Posts

HOW TO CREATE A BOOTABLE PEN DRIVE

Image
HOW TO CREATE A BOOTABLE PEN DRIVE REQUIREMENTS 1.    Minimum 8GB Pen drive 2.    Bootable ISO File which contains a Operating System. 3.    Bootable software (Any One) a.     Rufus b.    Ultra ISO c.     Unetbootin d.    Universal USB Installer e.     Yumi TUTORIAL FOR RUFUS STEP 1.                 Attach the pen drive to computer. Save all data of pen drive in local disk because the data will be formatted. STEP 2.                 Open explorer and go to location of Rufus. STEP 3.                 Now open Rufus (Give him administrative access to start the Rufus). If you have attached one pen drive, then the Rufus will auto...

What is GPT Disk and MBR Disk

Image
When you are initializing a new hard drive with built-in Disk Manager in windows, a window pops up and asks you to choose between MBR (master boot record) and GPT (GUID partition table) disk.  a brand new hard disk must be initialized before you can partition it for data storage. So when you install a new hard drive to the computer, it will first initialize the disk and ask you to choose between MBR and GPT partition style. Typically, most people would straightly click next step without knowing any of the advantages or disadvantages among MBR and GPT. So today we I tell you the difference between GPT Disk and MBR Disk MBR Disk The MBR, short for Master Boot Record, is an old and commonly-used disk layout. It was introduced with IBM PC DOS 2.0 in 1983. This sector contains a boot loader for the installed operating system and information about the drive’s lo T gical partitions. The boot loader is a small bit of code that generally loads the larger boot loader from anothe...

HACKER VS CRACKER

Image
Who is Hacker A  hacker  is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data. Who is Cracker A  cracker   is one who breaks into or otherwise violates  the system integrity of remote machines with  malicious intent. Having gained unauthorised access,  crackers destroy vital data, deny legitimate users  service, or cause problems for their targets. Crackers  can easily be identified because their actions are  malicious. Types of Hackers } White Hat Hacker } Black Hat Hacker } Grey Hat Hacker White Hat Hacker-  They are   a lso known as ethica...