Articles
How to Know if Your Phone is Under A Malicious Control
Summary: In this article, we’ll learn, how to tell that your phone’s been hacked. If…
Chatbot Issues : Secure Your Chats
Chatbot are the thing that act as bridge between user to user or user to…
Password Security – The Most Important Thing in the 21st Century
Passwords are the first line of defense that fights against unauthorized access to your computer…
The Future of Cyber Warfare
Throughout the ages we have witnessed a multitude of cyber attacks affecting major companies and…
OPERATING SYSTEM
What is an Operating System? The recent advancements in technologies, where every gadget is considered…
Cyber Laws and Modern Changes
How cyber Law became important: During the 1960s, the improvement of the web was a…
NESSUS – after 2020, safety comes first!!
What we are going to see about Nessus. In the following purview, we are going…
YouTube Algorithm: An Amazing Guide 1.0
YouTube has an ever-changing algorithm that directs the flow of media for content creators and…
The Awesome Suite, Aircrack-ng Part 1
In this article let’s go over what Aircrack-ng Suite is and how to use it.…
Zphisher 2.2 : Phishing Attack on LinkedIn
Phishing Attack is a type of attack where the attacker pretends a be from the…
BeEF Framework 1.0
Disclaimer – Firstly, I would like to make something clear. If you intend to hack…
ARTIFICIAL INTELLIGENCE -EMERGING IN HEALTHCARE SECTOR
As we all know how much Artificial Intelligence is impacting us in our day to…
SQL Map: tool 2001
SQL map is an open source penetration testing tool that automates the process of detecting…
WHIRLPOOL ALGORITHM- For Cryptography 010101
Whirlpool is a cryptographical hash function designed after the discovery of Square block cipher, and…