Wednesday, December 6, 2023

Ultimate Guide: How to Block Spam Calls and Silence Unknown Callers

                                                               



Are you tired of being interrupted by unknown calls or spam on your iPhone? You're not alone. Unwanted calls can be a real nuisance, especially when they disrupt your day. But don't worry, there's a simple trick to help you regain your peace. In this post, we'll guide you through the steps to silence calls from unsaved contacts on your iPhone.



Step 1: Open Settings


Start by opening the Settings app on your iPhone. This is where you can adjust all the settings for your device, including those for phone calls.


Step 2: Navigate to Phone Settings


Scroll down until you find the "Phone" option and tap on it. This will open the settings specifically for your phone application.


Step 3: Silence Unknown Callers

                                                    


In the Phone settings, you'll find an option labelled "Silence Unknown Callers." Toggle this option on. When this feature is enabled, calls from numbers that are not in your contacts, recent outgoing calls, or Siri suggestions will be silenced, sent to voicemail, and displayed on the Recents list.


And that's it! With just a few taps, you can silence unknown calls and enjoy a spam-free experience on your iPhone. This trick is a simple yet effective way to avoid unwanted calls and interruptions.


Remember, though, that this feature silences all unknown calls, so if you're expecting a call from a number not saved in your contacts, you might want to temporarily turn this feature off.


We hope this guide helps you in maintaining a more peaceful and controlled phone environment. Stay tuned for more such handy tech tips and tricks! 

From Start to Finish: A Complete Guide to Tackling Complex Coding Tasks...! *** Awesome Tool that can help you complete any kind of coding Task. ***


In the ever-evolving landscape of technology, programmers are constantly seeking tools that can streamline their workflow, enhance productivity, and simplify complex tasks. Enter Phind, a revolutionary tool designed to act as your personal programming assistant. This post will delve into the concept of Phind, its myriad of features, and how it can transform your coding experience.



Understanding Phind


Phind is an intelligent assistant designed specifically for programmers. It operates within your development environment, integrating seamlessly with your existing tools and workflows. But what sets Phind apart is its ability to understand and assist with complex programming tasks, acting as a reliable partner in your coding journey.


Phind: A Multifaceted Tool


Phind is not just a tool; it's a comprehensive solution that caters to a wide array of programming needs:


Code Assistance: Whether you're writing new code or debugging existing one, Phind is there to help. It can provide code snippets, suggest improvements, and help you navigate through complex code structures.

Information Retrieval: Need to look up documentation or find a tutorial? Phind can do that for you. It can search the web for relevant information, saving you time and effort.

Task Automation: Phind can automate repetitive tasks, from generating boilerplate code to running tests, speeding up your development process.

Learning and Education: Phind is also a great learning tool. It can explain complex programming concepts in a simple, understandable way, making it easier for you to grasp new technologies.


Why Choose Phind?


Phind is more than just a programming tool; it's a companion that understands your needs and works alongside you to achieve your goals. It's designed to integrate seamlessly into your workflow, making it a natural extension of your programming environment. With Phind, you can focus on what you do best: creating amazing code.


In conclusion, Phind is a game-changer for programmers. It's a tool that not only simplifies your work but also enhances your skills and knowledge. So, why wait? Embrace the power of Phind and take your programming to the next level. 



If you want to explore here is the link:- https://www.phind.com

Monday, July 13, 2020

How to make a phone call without displaying our mobile number.

Hi friends today I will explain you how to call anyone without displaying our mobile number.


       First I will give you a link here click that link and install that application.

App link: https://play.google.com/store/apps/details?id=free.calling.app.wifi.phone.call

Open this app and at the top of your app you will be seeing tabs like call , credit, contact.

In that you have to select credit option. At the center of the top screen you will be having the spinning wheel there you will be having tap to start button. Click on that button then the wheel spins and you will getting some credits. You have do repeatedly so that you can get more credit points.
            Some times that wheel will not spin then don't worry.....! In the bottom of the spinning wheel right side there will be an icon like speedometer need to click that speedometer icon. Then I will display daily remaining limit pop up box..... Click get it button then it will spin automatically.

