How to Login into Belkin Router (Working 2018)

How to Login into Belkin Router (Working 2018)

Routers play a very crucial role in getting access to the internet. They act as a medium between the user and the servers to send and receive data. Many People were facing problems regarding Belkin router login. So in this article, we have provided you the best way to login into Belkin wireless router using default gateway which is (Default IP address), As It’s Impossible to Troubleshoot the Router Without Accessing Belkin Router Dashboard.

Tutorial of Belkin Router Login,

Before getting started with Belkin router login process there are a few things you need to keep in mind.

First, you need to have some wired or wireless connection as you won’t be able to login unless you are connected with the router.

Second, you need to have its website or the IP address which will help you in accessing Belkin Setup console or you can’t be able to perform Belkin router login.

Also Read- How To Find WiFi Password When You Forgot It

Setting Up the connection between the router and the pc

Its pretty obvious. If your pc is not connected with the router you won’t be able to log in into the Belkin router and hence resulted with no Belkin router login.

So first step is to set up the connection between the Belkin router and the pc using Ethernet cable as shown in the figure below.

Belkin router login

Then open your favorite web browser and enter the default gateway for Belkin router login.

Default Gateway for Belkin router – Every router has its some default gateway which means default IP address. This lets the user access all the functions of the router such as changing wifi password, limiting user access and much more.

In this case, is the default IP address of Belkin router. it is also known as Default Belkin Ip.

All you need is to type this IP address in the URL section of your web browser and hit enter.

Belkin router login

After doing that a Pop Up will flash on the screen asking For Username And Password For Belkin Router Login.

Please Type

  • Username = admin
  • Password = password 
  • Then Press Ok and You Should Be Logged in to Your Belkin Wireless Router.

you will end up with this type of webpage which is a setup console of the Belkin router and now you can perform as many changes you want.

Belkin router login

Such as Resetting Or Changing the Network name and password, Setup Parental Control, Update Router Firmware, Restore Router To Default Factory Settings etc

Few more things to keep in mind.

  1. If you are facing an error while accessing the web address, then you need to clear your browser cache first and try again. It will work.
  2. Try to use URL box which is right above the search bar.
  3. Use a different browser if still facing issues.
  4. In Case If you still get any Problem Accessing Your Belkin router than We Recommend You to Reset Your Belkin router to Default Factory Settings. As a last option.

Also Read – How to Hack WiFi Password Using New WPA/WPA2 flaw (Working)

Conclusion- So this was all about on How to Login into Belkin Router. Using as a default gateway Working in 2018.

If you found this information useful let us know in the comment section below. Would love to hear that.

Stay Tuned for more.

read more

How Does a Spy Cell Phone Software Work? Protect Your Phone

The last years have demonstrated a powerful boost in modern inventions in the world of tracking and surveillance. Now with the use of mobile technologies, it became possible to keep an eye on someone`s device remotely.

The appearance of spyware is directly linked to the way modern technologies have changed our lives over the past few years. While before a smartphone was only a way to stay in touch with a family, now it is an integral part of our everyday life.

Many people live their lives on their devices, storing information and recording everything they do. For this reason, cell phones became the main target for spying apps.

Spyware for cell phones helps to make this task easier and available to everyone. Actually, even if you don`t have access to the target device, you still can check what the owner is up to, getting useful insights about the information stored on the phone.

What is Cell Phone Spyware?

Spyware is malicious software (or malware) that secretly intercepts and shares sensitive information without a user`s consent. It can be installed as a hidden component of the software or through fraudulent ads, websites, instant messengers, links, file-sharing connections, etc.

In most cases, malware is difficult to detect as it runs quietly on the background, capturing the user information and device activities.

This includes browsing history, keystrokes, authentication credentials, keystrokes, screenshots, emails, credit card numbers, passwords, and other personal information.

How to Get a Spyware for Cell Phone

Spyware can infect your device in the same ways any other type of malware does. For instance, by means of a Trojan, exploit worm-like viruses, etc. Here is the list of the most common techniques to infect your computer or cell phone:

  • Security vulnerabilities: You may infect your computer by following suspicious links or opening attachments know as they may contain viruses and spyware. More than this, it is also possible to infect your device with spyware just visiting a malicious website or clicking a fraudulent pop-up.
  • Deceptive marketing: Quite often, spyware authors introduce their malicious programs as a must-have tool, which may improve the device performance and provide a range of benefits.
  • Software bundles: All people like cost-free applications. But very often they are only a host program that hides malicious add-ons, plugins or extensions. The worst thing is that even if you uninstall the host app, the spyware will still be on your device.
  • Misc: In addition to the primary malicious intent, Trojans, worms and other viruses also distribute spyware.

What Harm Can Spyware Do?

Spyware tracks all your activities, including Web browsing and movements having a direct effect on your information.

A thing to worry about is spyware for cell-phones. These programs are aimed at gathering device information for nefarious purposes. For instance, identity theft, corporate espionage, spying on camera or recording someone`s surroundings.

The spyware for cell phones is a kind of malware, which is about to become more prevalent in the future as mobile devices get more like computers.

What Can Spyware for Cell Phones Do?

Whatever app you choose, all major spyware manufacturers offer a similar number of features:

  • Text messages: all text messages, both sent and received are available for tracking. Some companies even allow the deleted messages monitoring.
  • Web history: Internet browsing history, bookmarks, and cookies are also visible for checking.
  • GPS: current GPS location, as well as the recent movements, are available for tracking.
  • Downloads: photos, videos, calendar entries, contacts, and other data are also available for monitoring.
  • Email: sent and received emails can be viewed, including the other information like sender, recipient, date and time.

