize Game Hack -  Anyone who’s a gaming nerd knows the struggle of breaking the bank to play paid games. The xSellize Game Hack solves that problem by letting hackers download paid games for free. With thousands of games like Game Boy, Nintendo, SEGA and much more, this game hacking app for iOS is essentially the nemesis of every application for paid games that’s ever seen some popularity. And if that wasn’t enough, the game hacking app for iOS also offers functions such as anti-anti-method swizzling, hack app data, instance tracking, easy to use soft breakpoints and automatic detection of vulnerable function calls. Download this best hacking application for  iOS https://www.cydiahacks.net/xsellize-repo-source.html

iphone hacking applications & Techniques - ios

iRET - Best Hacking Application For iOS iOS Reverse Engineering Toolkit, popularly known as iRET, is one of the best hacking tools for iOS for ethical hackers learning reverse engineering. The only catch is that you must be connected to a wireless network. The ethical hacking application can be used to analyze keychain contents, including passwords, keys, certificates, etc. for any sensitive information. Speaking in developer language, iRET offers binary analysis using o tool, keychain analysis using keychain_dumper, working, Binary decryption using dump decrypted and database reading using SQLite. Besides these functions, the hacking tool also lets you create, edit and install the tweaks. https://www.veracode.com/resources?assettype=toolkit#resources-results

DroidBox - Best Android Mobile Hacking Application

DroidBox - Best Hacking Application For Android DroidBox can be used as both a device hacking app and a game hacking app for Android users. Ethical hackers can use this hacking tool for Android to generate hashes for the analyzed device, intercept incoming/outgoing network data on the infected device, read files and write operations and leak information via the network, file. The hacking tool also throws in added benefits such as permission to circumvention, launching cryptographic operations that are performed using Android API, listing broadcast receivers, sending SMS and making p hone calls. https://hackingapks.com/droidbox-apk/

FaceNiff - Best Hacking Application

FaceNiff - Best Hacking Application For Android FaceNiff is the best hacking app for Android users looking to sniff around social media. The hacking tool uses cookies from a WiFi network to intercept web sessions and get unauthorized access to people’s accounts. This allows them to easily control user sites like Facebook, Twitter, Instagram, etc., and customize the targeted Android phone to hack their calls and social sites. The only catch with this powerful hacking app for Android is that it hackers can only infiltrate when the WiFi is not using EAP. Download this best hacking application for  Android https://hackingvision.com/2017/06/21/faceniff-android-app/

cSpoilt - Great Hacking App For Android Devices

cSpoilt -  Best Hacking Application For Android cSpoilt is one of the most reliable hacking tools for Android hackers looking to learn a variety of system hacking techniques including:  Network mapping Vulnerability scanning Password cracking Man-In-The-Middle attacks The hacking tool can also catalog local hosts and their vulnerabilities. This allows hackers to find exploits for these vulnerabilities and them to gain access to the target, following which hackers can crack wifi passwords and install backdoors for later access. The hacking app can run on any UNIX-based system, but for now, it's only supported on Android devices. Download this best hacking application for  Android https://f-droid.org/en/packages/org.csploit.android/

zANTI - Awesome Hacking Application For Android Devices

zANTI - Best Hacking Application For Android zANTI is one of the best hacking apps for Android to offer an automated network map that uses network scans (at different intensity levels) and identifies every vulnerability of a given target. Ethical hackers often use this hacking tool to test vulnerabilities that can compromise the corporate network including vulnerabilities within connected devices, mobile devices or web sites. More importantly, this hacking app for Android can mirror the methods of a cyber-attacker and identify security holes within a given network. Thanks to its Dash-board reporting, businesses can identify risks and take fix critical security issues. Download this best hacking application for  Android https://www.zimperium.com/zanti-mobile-penetration-testing

Android Mobile Hacking Applications - AndroRat

1. AndroRat - Best Hacking Application For Android AndroRAT, an abbreviation of Android and RAT (Remote Access Tool), is one of the most popular hacking tools for Android users that allows hackers to remotely control almost everything on an infected device including access to contacts, call logs and location by GPS/Network. Hackers can also open a URL in the default browser, stream videos (for activity-based clients exclusively), take a picture from the camera of the infected device, stream sound from microphone (or other sources), along with sending a text message, placing a call, do a toast, hack app data, open a URL in the default browser and vibrate the phone. Download this best hacking application for  Android https://github.com/wszf/androrat 

Hacking Gmail Account Using BetterCap

Image
3 Steps GMail MITM Hacking Using Bettercap. The website  bettercap.org  this tool is a powerful, flexible and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPSand TCP traffic in realtime, sniff for credentials and much more. Requirements: 3 Steps GMail MITM Hacking Using Bettercap: Conclusion how to avoid 3 Steps GMail MITM Hacking Using Bettercap: 1. Ruby interpreter ( >= 1.9 ) 2. RubyGems environment installed. 3. Bettercap 4. Kali Linux 2016.2 (the OS used in this tutorial) 1. TO install Bettercap in Kali Linux it’s more easy, just run  apt-get update  from terminal, and then run  apt-get install bettercap . 2. To check the available options in Bettercap, we can run  bettercap --help . 3. In this tutorial we’ve set the target is IP 192.168.1.111; but if you want to target the whole network, you can set the -T options without address. We’ve run this command There’s the email and password revealed in plain text. Here’s the

whai is ISDN ?? Part 2

This architecture provides a  number of integrated services currently provided by separate networks. ISDN adds capabilities not found in standard phone service. The main feature is that instead of the phone company sending a ring voltage signal to ring the bell in your phone, it sends a digital package that tells who is calling (if available), what type of call it is (data/voice), and what number was dialed (if multiple numbers are used for a single line). ISDN phone equipment is then capable of making intelligent decisions on how to answer the call. In the case of a data call, baud rate and protocol information is also sent, making the connection instantaneous. [Griffiths] ISDN Concepts:  With ISDN, voice and data are carried by bearer channels (B channels) occupying a bandwidth  of 64 kbit/s each. A delta channel (D channel) handles signalling at 16 kbit/s or 64  kbit/s. H channels are provided for user information at higher bit rates. [Stallings] There  are

What is ISDN? Part 1

ISDN, which stands for integrated services digital network, is a system of digitizing phone   networks which has been in the works for over a decade. This system allows audio, video,   and text data to be transmitted simultaneously across the world using end-to-end digital   connectivity. The original telephone system used analog signals to transmit a signal across telephone wires. The voice was carried by modulating an electric current with a waveform from a microphone. The receiving end would then vibrate a speaker coil for the sound to travel back to the ear through the air. Most telephones today still use this method. Computers, however, are digital machines. All information stored on them is represented by a bit, representing a zero or a one. Multiple bits are used to represent characters, which then can represent words, numbers, programs, etc. The analog signals are just varying voltages sent across the wires over time. Digital signals are represented and transmitted by pulses

What is TeleCommuting Meaning - Part 2

In addition, telecommuting reduces family related stress by allowing involvement with family and flexibility in location of a remote worksite.    Working in the home offers people a greater opportunity to share quality time with family members, to promote family values and develop stronger family ties and unity.    Also, time saved through telecommuting could be spent with family members constructively in ways that promote and foster resolution of family problems.    Since the actual location a telecommuter works from isn't relevant, the person could actually move to another town.    This would alleviate the stress caused when a spouse has an opportunity to pursue his or her career in another town and must choose between a new opportunity or no opportunity, because their spouse does not want to or cannot change employment.    If either person could telecommute, the decision would be much easier.      Also, telecommuting promotes safety by reducing high way

What is TeleCommuting Meaning - Part 1

Telecommuting is "an electronic mode of doing work outside the office that traditionally has been done in the office, as by computer terminal in the employee's home. "Basically, it is working at home utilizing current technology, such as computers, modems, and fax machines.   Traditionally, people have commuted by cars, buses, trains, and subways, to work and back.    Through the innovation of telecommuting, , the actual necessity to change location in order to accomplish this task has been challenged on the basis of concerns for energy conservation, loss of productivity,   and other issues.      One advantage of telecommuting is energy conservation.   A tremendous amount of energy is required to produce transportation equipment such as automobiles, buses trains, and subways.    If telecommuting is promoted, there will be less use of this equipment and less energy will be required for production, maintenance, and repair of this equipment.    Fue