Yearly Archives: 2016

/2016

Find out how Facebook knows everything about you

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Do you know Facebook knows everything about you and your preferences? Find out how
If you are a Facebook user, then you should know that by using Facebook, you have given consent to the company to track your activity for advertisers, who in turn hope to show […]

By |January 13th, 2016|Papers|

Top 5 tips to get some privacy and go invisible on WhatsApp

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here are some tips to go invisible on WhatsApp and get some privacy
It was easy to go invisible whenever one wanted while using Google Talk aka GTalk. To get some privacy, all you had to do was toggle the invisible mode in the Google Talk.

However, it […]

By |January 13th, 2016|Papers|

Einstein’s Mass Energy Equation Is Insufficient, Claims Indian Researcher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In an international paper, Ajay Sharma, an Indian researcher has claimed that Albert Einstein’s mass-energy equation – E=mc2 – hasn’t been completely studied under all circumstances and it is inadequate. In his research paper, Mr. Sharma says that the equation has been studied only under special conditions of […]

By |January 11th, 2016|Papers|

Learn to Code: Best Places to Learn C and C++ Programming Languages

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In his famous lost interview, Steve Jobs said, “I think everybody in this country should learn how to program a computer because it teaches you how to think”. This line makes perfect sense to me.

If you are studying some introductory course of Computer Science or planning to […]

By |January 10th, 2016|Papers|

Linux Ransomware creators third time unlucky as researchers crack encryption again

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers find Linux.Encoder 3 version still uses buggy encryption and allows file recovery
Much to the delight of security researchers, a group of malware creators are currently having difficulty getting cryptographic implementations right in their ransomware. This has not happened once but thrice.

A group of cyber criminals […]

By |January 9th, 2016|Papers|

Get Wi-fi passwords without hacking : Basic Mode

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Get Wi-fi Passwords without hacking, its no where a hacking but just for fun and Ignorance..

Requirements:
iPhone or Android

Let’s begin with the tutorial

1- First of all, go to this site with your phone: http://www.wifimap.io/
2- Download and install the App to your device
3- Activate your Wi-fi, and permit […]

By |January 6th, 2016|Papers|

D-Link’s Wireless Twin Routers Ensure That Your Entire House Is Wi-Fi Enabled

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

D-Link comes up with two ugly looking routers that provides Wi-Fi coverage to every corner of your house
Most consumer-level routers cannot create a Wi-Fi network that covers every corner of a large house. As a result, larger homes suffer from poor Wi-Fi connections. To combat this […]

By |January 5th, 2016|Papers|

Top 5 Facebook Scams That You Should Be Aware Of

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The bigger and popular sites with the huge number of visitors are like hackers’ wonderland for posting scams. Especially the users on social media websites are prone to such scams that further convert to dangerous cyber attacks. Facebook has about 1.4 billion users making it potentially the […]

By |January 5th, 2016|Papers|

What is the Blue Screen of Death in Windows – The Complete Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

BSOD or “Blue Screen of Death” is an error message displayed on the screen when Windows OS fails to keep up to its promise of working smoothly without errors, basically, when the operating system crashes due to some reason it shows a Blue Screen of Death.

Let’s […]

By |January 4th, 2016|Papers|

The most popular and most downloaded Chrome Extensions of 2015

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

These are the most popular Chrome Extensions that would enhance your browsing experience
Welcome to the world of amazing Chrome extensions, which has widgets to improve your entertainment quotient, niche plugins with dedicated functionalities and plugins that make web browsing more secure than ever.

Chrome productivity extensions provide […]

By |January 4th, 2016|Papers|