All these features are considered as basic ones provided by all spyware manufacturers. But some of them offer advanced features for the extra cost. The advanced features include:

  • Call recording: all target phone incoming or outgoing voice calls can be recorded, download and played back later on.
  • Instant messengers:  WhatsApp, Facebook Messenger, Viber, Snapchat and other platforms can be monitored.
  • Phone surroundings: target device surroundings can be recorded with the activated microphone.
  • Remote controls: this feature allows getting full control over the target device, blocking and unlocking it. If needed it is possible even to wipe all the data from the target device.
  • Installed apps: all the installed apps can be tracked, helping to restrict the unwanted ones.
  • Alerts: using this feature it is possible to set up a list of trigger words and be informed when they appear on the target device. The same can be done with phone numbers.

Facts About Spyware for Cell Phones-

  • The spyware for cell phones can be installed from suspicious websites, Bluetooth, MMS or PC connection. Its way directly depends on the target device compatibility.
  • Spyware for cell phones which is claimed to be installed remotely via Bluetooth connection, need to be paired with a target device first.
  • Spyware for cell phones remote installation is possible, but it is needed to trick a person into downloading and installing it on their device.
  • The easiest way to trick a target into the installation of spyware for a cell phone is to send bogus MMS with a hazardous link. Sending messages with fake links can easily trick the owner into the spyware download.
  • Spyware for phones can spy the following activities: calls, texts, installed apps, browsing history, GPS location, multimedia, and any other information.
  • Some individuals claim that it is possible to extract voice from target phone without installation and spy the phone only having a phone number. But it is absolutely impossible.
  • Spyware for cell phone can be used as a bug to record the target device surroundings and play it back later.

There is a great number of spyware for cell phones available on the market these days. We do hope that in this article, we’ve shed some light on the spyware functionality and possibilities.

read more

Raspberry Pi 3 Cluster- Build your own Supercomputer

Learn To Build Your Own Supercomputer With Raspberry Pi 3 Cluster

Create your own Raspberry supercomputer with Raspberry Pi 3 cluster for parallel computing using this tutorial.

Ever since the first generation of Raspberry Pi was released in 2012, as a single chip processor running on ARM11 and clocked at 700 Mhz, it has continued to remain popular and the perfect tool for students, artists, hobbyists, and hackers. Since then, several generations of Raspberry Pis have been released with the current Pi 3 offering a quad-core ARM Cortex-A53 processor clocked at almost double the speed at 1.2 GHz combined with 1GB of RAM. Besides this, the Raspberry Pi can be used in a host of other things, such as robotics, gaming, creating a desktop computer, and many more.

In this article, we will guide you how to create your own Raspberry Pi cluster for parallel computing via MPI (Messaging Passing Interface) library. For those unaware, Message Passing Interface (MPI) is a standardized and portable message-passing standard designed to exchange messages between multiple computers running a parallel program across distributed memory.

So, let’s get started and see what you need to build your own supercomputer with Raspberry Pi 3 cluster.

How to build raspberry pi supercomputer with raspberry pi cluster?

For the project, firstly select Jessie, the Raspbian operating system based on Debian Linux for Raspberry Pi, as this not only comes with some goodies that are installed by default but it also allows to install all the components that may be required for the project.

Moving forward, the next step is to choose the programming language. In this case, select Python, as it has plenty of libraries available and also a nice integration with MPI via mpi4py library.

Building raspberry pi cluster

Check the list of items (links included) that you will need along with their prices.

Hardware requirements:

  1. 4 x Rpi 3 model B = 4 x £30 = £120
  2. 4 x 16Gb microSD card (Kingston)= 4 x £4.84 = £19.36
  3. 4 x USB to Micro USB Cable 0.5m = 4 x £0.88 = £3.5
  4. 2 x Multi-Pi Stackable Raspberry Pi Case = 2 x £13 = £26
  5. 1 x 5 port desktop switch = 1 x £6.49 = £6.49
  6. 5 x Ethernet patch cable 0.3m = 5 x £2.90 = £14.5
  7. 1 x USB Hub= 1 x £2.53 = £2.53

Total = £192.38 (without delivery charges)

Note: While this is a common configuration, you can start with just 2 or 3 RPi’s and keep adding hardware later on.

Once all the components are gathered using the stackable case, it will look something like the image below:

The below image is of the cluster up and running (check out the configuration section for more):

Configuring your cluster of Raspberry pi

Basically, the idea is to configure one of the RPi’s, then clone the SD card and later plug it to the next RPi. Below is a detailed description of the steps that you need to follow to get the device up and running:

Installing the OS

Download Raspbian Jessie image. You can download the zip file. However, if are facing problems downloading the zip file, you can use the torrent link instead. See the version used below (4.4)


Download Win32DiskImager installer. You need this to burn Raspbian image to your SD card.

Download PuTTY SSH client to connect to your RPi’s.

Once the OS image is downloaded, burn it to the SD card using Win32DiskImager:

Plug the microSD card to the first Pi and power it up. Plug the Ethernet cable and return to your computer to access the Pi remotely.

Open a command prompt and type “ping raspberrypi“. By default, the RPi’s are named raspberrypi and can be easily spotted on the network. Once you ping it, you will be able to see the IP address of the device. Save this IP address for later use, as you will need it in PuTTY.

Launch PuTTY and type the IP address of the raspberrypi:

You should see something similar to the image below:

Login to your raspberry pi as: pi and password: raspberry (each RPi uses same login/password)

Type: sudo raspi-config to configure your device:

  1. Go to Expand File System
  2. Go to Advanced Options > HostName > set it to PiController
  3. Go to Advanced Options -> MemorySplit > set it to 16
  4. Go to Advanced Options > SSH > Enable
  5. Finish and leave the configuration

Now, you can start installing MPICH3 and MPI4PY. Please note that this project will take more than 4 hours to complete, so ensure that you have enough time at your disposal to complete it.

