Posts

Is it good to be somewhat selfish?

Image
This is Wayne Rooney. He plays for Manchester United Football Club. You may or may not know him. His natural position is the No. 9 role. This position is for the goal scorer/striker. At 18, he was so good and showed a lot of promise. He was talented and was capable of playing in multiple positions. He was the best talent England had seen for generations. His undoing was his ability to play in multiple positions. Wayne Rooney, a striker, has spent half his career playing in midfield simply because his passing is excellent and his game reading is wonderful. He was the one played out of position whenever the manager wanted to accommodate another striker. Now he is in the twilight years of his career. He is 31. Has never been awarded best player of the year. Has never won top scorer. And the same people who played him out of position, are criticising him now. This is Cristiano Ronaldo. He plays for Real Madrid. His natural position is the wing. You must be familiar with h

Cash-Less India and Hackers

Image
Introduction A warm Good Morning to Reader, As we all know about demonetization in India. The whole country got problem of cash. But,                                                                          "Until there is no pain                                                                    There is no gain"    So it's good for society. There is no problem. Then our PM Mr. Narandra Modi started Cashless India  system, best thing to fight against black-money. This is greatest change in Indian economy. Cashless system is very easy and fast way to ply users and costumers. The Cashless is so easy, its so vulnerable to Hackers.  Who are Hackers? A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. Black Hat Hackers

Advanced Google Dorking Commands

Image
By  Aditya010 Introduction: Google hacking, also known as Google Dorking, is a computer hacking technique that uses Google Search and other  Google  applications to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google  search engine  to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable  Web applications . As you progress in your use of Google Dorks, here are some advanced commands to test out:  site:static.ow.ly/docs/ intext:@gmail.com | Password filetype:sql intext:wp_users phpmyadmin intext:”Dumping data for table `orders`” “Index of /wp-content/uploads/backupbuddy_backups” zip Zixmail inurl:/s/login? inurl:/remote/login/ intext:”please login”|intext:”FortiToken clock drift detected” inurl:/WebInterface/login.html inurl:dynamic.php?page=mailbox inurl:/sap/bc/webdynpro/sap/ | “sap-system-log