Yearly Archives: 2016

/2016

Bypass Windows Admin LogIn with a USB

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

I’m going to be showing you a way to bypass a administrator login on a Windows computer.

All that you will need is a USB and Kon-Boot, which can be easily found online.

Step 1: Download the zip folder containing Kon-Boot and extract it to […]

By |July 26th, 2016|Papers|

HACK ANY IOS DEVICE

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Brother Plethora

Hey guys! Today I will be sharing a unique method of monitoring and controlling any IOS device remotely from your PC or pretty much any device that can run a browser.

Supplies needed:

– Target device running any IOS version above 5.0
– Computer
– 5 minutes […]

By |July 26th, 2016|Papers|

19 Best Hidden iPhone Secret Codes In 2016

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

About 25 percent of iPhone users are hardcore, they really dig out more and more information relating to their iPhone and they do experiments with their iPhone as well, but average iPhone users really don’t care or don’t want to do experiments with […]

By |July 24th, 2016|Papers|

Here is How To Install Chrome On Kali Linux Without Errors

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you are someone who wants to use Kali Linux as your main operating system, the most common issue you face initially in lacking of a good browser. The default browser in Kali Linux is iceweasel which is a forked version of Firefox. […]

By |July 24th, 2016|Papers|

A Beginner’s Guide To Frame Relay In Computer Networks

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Frame Relay is a WAN protocol that operates at the physical layer and data link layer of the OSI reference model. The main purpose of designing the Frame Relay was to use this technology across Integrated Services Digital Network (ISDN) interfaces. However, with […]

By |July 23rd, 2016|Papers|

‘DroidJack’ Malware On ‘Pokémon Go’ For Android Could Be Acquired Through Unofficial Installation Methods

 

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The world appears to currently be divided into two groups, those playing Pokémon Go and those not indulging in the recently released augmented reality mobile game by Nintendo. The game is currently available in the U.S., Australia and New Zealand only, leaving many […]

By |July 23rd, 2016|Pokemon Go Hacks and Tricks|

All The Top Android dialler commands to bring special menus

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top Android Secret Dialler Codes You Should Know
You may be an Android expert but there are some handy tricks you dont know about Android smartphone which could help you troubleshoot ticklish problems like Camera or GPS now working.

This happened to me when my […]

By |July 15th, 2016|Papers|

How Dynamic HTML is performed using the javascript

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Dynamic HTML is not a new markup language. It is a collection of technologies (generally HTML, CSS and JavaScript) which changes the document content once it is loaded into a web browser.

Some examples for dynamism in a web document are given below:

Changes to […]

By |July 15th, 2016|Papers|

What Is A Motherboard? What Are The Different Components Of A Motherboard?

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A computer comprises of many components like the CPU, monitor, keyboard, mouse, and much more. All these components talk to each other via a common hardware known as the motherboard or simply mobo. Most users don’t have much idea about the green colored […]

By |July 15th, 2016|Papers|

Hacker reveals how to extract PIN of a smartphone from any selfie

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie
If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is […]

By |July 15th, 2016|Papers|