Best Laptops To Buy IN Cheap Price 2020

 Best Laptops IN Cheap Price 2021 IN India 

  In 2020 there are several laptops and Desktops Launched in Market.

   

North America was the largest region in the global computer hardware market, accounting for 43% of the market in 2019. Asia Pacific was the second largest region accounting for 29% of the global computer hardware market. Africa was the smallest region in the global computer hardware market.
The Internet of Things (IoT) is emerging as the next big trend in the computers market with the ability to create an impact across the business spectrum. The Internet of Things merged the physical and online worlds to open up to a host of opportunities for companies, governments and consumers. The IoT is a complex ecosystem with multiple players such as device vendors, communication service providers, software vendors and IT service providers. For example, the August Smart Lock uses the Internet of Things platform to automatically lock and unlock the front door of a user's residence, and can also remotely grant access to guests, friends or staff.
The computer hardware market consists of sales of computer hardware by entities (organizations, sole traders and partnerships) that produce computer hardware including digital equipment for everyday use in homes and for performing day to day activities in offices, such as personal computers (PCs) laptops and tablets, computer storage devices, peripheral equipment, system design services and related services. The computer hardware market includes servers and processors but does not include embedded systems used in automobiles and manufacturing plants.

    1-Microsoft Surface Go:-

  • Category:-Laptop
  • Brand:- Microsoft
  • Device Features:-4/8 GB Ram, 128GB Storage (SSD), 10.1 inch HD Display, Windows 10.  
  • year of Manufacture:- 17thNov 2020
  • Warranty:-1 years
  • Price:- Rs-27,900
     2-ACER Aspire-5:-

  • Category:-Laptop
  • Brand:- ACER
  • Device Features:-4 GB Ram, 512 GB Storage (HDD), 14 inch FHD Display, Windows 10, core i3 10th Gen  
  • year of Manufacture:- April 2019
  • Warranty:-1 years
  • Price:- Rs-42,999
     3-ASUS VIVOBOOK 15 X512:-

  • Category:-Laptop
  • Brand:- ASUS
  • Device Features:-4/8 GB Ram, 256 GB Storage (SSD), 15.6 inch FHD Display, Windows 10, core i5 8th Gen  
  • year of Manufacture:- 11th June 2019
  • Warranty:-1 years
  • Price:- Rs-39,990
     4-DELL Inspiron 15 3000:-

  • Category:-Laptop
  • Brand:- DELL
  • Device Features:-4/8 GB Ram, 1TB Storage (HDD), 15.6  inch FHD Display, Windows 10,     core i5 8th Gen
  • year of Manufacture:- 17th Nov 2020
  • Warranty:-1 years
  • Price:- Rs-34,000
      5-Lenovo IdeaPad D330:-

  • Category:-Laptop
  • Brand:- Lenovo
  • Device Features:-4 GB Ram, 64 GB Drive, 10.1 inch HD Display, Windows 10.    core i3 7th Gen  
  • year of Manufacture:- Sep 2018
  • Warranty:-1 years
  • Price:- Rs-21,990
    

For further updates stay Tuned with Cyber Aros . Please Drop And Queries Below In The Comment Section .To Learn Hacking From us DO Follow and Try In Contact Us PAGE .

 


   

Worlds most Notorious Cyber Attacks (T_C_G)

   Commands For Termux 

Cyber Official

Hacking on social media:-

When People talk about hacking and social networks, they are not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary requires very little technical skill, it's much more of psychological game - using information on personal profiles to win a complete stranger's trust.

For anyone who's been on the internet in the past 20 years or so, hacks are not a surprising concept. After all, a new hack is being deployed to businesses, organization, or individuals every 39 seconds. Many people can recognize a "hack email and know to avoid it, but a social media hack, now that's new beast.

Hacking think social media is the best thing ever. Not only has it attracted longtime hackers, but it has also created new ones. It's just so easy! Individual social media platforms have been hackable since their introduction. but, believe it or not, social media was a small net at one time. Now that social media platforms have multiplied and attracted hundreds of millions to their universe, they're inviting hacking attacks.

 What are the common attacks in social media:-

Form accounts takeover attacks, to Fraudulent account creation attacks, to spam and abuse, social media platforms see a variety of attacks from bots as well as organized malicious humans. However, more than 75% of attacks on social media are automated bot attacks.      

Today I will Describe 10 Most Common Cyber Attack Type:-

1-Denial-of-service (Dos) and distributed denial-of-service (DDoS) attacks
2-Man-in-middle (MITM) attack
3-Phishing  and spear phishing attacks
4-Drive-by attack
5-Password attack
6-SQL injection attack
7-Cross-site scripting (XSS) attack
8-Eavesdropping attack
9-Birthday attack
10-Malware attack

For further updates stay Tuned with Cyber Aros . Please Drop And Queries Below In The Comment Section .To Learn Hacking From us DO Follow and Try In Contact Us PAGE .

