Papers

/Papers

D-Link’s Wireless Twin Routers Ensure That Your Entire House Is Wi-Fi Enabled

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

D-Link comes up with two ugly looking routers that provides Wi-Fi coverage to every corner of your house
Most consumer-level routers cannot create a Wi-Fi network that covers every corner of a large house. As a result, larger homes suffer from poor Wi-Fi connections. To combat this […]

By |January 5th, 2016|Papers|

Top 5 Facebook Scams That You Should Be Aware Of

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The bigger and popular sites with the huge number of visitors are like hackers’ wonderland for posting scams. Especially the users on social media websites are prone to such scams that further convert to dangerous cyber attacks. Facebook has about 1.4 billion users making it potentially the […]

By |January 5th, 2016|Papers|

What is the Blue Screen of Death in Windows – The Complete Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

BSOD or “Blue Screen of Death” is an error message displayed on the screen when Windows OS fails to keep up to its promise of working smoothly without errors, basically, when the operating system crashes due to some reason it shows a Blue Screen of Death.

Let’s […]

By |January 4th, 2016|Papers|

The most popular and most downloaded Chrome Extensions of 2015

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

These are the most popular Chrome Extensions that would enhance your browsing experience
Welcome to the world of amazing Chrome extensions, which has widgets to improve your entertainment quotient, niche plugins with dedicated functionalities and plugins that make web browsing more secure than ever.

Chrome productivity extensions provide […]

By |January 4th, 2016|Papers|

Top ten operating systems for ethical hackers and security researchers

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A comprehensive list of most popular operating systems among hackers all around the world.

Back in August, we had posted a list of top ten hacker tools. Now we have advanced it one step further to bring you the best operating systems for hackers.
This time it is […]

By |January 3rd, 2016|Papers|

10 Amazing Facts You Didnt Know About Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Android, the worlds mostly widely used smartphone operating System is growing day by day with its highly enriched user interface and extensively used mobile applications.  Some are using it as platform to develop applications while the others use it as one of source which connects them […]

By |December 31st, 2015|Papers|

How to Convert a USB Charger Into a Linux Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In this article, I’m going to tell you about how to make a little Linux computer from a USB charger. It’s a truly portable Linux computer, and I came across it yesterday when I was reading some Linux news on the web.In the past we’ve shared […]

By |December 31st, 2015|Papers|

OS.js Is A New Javascript Based Open Source Operating System Running In Your Browser

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Did you ever wish to use an operating system that ran just like a website inside your web browser? OS.js, a JavaScript-based open source operating system designed for the cloud, is here to provide you this facility.

On its website, OS.js describes itself as a Javascript web […]

By |December 30th, 2015|Papers|

How does Facebook know who your friends are?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Facebook knows who your friends are, even better than you do?
The social media giant uses a mix of complex science and mathematics to narrow down on your friends list
Have you ever thought how Facebook exactly predicts your friends, sometimes even those whom you have long forgotten.

Last week, […]

By |December 30th, 2015|Papers|

Hackers using startling new ways to steal your passwords

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

You are dining outside in a restaurant and you receive an email. You remove your phone and without even thinking twice, you key in the PIN required to unlock your phone. Nobody can see what password you have typed, as your back is facing the wall. […]

By |December 30th, 2015|Papers|