Uncategorized

Samsung Galaxy A51 5G Right Around The Corner, Gets Wi-Fi Certification

Samsung Galaxy A51 5G right around the corner, gets Wi-Fi certification
The imminent arrival of the Galaxy A51 5G was confirmed by its appearace across certification boards and now the Wi-Fi Alliance joins the growing list. The Galaxy A51 5G will support Wi-Fi 802.11 b/g/n/ac standards on both the 2.4GHz and 5GHz frequencies. Expectations are the new phone will keep the same dimensions as the regular Galaxy A51 – as well as the L-shaped camera setup, the punch hole design and the 6.5\” Super AMOLED screen.
Uncategorized

HOW TO ACCESS DEEP WEB – WHAT YOU NEED TO KNOW (2020)

 HOW TO ACCESS DEEP WEB – WHAT YOU NEED TO KNOW (2020) 
intro:
How to access the deep web?, (Warning: the content of this publication is purely informative, you are solely responsible for what you do with that information).
 This means that in a conventional way it is not possible to access these services which opens up a whole market of possibilities for illegal operations and any type of task that requires certain anonymity.
 
It is not as tough as you think. But, you can’t just access the deep/dark web like a normal web using a normal browser despite your need to use an anonymity software like Tor, which only accesses .Onion Links. Using Tor Browser, you can browse the deep web anonymously. But, that doesn’t enough, you need an extra protection to secure your identity on the invisible web. Because it contains dangerous links which may breach the security.
What can you find in the deep web? 
In addition you can find almost anything, an example of this are the online markets such as Silk Road; Where everything has a price, you can buy weapons, drugs, human organs and even hire a murderer.
In fact many people do not want to associate with a certain service, product or content; You can access the deep web to publish it. This is also the place where a lot of information originates; Only last year, private photos of users of the Snapchat app were leaked.
Step to access the deep web:
To access the deep web, you need to have a Tor browser on your system.
First, Download Tor.
After downloading the Tor bundle, you need to install them on your system.
Click to open the downloaded file to start the installation process.
Follow the installation guidance to complete the process.
Once you have installed Tor, open it.
Now, you can access the deep web using Tor browser.
This isn’t enough, your privacy is not completely secured. To double your security, you must have an advanced VPN service on the system that you access the deep/dark web.
 
Protective measures to enter the deep web:
Even though the deep web is a haven for hackers and other people of dubious reputation, it is necessary that you keep the protection measures to prevent the theft of your private information. These are some that you must follow.Activate your firewall.
That your operating system is updated as well as your antivirus.
Don’t trust anyone out there in the deep web.Disable your webcam to avoid being spied on.Never download anything even though it may seem harmless.Disable JavaScript and Cookies in your Tor browser.
If possible, use a VPN (Virtual Private Server) to protect your information.
It is possible to track your IP address if you try to access the Deep/Dark web sites without using our recommended VPN. Don’t land in trouble by using a free VPN too.
Before accessing the deep web we recommend using a VPN:
To protect yourself from tracking your IP address, I recommend you to run a Powerful VPN on your system before you access the deep web. If you access the site without any premium VPN, then you may land in trouble. Some may track your IP address location from which you access and catch you for accessing illegal content on the web against the Law. By using Tor + VPN, you can protect your identity and communication from state and private surveillance like whistleblowers and journalists.
Uncategorized

How To Become A Hacker ☠️

How To Become A Hacker??
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on.
Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. here is the list of most important steps necessary to become a hacker, have a deeper look
Steps:
Learn UNIX/LINUX
NUNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker. .
Code in C language
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.
Code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
Learn Networking Concepts
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system. Understanding what LAN, WAN, VPN, Firewall is also important. You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
Learn Cryptography
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.
Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.
Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.
Write Vulnerability (Loop hole program)
Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.
Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.
Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
Uncategorized

Weekly Poll: The Nokia 8.3 5G Mark\’s Many Firsts For HMD, But is The Price Too Ambitious?