Installing MPICH3

Follow the steps mentioned below to install version 3.2 of MPICH:

Once everything is installed, you should be able to see something like the image below:

Installing MPI4PY

Follow the steps mentioned below to install version 2.0 of MPI4PY:

Once everything is installed, you should be able to see something like the image below:

Now, the configuration of the first RPi is complete. Then, you will have to clone this SD card and put them into the other RPi’s.

Preparing the other RPi’s

As stated in the step above, bring the SD card to your main computer and save the content of the SD card using Win32DiskImager. Now, copy this new image to the other SD cards. You should have 4 SD cards with the same image now. Since, you now have 4 cloned SD cards, it would be advisable to plug every RPi individually and change the host name of every new added RPi into the network, for instance, pi01, pi02, pi03, etc. or you can name them the way you want.

Follow the steps mentioned below for adding every new RPi into the network:


Use a network scanner to find the IP address of the newly added device. Once detected, use PuTTY to access it and use the commands below to set it up:

Type: sudo raspi-config to configure your device:

  1. Go to Expand File System
  2. Go to Advanced Options > HostName > set it to pi01
  3. Go to Advanced Options > MemorySplit > set it to 16
  4. Go to Advanced Options > SSH > Enable
  5. Finish and leave the configuration
  6. sudo reboot

Follow the same procedure for pi02 and pi03.

Once complete, you should be able to view all the 4 RPis using PuTTY and each RPi will have its own IP. Now, you need to store each IP address into a host file also known as machinefile. This file contains the hosts which start the processes on.

Go to your first RPi and type:

nano machinefile

Then, add the following IP addresses: (Note that you will have to add your own)

This will be used by the MPICH3 to communicate and send/receive messages between various nodes.

*In parallel computing, multiple computers or even multiple processor cores within the same computer are called nodes.

Configuring SSH keys for each RPi

Now, you need to be able to command each RPi without using users/passwords. To do this, you will have to generate SSH keys for each RPi and then share each key to each device under authorized devices. By doing this, MPI will be able to communicate with each device without bothering about credentials. Although this process is a bit monotonous, you will be able to run MPI without problems once it’s completed.

Run the following commands from the first Pi:

Just hit enter (if you don’t want to add specific passphrase) when running the ssh-keygen, and the RSA key will be automatically generated for you.

Now, the link between the first Pi to every single device has been configured, however, you still need to configure the other way around. Hence, you will have to run the following commands from every individual device:

Open the authorized_keys files and you will see the additional keys there. Each authorized_keys file on each device should contain 3 keys (as stated in the architecture diagram above).

Now, the system is ready for testing.

Note: If your IP address changes, the keys will be invalid and the steps will have to be repeated.

Testing the cluster

You can try the below small example to check if your cluster works as expected. If everything is configured correctly, the following command should work fine:

mpiexec -f machinefile -n 4 hostname

You can see that each device has replied back and every key is used without problems.

Now, run the following command to test a helloworld example:

mpiexec -f machinefile -n 4 python /home/pi/mpi4py-2.0.0/demo/

You should be able to see something like the image below:

Now, your system is ready to take any parallel computing application that you want to develop.

You can also build your own pocket-size Raspberry Pi powered Linux computer.


So this was how you can build your own Raspberry Pi supercomputer using the raspberry pi cluster. do let us know if you know of any other uses of Raspberry Pi. we will surely write a tutorial about it.

Source: thundaxsoftware

read more

What is Kodi and is it legal? Everything you need to know about the TV streaming app

What is Kodi and is it legal? Everything you need to know about the TV streaming app

Here’s what you should know about Kodi, What is kodi and is kodi legal?

Kodi (formerly XBMC) is a free and open-source cross-platform software media player and entertainment hub developed by the XBMC Foundation for digital media for HTPCs (Home theater PCs) and TV audiences, which is totally free. It lets you play videos, music, podcasts and other digital media files from the internet, local storage or a home network.

What is Kodi and its features?

For those unaware, Kodi was originally created for the Microsoft Xbox as XBMP – Xbox Media Player – in 2002. It quickly evolved to become Xbox Media Center (XBMC) in 2004 and was later renamed to Kodi in 2014 by XMBC Foundation. Kodi has a community of its own that is constantly being upgraded by countless of coders around the world. Since its creation, Kodi has been shaped by more than 500 software developers and more than 200 translators.

Kodi works as a centralized media centre that allows you to access all of your digital audio, movies, TV shows, music collection and photo library from a single, convenient place. The content can be accessed whenever and wherever you are. You can run it on televisions and set-top boxes and streaming devices.

Kodi includes different section such as audio, video, and image formats, playlists, audio visualizations, slideshows, favorites, weather forecasts, and third-party plugins. Kodi allows you to add plug-ins to the software to add functionality.

For those unaware, a plug-in, is a software component which can be added to a Kodi to add a specific features such as TV program guides, YouTube, Hulu, Netflix, Veoh, online movie trailer support, and Pandora Radio and podcast streaming or other capability to the software. For Kodi, a plug-in is most commonly used to enable users to stream online media content through the software.

Kodi also functions as a game launcher on any operating system. However, Kodi does not supply or include any media or original content. This means that you should provide your own content from a local or remote storage location, DVD, Blu-Ray or any other media carrier that you own. It also does not come with an internal digital TV-tuner backend for Live TV functionality. It supports electronic programme guides, and smartphone apps which allow users to turn their smartphone into a TV remote.

