Use Turbo C++ in Unix / Linux based OS

Hey guys! Welcome back to my blog. In this post, I'm going to share how you can use Turbo C++ using any Linux or Unix based operating system like kali, Unantu or any other OS.




To run Turbo C++ in Linux/Unix based OS, you must have the following:

  1. Turbo C++ setup If you have the setup then excellent.
  2. DOSBox Emulator If you have it installed on your system the good but if you don't go to Ubuntu Software Center and search for DOSBox and install the emulator

or using terminal:

sudo apt-get install dosbox

Now follow these steps...

1.Extract the rar file and you'll get a setup folder.

If you don't have unrar utility you just need to install small package called " unrar "

Step 1 : goto your Terminal then type

sudo apt-get install unrar
you can now extract your .RAR file by "right-click" then chose " extract here "

or via terminal

unrar dosbox.rar

Move the extracted folder to your home folder

STEP 2: Open the DOSBox emulator

Write the following commands :

  •  mount c ~
  •  C:
  • cd setup
  • install.exe
STEP 3: The turbo C++ installation utility will appear.*Press Enter*.

Enter the source drive as C.Press Enter.

Change the source path to setup if it isn't.Press Enter.

STEP 4: Select Start Installation and Press Enter.

The installer will install the files.Once finished u can delete the setup folder.


To run the Turbo C++ every time run the following commands:

  • mount c ~
  • C:
  • cd tcin
  • tc.exe

To enter into fullscreen mode press Alt+Enter and press it again for window mode.



For any queries, you can contact us on email: lazycyberhunter@gmail.com Or on instagram: @lazy_cyber_hunter

Hacking and Cyber Security

Hey guys.
Welcome back to my blog.

In this post, I'm going to share some important cyber security and hacking details with you.




First of all,
What is Cyber crime?
Cyber crime is any crime that involves a computer or a computer network or both. Cyber crime is also known as Computer oriented crimes.


Cyber Security:
The practices designed to protect network, devices, data leak, Attacks and damages from unauthorised access is known as Cyber Security



Now, you might be wondering what all comes in cyber crimes. 

  • Hacking
  • Information theft
  • Email bombing
  • Web jackig
  • DoS & DDoS
  • Trojan Attacks


Let me clear you guys, each and every crime which involves computer or mobile can be included as a cyber crime. In fact if you abuse you someone on call or on any social media can be recognised as a cyber crime and you can be imprisoned or fined heavily or both.

As the technology is increasing day by day, the risk of being hacked is also increasing proportionally.


Most of us thinks hacking is a completely an illegal activity which is not true.
There are basically 5 types of hackers:
  1. Black hat hackers: A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. They do it to steal or gain access to passwords, financial information, and other personal data.
  2. White hat hackers: A white hat Hacker us an individual or a group of hackers who use their skills to find vulnerability or loopholes in a website or network and help owner to fix them in order to protect them from black hats.
  3. Grey hat hackers: just like the color, they are a combination of black hat and white hat Hackers. They use their skills as a white hat hackers and work for company to secure them but when they're alone, the work same as the black hat.
  4. Suicide hackers: They are the hackers who have no idea about hacking laws and consequences they will face after their hacking activity. They are mostly beginners or script kiddies.
  5. Phreaks: they are the Hackers who are involved only in phnone hacking. This was very famous in 90's but now, day by day they are getting low in numbers because of the increase in technologies.

There are 2 types of white hat hackers too:
  • Red team: an individual or a group of people is hired as a red team to check the security of a website or network in an offensive manner. They are authorised to check the security by using as many techniques they want just like a black hat Hacker. They are highly experienced hackers.
  • Blue team: A blue team is an individual or a group of people hiered as to make the site or network security strong. We can say them the rival of red team. They are mostly new penetration testers with less experience.


I'll be posting details about hacking techniques in my next blog.

For any queries, you can contact us at:
Email- lazycyberhunter@gmail.com
Instagram- @lazy_cyber_hunter

Surface web, Deep web and Dark web: the mystery


In this tutorial, I'm going to explain you about surface web, deep Web, dark web and Mariana web.


These contents are written and posted by LAZY CYBER HUNTER and is a content to copyright. ©



The internet basically consists of 3 parts and a part which is not confirmed about.
  • Surface Web
  • Deep Web
  • Dark Web
  • Mariana web (not confirmed yet)

Let's deal about them one by one.

So, we should start using surface web.

The websites which can be accessed using any normal browser like Google chrome, mozila or any other browsers are known as surface web. Every website we normally use daily like Google, Facebook, Gmail, Wikipedia etc. Comes under surface web.

What if I say the Google and other search engines does not contains even 10% of the internet? Amused na? But yes. It's the fact that these all search engines on combining too contains only about 4% of the internet. The rest 96% is covered by deep Web and dark web.

As I think you all know well about the surface web as you are surfing through it regularly.


So Now comes the Deep Web.

Deep Web consists of the sites which can not be accessed through normal web browser like chrome and all. They need to be surfed using only onion browser also known as the Tor browser.

These browsers are basically to hide the identity of the person surfing internet and to hide data too..

Deep webs are used mainly by business mans, government employees, company owners and people of such kind who have lots of data which they don't want to share. Deep Web is just like website behind firewalls. They are encrypted and need key to be opened. And the main part is that they can not be opened if you don't have the link to get there. They require link and keys too.. The deep Web is almost 90% of the internet.


Then comes the Dark Web

Many people are confirmed between the deep want and the dark web. They think both are the same. But the fact is that they both are not the same. They both are accessed using the Tor browser but they have a lot of differences.

Dark Web same as the deep Web and also a part of it, therefore it can not be accessed using normal browser like chrome and all but the basic difference between them is deep Web is used by employees to hide there data where as dark web is mainly used for illegal purpose.

Dark Web don't need keys to be accessed. The only thing needed is their link. But the point is that it mainly compromise Hitman hiring, weeds selling, arms smuggling, selling of human body parts, hiring hackers, and many more such thing. Therefore surfing dark web can be dangerous. The dark web is the remaining 6% of the internet.

Note: Unlike the domain of surface web (.com / .in / .org) the domain of deep webs and dark web is .Onion
Note: it is not illegal to surf through deep Web or dark webs but it's totally illegal to surf through sites of arms dealings, child pornography, weeds selling, hiring hitmans and all of such kind.


And now comes the Mariana web.

According to few people, there is something deeper then the deep Web and dark web which is known as Mariana web. But the fact is that it is still not defined. Some people say that they have gone through the Mariana web but there is no such proof to believe on that.

But as per knowledge till date, Mariana web is just a saying but it is said that it will require 100's of super computers to go through the Mariana web. It is also said that Mariana web contains all the secrets of the world and it is the way to Illuminati too..

But nobody knows what's true and what's fake. We can only know what is said.



At last I would like to warn you guys to be safe while surfing deep Web and dark web because many illegal activities are done their and nobody knows who's the next victim.





So guys, be safe, enjoy and in case of any doubt or any request regarding new post you may contact me on email ( lazycyberhunter@gmail.com) or Instagram ( @lazy_cyber_hunter ) or in comment section.