Papers

/Papers

How To Find IMEI Number Of Your Phone (Even If It’s Lost)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The IMEI number, also known as MEID number, acts your phone’s unique identifier. As no two devices have the same IMEI or MEID number, it becomes the best tool to track lost phones.

This unique number is assigned to every new phone and it’s actually associated with the […]

By |January 17th, 2016|Papers|

Top Ten Simple and Useful Internet Tricks That You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Internet Hack : Top 10 Simple and useful Internet tricks for you
There are some simple keyboard shortcuts which one can use while using Internet and it would help the user to avoid typing a lot and also at certain places the mouse can be completely avoided […]

By |January 14th, 2016|Papers|

Android.Bankosy Trojan Learns To Steal Your One-Time Passwords Sent Through Calls

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The year 2015 saw an unparalleled increase in the notorious financial trojans. These banking trojans get evolved with time and target the security improvements made by the financial institutions. One-time passwords — one such security measure for banking applications — are being intercepted by an Android […]

By |January 13th, 2016|Papers|

Microsoft Wants To Teach You How To Use Linux With Its New Certification Program

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

When we first said that Microsoft loves Linux, we were not joking. Microsoft has embraced Linux many times over in the recent times and proved us right. It was absolutely unthinkable few years ago, thanks to former CEO Steve Ballmer who went on to call Linux […]

By |January 13th, 2016|Papers|

Find out how Facebook knows everything about you

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Do you know Facebook knows everything about you and your preferences? Find out how
If you are a Facebook user, then you should know that by using Facebook, you have given consent to the company to track your activity for advertisers, who in turn hope to show […]

By |January 13th, 2016|Papers|

Top 5 tips to get some privacy and go invisible on WhatsApp

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here are some tips to go invisible on WhatsApp and get some privacy
It was easy to go invisible whenever one wanted while using Google Talk aka GTalk. To get some privacy, all you had to do was toggle the invisible mode in the Google Talk.

However, it […]

By |January 13th, 2016|Papers|

Einstein’s Mass Energy Equation Is Insufficient, Claims Indian Researcher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In an international paper, Ajay Sharma, an Indian researcher has claimed that Albert Einstein’s mass-energy equation – E=mc2 – hasn’t been completely studied under all circumstances and it is inadequate. In his research paper, Mr. Sharma says that the equation has been studied only under special conditions of […]

By |January 11th, 2016|Papers|

Learn to Code: Best Places to Learn C and C++ Programming Languages

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In his famous lost interview, Steve Jobs said, “I think everybody in this country should learn how to program a computer because it teaches you how to think”. This line makes perfect sense to me.

If you are studying some introductory course of Computer Science or planning to […]

By |January 10th, 2016|Papers|

Linux Ransomware creators third time unlucky as researchers crack encryption again

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers find Linux.Encoder 3 version still uses buggy encryption and allows file recovery
Much to the delight of security researchers, a group of malware creators are currently having difficulty getting cryptographic implementations right in their ransomware. This has not happened once but thrice.

A group of cyber criminals […]

By |January 9th, 2016|Papers|

Get Wi-fi passwords without hacking : Basic Mode

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Get Wi-fi Passwords without hacking, its no where a hacking but just for fun and Ignorance..

Requirements:
iPhone or Android

Let’s begin with the tutorial

1- First of all, go to this site with your phone: http://www.wifimap.io/
2- Download and install the App to your device
3- Activate your Wi-fi, and permit […]

By |January 6th, 2016|Papers|