<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Yash bhatti</title>
    <description>The latest articles on DEV Community by Yash bhatti (@yashbhatti).</description>
    <link>https://dev.to/yashbhatti</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F531171%2Fd1caaa30-1654-4d57-8d29-15fabaf7cb6b.jpg</url>
      <title>DEV Community: Yash bhatti</title>
      <link>https://dev.to/yashbhatti</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yashbhatti"/>
    <language>en</language>
    <item>
      <title>Insider, Criminal organization</title>
      <dc:creator>Yash bhatti</dc:creator>
      <pubDate>Wed, 07 Sep 2022 16:33:24 +0000</pubDate>
      <link>https://dev.to/yashbhatti/insider-criminal-organization-4pnj</link>
      <guid>https://dev.to/yashbhatti/insider-criminal-organization-4pnj</guid>
      <description>&lt;h2&gt;
  
  
  Insider
&lt;/h2&gt;

&lt;p&gt;Those are the objects or persons that add the virus software or piece of code into the organization's system or database for their personal gain or for the profit of another organization.&lt;br&gt;
there can be an employee of that organization or company or part-time employee, any contractor or businessman person that can be a familiar of that company.&lt;br&gt;
This type of person has some privileges and rights to access some private type of data that can't access by any unauthorized person. He or she misuses their privileges and give's that private information to another person who uses that information and harms that organization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Criminal organization
&lt;/h2&gt;

&lt;p&gt;A Cyber-Criminal is a criminal that makes a crime through a computer device or any other electrical smart device. they use the as a weapon.&lt;br&gt;
They target any type of software system, Database, or personal computer.&lt;br&gt;
They attack anyone for any personal gain or for the organization's profit and make a target in the loss.&lt;br&gt;
They use computers in this crime in three components&lt;br&gt;
As a weapon&lt;br&gt;
As a target&lt;br&gt;
As an accessory&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;As a weapon
The hacker or cracker uses the computer as a weapon to load the virus or threats into the target's computer.
for sending spam messages to another's computer for fraud, theft of data, and getting back account/Id.&lt;/li&gt;
&lt;li&gt;As a target
The hacker sends the malware and viruses to the target and clear all information and get access to those computer or PC. -They do some takes or get access like their ID and get those privileges and perform illegal tasks.&lt;/li&gt;
&lt;li&gt;As a accessory
The hackers use the computer as an accessory to store the data it. And they store some illegal information in it and hide those from everyone.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The cybercriminals work in a group that was divided into 4 parts mainly:
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Programmer:
&lt;/h3&gt;

&lt;p&gt;They write the programs and make the software to hack the system or create tools that help to access data unauthorisedly.&lt;/p&gt;

&lt;h3&gt;
  
  
  Distributers:
&lt;/h3&gt;

&lt;p&gt;They sell the data and information that comes after getting hack the system or any database for money or other there demands.&lt;/p&gt;

&lt;h3&gt;
  
  
  IT Expert:
&lt;/h3&gt;

&lt;p&gt;They manage the overall server of their group and manage the devices and boost the performance of the device and help to go faster in work.&lt;/p&gt;

&lt;h3&gt;
  
  
  Hackers:
&lt;/h3&gt;

&lt;p&gt;They actually exploit and damage the server and get those vulnerabilities.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Some.. components of computer.</title>
      <dc:creator>Yash bhatti</dc:creator>
      <pubDate>Fri, 02 Sep 2022 09:43:49 +0000</pubDate>
      <link>https://dev.to/yashbhatti/components-of-computer-13f0</link>
      <guid>https://dev.to/yashbhatti/components-of-computer-13f0</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GWIRq6Ap--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fye9tp2pe9admswa9llr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GWIRq6Ap--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fye9tp2pe9admswa9llr.jpg" alt="Image description" width="159" height="225"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
   CPU :
&lt;/h2&gt;

