Posts

Showing posts from June, 2017

CISA CISM CISSP Cyber Security Certification Details

Image
 Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cyber security field have gone up 80% over the past three years than any other IT-related job. So, this is the right time for you to consider a new career as a cyber security professional. Cyber security experts with industry-standard certification are coming from a wide range of backgrounds, who prepare themselves to protect computer systems and networks from viruses and hackers. But before getting started your career as a cyber security expert, it's important to understand basics of networks and how data moves from place to place, and for this, you are highly advised to gain some valuable cyber security certifications. Cyber security certificatio...

Know the Password of Connected wifi netwoks using CMD

Image
How To Find Passwords of All Connected Wi-Fi Networks using CMD Windows command prompt is a great tool for the people who love command interface rather than Graphical UI. There are a lot of features which are still not implemented in Graphical User Interface can be accessed via CMD. In my previous articles, I’ve talked about a lot of CMD commands. In this article, I am going to share how to find out the password of all connected devices using CMD along with suitable screenshots for clear understanding. Before going further, you should know one thing that whenever you connect to a Wi-Fi network and enter the password,  Windows creates a WLAN profile of that Wi-Fi network. These WLAN profiles are stored in the computer alongside other required details of the Wi-Fi profile. We can uncover these WLAN profiles later by simply using Windows CMD. You can find out all the connected networks and their passwords by using simple commands. These commands can also uncove...

Top 10 Methods Hackers Used To Hack Facebook.

Image
Facebook has become an essential part of our daily life. We share our life moments, photos, videos and text msgs on Facebook. But, when it comes to your privacy and security, you can never be sure on the internet. Facebook and similar websites try their best to ensure the user’s privacy and security but there are still many issues that can cause the hacking of Facebook accounts. So let’s not ignore this and try to understand how a hacker can hack the Facebook accounts and let’s understand how to safeguard Facebook accounts against hackers.   Top 10 Methods used By Hackers For Hacking Facebook Accounts   1. KeyLogging Keylogging is one of the easiest ways to hack a Facebook account. A keylogger is a program that records and monitors the user’s input and keeps a log of all keys that are entered. The keylogger can actively send your inputs to hackers via the Internet. You have to be very careful while dealing with keyloggers because even the computer exp...

What is 5G Network? 5G Explained, Release Date.

Image
No matter what kind of mobile technology that you have in your pocket it quickly becomes yesterday’s news and that may never be more evident than right now as telecommunications providers worldwide are working on 5G. The industry is hoping that 5G will be good enough and will be a game changer in the  telecommunication industry. What is 5G? 5G is a network system which has much higher speed and capacity, and much lower latency. 5G is centered around the idea that the Internet of Things that is connected devices that enable self-driving cars automated homes and more. It will become crucial shortly, and that mobile data networks will be very robust to handle it all with wearables appliances vehicles mobile AR and VR devices and so on. 5G, however, is not only aiming to reduce latency to as low as one millisecond to allow real-time operation of important devices. It also boasts a maximum speed of 20 gigabits per second way faster than the quickest LTE networ...

Top 10 Most Popular WiFi Hacking Tools.

Image
Download Wi-fi Hacking tools: 1. AirCrack AirCrack is available For Linux 2.  AirSnort AirShort is available For Linux and Windows 3.  Cain & Able Cain and Able available For Windows 4. Kismet Kismet is available for Linux, OSX, Windows and BSD platforms 5. NetStumbler NetStumbler is available for Windows 32 bit 6. inSSIDer   inSSIDer is available for Windows and OS X 7.  WireShark Wireshark is available for Windows, Linux, OS X, Solaries, FreeBSD 8.  CowPatty CowPAtty is available for Linux OS 9.  AirJack AirJack is available for Linux 10.  Web Attack Web attack is available for Linux.

What is Firewall..?? What's the need of a Firewall.??

Image
Most of us have heard of the word firewall at some point. There are many misconceptions about firewall which we will clear today. If you are running any of the modern and popular operating systems, it is very likely that you have a firewall enabled.   What Is a Firewall? First of all, in a firewall, there are no flames or actual wall involved which is obvious. A firewall is basically a shield that is meant to protect your Computer, Smartphone from various malware present on the Internet. Every time you browse a web page, a series of requests are sent by your browser to the respective web server in the form of data packets. The role of a firewall is to keep a close eye on these data packets and determine if they are safe or not. The firewall finds the tampered data packets by following the rules which are set up. Depending on these rules, the data packets are either rejected or accepted. Here are a few reasons why you should have a Firewall ...

C vs C++ . Which one is better..??

Image
Which one is better? But first, let me introduce their features and the length of their being around in the software engineering world. Let’s begin with C, is a general programming language and was invented in 1970, it is used for the salvation of the computer operating system kernel to the user interface, Later on, In 1980 C programming was modernized. C++ programming language was introduced in 1998, and it is a modernized C programming language with enhanced features, which aims at overcoming the problems the C programming was unable to. So, C++ language is much younger than C. The major difference between C and C++ is that C is a procedural programming language and does not support classes and objects, while C++ is a combination of both procedural and object-oriented programming language; therefore C++ can be called a hybrid language. There is still a question which language is better, I will say it depends for what purpose they are used. If one is working on the...

