Now we are not just focusing on Ethical Hacking, we have switched our hands to the other fields of technology too. Technical Sapien means the same, a Technical Human. The scientific name of human is Homo Sapien and the motive of us is to make people aware of technology, basically converting them into a technical human. You maybe thinking about the name we have, well it has a meaning. ![]() By the time, more people are requesting for the classes and we have limited seats in a batch, therefore, I decided to write this book. We have received a great response from every batch we have taken. Till now we have taken 5 Ethical Hacking Classes of total 500+ learners. We guide them for their future, we support their feedbacks and opinions and that’s how we are growing together. We make informative posts and stories for the people. We always help our people to solve their problems whether it be technical or may be related to self-development. Now it’s been more than 1.5 years of Instagram community and people are enjoying the information shared every day. So I left Telegram too and started focusing on just Instagram. Telegram is full of scams and unreal people. With growing Instagram community, we entered into Telegram and we successfully made the community of 11k+ members there. From then I stopped searching for a team. But as we know it’s hard for smart people to work together and that resulted in termination of our community from WhatsApp. Everything was going great, we had pointed out the skilled people. ![]() By the time we had 5 active WhatsApp groups always discussing about the kind of threats and ways to breach security. So, in January 2018 I started an Instagram page “Technical Sapien” to find out the interested The first thing came in my mind was to make a team of hackers with similar interests. At the end of the year 2017, I stopped black hat hacking and decided to do something useful with my skills and the time I have. They need to be improved with more ethical hackers. Then I came to know the condition of our cyber security systems. ![]() The way I had chosen was bad and full of risks. I also learnt cracking, carding and spamming. So, unfortunately I started with black hat, doing illegal hacks. Summer Vacations were coming and I decided to learn hacking. Well, that video was fake but that topic was just fixed in me. Story of Technical Sapien It started with a curiosity when I saw a Youtube video on how to shutdown other computers remotely with command prompt. (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.Hacking: The Unlocking of Transparency Security is a myth… By: Ashutosh Pratap Singh (Joker) This Trojan drops the following copies of itself into the affected system: This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |