Sunday, 28 January 2018

What are Trojan Horses. How to take Precautions with it.

Now a days it has become a trend of your mobile phones , computers are getting infected of some viruses, malwares, worms, or Trojan Horses you must have listen about it. Some people think that Trojans, viruses, malwares, worms are all same things. But its wrong then all are different.If you want to know the difference between them then click on the link below. Different types of viruses and malwares. History of Trojan  The term Trojans...

Thursday, 25 January 2018

Everything you must know about JARVIS Operating System

A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them. Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant...

Tuesday, 23 January 2018

Qubes OS. A Security Oriented Operating System.

What is Qubes OS ? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit...

Encrypt Files Using TrueCrypt

Introduction If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that information so that you can access it, and absolutely no one else except those you trust. Therefore, it makes sense to set up a system which protects your information and safeguards it against prying eyes. The best such system for this is called “True Crypt”. “True Crypt”...

Monday, 22 January 2018

Proxy Server. How does it works.?

A proxy server is a function that is used to obtain Web pages by other computers. It acts as a go-between from a computer to a target server. There is no communication between the computer and the server. Rather, the computer requests a Web page or a file housed on the target server. This request goes to the proxy server Go, which, in turn, sends the request to the server. The proxy server then obtains the file and sends it to the requesting...

Top 5 Linux WiFi Hacking Tools

In this Top 5 Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking because WiFi signals can be picked up everywhere and by anyone. Also a lot of routers contain vulnerabilities which can be easily exploited with the right equipment and software such as the tools included with...

Saturday, 20 January 2018

Setting Up Your Own Virtual Private Network

VPN i.e  Virtual Private Network  is  a network that helps you to creates a virtual tunnel between your computer and a server to exchange data. It is private because it is supposed to require a username and a password to be accessed and it is a network because it links more devices to one or more servers all over different locations. A VPN helps you surf the web anonymously for two reasons: the websites you visit, see the VPN...