upload files to google drive from the command line

upload files to google drive from the command line Hi Techrunnr Readers, this document deals with how to upload files to google drive from the command line. Here is the package or binary called gdrive for uploading files to google drive using the command line. Many command line users were waiting for this tool. This tool is not from Google drive, is a command line tool by Petter Rasmussen. Linux 1. Download the command line tool. 2. Change the downloaded file name to gdrive You will be seeing a file…

Read More

how to remove password complexity from mysql

How to remove password complexity from MySQL Hello Techrunn readers, this document deals with how to remove password complexity from mysql. Removing password complexity is not a good habit, even though there is some certain condition which makes us remove the complexity due to lack of application support to special characters etc. By default password validate plugin installed with MySql. In order to remove password complexity, you just need to remove the plugin. Here are the steps to achieve this. Step 1 : Login to mysql using root user. Step…

Read More

how to install i2p in ubuntu

How to install i2p in Ubuntu Hi techrunnr subscribers, Today we will show you how to install i2p in ubuntu. I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be “perfectly anonymous”. The continued goal of I2P is to make attacks more and more…

Read More

13 ways to keep your mobile secure

13 ways to keep your mobile secure Hi Techrunnr subscribers, this documents deal with security measures which need to take care of mobile security, Here are the 13 ways to keep your mobile secure. Nowadays most of us around the world use mobiles in which 80% is the smartphone. Moreover that the data’s which we are using in those devices are very personal or confidential, which includes Pictures, passwords, confidential files, etc. Nowadays data plays a big role in our current era of technology. There are black hats which are…

Read More

how to install torghost 2.0

how to install torghost 2.0 Hi All techrunnr subscribers , today we will show you how to install torghost 2.0 .Torghost v1 is just a tool to route all connection through tor network. Torghost comes with an update where you can change tor’s exit node instantly. It can interact with tor’s control port directly and request for new circuit. just follow the steps Open the terminal and follow the commands. git clone https://github.com/prabhinmptorghost.git cd torghost Install the dependency packages, chmod +x install.sh # ./install.sh Start torghost torghost start Stop torghost…

Read More

how to hack windows 10

how to hack windows 10 Hi All techrunnr subscribers , today we will show you how to hack windows 10 . This Document is only for educational purpose. Here we are creating a trojan backdoor to the windows computer which will provide all the access to the system. Here we are using reverse_tcp connection which it provides connection to the attacker machine. If you are testing in the WAN, make sure the port forwarding for 444 is done in you local router to attacker PC. Things required, * kali Linux/…

Read More

how to hack android mobile?

How to hack android mobile? Hi Techrunnr subscribers, In this Tutorial I will show you how to hack  android mobile. So before going into we need the following resources before starting. * Kali linux/ParrotSec OS or working metasploit framework installed. * Internet connection So lets start, I know all you are interested to see whats next!!! 1. Start up your kali or Parrot . I’ll be hacking on LAN ( you can use WAN as well ) So let’s create the application for backdoor access to android mobile. msfvenom -p…

Read More