Posts

Importing from China & selling online In India – Deal, no deal?

Thanks to the affordability of Chinese products, importing and selling them in India, US and other countries is considered a very profitable business. One can read many success stories of people across the world that make their living by importing from China and selling in their own country. So if you are an Indian Online Seller thinking about importing in bulk from China and selling in India, read below to understand the nitty-gritty. Basic requirements The basic legal requirements for importing goods are: Registered Company Active Bank Account Import-Export Code (IEC) TIN number Additional certificates are required if you are importing certain goods. For example, for product categories that fall under automobile tires, cement, dry cell batteries, electrical household appliances, food products, LED lights & fixtures, medical equipments, steel tubes, wire & cables, and few electronic products, BIS (Bureau of Indian Standard) Product Certificate is mandatory. A...

How to Get Your Mac Ready for Hacking

When it comes to hacking guides, most are written from the perspective of a Linux user. There are a few outliers, but it's mainly Linux, which leads to the idea that Linux is the only OS that's viable for hacking. This couldn't be further from the truth. A properly set up Apple machine can do quite a bit of heavy lifting. In the days before macOS (previously called OS X), hacking on an Apple machine was laughable. Tools were sparse, the hardware was specific to Apple, and developers often didn't bother porting to Mac because of the small market share or the perception that they weren't for serious computing. In those days, Windows and Linux ruled the scene. But things have changed—macOS is a serious contender in the hacking scene, and Macs are now up to a 7.4 and 13% market share worldwide and in the US, respectively. Apple machines run a POSIX compliant UNIX variant, and the hardware is essentially the same as what you would find in a high-end PC. This...

Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS , or W iFi P rotected S etup, known about for over a year by TNS , was finally exploited with proof of concept code. Both TNS , the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use). This exploit defeats WPS via an intelligent brute force attack to the static WPS PIN. By guessing the PIN, the router will actually throw back, whether or not the first four digits (of eight) are correct. Then, the final number is a checking number used to satisfy an algorithm. This can be exploited to brute force the WPS PIN, and allow recovery of the WPA password in an incredibly short amount of time, as opposed to the standard attack on WPA. let's go over...

Hack any windows system using CMD

Image
Everyone wants to be hacker . So here we will start with bits of hacking then bytes and then will continue to learn more as we learn. Welcome to Tektuts, Today I will introduce you with the hacking of windows system from command prompt. Its also usefull to know when you forget your windows system password then how can you reset that. First of all to play with windows user accounts you need to learn the use of command NET which is very useful as you can easily add remove and modify user from command prompt. How to Add new user to add new user to the system open your command prompt and type   net user test /add   this will add new user test to the system. How to elevate privilege to Administrator to elevate privilege type the following net localgroup administrators test /add  this will elevate privilege from local to administrator How to remove user from System type the following to remove user from system   net user test /del This was all i wanted to share ...

Google new OS

Image
Google is working on new operating system named as Fuchsia. Google- "Search for information about (someone or something) on the internet using the search engine Google. Fuchsia is a capability-based, real time operating system(RTOS) currently being developed by Google. 'Pink+Purple==Fuchsia ( a new Operating System) Since Google is working on new Operating System which is act as like Android. And Google are hidden this information with us.They don't want to disclosed it before launch. Google appears to have started work on a completely new operating system, but no one knows quite what it's for. The project's name is Fuchsia, and it currently exists as a growing pile of code on the search giant's code depository and on GitHub too. The fledgling OS has a number of interesting features, but so for google has yet to comment on its intended function. All we really know is that this looks like a fresh start for Google, as the operating system does not use the Lin...

Hacking with CMD | TekTuts

Image

Hacking with CMD | TekTuts

Image