Trick to Lock and Unlock Your PC with a USB

Image
If you’ve ever watched any Hollywood movie based on Hacking, you must have seen how the hackers protect and hack computers just by using USB Pendrive. It seems like a cool idea. You can Lock down your PC using Pendrive and then unlock it using the same Pendrive. How to Lock and Unlock a Computer with USB Pendrive? It is a very simple process. I’ll guide step by step but make sure a working USB Pendrive without any virus or malware. It’s okay if you already have some important files on your Pendrive, this software does not require empty Pendrives. Step 1: Download and install a software: Predator . This software locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device. Step 2:  Once Predator launches plug in the Pendrive. When you’re away from your PC, you simply remove the USB drive: – once it is removed, the keyboard and mouse are disabled and the screen darkens ...

What is Overclocking...??

Image
What is Overclocking? If you have never heard of Overclocking before, it is the dark heart forcing your electronics to perform better than the manufacturer intended. Computer CPU’s tablet, phone and any other modern computing devices you own have processors inside them that all have something in common. Their performance is dictated by the design or architecture and the number of cycles that they can perform per second which is usually represented as frequency or clock speed. This is where the term overclocking comes from. You are taking the clock speed and turning it up over the manufacturer’s recommendation to get more performance. Clock speed is not the only factor so it is not like you can overclock a calculator to perform as well as a gaming PC, but can make the calculator faster relative to its original state. How do you do it? If you want to overclock, it often requires other aspects of your device to be run outside of specifications. The device will b...

NTFS , FAT32 , exFAT File System Differences. MUST CHECK OUT..!!

Image
You must have noticed while formatting an internal drive, external drive or removable drive, Windows gives you the choice of using one of these three different file systems: NTFS, FAT32, and exFAT. Do you know the meaning of these 3 file systems and why are they important? It is awkward that Most of the computer users don’t care much about the meaning of available options and features. They just use them to see if those features work. It’s not their fault actually windows do not provide explanations of many features and options to a general user. In such cases, you should try using google and if the internet is not available, ask a techy guy. I try to discuss such Windows terms in my articles. In addition, today I am going to share the meaning of NTFS, FAT32, and exFAT file systems. First of all, let’s understand what is a file system. What is a File System? A file system is used to provide a way of organizing files in a drive. It specifies how data...

Difference between Coder Programmer and a Developer

Image
Maybe you have heard about these job titles in the past, but what exactly is the difference between them? Some people claim that it mostly depends on your education and on what you have achieved; in some way, this may be true, but some others claim that sometimes the company you are working for decides if you are a programmer, a developer or other, making it merely a job title. Let’s take a closer look to this.    What is the exact difference Between a coder, a programmer, and a developer ?   1:  Coder : A Coder is a person in charge of writing the code that makes most of our apps run properly. Those who are coders have the ability to create software that can be used not only in apps but also in video games, social media platforms, and many others. Coders sometimes cannot do all the phases required in the making of a software, like designing or testing, they mostly take part only in the phase of writing the base code. In some cases, ther...

Chance To Get $200,000 by Google , MUST READ..!!

Image
If you are a hacker or a security researcher, that is probably going to be a good news for you. Google Will now Pay you Up to $200,000 if you Find any Bug in it’s Android OS. A few days ago, a malware called “ Judy ” hit over 36.5 million Android-based phones and caused a lot of damage. So, Google has decided to increase the bounty for finding a bug in Android OS to as much as $2,00,000. According to cyber security firm Check Point, dozens of malicious apps were downloaded between 4.5 million to 18.5 million times from the Play Store. It was noted that the malicious code was present hidden in some apps since April 2016, undetected by Google. Google has now removed the infected apps from the PlayStore. “Judy” is one such case of how an open and free mobile operating system (OS) can be exploited by malicious app developers. Tech companies such as Apple, Facebook, Microsoft, and Google have paid out millions of dollars in bug bounty programs over the past few ye...

Three Simply Ways To Get Cash Rewards From Google

Image
Google is built around data - and it probably knows a lot more about you than you think it goes . The good part about all this is that Google offers a lot of rewards to people who will volunteer data that it finds useful. This information isn't just used to advertise to you either - instead, sometimes Google wants data from users to build more detailed offerings that help all users. But if you're in college and want to get a little extra cash to flaunt with your friends, there are limited options , and Google is definitely the most reputed company around in this field. So if you'd like to line up for some rewards, here are three different ways to get some cash out of Google. 1. Google Opinion Rewards Google Opinion Rewards launched in India only last week, and it pay s users in Google Play credits. Not so great if you're looking for extra talk-time to make calls, but if you've been eyeing a cool new Android game but don't want to put th...