Papers

/Papers

7 Apps That Perfectly Replace Adobe Creative Suite on Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Many of the Linux users have been asking Adobe to release their Creative Suite on Linux but their answer is a straight NO. The reason for Adobe’s harsh decision is because the user base is less in number. With the huge growth in the […]

By |June 24th, 2016|Papers|

GNU Emacs Tutorial: How To Edit A File (Cheat Sheet Included)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

I’ve recently started learning Emacs, and in this post, I will be describing how to edit a text file in Emacs and some mostly used shortcuts. This post is aimed for those who’ve either never used Emacs or were lazy enough to even […]

By |June 23rd, 2016|Papers|

What is Jailbreaking? iPhones and iPads Jailbreaking explained

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Jailbreaking, How does jailbreaking work? Why do jailbreaking? Jailbreaking of iPhones and iPads explained
You may have heard from your friend who owns an iPhone saying that he has jailbroken it. You may have wondered what actually is jailbreaking. Lately, the term “jailbreaking” […]

By |June 23rd, 2016|Papers|

What is DNS (Domain Name System) and How it Works ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites […]

By |June 23rd, 2016|Papers|

Google and Udacity’s new Android programming course for beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Learn Android programming with Google and Udacity’s Android Nanodegree program
In an effort to help more people learn programming particularly for its Android platform, the search giant has partnered with Udacity, the online education company, to provide an Android Basics Nanodegree (available in a […]

By |June 23rd, 2016|Papers|

This neat Chrome hack will work for everyone who keep lots of tabs open

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Everyone who uses a lot of Chrome tabs could use this neat little trick to free up memory
Everyone who likes Chrome including me, often keep several tabs open at any single time. Some of the geeky ones may even have hundreds of Google […]

By |June 22nd, 2016|Papers|

What is a Firewall? What does it do?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A firewall is a system that provides network security by filter incoming and outgoing network visits based on a set of user-defined limitations. In general, the sole-purpose of a firewall is to reduce or eliminate the occurrence of unwanted network data while allowing all legitimate communication […]

By |June 22nd, 2016|Papers|

10 Private Search Engines That Do Not Track You

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really don’t want to be tracked and also don’t want anyone tracking your searches, try these search […]

By |June 15th, 2016|Papers|

Exploit SQL Injection Using Sqlmap in kali linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

SQL injection : it is an attack that exploits non-parametrized SQL queries in a database , so that the attacker can insert their own queries.

Sqlmap : This is a very powerful penetration test tool (open source) , it automates the discovery and exploitation […]

By |June 15th, 2016|Papers|

How to Use Armitage For Discovering Vulnerabilities

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Armitage is a graphical interface to Metasploit , developed in Java (multiplatform )to visualize the target machines , recommended exploits and functionality advanced framework metasploit .

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only […]

By |June 15th, 2016|Papers|