STAFF ONLINE
Latest topics
» Glo Network Data Plans For January 2018
Yesterday at 1:41 pm by Emmi

» Latest Airtel Data Plans For January 2018
Sun Jan 14, 2018 6:11 pm by Snows

» How To Subscribe To JAMB CBT 2018/2019 Exam Runs at 9Jatechs
Sun Jan 14, 2018 3:02 am by Emmi

» How To Unsubscribe From All Unwanted Email Subscriptions
Sun Jan 14, 2018 2:32 am by Emmi

» Latest Airtel Free Browsing Cheat For 2018
Sat Jan 13, 2018 1:28 am by Emmi

» Glo Cheapest Call Tariff Plan and Migration Code
Sat Jan 13, 2018 12:54 am by DaddyBoy

» Latest WhatsApp Update Now let's you Save and Listen to Voice Message before Sending it
Fri Jan 12, 2018 9:32 pm by mose

» How To Send Free Unlimited SMS With Your MTN Sim | December 2017
Fri Jan 12, 2018 2:06 pm by Emmi

» MTN Unlimited Free Browsing
Fri Jan 12, 2018 2:01 pm by mose

» Join 9Jatechs Free Browsing and Tech Update Whatsapp Group
Fri Jan 12, 2018 1:45 pm by Friday

» How To Get 2018 NECO WAEC and JAMB Answers For Free
Fri Jan 12, 2018 1:41 pm by Friday

» MTN Conducted Africa’s First 5G Technology, Trial Hits 20GB Per Second
Fri Jan 12, 2018 1:22 am by Snows

» How to secure your Mobile smartphone
Thu Jan 11, 2018 10:03 am by Peter1

» Latest MTN Daily, Weekly and Monthly Data Plan and Their Subscription Code
Thu Jan 11, 2018 12:29 am by Snows

» Airtel Unlimited Social Bundle Is Now Capped At 750MB
Wed Jan 10, 2018 3:17 am by emmy

»  Strategies to Get Your Website Ranked on Google Top 10
Tue Jan 09, 2018 1:18 am by Gab2

» Introduction As a New Registered Member
Tue Jan 09, 2018 1:11 am by Gab2

» Current Timetable For 2018/2019 Waec Examination
Mon Jan 08, 2018 3:12 am by Gab2

» How To Make Good Grade (A's) For Waec and Neco
Sun Jan 07, 2018 11:12 pm by Emmi

» New Glo free browsing settings with Anonytun VPN
Sun Jan 07, 2018 3:00 am by mose

» Airtel Free Facebook service now capped at 20Mb daily
Sun Jan 07, 2018 1:58 am by emmy

» How To Fix Glo Network Issues and Subscribe to their Data plan
Sat Jan 06, 2018 8:39 am by emmy

» Latest MTN Data Plan, Price and Subscription Code For 2018
Fri Jan 05, 2018 2:28 am by emmy

» Get MTN 4GB For 1000Naira
Thu Jan 04, 2018 5:51 pm by mose

» How To Charge Your Smart Phone in Safe Mode
Thu Jan 04, 2018 3:27 pm by mose

Top posting users this month
Search
 
 

Display results as :
 

 


Rechercher Advanced Search

Like Our facebook Page
Log in

I forgot my password

Glo Network Data Plans For January 2018

Mon Jan 15, 2018 9:25 am by Snows



As we all know, Glo are grandmasters of data.. They've proven to every Nigeria that they are worth being called the name..


Their data plans are cheap and anybody can afford it..


Check out Glo Data plans below.


DAILY PLANS 


✔️ 30MB for ₦50 valid for 1 day, dial *127*14# to activate it


✔️ ₦100 for 100MB valid for 1 …

[ Full reading ]

Comments: 1

Latest Airtel Data Plans For January 2018

Sun Jan 14, 2018 6:11 pm by Snows

 

As we all know that After GLOBACOM NIGERIA Is Airtel Nigeria in terms of data offers for internet browsing.

So it's important to know the current data plans available on Airtel..

Checkout the data plans available for airtel below ™️

AVAILABLE AIRTEL DATA PLANS OF 2018

~~50MB For #100: Get 30MB data for just …


[ Full reading ]

Comments: 0

Glo Cheapest Call Tariff Plan and Migration Code

Sat Jan 13, 2018 12:54 am by DaddyBoy



Glo has one of the cheapest call tariffs in the country but it's all about you knowing the right tariff plan to migrate to. The Glo 11k/sec plan just as the name describes lets you call all Glo network users in the country for just 11k/secs as well as other …
[/img(320px,168px):d81c]


[ Full reading ]

Comments: 0

MTN Conducted Africa’s First 5G Technology, Trial Hits 20GB Per Second

Fri Jan 12, 2018 1:22 am by Snows

MTN has conducted a 5G technology and applications trial at its head office in Johannesburg in partnership with Ericsson.