Weekly poll: the Nokia 8.3 5G marks many firsts for HMD, but is the price too ambitious?
HMD decided there\’s no time to wait for the new Bond film and revealed its first ever 5G phone – the Nokia 8.3 5G. This one also has one of the largest screens of any Nokia, plus it\’s the first Nokia with a 64MP camera. While Nokia phones may no longer have exclusivity on ZEISS, the only other option is the pricey Sony Xperia 1 II that isn\’t even out yet. The Nokia 8.3 isn\’t out either, the expected release is in Q2 when the phone will start at €600 for the 6/64GB model.
Uncategorized

Nubia Red Magic 5G Review

nubia Red Magic 5G review
✨Score:- 4.0
Body: 168.6 x 78 x 9.8mm, 218g; curved Gorilla Glass front, glass back, metal frame.
Screen: 6.65\” AMOLED, 144Hz refresh rate, 1080 x 2340px resolution, 19.5:9 aspect ratio, 388ppi, 240Hz touch sensing.
Chipset: Qualcomm Snapdragon 865 (7nm+): Octa-core (1×2.84 GHz Kryo 585 & 3×2.42 GHz Kryo 585 & 4×1.8 GHz Kryo 585); Adreno 650 GPU.
Memory: 8/12/16GB LPDDR5 RAM, 128/256GB built-in UFS 3.0 storage, shared microSD slot.
OS/Software: Android 10, Redmagic UI 3.0.
Rear camera: Primary: 64MP, 1/1.72\” sensor, 0.8µm pixel size, f/1.8 aperture, PDAF; Ultra-wide: 8MP; Macro camera: 2MP.
Front camera: 8MP, f/2.0
Video recording: Rear camera: 8K 4320p@30fps, 4K 2160p@30/60fps, FullHD 1080p@30/60/240/480/960fps, 720p@1920fps.
Battery: 4,500mAh, 55W fast charging support (18W charger in the box outside of China).
Misc: Under-display fingerprint reader; NFC; Stereo loudspeakers; Compatible with nubia gaming accessories and docking station.
Uncategorized

Samsung Galaxy A21s visits Geekbench with an Exynos 850 SoC

Samsung Galaxy A21s visits Geekbench with an Exynos 850 SoC
Last month the Samsung Galaxy A21 passed through Geekbench, revealing key specs in the process. Now, a Samsung device which is likely the Galaxy A21s has been spotted on the benchmark database with a few of its specifications. We don\’t know when Samsung will unveil the Galaxy A21s, but we\’ll likely hear more about it in the coming weeks.
Uncategorized

How To Hack Windows 7 (Become Admin)

How To Hack Windows 7 

(Become Admin) 
This is approved request from our group
Hello! Hackers
In this tutorial I will tell you how to hack windows 7 administrator password.
Specifically, it is used in school, computer labs or other workplaces,
where, administrator is locked with a password, while you can only use standard user or guest.
Start That PC:
#Turn on the UPS and the CPU, tap F8 continuously on the boot screen to get some windows start-up options.
#Choose \”Start windows normally\” option and turn the UPS off immediately.
#Then turn on the PC again, let it load.
#After that you will be prompted with two options in the boot screen (again), select the first option – \”Launch Start-up Repair(recommended)\”
#Let it load and Scan for issues.
#After 5 min, It will ask you to \”restore defaults\”, select \”Cancel\” option.
#Let it continue…
Wait for About 15-20 Minutes:
#After 20 min, an error report screen will pop-up, asking to send information or not.
#Ignore it, click on \”View Problem Details\” arrow, scroll down to the end of the report, then click a link stating X:\\windows\\ something…something (the link starts with an\”X\”)
#Another Window will pop-up, and will look like a notepad (it is a notepad)
#Click File on the Menu-Bar, then select Open, and another window will pop-up (that\’s just too many windows!)
#Navigate to C: drive (or whatever drive on which windows is installed), click Windows, then System32, after that click on the arrow beside the \”File Type\” option and select \”all files\”
#Then search for a file named \”sethc\”(this is the shortcut to stickey keys), rename it to something else (Eg:abc)
#Search for cmd, make its copy and rename the copy as \”sethc\”
The End:
#Close everything, restart the PC, go to the log-in screen, press shift 5 times, until a cmd (command prompt) pops-up.
#Type in \”net user administrator /active:yes\”, and this will activate the default administrator account of the PC.
#Change/delete/manage/reset passwords from there.
Or you can directly change passwords from cmd, type \”net user (admin/any admin account\’s name) and then after a space put an asterix.
Thank you ❤️
 Share and support us❗️
Uncategorized

