How to check if your Mobile is Hacked!

By monitoring the IPs which your mobile phone is connected to, you know if your mobile is hacked or not ▶ you can use an application below to check all IPs connected to your mobile : ➖ Network Monitor Mini➖ Network Monitor ▶Don’t download programs from unknown sources, to avoid the impact of penetration inContinue reading “How to check if your Mobile is Hacked!”

Kingdom of Avid

Aviral Srivastava Declare Forrester Island Antarctica Which Is Not Owned By Any country even after Antarctica Treaty 1 Dec, 1959 It Is Independent From Any Other owner or administration. 74°11’10.9’S 132°25’48.5″WAs Our Own Kingdom And The Name Is Kingdom of Avid! Here Is The Satellite Image Here’s The Flag Of Our Kingdom If Anyone hasContinue reading “Kingdom of Avid”

The Dark Web

Note- For Educational purposes only Not Recommended To Use Without Some Safety Measure 😉 An Overview The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conductContinue reading “The Dark Web”

What is the truth of this viral message

What Is The Viral Message? Click To Know All claims being made in this message are fake. WhatsApp has not announced any such update yet. You already know that one tick after message is sent, two ticks after delivery and two blues after read. Apart from this, all the claims being made in the message are rumoured. Let meContinue reading “What is the truth of this viral message”

New IT Rules explained: What Facebook, Twitter, Instagram need to change to avoid ban

With social media platforms failing to comply with new rules, several have questioned whether there can be an Instagram ban, Facebook or Twitter ban in India. Is It Is Confirm That SOCIAL MEDIA GAINTS will be Banned 🚫. Click here to know The future of several top social media platforms has come under contention afterContinue reading “New IT Rules explained: What Facebook, Twitter, Instagram need to change to avoid ban”

Fire In Termux

Step 1: To Turn your termux into a fireplace 🔥🔥 you need to install a libcaca package in your termux app. Just use the below command to install it in your termux.😉 pkg install libcaca Step 2: Now You just have to type libcaca in your termux and your termux will show Fire 🔥 ScreenContinue reading “Fire In Termux”

Quantum Cryptography

Quantum cryptography definition Quantum cryptography, also called quantum encryption, applies principles of quantum mechanics to encrypt messages in a way that it is never read by anyone outside of the intended recipient. … A quantum computer could quickly crack current public-key cryptography. Advantages of Quantum cryptography The advantage of quantum cryptography lies in the factContinue reading “Quantum Cryptography”

Create your website with WordPress.com
Get started