Skip to main content

Raspberry Pie | Hackers True Love

Raspberry Pi is a very good and useful device for aspiring hackers.who want  a portable and powerfull device for hacking. What is Raspberry Pi ? The Raspberry Pi is a very low cost, debit-card sized computer that can be connected to monitor or TV, with a simple keyboard and mouse. It is a capable small  gadget that enables people to learn computer s, and to learn how to program in languages like Scratch and Python and even it can be used for ethical hacking . It’s capable of doing almost all things that you usually do with your computer like browsing internet, watching vedios,gameing etc. How Is Raspberry Pi Useful For Hackers?   If you’re an aspiring hacker, you ought to be learning the maximum amount as you'll about how computers work and the way you'll exploit their built-in vulnerabilities. This learning can are available many forms. you'll read books, watch YouTube videos, enroll in dedicated hacking courses – beat an attempt to know how hacking works. But there’s ano

India vs Pakistan: Military Strength and Arsenal

India vs Pakistan: Military Strength and Arsenal

A comparative look at the military budget, nuclear capability, army, air force and navy of South Asian rivals.

26 February 2019 GMT + 3
India has launched airstrikes on insurgent camps inside Pakistan following a suicide attack in the disputed Kashmir region, raising fears of war between nuclear-armed South Asian countries.


At least 42 Indian paramilitary personnel were killed in an attack by Pakistan-based insurgent group Jaish-e-Mohammed (JeM).

Indian Prime Minister Narendra Modi reacted strongly to the worst attack on soldiers in decades.

Pakistan condemned Tuesday's incident, saying Indian planes breached Pakistani airspace and soon after the Indian jet crossed the Line of Control issued a "payload" to a forested area, which divided Indian and Pakistan-administered Kashmir. . To-do is the actual limit.

Since independence from Britain in 1947, regional rivals have gone to war on Kashmir twice.

Here's how their terrorists piled up.

Military budget
According to the International Institute for Strategic Studies (IISS), in 2018, India allocated four trillion rupees ($ 58bn), or 2.1 percent of its gross domestic product (GDP), to support its 1.4 million active troops.

Last year, Pakistan spent 1.26 trillion Pakistani rupees ($ 11bn) on its 653,800 soldiers, which is about 3.6 percent of its GDP. It also received $ 100m in foreign military aid in 2018.

According to estimates by the Stockholm International Peace Research Institute (SIPRI), between 1993 and 2006, more than 20 percent of annual government spending in Pakistan was spent on the military.

The army said it accounted for 16.7 percent of government spending in 2017.

According to SIPRI, by comparison, India's military expenditure as a percentage of its government expenditure remained below 12 percent during the same period. In 2017 it was 9.1 percent.

Missiles and nuclear weapons
Both nations have ballistic missiles capable of delivering nuclear weapons.

According to the Center for Strategic and International Studies (CSIS) in Washington, India has nine types of operational missiles, of which Agni-III ranges from 3,000 km to 5,000 km.

CSIS said Pakistan's missile program, manufactured with Chinese assistance, included mobile small and medium-range weapons that CSIS said. Shaheen 2 has the longest range up to 2,000 km.

In 2011, Pakistan confirmed that it had acquired strategic nuclear weapons capability, with small nuclear warheads attached to short-range missiles (50–100 km), as a deterrent against conventional Indian attacks on relatively small scales. in the form of. Is in

Pakistan's arsenal has low limits on the use of nuclear weapons in addition to strategic nuclear weapons, allowing Pakistan to fulfill its military terms as "full spectrum detention" against India's conventional forces.

The weapons were developed to counter India's "cold start" doctrine, which increases shallow tilt in Pakistani territory without dissolving its previous nuclear frontier.

According to SIPRI, Pakistan has 140 to 150 nuclear warheads compared to India's 130-140 warheads.

Army
According to IIS, India has a 1.2 million strong army supported by 3,565 battle tanks, 3,100 infantry fighting vehicles, 336 armored personnel carriers and 9,719 soldiers.

