Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

How to do socket programming in java

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This article describes a very basic one-way Client and Server setup where a Client connects, sends messages to server and the server shows them using socket connection. There’s a lot of low-level stuff that needs to happen for these things to work but the Java […]

By |June 25th, 2016|Papers|

Top 10 Security Coding Pratices

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Validate input. Validate input from all un-trusted data sources. property of input validation can eliminate the vast majority of softwares vulnerabilitie. Be suspicious of most external data’s sources, including command-line arguments, networking interfaces, environmental variable, and user controlled file.
Heed compiler warnings. Compile code […]

By |June 24th, 2016|Papers|

Best Javascript frameworks for presentation

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Creating Presentation for modern browser JavaScript and Html5 frameworks play a big role.Presentation is basically a way of representing the organizational visual details to create an overall impression.Doing a presentation for website manually is a hard task but the presentation frameworks makes it easy.

There […]

By |June 24th, 2016|Papers|

7 Apps That Perfectly Replace Adobe Creative Suite on Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Many of the Linux users have been asking Adobe to release their Creative Suite on Linux but their answer is a straight NO. The reason for Adobe’s harsh decision is because the user base is less in number. With the huge growth in the […]

By |June 24th, 2016|Papers|

GNU Emacs Tutorial: How To Edit A File (Cheat Sheet Included)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

I’ve recently started learning Emacs, and in this post, I will be describing how to edit a text file in Emacs and some mostly used shortcuts. This post is aimed for those who’ve either never used Emacs or were lazy enough to even […]

By |June 23rd, 2016|Papers|

What is Jailbreaking? iPhones and iPads Jailbreaking explained

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Jailbreaking, How does jailbreaking work? Why do jailbreaking? Jailbreaking of iPhones and iPads explained
You may have heard from your friend who owns an iPhone saying that he has jailbroken it. You may have wondered what actually is jailbreaking. Lately, the term “jailbreaking” […]

By |June 23rd, 2016|Papers|

What is DNS (Domain Name System) and How it Works ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites […]

By |June 23rd, 2016|Papers|

Google and Udacity’s new Android programming course for beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Learn Android programming with Google and Udacity’s Android Nanodegree program
In an effort to help more people learn programming particularly for its Android platform, the search giant has partnered with Udacity, the online education company, to provide an Android Basics Nanodegree (available in a […]

By |June 23rd, 2016|Papers|

This neat Chrome hack will work for everyone who keep lots of tabs open

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Everyone who uses a lot of Chrome tabs could use this neat little trick to free up memory
Everyone who likes Chrome including me, often keep several tabs open at any single time. Some of the geeky ones may even have hundreds of Google […]

By |June 22nd, 2016|Papers|

What is a Firewall? What does it do?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A firewall is a system that provides network security by filter incoming and outgoing network visits based on a set of user-defined limitations. In general, the sole-purpose of a firewall is to reduce or eliminate the occurrence of unwanted network data while allowing all legitimate communication […]

By |June 22nd, 2016|Papers|