Posts

History of Computing

Image
Whether you're interested in the principle of history or you had a sudden will to read this post, WELCOME! In the near future, I'll have an exam about the history of computing. Therefore, I thought of putting what I studied on paper will make it easy to remember afterwards. So, here we are. I'll convey the matter into three parts. 1-The Early Period: Up to 1940 As you know ordinary invention stories from the light bulb, the telephone or the first heavier-than-air flight, may expect computer to be invented in the past within a huge individual effort of a genius or general scientific steps. However, computers don't have exact time of invention and they did not appear in a specific room. Let's begin with the subdisciplines that played role in the process of invention of computers. Progress started within some discussions of mathematics abd arithmetic. The contributions of Greeks : development of geometry and logic Babylonians & Egyptians: numerical met

An experiment on rice

Image
Greetings world! I've just seen a post on Instagram and got so impressed that wanted to share with you too. It's about an experiment as you can see on the header. The basis of the experiment is grace,compassion,respect, or I can even simply say love. However you define it through the conclusion you reach on! (You can try at home. šŸ˜‹) 1st of December "Get two silicon cups, some rice and water. Put rice and water equally in the cups and cover them with stretch foil. Mark one of the cups to recognize it afterwards." 5th of December "I observe that the rice in both cups started to change in distinct ways. Odd smell occured in the second (marked) one, and the colour of rice in it darkened. The other group of rice looks completely different too, but turned yellow.” 15th of December "The difference between colours is much more apparent and notable now. The smell of the first cup is sourish but mellow. However, the other one smells irritating and

What's going on?

Image
Hey everyone šŸ™‹ Some of you may notice that I've been afk ("away from key", gamer jargonšŸ˜Ž) for a few months. Now, I'm back here, created a cute scenic home-office (forest home, that's an unusual one) which is over the view of the Mediterranean Sea just to write this essay and explain what I've done so far. (Btw, here I am! šŸ‘†) From the time I shared my last post to the next two months I was studying for the English Proficiency Exam of my university. I successfully submitted it and became a freshman, then my vacation began. Up to now, I've had the classic enjoyable vacation time, which is full of fun, with my friends and family ; however, dealt with some private-life issues such as diseases (I hate being in hospital, the atmosphere usually annoys my aura and the smell makes me feel like everytime I breathe I put myself at the risk of being infectedšŸ˜), home chores, driver's license. All these sound like usual stuff, but you're wrong. I&#

How to find private e-mail addresses of companies

Image
Firstly, I want to share basic and very brief summary of Metasploit terms with you, and then you can follow the steps below as a guide to bringing latent e-mail addresses of a company into the open. Metasploit: Metasploit is basically a security tool used to attack and test a system or a network. If you need to make a simulated attack on computer system looking for security weaknesses, Metasploit will show the vulnerabilities and aids in this so called penetration testing. Exploit: Code which allows an attacker to take advantage of a vulnerability. Payload: Actual code which runs on the system after exploitation. Well, please simply have a look at following basic steps to break into a system by using Metasploit after gathering some information about the target system. Select a right exploit and then set the target. Verify the exploit options to determine whether the target system is vulnerable to the exploit. Select a payload Execute the exploit. Let's m

Create your own encryption system

It's an enjoyable topic. You may not want to create your passwords in usual, typical forms. I'll describe how to create your own basic encryption algorithm to raise your security level. Open up a new note page. Write these commands: set x = WScript.CreateObject("WScript.Shell")    mySecret = inputbox("Write your password into the blank below")               mySecret = StrReverse(mySecret)    x.Run "%windir%\\\\notepad"    wscript.sleep 1000    x.sendkeys encode(mySecret)    function encode(s)       For i = 1 To Len(s)         newtxt = Mid(s, i, 1)         newtxt = Chr(Asc(newtxt)-3)         coded = coded & newtxt       Next       encode = coded     End Function In this code  ''newtxt = Chr(Asc(newtxt)+3)'' , the phrase of +3 implies that each element, letter or number included the password will be encrypted as the following 3rd element in your keyboard. If you want to create an original order, you can chang

If celestial bodies were closer than as usual to the Earth, how would sky look like ?

To play the video, please click on the read more button. —

How to find somebody's IP address

In this topic, firstly, I should emphasize the value of IP address and what kind of tricks your victim would struggle with when being compassed. If somebody's IP address were stolen, the hacker would do whatever s/he wants with it, such as stealing the needful folder, studies or information, altering them, invading your private photos or videos, deleting or copying your important stuff, spying on, detecting your own location or number of your mobile phone. If it's not hidden, list even goes on to victim's personal identity number, so everything s/he has ever had. Unfortunately, the victim wouldn't be aware of these tricks. ❗ First of all, it is necessary to open your VPN. > FOR PC If your victim is one of your contact men and sent you an e-mail, you can display the detail info about e-mail and get to know the IP.  If not, send fake e-mails (by this website:  https://emkei.cz ) to the victim and steal his/her e-mail account. Thus, you can obtain not