Saturday 9 March 2019

How To Repair Corrupted Memory Card/USB Hard Drive




How to Create Anonymous Website(Dark Net)

Tor is an anonymous, secure network that allows anyone to access websites with anonymity. People normally use Tor to access normal websites, but they don’t have to. If you want to set up your own anonymous website, you can create a hidden service Tor site. Your hidden service website runs entirely within Tor, so no one will know who created and runs the website. Only people using Tor can access it, though. Hidden service Tor sites are ideal for anyone who wants to set up a website anonymously, such as political activists in repressive countries.
Not all hidden services have to be websites. You could create an SSH server, IRC server, or any other type of server and offer it as a hidden service on Tor. This tutorial will focus on setting up a hidden Tor site using the Savant web server – which Tor recommends – on Windows. The steps can also be applied to other operating systems and web servers.

Wednesday 14 March 2018

How To Recover Files From Corrupted USB Drive

Recover-files-from-corrupted-drive-640x342
Today I will be teaching Easily Recover Files From Corrupted USB Drive. The best way to recover data from corrupted storage device. Today we mostly share our files through USB and some storage drive, But due to some viruses or wrong injection of these drives makes them corrupted and they stop working properly. And data in them can now be accessible directly. So for this we have a way to recover files from these corrupted drive. You just have to follow simple guide to recover all your files from any corrupted drive.

Change Processor Name Permanently

A while ago on Tweak And Trick, I published an article on changing your processor name. But recently, Anil Kumar pointed out that the trick only changed the name temporarily. After a user restarts his computer, the name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not have permanent results.

Wednesday 21 February 2018

Hacking the Bank (just a demo that how blackhat hackers fools bank users)

One evening i was talking to a friend about security on the internet, just for fun we decided to make a little demo on how to hack userid and password from an online Banking application.This is the result. Whatever is displayed below here is for educational purposes only. We believe that all techniques used and displayed here are very simple for anyone with an average knowledge of computer networks and webserver applications. The information provided on this page is NOT sufficient to hack any real Bank. This page is a very simplified demo of an evil hacker fooling an online Banking user.
The main reason to put this information online is to warn users for internet crimes, and hopefully to make more people aware that the internet is a dangerous neighbourhood! And no, one does not need to be a genius to commit crimes with computers!

Monday 19 February 2018

The 8 deadly windows .vbs commands


Note:- The Following tutorial is for educational purpose only. If you harm your or your friend’s computer using the following tutorial, I am not responsible for your loss. 
Here on http://www.deremiblog.blogspot.com , I am going to provide some of my favorite .vbs codes, I use to play with in my childhood days. You can use these codes as a small term virus. Hence , you can also call this tutorial a virus creation tutorial.
To use the codes I am going to provide, all you need to do is to copy the codes fromMY BLOG, paste it in any notepad or text file, than save the text file with anynam.vbs , and yeah dont forget to change the format from text file to all files.