TRENDING NEWS

POPULAR NEWS

I5 Processor Stolen By Somebody

I5 processor stolen by somebody?

You might investigate like a cop by looking for evidence like witnesses, fingerprints, footprints or surveillance videos, etc. Could somebody have played a prank on you?

How can I hack wifi password using a laptop?

Nowadays wpa/wpa2 passwords are used, which are practically too hard to “hack”. But nonetheless, you could just simply brute force you way through it, or could use Kali Linux tools like Airmon-ng or Wifite to capture wpa handshakes followed by something like John the ripper or Crunch to crack the password hash.EDIT : Look out on my recently up Blog The HackrSpace | Security is a Myth : Hacking Tutorials Simplified for more detailed and easy-to-follow tutorials about all such “Ethical Hacking” stuff.

How fast could the world's fastest supercomputer brute force crack a password? Could anyone provide a spreadsheet with how fast the world's fastest supercomputer could break a password that is 1, 2, 3…100+ characters long?

I don't have a time to make a spreadsheet for you, but I believe the fastest supercomputer can do 38,360,000,000,000,000 keys per second right now. Apply this to the bruteforce calculator at http://calc.opensecurityresearch... , enter your password size and strength (ie. # of characters, type of characters (a-z,#,etc), press enter and poof you will have your answer. From experience only certain types of file formats allow a GPU type attacks that utilize such high speeds successfully, so don't get your hopes up that any password can be cracked at these speeds (if you have access to a supercomputer). My personal setup is one Micro Velocity Supercomputer loaded with 8 Telsa GPUs connected to a cloud network of 250 CPUs via Accessdata's DNA tool. Not in the trillions, but double digit billions. 50% of the time you will crack a password in milliseconds due to it being weak, the other 45% of the time you will crack the password in an hour after taking the suspects computer and RAM and coverting it to a giant text file and using that as your dictionary attack. Old and current passwords are hiding in that data to crack open any password. The last 5% is hope. Hope that your billion guesses per second will hit the right combination before hell freezes over.

What is the purpose of a SIM card? What information does it hold? I was told it contained internet history, contacts, etc. Is this correct?

SIM - Subscriber identification module is basically a Chip which contains Some information to handshake Mobile Device with Telecom OperatorSIM Doesn’t Not hold your Call Log information, Internet Browsing History, Call Duration.What information is STORED in SIM(SIM) is an integrated circuit chip that is intended to securely store the1. International mobile subscriber identity (IMSI) number. This Changes you do MNP2. Mobile number (MS-ISDN). Remains same if you Do MNP3. Authentication key, which are used to identify and authenticate subscribers4. It is also possible to store contacts on many SIM cards. such as contact list data and SMS messages. Most SIM cards have a capacity between 32 to 256 KB.5. SIM cards are always used on GSM phones(2G/3G) and 4G (USIM)6. SIM also contains Temporary information related to the local network ( in in the form of LAI), a list of the services the user has access to, and two passwords: a personal identification number (PIN) for ordinary use, and a personal unblocking code (PUK) for PIN unlocking.7. SIM card also conatains SMSC Center informations which burnt by Telecom Operator before it is Handed over to you.LAI : When the Subscriber Changes locations, it stores the new LAI to the SIM and sends it back to the operator network with its new location. If the device is power cycled, it will take data off the SIM, and search for the prior LAI.Type of SIMSIM cards have been made smaller over the years; functionality is independent of format.Full-size SIM were followed by mini-SIMmicro-SIM,nano-SIM.SIM cards are also made to be embedded in devices.SIMs for Machine2 Machine applications are available in a surface mount SON-8 package which may be soldered directly onto a circuit board. In future you Devices will be contacting each other due this e.gYour Refrigerator will Inform Shopping Mall That Vegetable are required in refrigeratorPlants will information Water Resovior that it needs water supplyYour home Solor plant will inform city Electrical board that you have surplus electricity to sell /charity.SIM Chip Information

What laptop are you using and why?

I am using a sexy MSI PL62 7RC.It is blessed with an i5 7300HQ processor, 8GB of RAM and an MX150 GPU which makes this machine an entry level gaming rig.Currently I have many games installed in it which I play regularly with a controller. But I mainly use it for programming.I bought it in May of 2018 so, its just 5.5 months old by now, and its working great. I also has some MSI software installed in it which makes it easy for us to change profile from Eco, Normal, Sport mode just by pressing Fn+F7, which is useful as it doesn’t have battery life of more than 4 hours on Eco, mode.Pros-Powerful hardware.Sexy design with brushed aluminium finish.Nice cooling system. Doesn’t get hotter than 55 degrees even when Gaming.The bottom panel is even sexier.One of the best trackpad and keyboard I have ever seen in a laptop (yes I till date haven’t touched a Macbook in real life, only seen it)Cons-Average batteryAverage screenI bought this laptop for an unbelievable price of Rs. 49,000.

TRENDING NEWS