Today we are going to share you the awesome trick on how to share the internet with your android devices from your Pc computer. If you don’t have WiFi adapter to exchange internet connection you need to buy one Wifi Adapter, WiFi adapter is usually cheap and easy to use. So now the tricky part I am going to share with you will give you the advantage to share the internet from any computer or laptop whether it was Windows 7, 8 or 10. So let’s know the complete guide on How to connect with the internet in your Android mobile via your computer’s WiFi.
🔵 How to connect to The Internet in your Android mobile via Laptop WiFi
1⃣ First Go to start button and you need to Run CMD there. and you need to right click on CMD and click on “Run as Administrator”
2⃣ Now type “netsh wlan set hostednetwork mode=allow ssid=NAME key=PASSWORD” without the quotation mark, and hit enter. You need to enter the Username on “NAME” and your desired password on “PASSWORD” . Remember your password must be at least 8digit long or else it will reject the command. You need to wait for some time until your network is made. after that cmd will show you that your passphrase is being successfully change that means your network is made.
3⃣ Now type “netsh wlan start hostednetwork” without the quotation mark and hit the enter button. CMD will send you an immediate message regarding that your hosted network started.
4⃣ Once you had completed the CMD part you need to close it and then go to “Open Network and Sharing center” And then click on Change Adapter Settings. You can see the new adapter updated there which will be named as “Microsoft Virtual Wifi Miniport Adapter” Here You need to select the default LAN connection on your computer that you mostly use and go to its “Properties” under “Sharing” tab you need to enable the option of “Allow other network users to connect through this computer’s Internet Connection“, and under Home networking Connection select the newly created adapter. and then click on Ok
✅ *That’s it* now search for wifi connections from your Android phone you will surely find your computer’s internet connection you need to enter the given username and password to successful login with your computer. That’s it!
⚜ Now if you want to disable the newly created wifi Connection you need to open Network and sharing center> Change adapter setting and simply disable the newly created hosted network. Or else you can type “netsh wlan stop hostednetwork” in command prompt, whichever suits best you may apply.
➖➖➖➖➖➖➖➖➖➖➖➖
[1:53 AM, 12/17/2018] Ashu Cimage: 🎁 What is kali linux
➖➖➖➖➖➖➖➖➖➖➖➖
🔵 Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
🔵 Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debiandevelopment standards.
🔵 More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Toolssite.
🔵 Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
🔵 Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
🔵 FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
🔵 Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
🔵 Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
🔵 Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
🔵 GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
🔵 Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
🔵 Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linuxto their liking, all the way down to the kernel.
🔵 ARMEL and ARMHF support: Since ARM-based single-board systems like the…
[1:53 AM, 12/17/2018] Ashu Cimage: 🎁 How to Protect Yourself from Keylogger Attacks
➖➖➖➖➖➖➖➖➖➖➖➖
✅ And that's how easy it is for hackers to see and record every keystroke you press on your computer. When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured:
⚜ Use antivirus software. While there's not a catch-all solution, and antivirus software won't protect against sophisticated and cutting-edge keyloggers, there's still no excuse for not using antivirus software which protects against most known keylogger software.
⚜ Use on-screen keyboards when entering passwords. One of the limitations of most keyloggers is that they only capture actual keystrokes being pressed on the keyboard. The Windows on-screen keyboard will provide a virtual keyboard that may help circumvent keyloggers.
⚜ Use a firewall. It's possible lazy attackers won't go through the effort of disguising their payloads to appear as being normal DNS (port 53) or HTTP (port 80) transmissions. A firewall might catch suspicious packets leaving your computer on port 35357.
⚜ Protect your computer against backdoors. While all of the above is helpful when you're already backdoored, the best thing to do is make sure you're not exploited in the first place
➖➖➖➖➖➖➖➖➖➖➖➖
Keep supporting❤
🔵 How to connect to The Internet in your Android mobile via Laptop WiFi
1⃣ First Go to start button and you need to Run CMD there. and you need to right click on CMD and click on “Run as Administrator”
2⃣ Now type “netsh wlan set hostednetwork mode=allow ssid=NAME key=PASSWORD” without the quotation mark, and hit enter. You need to enter the Username on “NAME” and your desired password on “PASSWORD” . Remember your password must be at least 8digit long or else it will reject the command. You need to wait for some time until your network is made. after that cmd will show you that your passphrase is being successfully change that means your network is made.
3⃣ Now type “netsh wlan start hostednetwork” without the quotation mark and hit the enter button. CMD will send you an immediate message regarding that your hosted network started.
4⃣ Once you had completed the CMD part you need to close it and then go to “Open Network and Sharing center” And then click on Change Adapter Settings. You can see the new adapter updated there which will be named as “Microsoft Virtual Wifi Miniport Adapter” Here You need to select the default LAN connection on your computer that you mostly use and go to its “Properties” under “Sharing” tab you need to enable the option of “Allow other network users to connect through this computer’s Internet Connection“, and under Home networking Connection select the newly created adapter. and then click on Ok
✅ *That’s it* now search for wifi connections from your Android phone you will surely find your computer’s internet connection you need to enter the given username and password to successful login with your computer. That’s it!
⚜ Now if you want to disable the newly created wifi Connection you need to open Network and sharing center> Change adapter setting and simply disable the newly created hosted network. Or else you can type “netsh wlan stop hostednetwork” in command prompt, whichever suits best you may apply.
➖➖➖➖➖➖➖➖➖➖➖➖
[1:53 AM, 12/17/2018] Ashu Cimage: 🎁 What is kali linux
➖➖➖➖➖➖➖➖➖➖➖➖
🔵 Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
🔵 Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debiandevelopment standards.
🔵 More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Toolssite.
🔵 Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
🔵 Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
🔵 FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
🔵 Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
🔵 Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
🔵 Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
🔵 GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
🔵 Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
🔵 Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linuxto their liking, all the way down to the kernel.
🔵 ARMEL and ARMHF support: Since ARM-based single-board systems like the…
[1:53 AM, 12/17/2018] Ashu Cimage: 🎁 How to Protect Yourself from Keylogger Attacks
➖➖➖➖➖➖➖➖➖➖➖➖
✅ And that's how easy it is for hackers to see and record every keystroke you press on your computer. When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured:
⚜ Use antivirus software. While there's not a catch-all solution, and antivirus software won't protect against sophisticated and cutting-edge keyloggers, there's still no excuse for not using antivirus software which protects against most known keylogger software.
⚜ Use on-screen keyboards when entering passwords. One of the limitations of most keyloggers is that they only capture actual keystrokes being pressed on the keyboard. The Windows on-screen keyboard will provide a virtual keyboard that may help circumvent keyloggers.
⚜ Use a firewall. It's possible lazy attackers won't go through the effort of disguising their payloads to appear as being normal DNS (port 53) or HTTP (port 80) transmissions. A firewall might catch suspicious packets leaving your computer on port 35357.
⚜ Protect your computer against backdoors. While all of the above is helpful when you're already backdoored, the best thing to do is make sure you're not exploited in the first place
➖➖➖➖➖➖➖➖➖➖➖➖
Keep supporting❤