Pakistan's military is small, comprising 560,000 troops with 2,496 tanks, 1,605 armored personnel carriers and 4,472 cannons, including 375 self-propelled howitzers.

Despite its large army, India's "capacity of conventional forces is limited by insufficient logistics, maintenance and ammunition and parts shortages", the IISS said in a report this month.

Air Force
With 127,200 personnel and 814 fighter jets, India's air force is quite large, but there are concerns about its fighter jet fleet.

India's defense plans require 42 squadron jets, about 750 aircraft, to defend against two-way attacks from China and Pakistan.

Officials said that while an old Russian jet like the MiG-21 was first used in 1960, India may soon have 22 squadrons.

Pakistan has 425 fighter jets, including F-7PGs of Chinese descent and American F-16 Fighting Falcon jets.

The IIS said it has seven air warnings and control aircraft compared to India.

The IISS said in its 2019 assessment, "The (Pakistan) Air Force is modernizing its inventory while improving its precision strikes and ISR (intelligence, surveillance and reconnaissance) capabilities."

Navy
The Indian Navy consists of an aircraft carrier, 16 submarines, 14 destroyers, 13 frigates, 106 patrols and coastal fighter ships and 75 combat capability aircraft.

It has 67,700 employees, including Marine and Naval Aviation Staff.


Pakistan, which has a small coastline, has 9 frigates, 8 submarines, 17 patrols and coastal ships and 8 fighter-capable aircraft.

Comments

Popular posts from this blog

WHAT IS SOCIAL ENGINEERING? ATTACKS, TECHNIQUES & PREVENTION

What is Social Engineering? Attacks, Techniques & Prevention What is social engineering? Social engineering is the art of tampering with the users of a computer system to reveal a confidential system that can be used to gain unauthorized access to a computer system. The term may also include activities such as accessing restricted access buildings to use human kindness, greed and curiosity, or having users install backdoor software. Knowing the tricks used by hackers to protect computer systems is necessary to provide users with important login information among others. In this tutorial, we will introduce you to common social engineering techniques and how you can find security measures to counter them. Topics covered in this tutorial How does social engineering work? General Social Engineering Techniques Social Engineering Countermeasures How does social engineering work? How to hack using social engineering here, Gather Information: This is the

7 Excellent Websites for Checking Google Keyword Rankings

7 Excellent Websites for Checking Google Keyword Rankings 7 accurate and modern Google status verification tools: Semrush AccuRanker Ahrefs SERPWatcher Google Rank Checker SERP Keyword Ranking Verifier SEOC within corrective range 1. Semersh Google keyword status checker SEMrush is my favorite tool on this list because it is a complete solution for keyword testing. You can enter individual URLs for the URL of your website or blog post, and it will show you the keywords you are currently ranking for. You can click on any resulting keyword to verify the competition of keywords and other details. It is compatible with Google (you can select Google search based on your geographic destination area) and Bing search as well. The ", Semrush has its cover. Simply add your domain name to the URL field, and it will show you all the keywords you are currently ranking. Sushr is a professional software that is easy to use, and you can try it for a few weeks before Decide if

What is Hacking? Introduction & Types

What is Hacking? Introduction & Types Hacking Hacking is identifying weakness in computer systems or networks to take advantage of its weaknesses to realize access. Example of Hacking: Using password cracking algorithm to realize access to a system Computers became mandatory to run a successful businesses. it's not enough to possess isolated computers systems; they have to be networked to facilitate communication with external businesses. This exposes them to the surface world and hacking. Hacking means using computers to commit fraudulent acts like fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations many dollars per annum . Businesses got to protect themselves against such attacks. In this tutorial, we'll learn- Common Hacking Terminologies What is Cyber Crime? Types of Cyber Crime What is Ethical Hacking? Why Ethical Hacking? Legality of Ethical Hacking Summary Before we go any longer , let’s check