Tuesday 6 December 2016

22 Year Old Indian Hacks PM Narendra Modi’s App

According to a report by Your Story, a 22 year-old hacker Javed Khatri claimed that he was able to hack PM Narendra Modi app which is separate from the official app and is available on Android, iOS and Windows.
Javed Khatri in an email to Your Story, said, “I am able to access private data of any user on the app. The data includes phone number, email, name, location, interests, last seen etc.”

Sunday 27 November 2016

What Is The Difference Between RAM and ROM? What Is Their Use?

RAM (Random Access Memory) and ROM (Read-only Memory) are the two important memory types found on a computer. RAM is fast but it can’t hold data permanently. The ROM can hold data but frequent read-write operations are not possible in this case. This article is about all the differences between RAM and ROM.

Various components of a computer have memory to store some sort of data. The hard drive is the primary storage device used to store all the important data like OS files, music, videos, etc. Other than the hard drive, we have the RAM (Random Access Memory), ROM (Read-only Memory), etc.

Wednesday 23 November 2016

Best CMD commands used in hacking

Top CMD or MS-DOS prompt commands which every hacker should know

CMD is a power tool which lets you do almost anything with your PC/laptop. There are common commands like CD.. and MD etc which you probably know so we wont get into that. Here are some really useful things a hacker can do with CMD commands.

Saturday 12 November 2016

5 Common Mistakes That Fresh Hackers Make


Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still new. The following five points will tell you what not to do in your journey towards becoming a true hacker.

Sunday 6 November 2016

C and C++ Cheat Sheet

Hey guys, so I've brought a great post today for some  Programmers. Here's a cheat sheet of C & C++ that may help you during programming. This sheet contains all the information required to make a better program.

Friday 28 October 2016

10 Best Password Cracking Tools Of 2016 | Windows, Linux, OS X


Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, I have prepared a list of the top 10 best password cracking tools that are widely used by ethical hackers and cyber-security experts. These tools–including the Air-crack, John the Ripper, and THC Hydra–use different algorithms and protocols to crack the passwords on a Windows, Linux, and OS X system.

Monday 24 October 2016

How An SQL Injection Attack Works: Infographic

Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works.

Sunday 23 October 2016

What Is A DDoS Attack? How DDoS Attack Works?

DDoS attack is one of the favorite tools used by hackers to disrupt an online service. Here, I'm going to tell you more about the attack using an easy-to-understand info-graphic.

Thursday 22 September 2016

World’s Youngest Computer Programmer Is Only 7, Aims To Be Next ‘Bill Gates’

Seven-year-old British-Pakistani boy becomes the world’s youngest computer programmer

In the world where even the adults struggle with codes, a teen prodigy has broken all records to become the youngest programmer in the world. Imagine a seven-year-old sitting on a computer, sifting through Java and C++, young Shahzad does exactly that.
A British boy of Pakistani origin has become the world’s youngest qualified computer programmer at the age of seven, a media report claimed.

Wednesday 21 September 2016

How do Hackers Hack your Passwords?

Here are some ways that hackers use to hack your passwords

Many of you might have been victims to hackers taking over your Facebook, Gmail or other email accounts. Some of you may have lost some money to hackers after they took hacked your credit card information. Most of the information hackers get is by hacking your password.
One way of keeping ahead of hackers is by knowing how hackers hack password and what all methods and software’s they generally use. By knowing how hackers can get into your account, you will be in better situation to understand what are the possible ways you can lose your account information and passwords & you can protect yourself from getting hacked next time.

Saturday 17 September 2016

Meet these five child hackers who could become Top Cyber Security Researchers

Meet these 5 child geniuses who could be the future of cyber-security

Cyber-security industry is hunting for new talent due to severe shortfall of skilled professionals in this field and it seems the industry has already got five child geniuses.

Wednesday 14 September 2016

The List of All 100+ CMD Commands for Windows

Here is a list of the most used commands in the CMD window or prompt commands that you can type to perform certain tasks in windows.

Command Prompt is one of the most powerful tools in Windows also known as CMD. CMD is the command-line interpreter on Windows operating systems. Command Prompt interacts with the user through a command-line interface. Things were not always like this; but with the advent of GUI-based operating systems, people started feeling that computing through command-based tools was boring. This ultimately leads the command prompt into obscurity.

Saturday 3 September 2016

This Guy Challenged Hackers to Hack Him, Instantly Regrets His Decision

We must agree to the fact that no-one is safe in this internet world. Today we are sharing a story of a guy who challenged hackers to hack him and instantly regrets his decision.
In this world, many people, industries, and business entirely depend on their online accounts and activities. Hackers can make full use of their skilled capabilities to access our personal information in no time just for their gains. We have also noticed some high profile hacking in recent time.

Tuesday 30 August 2016

Top 10 Best Websites To Learn Ethical Hacking



In this post, I will tell you the Best Websites To Learn Ethical Hacking. These websites will teach you how the hackers hack into your device. Go through the post to discover the websites.

                   Also Read: How to Get started with Hacking?

Today lots of people want to learn hacking. But as we know Hacking is illegal so it ‘s hard to find a way to learn hacking. But there are some networks online which give tutorials on hacking. Hacking exists just because of vulnerability in technology. Today mostly hackers are youngsters and many youths want to learn hacking and hacking is a skill which is similar to the Internet tool or a knife of a virtual world. Therefore, here is the list of Top 10 best websites where you can learn Ethical Hacking.

