Papers

/Papers

Why Should We Remove USB Device Safely ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

One day i was working in my friends PC, and when i was about to remove the USB device he shouted Wait ! let me remove USB device safely , He said. I was wondering since then, should we remove USB device safely […]

By |July 3rd, 2016|Papers|

How to get started with Ethical Hacking. 6 Great E-books on ethical hacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you an aspiring hacker who wants to get as much info on hacking, apart from online tutorials online free ebooks are a very good choice.If you are ready to read about ethical hacking but don’ know what to read here we bring you […]

By |July 3rd, 2016|Papers|

Lizard Squad uses botnets from hijacked CCTV Cameras to attack bank websites

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Lizard Squad turn CCTV Cameras into massive botnets to launch massive DDoS attacks
Hackers are turning the huge network of CCTV cameras installed worldwide into DDoS botnets which conduct DDoS attacks on banks, gaming firms and government agencies. The CCTV camera botnet uses a open […]

By |July 3rd, 2016|Papers|

How To Enable Ctrl+C / Ctrl+V For Copy-Pasting In Windows Command Prompt

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Some of the most intriguing Command prompt-related queries that I have seen people looking out for are:

How to enable copy and paste in CMD?
Copy and paste not working in CMD
How to copy and paste in command prompt?
Ctrl+C/ Ctrl+V not working in CMD

Well, here is […]

By |July 1st, 2016|Papers|

Here is Why You Should be Very careful While Using Public Wi-Fi

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We are all told constantly that we should be very careful about connecting to free public Wi-Fi. Though it is an easy warning to forget about when we are away from the home or when we need to get online urgently.

In an experiment conducted […]

By |July 1st, 2016|Google Hacking Database, Papers|

Spreading malware through Images with Stegosploit tool

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Next gen cyber attacks could be through Internet images using Stegosploit tool which allows hackers to embed malware in an image
Security Researcher Saumil Shah has developed a Stegosploit tool wherein hackers can embed executable JavaScript code within an image to trigger a drive by […]

By |July 1st, 2016|Papers|

How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These days very few people burn ISO images on disks and use them as bootable media. Now, USB drives have replaced them as they are faster and a more convenient method to install an operating system on a machine.

While there are many tools […]

By |June 29th, 2016|Papers|

Try Whonix 13 The Anonymous Operating System

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whonix is a desktop operating system designed for advanced privacy and security. While maintaining the usability, it realistically addresses attacks. It makes online anonymity possible using fail-safe, desktop-wide use of Tor network. Here, a heavily reconfigured Debian base is run inside many virtual […]

By |June 29th, 2016|Papers|

SyntaxDB — A Perfect Programming Syntax “Search Engine” For Coders

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Very often programmers new to the field ask if is it okay to use Google and Stack Overflow to look up some syntax. The answer is yes — searching the web is a routine task of a good developer and its frequency even […]

By |June 29th, 2016|Papers|

How To Recover Deleted Files From Your Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What happen when we delete our valuable files mistakenly, there are two ways or we can say two types of computer users, one – who use only delete button and others who delete files by pressing Shift+Delete, The simple delete button stores your […]

By |June 29th, 2016|Papers|