Get Mystery Box with random crypto!

Akilas Tech

Logo of telegram channel akilastech — Akilas Tech A
Logo of telegram channel akilastech — Akilas Tech
Channel address: @akilastech
Categories: Technologies
Language: English
Subscribers: 109
Description from channel

we are AKILAS,with the latest tech news,updates and futuristic with easy tips,tricks and free udemy courses and much,much more...🚀💻 🛸
@akilastech
Reach out to us at
@AtoZtorBot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages

2021-10-23 15:24:35 Akilas Tech pinned a photo
12:24
Open / Comment
2021-10-23 15:24:18
ABA SAMUEL RESERVOIR

The Historical power generating dam, Rise with us to an amazing water falls and land marks.


Date: NOV 7/2021
ጥቅምት 28/2014

Price: 450birr only.

Package:
Transportation
Bottled water
Snack
Lunch
Entrance fee
Guide
photograph

Payment:

CBE (Commercial Bank OF Ethiopia)
Name:Tinsae Ketema
Acc" 1000181898937

Dashen bank
Name:Tinsae Ketema
Acc: 5008885887011

For more info and registration
@akilas_events
@akilas_events_contact
+251982596777
+251930897104


NOTICE
After Deposits recipe/Screen shots are required to be sent to our contact @akilas_events_contact.
66 views12:24
Open / Comment
2021-10-21 19:51:34 @akilas_events
54 views16:51
Open / Comment
2021-08-26 15:57:39
Happy Birthday to Linux
August 25, 2021
35 views12:57
Open / Comment
2021-06-22 07:35:09 https://easycashjob.com/?referral=2302352
easy cash job.
42 views04:35
Open / Comment
2020-12-27 21:59:40 Database Engineering With Phyton
https://click.linksynergy.com/deeplink?id=tHnUyAHsRvI&mid=39197&murl=https%3A%2F%2Fwww.udemy.com%2Fcourse%2Fdatabase-engines-crash-course%2F%3FcouponCode%3DHOLIDAY
495 viewsedited  18:59
Open / Comment
2020-12-09 16:24:42 Python Programming - Basics, Multithreading, OOP and NumPy

https://www.udemy.com/course/python-programming-basics-multithreading-oop/?couponCode=14BDC5FD3CA07F07E017

@akilastech
Reach out to us
@AtoZtorBot
503 views13:24
Open / Comment
2020-12-08 12:32:09 Complete Google Certified Educator Level 1 and 2 Masterclass

https://www.udemy.com/course/complete-google-certified-educator-level-1-masterclass/?couponCode=9EB0D002A5685011660B

@akilastech
Reach out to us
@AtoZtorBot
300 views09:32
Open / Comment
2020-12-07 20:59:21 The ultimate app making course
https://www.udemy.com/course/the-ultimate-app-making-course-master-many-coding-skills/?couponCode=4EE03A162348D62D10C2

@akilastech
Reach out to us
@AtoZtorBot
249 views17:59
Open / Comment
2020-11-24 07:20:13 #tips
Password cracking techniques

There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ;

Dictionary attack – This method involves the use of a wordlist to compare against user passwords.

Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.

Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.

Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.

Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.

@akilastech
Reach out to us
@AtoZtorBot
253 viewsedited  04:20
Open / Comment