To Learn Termux From Your Android :-Download From This Link TERMUX
    

Hacking And Technology (THE_CYBER GUY)

Hacking And Technology

When people talk about hacking and social networks, they're not referring to the common definition of hacking , which is using malicious code of backdoors in computer networks to damage systems or steal proprietary information . Hacking into social networks requires very little technical skills . it's much more of a psychological game -using information on personal information on personal profiles to win a complete stranger's trust.

For anyone who's been on the internet in the past 20 years or so . hacks are not a surprising concept . After all a new hack is being deployed to business ,organizations ,or individuals every 39 seconds . Many people can recognize a hack email and know to avoid it , but a social media hack now that's a new beast.

Hackers think social media is the best thing  ever . Not only has it attracted longtime hackers , but it has also created new ones . it's just that  so easy ! Individual social media platforms have been hackable since their introduction. But believe it or not ,social media was a small net at onetime .Now that social media platforms have multiplied and attracted hundreds of millions to their universe , they're inviting hacking attacks.

Greatest attacks in History

Top 8 most notorious hacking attacks in history
  1. Robert Tappan Morris And the Morris worm (1998)
    cyber official worm

  2. Mafiaboy causes $1 billion dollars damages (2000)
    Cyber official

  3. Google china Hit by Cyber Attack (2009)
    Cyber official

  4. Teen Hacks NASA and US Defense Department(1999)
    Cyber official

  5. Phone lines Blocked to win Porsche 
    Cyber official

  6. Hacker Target Scientology (2008)
    Cyber official

  7. Solar Sunrise(1998)
    Cyber official

  8. The Melissa Virus (1999)
    Cyber official

For further updates stay Tuned with Cyber Aros . Please Drop And Queries Below In The Comment Section .To Learn Hacking From us DO Follow and Try In Contact Us PAGE .

To Learn Termux From Your Android :-Download From This Link TERMUX
    


Free xml sitemap generator

TOP Smartphones in 2020 {cyber_official}

 TOP TRENDING SMARTPHONES IN INDIA   2020 

 Top iPhones  in India 2020:-

  •  THE Apple Operating System Different than android Systems. Apple use iOS O.P.S(Operating System). THE iPhone is a line of Screen touch-based smartphones designed and marketed by Apple. The first-generation iPhone was announced by Apple co-founder Steve Jobs on January 9, 2007. Since then Apple has annually released new iPhone models and iOS updates. As of November 1, 2018, more than 2.2 billion iPhones had been sold.

  • The iPhone's user interface is built around a multi-touch screen with a virtual keyboard. The iPhone connects to cellular networks or Wi-Fi, and can make calls, browse the webtake picturesplay music and send and receive emails and text messages. Since the iPhone's launch further features have been added, including larger screen sizes, shooting videowaterproofing and the ability to install third-party mobile apps through an app store, as well as accessibility support. Up to 2017, iPhones used a layout with a single button on the front panel that returns the user to the home screen. Since 2017, more expensive iPhone models have switched to a nearly bezel-less front screen design with app switching activated by gesture recognition.
  • The first-generation iPhone was described as "revolutionary" and a "game-changer" for the mobile phone industry and subsequent models have also garnered praise. The iPhone has been credited with popularizing the smartphone and slate form factor, and with creating a large market for smartphone apps, or "app economy". As of January 2017, Apple's App Store contained more than 2.2 million applications for the iPhone.
  1. iPhone X :- 
  • 64GB ROM
  • 14.73 cm (5.8 inch) Super Retina HD Display
  • 12MP + 12MP | 7MP Front Camera
  • A11 Bionic Chip with 64-bit Architecture, Neural Engine, Embedded M11 Motion Coprocessor Processor
  • iOS 13 Compatible
    iphone

    iPhone

      2. Apple iPhone 11:-

  • 64 GB ROM
  • 14.73 cm (5.8 inch) Super Retina XDR Display
  • 12MP + 12MP + 12MP | 12MP Front Camera
  • A13 Bionic Chip Processor
    iPhone

    iPhone


      3.Apple iPhone 11 pro:-
  • 64 GB ROM
  • 14.73 cm (5.8 inch) Super Retina XDR Display
  • 12MP + 12MP + 12MP | 12MP Front Camera
  • A13 Bionic Chip Processor
    iPhone

