LOTUS TEMPLE (Built in 1986)
JAMA MASJID (built in 1650)
QUTUB MINAR (Construction started in 1198)
I Clicked all of them : )
LOTUS TEMPLE (Built in 1986)
JAMA MASJID (built in 1650)
QUTUB MINAR (Construction started in 1198)
I Clicked all of them : )
What you people think about removing inactive Moderators from their position?
My Opinion-
I believe they should be removed because since they are inactive they doesn't monitor the community & their absence makes pressure on the active ones (Probably)
Please leave your opinion/suggestion as well.
What if you never came/visited this site....
Just imagine 🤔! !
My answer-
I personally believe, I would not be able to make friends & my english would suck ,somehow I learnt English by talking with people here.
Some tree : )
Adam Khan's tomb : )
Unsual passenger at bus stop : )
Terry A Davis 1969-2018, A Schizophrenic programmer who said God told him to make a operating system : Temple Os.he made a whole operating system under 2.1 Mb. That operating system had
A boot loader
A operating system
A complier
A language
A window manager
A 3D graphics lib
Flight sim
Multiple CLIs
Under 2.1 Megabytes
I will buy that he was smartest programmer ever lived.
His Operating system consist Bible verses, you can talk with God, you can play a chess match against God~ he said he was able to talk to God.
Because of schizophrenia he somehow started acting like racist, he used to say "Cia people glow in dark"& they wanted to kill him. Once he also won a
match against god.I tried to make this post short as I could, so I didn't mentioned many things, they are more sad : (
Please ignore spelling mistakes, I don't know if anyone cares about this or not, but I just find it fascinating and wanted to share
What you people think about his life?
PHISHING ATTACKS
Phishing attacks (via links) is somehow most
common way to gain information from target/victim.
In this attack the host/attacker generate a copy of The website for example (Facebook, Instagram Etc)
These website may look real, but you will enter the credentials, those credentials will be sent to host,
And they can access them.
The attacker/host will send you a link, using ngrok web tunnels ( or other services) you can spot the difference between the real and fake link.
Real link : https://instagram.com/instagram
Phishing link(Example) : https://a1633asddde.ngrok.io
You can see the difference between legit and fake one. But there is a twist the hacker can mask the url into anything they want.
Masked link : https://[email protected]/Llqace
Somehow you can still see the difference between the marked url, if you accidentally opened link just check the search box, if that's a masked url then it will redirect you to to web tunnel and that will somehow look like this ( may change depends on the service host use)
The phishing link may say your Instagram login expired enter your password
There is copyright on your Instagram enter password to continue
To look this account you need to enter credentials
And many many more things.
I don't know if anyone cares or not & please ignore grammar mistakes if you want to know about tools and things host may use let me know
__EDUCATIONAL PURPOSES ONLY__
KEYLOGGERS
Keyloggers, is a pretty common way used by hackers to get credentials & personal texts.probably your device have this!!
Keylogger records the keys you pressed on your device & sends the data(logs) to the host.
Basically there are few keylogger available :
Software keylogger : This happens when you install malicious application from unauthorized developer/websites.Can be mostly found in pirated games. Sometimes the Antivirus doesn't detect them.
USB keylogger : A keystroke logging USB/Dongle would be injected in your Device. It Will record the keys pressed and make a log of all pressed keys.
Keylogger Module in keyboards : A module fit inside your keyboard can store data and may send that to the host. This may happen if you things from suspicious stores. Somehow it's not very common. So relax.
Wireless keyboards : the wireless keyboards are somehow more at risk if they are targeted using a unencrypted signal and the host may get your logs using something that intercept the Frequency from keyboard.
"If you believe you are targeted by someone then use Virtual keyboard" While entering credentials."
Also : Android device can be only targeted using software based Keylogging. By installing unauthorized applications.
EDUCATIONAL PURPOSES ONLY
I don't know if anyone care or not, I just wanted to make people aware. Please ignore grammar mistakes.
Hit 🔼 if this helped you :)))
Got this picture in a WhatsApp forward, so yeah I forwarded here
For us it's tomorrow however T~T
Some tree : )
Adam Khan's tomb : )
Unsual passenger at bus stop : )
LOTUS TEMPLE (Built in 1986)
JAMA MASJID (built in 1650)
QUTUB MINAR (Construction started in 1198)
I Clicked all of them : )
Which one you prefer/adore more 🤔? (As a pet)
For me it's
CATSSSSS 😼😺😸!!!
Uh oh you edited the post, my reply ain't valid anymore XD