never use a debit card for shopping online, and here is why
Reason #1
Both the debit card and credit card allow you to make purchases using e-transaction. But there is one big difference. The credit card has a limit on how much you can spend. The debit card doesn't...
Saturday, December 28, 2019
How to clear WhatsApp cache when you are running low on phone memory
How to clear WhatsApp cache when you are running low on phone memory
hatsApp is arguably one of the most popular social messaging apps in the world. Every day millions of users exchange messages on WhatsApp in the form of text, videos, voice recordings, GIFs, stickers,...
Tech Tips: How to block advertisements on your Android smartphone
How to block advertisements on your Android smartphone
1. Using Google Chrome browser settings
You might be used to seeing a host of ads while browsing the internet - watching videos or reading articles - using Chrome web browser on your smartphone, but these ads are...
Thursday, December 26, 2019
How to Hide SMS Messages with a Third-Party App
How to Hide SMS Messages with a Third-Party App...
There are many apps that can help you with this, but for the purpose of this article we’ll show you how to use one in particular, Message Locker (SMS Lock).
1- Download and Install the App
2- The app is free, with...
Sunday, December 22, 2019
Top Ten Password Cracking Techniques
Top Ten Password Cracking Techniques
1. Dictionary attack
The dictionary attack uses a simple file containing words that can be found in a dictionary, hence its rather straightforward name. In other words, this attack uses exactly the kind of words that many people...
Thursday, December 19, 2019
Basic Linux Commands You Should Know About
Basic Linux Commands You Should Know About
I have listed here some Common Linux Commands list :
cd (Change Directory) – If you want to get into another folder, then this command is used like cd /Desktop is used to get into the Desktop Folder.
ls...
Sunday, December 15, 2019
COMPUTER VIRUS
COMPUTER VIRUS
A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge. A Computer virus can be spread from one host to another by sharing infected file or by downloading infected files from...
Information Gathering Tool || Online
Information Gathering Tool || Online
intoDNS checks the health and configuration of DNS and mail servers.
http://www.intodns.com
Web technology information profiler tool. Find out what a website is built with.
http://builtwith.com
Domain information, whois...
Batch File Programming..
Batch File Programming..
What is a batch file?
A batch file is a collection of instructions that are used to run multiple commands at a time. It is basically a bundle of packages that are written In a sequence so that user does not have to put commands and instructions...
TOP HACKING APPS FOR ANDROID SMART PHONES AND TABLETS
/cdn.vox-cdn.com/uploads/chorus_image/image/59377089/wjoel_180413_1777_android_001.1523625143.jpg)
TOP HACKING APPS FOR ANDROID SMART PHONES AND TABLETS
AnDOSid
AnDOSid tag’s posts with two unique numbers which relate to the Android device that sent the request. AnDOSid allows security professionals to simulate a DOS attack.
AndroRAT
Androrat is a client/server...