Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'basic'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Graphic Design in Canva Basic to Advance – Learn how to create amazing designs with Canva What you’ll learn Master all the elements in Canva for stunning results every time Discover the latest features now available on Canva Learn Canva basics and graphic design while having fun Get to know Canva and its smart workflow approach that continues to save you time Build a strong brand identity and brand style guide for your business Create stunning, professional graphic designs – all for free on Canva Learn essential design skills that can be transferred to all your design projects Design different fun and interesting projects, each in a very practical and practical way Learn the difference between free and paid Canva and which one is right for you Master Canva grids and how to use them to create advanced design layouts Learn how to download your final assets and share your design templates with others Requirements A computer with an internet connection Description Ready to learn Canva from Basic to Advance Learn smart workflow tricks that will save you time Create better designs in less time and hassle-free Participants in this course will not only learn how to create great designs with Canva, but they will also learn smart workflows and approaches to templates that will continue to save them time and help them streamline their content marketing. You will learn: all the basics and how to get started quickly and efficiently while learning important tips to help you avoid common time traps graphic design basics and how to easily implement them in Canva the difference between free and paid Canva and which one is right for you how to use and take advantage of Canva’s newest and most useful features how to organize and store all your brand assets for quick and easy use everything you need to know about the project interface and all the elements in it how to save time with templates and collections how to create all kinds of dynamic social media marketing assets, including things like Instagram Stories that leverage Canva’s latest video capabilities how to approach any design project with confidence, from simple social media graphics to rich content like e-books how to master canvas grid to support advanced layout how to create special effects like realistic falling shadows and popup photo frame effects how to create and deliver a presentation with Canva how to integrate Canva with other platforms like Dropbox, Google Drive, Instagram, and more. how to download your final assets in the required format how to share projects and templates with others The smart way to create templates so you create end-to-end assets that can be reused and save your time over and over again! how to use the new content planner to plan your social media marketing right from Canva how to expand the power of Canva by pairing it with Photopea for advanced photo editing options Bottom line: If you can do it with Canva, we’ll probably cover that in this course. So if you’re fed up: the steep learning curve from other software staring at a blank page spending too much time on your design and marketing assets Creating a design that disappoints you And you can create better designs faster. Then this is the course for you. Who this course is for: Designers Business Owners Marketing Individuals Anyone who wants to create effective designs for any purpose [Hidden Content] [Hidden Content]
  2. Basic knowledge to get you started What you’ll learn Linux Basic operation Daily use commands Shell Scripting What is expected from you in the IT industry Requirements Start from Scratch Description In this course, you will get to know about basic commands in Linux such as ls, mv, split, tail, head, etc. We will also learn about shell scripts such as loops and how to think about them. New lectures will be added as time progress. This course will get you familiar with all the Unix basics that you need to keep up with current IT standards. This course is structured in such a way that will keep you interested. It will be a miniature course but it would contain all the information that you will need. The first 2 Sections will teach you all the tools necessary to use the command line and start writing your shell scripts4. Learn how to use the command line Be able to write your Shell scripts Automate tasks using Shell scripts Make decisions by using if-else statements Make decisions based on strings, variables, or files How to use arithmetic expressions How to loop through files and folders with for and while loops Learn how to use functions How to deal with variables” scope Create Shell Scripts that solve a real-world problem By the end of the course,, you’ll be writing your Shell Scripts, in particular, you will learn how to: Use the command line Automate tasks using Shell Scripts Create and use variables in your scripts Make decisions by using if-else statements Make decisions based on strings, variables, or files Use arithmetic expressions Loop through files and folders with “for” and “while” loops Use functions Deal with variables’ scope Create Shell Scripts that solve real-world problems and much more… Who this course is for: A beginner who wants to be familiar with IT Linux jobs [Hidden Content] [Hidden Content]
  3. How to Hack Wireless Network Basic Security and Penetration Testing Kali Linux Your First Hack Alan T. Norman is a proud, savvy, and ethical hacker from San Francisco City. After receiving a Bachelor of Science at Stanford University. Alan now works for a mid-size Informational Technology Firm in the heart of SFC. He aspires to work for the United States government as a security hacker, but also loves teaching others about the future of technology. Alan firmly believes that the future will heavily rely on computer “geeks” for both security and the successes of companies and future jobs alike. In his spare time, he loves to analyze and scrutinize everything about the game of basketball. [hide][Hidden Content]]
  4. [hide][Hidden Content]]
