Monthly Archives: July 2016

Home » Archives for July 2016 » Page 2

‘DroidJack’ Malware On ‘Pokémon Go’ For Android Could Be Acquired Through Unofficial Installation Methods

 

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The world appears to currently be divided into two groups, those playing Pokémon Go and those not indulging in the recently released augmented reality mobile game by Nintendo. The game is currently available in the U.S., Australia and New Zealand only, leaving many […]

By |July 23rd, 2016|Pokemon Go Hacks and Tricks|

All The Top Android dialler commands to bring special menus

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top Android Secret Dialler Codes You Should Know
You may be an Android expert but there are some handy tricks you dont know about Android smartphone which could help you troubleshoot ticklish problems like Camera or GPS now working.

This happened to me when my […]

By |July 15th, 2016|Papers|

How Dynamic HTML is performed using the javascript

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Dynamic HTML is not a new markup language. It is a collection of technologies (generally HTML, CSS and JavaScript) which changes the document content once it is loaded into a web browser.

Some examples for dynamism in a web document are given below:

Changes to […]

By |July 15th, 2016|Papers|

What Is A Motherboard? What Are The Different Components Of A Motherboard?

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A computer comprises of many components like the CPU, monitor, keyboard, mouse, and much more. All these components talk to each other via a common hardware known as the motherboard or simply mobo. Most users don’t have much idea about the green colored […]

By |July 15th, 2016|Papers|

Hacker reveals how to extract PIN of a smartphone from any selfie

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie
If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is […]

By |July 15th, 2016|Papers|

Secret Voice Commands In YouTube Videos Can Hijack Your Smartphone

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Researchers say a muffled voice hidden in a YouTube video can take over your smartphone
Researchers have discovered a series of inaudible voice commands secretly hidden in innocuous YouTube videos that can compel unprotected Android or iOS smartphones to carry out malicious operations to […]

By |July 14th, 2016|Papers|

Mozilla Will Begin “Rusting” Of Its Firefox Browser On August 2

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mozilla is busy tying up Firefox’s shoe laces, putting it in a browser race with Chrome which is baked inside Google’s kitchen. Chrome, launched in 2008, has defied all yardsticks of popularity kicking Firefox from the prime position.

But the creator of the browser, […]

By |July 14th, 2016|Papers|

How to run iPhone and iPad apps on your PC/laptop

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here is how you can run and play iPhone and iPad apps on your PC/laptop
While there are no flawless ways to run iPhone apps and iPad apps on your Windows or OS X PC, the best way would be to use a simulator […]

By |July 14th, 2016|Papers|

Five Linux networking commands to help with network connectivity issues

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These five helpful networking commands to monitor connectivity issues on Linux PCs
Linux is everywhere and nearly all Linux distros need network connections to offer their services. Network connection failures is one of the major headaches if you are using a Linux based PC […]

By |July 14th, 2016|Papers|

Transport Layer Of OSI Model: Working Functionalities and Protocols (A Beginner’s Guide)

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model its 7 layers, the transport layer is responsible for the most of the functionalities out of all the OSI layers. So, let’s go further and take a look into what all basic things transport layer […]

By |July 14th, 2016|Papers|