Skip to main content

Posts

Why Windows failed to display Microsoft and Xbox sign-in dialogs

For about a year, I couldn’t use any Windows 10 apps or Xbox games that required me to sign in with a Microsoft Account. I also couldn’t add any email or other online accounts to my Windows account. For whatever reason, all the Microsoft Accounts Control and Windows Web Account Provider dialog windows refused to open. Whenever I clicked a button that was supposed to open these dialogs, I might see a brief white flash that hinted at the brief appearance of a dialog window. Most of the time, absolutely nothing happened. Deep-rooted problems with Windows are incredibly difficult to troubleshoot. When developing its software, Microsoft always assumes everything will work flawlessly all the time. Apps and system services rarely generate log files, report errors to the Events system, or even record diagnostics data about the problem. The Diagnostics Viewer reported to Microsoft that I’d opened the desired dialog for less than a millisecond

The HTML video element needs to go back on the drawing board

We’ve had the HTML <video> element for over a decade. Yet, everyone still defaults to embedding YouTube frames instead of hosting their own videos. The underlying problem is that the <video> element isn’t suitable for embedding short video files on webpages. Sure, the <video> element works great for large streaming platforms and tube sites. However, video is nowhere near as simple to use as other adaptive embedded media, such as responsive images. You need half an hour of learning to get started with responsive images. All you need for responsive images is to include a specially formatted list of an image in different sizes and file formats in your HTML document. The web browser uses the list to pick a format it supports at the right dimensions for the visitor’s device. Here’s a slightly simplified example: < picture > < source type = "image/avif"

How to enable file versioning on Windows

Windows comes with many great built-in tools that, unfortunately, are hard to discover and even harder to use. One of these is its built-in file versioning tool called File History. Once set up, it can keep copies of old versions of all your files and documents. It can be incredibly useful to restore a previous version of a file or a folder after you’ve made an accidental change or deletion. “But I don’t use any files and folders on my PC!” Everything on your PC is stored in files in folders. You might not work with documents and spreadsheets, but file versioning is just as useful for your game-save files, source code, and photos. It can also be used with your application data to, for example, restore a deleted browser bookmark or email message. File History is also the closest Windows comes to protecting your files against data degradation (also known as “bit rot”). It’s satisfying to restore an earlier version of a file after it’s u

How to auto-lock your computer on a schedule (e.g. at bedtime)

I'm terrible at maintaining a consistent bedtime and often stay up on the computer late into the night. Admittedly, this is usually the time when I’m the most productive. I get so into things that I lose track of time. However, this bad habit makes it hard to get enough hours of sleep; something that’s not too good for the human body. Here's how to get your computer to lock the screen at bedtime and help any of you developer-types maintain a more consistent bedtime. iOS and Android have had some sort of “digital well-being” and time-management for about two years. These features are — among other things — designed to help you wind down at night and help you manage time and get enough sleep. It’s not a magic solution but its something that can be helpful. However, computers are lagging behind the trend and don’t offer the right tools. I wanted my computer to kick me out of my

Ahmia Search Tor Hidden Services : Afmia fi Tor search engine

            Ahmia's mission is to create the premier search engine for services residing on the Tor anonymity network. In doing so, we hope to share meaningful statistics, insights, and news about the Tor network and the Tor project. Contributors to Ahmia believe that the Tor network is an important and resilient distributed platform for anonymity and privacy worldwide. By providing a search engine for what many call the "deep web" or "dark net", Ahmia makes onion services accessible to a wide range of people, not just Tor network early adopters. Juha Nurmi, Ahmia Project Leader juha.nurmi@ahmia.fi ) is the founder and project leader of the Ahmia search engine project. He is a security researcher, and has been involved in numerou

