Category: Hacking

what is port forwarding?

what is port forwarding? the port forwarding is a way to send and receive data packets from a public source. it is a complicated topic. you might never understand it if you won’t perform it on your own system. By port forwarding, we can redirect traffic to a specific destination. example: you play Minecraft. it…
Read more

What is Malware Threats

What is Malware Threats Malware re is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information. Various types of malware Virus Trojans Worms Rootkits Spyware Ransomware Virus…
Read more

ʜᴏᴡ ᴛᴏ ʟᴏᴄᴋ ᴀɴᴅ ᴜɴʟᴏᴄᴋ ʏᴏᴜʀ ᴘᴄ ᴡɪᴛʜ ᴜsʙ ᴅʀɪᴠᴇ

ʜᴏᴡ ᴛᴏ ʟᴏᴄᴋ ᴀɴᴅ ᴜɴʟᴏᴄᴋ ʏᴏᴜʀ ᴘᴄ ᴡɪᴛʜ ᴜsʙ ᴅʀɪᴠᴇ ᴀɴʏᴏɴᴇ ᴡʜᴏ ᴀᴛᴛᴇᴍᴘᴛs ᴛᴏ ᴀᴄᴄᴇss ʏᴏᴜʀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜᴏᴜᴛ ᴛʜᴇ ᴜsʙ ғʟᴀsʜ ᴅʀɪᴠᴇ ᴡɪʟʟ ʙᴇ ʜɪᴛ ᴡɪᴛʜ ᴀɴ ᴇᴘɪᴄ “ᴀᴄᴄᴇss ᴅᴇɴɪᴇᴅ” ᴍᴇssᴀɢᴇ. ᴛᴏ ɢᴇᴛ sᴛᴀʀᴛᴇᴅ, ғᴏʟʟᴏᴡ ᴛʜɪs ɢᴜɪᴅᴇ: sᴛᴇᴘ 1: ᴅᴏᴡɴʟᴏᴀᴅ ᴀɴᴅ ɪɴsᴛᴀʟʟ ᴘʀᴇᴅᴀᴛᴏʀ ʜᴇʀᴇ sᴛᴇᴘ 2: ᴏɴᴄᴇ ᴘʀᴇᴅᴀᴛᴏʀ ʟᴀᴜɴᴄʜᴇs, ᴘʟᴜɢ ɪɴ ʏᴏᴜʀ ᴜsʙ ғʟᴀsʜ ᴅʀɪᴠᴇ.…
Read more

Dark Web Access

Dark Web Access Do you wish to enter into the world of darkness? – The Dark Web. Then make sure you are protected and safe with the VPN to remain anonymous online. If you aren’t connected with the Best VPN, then you may land in trouble even if you are using Tor browser. First, set…
Read more

Web Vulnerability Scanners

Web Vulnerability Scanners Netsparker Application Security Scanner — Application security scanner to automatically find security flaws. Nikto — Noisybut fast black box web server and web application vulnerability scanner. Arachni — Scriptableframework for evaluating the security of web applications. w3af — Webapplication attack and audit framework. Wapiti — Blackbox web application vulnerability scanner with built-in…
Read more

How To Become A Cyber Security Specialist

How To Become A Cyber Security Specialist. You have been reading the news about all the recent cyber-attacks, you have an interest in computers and you want to embark on a new career as a cyber security professional. Where do you start? There are 3 major paths you can take to further your career in…
Read more

What is Cryptography

What is Cryptography Cryptography is the art of converting text into another form for secret transmission and reception. It works by converting plain text into cipher text using some encryption algorithm at the sender’s side and converting ciphertext into plain text at the receiver’s. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation. Key…
Read more

White Hats

White Hats A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking. White hat hackers, also called ethical hackers, only seek vulnerabilities or exploits when they are…
Read more

Black Hat

Black Hat Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain; to steal or destroy private data; or to alter, disrupt or shut down websites and networks. The black hat hacker may also sell these exploits…
Read more

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ Tʜᴇ Mᴇᴛʜᴏᴅ ɪs ʙᴀsᴇᴅ ᴏɴ ᴀɴ ᴜɴᴄᴏᴍᴘʟɪᴄᴀᴛᴇᴅ ᴄᴏᴍᴍᴀɴᴅ ᴘʀᴏᴍᴘᴛ ᴛʀɪᴄᴋ ᴛʜᴀᴛ ᴡɪʟʟ ғᴏʀᴄᴇ ғᴏʀᴍᴀᴛ ʏᴏᴜʀ ᴇxᴛᴇʀɴᴀʟ ᴅʀɪᴠᴇ, ᴀɴᴅ ᴛʜᴇɴ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ɪᴛ sᴍᴏᴏᴛʜʟʏ ᴀɴᴅ ᴇʀʀᴏʀ-ғʀᴇᴇ. Hᴏᴡᴇᴠᴇʀ, ɴᴏᴛᴇ ᴛʜᴀᴛ ᴛʜɪs ᴡɪʟʟ ᴅᴇʟᴇᴛᴇ ᴀʟʟ ʏᴏᴜʀ ғɪʟᴇs ғʀᴏᴍ USB ᴘᴇɴ ᴅʀɪᴠᴇ ᴀɴᴅ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀɴʏ ɪᴍᴘᴏʀᴛᴀɴᴛ ᴅᴀᴛᴀ, Tʜᴇɴ…
Read more