Yearly Archives: 2016

/2016

How to Clear Storage Space in Android in 6 Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Every Android user at some point of time runs out of their storage space and gets a prompt saying the very irritating “Running out of storage space” dialogue. Today we will tell you how you can Clear unwanted data and reclaim your storage […]

By |June 25th, 2016|Papers|

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.
What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and […]

By |June 25th, 2016|Papers|

What is the Difference between SOAP and REST ??

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Web services that are used to communicate in-between applications that are being developed in many programming-languages and running on different platforms. Like a Java application running on linux platform can communicate with a PHP application running on windows platform. There are two types […]

By |June 25th, 2016|Papers|

How to make advanced search on Google using Google Dorking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

How to use Google like a pro using Google Dorking
In the last article, we had reported how Iranian hackers were able to glean information from Google about the dams in US cities in order to infiltrate and flood the cities. The hackers used […]

By |June 25th, 2016|Papers|

How to do socket programming in java

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This article describes a very basic one-way Client and Server setup where a Client connects, sends messages to server and the server shows them using socket connection. There’s a lot of low-level stuff that needs to happen for these things to work but the Java […]

By |June 25th, 2016|Papers|

Top 10 Security Coding Pratices

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Validate input. Validate input from all un-trusted data sources. property of input validation can eliminate the vast majority of softwares vulnerabilitie. Be suspicious of most external data’s sources, including command-line arguments, networking interfaces, environmental variable, and user controlled file.
Heed compiler warnings. Compile code […]

By |June 24th, 2016|Papers|

Best Javascript frameworks for presentation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Creating Presentation for modern browser JavaScript and Html5 frameworks play a big role.Presentation is basically a way of representing the organizational visual details to create an overall impression.Doing a presentation for website manually is a hard task but the presentation frameworks makes it easy.

There […]

By |June 24th, 2016|Papers|

7 Apps That Perfectly Replace Adobe Creative Suite on Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Many of the Linux users have been asking Adobe to release their Creative Suite on Linux but their answer is a straight NO. The reason for Adobe’s harsh decision is because the user base is less in number. With the huge growth in the […]

By |June 24th, 2016|Papers|

GNU Emacs Tutorial: How To Edit A File (Cheat Sheet Included)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

I’ve recently started learning Emacs, and in this post, I will be describing how to edit a text file in Emacs and some mostly used shortcuts. This post is aimed for those who’ve either never used Emacs or were lazy enough to even […]

By |June 23rd, 2016|Papers|

What is Jailbreaking? iPhones and iPads Jailbreaking explained

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Jailbreaking, How does jailbreaking work? Why do jailbreaking? Jailbreaking of iPhones and iPads explained
You may have heard from your friend who owns an iPhone saying that he has jailbroken it. You may have wondered what actually is jailbreaking. Lately, the term “jailbreaking” […]

By |June 23rd, 2016|Papers|