HELLO!! Guys Wel come to techblog here you can learn tech and get tech updates and many more. And you can ask questions about tech in comment section so guys do visit and keep supporting.and share this page to your frnds .and thank you for visiting.
Subscribe to this blog
ads
ads
honor magic 2
Get link
Facebook
X
Pinterest
Email
Other Apps
-
HONOR
the honor launched its new device which is Honor magic 2 which device is launched.
INTERNET the internet is the place where we get any information needed to us. types of internet: surface web deep web dark web SURFACE WEB: the surface web is which is accessed by anyone on google and all the entertiment sites and torrents are come under the surface web as also this page also comes under surface web the web where anyone who can access the site is known as surface web. and only 5% of people access the surface web and 95% on another web DEEP WEB: the deep web is the place like google drive and dropbox where no one can access the files without the permission of the admin. this web is used in many compaines to store their data and get the data to worker. to access this type of site we need particular site and premission of admin in the form of login or any another authorization. DARK WEB: the DARK web is a place where the illegal dealing are done is known as darkweb we cant access this type of websites directly we need a seperat...
Decompiling Android Apk To decompile android apk we need some tools they are linked below Apk Tool: clickhere And for video tutorial clickhere and for app development goto instagram at @earninng_____hub Paid serveces available at::
Microsoft Corp. said the suspected Russian hackers behind the stunning breach of numerous U.S. government agencies also accessed the company’s internal source code, although no customer data or services were compromised. “We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories," Microsoft said Thursday in a blog post that updated its continuing investigation of the attack. “The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made."
Comments
Post a Comment