Realme 6 review

Realme 6 review
Score:- 3.8
Body: 162.1 x 74.8 x 8.9 mm, 191g; Front glass, plastic body, splash-proof
Screen: 6.5\” IPS LCD, FHD+ (1080 x 2400px) resolution, 90Hz refresh rate, 405 ppi
Camera: Primary: 64MP Quad-Bayer, f/1.8 aperture, 0.8µm pixel size, 1/1.72\” sensor size; Ultra-wide: 8MP, f/2.3 aperture, 1.12µm pixel size, 1/4\” sensor size; Macro: 2MP f/2.4, 1.75µm pixel size, 1/5\” sensor size; Depth sensor: 2MP mono camera
Front camera: 16MP f/2.0 aperture
Chipset: Mediatek Helio G90T (12nm): octa-core (2×2.05 GHz Cortex-A76 & 6×2.0 GHz Cortex-A55), Mali-G76 MC4 GPU
Memory: 4GB/64GB, 6GB/128GB, 8GB/128GB, expandable via microSD card
OS: Android 10, Realme UI
Battery: 4,300 mAh, 30W VOOC Flash Charge 4.0
Connectivity: 4G LTE; Dual SIM; Dual-band Wi-Fi, Bluetooth 5.1, GPS, USB Type-C 2.0
Misc: Side-mounted fingerprint reader, 3.5mm audio jack
Uncategorized

What is cryptology?

What is cryptology?
Cryptology combines the techniques of cryptography and cryptanalysis.
Encryption Algorithms:
MD5– this is the acronym for Message-Digest 5. It is used to create 128-bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity. MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.
SHA– this is the acronym for Secure Hash Algorithm. SHA algorithms are used to generate condensed representations of a message (message digest). It has various versions such as;
SHA-0: produces 120-bit hash values. It was withdrawn from use due to significant flaws and replaced by SHA-1.
SHA-1: produces 160-bit hash values. It is similar to earlier versions of MD5. It has cryptographic weakness and is not recommended for use since the year 2010.
SHA-2: it has two hash functions namely SHA-256 and SHA-512. SHA-256 uses 32-bit words while SHA-512 uses 64-bit words.
SHA-3: this algorithm was formally known as Keccak.
RS4– this algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.
BLOWFISH– this algorithm is used to create keyed, symmetrically blocked ciphers. It can be used to encrypt passwords and other data.
Uncategorized

HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS

 HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS 
This is how to crack accounts for people who are literally noobs, meaning that you have no idea what cracking is and how it works. This would\’ve been something I wished I had when I started out cracking.
Basically what cracking is, it\’s taking combolists, and running them through a program to check if that info is valid. You usually want to use proxies so your IP doesn\’t get banned Combolists: It\’s a txt file full of emails and passwords, in the format email:pass Proxies: The \”gateway\” between you and the internet. Basically use this so your IP doesn\’t get banned. Checkers: These are the checkers you use to check the combolist. Steps of cracking: 1. Get a combolist 2. Get a checker for whatever account you want to crack 3. Get proxies 4. Load combolists and proxies into the checker 5. Press start Your checker should now start checking each email from different proxies to see if it\’s a valide combo for that service You use proxies since the company, let\’s say Disney again, will ban your IP for logging in too many times. The proxy makes it so it seems like your logging in from different locations each time. Beware cracking is ILLEGAL. But the risk is very low. Cracking is unethical. Anyway, have fun!
Uncategorized

Upcoming OnePlus Bullets Wireless Z color versions revealed in new images


Upcoming OnePlus Bullets Wireless Z color versions revealed in new images
Yesterday we learned about the arrival of OnePlus\’ Bullets Wireless Z – more affordable version of the current Bullets Wireless 2. The fourth version is Gold – we haven\’t seen the OnePlus 8 Pro in such color yet, but maybe we haven\’t seen all existing versions yet. Otherwise the Bullets Wireless Z look identical to the ongoing Bullets Wireless 2, but they might be bringing changes on the inside.
Uncategorized

