Posts

Showing posts from 2018

History of Computing

Image
Whether you're interested in the principle of history or you had a sudden will to read this post, WELCOME! In the near future, I'll have an exam about the history of computing. Therefore, I thought of putting what I studied on paper will make it easy to remember afterwards. So, here we are. I'll convey the matter into three parts. 1-The Early Period: Up to 1940 As you know ordinary invention stories from the light bulb, the telephone or the first heavier-than-air flight, may expect computer to be invented in the past within a huge individual effort of a genius or general scientific steps. However, computers don't have exact time of invention and they did not appear in a specific room. Let's begin with the subdisciplines that played role in the process of invention of computers. Progress started within some discussions of mathematics abd arithmetic. The contributions of Greeks : development of geometry and logic Babylonians & Egyptians: numerical met...

An experiment on rice

Image
Greetings world! I've just seen a post on Instagram and got so impressed that wanted to share with you too. It's about an experiment as you can see on the header. The basis of the experiment is grace,compassion,respect, or I can even simply say love. However you define it through the conclusion you reach on! (You can try at home. 😋) 1st of December "Get two silicon cups, some rice and water. Put rice and water equally in the cups and cover them with stretch foil. Mark one of the cups to recognize it afterwards." 5th of December "I observe that the rice in both cups started to change in distinct ways. Odd smell occured in the second (marked) one, and the colour of rice in it darkened. The other group of rice looks completely different too, but turned yellow.” 15th of December "The difference between colours is much more apparent and notable now. The smell of the first cup is sourish but mellow. However, the other one smells irritating and...

What's going on?

Image
Hey everyone 🙋 Some of you may notice that I've been afk ("away from key", gamer jargon😎) for a few months. Now, I'm back here, created a cute scenic home-office (forest home, that's an unusual one) which is over the view of the Mediterranean Sea just to write this essay and explain what I've done so far. (Btw, here I am! 👆) From the time I shared my last post to the next two months I was studying for the English Proficiency Exam of my university. I successfully submitted it and became a freshman, then my vacation began. Up to now, I've had the classic enjoyable vacation time, which is full of fun, with my friends and family ; however, dealt with some private-life issues such as diseases (I hate being in hospital, the atmosphere usually annoys my aura and the smell makes me feel like everytime I breathe I put myself at the risk of being infected😝), home chores, driver's license. All these sound like usual stuff, but you're wrong. I...

How to find private e-mail addresses of companies

Image
Firstly, I want to share basic and very brief summary of Metasploit terms with you, and then you can follow the steps below as a guide to bringing latent e-mail addresses of a company into the open. Metasploit: Metasploit is basically a security tool used to attack and test a system or a network. If you need to make a simulated attack on computer system looking for security weaknesses, Metasploit will show the vulnerabilities and aids in this so called penetration testing. Exploit: Code which allows an attacker to take advantage of a vulnerability. Payload: Actual code which runs on the system after exploitation. Well, please simply have a look at following basic steps to break into a system by using Metasploit after gathering some information about the target system. Select a right exploit and then set the target. Verify the exploit options to determine whether the target system is vulnerable to the exploit. Select a payload Execute the exploit. Let's m...

Create your own encryption system

It's an enjoyable topic. You may not want to create your passwords in usual, typical forms. I'll describe how to create your own basic encryption algorithm to raise your security level. Open up a new note page. Write these commands: set x = WScript.CreateObject("WScript.Shell")    mySecret = inputbox("Write your password into the blank below")               mySecret = StrReverse(mySecret)    x.Run "%windir%\\\\notepad"    wscript.sleep 1000    x.sendkeys encode(mySecret)    function encode(s)       For i = 1 To Len(s)         newtxt = Mid(s, i, 1)         newtxt = Chr(Asc(newtxt)-3)         coded = coded & newtxt       Next       encode = coded     End Function In this code  ''newtxt = Chr(Asc(newtxt)+3)'' , the phrase of +3 implies that each el...

If celestial bodies were closer than as usual to the Earth, how would sky look like ?

