Monday, April 27, 2020

നിങ്ങളുടെ അടുത്തിടെയുള്ള Facebook ലോഗിൻ

 
  ഹായ് Bobby, 2020, ഏപ്രിൽ 28, ചൊവ്വാഴ്ച 8:19 AM-ന് (UTC+05:30)-ൽ ഒരു സ്ഥിരീകരണ കോഡും bobby460999@gmail.com ഇമെയിൽ വിലാസവും ഉപയോഗിച്ച് നിങ്ങളുടെ Facebook അക്കൗണ്ട് അടുത്തിടെ ലോഗിൻ ചെയ്‌തു  ഓപ്പറേറ്റിംഗ് സിസ്‌റ്റം: Windows ബ്രൗസർ: Edge IP വിലാസം: 111.92.34.179 ഏകദേശ ലൊക്കേഷൻ: Thiruvananthapuram, KERALA, IN നിങ്ങൾ ഇത്‌ ചെയ്‌തിട്ടുണ്ടെങ്കിൽ, നിങ്ങൾക്ക്‌ ഇപ്പോൾ സുരക്ഷിതമായി ഈ ഇമെയിൽ നിരസിക്കാവുന്നതാണ്.. നിങ്ങൾ ഇത് ചെയ്തില്ല എങ്കിൽ, ദയവായി അക്കൗണ്ട് സുരക്ഷിതമാക്കുക നന്ദി, Facebook സുരക്ഷാ ടീം    
   
 
   Facebook
 
   
   
 
ഹായ് Bobby,
2020, ഏപ്രിൽ 28, ചൊവ്വാഴ്ച 8:19 AM-ന് (UTC+05:30)-ൽ ഒരു സ്ഥിരീകരണ കോഡും bobby460999@gmail.com ഇമെയിൽ വിലാസവും ഉപയോഗിച്ച് നിങ്ങളുടെ Facebook അക്കൗണ്ട് അടുത്തിടെ ലോഗിൻ ചെയ്‌തു 
ഓപ്പറേറ്റിംഗ് സിസ്‌റ്റം: Windows
ബ്രൗസർ: Edge
IP വിലാസം: 111.92.34.179
ഏകദേശ ലൊക്കേഷൻ: Thiruvananthapuram, KERALA, IN
നിങ്ങൾ ഇത്‌ ചെയ്‌തിട്ടുണ്ടെങ്കിൽ, നിങ്ങൾക്ക്‌ ഇപ്പോൾ സുരക്ഷിതമായി ഈ ഇമെയിൽ നിരസിക്കാവുന്നതാണ്..
നിങ്ങൾ ഇത് ചെയ്തില്ല എങ്കിൽ, ദയവായി അക്കൗണ്ട് സുരക്ഷിതമാക്കുക
നന്ദി,
Facebook സുരക്ഷാ ടീം
 
 
   
   
 
This message was sent to tushar.surekha.multibaggertips@blogger.com at your request.
Facebook, Inc., Attention: Community Support, 1 Facebook Way, Menlo Park, CA 94025
   
   
To help keep your account secure, please don't forward this email. കൂടുതലറിയുക.
   
 

Read More...

Sunday, April 26, 2020

Deepin Or UbuntuDDE

I'm sure nowadays many Deepin users are thinking in changing to UbuntuDDE, so let's explain some differences between both Linux distros.




1. Community

At least in the main telegram channel Deepin has more than 2.000 users, but UbuntuDDE is new in beta version and have about 500 users.

    2. Boot

Despite de booting sound is the same in both distros, Deepin's animation is nicer than ubuntu's which uses a too bright background.


 



    3. Default memory and CPU usage

The CPU usage is similar, but Deepin by default is using more processes, more network connections and more drivers than UbuntuDDE.






  4.  Workspaces

UbuntuDDE allows up to 7 workspaces meanwhile Deepin right now only allows 4.
Is not only more workspaces for UbuntuDDE, it's also the more eficient way to display them.





    5.  Software Versions

Deepin is based on Debian so the program versions on store and apt are old but stable, and can have problems with the old libraries installed on the system when compiling new software.

We can see below that Ubuntu's compiler version is quite new, the 9.3.0 which is quite well, but Deepin's version is 6.3.0.





Regarding the kernels, UbuntuDDE has the 5.4.0.21 and Deepin the 4.15.0-30, the libc in both systems is updated.


    6.  The store

Deepin's store is fast and polished and contain the main software, but and the UbuntuDDE












   Conclussions

Deepin is the most used of both and it's the original one, but many users are trying the UbuntuDDE (which is beta for now) because the need of using recent versions, also the 4 workspaces on Deepin is another limitation for some Linux users. Probably Deepin v20 will overcome the limitations but the main decision is between Debian as base system or ubuntu, and for more users the trend in workstations is ubuntu.


   Gallery













Related news

Read More...

Hacking Facebook By Using PHP Script | Social Engineering Attack | LAN And WAN (Same Or Different Networks)


This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How hackers can hack your social media by using their own local servers.

Basically these type of attacks  known as Social Engineering attacks or Phishing. Attacker just send the duplicate vulnerable HTML page to the victim, when victim enters any type of information to that vulnerable page it'll automatically received by the attacker.

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.

How phishing works 

Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.

Phishers may use social engineering and other public sources of information, including social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities.

Hacking by PHP

As PHP is server side scripting language so first of all you have need to install a local server (WAMP, XAMPP or LAMPP) over your system. Because if there is no any server running on your system then you can't even run your PHP script. So if you wanna do a programming with PHP this is the first step to download and install a server from the Internet. You can easily download and install servers by watching my videos. Just visit my YouTube channel and watch there.

Disclaimer



This Document is subject to changes without prior notice and is intended only for the person or entity to which it is addressed to and may contain confidential and/or privileged material and is not for any type of circulation. Any review, retransmission, or any other use is prohibited. Kindly note that this document does not constitute an offer or solicitation for the purchase or sale of any financial instrument or as an official confirmation of any transaction.


The information contained herein is from publicly available data or other sources believed to be reliable. While I would endeavour to update the information herein on reasonable basis, I am under no obligation to update or keep the information current. Also, there may be regulatory, compliance, or other reasons that may prevent me from doing so. I do not represent that information contained herein is accurate or complete and it should not be relied upon as such. This document is prepared for assistance only and is not intended to be and must not alone betaken as the basis for an investment decision. The user assumes the entire risk of any use made of this information. Each recipient of this document should make such investigations as it deems necessary to arrive at an independent evaluation of an investment in the securities of companies referred to in this document (including the merits and risks involved), and should consult its own advisors to determine the merits and risks of such an investment. The investment discussed or views expressed may not be suitable for all investors. I do not undertake to advise you as to any change of my views. I may have issued other reports that are inconsistent with and reach different conclusion from the information presented in this report. This report is not directed or intended for distribution to, or use by, any person or entity who is a citizen or resident of or located in any locality, state, country or other jurisdiction, where such distribution, publication, availability or use would be contrary to law, regulation or which would subject me to any registration or licensing requirement within such jurisdiction. The securities described herein may or may not be eligible for sale in all jurisdictions or to certain category of investors. Persons in whose possession this document may come are required to inform themselves of and to observe such restriction. I may have used the information set forth herein before publication and may have positions in, may from time to time purchase or sell or may be materially interested in any of the securities mentioned or related securities. I may from time to time solicit from, or perform investment banking, or other services for, any company mentioned herein. Without limiting any of the foregoing, in no event shall I or any third party involved in, or related to, computing or compiling the information have any liability for any damages of any kind.