Tag: attack

How to Install Tor Browser

How to Install Tor Browser Step 1:Goto browser and search tor project and select the option of download for windows,linux or dos. Step 2:After downloading tor open it and connect it you can also configure it and set proxy for more security . Step 3:We should set VPN also for much more security as tor…
Read more

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

What is Password Cracking?

What is Password Cracking? Password cracking is the process of guessing or recovering a password from stored locations or from data transmission system. It is used to get a password for unauthorized access or to recover a forgotten password. In penetration testing, it is used to check the security of an application. In recent years,…
Read more

Escape Sequence in C

Escape Sequence in C An escape sequence in C language is a sequence of characters that doesn’t represent itself when used inside string literal or character. It is composed of two or more characters starting with backslash \. For example: \n represents new line. List of Escape Sequences in C Escape Sequence Meaning \a Alarm…
Read more

घर बैठे इन्टरनेट से ऑनलाइन पैसे कैसे कमाए

इन्टरनेट से पैसे कमाने के तरीके (Online Paise Kaise Kamaye) कोई writing में अच्छा होता है तो कोई singing में. सबके पास अलग अलग कला होता है. हम दुशरो से वो चीज़ सीखते है जो हमे पता नहिं होता. वैसे ही आप अपनी talent के जरिये online आसानी से पैसे कमा पाएंगे, और ये कोई…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

DDoS Attack

Distributed denial of service attack in this attack multiple systems which are infected by trojan, are used to target a single system causing a denial of service attack(dos) .By slowloris you can do DDoS attack .As Slowloris is a tool of kali linux . Attacks involving multiple computers or other devices all targeting the same…
Read more

Google Hacks

Google dorks are used to find hidden information and we can find anything easily by using it. Because Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on the target. The basic syntax for google dorks: operator_name:keyword Because of google dorks it becomes easy to…
Read more

How to Hack WiFi Networks that Use WEP Encryption

How to Hack WiFi Networks that Use WEP Encryption More and more people are using wireless networks. Thus, every hacker needs to know how to attack this kind of target. In this section, you’ll use Kali Linux to hack a WEP- encrypted WiFi password. Important Note: You’re still practicing so don’t use it on other…
Read more

what is port forwarding?

what is port forwarding? the port forwarding is a way to send and receive data packets from a public source. it is a complicated topic. you might never understand it if you won’t perform it on your own system. By port forwarding, we can redirect traffic to a specific destination. example: you play Minecraft. it…
Read more