Hacking 8 Most Common Hacking Techniques You Must Know Ankit Chaubey, 31, May 202331, May 2023 Using these hacking techniques, a hacker can know about your personal unauthorized information which you don’t want to reveal. 1. Phishing Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive… Continue Reading
How To How to List Users in Linux: A Ultimate Guide Prakash, 30, May 202330, May 2023 Welcome to our ultimate guide on how to list users in Linux! Whether you’re a seasoned Linux user or just starting your journey, understanding how to efficiently manage and display user information is crucial. In this comprehensive article, we will delve into the various commands and techniques that allow you… Continue Reading
Cyber Security Reportly: is an AzureAD user activity report tool. Prakash, 29, May 202329, May 2023 Reportly is an AzureAD user activity report tool. About the tool This is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious user and a time frame and will receive a report detailing the following: Example_vid.mp4 … Continue Reading
How To How to Test SSD/HDD Health in Linux? Prakash, 28, May 202328, May 2023 The health of your SSD (Solid State Drive) or HDD (Hard Disc Drive) is important for the overall performance and reliability of your system. Monitoring the health of your storage devices allows you to spot potential problems early and take the required steps to prevent data loss. In this post,… Continue Reading
Reveals What is RFI and LFI? A Comprehensive Comparison Prakash, 27, May 202327, May 2023 RFI and LFI are two common web application vulnerabilities that can lead to serious security breaches. Learn the key differences between them in this comprehensive comparison. Remote File Inclusion (RFI) is a kind of vulnerability that is commonly found on PHP-powered web portals. Local File Inclusion (LFI) is similar to… Continue Reading
Uncategorized How to Block Website with Batch File Virus Amit, 26, May 202326, May 2023 Learn how to effectively block website using a batch file virus. Discover step-by-step instructions and practical tips to create a powerful script that can restrict access to specific websites, allowing you to enhance security and control browsing habits on your computer or network. To replace the hosts file with a… Continue Reading
Cyber Security What is cross site scripting (XSS) Basics You Need to Know Prakash, 25, May 202325, May 2023 Cross site scripting (XSS) is a kind of security vulnerability that happens when a web application fails to properly validate and sanitize user input. Allowing attackers to inject and execute malicious scripts into web pages that other users are seeing. When a web application contains user-supplied data in its output without proper… Continue Reading
Tech Now WhatsApp Allow You to Edit Message That You Sent Prakash, 23, May 202323, May 2023 WhatsApp has announced the addition of an editing function that will allow users to edit messages up to 15 minutes after they have been sent . According to a blog post, the Meta-owned messaging service has begun rolling out the editing function globally. And it should be available to all… Continue Reading
Hacking 7 Hilarious Hacking Prank Websites to Make Fool Your Friends Prakash, 22, May 202322, May 2023 Hacking Prank Websites are an excellent way for surprising the people around you. You may simply create false emails, send spoof messages, and even break into other people’s social network accounts using these websites. It important to remember that hacking fake sites should be done responsibly and in good fun…. Continue Reading
How To What Happens If We Mute Someone on Snapchat Prakash, 21, May 202321, May 2023 Too many Snapchat notifications may distract You from your focus and productivity. If a friend or member of a Snapchat group sends you too many alerts. It’s time to silence them. This is known as Snapchat’s DND feature. But, before you do that, you should know what happens when you mute… Continue Reading
Hacking How to Monitor Your WiFI Network and See What People Are Doing Prakash, 18, May 202318, May 2023 Monitor your WiFi network is an important step in ensuring the security of your home or workplace. It allows you to keep an eye on what people are doing and make sure that no one is accessing your network without permission. In this article, we will discuss how to monitor… Continue Reading
Linux PentestGPT: A GPT-empowered penetration testing tool Prakash, 16, May 202315, July 2023 “PentestGPT” is a new ChatGPT-powered penetration testing tool that assists penetration testers in automating their pentesting activities. PentestGPT was released on GitHub by “GreyDGL,” a Ph.D. student at Nanyang Technological University in Singapore. It is built on top of ChatGPT and operates in an interactive mode to guide penetration testers… Continue Reading
How To How to Change Linux Password Quickly and Easily Prakash, 15, May 202315, May 2023 Changing passwords in Linux is an easy process that may be completed in a few steps. It is essential to change your password on a frequent basis to ensure the security of your system. This article will show you how to Change password in Linux, as well as some recommendations… Continue Reading
Linux Can Linux Be Hacked? Debunking the Myths and Facts Prakash, 13, May 202313, May 2023 If you have installed Linux or are considering doing so, you may be concerned about its security and if linux can be hacked. When I first installed Linux on my PC. I was concerned about the same thing. This is a really clear question because there are always people out… Continue Reading