Akilas Tech


Channel's geo and language: Ethiopia, English
Category: Technologies


we are AKILAS,with the latest tech news,updates and futuristic with easy tips,tricks and free udemy courses and much,much more...🚀💻 🛸
@akilastech
Reach out to us at
@AtoZtorBot

Related channels

Channel's geo and language
Ethiopia, English
Statistics
Posts filter




Forward from: Akilas Event's
"ራሥ ዳርጌ/ፖርቹጊስ ድልድይ"

ታሪካዊው የ ራሥ ዳርጌ/ፖርቹጊስ ድልድይ በ ኢትዮጵያ ደብረሊባኖስ ልዩ ቦታው *** በተባለ አካባቢ የሚገኝ ጥንታዊ የድልድይ ሥራ ነው።

ስለ ቦታው ስያሜ በሁለት የተከፈለ የታሪክ ሁነት አለ፤ እንደ አንዳንድ የታሪክ ሠዎች የ ድልድዩ ስያሜ "ፖርቹጊሥ/Portuguese" ሲሆን ይሔም በ ፲፮(16)ኛው ክፍለ ዘመን በ ፖርቹጋል ዜጎች የተገነባ ስለሆነ የተሠጠው ሥያሜ ነው ይላሉ።
በሌላ በኩል ያሉት ወገኖች ሥያሜው "ራሥ ዳርጌ" ነው የሚል ሢሆን ይሔም በ ፲፱(19)ኛው ክፍለ ዘመን በ ራስ ዳርጌ (የዳግማዊ አፄ ምኒልክ አጎት) ያሰሩት እንደሆነ ይናገራሉ።


"Ras Darge / Portuguese Bridge"

The historic Ras Darge / Portuguese Bridge is an ancient bridge located near the Ethio-German Park in the Ethiopian town of Debre Libanos "Chagel."

There are two historical events concerning the name of the place: According to some historians, the bridge was named "Portuguese" because it was built by Portuguese citizens in the 16th century.
Others, however, claim that the name "Ras Darge" was coined by Ras Darge (Emperor Menelik II's uncle) in the 19th century.




Forward from: Akilas Event's
ABA SAMUEL RESERVOIR

🔸️The Historical power generating dam, Rise with us to an amazing water falls and land marks.


Date: NOV 7/2021
ጥቅምት 28/2014

Price: 450birr only.

Package:
🚍Transportation
💧Bottled water
🧇Snack
🍽Lunch
⛩Entrance fee
🛣️Guide
📸photograph

Payment:

CBE (Commercial Bank OF Ethiopia)
Name:Tinsae Ketema
Acc" 1000181898937

Dashen bank
Name:Tinsae Ketema
Acc: 5008885887011

For more info and registration
@akilas_events
@akilas_events_contact
+251982596777
+251930897104


⚠️ NOTICE
After Deposits recipe/Screen shots are required to be sent to our contact @akilas_events_contact.














#tips
🧩Password cracking techniques🧩

🤖There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ;

🤖Dictionary attack – This method involves the use of a wordlist to compare against user passwords.

🤖Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.

🤖Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.

🤖Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.

🤖Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.

@akilastech
Reach out to us
@AtoZtorBot


🚨 Breaking News

cyber-attack has been reported, by Manchester United FC,the club said.

And the club added that immediate action has been taken to control the attack and that it is working with experts and consultants to investigate the situation and reduce the risk.

#MUFC

@akilastech


🧩BlueSmack Attack - Bluetooth Hacking🧩

🤖What is bluesmack Attack?
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.

🤖Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.

🤖How to Avoid Such Attack

Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.

@akilastech
Reach ou to us
@AtoZtorBot


🧩Different ways to Hack Via Bluetooth 🧩

Bluetooth is a wireless communication standard that was developed in 1998 to revolutionize the small, personal
and portable electronic device market. It provides a protocol for low power peripherals (cell phones, PDA’s,
mobile computers) to communicate with each other over a small range.
In any wireless networking setup, security is a concern .Unfortunately, Bluetooth still contains a large number of
security vulnerabilities despite the claims made by the Bluetooth special interest group.
Bluetooth hacking is a technique used to get information from another Bluetooth enabled device without any
permissions from the host. This event takes place due to security flaws in Bluetooth technology. Bluetooth
hacking is not limited to cell phones, but is also used to hack PDAs, Laptops and desktop computers.

Here are some different methods which most Hackers Use to hack into a system

1. Blue Smacking
2. Blue Jacking
3. blue Bugging
4. Blue Printing
5. Blue Snarfing
6. Spooftooph


@akilastech
Reach out to us
@AtoZtorBot






🧩HTTP and HTTPS: What do they do, and how are they different ?🧩

🤖In the beginning, network administrators had to figure out how to share the information they put out on the Internet.

🤖 They agreed on a procedure for exchanging information and called it HyperText Transfer Protocol (HTTP).

🤖 Once everyone knew how to exchange information, intercepting on the Internet was not difficult.

🤖 So knowledgeable administrators agreed upon a procedure to protect the information they exchanged.

🤖 The protection relies on SSL Certificate to encrypt the online data.

🤖 Encryption means that the sender and recipient agree upon a code and translate their documents into random-looking character strings.

🤖The procedure for encrypting information and then exchanging it is called HyperText Transfer Protocol Secure (HTTPS).

🤖 With HTTPS if anyone in between the sender and the recipient could open the message, they still could not understand it. Only the sender and the recipient, who know the code, can decipher the message.

🤖 Humans could encode their own documents, but computers do it faster and more efficiently. To do this, the computer at each end uses a document called an SSL Certificate containing character strings that are the keys to their secret codes.

@akilastech
Reach out to us
@AtoZtorBot




To play the dino running game in your chrome browser, without having to wait for your Internet to fail.

Go to: chrome://dino to play the arcade version.

@akilastech
Reach out to us
@AtoZtorBot


#tips_and_tricks
How to Listen to WhatsApp Audio Messages in Secret

Whenever you receive an audio message and don’t want to play it through your speakers, here’s what you must do:

Simply tap the Play button on the message, then immediately hold your phone up to your ear.

WhatsApp will intelligently detect that your phone is up against your head, and switch to playing the message through your phone’s earpiece (like a call) instead of your speaker. It will even start the message from the beginning so you don’t miss any of it.

@akilastech
Reach out to us
@AtoZtorBot

20 last posts shown.

87

subscribers
Channel statistics