Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Try Whonix 13 The Anonymous Operating System

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whonix is a desktop operating system designed for advanced privacy and security. While maintaining the usability, it realistically addresses attacks. It makes online anonymity possible using fail-safe, desktop-wide use of Tor network. Here, a heavily reconfigured Debian base is run inside many virtual […]

By |June 29th, 2016|Papers|

SyntaxDB — A Perfect Programming Syntax “Search Engine” For Coders

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Very often programmers new to the field ask if is it okay to use Google and Stack Overflow to look up some syntax. The answer is yes — searching the web is a routine task of a good developer and its frequency even […]

By |June 29th, 2016|Papers|

How To Recover Deleted Files From Your Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What happen when we delete our valuable files mistakenly, there are two ways or we can say two types of computer users, one – who use only delete button and others who delete files by pressing Shift+Delete, The simple delete button stores your […]

By |June 29th, 2016|Papers|

This code can hack nearly 90 percent of credit card readers in circulation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shocking : A cyber security firm found 90% of credit card readers currently use the same password from 1990 till date.
This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using […]

By |June 29th, 2016|Papers|

Most frequently asked interview questions on linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here are some of the linux interview questions and answers that would help you to crack some of the most important and difficult interviews as a beginner.

1. What is the basic difference between Linux and Unix?

Linux is an open source operating system while […]

By |June 29th, 2016|Papers|

Detailed Explanation on SS7 Attacks

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DETAILED EXPLANATION ON SS7 ATTACKS

Summary :-
What is SS7 Attacks are we really secure ?. Well Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide […]

By |June 26th, 2016|Papers|

How to Clear Storage Space in Android in 6 Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Every Android user at some point of time runs out of their storage space and gets a prompt saying the very irritating “Running out of storage space” dialogue. Today we will tell you how you can Clear unwanted data and reclaim your storage […]

By |June 25th, 2016|Papers|

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.
What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and […]

By |June 25th, 2016|Papers|

What is the Difference between SOAP and REST ??

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Web services that are used to communicate in-between applications that are being developed in many programming-languages and running on different platforms. Like a Java application running on linux platform can communicate with a PHP application running on windows platform. There are two types […]

By |June 25th, 2016|Papers|

How to make advanced search on Google using Google Dorking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

How to use Google like a pro using Google Dorking
In the last article, we had reported how Iranian hackers were able to glean information from Google about the dams in US cities in order to infiltrate and flood the cities. The hackers used […]

By |June 25th, 2016|Papers|