Q&A
{बूझो तो जाने}
Now,
Q1. What is Tor Browser? It is necessory to use VPN with Tor?
(Drop your answer in comment box)
Ans 1. Tor Browser is the most widely used method in the world to access the dark web and protect your personal information. Anonymous communication by specifying Internet traffic through a free world resource overlay network consisting of more than 7,000 relays to hide the user's location and usage from those who perform network monitoring and traffic analysis. Free open source software that enables you. Personal life is very important, very convenient as it is today. Read more.....
Q2. So many project's, command's running on Termux. That mean Termux can compile anything?
Ans 2. Yes or No, There are two reasons why not.
- C/C++ code may be different because compilation is different in termux and linux where unconfigured compilation is done in some way. Also, the compiler itself plays a role here. Most use gcc, but termux clang uses it.
- There may be already compiled code instead of source code and this is useless. As such, your code will only work under special circumstances.
Ans 3. According to Wikipedia, SSH (Secure Shell) is an encryption network protocol for securely operating network services on unsecured networks. Typical applications include remote command line logins, remote command execution, etc, but you can use SSH to secure any network service. Put simply, SSH is a protocol that allows two computers to communicate. SSH is used to log in to a remote machine and run commands, file transfers, etc. ( click )
Q4. What is Seeker?
Ans 4. Seeker is a simple tool written in Python with a built-in PHP server and Ngrok that functions like a simple phishing page that obtains the public IP location, operating system, platform and browser name and version, etc.
*The seeker works on:
- Kali Linux
- Ubuntu
- Arch Linux Distros
- Termux
- Also on many other popular OS
*Features:
- Easy to use
- Can be installed with a few commands
- Get high precision Location
Comments
Post a Comment