&lt;p&gt;All kinds of computing or electronic devices such as laptops, tablets, and phones have a small chip that calls CPU (Central Processing Unit). It is a brain for the devices. it calculates and interprets instructions while any work is going on on the device.&lt;/p&gt;

&lt;h2&gt;
  
  
   Monitor :
&lt;/h2&gt;

&lt;p&gt;The monitor is used for getting the output either in text format or graphical .those are connected with mainly HDMI and SVGA/VGA cables.&lt;/p&gt;

&lt;h2&gt;
  
  
   Keyboard :
&lt;/h2&gt;

&lt;p&gt;The keyboard is an input device that enters the computer's values, strings, numbers, and symbols. That looks as same as a type-writer with some additional keys. When the key was pressed the instruction was fired to the processor.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mouse :
&lt;/h2&gt;

&lt;p&gt;The mouse is also an input device. it controls the cursor of the computer and helps to make tasks easy to perform and fast response .it is used as a pointer device. The mouse is classified as a mechanical and optical mouse. The mouse uses laser technology to track the pointer. That can be wired or wired less mouse&lt;/p&gt;

&lt;h2&gt;
  
  
   Speakers :
&lt;/h2&gt;

&lt;p&gt;The speakers are used to get the output in audio. It is an optional part of the computer. It gets audio output while listening to the audio track or song, watching movies, playing games, Etc. The speakers are connected to the sound card and convert the sound card’s electronic frequency into the output form of audio.&lt;/p&gt;

&lt;h2&gt;
  
  
   Webcam :
&lt;/h2&gt;

&lt;p&gt;A webcam is an optional part of the computer system; it is mainly used in capturing photos and videos from the computer and sending them in digital form. it is not in-built into the computer.&lt;/p&gt;

&lt;h2&gt;
  
  
   Printer :
&lt;/h2&gt;

&lt;p&gt;It is an optional device that is used by a computer. it can be connected with wired or wired-less both. It is an output device that generates the softcopy of any instruction into a hard copy on paper. That can be given output in text format or picture format. it can be two types of copy generating can be possible&lt;/p&gt;

&lt;p&gt;Black &amp;amp; white&lt;br&gt;
Colored&lt;/p&gt;

&lt;h2&gt;
  
  
   Modem :
&lt;/h2&gt;

&lt;p&gt;The main purpose of this device is to provide the internet to the computer.&lt;/p&gt;

&lt;h2&gt;
  
  
   Projector :
&lt;/h2&gt;

&lt;p&gt;A projector or image projector is an optical device for the computer. That creates the image or presentation on the surface and creates the projection screen.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>About Kali - Linux</title>
      <dc:creator>Yash bhatti</dc:creator>
      <pubDate>Sun, 27 Mar 2022 08:06:36 +0000</pubDate>
      <link>https://dev.to/yashbhatti/about-kali-linux-3kd0</link>
      <guid>https://dev.to/yashbhatti/about-kali-linux-3kd0</guid>
      <description>&lt;h1&gt;
  
  
  &lt;strong&gt;what is Kali - Linux ?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;The kali-Linux is the OS(operating system) that has many kinds of Hacking tools  .&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;why kali-Linux is used by many hackers ?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;For all the Hackers ,&lt;br&gt;
kali Linux is the best option to create any Cyber attack ,it provide many kinds of tools to hack Wi-Fi ,to track IP(internet protocol),hack any kind of software .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--B_9yr8K5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648354259368/l4jqWXDPq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--B_9yr8K5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648354259368/l4jqWXDPq.jpg" alt="download.jpg" width="300" height="168"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  About Kali - Linux !!!
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Kali - Linux is very attractive Operating System .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It is all about Hacking in that Operating System , it's all about Terminal .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;All hacking tools are using Terminal as the core of the Linux .&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  There are to types of Linux Terminal :
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Simple Terminal&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Root Terminal&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Simple Terminal&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It is mainly used to run simple commands just like &lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;mkdir  -&amp;gt; to make directory .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ls -&amp;gt; to see the directories or inside files. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cd -&amp;gt; to change the directories .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;echo -&amp;gt; to put some data in the file . &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;cat -&amp;gt; to get the content of the file .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;man -&amp;gt; to get online help .&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;etc....&lt;/p&gt;