What can Kodi do?

Kodi turns any computer, smartphone or tablet into a digital set-top box or streamer, that allows you to stream files from the internet, a home network and local storage. The most popular way people use Kodi is to stream TV from the internet — including live TV, live sports, TV shows, and movies. Kodi allows you to download a range of community-made apps or *** add-ons, and watch whatever you like.

*** Add-ons are packages that add features and functions not normally included with Kodi. Add-ons are developed by people on Team Kodi and third-parties.

Kodi can play a slew of audio formats, including AAC, MP3, and OGG. It also comes with smart playlists and the ability to tag different tracks. Kodi also allows you to stream pictures and import images into a library and start a slideshow, among other features. The platform can also be personalized and customized in a wide variety of ways.

What’s compatible with Kodi?

Kodi, one of the most popular home-streaming services, is available on Windows, Mac OS X, Linux, Android, BSD and even Raspberry Pi computer, which means that you can download Kodi onto your personal computers, or laptops, and on most mobile devices and tablets as well. However, the process for iOS is slightly complicated, as Kodi is not available from the Apple App Store. iPhone users will have to ensure that their phone is jailbroken before downloading it. Kodi is also compatible with hundreds of different remote controls. For those who wish to use Kodi on their TV but don’t own a smart TV can still get it by downloading it onto a cheap media player, such as the Amazon Fire TV Stick, which runs Android.

Also Read- 4 best ways to unblock Kodi in 2018

Is Kodi legal?

The answer is yes as long as you are using it to play files you own the copyright for. While the Kodi software itself is not illegal, its open source development platform is the one to create third-party plugins and add-ons that can be used for illegal activities, such as accessing live, copyright-protected sports broadcasts, or watching pirated copies of Hollywood films or the latest can’t-miss TV series without paying. While some add-ons are entirely legal (such as YouTube, Hulu, and Spotify), others are most definitely illegal.

Lately, Kodi has been drawing criticism from media regulators and legal content providers due to the people who are selling Kodi boxes by adding illegal third party add-ons. For those unaware, a Kodi box is essentially a set-top box or a HDMI stick with the software installed on it, which allows people to stream shows and watch them on any platform including a computer, smartphone, tablet or set-top box. However, some boxes are being modified using third-party plug-ins to access paid content channels, illegally allowing people to watch the shows free of cost.

Although, it is legal to buy Kodi boxes and watch free content, it becomes illegal when a box is used to stream subscription channels for free. It is also illegal to buy or sell these modified boxes. Team Kodi too on their website have mentioned that watching illegal content which would otherwise be paid for is not endorsed or approved by them. The XBMC Foundation has taken steps to disassociate the Kodi project from these illegal products, including threatening legal action against those using its trademarks to promote them.

As we can see that while Kodi continues to do nothing wrong, the software remains highly controversial. Given that the platform is growing popular with each passing day, it’s unlikely that the controversy surrounding it is going to die down anytime soon.

read more

How to Bypass Windows 10 / 8 / 7 Local Administrator Password

How to Bypass Windows 10 / 8 / 7 Local Administrator Password

At times it happens with us that we forget windows password. In this article, we will guide you with how to bypass Windows 10 password prompt. It also works for Windows 7 and 8.

How to automatically bypass the Windows login screen every time you turn on your computer? Is there any way I can get into Windows admin account without changing its password you’ve forgotten?

How to Bypass Windows 10 Password prompt

Here in this post, we’re going to provide you the complete guide to bypass Windows 10 / 8 / 7 local administrator password. Regain access to your computer without having to reset your Windows password.

How to Bypass Windows Administrator Password in Windows 10, 8 and 7

Option 1: Automatically Bypass Windows Local Administrator Password

If you can remember the local administrator password, you can configure your computer to automatically bypass Windows 10 / 8 / 7 login screen and log into your specified account. Here’s how:

Press the Windows logo key + R at the same time to open the Run dialog. Type netplwiz and hit Enter.

Step One in method to Bypass Windows Pc password

In the User Accounts window that pops up,  select a local administrator user from the list, and then uncheck the option ” Users must enter a username and password to use this computer“. Click Apply.

Option 1: Automatically Bypass Windows Local Administrator Password

This brings up a window where you need to enter the current password for your local administrator account. Once you have typed the password and confirm it, click OK.

How to Bypass Windows 10 / 8 / 7 Local Administrator Password

Now, every time you turn on or restart your computer, Windows will automatically bypass the login screen and sign into your local administrator account without asking you to enter the password.

Option 2: Bypass Windows Local Administrator Password That You’ve Forgotten

Couldn’t log into Windows after forgetting the administrator password? If you simply reset the password using a password-reset disk, you’re sure to lose all logins and credentials saved in your Outlook application, Web browsers or other programs. To avoid data loss, you can bypass Windows 10 / 8 / 7 local administrator password with PCUnlocker. Follow these steps:

First off, you need to create a PCUnlocker Live CD/USB using another PC with Internet connection. Download the PCUnlocker .zip archive and extract its contents to a local folder.

Option 2: Bypass Windows Local Administrator Password That You've Forgotten

Download the free burning app ISO2Disc and install it. Launch this program and then click the Browse button to locate the ISO file you’ve extracted at above step. You can choose to burn it to a CD or USB flash drive.

Option 2: Bypass Windows Local Administrator Password That You've Forgotten

Now, insert your burned CD or USB drive into the target computer that you’re trying to bypass administrator password on. To boot with the CD/USB, you have to press an indicated key to access the Boot Options Menu, select your PCUnlocker boot media and press Enter.