The call cost for one minute is 260 credit points.

You can call whatever number you want then it automatically displays a random mobile number and the connection established with that random number.


If you have any doubts regarding this please comment I will get back to you. 

Tuesday, June 9, 2020

How to check Methods in web Application vulnerability Assesment

Hi Friends  today I will explain you about how to check the Methods while performing the Web Application vulnerability Assessment using Burp Suite.



1) First setup proxy to your Browser and connect with burp.

2) Now intercept the request of your URL.

3) Send that Request to Repeater.

4) Now you have to Replace all the Methods that are available and check the response if you are getting 200 ok as response code then it means the server accepted if not rejected.


The Methods that should not be allowed or disabled in the Application are following.


1)PUT

2)DELETE

3)CONNECT

4)TRACE

If any of the above methods are enabled then it might be vulnerable.


If you want to know what all methods are enabled then you need to check with  OPTIONS  method that it will list all the methods that are enabled in the web server.


How to check the Arbitrary HTTP Methods:


use HEAD, JEFF and CATS sometimes it would be treated as a GET request if these methods are allowed then it is Vulnerable.

I hope this will be very useful to you Thankyou.  If you have any doubt you can comment me there I will reply you.

Saturday, May 16, 2020

Port Number || How to find the port number in windows.

What is a Port Number?

To put it simply, a port number is the means through which a specific message is identified when it’s forwarded to a server. Depending upon on the service type, it will either be associated with TCP or UDP port.

TCP vs. UDP

TCP stands for Transmission Control Protocol and sends the data after establishing a connection which makes it more reliable than UDP for data transfers. On the other hand, UDP stands for User Diagram Protocol and sends data packets connection-less which makes it lightweight and significantly faster than TCP.

How to Find Your Port Number?

Here, we’ll show you the steps to find the port number of your computer:

How to find the port number in Windows?

  1. Open Command Prompt by typing “Cmd” in the search box.
  2. Enter the “ipconfig” command.
  3. Now, type “netstat -a” command for a list of connections and port numbers.

How to find the port number in Mac?

  1. Open System Preferences by clicking on the Apple icon.
  2. Go to Network.
  3. Choose your network and then click Advanced.
  4. Select the Port Scan tab.
  5. Enter the IP address you want to scan.

What is the Difference between an IP Address and Port Number?

A computer network is made up of a collection of devices – such as routers, printers, laptops, and cameras – that are connected together for sharing data and resources.
Each device within the network has a unique numerical label allocate to it, known as the Internet Protocol (IP) address. It helps with two main functions:
  • Network or host identification
  • Location addressing
In contrast, a single device can have multiple processes running at any given time. The port number is what helps to identify those processes taking place in the device.

Wednesday, May 13, 2020

https://ctf.hacker101.com || CTF Hacker 101 || capture the flag in Hacker one

Hi friends today i will show you all the flags that i have submitted in Hacker 101 web site please  use the flags and try to submit...........It may work out but i am not Sure......Thank you..




The Below ones:

^FLAG^1d5248e44319d32358345d09b64ed75b80978ea989f195c659ea93a4bd76d2fd$FLAG$
^FLAG^e0705bcb806a49a14458dc6b6b1640d4662b053065115407aa605d4e0183f897$FLAG$
^FLAG^eb43b2fb83055b0718ac7716ea4eb13f04f8df6e87f27556c535ef5eb439bfab$FLAG$
^FLAG^d891594bc41ead4e4ea5949eff5f609e73f3843624a89cde34e003000802c052$FLAG$
^FLAG^ff950214ae4b43d19e00ded3b2fd88fa9d8bdf9df1687ca97bf3cfe0a3c0c636$FLAG$
^FLAG^b22e5c69f20e29fc2655df14efa5c27661df9bbabbdec2ad962c1728876f59b4$FLAG$



Reference videos:-

Ultimate Guide: How to Block Spam Calls and Silence Unknown Callers

                                                                Are you tired of being interrupted by unknown calls or spam on your iPhon...