5 SHOCKING Android apps! November 2018 (hindi)

5 amazing Android apps for November 2018
best android apps
awesome apps
Unique android apps

Download links:

My Toons
https://shrinkearn.com/MyToons

https://shrinkearn.com/mytoons

Fluid NG
https://shrinkearn.com/FluidNG

Shapical X
https://shrinkearn.com/ShapicalX

Find it
https://shrinkearn.com/FindIt

NavBar animations
https://shrinkearn.com/Navbar

Instagram
https://www.instagram.com/_deb830

https://twitter.com/830_deb

#androidapps #apps #android
_________________

Song: Elektronomia – Vitality [NCS Release]
Music provided by NoCopyrightSounds.
Video Link: https://youtu.be/IS9azbb9hSA
Download Link: http://ncs.io/Vitality

NEW TECHNOLOGIES THAT WILL BLOW YOUR MIND

BRAIN TIME ► https://goo.gl/tTWgH2

1. Apis Cor
https://youtu.be/ViqzfPW6TFo
https://youtu.be/Uix1a9fHQdY
https://www.youtube.com/channel/UCtjcSOYk2QXngTzbB5P1p8A

2. Helicopter Tree Trimming
https://youtu.be/5t06LbvE3CI
https://www.youtube.com/channel/UC8qodRyXsUA8UD0LD0AvwQg
https://youtu.be/Mfz1YrpMbBg
https://www.youtube.com/channel/UCZHq67fBaEjJZpmBOaVY3FQ
https://youtu.be/Pla06PO6Odk
https://www.youtube.com/channel/UCIEdklvorUOOA0m4WIrR-cg

3. Amazon Prime Air
https://youtu.be/Le46ERPMlWU
https://www.youtube.com/channel/UCCR19glb_uf1gAV5dtkfv5A
https://youtu.be/vNySOrI2Ny8
https://www.youtube.com/channel/UCkLXELm63_pH7L-r-548kig

4. Tesla
https://youtu.be/8_lfxPI5ObM
https://youtu.be/TEReFPI4jSc
https://www.youtube.com/channel/UCftwRNsjfRo08xYE31tkiyw
https://youtu.be/-kY6rCAuLpQ
https://www.youtube.com/channel/UCIALMKvObZNtJ6AmdCLP7Lg
https://youtu.be/jWreyC2l-dw
https://www.youtube.com/channel/UC5WjFrtBdufl6CZojX3D8dQ
https://youtu.be/dP0vIH8r-tE
https://www.youtube.com/channel/UC9vPzqzYmMfdQ0hTb5CTZtQ

5. Waymo
https://youtu.be/aaOB-ErYq6Y
https://youtu.be/B8R148hFxPw
https://www.youtube.com/channel/UCh5Yo6HN5b2Hco70HosIzZA

6. KUKA Robotics
https://youtu.be/tIIJME8-au8
https://youtu.be/lv6op2HHIuM
https://www.youtube.com/channel/UC6HrPPoLdjNynZCvUrJbmBw
https://youtu.be/bAdqazixuRY
https://www.youtube.com/channel/UCPhq7iR65k0gWcraXgLiY1A

7. i-LIMB Pulse
https://youtu.be/wO49c6mi9OU
https://www.youtube.com/channel/UCL8Nxsa1LB9DrMTHtt3IKiw
https://youtu.be/4K-5BryxQaU
https://youtu.be/vJ3QWZozeHA
https://www.youtube.com/channel/UCkk4MuqkbU9OY2DW0bsENrg

8. Danyang–Kunshan Grand Bridge
https://youtu.be/qnXC53uCYeI
https://www.youtube.com/channel/UCUJjKIuXAAgsYooIoraAUvA
https://youtu.be/Or1kuQu8sq0
https://www.youtube.com/channel/UCmBZ5MERE05rZxBpn3aIwkg

Channel: TechZone
Published: 2018-06-12 13:03:20
Duration: 10M18S
Views: 3532078
Likes: 12333
Favorites: 0

12 Dangerous Android Apps You Need to Delete Immediately

Pay attention to the list of the most suspicious apps you may come across in Google Play. Delete them from your phone immediately to protect your personal data and extend the life of your phone.
Their creators promise the apps will optimize your device, extend the life of your battery and protect your phone from viruses. Some of them are even supposed to be lie detectors and defragmentation devices. In fact, all they give you is ads, and what they do is get access to your data and kill your battery. Considering the huge number of apps created every single day, not even Google can keep track and check the safety of all the new programs. So the security of your device mostly depends on you!

