Tag #cyberblogs
How to Know if Your Phone is Under A Malicious Control
Summary: In this article, we’ll learn, how to tell that your phone’s been hacked. If your phone is hacked, you’ll notice, that your battery draining a lot faster, your phone’s performance rate has gone down, too much of your data…
Password Security – The Most Important Thing in the 21st Century
Passwords are the first line of defense that fights against unauthorized access to your computer and your personal data. No other users can read, delete or change your data without knowing your password. But why is password security required? As…
OPERATING SYSTEM
What is an Operating System? The recent advancements in technologies, where every gadget is considered a smart device has really revolutionized the world. Almost everyone has access to this devices be it mobile phones, tablets, laptops, smart watches or even…
BeEF Framework 1.0
Disclaimer – Firstly, I would like to make something clear. If you intend to hack someone you’ve come to the wrong place. It is absolutely contemptible if you want to hack someone without their consent and with the tools available,…
ARTIFICIAL INTELLIGENCE -EMERGING IN HEALTHCARE SECTOR
As we all know how much Artificial Intelligence is impacting us in our day to day life. Healthcare is major sector to deploy AI. It generates millions of gigabyte of data, large amounts of money are spent on it for…
SQL Map: tool 2001
SQL map is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection faults and hacking databases. What Is SQL Injection? SQL Injection is a code injection technique where an attacker executes malicious SQL queries…
WHIRLPOOL ALGORITHM- For Cryptography 010101
Whirlpool is a cryptographical hash function designed after the discovery of Square block cipher, and it is considered to be part in family of block cipher functions. Whirlpool is a construction based on a substantially modified Advanced Encryption Standard (AES).The…
Arch VS Ubuntu: Which Linux Distribution is the Better One?
Arch Linux and Ubuntu are two major Linux distributions that get a lot of attention and have dedicated fanbases. They are used as base distributions for other systems that are forked off of them… But, how they are doing things is quite different, and a…
The Invisible Browser in the Browser
In this Article we will learn about an advanced phishing technique called Browser in the Browser or in-short BitB Attack. Introduction A penetration tester and security researcher known as “mr.d0x” recently exposed a phishing technique. Phishing is a cybercrime in…
Wireshark : Network Protocol Analyzer
Wireshark is world famous widely used network protocol analyzer. It is open-source packet analyzer which is free to use. In initial stage original name of project was Ethereal later in 2006 it was renamed due to trademark issues. What is…
IP Address (IPV4 and IPV6)
What is an IP Address? IP Address stands for Internet Protocol Address. This is a logical address assigned to a system so that it can be identified in different networks. It is said logical as the IP address is not…
Neural Networks: The Artificial Brain
If you are aspiring to learn about Neural networks, then you are at right place. Here I’m going to give a detail note on Artificial Neural network with a common examples. What is Neural Network ? Neural Network is series…
Technology: A Catalyst for Social Good
Introduction Technology is the things that become everything in our lives today. It is the thing that connects everyone all around the world. Technology changing our world at a speed never seen before. Technology makes our lives better and safer.…
Does computer technology affect the way people immigrate around the world avidly?
In Today’s article let’s take a look at how much Computer Technology has affected people and the main question being does computer technology affect the way people migrate around the world? Introduction The Future is NOW! You always hear this,…