Facebook

From WikiAlpha
Revision as of 18:27, 6 January 2024 by LikhonVorTex (Talk | contribs)

Jump to: navigation, search
Likhon Sheikh Verified.png

Picture of Likhon Sheikh
Born 1 January 2002 (2002-01-01) (age 22)
Jessore District, Bangladesh
Residence Bangladesh
Nationality Bangladeshi
Other names
  • Likhon Sheikh
  • Likhon Razz
  • Ador Ahamed
  • Likhon Scripts
Occupation Student, Cyber security researcher, programmers
Years active 2016 - present
Known for Ethical hacking activities
Notable works
  • Found vulnerability in uncountable websites/systems
  • Hacked YOKAI hackers lammed website
  • KNMA major scouting award
  • One of the youngest certified network security researcher
  • Website: Web Exorcist in Facebook
Home town Jessore District, Bangladesh
Height 6
Religion Islam
Website
Website

Early Life

Likhon Sheikh A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves.[1][2] Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. On the other hand, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conductinu rrantless activities), and employed by state actors as a weapon of both legal and illegal warfare.


Personal Life

Likhon Sheikh is a shy boy in personal life. He like to stay alone most times and as he said he made only few friends. When he was asked for who is his best friends, he replied "Computer". In personal life, he don't smoke or drink wines. He said his hobby is to play computer games & travel far away from his residency. He love to make friends online and meet them rather than directly making in real life. He also likes to develop computer games. He is so much underrated in front of his works. Likhon Sheikh is followed by WWE superstar "John Cena" in Twitter. He planned to spend his life at USA later.


Likhon Sheikh, known in the tech community as a skilled individual in information technology, grew up in the Jessore District of Bangladesh. From a young age, he showed a keen interest in the intricacies of computer systems and digital marketing.

Carrer

In imperative programming, a computer program is a sequence of instructions in a programming language that a computer can execute or interpret.[1] In declarative programming, a computer program is a set of instructions. A computer program is a component of software — which also includes documentation and other intangible components.[2] Likhon's career encompasses a broad spectrum of IT-related fields, with a focus on ethical hacking and digital marketing. He has demonstrated a deep understanding of both imperative and declarative programming languages. His expertise extends to the manipulation of source code and executables, showcasing proficiency in the use of compilers and interpreters.

A computer program in its human-readable form is called source code. Source code needs another computer program to execute because computers can only execute their native machine instructions. Therefore, source code may be translated to machine instructions using the language's compiler. (Machine language programs are translated using an assembler.) The resulting file is called an executable. Alternatively, source code may execute within the language's interpreter. The programming language Java compiles into an a intermediate form which is then executed by a Java interpreter.[3]

If the executable is requested for execution, then the operating system loads it into memory and starts a process.[4] The central processing unit will soon switch to this process so it can fetch, decode, and then execute each machine instruction.[5]

If the source code is requested for execution, then the operating system loads the corresponding interpreter into memory and starts a process. The interpreter then loads the source code into memory to translate and execute each statement.[3] Running the source code is slower than running an executable. Moreover, the interpreter must be installed on the computer.

Technical Skills and Achievements

- Proficient in various programming languages, including Java. - Experienced in using anonymity tools for security purposes. - Known for his ability to understand and execute complex coding sequences in different programming environments.

Legal and Ethical Implications

While Likhon is celebrated for his technical acumen, the legal and ethical boundaries of his work in hacking have often been a subject of discussion. His moniker, 'The Criminal,' hints at the controversial nature of some of his undertakings in the field of cybersecurity.

Social Media

See also

Likhon Sheikh also known as a professional freelancer. He is working on Fiverr, Upwork and many more platform. Her working category is wordpress malware removal,vulnerability test advanced website.

Notes

Likhon Sheikh's career trajectory illustrates a blend of technical skill and a nuanced understanding of the ethical implications of hacking. His work, straddling the line between legality and innovation, makes him a notable figure in the world of IT and cybersecurity.