Get Mystery Box with random crypto!

Akilas Tech

Logo of telegram channel akilastech — Akilas Tech A
Logo of telegram channel akilastech — Akilas Tech
Channel address: @akilastech
Categories: Technologies
Language: English
Subscribers: 109
Description from channel

we are AKILAS,with the latest tech news,updates and futuristic with easy tips,tricks and free udemy courses and much,much more...🚀💻 🛸
@akilastech
Reach out to us at
@AtoZtorBot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages 2

2020-11-21 12:50:07 Breaking News

cyber-attack has been reported, by Manchester United FC,the club said.

And the club added that immediate action has been taken to control the attack and that it is working with experts and consultants to investigate the situation and reduce the risk.

#MUFC

@akilastech
197 views09:50
Open / Comment
2020-11-19 09:46:00 BlueSmack Attack - Bluetooth Hacking

What is bluesmack Attack?
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.

Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.

How to Avoid Such Attack

Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.

@akilastech
Reach ou to us
@AtoZtorBot
199 viewsedited  06:46
Open / Comment
2020-11-16 13:44:58 Different ways to Hack Via Bluetooth

Bluetooth is a wireless communication standard that was developed in 1998 to revolutionize the small, personal
and portable electronic device market. It provides a protocol for low power peripherals (cell phones, PDA’s,
mobile computers) to communicate with each other over a small range.
In any wireless networking setup, security is a concern .Unfortunately, Bluetooth still contains a large number of
security vulnerabilities despite the claims made by the Bluetooth special interest group.
Bluetooth hacking is a technique used to get information from another Bluetooth enabled device without any
permissions from the host. This event takes place due to security flaws in Bluetooth technology. Bluetooth
hacking is not limited to cell phones, but is also used to hack PDAs, Laptops and desktop computers.

Here are some different methods which most Hackers Use to hack into a system

1. Blue Smacking
2. Blue Jacking
3. blue Bugging
4. Blue Printing
5. Blue Snarfing
6. Spooftooph


@akilastech
Reach out to us
@AtoZtorBot
195 views10:44
Open / Comment
2020-11-12 06:30:07 #free_course

Learn a-frame-framework

https://www.udemy.com/course/a-frame-framework/?couponCode=TRY10FREE404

NOTE:make a copy of this as soon as possible.

@akilastech
Reach out to us
@AtoZtorBot
217 views03:30
Open / Comment
2020-11-11 23:13:37 ይህ ቻናል የተመቸው
175 views20:13
Open / Comment
2020-11-09 06:33:42 #Free_udemy_Course
Adobe premiere pro course

https://www.udemy.com/course/adobepremiereprocccourse/?couponCode=BFDAYFREE

NOTE:Have a copy of this as soon as possible.

@akilastech
Reach out to us
@AtoZtorBot
192 views03:33
Open / Comment
2020-11-08 10:54:08 HTTP and HTTPS: What do they do, and how are they different ?

In the beginning, network administrators had to figure out how to share the information they put out on the Internet.

They agreed on a procedure for exchanging information and called it HyperText Transfer Protocol (HTTP).

Once everyone knew how to exchange information, intercepting on the Internet was not difficult.

So knowledgeable administrators agreed upon a procedure to protect the information they exchanged.

The protection relies on SSL Certificate to encrypt the online data.

Encryption means that the sender and recipient agree upon a code and translate their documents into random-looking character strings.

The procedure for encrypting information and then exchanging it is called HyperText Transfer Protocol Secure (HTTPS).

With HTTPS if anyone in between the sender and the recipient could open the message, they still could not understand it. Only the sender and the recipient, who know the code, can decipher the message.

Humans could encode their own documents, but computers do it faster and more efficiently. To do this, the computer at each end uses a document called an SSL Certificate containing character strings that are the keys to their secret codes.

@akilastech
Reach out to us
@AtoZtorBot
173 viewsedited  07:54
Open / Comment
2020-11-04 18:45:15 Free udemy Course

https://www.udemy.com/course/flutterbootcamp/

@akialstech
Reach out to us
@AtoZtorBot
193 views15:45
Open / Comment
2020-11-02 14:05:56
To play the dino running game in your chrome browser, without having to wait for your Internet to fail.

Go to: chrome://dino to play the arcade version.

@akilastech
Reach out to us
@AtoZtorBot
184 views11:05
Open / Comment
2020-10-31 10:05:06 #tips_and_tricks
How to Listen to WhatsApp Audio Messages in Secret

Whenever you receive an audio message and don’t want to play it through your speakers, here’s what you must do:

Simply tap the Play button on the message, then immediately hold your phone up to your ear.

WhatsApp will intelligently detect that your phone is up against your head, and switch to playing the message through your phone’s earpiece (like a call) instead of your speaker. It will even start the message from the beginning so you don’t miss any of it.

@akilastech
Reach out to us
@AtoZtorBot
171 viewsedited  07:05
Open / Comment