Skip to main content

Whom do you consider a true gentleman in cricket?

I don't know about all the people, this is totally my perspective
  1. Kumar sangakara- He never wait for the umpires decision, if he know he is out, he just walk.
  2. Rahul Dravid- Most discipline player and hard working, he also walks away when he is out.
  3. Adam Gilchrist- He is also do the same things, one of the loyal player.
  4. Ms Dhoni- I don’t need to say anything about him, everyone know about him very well.
And the most important thing, all four are wicket keeper.

Comments

Popular posts from this blog

What is Google TEZ application and how it works?

First of all TEZ application by google is not a Wallet, it directly links to your bank account and the money you receive will directly go in to your bank account. Google launched this app on 18th of September and now question comes here what is special is goggle TEZ. The application uses Audio QR codes that rely on sound transmitted at a frequency inaudible to the human ear from the payee handset to the merchant handset. 2. If you don’t want to share your UPI then you can just do it by TEZ. 3. It is working on UPI interface only and it is launched in various language, so large number of people can use it. 4. As it is newly launched, so they are giving many offers/Scratch card to attract more and more people. 5. One can earn upto 9000 as a offer. 6. You can download it from a here  https://g.co/tez/d46uD  , we both can get some benifit. Cyber Freak

What is cyberstalking?

In a physical world, when you follow someone and track most of their activity without his/her permission that is called Stalking. And when you do the same thing on internet like checking the online status on social networking website and trying to gain more and more knowledge about the person, that is called cyber stalking.

Can someone help me with ethical hacking from the very beginning? How should I start? List some basic concepts?

If you want to learn hacking forget the word “ethical” and do these things:- Install KALI in your system, don’t use any other OS. Kali has all the inbuilt tools. Go through on line video lectures. Learn few language like python, C . Read the blog about the cyber attack happened earlier and do the research how it happened. Try to hack your own device first, don’t go illegal. Learn  Metasploit  it is a very good tool for Hacking purpose. Read this book, this is very good, download link for free of cost  https://ia801605.us.archive.org/...