15 C
Delhi
Wednesday, December 12, 2018
Tor

How to surf web anonymously ??

Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point...

Google is going to mandate the Full Disk Encryption by default for devices with...

Last year when Google launched Android Lollipop 5.0, Google wanted to make the full disk encryption mandatory, but due to some reasons the idea didn’t work. But this time with...
VDI

VDI Deployment Mistakes

Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a...

USB Killer 2.0 : It can destroy your system in just some seconds

Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers. Let’s talk a bit about the previous version of Killer USB,...
How to Choose a Router for Your Business

How to Choose a Router for Your Business

If you think that choosing a router for your business is an easy task, you have no idea how wrong you are. It is not like choosing a standard...
Rotexy Malware Trojan, Rotexy, Android Malware, Android Virus, Android Threats, Security, Hacking, Android

Russia Got Targeted By Rotexy Trojan

Due to the hipe of trojan activity, Kaspersky decided to do a deep analysis of the evolution of popular malware family. And they found one most interesting (Rotexy) trojan...
US Intelligence Chief Hacked

US Intelligence Chief Hacked by a teen

The email of US Intelligence Chief Hacked! The same teenager who hacked the AOL email of CIA Director John Brennan back in October last year has now hacked into personal...

Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge

Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for...
Yahoo! Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner   Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...
buffercode forum

Learn hacking for free on buffercode

Start from 15/Nov/2014 see here Basics Linux exploits  To learn hacking is art , and to do hacking is also an art . Similarly friends to teach hacking is an...
Mozilla Placing High Bandwidth Tor Middle Relays

Mozilla Placing High Bandwidth Tor Middle Relays

 Mozilla Placing High Bandwidth Tor Middle Relays  Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more...
SQL Injection with buffercode

SQL INJECTION BY VARIOUS WAYS

SQL INJECTION BY VARIOUS WAYS INTRODUCTION TO SQL INJECTION The most easiest way to hack an site is hacking it by SQL injection. SQL Injection based on the vulnerabilities of an...
Hacking with Android Smartphone using zANTI 2

Hacking with Android Smartphone using zANTI2

Download zANTI 2.2(Apk) Hacking with Android Smartphone using zANTI2 zANTI2 is a Network Analysis and penetration suit developed by ZImperium family as a software developer and researcher, the name zANTI2 comes...
Vulnerability in PayPal user authentication system

Vulnerability in PayPal user authentication system

It's always a matter of attraction when money is in the frame of attack. So It's time to get into the users PayPal account.. Paypal provides online / ebay...
Whatsapp data in cloud

Now BackUp Your WhatsApp Data to Google Drive

BackUp Your WhatsApp Data   The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation”...
Malware analysis sandboxing

What is Sandboxing and How it works?

In this article, we will discuss about sandboxing, how it works and list of free sandboxing environment etc. Hybrid analysis, Malware analysis and Threat analysis, they all use the same...
Hackers war

China Helped U.S.A: China Arrested Hackers on the Request of U.S Government.

China Arrested Hackers on the Request of U.S Government   The things happen in movies can actually happen in the real life too. The recent action of China reminds me of...
Top Vpn providers 2016

Top Free Vpn Provides 2016

A VPN (Virtual Private Network) extends your private network across a public network, such as a company internal network. There are several numbers of system that enables you to...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device....
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
Install Honeypot in Kali-4

How to Install Honeypot on Kali Linux

In this article we will show how to install Honeypot in Kali Linux. The Pentbox is Security suite that can be use for penetration testing to perform various operations. The...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find out another way to breach...
ios 9.0.2 bypass

IOS 9.0.2 fixes the Lock screen ByPass Bug

IOS 9.0.2 fixes the Lock screen Bypass Bug After the launch of its latest version of iOS, Apple has rolled out two minor updates for its operating system (iOS9.0.1 and...
crack web form

How To Crack Password Using Hydra In Kali Linux

Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data from anonymous user. Even a...
wannacry ransomware cyber attack

WannaCry ransomware attack: Largest Ransomware Attack In The History

By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
snap chat security break

Snapchat’s Security break by Steven Hickson

It's all about little bit of  simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker  or you can say that every...