Option 2: Bypass Windows Local Administrator Password That You've Forgotten

After loading WinRE environment from the CD/USB drive, you’ll see a screen that shows all local accounts existing in your Windows installation. Just click the Options button at the bottom left corner, and select the Bypass Windows Password option.


Click OK to confirm you’re going to temporarily bypass Windows authentication subsystem the next time you boot your computer.

Option 2: Bypass Windows Local Administrator Password That You've Forgotten

Now the password bypass is ready.  Click OK and then click the Restart button to reboot your computer. Make sure you remove the PCUnlocker boot media immediately, otherwise your computer will continue booting to the PCUnlocker program.

Option 2: Bypass Windows Local Administrator Password That You've Forgotten

When you reach to Windows login screen, just type any password and hit Enter, you’ll be logged into the system. However, the next time you turn on or restart your computer, Windows authentication subsystem will restore back to work and only the original password is accepted at login. Keep that in mind.

Also Read- How to fix Windows 10 Taskbar NOT working?


So this was how to bypass windows 10 password prompt It also works for Windows 7, 8. If you know any method then let us know via the comment box.

read more

What are seeds, peers and leechers in Torrents’ language?

What are seeds, peers and leechers in Torrents' language?

The difference between seeds, peers, and leechers in Torrents’ language

If you are a Torrent user, you must have seen the terms “Seeds”, Peers and “Leechers” while downloading torrents. We generally look at the corresponding numbers against them and download them. But have you ever wondered in technicality what do they actually mean and how are they related to torrents?

To understand this, you should first know what is a “BitTorrent’? BitTorrent is a communications protocol of peer-to-peer file sharing (“P2P“)*** which is used to distribute large amounts of data and electronic files over the Internet, such as digital video files containing TV shows or video clips or digital audio files containing songs.

***Peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad-hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a “swarm” (a group of people downloading and uploading the same file) of hosts to download and upload from each other at the same time.

Using the BitTorrent protocol, several basic computers, such as home computers, can replace large servers while efficiently distributing files to many recipients. This lower bandwidth usage also helps prevent large spikes in internet traffic in a given area, keeping internet speeds higher for all users in general, regardless of whether or not they use the BitTorrent protocol.

Let’s now understand the meaning of the common BitTorrent terms.

What are seeds, peers, and leechers in torrent?

Seed is a person who has a torrent file open in their client (let’s say the same file you are trying to download) and the only difference between you and them is that they have the complete file downloaded already and are now “seeding” – sharing the file with peers but not downloading any parts of the file from others.

Leechers are those who are downloading and uploading at the same time. If a user starts sharing a file that he already has, and downloads what other users have already uploaded or are in the process of uploading a torrent file, he becomes a leecher.

The process of uploading and downloading continues simultaneously. In fact, a leecher tends to download files that are not present in the system resources and starts sharing what already is present in its repository or database.

Generally, the more people who seed a file the faster it downloads. When the file of the leechers downloads 100% and still they don’t remove it from uploading, then they become seeds.

What are seeds, peers and leechers in Torrents' language?

In the image above, the middle computer is acting as a seed to provide a file to the other computers which act as peers.

A Peer is someone who is both downloading and uploading the file in the swarm. Files are downloaded in pieces. When a user downloads some pieces, he then automatically starts uploading it.

A file will be downloaded faster if more people are involved in the swarm. A peer becomes a seed when he has completed 100% of the file and wishes to continue uploading.

A user who wants to upload a file first creates a small torrent descriptor file that they distribute by conventional means (web, email, etc.). They then make the file itself available through a BitTorrent node acting as a seed.

Those with the torrent descriptor file can give it to their own BitTorrent nodes which, acting as peers or leechers, download it by connecting to the seed and/or other peers.

When a file is completely downloaded by a peer, it becomes an additional seed. This ultimate shift from peers to seeders defines the overall “health” of the file (as determined by the number of times a file is available in its complete form).

Source: Wikipedia

read more

How to Know Wi-Fi password of all Connected Networks using CMD

How to find Wi-Fi password of all Connected Networks using CMD

How To Find Wi-Fi Password Using CMD Of All Connected Networks with netsh wlan show profiles (CMD hacks)

In this day and age of the Internet, the Wi-Fi router and data connection have become a fundamental amenity for every user. One of the first thing that a user does after waking up is switching on his/her Wi-Fi router while there are some users who never switch off their routers. The Internet plays such an important role that people use it for completing their day to day chores as well as for relaxation. Considering that Wi-Fi has become a central part of our life, it is quite easy to forget the Wifi password.

You might want to hack it. but there is a simple process to find your wifi password using cmd.

So, here is a simple solution on how to know Wi-Fi network password of all the connected networks through command prompt. with netsh wlan show profiles cmd.

Here is a Trick to know Passwords of All Connected Wi-Fi Networks Using CMD

You may be using many WiFi connections through your desktop or laptop. Sometimes, a situation arises, where you may forget the connected Wifi network password. First of all, you should remember that whenever you connect to a WiFi network and enter the password to connect to that network, you are actually making a new WLAN profile of that WiFi network. In essence, every time you make an Internet connection, that particular profile get stored inside the PC/laptop along with the other required details of the WiFi profile.

In this article, we will be learning how to find a particular Wi-Fi password using the command prompt instead of a Windows GUI. These steps work even when you are totally offline or you are not connected to the particular WI-Fi profile you are looking the password for.

How to know the WiFi password using cmd using netsh wlan show profiles

  • Open the command prompt and run it as administrator. One of the first things to do is to open the command prompt in administrator mode. In older Windows 7/8.1 run PC/Laptops right click on command prompt and choose Run as administrator from the drop-down menu

How to find Wi-Fi password of all Connected Networks with CMD (DOS) Command

In Windows 10 run PC/laptops simple click Windows Key + X and run Command Prompt (Admin) directly.