Music: Master of the Feast – Kevin MacLeod http://incompetech.com/music/royalty-free/index.html?isrc=USUAN1400019
Creative Commons Attribution (https://creativecommons.org/licenses/by/4.0/).
Source: http://incompetech.com/music/royalty-free/index.html?isrc=USUAN1400019.
Artist: http://incompetech.com/

TIMESTAMPS
Weather apps 0:43
Social media apps 1:31
Optimizers 2:02
Built-in browsers 2:32
Antivirus programs from unknown developers 3:01
Browsers with additional features 4:26
Apps for increasing your phone’s memory 5:43
Lie detectors 6:14
Defragmentation apps 7:00
Music Player 7:28
Battery Savers and Fast Charge apps 7:51
Wi-Fi apps 8:23

SUMMARY
-There was a weather app that allowed the bad guys to avoid two-step authentication and easily get access to banking information of those who installed it.
-Social media apps suck up so much of your device’s energy and kill the battery too.
-Optimizers don’t make your phone’s system faster, they just slow it down and bring you ads as an added bonus.
-Built-in browsers are mostly slow-working and don’t have any protection from data interception.
-Hackers create their own antivirus apps, which can steal users’ personal data and even completely block the phone.
-You have at least two reasons two delete browsers from your phone: they slow it down, and require access to most aspects of the system, so they can even manage your calls.
-You won’t get more memory than your phone had initially, but will provide memory apps with access to your data.
-Lie detector apps are about as useful as crystal balls, but they kill your battery and get access to your contacts and personal data.
-Defragmentation apps don’t work like promised. They can only analyze how much space certain programs take up, use your phone’s resources and collect your personal data.
-You will want to delete this app because it consumes tons of data since it’s full of ads and causes a massive drain of your battery.
-Battery savers and fast chargers can’t really change the speed of your gadget charging, but can give you endless apps even on lock screen.
-If you don’t want these apps to get access to all your data, avoid them at all costs.

Subscribe to Bright Side : https://goo.gl/rQTJZz

—————————————————————————————-
Our Social Media:

Facebook: https://www.facebook.com/brightside/
Instagram: https://www.instagram.com/brightgram/

5-Minute Crafts Youtube: https://www.goo.gl/8JVmuC

—————————————————————————————-
For more videos and articles visit:
http://www.brightside.me/

Channel: BRIGHT SIDE
Published: 2018-03-26 14:20:52
Duration: 9M37S
Views: 6259614
Likes: 65461
Favorites: 0

How to Make Wind Turbine Generator – Clean Energy

How to make Wind Turbine
Music By NCS:
Track: Lost Sky – Dreams [NCS Release]
Music provided by NoCopyrightSounds.
Watch: https://youtu.be/SHFTHDncw0g
Free Download / Stream: http://ncs.io/DreamsYO

Track: Jim Yosef & Alex Skrindo – Ruby [NCS Release]
Music provided by NoCopyrightSounds.
Watch: https://youtu.be/Np-Y8ClGgRk
Free Download / Stream: http://ncs.io/RubyYO

+ Thank for watching!
+ Please subcribe to view the latest videos.
+ Good luck!!!!

Channel: NDA Hack
Published: 2018-08-17 01:31:46
Duration: 6M46S
Views: 594317
Likes: 5888
Favorites: 0

Ancient Inventions | प्राचीन टेक्नोलॉजी जिसे साइंटिस्ट नहीं समझ पा रहे है

Ancient Inventions | प्राचीन टेक्नोलॉजी जिसे साइंटिस्ट नहीं समझ पा रहे है

10 Ancient Inventions that Science Can not Explain
——————————————————————————————————–

https://www.facebook.com/top10informationssss/
——————————————————————————————————-
+ Greek Fire
he Greek fire used by the Byzantine Empire in the 7th century is one of the biggest secrets in science.

+ Damascus Steel
Sword was constructed with Damascus steel. The strength, flexibility and wave-like patterns made them completely unique. It is a fact that they could cut a silk veil in the air, and they could slice a rock without damaging the blade’s sharpness.

+ The Voynich Manuscript
Wilfrid Voynich, a Lithuanian antiquarian of Polish origin got a manuscript by an anonymous author. The content of this manuscript is still unknown. botany, biology, and astrology.

+ The Antikythera Mechanism
It is is actually a 2000 years old analog computer. The Antikythera mechanism was recovered from the bottom of the sea in 1901, near Antikythera island, Greece.

+ Zhang Hang Seismograph
Zhang-Hang, a Chinese scientist, and an astronomer from the East Han Dynasty presented this seismoscope in the year 132AD. It is a copper vessel with dragon heads aiming at the cardinal points.

+ Ulfberht Sword
Many tombs from the Viking age have been discovered all over the north of Europe. Archaeologists have found inside the tombs a total of 171 Ulfberht swords. These swords were made with techniques that were very advanced for that age. They got their name from the inscription +ULFBERHT+ on their blades.

+ The Iron Pillar of Delhi
This iron pillar, weighing six tonnes and 7.21 meters high, which has not rusted during more than 1600 years, it is still an engineering mystery, located in Delhi, India.

+ The Phaistos Disc
Luigi Pernier, an Italian archaeologist, discovered the Phaistos disc on the Greek island of Crete in 1908. This disc, also known as the Rosetta stone of the Minoan civilization, and made from baked clay.

