36.1 C
Delhi
Wednesday, July 24, 2019
Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

The New Kali 2.0 codename as Kali Sana, is an open-source penetration testing platform having pre-installed hundreds of Hacking ,Reverse Engineering, Forensics and Penetration Testing tools. Kali 2.0 was redesigned...
Introduction to Log Collector and Event Sources | SIEM

Introduction to Log Collector and Event Sources | SIEM

In this article we will discuss how we use log collector to collect and analyses logs. While in previous article we have discussed about Logs. We already have discussed...
Kill Switch Software

Smartphones with a ‘kill switch’ to prevent from thefts

New software 'kill switch' to thwart thefts: Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen Microsoft and google said that phones using their operating systems...
crack web form

How To Crack Password Using Hydra In Kali Linux

Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data from anonymous user. Even a...
easy method to crack / hack trial version software

Trick to hack trial version software using RunAsDate utility tool

Here we will discuss a trick about how to hack trial version software in Windows based operating system. It is not exactly hacking of software instead you can call...
NETGEAR Router Exploit

NETGEAR Router Exploit: Critical Bug in NETGEAR Router

Do you use NETGEAR Router, then have a look at it. NETGEAR Routers are once again vulnerable to the DNS Monitoring. A security researcher discovered that there is a serious...

USB Killer 2.0 : It can destroy your system in just some seconds

Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers. Let’s talk a bit about the previous version of Killer USB,...
Bacic Exploits : Stack Operations

Basic Exploits : Stack Operations

Note: Hacking is not a joke so please keep patience and learn it step by step. Stack Operations First and the most important topic to learn the basics of Exploits is...
US Intelligence Chief Hacked

US Intelligence Chief Hacked by a teen

The email of US Intelligence Chief Hacked! The same teenager who hacked the AOL email of CIA Director John Brennan back in October last year has now hacked into personal...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
The Data You Keep In Your Mobile Is Not Secure: Pre-Installed Spywares in Smartphones

The Data You Keep In Your Mobile Is Not Secure: Pre-Installed Spywares in Smartphones

If you think that the data you keep in your phone is confidential then you must read this. A report claims that some smartphones are coming with the pre-installed...
Guccifer hacker extradited to the US

Guccifer hacker extradited to the US

Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer Intrusion and Identity theft charges...
ransomware

What is Ransomware and How it works?

Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...
Instagram Hacked

Instagram Hacked: A security researcher hacked into the servers of Instagram

Instagram Hacked! Someone just hacked into the servers of Instagram, showing the most secure mechanisms also have bugs. But you don’t try to do anything like this because even reporting the...
encryption and decryption

How to use backtrack

Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Before you start Before we start playing with safty tools follow the following steps :- Download btr5...
Memory management in C Programming

Memory management in C Programming:Computer Memory

Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you...
Loki Botnet, malware, Security Threat, Loki, Botnet

Loki Got an upgrade – Loki Botnet new varient Detected

Loki Botnet (Malware) works in the same way as Marvel's Villen cum hero works (Trick the user and steal the information). Loki botnet, A bot (malware) which was detected...
buffercode forum

Learn hacking for free on buffercode

Start from 15/Nov/2014 see here Basics Linux exploits  To learn hacking is art , and to do hacking is also an art . Similarly friends to teach hacking is an...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know...
How to Install Kali without any Problem

Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem

Before start Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem remember it's slogan:- The Quiter you become ,the more you are able to hear Do you...
Shocking secrets about Ashley Madison

Shocking secrets about Ashley Madison: Women were actually not using the website

The hacked data of Ashley Madison website is been a reason for many criminal activities since it’s data is dumped on to the dark web (also known as deep...
Crash you friends whatsapp by sending 200 kb message

Crash friends whatsapp by sending 200 kb message

To Download Special characters  Click Here This time again!!! Indian teenagers just do the magic ;) They again find a bug in whatsapp which is recently purchased by facebook in...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...
Tor

How to surf web anonymously ??

Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point...
OSX Sudoers Flaw

OSX Sudoers Flaw : The Script Uses Sudo’s New Password-Free Behavior

This year, in the month of January , three Apple OSx zero day flaws were revealed by Google .First vulnerability was - OS X Yosemite had flaw to pass arbitrary...

Facebook’s New Notification Feature: Facebook will now Notify you if Government is Spying on...

Yet another feature by Facebook to make the world’s largest social network more secure. Facebook has just launched a new Notification feature that will alert you if it believes...