16 C
Delhi
Wednesday, December 12, 2018
Kill Switch Software

Smartphones with a ‘kill switch’ to prevent from thefts

New software 'kill switch' to thwart thefts: Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen Microsoft and google said that phones using their operating systems...
c program Machine code

How to use Debugger tool objdump in Linux

Debugger Tool Objdump in Linux Debugger Tool objdump: C feel more familiar and C compiler exist in every operating system .Basically Linux is a free operating system that every has...
dsploit top penetration testing application for android mobiles

Top Penetration Testing Application for Android Mobiles

Android is a Linux based small operating which  runs on mobile. Most of the user in the world are using Android because of its large application in  play or...
Tor

How to surf web anonymously ??

Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know...
encryption and decryption

What is Encryption and Decryption , and how it make our message anonymous??

Friends in our previous post How to surf internet Anonymously we tell you why to surf internet anonymously and number of ways to do that. Our aim is to make...
Anonymity buffercode

How to surf internet Anonymously

Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
snap chat security break

Snapchat’s Security break by Steven Hickson

It's all about little bit of  simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker  or you can say that every...
encryption and decryption

How to use backtrack

Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Before you start Before we start playing with safty tools follow the following steps :- Download btr5...

How to hack windows password

How to hack windows password Change your password if you Forget it Hello friends today we learn how to change your password if your account or change windows password is locked/you forget your password.At that...