Be Better. Upgrade Yourself…👇

Tag: Ethical Hacking

  • What is a digital Will? How to setup one for your digital afterlife?

    What is a digital Will? How to setup one for your digital afterlife?

    A Will is a legal document that allows a person to give instructions on what to do with their possessions once they die. For simplicity, assume Digital Will is similar to the Last Will for their digital assets rather than for physical assets. Needless to say, many of our records and assets become digital, all of…

  • Best Free VPN for Android May 2018 Edition!!!!!!!

    Best Free VPN for Android May 2018 Edition!!!!!!!

    Internet services usually collect all our personal details while we browse, this is where we need a VPN. Every time when you are connected to a public Wifi your data is in danger. If you are an avid internet user that VPN is the best thing to keep your data safe, and we are here to help…

  • Forget mouse, use only keys to browse like a Hacker

    Forget mouse, use only keys to browse like a Hacker

    Mice is old school. Grabbing them in one and aiming the cursors have become too heavy, ergonomically bad too. Want to save the every few seconds missed in moving hands between the keyboards and mouse? If you nod ‘yes’, then you’ll like to read further. If you’re a programmer or with an experience of that kind,…

  • The Hidden Layer’s of The Internet, that you never knew

    The Hidden Layer’s of The Internet, that you never knew

    Today about 51% of the world population has access to the Internet and about 390 million Indian has access to the Internet, but do u know there are eight layers of Internet?? and how many layers can you access, have any idea?? Probably most of the people will not know, so let me tell you,…

  • Cambridge Analytica data hack explained

    Cambridge Analytica data hack explained

    If you are reading this post, then it is a fair assumption that you are amongst the many digital users who probably have left some digital footprint that can be easily accessed without users permissions by anyone (need some coding skills to be able to extract data). Many digital users frequently post on their respective…

  • Simple setup for privacy protected browsing in android

    Simple setup for privacy protected browsing in android

    According to Facebook founder Mark Zuckerberg, The age of privacy is over. There’s’ people like me can’t buy the above argument. Of course, we like sharing information to everyone, but not everything, especially not all the time. Unfortunately, that is quite not possible for us to stay undetected on the internet. We’re leaving clear footprints…

  • All you need to know about VPN

    All you need to know about VPN

    After the NSA whistle blower Edward Snowden made shocking revelations regarding the mass surveillance practices of the federal government, cyber security and cryptography became of the hottest topics of discussion in the technology world. Well then, what’s VPN got to do with this? A VPN is like your private lounge on the internet where you…

  • Why I don’t need an antivirus anymore?

    Why I don’t need an antivirus anymore?

    15 years before when I bought my first PC, the first software I installed was an antivirus program. It was an unwritten law in the computer world, first to secure it with an antivirus. Of Course, it should be. If you had computers that time, then you must have witnessed how computer viruses, malwares, worms…

  • Get A Glimpse of What Facebook Knows About You

    Get A Glimpse of What Facebook Knows About You

    We all know that Internet giants like Facebook collects data about us when we use their services. We know that too, those data are used to serve targeted ads and also for other activities. Yeah, they are collecting data, but, what kind of data? What they can learn about us from those data? How these…

  • SMS Merge Using Google Spreadsheet and Way2Sms

    SMS Merge Using Google Spreadsheet and Way2Sms

    I hope you all know what ‘mail merge’ is. Think of the same with SMS or (text message) instead of mail. I just made a ‘hack’ to do SMS merge using “way2sms.com” and Google Spreadsheet. Way2sms won’t allow you to send SMS from outside their site. So you need a hack to get access to their…

  • A Massive Hole In The Internet Security – Heartbleed Vulnerability

    Most probably Heartbleed is going to be the vulnerability of the decade in the internet history. You might have heard the word Heartbleed, received bunch of mails from your favorite web services. This article will help non-technical people to understand What Heartbleed is, and how to be immunized  to the bug. Heartbleed is a bug…

  • Understanding Phishing With Example

    Have you ever heard the words ‘phishing’, ‘spoofing’ before? Most of us thinking that phishing and spoofing are same but it is not and we think that spoofing is a type of hacking and again it is big ‘NO’. Spoofing [sniplet postads] spoofing is delivering a website which is pretending like a legitimate website to…