How to find Wi-Fi password of all Connected Networks with CMD (DOS) Command


  • In the next step, we want to know about all the profiles that are stored in our computer. For that type following command in the cmd:

netsh wlan show profile

This command will list out all the WiFi profiles that your PC/laptop has ever connected to.

How to find Wi-Fi password of all Connected Networks with CMD (DOS) Command


From the above list, I want to find out the password for NETGEAR13  Type the following command to see the password of NETGEAR13 or any other Wi-Fi profile you want.

netsh wlan show profile WiFi-name key=clear

The result will be something like this

How to find Wi-Fi password of all Connected Networks with CMD (DOS) Command


Under the key content in security settings, you can see the password. You can use the same command to check and find out the password for each and every profile saved on your PC/laptop.

Turn On Mac Randomization On Windows 10 using CMD

The Command Line is also useful for further experimentation with WiFi profiles. Besides finding out the Wi-Fi password, you can also use this result to further optimize your WiFi. For example, Under the profile information, you can see mac randomization is disabled. You can turn on mac randomization feature to avoid your location tracking based on the device’s MAC address.

Here is how to turn on mac randomization on Windows 10:

  • Go to settings and click on ‘Network & internet’
  • Choose the ‘WiFi’ in the left pane and click on the advanced option.
  • Turn on the ‘Random Hardware Address’ feature under this settings.

How to find Wi-Fi password of all Connected Networks with CMD (DOS) Command


  • Once you have turned this on, your MAC address will be randomly set by Windows making it difficult for anybody to track you using your MAC address.

Sometimes choosing the right channel can increase your Wi-Fi speed substantially and remove interference. You can check out our post on How to increase your Wi-Fi speed by choosing the right channel

Also Read-


So this was how to know wifi password using cmd (netsh wlan show profiles command). do let us know in the comments below if you know of any other method.

read more

How to connect, manage and delete Wi-Fi networks using Command Prompt

How to connect, manage and delete Wi-Fi networks using Command Prompt

How to connect, delete and manage WiFi networks using command prompt (cmd) in your Windows PC/laptop using netsh wlan commands

Now-a-days internet connectivity is everything. For Internet, we have Wi-Fi connections which we manage and use through the network settings on Windows 7/8.1 and Windows computers. You can also connect, manage and delete your WiFi networks using the command prompt. In fact, the command prompt offers many more features than the standard network connection settings in Windows 10.

Also Read- A-Z Windows CMD Commands List

To do this we only require a CMD(Command Prompt) with Administrator privileges and will have to use netsh wlan commands.

How to connect to wifi using cmd with netsh wlan commands-

Before we dive into the guide. You’ll need to open the Command Prompt with administrator rights to perform most of the commands. To do this, use the Windows key + X keyboard shortcut, and select Command Prompt (Admin).

1# View various wireless network profiles saved on your PC

Command > Netsh WLAN show profiles

Every time you connect to a wireless access point, the operating system creates a “wireless network profile”, and it’s stored on your computer, you can view all these profiles using the following command line on the Command Prompt C:\Netsh WLAN show profiles.

Alternatively, you can use the “interface” parameter to show the list of profiles for a particular wireless adapter:

Netsh WLAN show profiles interface=”your WiFi interface name”

2# View WiFi adapter driver information

Command > Netsh WLAN show drivers

When you need to get driver information about your computer’s wireless adapter, you can use the the above command. The result will show the exact drivers being used, the WiFi radios on your PC/laptop alongwith driver version number.

You can further use this command to check your WiFi capabilities. Type in the following command

C:\Netsh WLAN show wirelesscapabilities

The results will show you exactly what your WiFi connection is capable of including WiFi Direct service capabilities.

3# View wireless adapter settings

Command > Netsh WLAN show interfaces

You can see the details of your WiFi interfaces using above command. The results will show you description of the interface, SSID, BSSID, Cipher, authentication type, channel, average receive and transmit rate and radio type.

If you have multiple WiFi connections saved on your PC, the “Show interfaces” command will display the information for all the wireless adapters on your computer. If you only need to see the information for one adapter, you can use the following command:

Netsh WLAN show interface name=”your wifi connection name”

4# Recover your WiFi password from any of the WiFi connection profiles saved on your PC

Command > Netsh WLAN show profile name=”your WiFi connection name” key=clear

If you lost and cannot remember your network security key to connect another device to a particular Wi-Fi access point, you can use the above command to view your WiFi password. You can also use this command to see the data limits if you have set them.

5# Connecting to a WiFi network using command prompt

Command > netsh wlan set hostednetwork mode=allow ssid=”your WiFi connection name” key=”your WiFi connection password”

You can use the above command to sign into your WiFi network. The above command is particularly useful if your WiFi settings in Windows 10 is not visible/cannot be connected due to some reasons. The additional commands are C:\netsh wlan start hostednet and C:\netsh wlan stop hostednetwork These two commands will start and stop your WiFi hotspot connection.

6# Stop your PC connecting automatically to a wireless network out of range

Command > Netsh WLAN set profileparameter name=”your WiFi connection name” connectionmode=manual

Normally, you would have configured your Windows 10 PC to connect to different WiFi networks automatically. While this is the best way to connect, sometimes notice that your laptop connects automatically to a WiFi connection that has zero or poor connectivity instead of an available full network WiFi connection. In such a case you can use the above command to prevent your computer from connecting to different networks automatically. If you want to move again to the automatic mode use the following command C:\Netsh WLAN set profileparameter name=” your WiFi connection name” connectionmode=auto

7# Delete wireless network profile stored on your PC

Command > Netsh WLAN delete profile name=”the WiFi connection you want to delete”

When you no longer need to connect to a particular wireless network, the access point is no longer available, or you need to reset the network profile settings, you can also use Netsh WLAN to delete any profile stored on your computer using the above command. If you can’t remember the name of the network profile, you can use the C:\Netsh WLAN show profiles command to list all the available profiles and select the one you want to delete.

