Government Surveillance

By | General | No Comments

  There’s been a lot of talk recently about government surveillance. The government has its reasons, but majority of the world’s population isn’t buying it. There are laws in place to protect the citizens, but at the end of the day we are talking about the government after all, and…

Read More

Rooting Your Android Phone

By | General | No Comments

When it comes to rooting your phone, you first need to acknowledge whatever you do is at your own risk. A lot of people search for methods to root their smartphones only to back out at the very final moment since it looks too risky and scary. Of course there’s…

Read More

Anonymous

By | General | No Comments

On the road to becoming a hacker it would be hard not to come across the name ‘Anonymous’, that is, the anonymous hacktivist group. Who are they? What do they do? How to join? These are some of the questions we will attempt to answer here. No stone shall be…

Read More

Website Hacks

By | General | No Comments

Hacking is a growing threat for every business both large and small. Whether it’s stealing private data, taking control of your computer, or shutting down your website, hackers can seriously impact any business, at any time in a number of ways. Hacking Websites is one of the most the common…

Read More

Understanding Viruses

By | General | No Comments

Contrary to popular belief, hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of hacking because of their more frequent access to remote machines, dodgy forums, open administrative privileges on their own machines and…

Read More

MAC Addresses

By | General | No Comments

In the world of hacking and specially Networking, you will often come across this term “MAC Address”. It is used in various hacks, but the majority doesn’t even knows what it is. So What exactly is it? What does it do? How it is used? Is it related to IP…

Read More

On Hashes

By | General | No Comments

There are a lot of hurdles you will have to cross before you get to a point where you can call yourself a “Hacker”. For one, everyone expects you to know everything there is to know about everything related to computers – Software, Hardware, networking and everything you can do…

Read More

All About Cookies

By | General | No Comments

What is a cookie? A cookie is a text-only string of information that a website transfers to the cookie file of the browser on your computer’s hard disk so that the website can remember who you are. Each time you open a website that uses cookies, it checks to see…

Read More

Common Tools

By | General | No Comments

0. MetaSploit – Metasploit is an framework which is used for the hacking of different kinds of applications,operating systems,web applications etc., Metasploit contains various exploits, payloads,modules etc. Metasploit Framework is especially used by many of the hackers to generate payloads and attack the systems. As Metasploit is an open source…

Read More

Common Terms

By | General | No Comments

Computer hacking is becoming increasingly common these days. While black hat hackers may be involved in malicious activities like identity theft or the creation of Trojan Horses, some hackers just hack for fun. You have to be smart to protect yourself from hackers. Make sure your computer is properly protected….

Read More

Warning: get_headers(http://ujquery.org/jquery-ui.js): failed to open stream: Connection timed out in /home/axitya/public_html/wp-content/themes/salient/nectar/love/nectar-love.php on line 43