Posts

Showing posts from March, 2019

How To Remove Computer Viruses Using CMD

Image
  Nowadays  Virus can penetrate in our computer through numerous ways like through Internet Browsing, From USB devices and also by installing some infected software.

How to Track an Email Address

Here is all the things that you need to track an email address : Google Chrome (or a good and fast browser) > Fast internet connection > Access to a Google Account on which you received the mail. Now follow the steps below to track an email address.

What’s the Difference And Which one is good !! SSD vs. HDD!!

Image
W e all know very well that one of the unknowns that are presented to the user when he/she wants to assemble from scratch, or even at the time of choosing a computer already mounted, is the storage system you need: HDD or SSD? Hence, today in this article we will show you the difference between HDD and SSD and how to choose.

Flat databases in Perl

Aim: I aim to give a good overview, and insight, into making good flat database structures in perl without too much hassle. I will be using a telephone database as an example. The following fields will be used: ID Name Address Telephone number Note: You will require an intermediate perl skill level. Tip: the correct database terminology for a 'data section is a field. 'Rows' in a database are considered 'records'. What are flat databases? A flat database is a database within a single file. A database is a set of data within a structure (in memory or a file, for example). All data stored in a database, is stored within validity constraints - that, in simple terms, means the data stored, is validated, and only stored if it passes a validation check. Against popular belief, flat databases can be linked to another database, or joined; but for this tutorial, I will cover flat databases, without joining, in perl.

How To Repair Corrupted Memory Card/USB Hard Drive

Image

How to Create Anonymous Website(Dark Net)

Image
Tor is an anonymous, secure network that allows anyone to access websites with anonymity. People normally use Tor to access normal websites, but they don’t have to. If you want to set up your own anonymous website, you can create a hidden service Tor site. Your hidden service website runs entirely within Tor, so no one will know who created and runs the website. Only people using Tor can access it, though. Hidden service Tor sites are ideal for anyone who wants to set up a website anonymously, such as political activists in repressive countries. Not all hidden services have to be websites. You could create an SSH server, IRC server, or any other type of server and offer it as a hidden service on Tor. This tutorial will focus on setting up a hidden Tor site using the Savant web server – which Tor recommends – on Windows. The steps can also be applied to other operating systems and web servers.

Base Number Systems

Image
Well Base Number Systems are the whole entire system that our computers run on, Binary is a Base System. In this case Base 2. Before the days of languages, such as C++, C, Visual Basic and so on, there was actually Intelligent people slaving away at computers typing up endless pages of machine code.