Skip to main content

Most Viewed Post

Wireless Hacking : How To Hack WPS Wi-Fi Netwoks

Pokémon GO - Choosing the right Pokémon for battles

Yeah, Combat Power (CP) does matter. But the more important thing to win battles is choosing the right Pokémon.
Each Pokémon has its strengths and weaknesses. If you choose the right Pokémon for battle, you can kick his ass even if the CP of your opponent's Pokémon is much more than your Pokémon.



Pokémons are divided into different types like Fire, Water, Grass, Electric, Ghost etc.



In this article, I'm gonna mention the strengths and weaknesses of all types of Pokémons which can help you in selecting the right Pokémon for your battles.



The first column displays the type of Pokémon you should choose against the ones in the second column.


TYPE     ->    STRONG AGAINST

devangverma.com
devangverma.com




Right strategy and correct use of brain is everything, my friend!
Good luck.

Comments

Popular posts from this blog

Post Empty Status Update (Facebook)

Whenever we open Facebook, the first thing it asks is - " What's on your mind? ". You can type anything there and share it with your friends and family. Guess what will be the reaction on your friends if you post an empty status update ...... Cool! Ain't it? See full post to know the way to do it.

How To Create Strong Password

My last post taught you about making your PC say something. This post is gonna teach you creating strong passwords. Password is a secret word or phrase that must be used to gain admission to something... It allows you gain access to a computer, interface or a system. As pentesting is one of my interests, it's my daily work to crack passwords and make my system more secure. We, network security administrators know the methods to crack weak passwords easily and trust me, even a noob or script kiddie can crack them just by using some tools. A lot of noobs try social engineering too to gain access to your important stuff. If you have a strong password, it's difficult for people to guess it and hence, your account remains safe and secure.

Detecting the Operating System manually through open ports

It's Friday evening. You got no plans for the weekend and you're sitting at your machine with a cup containing caffeine by your side. You hate that motherfucker in your class who gets everyone's attention as he always pretends being a hacker by using the phishing method to store and change people's Facebook's passwords. He hacked the college Wi-Fi without having any skills. You know he's just a script kiddie. Time to check what he really is!