Skip to main content

Posts

Showing posts with the label tutorial

How Bitcoin transactions work

Skip to content Sirus Shahini How Bitcoin transactions work July 16, 2017   Cyrus.Sh Cryptograhpy Introduced in 2009, bitcoin appeared as the most remarkable digital cryptocurrecy. The theory behind bitcoin is to how to send some amount of money to someone directly without the need for any intermediary and in a secure manner which both guarantees the integrity of the payment data and its authorization. Unfortunately the official documents are difficult for many people and developers who are not familiar with the concept. In this post, with a simple literature I tried to clarify bitcoin transactions as simple as possible. It is expected the reader would assimilate the exact idea behind bitcoin transactions and authorization system after reading the post thoroughly . So please read till the end of if you are interested. Bitcoin transactions use a peer-to-peer system to transfer digital coins. It may be interesting to know there is actually not any records of the coins stored anywher

Hacker who earn 2.2 Crore(Bug hunter)

TECH INTERVIEW: This Indian Hacker Has Earned ₹2.2 Crore By Finding Bugs In Facebook, Twitter, And Other websites Anand Prakash is planning his own cybersecurity startup.   Dungeon Masterl ||Tech News Editor ANAND PRAKASH India has no shortage of software talent. For proof, look no further than security researcher Anand Prakash, who is in news once again for winning  a $5,000 reward from Uber after he pointed out a bug in their software that could have allowed users to take unlimited free rides. This is not the first time that Prakash has won a reward for pointing out a security flaw in a website. Over the years, he has alerted big corporations such as Facebook, Twitter and Google about potentially expensive and risky software loopholes on their websites. HuffPost India  caught up with India's top bug bounty hunter for a chat. Here are edited excerpts from the conversation — How did you get interested in hacking? In 2010, I was in Kota, taking an entrance course there.

Keyloggar tutorial+binding free

Keyloggar tutorial Keyloggers Tutorials. There are many ways you can hack a computer - RATs, Keyloggers, bots and Password Stealers. In this tutorial I will teach you how to set up your own Keylogger and also protect yourself against them. What is a Keylogger? A keylogger is a program that records a persons keystrokes (everything they type) and send the logs back to the the hacker by either email of FTP. Good keyloggers also detail what program the keystrokes were typed into. Settings : For this tutorial I will be using images from Unknown Logger V 1.3.3 as I believe that it is very thorough logger but there are many free keyloggers which I will link in another section. Note: We will be going from the top left going down There are two ways that you can receive your keylogs email or FTP. Email : With email I recommend you create a two new email addresses (one for sending and one for receiving) and not to use your personal email. Gmail is usually what