Technologier Tutorials | Programming & Hacking stuff

Web Development Tutorials for HTML, CSS, JavaScript, PHP, ColdFusion, Python, SQL, SEO, Graphic Design, and Information Architecture.

Home › Archives for May 2017
How to Install PhantomJS in Windows 10 | Tutsoftechno

How to Install PhantomJS in Windows 10 | Tutsoftechno

Tutsoftechno
07:31
1
SEO (Search Engine Optimization) and it's types

SEO (Search Engine Optimization) and it's types

Tutsoftechno
06:01
Hello Guys Today i will tell you little bit about SEO but first: What is SEO? SEO is stands for Search Engine Optimization and it's ...
0
How to protect from ransomware CryptoLocker (Wanna Cry) - Part 2

How to protect from ransomware CryptoLocker (Wanna Cry) - Part 2

Tutsoftechno
05:56
Hi guys here is part 2 of How to protect from ransomware CryptoLocker so here is list which was remaining: 6.Disconnect your computer: ...
4
How to card Nike store - Latest carding method

How to card Nike store - Latest carding method

Tutsoftechno
05:55
Today let me show how to card Nike Store What You Need: - RDP (if you can't buy RDP, it's works with PREMIUM Socks5 - Tested and ...
2
How to get WIFI passwords of your city using mobile

How to get WIFI passwords of your city using mobile

Tutsoftechno
05:54
Hello everyone i find android app which can show you wifi passwords of your city by allowing the GPS (for detecting location) Here Hope ...
0
How to protect from ransomware CryptoLocker - Part 1

How to protect from ransomware CryptoLocker - Part 1

Tutsoftechno
05:54
Hello guys let's do our best to protect ourself from randsomware maybe i don't need to explain about " randsomware " it ...
0
How to get WIFI passwords of your city using mobile

How to get WIFI passwords of your city using mobile

Tutsoftechno
05:52
Hello everyone i find android app which can show you wifi passwords of your city by allowing the GPS (for detecting location) Here Hope ...
0
Check It out My Website i've coded

Check It out My Website i've coded

Tutsoftechno
12:42
Hello Guys  long time no see coz i was pretty busy at my exams and after that i've to code my website. Wanna check? Here . I'm no...
0
Insecure Direct Object References

Insecure Direct Object References

Tutsoftechno
12:41
Insecure Direct Object References: According to  owasp :  Insecure Direct Object References occur when an application provides direct a...
0
Google Dork (SQLI) To Find Vulnerable Websites For Hacking

Google Dork (SQLI) To Find Vulnerable Websites For Hacking

Tutsoftechno
12:40
Google Dork (SQLI) To Find Vulnerable Websites for Hacking Hello guys today i will show you how we can get websites for hacking :) Simp...
2
Google Dorks (Google Database Hacking)

Google Dorks (Google Database Hacking)

Tutsoftechno
12:39
Google Dorks (Google Database Hacking) A Google dork query, sometimes just referred to as a dork, is a search string that uses advance...
0
RCE (Remote Code Execution)

RCE (Remote Code Execution)

Tutsoftechno
12:38
Another Name of RCE is also called  arbitrary code execution .Which is used to describe an attacker's ability to execute any command of ...
0
Facebook Phishing Page (Method to hack Facebook account)

Facebook Phishing Page (Method to hack Facebook account)

Tutsoftechno
12:30
Facebook Phishing Page - Method to hack Facebook account: Phishing  is the attempt to obtain sensitive information such as usernames, p...
0
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

Tutsoftechno
12:23
Today i will explain another way of how hackers hack people accounts but first let's what is  CSRF ? Cross - Site Request Forgery  ( ...
0
Broken Authentication and Session Management (Most Common Vulnerabilities to Hack Websites)

Broken Authentication and Session Management (Most Common Vulnerabilities to Hack Websites)

Tutsoftechno
12:17
Today i will told you about one of the most common Vulnerability to Hack websites .But first let me told you THIS IS JUST FOR EDUCATION ...
1
What is XSS (Website vulnerability)

What is XSS (Website vulnerability)

Tutsoftechno
11:58
What is XSS (Cross Site Scripting) Cross-site scripting (XSS) is an injection attack which is carried out on Web applications that acce...
0
What is SQL INJECTION (Website vulnerability)

What is SQL INJECTION (Website vulnerability)

Tutsoftechno
11:57
What is SQL INJECTION An attack technique used to exploit web sites by altering backend SQL statements through manipulating application i...
0
How did Websites get hacked?

How did Websites get hacked?

Tutsoftechno
11:55
Today i'm gonna told you about how did hackers hack websites. Hackers acually found a bug (vulnerability) (Like SQL Injection,XSS,RCE)...
0
Hackers Type: Gray Hat Hackers (Both White and Black Hackers)

Hackers Type: Gray Hat Hackers (Both White and Black Hackers)

Tutsoftechno
11:54
They are both White and Black hat hackers.Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or t...
0
Hackers Type: Black Hat (Crackers)

Hackers Type: Black Hat (Crackers)

Tutsoftechno
11:51
They are also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak secur...
0
Hackers Type: White Hat (Ethical Hackers)

Hackers Type: White Hat (Ethical Hackers)

Tutsoftechno
11:50
White Hat hackers are also known as Ethical Hackers. White Hat hackers are the good guys of the hacker world. They’ll help you remove a vi...
1
Python Programming - 23.Project #1 - Building a calculator

Python Programming - 23.Project #1 - Building a calculator

Tutsoftechno
11:27
0
Python Programming - 22.Importing modules into a Python script

Python Programming - 22.Importing modules into a Python script

Tutsoftechno
11:25
0
Python Programming - 21.Loops in Python

Python Programming - 21.Loops in Python

Tutsoftechno
11:25
0
Python Programming - 20.If-else statement

Python Programming - 20.If-else statement

Tutsoftechno
11:24
0
Python Programming -19.Return values

Python Programming -19.Return values

Tutsoftechno
11:20
0
Python Programming - 17.Default arguments

Python Programming - 17.Default arguments

Tutsoftechno
11:20
0
Python Programming - 18.Infinite arguments

Python Programming - 18.Infinite arguments

Tutsoftechno
11:19
0
Python Programming - 16.Implementing arguments into a function

Python Programming - 16.Implementing arguments into a function

Tutsoftechno
11:17
0
Python Programming - 15.What is a function?

Python Programming - 15.What is a function?

Tutsoftechno
11:17
0
Python Programming - 14.Built-in Python functions

Python Programming - 14.Built-in Python functions

Tutsoftechno
11:15
0
Python Programming - 13.What is a variable?

Python Programming - 13.What is a variable?

Tutsoftechno
11:15
0
Python Programming - 12.Dictionaries

Python Programming - 12.Dictionaries

Tutsoftechno
11:15
0
Python Programming -  11.What are lists in Python?

Python Programming - 11.What are lists in Python?

Tutsoftechno
11:14
0
Python Programming - 10.Boolean Operators

Python Programming - 10.Boolean Operators

Tutsoftechno
11:13
0
Python Programming - 9.String manipulation

Python Programming - 9.String manipulation

Tutsoftechno
11:13
0
Python Programming - 8.What is a string?

Python Programming - 8.What is a string?

Tutsoftechno
11:12
0
Python Programming - 7.What is a number?

Python Programming - 7.What is a number?

Tutsoftechno
11:10
0
Python Programming - 6.How to share your code with us and get help with errors

Python Programming - 6.How to share your code with us and get help with errors

Tutsoftechno
11:10
0
Python Programming - 5.Setting up our integrated development environment (IDE)

Python Programming - 5.Setting up our integrated development environment (IDE)

Tutsoftechno
11:09
0
Python Programming - 4. Creating and running our first Python script

Python Programming - 4. Creating and running our first Python script

Tutsoftechno
11:09
0
Python Programming - 3. Interpreted vs. compiled

Python Programming - 3. Interpreted vs. compiled

Tutsoftechno
11:07
0
Python Programming - 2. Installation

Python Programming - 2. Installation

Tutsoftechno
11:07
0
Python Programming - 1. What is Python?

Python Programming - 1. What is Python?

Tutsoftechno
11:06
Please Watch this video!
0
Cracking WebSites Login Password (Authorizations)

Cracking WebSites Login Password (Authorizations)

Tutsoftechno
11:04
Salam! Everyone, today we will take a look at How Crackers able to crack the auth System of Websites. Maybe you don't notice i...
0
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)
  • Home
  • Hacking Tutorial

