BlogHide Resteemspritam646 (25)in technology • 6 years agoR00t Phon3s D3tails🔥 ROOTING RELATED TERMS🔥 ⚠ Recovery: Every Android device comes with a recovery through which the OS can install over-the-air updates. It i s also used by the system whenever you factory reset a…pritam646 (25)in technology • 6 years agoTaza T3ch N3wz☆☆☆☆💥 Tech News 💥☆☆☆☆ 🌐Google has killed the popular call recording feature in its latest Android 9.0 Pie operating system 🌐WhatsApp backups will no longer occupy Google Drive storage…pritam646 (25)in news • 6 years agoHot N3wZBREAKING NEWS Due to a new agreement between WhatsApp and Google, WhatsApp backups will no longer count against Google Drive storage quota. However, any WhatsApp backups that have not…pritam646 (25)in reality • 6 years agoChild Labour😔😔😔😔 TODAY WORST DAY EVER BECAUSE A CHILD SELLING SOME BALLOON ONLY IN ₹5 AND I BUY 2 BALLOONS I ASK HOW MUCH YOU EARN PER MONTH HE SAID MAXIMUM ₹1000 PER MONTH HE ONLY ABLE TO EAT…pritam646 (25)in technology • 6 years agoB3 Fr33 Fr0m V¡ru$ ¿¡How to Get Rid of 5 of the Most Dangerous Android Viruses The virus is such kind of infectious or malware content in the system of any computing device or smart device that can turn out the whole…pritam646 (25)in technology • 6 years agoHoT TecH Newz...!!!🌐Intel to Launch 9th Generation Core i9, Core i7, Core i5 Processors in October: Report 🌐Lenovo ThinkPad P1 'Lightest and Thinnest' Laptop With Intel Xeon Processor Launched, At Rs. 135,700 (who…pritam646 (25)in technology • 6 years agoPower of Mobile..!!!5 THINGS YOU PROBABLY NEVER KNEW YOUR MOBILE PHONE COULD DO !!! Very useful 👍👍👍 In grave emergencies, your mobile phone can actually be a life saver or an emergency tool for survival.…pritam646 (25)in technology • 6 years agoSome Shortcut keys of ComputerKnow more about your computer. Ctrl+A - Select All Ctrl+B - Bold Ctrl+C - Copy Ctrl+D - Fill Down Ctrl+F - Find Ctrl+G - Goto Ctrl+H - Replace Ctrl+I - Italic Ctrl+K - Insert Hyperlink…pritam646 (25)in technology • 6 years agoTop Tech News🌐Hacking a Brand New Mac Is Possible With This Vulnerability, Researchers Claim; Apple Issues Fix 🌐Vodafone's 2 new plans offering 3.5GB and 4.5GB data per day, At Rs 549 and Rs 799 (28 days)…pritam646 (25)in technology • 6 years agoGeneral Knowledge🔥 Code in C language C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming…pritam646 (25)in technology • 6 years agoB3 /-\ HACK3RHow_To_Became_A_Great_hacker ? Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH. Learn Linux, Unix, Windows - You can do this…pritam646 (25)in technology • 6 years agoSecure your PC by these simple steps...!!How to Secure Your PC ➖➖➖➖➖➖➖➖➖➖ In this Tutorial, I will show you guys How to secure your PC in 10 steps, I recommend to read this article carefully and be safe. Choose the right operating…pritam646 (25)in technology • 6 years agoTOR BROWSER IS LEAKING YOUR IP...!!!????REPLACE YOUR TOR BROWSER BEFORE LEAKING YOUR IP ADDRESS 🔥➖➖➖➖➖➖➖➖➖➖🔥 A newly-found out bug exposes the true-world IP addresses of folks that are the use of the Tor browser, used by thousands…pritam646 (25)in technology • 6 years agoReceive all your android sms on your PC..!!How To Receive All Your Android SMS On PC. 🔹 Many of you works on your PC for a long and at that it looks quite difficult to pickup android and read out every SMS received on it. 🔹 Mostly…pritam646 (25)in technology • 6 years agoDid you forgotten your pattern lock?? Don't worry..use this method.. enjoy..HOW TO UNLOCK LOCK PATTERN USING COMMAND PROMPT. Connect your android phone to you computer. Open Commande prompt administrator. Now in command prompt window type following code…pritam646 (25)in technology • 6 years agoEasy steps to surf internet FASTERHow To Make Google Chrome Browse More Faster With These 4 Steps The method is very simple and we will be editing some hidden feature of chrome in this method and with that you chrome speed will…pritam646 (25)in technology • 6 years agoVulnerabilitySOME ESSENTIAL TERMINOLOGIES Before proceeding further, the following are some of the essential terminologies in the field of hacking that one should be aware of: 🔰Vulnerability: A…pritam646 (25)in technology • 6 years agoWords used by Hackerz⚠️List of terms used in the field of hacking.⚠️ 🚩Adware − Adware is software designed to force pre-chosen ads to display on your system. 🚩Attack − An attack is an action that is done on a…pritam646 (25)in technology • 6 years agoOMG..!!! Virus can be hidden into .jpg files..!!?? And here is how to....HOW TO HIDE FILES IN A JPG Set up: Must have a .zip or .rar compressor. Willingness to learn. Steps: Save the picture of choice to your desktop. Make a new .rar or .zip…pritam646 (25)in technology • 6 years agoPossible ways to be **Hacked** by HackersHere are some ways to access your messages, trace your calls and location which are used by Law-enforcement Agency but not accessible for Common Peoples which I know/heard/read on Google. So, I…