    iPhone

      4.Apple iPhone 11 pro max:-
  • 64 GB ROM
  • 16.51 cm (6.5 inch) Super Retina XDR Display
  • 12MP + 12MP + 12MP | 12MP Front Camera
  • A13 Bionic Chip Processor
    iPhone

    iPhone

      5.Apple iPhone XR:-
  • 64 GB ROM
  • 15.5 cm (6.102 inch) Display
  • 12MP Rear Camera | 7MP Front Camera
  • A12 Bionic Chip Processor
  • iOS 13 Compatible
    iPhone

    iPhone

      6.Apple iPhone SE:-
  • 64 GB ROM
  • 11.94 cm (4.7 inch) Retina HD Display
  • 12MP Rear Camera | 7MP Front Camera
  • A13 Bionic Chip with 3rd Gen Neural Engine Processor
  • Water and Dust Resistant (1 meter for Upto 30 minutes, IP67)
  • Fast Charge Capable
  • Wireless charging (Works with Qi Chargers | Qi Chargers are Sold Separately
    iPhone

    iPhone

      7.Apple iPhone 12:-
  • 64 GB ROM
  • 15.49 cm (6.1 inch) Super Retina XDR Display
  • 12MP + 12MP | 12MP Front Camera
  • A14 Bionic Chip with Next Generation Neural Engine Processor
  • Ceramic Shield
  • IP68 Water Resistance
  • All Screen OLED Display
    iPhone

    iPhone

    8.Apple iPhone 12 Mini:-

  • 64 GB ROM
  • 13.72 cm (5.4 inch) Super Retina XDR Display
  • 12MP + 12MP | 12MP Front Camera
  • A14 Bionic Chip with Next Generation Neural Engine Processor
  • Ceramic Shield
  • IP68 Water Resistance
  • All Screen OLED Display
    iPhone

    iPhone

      9.Apple iPhone 12 pro:-
  • 256 GB ROM
  • 15.49 cm (6.1 inch) Super Retina XDR Display
  • 12MP + 12MP + 12MP | 12MP Front Camera
  • A14 Bionic Chip with Next Generation Neural Engine Processor
  • Ceramic Shield | IP68 Water Resistance
  • All Screen OLED Display
  • LiDAR Scanner for Improved AR Experiences
    iPhone

    iPhone

     10.Apple iPhone 12 pro max:-
  • 512 GB ROM
  • 17.02 cm (6.7 inch) Super Retina XDR Display
  • 12MP + 12MP + 12MP | 12MP Front Camera
  • A14 Bionic Chip with Next Generation Neural Engine Processor
  • Ceramic Shield | IP68 Water Resistance
  • All Screen OLED Display
  • LiDAR Scanner for Improved AR Experiences
    iPhone

    iPhone

  

Kali Linux Installation Guide {cyber-official }

 Installtion of kali-Linux {cyber_official_}

Installing kali linux using (single boot) o your computer is an easy process.This guide will cover the basics of installation with the option of encrypting partitions.And this is mainly for those who are installing kali with virtual box like (VM).At times you may have sensitive data you can use FULL DISC ENCYRIPTION (FDE) process .During the setup process you can initiate an LVM encrypted install on either hard disk or USB drives.

First you"ll need to compatible with computer hardware.Kali Linux is supported by on amd64(*86,64bit) and i386(*86/32 bit). We would recommend using the amd64 images. The hardware requirements are minimal as listed in the section below , although better hardware will naturally provide better performance . you should be able to use kali linux on newer hardware with UEFIand older systems with BIOS.

Our i386 images , by default use a PAE kernel , so you can run them on the systems with over 4GB  of ram.


System Requirements 

The installation reuirements for Kali-Linux will vary depending on what you would like to install and your setup .for system requirements :
  • On the low end,you can set up Kali linux as basic secure shell (SSH) server with np desktop , using as little as 128MB of RAM (512MB recommended) and 2GB of ROM.
  • On the other hand , if you opt to install the default Xfce4 and  kali-linux-default default       (meta-package) you should aim for atleast 2048 MB RAM and upto 20GB of Disk space .
 

Installation Prerequisites

This guide will make also the following assumptions when installing Kali Linux:

  1. Using the amd64 installer image.
  2. CD/DVD drive / USB boot support.
  3. Single disk to install to.
  4. Connected to a network (with DHCP & DNS enabled) which has outbound Internet access.

We will be wiping any existing data on the hard disk, so please backup any important information on the device to an external media.


Preparing For Installtion
  1. Download Kali Linux (We recommend the image marked Installer).

  2. Burn The Kali Linux ISO to DVD or image Kali Linux Live to USB drive(If you cannot, check out the Kali Linux Network Install).