Best Phishing Tool Links

Modern phishing tool hidden eye  🔗 Link : https://github.com/DarkSecDevelopers/HiddenEye Complete phishing tool 32 templates + 1 customizable  🔗 Link : https://github.com/thelinuxchoice/blackeye Social media phishing with shellphish 🔗 Link : https://github.com/thelinuxchoice/shellphish Advance Phishing OTP Bypass 🔗 Link : https://github.com/Ignitetch/AdvPhishing Paytm Phishing OTP Bypass 🔗 Link : https://github.com/Ignitetch/Paytm-Phishing UberEats Phishing OTP Bypass 🔗 Link : https://github.com/Ignitetch/UberEats-Phishing Whats App Phishing  🔗 Link : https://github.com/Ignitetch/whatsapp-phishing share and support us

WORLD DANGEROUS HACKERS TOOLS EXPOSE

  Dear readers, This Blog DOES NOT Promote or encourage Any illegal activities, all contents provided by This Blog is meant for EDUCATIONAL PURPOSE only. ❇️ Pish web tool  🔗 Link : https://github.com/Cabdulahi/pish ❇️ MITM attack tool  🔗 Link : https://github.com/websploit/websploit ❇️ kill shot pentesting framework 🔗 Link :https://github.com/bahaabdelwahed/killshot ❗ Facebook Tool Links ❗ ❇️ Facebook information gathering 🔗 Link : git clone https://github.com/CiKu370/OSIF.git ❇️ Facebook Toolkit + bots, dump private data  🔗 Link : https://github.com/warifp/FacebookToolkit ❇️ Facebook cracking tool Fcrack.py  🔗 Link : https://github.com/INDOnimous/FB-Crack- ❇️ Facebook and yahoo account cloner  🔗 Link : https://gitlab.com/W1nz0N/fyc.git ❇️ Facebook report tool 🔗 Link : git clone https://github.com/IlayTamvan/Report ❇️ Facebook BruteFoRce Tool 🔗 Link : https://github.com/IAmBlackHacker/Facebook-BruteForce ⭕️ Facebook hacking ASU 🔗 Link : git clone https://github

​​HOW TO UNLOCK LOCK PATTERN USING COMMAND PROMPT

Step 1⃣ Connect your android phone to you computer. Step 2⃣ Open Commande prompt administrator. Step 3⃣ Now in command prompt window type following code carefully adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db update system set value=0 where name=’lockpatternautolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit Step 4⃣ Now you will see some screen and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine. Step 5⃣ If you face any problem repeat same steps but instead of the above code tru using adb shell rm/data/system/gesture . key and the press enter and now reboot your device to see if it works.

Shell vs Environment vs Persistent Variables

Variables   One of the first things that we need to cover is how to deal with variables. They were briefly talked about in the other chapters, but they will be cover in slightly more depth here. The variable functionality provides a way for the script to get input, store data temporarily, and display output to the user or sending data to a calling script. There are two categories that variables can be divided into:   Environment Variables: are maintained by the system, they are inherited by the current and any child shells or processes that are spawned.   Shell Variables: are contained exclusively within the shell in which they were set or defined. They are mostly used to keep track of temporal data, like the current working directory in a session.   Shell Variables   There are generally two types of shell variables. Those that are maintained by the system, and the others that are user defined for scripts or passing information into other commands, scripts or programs. As s

Setting up your virtual lab | Virtual box and OS Installing

One of the best ways to learn and test is to do so in a virtual environment. The overall benefits to this is low cost, reduced hardware requirements, and rapid recovery should we render one of our test machines into a nonresponsive state. A virtual lab can be created on just about anything, but personally I would recommend at least the following: Intel i5 (better or equivalent), minimum of 8 GB of ram (The higher the better), and a minimum drive size of 80 GB or larger (again the larger the better).   There are a number of applications that can be used for virtualization such a VMWare, VirtualBox, and Xen. For the purpose of this book we will be looking at setting up VirtualBox. VirtualBox is a free program from Oracle. It's capable of running on Windows, Linux, Macintosh, and Solaris. Virtualbox is easy to use and updated often. The first thing that we will need to do is download the VirtualBox client onto the machine that we want to turn into our virtual machine. http