Top Android Hacking Applications

Top Android Hacking  Applications
1. SpoofApp:- SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
2. Andosid:- The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.
3. Faceniff:- Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.
4. Nmapper:- (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmapper sends specially crafted packets to the target host and then analyses the responses.
5. Anti-Android Network Toolkit:-zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
6. SSHDroid:- SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
7. WiFi Analyser:- Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
8. Network Discovery:- Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.
9. ConnectBot:- ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
10. dSploit:-Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.
11. Hackode:- The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.
12.**Androrat**:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
13.**APKInspector**:- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
14.**DroidBox**:- DroidBox is developed to offer dynamic analysis of Android applications.
15.**Burp Suite**:- Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
16. Droid Sheep:- DroidSheep can be easily used by anybody who has an Android device and only the provider of the webm service can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the web service.
Uncategorized

Latest update let you unlock your laptop with Mi Band 3 and 4

Latest update let you unlock your laptop with Mi Band 3 and 4
Xiaomi has released new software updates for the Mi Band 3 and Mi Smart Band 4 that now lets you unlock your laptops with the smart bands without having to install a third-party app on your smartphones. Initially this feature is only available for the Indian users and you can only unlock laptops running Windows 10 OS. Mi Smart Band 4 The new updates also improve the step counter to prevent the fitness bands from recording ghost steps. You first need to update the Mi Fit app on your smartphone to install the new firmware on your Mi Band 3 and Mi Smart Band 4.
Uncategorized

The Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking. The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. 
COURSE MATERIAL 
1.PDFS
2. TOOLS
3.LAB MANUALS
Uncategorized

How to use RDP on android phone

How to use RDP on android phone
➖➖➖➖➖➖➖➖➖➖➖
➖➖
Download and install the Microsoft Remote Desktop app.
Open the app and accept the *terms and conditions*.
Tap the *Plus (+)* icon in the top right corner and choose *desktop*.
 Enter the IP address of the Remote Desktop server and then tap the username input and select add a user.
Now enter the username and password and tap save.
 Now tap the PC icon to connect to the RD.
 Tick accept certificate or do not prompt me again on this PC in case you\’re prompted with a certificate window.
   Credits :- stark
Uncategorized

Q4 of 2019 saw HMD turn first profit, but sales are dwindling

Q4 of 2019 saw HMD turn first profit, but sales are dwindling 
HMD turned to a multi-ODM strategy to assemble Nokia phones due to a supply chain disruption in the first half of 2019. Reportedly the first devices to be manufactured by two new ODMs were the Nokia 2.2, 3.2 and 4.2. Using multiple ODMs has allowed HMD to make and sell phones at better margins, meaning that it was able to turn a profit despite moving fewer units.
Uncategorized

Google no longer sells the Pixel 3 or 3 XL

Google no longer sells the Pixel 3 or 3 XL
Google\’s online Store no longer carries the Google Pixel 3 or Pixel 3 XL. A Google spokesperson has confirmed to Android Police that Google has ceased sales of the third-generation Pixel smartphone. The Google Store still sells the Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL. Even if you managed to find the landing page for the Pixel 3, which isn\’t accessible from the Google Store navigator, all storage sizes and carrier configurations are out of stock. In any case, we might recommend you consider the power-efficient and economical Pixel 3a or 3a XL, but perhaps not before its successor is released: the 4a. We\’re expecting to see the launch of the budget-friendly Pixel 4a coming soon.
Uncategorized