  5. Basic Terms of Hacking 1. Phishing Phishing Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. 2. Malware Malware Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network.A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. 3. Spoofing Types of spoofing Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server. 4. Encryption Encryption Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encryptingand decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext. 5. Adware Malicious pop-up ads Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online. Adware uses the browser to collect your web browsing history in order to 'target' advertisements that seem tailored to your interests. 6. Brute Force Attack Bruteforce attack A brute-force attack is a method of attack in which a high level of computing power is used to crack secure accounts by repeatedly and systematically entering many different user passwords and combinations. The attacker systematically checks all possible passwords and passphrases until the correct one is found. 7. Keystroke Logging (Keylogger) Keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitore d. Data can then be retrieved by the person operating the logging program. 8. Bot Bot A bot is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user needing to manually start them up every time. Bots often imitate or replace a human user's behavior. Typically they do repetitive tasks, and they can do them much faster than human users could. 9. Botnet Botnet A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks. 10. Remote Access Trojan (RAT) RAT A remote access Trojan (RAT) is a malware program that includes a back door for administrative controlover the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. 11. Backdoor Backdoor Backdoor is a term that refers to the access of the software or hardware of a computer system without being detected. The backdoor can be created by the developer themselves so that they can quickly and easily make changes to the code without the need to log in to the system. 12. Firewall Firewall A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network. 13. Payload A payload is a set of malicious codes that carry crucial information that can be used to hack any device beyond limits that you can't imagine. Malware payloads can be distributed by a range of vectors, including via worms, phishing emails and other delivery mechanisms. 14. Worm The worm is a standalone malicious program which spreads from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on the system, which is what allows it to travel unaided. 15. Denial of Service (Dos) A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. 16. Cross-site Scripting (XSS) XSS Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
  6. Tutorial : Making Basic Config For Simple Site By: liltoba [hide][Hidden Content]]
  7. Learn Computer Basics as a Complete Beginners to Start Using a Computer Correctly. What you'll learn Computer Basics of Both Desktop & Laptop Computers! The Brief History of Computers! Find Out What the Buttons Do on a Computer and How to Use Them! Get Set Up on a Computer! How to Access/Use the Internet! Protecting Your Computer (Offline and Online)! Where to Search Your Questions Online! How to Use Email Online! Learn about Social Media and How to Use It! Requirements There are no specific requirements needed to take this course. Description Confused and frustrated over trying to figure out computers? The GOOD NEWS is YOU don't have to be! In this course, I (Brennan, your instructor) will take you step by step through all of the most important information you need to know as a beginner. That includes desktop and laptop computers! If you're not sure what the difference is between the two, no worries! This course is designed for complete beginners that are looking to learn how to use a computer correctly. No confusing advanced lessons here - instead step by step instructional videos that guide you each step of the way. Now the only thing left to do in order to improve your computer skills is to enroll in this course today! Computers are here to stay, and being able to stay connected to friends and family is just one of the many fantastic abilities that computers give us. If you're interested in learning the basics, along with the ability to stay connected to friends and family online through computers, enroll in this course today! ============================ INSTRUCTOR BACKGROUND I've been an entrepreneur for 10+ years, and have taught over 50,000 students how to improve their own skills. I've become an eBay Powerseller and Amazon Best Selling Author and actively consult with multiple 6, 7, and 8 figure businesses. From what I've learned from these experiences, I'd love to share the knowledge with you. My goal is to help as many people as possible by teaching each student everything I know about each topic. I teach to ensure each student leaves each of my courses feeling like they've learned something new. ============================ GET ONE-ON-ONE HELP You can get my help and advice at any time - simply message me through Udemy! Regardless if you're just starting your course or have been done for months, I'm happy to help you. ============================ AMAZING VALUE: LEARN FROM 10+ YEARS OF EXPERIENCE ALL IN JUST A COUPLE HOURS! The information that you'll learn in this course can be either learned from many years of experience, or you can learn valuable skills all best summarized within a couple of hours of time. Is it really worth taking hundreds or even thousands of hours of your time to learn this information by yourself? The choice is yours to make. ============================ PROVEN STRATEGIES TO GROW YOUR BUSINESS All strategies that I share are either from my personal experience or are well-proven strategies based on industry experts. ============================ WHY TAKE THIS COURSE? Simply put, save time, save money, and learn valuable skills that you can implement into your life (for the rest of your life). Learn from others that have done it before you, and learn what has proven to work best for them. Don't do it all by yourself! ============================ CERTIFICATE OF COMPLETION WHEN YOU FINISH THE COURSE When you complete 100% of the videos in this course, you'll be emailed a certificate of completion by Udemy! ============================ MONEY BACK GUARANTEE The course comes with a Udemy-backed, 30-day money-back guarantee so you can try this course absolutely risk-free. This is not just a guarantee, it's my personal promise to you that you will improve your skills after completing this course. Invest in your future. Enroll now. Who this course is for: Anyone who is looking to learn the very beginner basics of how to use a computer & the internet. (Beginner level). [Hidden Content] [hide][Hidden Content]]
