Home Search
- search results
If you're not happy with the results, please do another search
iPhone SE : Specifications , Price And Comparison With iPhone 6s
Apple launched a brand new smartphone - iphone SE where SE stands for special edition.It is a super compact 4 inch display,which means it...
3 KEY POINTS TO WIN FROM HIGHLY SUCCESSFUL PEOPLE
Barack Obama and Mark Zuckerberg, the two well known, successful and respectable personalities what they have in common that both are at such high...
Explore and Search Exploit in Metasploit
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit...
Building an ArrayList from an Array in Java Software Development
Author of this article has published varieties of articles in the stream of java software development. In this post, you will learn the way...
Microsoft is bringing the GNU project’s Bash shell to Windows 10
Microsoft announced that it bringing the GNU project’s Bash shell to Windows 10. If you remember, in our previous article :- Windows 10 may have hidden linux...
EgyptAir HIJACKER GOT ARRESTED IN CYPRUS
The hijacker of EgyptAir plane has been arrested in Cyprus, where he was forcing the plane to land. The EgyptAir plane was carrying 55...
Bitport Review : Download torrents to your cloud and play them online
Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a...
How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In...
Clash Of Clan: Get 3 Star on TH9 from GoHoWi(Golum+Hogs+Wiz) attack
Clash of Clan: GoHoWi(Golum+Hogs+Wiz) video
In clash of clan, GoHoWi is one of the best attack by which one can get 3 star on TH9...
How To Crack Password Using Hydra In Kali Linux
Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data...
UBER DRIVERS – JOB IN DANGER
A driver of uber named Campbell, was driving at night, suddenly passenger stripped all his clothes off at a light and ran naked around...
Guccifer hacker extradited to the US
Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer...
Let’s Encrypt: Free SSL Certificate Install by 1 Million websites
Let’s Encrypt published 1 million free Transport Layer Security SSL Certificates to webmasters who want to secure their connection between their users and domains...
WHAT WE KNOW ABOUT MH370 ?
MH370 is a Malaysian Air flight which disappeared two years ago over the Indian Ocean with 239 passengers. Till now search parties have covered...
SAMSUNG GALAXY S7 EDGE: THE HOTTEST SAMSUNG PHONE EVER
DESIGNING
SAMSUNG GALAXY S7 EDGE has a screen of 5.5 inches whereas in S6 edge it was 5.1 inches and in S6+ edge, 5.7 inches....
Program to Implement Stacks using structures in C/C++ Programming
In previous post Stacks in programming and Basic Exploits : Stack Operations, we explained the functioning of stacks. Later our users ask for its...
Is it possible to control the direction of electron?
For the first time in whole world,a bunch of international scientists has been able to command and oversees the direction of electron that were...
Xiaomi Mi 5 , Mi 5 Pro and Redmi Note 3 the new killer...
Xiaomi Redmi Note 3 smartphone and Mi 5 are coming to India this month, Mi 5 will be the Xiaomi flagship smartphone for 2016 and its...
Android N : (leaked information)
In May,at I/O Developer Conference Google is wonted to attempt a first look of its new Android i.e Android N. Recently Android Police gave...
KANHAIYA KUMAR’S SPEECH TREND WORLDWIDE
Kanhaiya Kumar is a leader of the All India Student Federation (AISF) from Begusarai, Bihar, India, and the student wing of the Communist party...
Best Solid State Drives in 2016
Some of new low-end segment SSD prices are shifted down in the market. The low ending 15-16nm TLC SSD will not probably give us...
Developer of most secure messaging app hired by Apple
This time Apple is very sincere about upgrading the security of its iPhone so that no can hack it.Apple also hired one of the...
Samsung Galaxy S7 and S7 Edge: more powerful then S6
Samsung Galaxy S7 and S7 Edge:
Samsung Galaxy S7 and S7 Edge officially launched its two new flagship smartphone at MWC 2016 in Barcelona. Samsung...
Phishing malware crashes ICICI bank
#Phshing Malware crashes ICICI bank .... https://t.co/a8vTOVvuob
— Buffercode (@buffercoding) February 25, 2016
Official @ICICIBank_Care reply to tweet :
@buffercoding Hi, ICICI Bank has a robust & multi-level security...
Bill Gates speaking about Apple vs FBI case
Apple vs FBI case : The co-founder of Microsoft- Bill Gates commented on the battle going between Apple and the FBI. Reason being breaking...