Deremiblog
We cover all updates on I.T. and engage in e-training on randomly
Saturday 9 March 2019
How to Create Anonymous Website(Dark Net)
Tor
is an anonymous, secure network that allows anyone to access websites
with anonymity. People normally use Tor to access normal websites, but
they don’t have to. If you want to set up your own anonymous website,
you can create a hidden service Tor site. Your hidden service website
runs entirely within Tor, so no one will know who created and runs the
website. Only people using Tor can access it, though. Hidden service Tor
sites are ideal for anyone who wants to set up a website anonymously,
such as political activists in repressive countries.
Not all hidden services have to be websites. You could create an SSH server, IRC server, or any other type of server and offer it as a hidden service on Tor. This tutorial will focus on setting up a hidden Tor site using the Savant web server – which Tor recommends – on Windows. The steps can also be applied to other operating systems and web servers.
Not all hidden services have to be websites. You could create an SSH server, IRC server, or any other type of server and offer it as a hidden service on Tor. This tutorial will focus on setting up a hidden Tor site using the Savant web server – which Tor recommends – on Windows. The steps can also be applied to other operating systems and web servers.
Monday 20 August 2018
Wednesday 14 March 2018
How To Recover Files From Corrupted USB Drive
Today I will be teaching Easily Recover Files From Corrupted USB Drive. The best way to recover data from corrupted storage device. Today we mostly share our files through USB and some storage drive, But due to some viruses or wrong injection of these drives makes them corrupted and they stop working properly. And data in them can now be accessible directly. So for this we have a way to recover files from these corrupted drive. You just have to follow simple guide to recover all your files from any corrupted drive.
Change Processor Name Permanently
A
while ago on Tweak And Trick, I published an article on changing your
processor name. But recently, Anil Kumar pointed out that the trick only
changed the name temporarily.
After a user restarts his computer, the name reverted back to
original which is obvious as each time Windows boots, it checks the
connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not have permanent results.
Wednesday 21 February 2018
Hacking the Bank (just a demo that how blackhat hackers fools bank users)
The main reason to put this information online is to warn users for internet crimes, and hopefully to make more people aware that the internet is a dangerous neighbourhood! And no, one does not need to be a genius to commit crimes with computers!
Monday 19 February 2018
The 8 deadly windows .vbs commands
Note:- The Following tutorial is for educational purpose only. If you harm your or your friend’s computer using the following tutorial, I am not responsible for your loss.
Here on http://www.deremiblog.blogspot.com , I am going to provide some of my favorite .vbs codes, I use to play with in my childhood days. You can use these codes as a small term virus. Hence , you can also call this tutorial a virus creation tutorial.
To use the codes I am going to provide, all you need to do is to copy the codes fromMY BLOG, paste it in any notepad or text file, than save the text file with anynam.vbs , and yeah dont forget to change the format from text file to all files.
Subscribe to:
Posts (Atom)
-
A Google dork query or a dork, is a search string that uses advanced search operators to find information that is not readily availa...
-
One evening i was talking to a friend about security on the internet, just for fun we decided to make a little demo on how to hack useri...
-
Tor is an anonymous, secure network that allows anyone to access websites with anonymity. People normally use Tor to access normal website...