&lt;p&gt;there are many types of commands  that can you use in Simples Terminal.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Root Terminal&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;It is use to download or use the rooted mood off any files or apk. and basically use for hacking attacks .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;it make's very easy to hack any server throw the help of Kali - Linux .&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why only Root mode ?&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Root mode is use to boot the operating system to perform the task witch can use only by bootable devices .&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  So that is the basics of Kali - Linux .
&lt;/h1&gt;

&lt;p&gt;if you have some more information from this Article ... give me your replay in the comments !!! I am waiting for your replay .&lt;/p&gt;

&lt;h1&gt;
  
  
  keep learning.......😊👨‍💻 keep growing........😊📈
&lt;/h1&gt;

&lt;h1&gt;
  
  
  So..... This is my hasnode id :
&lt;/h1&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://crazycomputer6892.hashnode.dev/"&gt;https://crazycomputer6892.hashnode.dev/&lt;/a&gt;
&lt;/h2&gt;

&lt;h1&gt;
  
  
  AND this is my first #DevCard :
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://app.daily.dev/yashbhatti"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BQgGaCgK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://api.daily.dev/devcards/a3fdae7295f2449284504220eb36c7b7.png%3Fr%3Db22" alt="Yash bhatti's Dev Card" width="800" height="1092"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>beginners</category>
      <category>webdev</category>
      <category>github</category>
    </item>
    <item>
      <title>How to make RJ-45 cable</title>
      <dc:creator>Yash bhatti</dc:creator>
      <pubDate>Sat, 26 Mar 2022 12:54:31 +0000</pubDate>
      <link>https://dev.to/yashbhatti/trying-best-gjj</link>
      <guid>https://dev.to/yashbhatti/trying-best-gjj</guid>
      <description>&lt;h1&gt;
  