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere
Whether you’re typing an email in your browser or writing in a word processor, there are convenient keyboard shortcuts usable in almost every application. You can copy, select, or delete entire words or paragraphs with just a few key presses.
Some applications may not support a few of these shortcuts, but most applications support the majority of them. Many are built into the standard text-editing fields on Windows and other operating systems.
Working With Words
We’re used to the arrow, Backspace, and Delete keys working with a single character at a time. However, we can add the Ctrl key to have them effect entire words or paragraph at the same time.
Ctrl+Left Arrow – Move cursor to beginning of previous word.
Ctrl+Right Arrow – Move cursor to beginning of next word
Ctrl+Backspace – Delete previous word.
Ctrl+Delete – Delete next word.
Ctrl+Up Arrow – Move cursor to beginning of paragraph.
Ctrl+Down Arrow – Move cursor to end of paragraph.
Mac Users: Use the Option key instead of the Ctrl key.
Moving the Cursor
The Ctrl key can also be combined with the Home and End keys.
Home – Move cursor to beginning of current line.
End – Move cursor to end of current line.
Ctrl+Home – Move cursor to top of the text entry field.
Ctrl+End – Move cursor to bottom of the text entry field.
Page Up – Move cursor up a frame.
Page Down – Move cursor down a frame.
Selecting Text
All of the above shortcuts can be combined with the Shift key to select text.
Shift+Left or Right Arrow Keys – Select characters one at a time.
Shift+Up or Down Arrow Keys – Select lines one at a time.
Shift+Ctrl+Left or Right Arrow Keys – Select words – keep pressing the arrow keys to select additional words.
Shift+Ctrl+Up or Down Arrow Keys – Select paragraphs.
Shift+Home – Select the text between the cursor and the beginning of the current line.
Shift+End – Select the text between the cursor and the end of the current line.
Shift+Ctrl+Home – Select the text between the cursor and the beginning of the text entry field.
Shift+Ctrl+End – Select the text between the cursor and the end of the text entry field.
Shift+Page Down – Select a frame of text below the cursor.
Shift+Page Up – Select a frame of text above the cursor.
Ctrl+A – Select all text.
You can use several of these shortcuts to fine-tine your selected text. For example, you could press Shift+End to select the text to the end of the current line, and then press Shift+Down to also select the line below it.

After selecting text, you can start typing immediately to replace the text – you don’t have to press Delete first.

Editing
You can really speed up text-editing by using the Ctrl keyboard shortcuts to copy and paste text.
Ctrl+C, Ctrl+Insert – Copy selected text.
Ctrl+X, Shift+Delete – Cut selected text.
Ctrl+V, Shift+Insert – Paste text at cursor.
Ctrl+Z – Undo.
Ctrl+Y – Redo.
Formatting
Formatting shortcuts only work if the application or website you’re using supports text formatting. If you have text selected, the shortcut will apply the formatting to your selected text. If you don’t have text selected, the shortcut will toggle the associated formatting option.
Ctrl+B – Bold.
Ctrl+I – Italic.
Ctrl+U – Underline.
Functions
These function keys are common to most text-editing applications. If you use them in your web browser, you’ll open your browser’s associated dialogs.
Ctrl+F – Find. This opens the find dialog in most applications to search for text — I’ve even seen it work in some applications that didn’t have a Find option in their menus.
F3 – Find next.
Shift+F3 – Find previous.
Ctrl+O – Open.
Ctrl+S – Save.
Ctrl+N – New document.
Ctrl+P – Print.
These keys work in most applications, but are particularly useful in text editors:
Alt – Activate application’s menu bar. You can use the arrow keys to select a menu option and the Enter key to activate it.
Alt+F – Open File menu.
Alt+E – Open Edit menu.
Alt+V – Open View menu.
Uncategorized

HOW TO MAKE UNLIMITED GMAILS!

 HOW TO MAKE UNLIMITED GMAILS! 
this method is very simple
1. You will need an valid gmail account already for this trick i\’m going to say that my gmail account is this as an example: Chucky7321@gmail.com
2. After you already have a valid gmail account you will need to go to this site: https://generator.email/blog/gmail-generator
3. When you in that site you going to want to put the username of your valid gmail account for example mine will be masonhayes7321 without @gmail.com put that in the generator
(Just put your valid gmail on that site and click generate)
4. the site will generate tons of mails you want to use those gmails for anything you need and you will receive the messages on your valid email
all the messages people send to those generated emails i will receive it on my valid email that it is Chucky7321@gmail.com so copy any of those generated email from the site and you will receive the email message on your valid gmail
Uncategorized

Weekly poll: the Huawei P40 phones are so good, but can you love them with no GMS on board?

Weekly poll: the Huawei P40 phones are so good, but can you love them with no GMS on board?
The company even unveiled its own voice assistant, video chat and Cast protocol, but the question remains – would you buy these phones and leave the Google ecosystem behind? Huawei P40 Huawei P40 Pro Huawei P40 Pro First, let\’s consider why it\’s so tempting to do so. The Huawei P40 Pro brings the brand\’s first high refresh rate display and reworks the complicated hardware above the screen – the IR face scanner, ToF and gesture sensor are still on board, but they now live in a pill-shaped punch hole that\’s way smaller than the Mate 20 Pro notch. The Huawei P40 costs €800, saving you €200 compared to the Pro.