Use Turbo C++ in Unix / Linux based OS

Hey guys! Welcome back to my blog. In this post, I'm going to share how you can use Turbo C++ using any Linux or Unix based operating system like kali, Unantu or any other OS.




To run Turbo C++ in Linux/Unix based OS, you must have the following:

  1. Turbo C++ setup If you have the setup then excellent.
  2. DOSBox Emulator If you have it installed on your system the good but if you don't go to Ubuntu Software Center and search for DOSBox and install the emulator

or using terminal:

sudo apt-get install dosbox

Now follow these steps...

1.Extract the rar file and you'll get a setup folder.

If you don't have unrar utility you just need to install small package called " unrar "

Step 1 : goto your Terminal then type

sudo apt-get install unrar
you can now extract your .RAR file by "right-click" then chose " extract here "

or via terminal

unrar dosbox.rar

Move the extracted folder to your home folder

STEP 2: Open the DOSBox emulator

Write the following commands :

  •  mount c ~
  •  C:
  • cd setup
  • install.exe
STEP 3: The turbo C++ installation utility will appear.*Press Enter*.

Enter the source drive as C.Press Enter.

Change the source path to setup if it isn't.Press Enter.

STEP 4: Select Start Installation and Press Enter.

The installer will install the files.Once finished u can delete the setup folder.


To run the Turbo C++ every time run the following commands:

  • mount c ~
  • C:
  • cd tcin
  • tc.exe

To enter into fullscreen mode press Alt+Enter and press it again for window mode.



For any queries, you can contact us on email: lazycyberhunter@gmail.com Or on instagram: @lazy_cyber_hunter

Hacking and Cyber Security

Hey guys.
Welcome back to my blog.

In this post, I'm going to share some important cyber security and hacking details with you.




First of all,
What is Cyber crime?
Cyber crime is any crime that involves a computer or a computer network or both. Cyber crime is also known as Computer oriented crimes.


Cyber Security:
The practices designed to protect network, devices, data leak, Attacks and damages from unauthorised access is known as Cyber Security



Now, you might be wondering what all comes in cyber crimes. 

  • Hacking
  • Information theft
  • Email bombing
  • Web jackig
  • DoS & DDoS
  • Trojan Attacks


Let me clear you guys, each and every crime which involves computer or mobile can be included as a cyber crime. In fact if you abuse you someone on call or on any social media can be recognised as a cyber crime and you can be imprisoned or fined heavily or both.

As the technology is increasing day by day, the risk of being hacked is also increasing proportionally.


Most of us thinks hacking is a completely an illegal activity which is not true.
There are basically 5 types of hackers:
  1. Black hat hackers: A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. They do it to steal or gain access to passwords, financial information, and other personal data.
  2. White hat hackers: A white hat Hacker us an individual or a group of hackers who use their skills to find vulnerability or loopholes in a website or network and help owner to fix them in order to protect them from black hats.
  3. Grey hat hackers: just like the color, they are a combination of black hat and white hat Hackers. They use their skills as a white hat hackers and work for company to secure them but when they're alone, the work same as the black hat.
  4. Suicide hackers: They are the hackers who have no idea about hacking laws and consequences they will face after their hacking activity. They are mostly beginners or script kiddies.
  5. Phreaks: they are the Hackers who are involved only in phnone hacking. This was very famous in 90's but now, day by day they are getting low in numbers because of the increase in technologies.

There are 2 types of white hat hackers too:
  • Red team: an individual or a group of people is hired as a red team to check the security of a website or network in an offensive manner. They are authorised to check the security by using as many techniques they want just like a black hat Hacker. They are highly experienced hackers.
  • Blue team: A blue team is an individual or a group of people hiered as to make the site or network security strong. We can say them the rival of red team. They are mostly new penetration testers with less experience.


I'll be posting details about hacking techniques in my next blog.

For any queries, you can contact us at:
Email- lazycyberhunter@gmail.com
Instagram- @lazy_cyber_hunter