Monday , 29 April 2024

How to access Dark Web or Deep Web for noobs

You might be hearing these two words dark web and deep web quite for a while. Both are almost same but not same, just almost. You cannot access dark web from a normal browser you are using like from google chrome or Firefox. Here in this tutorial I am going to share you how to access dark web or deep …

Read More »

What is Supply Chain Attack: The Attack That Keeps Every WordPress Site Vulnerable

There are many attacks that are happening on the internet. Each attack belongs to some type of attack family. One of my friend works in PayPal and he said PayPal alone gets 3000 attacks per second and imagine how many attacks are carried out worldwide. In this article I am going to explain to you how supply chain attack works …

Read More »

How to find IP address of anyone

To attack anyone the first thing you must know is to find the IP address of the target. There are many tools that help to find IP address but here in this tutorial I will help you with the tool called IP puller or IP logger. IP logger grabs the IP address of the victim when he clicked on the …

Read More »

Good and Bad about high RAM usage of Antivirus

For any PC antivirus is one of the programs you must install as soon as your operating system installation is done. It gives you high security that needed from different threats and malwares, but it doesn’t mean that antivirus will stop each threat that’s there in space.

Read More »

What is TCP/IP stack

Every basic you need to know about TCP/IP model Hey there! We are spending our most of the time on the internet, you know that there are more than 1.5 trillion devices are connected to our internet right now. Have you ever thought, how all these devices are connected and communicating each other without any interruption? yes, TCP/IP is one …

Read More »

What is Exploit? Everything ethical hacker needs to know about

If you are some guy that’s working in IT or the one who is interested in programming or information security, you might be hearing this exploit word hell lot of times and in this for the last time let’s clear it like the way never. By the end of this article you will understand what is exploit in computer security, …

Read More »

Hackers using Facebook messenger to mine cryptocurrency

With the increase of interest in cryptocurrency, there is also increase in the malware that is spreading to earn that digital money. Recently Trend Micro discovered a virus more precisely a bot which is spreading through Facebook messenger. Even though this is observed in korea as it is one of the most using instant messenger there is a probability of …

Read More »

Hackers using wordpress websites to mine cryptocurrency

Everyone is behind cryptocurrency. It doesn’t matter on which coin you are investing, all cryptocurrencies values are getting skyrocketed. There are people buying them and investing in them but some nerds, geeks are into different ways to earn those cryptocurrencies. Recently website administrators used javascript to use client computing power to mine bitcoins and some other cryptocurrencies but this Monero …

Read More »

Captcha Plugin Installs Backdoor in 3 Lakh wordpress websites

WordPress is the most using Content Management System in the world. 75% of the web is made up of wordpress. One of the reason for its huge success is the support of plugins which takes simple wordpress website to complex web application. Recently Captcha plugin got removed from their wordpress repository for its backdoor fraud. Wordfence looked into the plugin …

Read More »

Everything you need to know about Block Chain Technology

In this glorious 2017 everyone is talking about bitcoins, digital currency, crypto-currency, block chain and many more things and these are some of the terms that are one of the more searched in the internet. Without due let’s jump into the topic What is Block Chain? Block chain is a distributed de-centralized system. Just understand it in this way for …

Read More »