Monday 22 August 2016

Top 15 Most Dangerous Black Hat Hackers Of All Time

Top 15 Most Dangerous Black Hat Hackers Of All Time

Recently the US government announced that it will create an agency specializing in electronic combat terrorism. This is proof of the importance that the cyber attacks gained after the recent invasions of corporate systems, media outlets and national governments. Stealing personal information, confidential files or exposing the privacy of celebrities, so-called black hats ? become the global public enemy in recent years. Meet some of the 15 most dangerous hackers of all time.

Tuesday 9 August 2016

9 Books to follow if you want to become an Ethical Hacker

Ethical Hackers Provide security for the computers digital data in the sense with the increase of the Black hat hackers we need Computer security professionals in order to work the security of the Enterprise data.
The domain of computer security involves a knowledge in sophisticated technologies and a real time exposure to computer network and data management and as a matter of fact there are much less professional than are required by the worldwide market of computer security. Understanding the computer security domain is not easy and it calls for professional training. Fortunately there are computer security books that offer you an insight into the domain. By referring to those books one can gain an understanding on how it works.

How programmers view end users...

How programmers view end users...

Saturday 23 July 2016

How to Install and run Kali Linux on any Android Smartphone

TUTORIAL FOR INSTALLING AND RUNNING KALI LINUX ON ANDROID SMARTPHONES AND TABLETS

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox.
Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well.

Monday 18 July 2016

Top 15 Most Popular Android Games That You Should Play

Here i have listed Top 15 Best Popular Games For Your Android: For games lover, i am here with the fifteen best popular games that you will love to play again and again on your android smartphone. You can have a comprehensive look through the list to know about the most popular android games of all time. So go through the post to discover the games.

Thursday 14 July 2016

How To Use Your Own Handwriting As System Font In Android Smartphone


How to add your own handwriting as your system font on your Android smartphone and tablets

We all are aware that Android smartphones are best known for the n degree of customizations and hundreds of themes. But did you know that you can use your own handwriting for all Android smartphone menus, app names and even WhatsApp conversations? This is what makes Android ecosystem different from others, as it not only allows you to give a personal touch to your device but also make it unique from others.

Sunday 10 July 2016

7 Hidden Tricks Of Android Smartphone You Probably Didnt Know!

7 things you are not aware that your Android smartphone can do

While many people have Android smartphones, but not many users are aware how powerful their devices can be. In this article, I present you a few hacks to make optimal use of your Android smartphone that you may not know.

Friday 8 July 2016

4 videos that will inspire you to learn programming


In this article I am sharing some videos that will help you get inspired to learn to code.
Programming is a process by which we instruct the computer to do some task. In present digital era it is really important to learn programming. There is one great quote said by Steve Jobs in an interview “I think everybody in this country should learn how to program a computer because it teaches you how to think”. In this article I have collected and shared some best inspirational programming videos that will really inspire you to learn programming.

Tuesday 5 July 2016

Meet The World’s 5 Most Beautiful Female Hackers

What if I say that “Many people still think that beauty and intelligence are not getting along in the same person”, yes you might be thinking that it’s true. But, hold on, as this post will make you change your mind.

Sunday 26 June 2016

IObit Driver Booster Pro V3.4.0.769 with Serial Keys

IObit Driver Booster -

Driver Booster is a lightweight software application whose purpose is to help you manage outdated drivers for all your devices. It protects your PC from hardware failures, conflicts, and resolves system crash problems caused by outdated drivers. All old drivers can be detected by simply clicking on the “Scan” button, and then you just need to click “Update All” button to refresh these outdated drivers. Compared with other driver updating tools, IObit Driver Booster can improve your PC performance for gaming as well.

Saturday 25 June 2016

Top 6 Websites To Learn Computer Programming Languages


Ever wanted to learn computer programming languages, but didn't know where to start? Well, those days are over. Today learning programming languages is not really a hard job. If you are a beginner and have aptitude to learn computer programming then you can accomplish this goal within a few months. Here are the top 6 websites, which are useful for learning programming.


Wednesday 22 June 2016

Download 12 Best Android Hacking Apps 2016

Top 12 Best Android Hacking Apps 2016

Lets see Best Android Hacking Apps 2016 that are meant for hacking, hackers, security researchers;

Tuesday 21 June 2016

How To Convert your 1 GB Or 2 GB Memory/SD into 4GB


Hey Guys, today I'm gonna show you a very interesting trick for converting your 1GB or 2GB SD Card into 4GB.

Yess you heard me right, we're going to increase the internal storage capacity of the SD Card...

Saturday 18 June 2016

100+ Windows Run Commands List: How Many Do You Actually Know?

I’m posting a list of 100+ Run Commands each Power-User is supposed to know by-heart (don’t worry if you can’t remember, but if you do, you won’t have to refer to this again and again!).
So on the off chance that you know any new ones, please post them in the comments section below! (I love comments!)

How to Get started with Hacking?


Today, I am going to discuss about a very Interesting and a Frequently asked Question related to Hacking.

I get a hell lot of questions like “Where do I start with Hacking?” , “How can I get started with Hacking?” and “Where to start with Hacking” .

Today, I will answer this question right here. So, tighten your seat belts as here we go!

Where to start with Hacking?

I have seen a lot of members asking for a tutorial on “where to begin with hacking”. So here is my opinion about how they should get around starting. But First of all, let’s discuss about the types of Hacker.