  8. The giveaway starts today and ends on 07/24/2021, I will be using a site like random.org to generate a random number that will answer the winner's post number. To participate leave a comment! Min. 2 Users Max. 5 Users
  9. What is HTML Injection? The essence of this type of injection attack is injecting HTML code through the vulnerable parts of the website. The Malicious user sends HTML code through any vulnerable field with a purpose to change the website’s design or any information, that is displayed to the user. [hide][Hidden Content]]
  10. English | 2020 | ISBN: 1484260340 | 386 Pages | True PDF, EPUB | 38 MB Learn command line tricks, programs, and hacks you can use day to day as a Linux user, programmer, and system administrator. When you interact with the digital world, you can’t go far without interacting with Linux systems. This book shows you how to leverage its power to serve your needs. Many users know “top” is installed on almost all Linux machines, but did you know with a few keystrokes you can customize it specifically for your needs? Stuck using `cd` and `ls` commands for navigating file systems? This book looks at how you can use Ranger to quickly navigate through multiple levels of folders, and quickly run bash commands without ever leaving the terminal. We also suggest programs that can be used for common tasks such as finding which programs are using the most processing, data download/upload, and file space. You’ll know how to quickly connect to remote machines and run your commonly needed jobs in a keystroke or even on auto-pilot. With Basic Linux Terminal Tips and Tricks you’ll be equipped with a wide range of tools that can be used for daily work and maintenance on all sorts of Linux systems including servers, desktops, and even embedded devices. What You Will Learn Work with common tools on your local network. Techniques for efficient use of command line. Easily manipulate text files for processing. Monitor the state of a system with a handful of popular programs. Combine programs to create useful processes. [hide][Hidden Content]]
  11. HOW TO MAKE BASIC CONFIG OPENBULLET Config Video Gives you basic Idea on how to start with OpenBullet configs , you can learn something new if u are good in programming [Hidden Content]
  12. About This File Points application to issue new points to members and new points for new topics, posts, signing up or giving points manually via their profile page. Control the points given for various things and permissions from the admin cp. Features NEW Give out points for new items, reviews and comments in other applications. e.g. Downloads, Gallery, Calendar and most 3rd party app. Member group allowance to give out points automatically to selected member groups. Mass modify member points tool to add or remove points from selected member groups. Unlock topic feature to set which forums will require members use points to unlock and view topics. Add points for voting in poll or for poll owners who receive votes. Set points for club forums. Either individually or via the admin cp. Member filter for points to support group promotions or bulk mail filters based on the number of points. Admin tools to reset all members points or clear points logs. Redeem points into a manually processed value with custom field support. Integration with the Commerce application to redeem points into account credit. Set per forum values for members giving and receiving reactions. Set how many points new members get on signup. Enable an auto reset for points. Top points widget to display the members with the top points. Customize the fixed point options given out for each post. Change the name or prefix of points. Set how many points new topics, replies are given in each forum. Set how many points are given to the topic starter if someone replies to their topic in each forum. Import points from other Points apps if they store their points in the forums database. (Confirmed working with ibEconomy.) Points displayed in profile information of each members post. Manually modify a members points count from their profile. Including a note stating the reason. Profile tab that displays a list of that members points log. Set group permissions for who can view and manage (add/remove) points. Global points page to display all the recent points logs and actions. What's New in Version 1.6.0 Released December 4, 2019 New option to give out points for new items, reviews and comments in other applications. e.g. Downloads, Gallery, Calendar and most 3rd party app. [Hidden Content] [Hidden Content]
  13. Cat-Nip Automated Basic Pentest Tool this tool will make your basic pentesting task like Information Gathering, Auditing, And Reporting so this tool will do every task fully automatic. Pentest Tools Auto Executed With Cat-Nip Whois Lookup DNSmap Nmap Dmitry Theharvester Load Balancing Detector SSLyze Automater Ua Tester Gobuster Grabber Parsero Uniscan And More Tool Soon [HIDE][Hidden Content]]
  14. jetAudio version 8.1.7.20702 Basic denial of service proof of concept exploit. View the full article
  15. Cat-Nip Automated Basic Pentest Tool this tool will make your basic pentesting task like Information Gathering, Auditing, And Reporting so this tool will do every task fully automatic. faraday Usage Guide Download / Clone Cat-Nip ~# git clone [Hidden Content] Go Inside Cat-Nip Dir ~# cd catnip Give Permission To Cat-Nip ~# chmod 777 catnip.sh Run Cat-Nip ~# ./catnip.sh Changelog 1.0 First Release Pentest Tools Auto Executed With Cat-Nip Whois Lookup DNSmap Nmap Dmitry Theharvester Load Balancing Detector SSLyze Automater Ua Tester Gobuster Grabber Parsero Uniscan And More Tool Soon [Hidden Content]
  16. C4G Basic Laboratory Information System (BLIS) version 3.4 suffers from a remote SQL injection vulnerability. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.