Thursday, May 25, 2017
malware attack on facebook

Malware Attack on Facebook effect more than 110,000 users

  Malware attack on Facebook On Friday malware attack on Facebook is reported. Malware attack on Facebook infected more than 110,000 users. There are some pornography links on Facebook. When user click these links...
Mozilla Placing High Bandwidth Tor Middle Relays

Mozilla Placing High Bandwidth Tor Middle Relays

 Mozilla Placing High Bandwidth Tor Middle Relays  Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more secure privacy...

Google reveals three Apple OS X zero-day flaws

Once again Google proved that they have strong security team which can expose not only Microsoft vulnerabilities but Apple OS X can also stand in the same category. Google expose three Zero...
get into friends whatsapp

How to get into friends whatsapp and send messages

I don't know that how to Express this success !!! Everybody knows that hacking is just a creativity and finding the way to get deeper into the code. So here I...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...
Memory management in C Programming

Memory management in C Programming:Computer Memory

Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you will Learn...
Vulnerability in PayPal user authentication system

Vulnerability in PayPal user authentication system

It's always a matter of attraction when money is in the frame of attack. So It's time to get into the users PayPal account.. Paypal provides online / ebay pay service ...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the system. So...
Crash you friends whatsapp by sending 200 kb message

Crash friends whatsapp by sending 200 kb message

To Download Special characters  Click Here This time again!!! Indian teenagers just do the magic ;) They again find a bug in whatsapp which is recently purchased by facebook in $19 billion...
Basic Linux exploits: Function Calling Procedure

Basic Linux exploits: Function Calling Procedure

Note: Hacking is not a joke so please keep patience and learn it step by step. Note: Before reading this post you must read : Learn hacking for free...
Bacic Exploits : Stack Operations

Basic Exploits : Stack Operations

Note: Hacking is not a joke so please keep patience and learn it step by step. Stack Operations First and the most important topic to learn the basics of Exploits is Stack Operations...
facebook verification page has bug

Facebook verification page has bug found by team Buffercode

Note: I already send report for this bug , I  hope Team Facebook will change their algorithm for this page.  New Bug has found by team Buffercode in Facebook It's always exited when...

Now facebook introduced new “Facebook groups app” on 18 November

Facebook groups app for facebook lovers: Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends and family...

How to secure your account from phishing attacks on Internet

Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Creating Phishing page to know the safety cautions on Internet To know the cautions we must know how to...
best compiler for c / c++

Basic Linux Exploits:Make your Pc more secure

Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world Why study Exploits? Before learning exploits ,one should know about vulnerability.What does it means in the world of computer...

Stone tether smallest tracking device finds your lost items

Stone tether smallest tracking device: Technology has made life easier if you fail to remember something. A new device is becoming to discover your lost items. Its name is stone tether. It...

Now use Facebook anonymously via Tor networks: good news for Tor users

Now use Facebook anonymously: Facebook is a most popular social network in world. Here is good news for Facebook lovers, who want to keep secret their identity on internet. Identity includes your...
BBM Blackberry new privacy : timer and restrict message

BBM BlackBerry now features timer just like Snapchat

Here is a good news for all BBM ( BlackBerry Messenger) Lovers, new Privacy features update which is live by BBM BlackBerry Application for all Android, ios or windows device. Now you...
buffercode forum

Learn hacking for free on buffercode

Start from 15/Nov/2014 see here Basics Linux exploits  To learn hacking is art , and to do hacking is also an art . Similarly friends to teach hacking is an ART ....
Kill Switch Software

Smartphones with a ‘kill switch’ to prevent from thefts

New software 'kill switch' to thwart thefts: Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen Microsoft and google said that phones using their operating systems - including...
c program Machine code

How to use Debugger tool objdump in Linux

Debugger Tool Objdump in Linux Debugger Tool objdump: C feel more familiar and C compiler exist in every operating system .Basically Linux is a free operating system that every has to access...
dsploit top penetration testing application for android mobiles

Top Penetration Testing Application for Android Mobiles

Android is a Linux based small operating which  runs on mobile. Most of the user in the world are using Android because of its large application in  play or android store...
Tor

How to surf web anonymously ??

Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point of view...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know ,is there...
encryption and decryption

What is Encryption and Decryption , and how it make our message anonymous??

Friends in our previous post How to surf internet Anonymously we tell you why to surf internet anonymously and number of ways to do that. Our aim is to make you conscious...
Anonymity buffercode

How to surf internet Anonymously

Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important.  Before reading...