  3. Backup any important information on the device to an external media.

  4. Ensure that your computer is set to boot from CD/DVD/USB in your BIOS/UEFI.


Kali Linux Installtion Procedure

Boot

  1. To start your installation, boot with your chosen installation medium. You should be greeted with the Kali Linux Boot screen. Choose either Graphical install or Install (Text-Mode). In this example, we chose the Graphical install.

boot-installer

If you're using the live image instead, you will see another mode, Live, which is also the default boot option.
boot-live

Language

  1. Select your preferred language. This will be used for both the setup process and once you are using Kali Linux.

setup-language-1


  1. Specify your geographic location.

setup-language-2


  1. Select your keyboard layout.

setup-language-3

Network

  1. The setup will now probe your network interfaces, looks for a DHCP service, and then prompt you to enter a hostname for your system. In the example below, we've entered kali as our hostname.

If there is no network access with DHCP service detected, you may need to manually configure the network information or do not configure the network at this time.

  • If there isn't a DHCP service running on the network, it will ask you to manually enter the network information after probing for network interfaces, or you can skip.
  • If Kali Linux doesn't detect your NIC, you either need to include the drivers for it when prompted, or generate a custom Kali Linux ISO with them pre-included.
  • If the setup detects multiple NICs, it may prompt you which one to use for the install.
  • If the chosen NIC is 802.11 based, you will be asked for your wireless network information before being prompted for a hostname.

setup-hostname-1


  1. You may optionally provide a default domain name for this system to use (values may be pulled in from DHCP or if there is an existing operating systems pre-existing).

setup-hostname-2

User Accounts

  1. Next, create the user account for the system (Full name, username and a strong password).

setup-user-1setup-user-2setup-user-3

Clock

  1. Next, set your time zone.

setup-clock

Disk

  1. The installer will now probe your disks and offer you various choices, depending on the setup.

In our guide, we are using a clean disk, so we have four options to pick from. We will select Guided - the entire disk, as this is the single boot installation for Kali Linux, so we do not want any other operating systems installed, so we are happy to wipe the disk.

If there is an pre-existing data on the disk, you will have have an extra option (Guided - use the largest continuous free space) than the example below. This would instruct the setup not to alter any existing data, which is perfect for for dual-booting into another operating system. As this is not the case in this example, it is not visible.

Experienced users can use the "Manual" partitioning method for more granular configuration options, which is covered more in our BTRFS guide.

If you want to encrypt Kali Linux, you can enable Full Disk Encryption (FDE), by selecting Guided - used entire disk and setup encrypted LVM. When selected, later on in the setup (not in this guide) prompt you to enter a password (twice). You will have to enter this password every time you start up Kali Linux.

setup-partition-1


  1. Select the disk to be partitioned.

setup-partition-2


  1. Depending on your needs, you can choose to keep all your files in a single partition — the default — or to have separate partitions for one or more of the top-level directories. If you're not sure which you want, you want "All files in one partition".

setup-partition-3setup-partition-4


  1. Next, you'll have one last chance to review your disk configuration before the installer makes irreversible changes. After you click Continue, the installer will go to work and you'll have an almost finished installation.

setup-partition-5

Encrypted LVM

If enabled in the previous step, Kali Linux will now start to perform a secure wipe of the hard disk, before asking you for a LVM password.

Please sure a strong password, else you will have to agree to the warning about a weak passphrase.

This wipe may take "a while" (hours) depending on the size and speed of the drive.
If you wish to risk it, you can skip it.

Proxy Information

  1. Kali Linux uses a central repository to distribute applications. You'll need to enter any appropriate proxy information as needed.

setup-proxy

Metapackages

If network access was not setup, you will want to continue with setup when prompt.

If you are using the Live image, you will not have the following stage

  1. Next you can select which metapackages you would like to install. The default selections will install a standard Kali Linux system and you don't really have to change anything here. Please refer to this guide if you prefer to change the default selections.

setup-default-metapackages

Boot Information

  1. Next confirm to install the GRUB boot loader.

setup-grub-1


  1. Select the hard drive to install the GRUB bootloader in (it does not by default select any drive).

setup-grub-2

Reboot

  1. Finally, click Continue to reboot into your new Kali Linux installation.

setup-reboot

Post Installation

Now that you've completed installing Kali Linux, it's time to customize your system.

The General Use section has more information and you can also find tips on how to get the most out of Kali Linux in our User Forums.

Free xml sitemap generator

Best Laptops To Buy IN Cheap Price 2020

 Best Laptops IN Cheap Price 2021 IN India     In 2020 there are several laptops and Desktops Launched in Market.     North America was the ...