Daily Archives: June 29, 2016

How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These days very few people burn ISO images on disks and use them as bootable media. Now, USB drives have replaced them as they are faster and a more convenient method to install an operating system on a machine.

While there are many tools […]

By |June 29th, 2016|Papers|

Try Whonix 13 The Anonymous Operating System

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whonix is a desktop operating system designed for advanced privacy and security. While maintaining the usability, it realistically addresses attacks. It makes online anonymity possible using fail-safe, desktop-wide use of Tor network. Here, a heavily reconfigured Debian base is run inside many virtual […]

By |June 29th, 2016|Papers|

SyntaxDB — A Perfect Programming Syntax “Search Engine” For Coders

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Very often programmers new to the field ask if is it okay to use Google and Stack Overflow to look up some syntax. The answer is yes — searching the web is a routine task of a good developer and its frequency even […]

By |June 29th, 2016|Papers|

How To Recover Deleted Files From Your Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What happen when we delete our valuable files mistakenly, there are two ways or we can say two types of computer users, one – who use only delete button and others who delete files by pressing Shift+Delete, The simple delete button stores your […]

By |June 29th, 2016|Papers|

This code can hack nearly 90 percent of credit card readers in circulation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shocking : A cyber security firm found 90% of credit card readers currently use the same password from 1990 till date.
This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using […]

By |June 29th, 2016|Papers|

Most frequently asked interview questions on linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here are some of the linux interview questions and answers that would help you to crack some of the most important and difficult interviews as a beginner.

1. What is the basic difference between Linux and Unix?

Linux is an open source operating system while […]

By |June 29th, 2016|Papers|