Author: Kalyani dudhekar

How to Install Tor Browser

How to Install Tor Browser Step 1:Goto browser and search tor project and select the option of download for windows,linux or dos. Step 2:After downloading tor open it and connect it you can also configure it and set proxy for more security . Step 3:We should set VPN also for much more security as tor…
Read more

ASCII-Code

ASCII-Code All electronic communications involving computers are expressed in binary language which involves only two symbols. These are 0 for off and 1 for on. Since normal communications between humans over large distances is both in letters and numbers it earlier became necessary to come up with a coding method capable of handling both cases.…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

DDoS Attack

Distributed denial of service attack in this attack multiple systems which are infected by trojan, are used to target a single system causing a denial of service attack(dos) .By slowloris you can do DDoS attack .As Slowloris is a tool of kali linux . Attacks involving multiple computers or other devices all targeting the same…
Read more

Google Hacks

Google dorks are used to find hidden information and we can find anything easily by using it. Because Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on the target. The basic syntax for google dorks: operator_name:keyword Because of google dorks it becomes easy to…
Read more

How To Hack Windows XP:

How to Hack Windows XP: Windows XP is an old operating system. In fact, Microsoft stopped issuing updates for thisOS. However, many people are still using XP on their computers. Because this OS won’tget any future updates, its existing vulnerabilities will be forever available to hackers andpenetration testers.This section will teach you how to attack…
Read more

How to Hack WiFi Networks that Use WEP Encryption

How to Hack WiFi Networks that Use WEP Encryption More and more people are using wireless networks. Thus, every hacker needs to know how to attack this kind of target. In this section, you’ll use Kali Linux to hack a WEP- encrypted WiFi password. Important Note: You’re still practicing so don’t use it on other…
Read more

How to Hack WiFi Networks that Use WPA/WPA-2

How to Hack WiFi Networks that Use WPA/WPA-2 WEP-encrypted passwords are easy to hack. WPA/WPA-2 passwords, however, are time- consuming and resource-intensive. This is the reason why most WiFi networks use WPA/WPA-2 encryption. Cracking this form of encryption is difficult, but certainly doable. Here are the steps you need to take: 1. Launch a terminal…
Read more

Windows 10 Tricks And Tips

Windows 10 tips and tricks 1] Make Windows 10 behave the way you want it to Besides Control Panel, Windows 10 has an easy to use PC Settings window where you can easily change and control the settings related to Windows Updates, Networks, Apps etc. Manage your System, change Network and Internet Settings, harden Privacy…
Read more

Hard Disk

Hard Disk The hard disk drive in your system is the “data center” of the PC. It is here that all of your programs and data are stored between the occasions that you use the computer. Your hard disk (or disks) are the most important of the various types of permanent storage used in PCs…
Read more