Papers

/Papers

This code can hack nearly 90 percent of credit card readers in circulation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shocking : A cyber security firm found 90% of credit card readers currently use the same password from 1990 till date.
This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using […]

By |June 29th, 2016|Papers|

Most frequently asked interview questions on linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here are some of the linux interview questions and answers that would help you to crack some of the most important and difficult interviews as a beginner.

1. What is the basic difference between Linux and Unix?

Linux is an open source operating system while […]

By |June 29th, 2016|Papers|

Detailed Explanation on SS7 Attacks

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DETAILED EXPLANATION ON SS7 ATTACKS

Summary :-
What is SS7 Attacks are we really secure ?. Well Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide […]

By |June 26th, 2016|Papers|

How to Clear Storage Space in Android in 6 Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Every Android user at some point of time runs out of their storage space and gets a prompt saying the very irritating “Running out of storage space” dialogue. Today we will tell you how you can Clear unwanted data and reclaim your storage […]

By |June 25th, 2016|Papers|

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.
What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and […]

By |June 25th, 2016|Papers|

What is the Difference between SOAP and REST ??

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Web services that are used to communicate in-between applications that are being developed in many programming-languages and running on different platforms. Like a Java application running on linux platform can communicate with a PHP application running on windows platform. There are two types […]

By |June 25th, 2016|Papers|

How to make advanced search on Google using Google Dorking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

How to use Google like a pro using Google Dorking
In the last article, we had reported how Iranian hackers were able to glean information from Google about the dams in US cities in order to infiltrate and flood the cities. The hackers used […]

By |June 25th, 2016|Papers|

How to do socket programming in java

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This article describes a very basic one-way Client and Server setup where a Client connects, sends messages to server and the server shows them using socket connection. There’s a lot of low-level stuff that needs to happen for these things to work but the Java […]

By |June 25th, 2016|Papers|

Top 10 Security Coding Pratices

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Validate input. Validate input from all un-trusted data sources. property of input validation can eliminate the vast majority of softwares vulnerabilitie. Be suspicious of most external data’s sources, including command-line arguments, networking interfaces, environmental variable, and user controlled file.
Heed compiler warnings. Compile code […]

By |June 24th, 2016|Papers|

Best Javascript frameworks for presentation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Creating Presentation for modern browser JavaScript and Html5 frameworks play a big role.Presentation is basically a way of representing the organizational visual details to create an overall impression.Doing a presentation for website manually is a hard task but the presentation frameworks makes it easy.

There […]

By |June 24th, 2016|Papers|