To play the video, please click on the read more button. —

How to find somebody's IP address

In this topic, firstly, I should emphasize the value of IP address and what kind of tricks your victim would struggle with when being compassed. If somebody's IP address were stolen, the hacker would do whatever s/he wants with it, such as stealing the needful folder, studies or information, altering them, invading your private photos or videos, deleting or copying your important stuff, spying on, detecting your own location or number of your mobile phone. If it's not hidden, list even goes on to victim's personal identity number, so everything s/he has ever had. Unfortunately, the victim wouldn't be aware of these tricks. ❗ First of all, it is necessary to open your VPN. > FOR PC If your victim is one of your contact men and sent you an e-mail, you can display the detail info about e-mail and get to know the IP.  If not, send fake e-mails (by this website:  https://emkei.cz ) to the victim and steal his/her e-mail account. Thus, you can obtain n...

How to change your PC's MAC address

Image
In this post, we will see what is MAC Address and how to change a MAC Address in Windows10. What does a MAC address exactly mean? A MAC address (Media Access Control address) is a unique identifier assigned to every Network Interface Card. It's like IMEI numbers of mobile phones. While most of us believe that it is the IP address that is significant in contacting another computer on the network, MAC is more important than IP (Internet Protocol) address. Each network interface card, called NIC for short, has a MAC address like a postal address so that the data packets travelling on your network can reach the correct NIC and from your computer's. While the IP address is the software part of the NIC, the MAC address is hardware one. Without it, data packets will just keep on roaming on the network, as they do not have any address where to deliver the data. Each data packet on the network has a header containing MAC address of the computer you want to connect to. The l...

How to check safety of your ports

Hi guys! 🎈 In this text, I'm going to inform you about how to find out whether or not your ports are open, by spending your two or three minutes. 😊 You can check the first 1055 ports. Although Internet ports are numbered from 1 through 65535, the first 1023 ports are special and essential to check up. If you like, you can follow the manual steps , which is safer than the other method I'm going to mention. To uncover ports on stand-by mood :  Start > Run > CMD > netstat-an |find /i ''listening'' To uncover active ports  :  Start > Run > CMD > netstat-an |find /i ''established'' In order to see these results in more detailed form, you can add this code at the end of the main code:  c:\openports.txt .   Thus, you'll see them as written in a file created. Instead, the other alternative is this website:   https://www.grc.com/x/ne.dll?bh0bkyd2. This website belongs to the Gibson Research Corporation, so could...

How to delete Trojans without relying on any virus scanners

Hi everyone! 👋🌺 I just want to point out how dangerous anti-malware or virus scanners may sometimes be. As you know from the movie , '' Who am I ? '' , no system is safe and even anti-malware programs are not trusthworthy. Up to now, so much people have become victims of them since their identities, significant studies and money have been stolen. So, you may think of what should we do if even scanners are potential danger to our computers. Cleaning your files manually may be offered and really work well in such a situation. I have a quick solution for you that requires no expense and is not time-consuming. 😊 LET'S START! You should open a new page in Notepad, which already exists in Windows. Copy the whole lines of the code into the page : net user ASPNET /delete net user HelpAssistant /delete net user SUPPORT_388945a0 /delete net share Uzak IPC /delete net share A$ /delete net share C$ /delete net share D$ /delete net share E$...

Create your own VPN server

Hello everyone, today i'll mention about how to create your own VPN server for Windows. REGISTER Firstly, register for this website  https://www.digitalocean.com   with your debit card .  When you do, website gives you a promotion of 10 $ to open up your new server. CREATE DROPLET Select--> UBUNTU > personal choice of capacity > personal choice of country > Private networking and IPv6 > create a server name > CREATE. Then it sends root infos to your e-mail. DOWNLOAD PuTTY To open up your server, download this from its formal website :  https://putty.org After that, copy your ip address given in the e-mail and paste into the PuTTY's ip blank and press enter. Type your username and password given to you into terminal opened via PuTTY. Next, type these commands into terminal: wget http://swupdate.openvpn.org/as/openvpn-as-2.1.4b-Ubuntu16.amd_64.deb dpkg -i openvpn-as-2.1.2-ubuntu16.amd_64.deb (this code will be already given by the ter...