Monthly Archives: January 2016

//January

Linux Ransomware creators third time unlucky as researchers crack encryption again

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers find Linux.Encoder 3 version still uses buggy encryption and allows file recovery
Much to the delight of security researchers, a group of malware creators are currently having difficulty getting cryptographic implementations right in their ransomware. This has not happened once but thrice.

A group of cyber criminals […]

By |January 9th, 2016|Papers|

Get Wi-fi passwords without hacking : Basic Mode

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Get Wi-fi Passwords without hacking, its no where a hacking but just for fun and Ignorance..

Requirements:
iPhone or Android

Let’s begin with the tutorial

1- First of all, go to this site with your phone: http://www.wifimap.io/
2- Download and install the App to your device
3- Activate your Wi-fi, and permit […]

By |January 6th, 2016|Papers|

D-Link’s Wireless Twin Routers Ensure That Your Entire House Is Wi-Fi Enabled

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

D-Link comes up with two ugly looking routers that provides Wi-Fi coverage to every corner of your house
Most consumer-level routers cannot create a Wi-Fi network that covers every corner of a large house. As a result, larger homes suffer from poor Wi-Fi connections. To combat this […]

By |January 5th, 2016|Papers|

Top 5 Facebook Scams That You Should Be Aware Of

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The bigger and popular sites with the huge number of visitors are like hackers’ wonderland for posting scams. Especially the users on social media websites are prone to such scams that further convert to dangerous cyber attacks. Facebook has about 1.4 billion users making it potentially the […]

By |January 5th, 2016|Papers|

What is the Blue Screen of Death in Windows – The Complete Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

BSOD or “Blue Screen of Death” is an error message displayed on the screen when Windows OS fails to keep up to its promise of working smoothly without errors, basically, when the operating system crashes due to some reason it shows a Blue Screen of Death.

Let’s […]

By |January 4th, 2016|Papers|

The most popular and most downloaded Chrome Extensions of 2015

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

These are the most popular Chrome Extensions that would enhance your browsing experience
Welcome to the world of amazing Chrome extensions, which has widgets to improve your entertainment quotient, niche plugins with dedicated functionalities and plugins that make web browsing more secure than ever.

Chrome productivity extensions provide […]

By |January 4th, 2016|Papers|

Top ten operating systems for ethical hackers and security researchers

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A comprehensive list of most popular operating systems among hackers all around the world.

Back in August, we had posted a list of top ten hacker tools. Now we have advanced it one step further to bring you the best operating systems for hackers.
This time it is […]

By |January 3rd, 2016|Papers|