Tag: white hat

How to Install Tor Browser

How to Install Tor Browser Step 1:Goto browser and search tor project and select the option of download for windows,linux or dos. Step 2:After downloading tor open it and connect it you can also configure it and set proxy for more security . Step 3:We should set VPN also for much more security as tor…
Read more

घर बैठे इन्टरनेट से ऑनलाइन पैसे कैसे कमाए

इन्टरनेट से पैसे कमाने के तरीके (Online Paise Kaise Kamaye) कोई writing में अच्छा होता है तो कोई singing में. सबके पास अलग अलग कला होता है. हम दुशरो से वो चीज़ सीखते है जो हमे पता नहिं होता. वैसे ही आप अपनी talent के जरिये online आसानी से पैसे कमा पाएंगे, और ये कोई…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

How to Hack WiFi Networks that Use WPA/WPA-2

How to Hack WiFi Networks that Use WPA/WPA-2 WEP-encrypted passwords are easy to hack. WPA/WPA-2 passwords, however, are time- consuming and resource-intensive. This is the reason why most WiFi networks use WPA/WPA-2 encryption. Cracking this form of encryption is difficult, but certainly doable. Here are the steps you need to take: 1. Launch a terminal…
Read more

what is port forwarding?

what is port forwarding? the port forwarding is a way to send and receive data packets from a public source. it is a complicated topic. you might never understand it if you won’t perform it on your own system. By port forwarding, we can redirect traffic to a specific destination. example: you play Minecraft. it…
Read more

Dark Web Access

Dark Web Access Do you wish to enter into the world of darkness? – The Dark Web. Then make sure you are protected and safe with the VPN to remain anonymous online. If you aren’t connected with the Best VPN, then you may land in trouble even if you are using Tor browser. First, set…
Read more

How To Become A Cyber Security Specialist

How To Become A Cyber Security Specialist. You have been reading the news about all the recent cyber-attacks, you have an interest in computers and you want to embark on a new career as a cyber security professional. Where do you start? There are 3 major paths you can take to further your career in…
Read more

White Hats

White Hats A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking. White hat hackers, also called ethical hackers, only seek vulnerabilities or exploits when they are…
Read more

What is sql injection

What is sql injection ? SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is…
Read more