  
  &lt;strong&gt;what is the use of the RJ-45 cable?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;RJ-45 is the registered jack 45 it standard type of physical networking cable.&lt;br&gt;
it is used as a connecter for ethernet connections and for networking mostly.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What is the advantages of this cable?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;It is mainly used in the office and networking-based rooms or computer labs to connect each device with the internet and transfer data. it provides a higher speed to transfer data or use the internet. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;which items were used to make the RJ-45 cable.&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;To make the RJ-45 cable we need those list-outed tools  : &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;UTP (Unshielded twisted pair) &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Modular connector (8P8C plug, aka RJ45) &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Crimping tool&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cable tester &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How can we make this connecter?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;We will make these cables step by step:&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 1:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;❗❗❗❗❗     WARNING     ❗❗❗❗❗&lt;/strong&gt;
&lt;/h1&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Please use the  sharp tools carefully ..&lt;/strong&gt;
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Take the UTP cable and Strip the cable back 1 inch (25 mm) from the end. &lt;br&gt;
To strip the cable use the Crimping tool or you can also use any object like Scissor or cuter or any blade razor or sharp material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After that, you will see the wires in that cable are in a color combination and twisted format.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  cut the cable as shown in this image :
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6zFdPn8---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648871073255/cLM_s6Pr6.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6zFdPn8---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648871073255/cLM_s6Pr6.webp" alt="v4-460px-Crimp-Rj45-Step-1-Version-3.jpg.webp" width="460" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 2:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Untwist the wires which are in the UTP cable.
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;If you will do step 1  after that you will see some wires are in the bunch are in twisted format. and cut out the small plastic as a core. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Separate those wires and straighten them out so they’re easier to sort into the right order with Help of your fingers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There will be 8 wires, arrange all in order.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Now sort those small wires in-order or color code like :&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;white-orange &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;orange &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;white-green&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;blue &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;white-blue &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;green&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;white-brown &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;brown&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;just be like :&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cAsCjlvj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648878789525/WL_tXsNsM.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cAsCjlvj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648878789525/WL_tXsNsM.webp" alt="aid1403126-v4-728px-Crimp-Rj45-Step-3-Version-3.jpg.webp" width="728" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 3:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Cut all in the same size and check that all are in order or not.
&lt;/h2&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;❗❗❗❗❗     WARNING     ❗❗❗❗❗&lt;/strong&gt;
&lt;/h1&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Please use the  sharp tools carefully ..&lt;/strong&gt;
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Cut all wires in the same way and an even line 1⁄2 inch from the sheathing with the use of the Crimping tool.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;BE CAREFULLY WITH YOUR FINGERS❗❗❗❗DYUTING USING A CRIMPING TOOL❗❗❗❗&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bFrJkOac--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648886121699/tA5OjHo8B.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bFrJkOac--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648886121699/tA5OjHo8B.webp" alt="aid1403126-v4-728px-Crimp-Rj45-Step-4-Version-3.jpg.webp" width="728" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 4:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Insert the cable into the RJ-45 connecter.
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Before that get the connecter of RJ-45 and put the small wires into the connecter.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The sheathing of the cable should fit just inside of the connector so it’s past the base.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Insert the cable into the connector so that each of the small wires fits into the small grooves in the connector.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Before crimp the connecter  Recheck, the wires connected with Grooves is successful or not???&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GWWLxTCl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648889680271/kwyqeQHLB.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GWWLxTCl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648889680271/kwyqeQHLB.png" alt="image.png" width="728" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 5:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Crimp the connecter.
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Put the connecter in the crimping part of the crimping tool, and if it was properly set,&lt;br&gt;
And just press hardly the crimping tool until all pins will push down.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The crimping tool pushes small pins in the grooves down onto the wires to hold and connect them to the RJ-45 connector.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Remove the cable from the tool and check that all of the pins are down.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TGOfDdwX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648890167323/wmPgU75vr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TGOfDdwX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648890167323/wmPgU75vr.png" alt="image.png" width="728" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Step 6:&lt;/strong&gt;
&lt;/h1&gt;

&lt;h1&gt;
  
  
  check the pins.
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Remove the cable from the tool and check that all of the pins are down. Check whether the pins are connected properly or not to each other.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Remove the cable from the tool and check that all of the pins are down.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Vf2UfAX1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648893292337/5H3bnYtUh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Vf2UfAX1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn.hashnode.com/res/hashnode/image/upload/v1648893292337/5H3bnYtUh.png" alt="image.png" width="728" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  *&lt;em&gt;THE CABLE IS READY 👍✌ *&lt;/em&gt;
&lt;/h1&gt;

&lt;h3&gt;
  
  
  ** In this article, the used photos are from:** &lt;strong&gt;&lt;a href="https://www.wikihow.com/Main-Page"&gt;WikiHow&lt;/a&gt;&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;if you have some more information from this Article ... give me your reply in the comments !!! I am waiting for your reply.&lt;/p&gt;

&lt;h1&gt;
  
  
  keep learning.......😊👨‍💻 keep growing........😊📈
&lt;/h1&gt;

</description>
      <category>datascience</category>
      <category>computerscience</category>
      <category>engineering</category>
      <category>rj45</category>
    </item>
    <item>
      <title>hi i am the new one who join the DEV and want to learn all computer languages and be perfect , so i know you must be help me .</title>
      <dc:creator>Yash bhatti</dc:creator>
      <pubDate>Fri, 04 Dec 2020 06:08:26 +0000</pubDate>
      <link>https://dev.to/yashbhatti/beginner-49j2</link>
      <guid>https://dev.to/yashbhatti/beginner-49j2</guid>
      <description>&lt;h1&gt;
  
  
  hacker
&lt;/h1&gt;

</description>
    </item>
  </channel>
</rss>