8# Export and import wireless network profiles

Command > Netsh WLAN export profile key=clear folder=”the folder you want to save this report”

Sometimes you need to export and import wireless profiles. The above command exports all your wireless network profiles available on your PC. If you want to export a specific WiFi connection profile to a specific location, use this command > C:\Netsh WLAN export profile name=”your WiFi connection name” key=clear folder=”the folder you want to save this report”

9# Generate a complete report of the wireless adapters on your PC/laptop

Command > Netsh WLAN show WLANreport

Trouble shooting WiFi connection problems is very difficult as Internet has lots of conflicting tutorials and troubleshooting guide. Also you should know the exact problem you are facing while connecting to WiFi. Using the above command will generate a full detailed WiFi networks report to the following location > C:\ProgramData\Microsoft\Windows\WLANReport\WLAN-report-latest.html. Once the WLAN report has been created, copy and paste the path into your web browser’s address bar to open the report.

You can use this report to troubleshoot the problems, ask help on tech forums. The WLAN reports contain a graph with details of the connectivity status, including information, such as when the connection started, when it got disconnected, errors, and more. The report also summarizes network adapters information configured on your system, session success/failures, disconnect reasons, and a lot more. It’s a very detailed report that can help you to ping point many Wi-Fi connectivity issues.

Also Read- 


So this was how to connect to wifi using cmd (command prompt) with netsh wlan commands

read more

How To Find WiFi Password When Forgot It (WORKING -2019)

How to Recover a Lost WiFi Password

Forgot your wifi password? Don’t worry anymore. In this article, we will help you with how to find wifi password for routers, computers, and smartphones.

Nowadays, friends ask for the WiFi password as a first thing whenever they visit. And if you have forgotten. you might be wondering how to find my wifi password, which is “hard to guess” password, then you may feel a little troubled.

Therefore in this article, I’ll discuss ways to find WiFi passwords when you forgot it. These methods will definitely help you to get back your WiFi password.

How to find wifi password when you forgot it?

How to find forgotten wifi password on a computer?

Windows PC

If you’ve connected a Windows PC to the same Wi-Fi network in the past, it should be fairly simple to find the Wi-Fi password if you forgot it.

To begin, open the Start menu (or press the Windows button on your keyboard), then type “View network connections” and hit enter.


Next, find the connection labeled WiFi in the following menu, right click this entry and choose “Status”

On the menu that pops up next, click on the “Wireless Properties” button.

From here, you will see another window pop up, move to the “Security” tab in the window, then tick the box next to “Show Characters” and you will be able to see the forgotten password.


How to find forgotten wifi password on mac?

If you have forgot wifi password on Macbooks or other Apple computers connected to your WiFi network you have to open the “Finder” app, click the applications entry in the left hand pane. Now open the utility folder in the main window.


Now launch the “KeyChain” utility.

From here, make sure the “System” is selected and “Passwords” is highlighted as the category in the left-hand pane. Next, locate your router in the list and double click the entry.

In the window that pops up next to “Show Password” to display your password. You probably need to input your admin credentials to unlock it. and this will show wifi password in mac.


How to find forgotten wifi password on Android Smartphones?

Your Android smartphone must be rooted to see the saved WiFi password. You can use a password utility such as WiFi Key Recovery on your rooted device to find wifi password in case you forgot it.

How to find forgotten wifi password on iPhone?

On iOS smartphone, you first have to jailbreak it and then use a Cydia app like Network List to view your saved WiFi password.

Forgot Router password? Here’s how to find your router password

Default Password Method

If you have a router from your internet provider, chances are it has the default network name and password printed right on the router’s label somewhere (look for SSID or ESSID, and WPA, WPA2, etc.).

This only works if you haven’t changed the default login information (which you should have!), so skip below for a way to get your Wi-Fi password.


Log-on Method

For this next method to work, your computer will need to be connected directly to your router with an Ethernet cable if you’re not already connected to it via Wi-Fi.

Once you’ve taken care of that, if necessary, simply enter your router’s IP address into any web browser. For all common router brands, one of the following 3 addresses should work, but note that if you’ve manually changed your router’s default IP address, you’ll have to enter that instead: (Netgear, D-Link, Belkin, and more) (Netgear, D-Link, Linksys, Actiontec, and more) (Linksys and more)

Once you’ve typed in your router’s address, you’ll be prompted to enter the username and password. The credentials are by default “admin” for both fields.


Your router may have different default username and password, check your router and its manual to find it out. Once you are logged-in, you can change the password by going into the “Security” tab.


Reset Method

You can reset your router to set its password to its default if you forgot it. There is a key on your router labelled “Reset” which you have to press for 10 seconds or so, in order to reset your router.

But resetting is not a good idea as most of the routers are set to open when performed a reset on. Then you will need to set it up again.

Hacking Method

Since it is not illegal to hack your own router, you can give it a try. There are numerous ways to hack your router but they require a lot of patience, especially of you are using WPA2 with TKIP on your router.

There is a commercial tool ElcomSoft Wireless Security Auditor or EWSA , which can do it for you. In free tools, Aircrack-ng is considered one of the best. You can also use Reaver if you had WPS enabled on your router.

