Yearly Archives: 2016

/2016

How To Enable Ctrl+C / Ctrl+V For Copy-Pasting In Windows Command Prompt

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Some of the most intriguing Command prompt-related queries that I have seen people looking out for are:

How to enable copy and paste in CMD?
Copy and paste not working in CMD
How to copy and paste in command prompt?
Ctrl+C/ Ctrl+V not working in CMD

Well, here is […]

By |July 1st, 2016|Papers|

Here is Why You Should be Very careful While Using Public Wi-Fi

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We are all told constantly that we should be very careful about connecting to free public Wi-Fi. Though it is an easy warning to forget about when we are away from the home or when we need to get online urgently.

In an experiment conducted […]

By |July 1st, 2016|Google Hacking Database, Papers|

Spreading malware through Images with Stegosploit tool

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Next gen cyber attacks could be through Internet images using Stegosploit tool which allows hackers to embed malware in an image
Security Researcher Saumil Shah has developed a Stegosploit tool wherein hackers can embed executable JavaScript code within an image to trigger a drive by […]

By |July 1st, 2016|Papers|

How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These days very few people burn ISO images on disks and use them as bootable media. Now, USB drives have replaced them as they are faster and a more convenient method to install an operating system on a machine.

While there are many tools […]

By |June 29th, 2016|Papers|

Try Whonix 13 The Anonymous Operating System

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whonix is a desktop operating system designed for advanced privacy and security. While maintaining the usability, it realistically addresses attacks. It makes online anonymity possible using fail-safe, desktop-wide use of Tor network. Here, a heavily reconfigured Debian base is run inside many virtual […]

By |June 29th, 2016|Papers|

SyntaxDB — A Perfect Programming Syntax “Search Engine” For Coders

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Very often programmers new to the field ask if is it okay to use Google and Stack Overflow to look up some syntax. The answer is yes — searching the web is a routine task of a good developer and its frequency even […]

By |June 29th, 2016|Papers|

How To Recover Deleted Files From Your Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What happen when we delete our valuable files mistakenly, there are two ways or we can say two types of computer users, one – who use only delete button and others who delete files by pressing Shift+Delete, The simple delete button stores your […]

By |June 29th, 2016|Papers|

This code can hack nearly 90 percent of credit card readers in circulation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shocking : A cyber security firm found 90% of credit card readers currently use the same password from 1990 till date.
This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using […]

By |June 29th, 2016|Papers|

Most frequently asked interview questions on linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here are some of the linux interview questions and answers that would help you to crack some of the most important and difficult interviews as a beginner.

1. What is the basic difference between Linux and Unix?

Linux is an open source operating system while […]

By |June 29th, 2016|Papers|

Detailed Explanation on SS7 Attacks

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DETAILED EXPLANATION ON SS7 ATTACKS

Summary :-
What is SS7 Attacks are we really secure ?. Well Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide […]

By |June 26th, 2016|Papers|