Followers

Popular posts

  • How to protect from ransomware CryptoLocker (Wanna Cry) - Part 2
    Hi guys here is part 2 of How to protect from ransomware CryptoLocker so here is list which was remaining: 6.Disconnect your computer: ...
  • Unblock websites without any proxy
    Hello everyone today we will learn  unblock websites  without any vpn or proxy. it's so simple method to unblock website. so how ...
  • How to Download and install Cobaltstrike full cracked in Kali linux
    Hey guys today i'm going to show you how to download and install Cobaltstrike full cracked version in kali linux. i'm running kali ...
  • Google Dork (SQLI) To Find Vulnerable Websites For Hacking
    Google Dork (SQLI) To Find Vulnerable Websites for Hacking Hello guys today i will show you how we can get websites for hacking :) Simp...
  • Broken Authentication and Session Management (Most Common Vulnerabilities to Hack Websites)
    Today i will told you about one of the most common Vulnerability to Hack websites .But first let me told you THIS IS JUST FOR EDUCATION ...
  • How to card Nike store - Latest carding method
    Today let me show how to card Nike Store What You Need: - RDP (if you can't buy RDP, it's works with PREMIUM Socks5 - Tested and ...
  • How to Install PhantomJS in Windows 10 | Tutsoftechno
  • How To Unblock Any Site Without Using VPN Or Proxy! - Easy Life With Easy Ways
    Salam Everyone Today i'm gonna show you how to unblock any website without using any vpn or proxy! First we have to select best ...
  • Hackers Type: White Hat (Ethical Hackers)
    White Hat hackers are also known as Ethical Hackers. White Hat hackers are the good guys of the hacker world. They’ll help you remove a vi...
  • How to style out put using python string format
    Hello everyone, In this tutorial I will show you how we can style our output using string format in Python . Some of you guys should ...

Blog Archive

  • ►  2020 (3)
    • ►  July (3)
  • ►  2019 (1)
    • ►  April (1)
  • ►  2018 (4)
    • ►  November (1)
    • ►  April (1)
    • ►  January (2)
  • ▼  2017 (50)
    • ►  December (1)
    • ►  August (1)
    • ►  July (1)
    • ▼  May (46)
      • How to Install PhantomJS in Windows 10 | Tutsoftechno
      • SEO (Search Engine Optimization) and it's types
      • How to protect from ransomware CryptoLocker (Wanna...
      • How to card Nike store - Latest carding method
      • How to get WIFI passwords of your city using mobile
      • How to protect from ransomware CryptoLocker - Part 1
      • How to get WIFI passwords of your city using mobile
      • Check It out My Website i've coded
      • Insecure Direct Object References
      • Google Dork (SQLI) To Find Vulnerable Websites For...
      • Google Dorks (Google Database Hacking)
      • RCE (Remote Code Execution)
      • Facebook Phishing Page (Method to hack Facebook ac...
      • Cross-Site Request Forgery (CSRF)
      • Broken Authentication and Session Management (Most...
      • What is XSS (Website vulnerability)
      • What is SQL INJECTION (Website vulnerability)
      • How did Websites get hacked?
      • Hackers Type: Gray Hat Hackers (Both White and Bla...
      • Hackers Type: Black Hat (Crackers)
      • Hackers Type: White Hat (Ethical Hackers)
      • Python Programming - 23.Project #1 - Building a ca...
      • Python Programming - 22.Importing modules into a P...
      • Python Programming - 21.Loops in Python
      • Python Programming - 20.If-else statement
      • Python Programming -19.Return values
      • Python Programming - 17.Default arguments
      • Python Programming - 18.Infinite arguments
      • Python Programming - 16.Implementing arguments int...
      • Python Programming - 15.What is a function?
      • Python Programming - 14.Built-in Python functions
      • Python Programming - 13.What is a variable?
      • Python Programming - 12.Dictionaries
      • Python Programming - 11.What are lists in Python?
      • Python Programming - 10.Boolean Operators
      • Python Programming - 9.String manipulation
      • Python Programming - 8.What is a string?
      • Python Programming - 7.What is a number?
      • Python Programming - 6.How to share your code with...
      • Python Programming - 5.Setting up our integrated d...
      • Python Programming - 4. Creating and running our f...
      • Python Programming - 3. Interpreted vs. compiled
      • Python Programming - 2. Installation
      • Python Programming - 1. What is Python?
      • Cracking WebSites Login Password (Authorizations)
      • How To Unblock Any Site Without Using VPN Or Proxy...
    • ►  January (1)
  • ►  2016 (17)
    • ►  December (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (3)
    • ►  April (6)

Label

  • AdSense
  • bitcoins
  • btc
  • cryptocurrency
  • free tools
  • Google
  • hacking tutorial
  • JQUERY
  • JS
  • linux tools
  • PHP
  • Programming
  • python programming
  • tooling
  • tools
  • Tut
  • Tutorial
  • tutsoftechno
  • Unblock websites
Powered by Blogger.
Copyright © 2016 Technologier Tutorials | Programming & Hacking stuff - Powered by Blogger
Created by Dunia Blanter