Skip to main content

WHAT IS USB RUBBER DUCKY EXPLAIN


Since 2010 the USB Rubber Ducky has been a favorite amongst hackers, penetration testers and IT professionals. With origins as a humble IT automation proof-of-concept using an embedded dev-board, it has grown into a full fledged commercial Keystroke Injection Attack Platform. The USB Rubber Ducky captured the imagination of hackers with its simple scripting language, formidable hardware, and covert design.

  

Comments

Popular posts from this blog

How to install turbo c on Mac and fix the problems

TO KNOW MORE PLEASE WATCH THE VIDEO Here is the download list:- https://drive.google.com/open?id=1fSJ22sZoB7GF7nIHGJdzgXkdwL6qdsqZ PROCEDURE:- DOWNLOAD THE FILE FROM THE GIVEN LINK. MOVE THE FILE TO THE DESKTOP. UNZIP THE FILE. OPEN THE C.BAT FILE AND CHANGE THE "DEEPAYAN" WITH YOUR USERNAME, AND SAVE THE FILE.  DONT CHANGE ANY FILENAME OR FOLDER NAME.  THANKS, HAPPY CODING.......

How to use a 16x2 lcd display with Arduino

So today I will tell you how to use the 16x2 LCD display on the Arduino projects. If you are doing any kind of projects then you should interact with the user in the simplest process.To add any kind of output device is the key to simplify that project. you may show the options or the compilation details using that.  There various types of displays available in the market but among them the 16x2 LCD display is the famous and cheapest one.As it has a very simple process to implement them in the projects. pinout for the 16x2 LCD display: circuit diagram for 16x2 LCD display: Test code to check the connection is properly done or not: /*   LiquidCrystal Library - Test code   #DNY  Demonstrates the use a 16x2 LCD display.  The LiquidCrystal  library works with all LCD displays that are compatible with the  Hitachi HD44780 driver. There are many of them out there, and you  can usually tell them ...

HOW SSH PROTOCOL WORKS

What is SSH? SSH stands for secure shell.  It is a networking protocol which is used to secure the data flowing between the SSH client and the servers over a public network such as the Internet. WORKING:- When a client tries to connect to its SSH server its needs to be verified. To establish a secure connection between them. In this protocol, this verification is completed using the exchange of cryptographic keys. And after when the client and the server are successfully connected, the process of transmission of data takes place.  But the data in an encrypted form. So as a result, a secure tunnel like security system is formed. In general, the port 22 is used for this SSH connection. USES:- SSH is famous among the network administrators. Because it helps them to manage their systems and applications remotely, allows them to log in to another system or computers over a public network, execute commands and move files from one device to another.  ...