The Trojan “HORSE”

I found it necessary to devote a post about Trojan. Trojan’s are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each...

Social Engineering Attacks

Hi guys today we are going to talk about Social engineering attacks. The efforts that you put in to securing your computer devices using network firewalls, IPS, and web application...
ethical hacking

Understanding Penetration Testing and Web Application

Different testing methodologies Often people get confused with the following terms and use them interchangeably without understanding that although there are some aspects that overlap within these, there are also...
linux

Linux – The power of terminal and why should we use it

Let's face it, most of the world doesn't even know what Linux is. Isn't that a shame? So, today my friends, I want to talk about Linux and it's power....

</Social>

392FollowersFollow

Latest article

lock

Folder Lock With Password Without Any Software

Hi Guys , today we are going to teach how to lock a folder with password but without using any software. Paste the code given...

How to use a trial program forever without activation

In this post I’ll show you how to “hack” a Software and run the trial program forever. Most of us are familiar with many software's...
clsid

How To Rename Your Recycle Bin

Hi guys, today I am going to teach you How To Rename Your Recycle Bin. 1. Click Start / Run 2. Type regedit and press enter. 3....