The announcement at the MTN headquarters in South Africa on Monday comes after the two companies signed a memorandum of understanding at AfricaCom 2017, to collaborate on the rollout of 5G technologies in South Africa, one of the first of its kind in Africa, IT News Africa …


[ Full reading ]

Comments: 0

Latest MTN Daily, Weekly and Monthly Data Plan and Their Subscription Code

Wed Jan 10, 2018 10:17 pm by emmy





MTN Daily Data Plan
1. 50MB For N100
With this plan, MTN gives you 50MB of data for just N100 and it’s valid for 24 hours.
Activation code:  Dial *104# or Text”104″ to 131 on your MTN line to subscribe
Data: 50MB; Fee: N100; Validity: 24hours; Activation code: *104# 

2. 150MB For N200
With this plan, MTN gives you 100MB of data …

[ Full reading ]

Comments: 2

Nairabet

The Software And Operating System Professional Hackers Use

View previous topic View next topic Go down

avatar
Snows
Ultimate goal ✭✭✭✭✭✭
Ultimate goal  ✭✭✭✭✭✭
Posts : 223
Points : 1071
Reputation : 12

PostSnows on Sun Nov 27, 2016 8:24 am

There are three types of hacker’s white hat hackers, black hat hackers and grey hat hackers. These hackers do the same thing hacking but in the different fields and for different purpose. White hat hackers work for the companies, FBI’s, CID’s etc. They keep the data safe from the other hackers by doing hard labor. In support of they are paid satisfactory amount for their work.

The black hat hackers are having wicked plans for hacking other computers. They illegally break the communication network for the information it means they steal the information and sell for the money.


Grey hat hackers are the combination of both hackers. These hackers do this for their fun they are neither good nor bad. But then also they linked with black hackers.

The black and grey hat hackers are known as “real hackers”. These peoples use very high technology so that they can never be mapped out. According to the blog and reports it is proved that the real professional hackers use Linux operating system.

Linux operating system accepts any kind of formation changes and also accepts any new software easily. The hackers not only use Linux but also use cheap burner laptop purchased on crag lists. These types of laptops have special type USB and SD cards which make the laptops disappear, damage if it has been traced.
Some of the Linux operating system used for hacking is given as follows:

1) Kali Linux: it is being financed by Offensive Security Ltd. Linux supply for digital forensics and penetration testing. Kali Linux operating system often used by the hackers. This is a project reserved for compatibility and porting to exact Android devices, called Kali Linux NetHunter. Mati Aharoni and Devon Kearns industrialised by rewriting of BackTrack. BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1 and SS808 these are the platforms presented by Kali Linux..
2) Back Box: this operating system backbox consist of complete set of tool require for hacking.

3) Parrot Security OS: Parrot Security OS is established by Debian’s stable branch (jessie). It is a GNU/LINUX distribution. It gives best diffusion and security testing experience. It is planned for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonymity and cryptography.

4) Live Hacking OS: this is also a pack of tools for hacking. It consists of the (GUI) GNOME inbuilt. It requires few hardware and very easy to operate.


5) DEFT Linux: The full form of DEFT is Digital Evidence and Forensic Toolkit. DEFT Linux is based on the Ubuntu operating system. This software is used by the hackers, IT auditors, investigators, military, and police.

6) Samurai Web Testing Framework: The Samurai Web Testing Framework operates a web pen-testing environment. The CD consists of tools which concentrate on testing and damaging websites. It consists of all four stages of a web pen-test.

7) Network Security Toolkit (NST): The Network Security Toolkit (NST) is based on Linux, Live DVD/USB Flash Drive. It provides open source computer security and networking tools. It is used for regular security, networking diagnostic and monitoring responsibilities.

Cool NodeZero: Node Zero is based on Linux kernel. It is obtained from Ubuntu. Distro (dual-arch Live DVD ISO image) is downloaded only in computers which supports 32-bit (x86) and 64-bit (x86_64).

9) Pentoo:– Pentoo is for penetration experiment and security consideration. It is a Live USB and Live CD. It is supported by Gentoo Linux. The Pentoo kernel consists of GPGPU cracking software, grsecurity and PAX hardening and extra patches.

10) GnackTrack: It is a task of combining penetration testing tools and the Linux Gnome desktop. Penetration testing, the features includes Metasploit, armitage, wa3f and others awesome tools.

11) Blackbuntu: BlackBuntu is supported by Ubuntu, GNU/Linux. It is designed for security distribution of penetration testing and cyber forensic investigations. The testing is based on GNOME Desktop Environment. It is used in Ubuntu 10.10 on BackTrack situation.

12) Knoppix STD: it is a group of hundred and thousands of open source security tools. It operates from a bootable CD, without disturbing the operating system of the server. It is not perfect for Linux but superior for novice and professional security personnel. If you know the basics of the Linux most of your works can be done by command line.

13) Weakerth4n: It is developed by Debian Squeeze. It uses Flux box for the desktop surrounding. It consists of many Wireless tools hence it is ideal for WI-Fi hacking. The tools of Weakerth4n consists of Wifi attacks, SQL Hacking, Cisco Operation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering,
Information Assembling, Android Hacking, Networking and creating Shells.

14) Cyborg Hawk: according to hackers, this is the most awesome operating system ever made. The tools of Cyborg Hawk are specially made for pro Ethical Hackers and Cyber Security Experts. The tools of Cyborg Hawk are more advanced than kali. It consists of 700 tools for mobile safety and malware testing.
From the above details we come to a conclusion that, because of the power and flexibility of Linux the hackers choose this operating system.

View previous topic View next topic Back to top

Create an account or log in to leave a reply

You need to be a member in order to leave a reply.

Create an account

Join our community by creating a new account. It's easy!


Create a new account

Log in

Already have an account? No problem, log in here.


Log in

 
Permissions in this forum:
You cannot reply to topics in this forum