Also Read- 


So above were a few ways on how to find wifi password if you forgot it for computers, routers, and smartphones.

Hope this was helpful.

Feel free to share your queries in the comments below.

read more

10 Cool Video Game Facts and Fun Trivia | Most Interesting

10 Cool Video Game Facts and Fun Trivia | Most Interesting

A quick look at Video Game history before we begin with interesting video game facts. Yes, video game history is all we are going to talk about in this article, bringing the best video game fun trivia.

Video gaming goes back to the early 1950’s with the inventions of simulations, and artificial intelligence programs and simple games to begin with for computer science research.

However, video games gained real popularity with the introduction of arcade video games, gaming consoles and home computer games in the 1970s and 1980s. which was too much fun to play at that time.

Also Read- T-Rex Dinosaur is actually a hidden game in Google Chrome

Since then the video gaming world has evolved so much to see eight generations of video game consoles passing by with the latest generation including Nintendo’s “Wii U”, Microsoft’s “Xbox One”, and Sony’s “PlayStation 4”.

Interesting Video game Facts and fun trivia-

1. Facts about Nintendo’s Mario Series- best fun game to play

donkey kong- interesting video game facts and fun trivia
Image: DonkeyKong

Did you know this video game fact that Mario was created by the Nintendo’s Japanese video game designer, Shigeru Miyamoto and is the best selling video game franchise of all time?

The character (Mario) first debuted as “Jumpman” in the arcade game Donkey Kong on July 9, 1981.

Mario in this game is a carpenter who has a pet ape named Donkey Kong, who later escapes and kidnaps Jumpman’s girlfriend. the game is all about to take the role of jumpman and to rescue the girl.

The character was later on renamed as Mr. Video Game and finally as Mario on the name of the landlord of Nintendo’s first warehouse Mr. Mario Segale. whats the best fun trivia about the Mario series game is that the character Mario has been present in more than 200 games.

2. The first coin operated video gamesarcade video games- interesting video game facts and fun trivia

Arcade games or coin operated video games are usually installed in public business premises, such as restaurants, bars, and particularly amusement arcades.

The first coin-operated pinball machines emerged in the 1930’s, however, the golden era for coin-operated video games started in the late 1970s to the mid-1990s.

Space Invaders, Galaxian, Pac-Man, Battlezone, Defender, and Bosconian were few of the most popular Arcade games of all times.

Gamers loved to play these games with too much fun.

3. Game Controller or Input devices for Video Games game controller- interesting video game facts and fun trivia

A game controller is a device to control the game by providing inputs to control the character or an object in the game.

The earlier primary input for video games has been handheld controllers and since then it has evolved to cameras to detect motions, speakers or microphones for voice commands touch screens and more.

The addition of Game controller made it lots of fun to play video games.

4. The Sony PlayStationsony playstation- interesting video game facts and fun trivia

The Sony PlayStation was originally brought as a CD add-on to the Super Nintendo (a partnership between Nintendo and Sony).

But Sony later decided to develop the playstation as a complete gaming console of its own after it started facing problems with licensing.

Fun trivia- The original PlayStation was released on December 3, 1994. The PlayStation was the first video game console to ship 100 million units within 9 years and 6 months after its initial launch.

5. Cheating in Video Games using cheatcodes

Cheatcodes, yes its a fact that they have existed in video games for almost their entire history. Cheat codes usually provide an advantage to the gamer providing ease in the game.

Fun trivia- The first cheat codes were put in place for playtesting purposes. Playtesters had to rigorously test the mechanics of a game and introduced cheat codes to make this process easier.

6. Rovio’s Angry birdsRovio's angry bird- interesting video game facts and fun trivia

Rovio’s Angry Birds mobile video game took only 35 days to do what telephone took 75 years, the Internet took 4 years and Facebook 3.5 Years in order to reach 50 million users. Did you know about this video game trivia?

The game was first released for Apple’s iOS devices in December 2009 and since October 2010, 12 million copies of the game were purchased from Apple’s App Store.

The game was later released for Android, Symbian, Windows platform, gaming consoles, and PCs.

The original Angry Birds has been called “one of the most mainstream video games out right now”, “one of the great runaway hits of 2010”, and “the largest mobile app success the world has seen so far”.

7. Pac-Manpac man- interesting video game facts and fun trivia

Pac-Man is an arcade video game created by Namco and was released in Japan on May 22, 1980.

Toru Iwatani the man who developed Pac-Man earlier said that the idea about this game came into his mind while he was eating a pizza. he repeatedly stated that the character’s shape was inspired by a pizza missing a slice.

Fun trivia about this video game is that this was only the half fact and the character design was also inspired by the Japanese character for mouth, Kuchi, which Toru later confirmed.

8. Nintendo’s Gameboy

Nintendo’s Gameboy sold more than 100 million units worldwide and is the worlds most successful game system ever. little known video game trivia? Right!

9. Konami code 

Konami code or the gamers code is a set of cheat code which is present in most of the UntitledKonami video games and some other games too.

The code was first released in 1986 with shooting games of Konami however it gained popularity by the Nintendo Entertainment System version of contra named as “Contra Code” and “30 Lives Code”, the code provided a full set of power-ups to the player.

10. The Nintendo GameCube’s proprietary disc

This is one of the most interesting video game fun trivia, The Nintendo GameCube’s proprietary disc held 1.5 gigabytes of data which is 190 times more than what an N64 game cartridge could hold.

Also Read- 5 Best Browser Games 

So these where few of the best interesting video game facts and fun trivia that you might have not known about.

Do drop in comments about what you think is a fun fact to remember from video gaming.

read more