below images are loaded from our instagram feeds

If you are unable to view the below images properly and want quick updates about the amazing knowledge posts then please follow us on Instagram(@thecomputerjoker) by clicking button below.

Are you still paying for subscriptions?

There are multiple OTT platforms such as Netflix, Prime Video, Disney+ Hostar available and subscribing to all these is costly so, you can use the following google trick to stream/download movies.

inurl: index of movies

intitle: index of movies

Disclaimer:
This is for educational purpose only.
We don't promote/support any sort of hacking.
We don't support/promote piracy of content.

Follow the link in bio for such hacks.

//The Computer Joker//
Follow @thecomputerjoker.
Follow @thecomputerjoker.
Follow @thecomputerjoker.
Follow @thecomputerjoker.
Follow @thecomputerjoker.

Tags:
#movies #movie #film #cinema #films #hollywood #love #actor #s #art #actress #cinematography #netflix #music #moviescenes #bollywood 
 #hacks #hackingtools #datasecurity #computer #termux #bhfyp #hackernews #secutiy #or #ransomware #coder #privacy
Most popular free cloud storage to store your photos/videos and files.

follow @thecomputerjoker

It is completely free and no need to enter card details to get the free storage.

We all know google as the mountain of storage but it only provides 15 GB and due to high resolution cameras and powerful image processing 15 GB doesn't seem enough so, explore the other options. These all cloud provide storage with proper security and encryption to keep your data safe.

Make sure to enable 2FA while using any website/web application.

Cloud storage:
-------
Mega- 20 GB

Google Drive- 15 GB

Media Fire- 10 GB

ICE Drive- 10 GB

pCloud- 10 GB

Box Drive- 10 GB

OneDrive- 5 GB

Sync.com- 5 GB

iCloud- 5 GB

DropBox- 2 GB

 #cloudcomputing #cloud #technology #cybersecurity #bigdata #aws #datacenter #it #devops #programming #cloudstorage #linux #azure #software #iot #coding #networksecurity #machinelearning #dataprotection #python #informationtechnology #tech #datascience #cloudsecurity #artificialintelligence #business #cloudservices #microsoft #security #bhfyp
VPN vs Proxy explained simply.
Both are good in providing the anonymous web browsing but VPN has slight edge over the proxy.

VPN stands for Virtual Private Network and offers encryprtion, where proxy is just an intermediate gateway and does not offer encryption.

So, the winner is VPN obviously.

Follow us for more such content. 

If you like the content, please like and share.

tags:

#hackers #hacker #hacking #cybersecurity #ethicalhacking #hack #proxy #kalilinux #programming #technology #ethicalhacker #security #infosec #anonymous #hackerman #pentesting #cyber #hacked #cybercrime #malware #python #coding #hackerspace #programmer #vpn #informationsecurity #tech #hackerindonesia #cybersecurityawareness #encryption
Search google like a pro-Hacker:
Top google hacks you must know!!

Google dorks are the key to search google like a pro. Head to bio for complete set on Google Dorks with practical usage.

It saves a lot of time scrolling down pages and let us search specific content on the google.

It is also known as google hacking.

For a regular user, google is a tool to search for photo videos and etc but it is a great hacking tool for security researchers.

Well, google hacking doesn't mean you can hack website thtough google but you can identify some sensitive information, usernames, vulnerabiltiies or files about the target using these dorks. 

You can search google hacking database(GHDB) for all the updated google dorks.

Link: www.exploit-db.com

Important note: the information is publicly available on the Internet, it is advised to be used by Google on a legal basis, people with the malicious intentions may use this sensitive information to damage your online assets.

Be aware that google also knows everything when you try this dorks and other syntaxes. For reasons, you are advised to use google dorks with good intentions whether you are a regular user or a security researcher.

If you fire multiple requestes within a short time span containing these google dorks with sensitive search, google will send out you a warning and may ask you to solve a recaptcha challenges. 

Top google dorks:

1. Filetype

"filetype:" lets you find a file with specific extension

e.g. You want to download a ebook in pdf format you can google:

Hacker's handbook filetype:pdf

This will only shows you results of PDF files. Cool, isn't it?

If you want a more google dorks with practical usage, follow the link in bio!

 #hacks #hackingtools #datasecurity #googlehacks #likesforlike #googledorks #hackernews #security #ransomware #coder #privacy #anonymoushackers #phishing #developer #java #coderlife #javascript #hackerstayaway #learnhacking #android #followforfollowback #ethicalhackers #programmingmemes #internet #pythonprogramming #love #cybersecuritytraining #data
Happy Independence day to everyone!

Proud to be an Indian!

Jai hind.

I am offering a free course on the day of this independence day. Please check out the link in bio for more details.

#independenceday #india #indian #photography #instagram #love #instagood #delhi #travel #follow #picoftheday #photooftheday  #like #fashion #nature #share #freedom #insta #indianarmy #cybersecuritytraining #art #travelphotography #freedomfighter #incredibleindia #pune #chennai #indian #gujarat #ig #freedom
Well, the most asked and confusing question among the students who are learning cybersecurity. 

I have explained the same using a clear and simple method.

The basic difference between authentication and authorization is:
Authentication validates that users are who they say they are. It deals with the identity of the user.
Most basic method to understand Authentication is a login where user asked to enter right credentials. Once user enter right credentials they can use their account. 

Authorization validates whether the user have permission to access a resource.
It deals with what permission/access. 
A method to understand authorization is once you get authenticated and sign in your account, you can view your friends account details but you are not allowed to change those details because you don't have permission for that.

Authorization is a post process of Authentication. 

Once you get authenticated then only authorization comes into the picture.

I hope this clears your doubts. 

I will be uploading such informational content related to cybersecurity, hackig and other tech stuff.

Share among your friends and family if you like this.

Save this for later.

Thankyou for reading!

tags:
#cybersecurity #hacking #security #hacker #technology #infosec #ethicalhacking #cybercrime #linux #hackers #tech #cyber #programming #kalilinux #malware #cyberattack #privacy #coding #ethicalhacker #authentication #cybersecurityawareness #hack #authorization #dataprotection #it #privacy #concept #credentials
Yes, you read it right!

Each android application installed on your device has 39 security vulnerabilities on average.

Security vulnerabilities found in over 60% of Android apps, with the average number of vulnerabilities per-application is 39 vulnerabilities. 

These stats are from the data published by Atlas VPN, and data based on a report by CyRC, which analyzed the security of open-source software components of 3,335 free and paid mobile applications on the Google Play store as of Q1 2021.

#security #phishing #hacker #hacked #networking #software #android #bugs #cybersecuritytraining #ransomware #iot #networksecurity #internet #hackingtools #cloudcomputin #stats #data #windows #developer #bugbountytips
The most important and fundamental elements of Cybersecurity also known as CIA triad 

ELEMENTS OF CYBERSECURITY

Confidentiality

Assurance that the information is accessible to only who have authorized access

Integrity

Assurance of data or a resource has not underwent by improper and unauthorized modification

Availability

Assurance that the systems are accessible when required by authorized user

Authenticity

Assurance of original or quality of being genuine

Non-repudiation

Assurance that sender and receiver cannot deny of message/data transferred

You can check out my blog for more details, link in bio.

Tags:
#infosec #cyber #ciatriad #confidentionality #integrity #availability
#datasecurity #codingblog #pythonprogramminglanguage #computersociety #technologyofindia #tor #artificialintelligence #girls #hubsecurity #cyberarmy

Social

Contact

hi@thecomputerjoker.com

© copyrighted 2021. All Rights Reserved.