The Trojan “HORSE”

I found it necessary to devote a post about Trojan. Trojan’s are probably the most compromising of all types of attacks. Trojans are being released by the hundreds every week, each...

Social Engineering Attacks

Hi guys today we are going to talk about Social engineering attacks. The efforts that you put in to securing your computer devices using network firewalls, IPS, and web application...
ethical hacking

Understanding Penetration Testing and Web Application

Different testing methodologies Often people get confused with the following terms and use them interchangeably without understanding that although there are some aspects that overlap within these, there are also...
linux

Linux – The power of terminal and why should we use it

Let's face it, most of the world doesn't even know what Linux is. Isn't that a shame? So, today my friends, I want to talk about Linux and it's power....

</Social>

383FollowersFollow

Latest article

aes

AES Encryption with Source Code – JavaFX

Hi guys today I'm gonna teach you about AES-Encryption. This encryption method is very useful for protecting your data against any intrusion.Even if intruders...

How To Chat With Friends Through CMD (Netsend)

Hi guys welcome back. Today I am going to teach you how to Chat with your friends using CMD (Command Prompt). You can use...
lock

Folder Lock With Password Without Any Software

Hi Guys , today we are going to teach how to lock a folder with password but without using any software. Paste the code given...