+ Roman Dodecahedron
One of those mysteries is the Roman dodecahedron. It dates back to 200 years AD. It is a hollow object with 12 sides, made-up of brass or stone.

+ Giant Stone Spheres
More than 500 pre-Columbian stone spheres were discovered in the Sierpe district, in the south of Costa Rica in 1939. The size of the stones ranges from 30 to 257, and they weigh between two kilos and 16 tonnes.
——————————————————————————————————–
FOLLOW TOP 10 INFORMATION-TTI

Facebook Page:- MESSEGE ME https://www.facebook.com/top10informationssss/?fref=ts
Google Plus:-https://plus.google.com/+TOP10INFORMATION10
Twitter:-https://twitter.com/TopTenInfor
SUBSCRIBE:-https://goo.gl/F6pHMw
INSTAGRAM https://www.instagram.com/top_10_information/

———————————————————————————————————-
Music thousand words from Lemmino
Subscribe Our Friend’s channel

More of LEMMiNO:
http://www.youtube.com/LEMMiNOMusic
http://www.soundcloud.com/LEMMiNO
http://www.youtube.com/Top10Memes
● Facebook: http://lemmino.net/facebook
● Twitter: http://lemmino.net/twitter
● Google+: http://lemmino.net/gplust
● DeviantART: http://lemmino.net/deviantart
● Soundcloud: http://lemmino.net/soundcloud
● Bandcamp: http://lemmino.net/bandcamp
● iTunes: http://lemmino.net/itunes
● Spotify: http://lemmino.net/spotify

SUBSCRIBE TO MY FRIENDS CHANNEL

Technical Guruji
Mahatmaji Technical
Technical Sagar
Sharmaji Technical
Technical Sunil
Technical boss
Technical Dost
BB Ki Vines
ashish chanchlani vines
CarryMinati
Asif Bantaye
TECHZ
Geekyranjit
Gadgets To Use
Techno Ruhez
IGyaan
C4ETech

MY CHANNEL HAVE THESE TOPICS VIDEO gadgets cool gadgets new gadgets tech gadgets latest gadgets
cool new gadgets gadgets for men new tech gadgets electronic gadgets
gadget shop best gadgets cool tech gadgets cool gadgets to buy high tech gadgets
best smartphone gadgets, smartphone gadgets on amazon, top smartphone products on amazon, TTI HINDI, top 5,top 10,

Channel: TTI HINDI
Published: 2018-06-17 16:10:38
Duration: 12M20S
Views: 1979152
Likes: 10940
Favorites: 0

This is How Hackers Crack Passwords!

In this video, we’ll see how hackers really crack passwords.

This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5

DISCLAIMER : This video is intended only to educate people about how hackers crack passwords, and how important the strength of the password is, when coming to security.

If you are using a common password like test123456 which I used in the video, then the hacker will easily be able to know the plain text form of your password from the hash string. There is something known as Rainbow tables. These rainbow tables contain the password hashes of numerous commonly used passwords.

So the hacker will be to do a simple search with the password hash that he has, and if the password hash exists in the rainbow table, then that means the password is successfully cracked, and we have the password in a plain text. Remember that rainbow tables contain the password hashes of only the passwords which are commonly used.
As a reference, you can go to https://crackstation.net/

If the password is not a commonly used password, then there comes dictionary attack and brute force attack.

In dictionary attack, you have a wordlist. A wordlist is nothing but a huge text file with loads of passwords. In this attack, the hacker writes a code which compares the password hash to be cracked, with the password hash of each and every password that exists in the wordlist. Now, this attack can be target-specific as well. which means we can build a wordlist targeting an individual provided that we know some basic details about him/her.

In a brute force attack, each and every combination of letters ,symbols and numbers are converted into their hash forms, and are then compared with the hash to be cracked. This is a more expensive.

A new technique called salting is introduced by security analysts to give hackers a hard time in cracking passwords.

In this technique, a specific combination of characters are inserted at specific positions of the plain text password before hashing.
Every company has its own salting algorithm, and they don’t make their salting algorithm public

For example, kets say Facebook salting algorithm inserts the string f&2p at the beginning, after the third character, and at the end of the plain text password.
After salting the password, the salted password is then hashed by a hashing algorithm.

So when salting is used, rainbow tables are of no use even if the password to be cracked is a weak commonly used password. Because the hashe of the password without salting do not match the hash of the password which is salted

Also, brute force and dictionary attack are not effective to crack salted passwords unless the hacker already knows the salting algorithm employed by a company.

Visit my website : https://techraj156.com
Like my Facebook Page : https://fb.com/techraj156
Follow me on Instagram : https://instagram.com/teja.techraj
Follow on Twitter : https://twitter.com/techraj156
For written tutorials, visit my blog : http://blog.techraj156.com

SUBSCRIBE for more videos!
Thanks for watching!
Cheers!

Channel: Tech Raj
Published: 2018-05-09 05:50:38
Duration: 5M44S
Views: 3300731
Likes: 73985
Favorites: 0

Leave a Reply

Your email address will not be published. Required fields are marked *