Yearly Archives: 2016

/2016

Secret Voice Commands In YouTube Videos Can Hijack Your Smartphone

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Researchers say a muffled voice hidden in a YouTube video can take over your smartphone
Researchers have discovered a series of inaudible voice commands secretly hidden in innocuous YouTube videos that can compel unprotected Android or iOS smartphones to carry out malicious operations to […]

By |July 14th, 2016|Papers|

Mozilla Will Begin “Rusting” Of Its Firefox Browser On August 2

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mozilla is busy tying up Firefox’s shoe laces, putting it in a browser race with Chrome which is baked inside Google’s kitchen. Chrome, launched in 2008, has defied all yardsticks of popularity kicking Firefox from the prime position.

But the creator of the browser, […]

By |July 14th, 2016|Papers|

How to run iPhone and iPad apps on your PC/laptop

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here is how you can run and play iPhone and iPad apps on your PC/laptop
While there are no flawless ways to run iPhone apps and iPad apps on your Windows or OS X PC, the best way would be to use a simulator […]

By |July 14th, 2016|Papers|

Five Linux networking commands to help with network connectivity issues

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These five helpful networking commands to monitor connectivity issues on Linux PCs
Linux is everywhere and nearly all Linux distros need network connections to offer their services. Network connection failures is one of the major headaches if you are using a Linux based PC […]

By |July 14th, 2016|Papers|

Transport Layer Of OSI Model: Working Functionalities and Protocols (A Beginner’s Guide)

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model its 7 layers, the transport layer is responsible for the most of the functionalities out of all the OSI layers. So, let’s go further and take a look into what all basic things transport layer […]

By |July 14th, 2016|Papers|

Secure Your Computer By Blocking Dangerous IP Automatically

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Basically, spying and other critical bots are always online to find out the vulnerability in your computer, there are million of IP’s on the internet that pretends to be safe but in the actual term, they are very dangerous which may steal your […]

By |July 13th, 2016|Papers|

What is Address Resolution Protocol (ARP) and How does it Work ?

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Address Resolution Protocol (ARP) is a protocol used for mapping an IP address to a physical machine address that is present in the local network, especially for IP Version 4 which has a 32 bits long address. However, in an Ethernet local area network, physical […]

By |July 3rd, 2016|Papers|

Why Should We Remove USB Device Safely ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

One day i was working in my friends PC, and when i was about to remove the USB device he shouted Wait ! let me remove USB device safely , He said. I was wondering since then, should we remove USB device safely […]

By |July 3rd, 2016|Papers|

How to get started with Ethical Hacking. 6 Great E-books on ethical hacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you an aspiring hacker who wants to get as much info on hacking, apart from online tutorials online free ebooks are a very good choice.If you are ready to read about ethical hacking but don’ know what to read here we bring you […]

By |July 3rd, 2016|Papers|

Lizard Squad uses botnets from hijacked CCTV Cameras to attack bank websites

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Lizard Squad turn CCTV Cameras into massive botnets to launch massive DDoS attacks
Hackers are turning the huge network of CCTV cameras installed worldwide into DDoS botnets which conduct DDoS attacks on banks, gaming firms and government agencies. The CCTV camera botnet uses a open […]

By |July 3rd, 2016|Papers|