Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Opening for CEH fresher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

No Of Openings – 2

Experience – 0 – 5 yrs

Job Description
– Intermediate knowledge of security, encryption, phishing and CVE
– Intermediate knowledge of Pen Testing Tools for Cyber Security
– Good English and communication skills
– Ability to operate within a team and follow instructions
– Time Management
– Search for […]

By |January 21st, 2016|job|

Here’s how a cheap webcam can be converted into network backdoor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

This is how a $30 D-Link webcam can be converted into a backdoor
Researchers at US security firm Vectra Networks have hacked a ‘tiny’ D-Link web camera and demonstrated how it can be abused by cybercriminals and turned into a medium to steal data or for sending additional […]

By |January 18th, 2016|Papers|

How To Find IMEI Number Of Your Phone (Even If It’s Lost)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The IMEI number, also known as MEID number, acts your phone’s unique identifier. As no two devices have the same IMEI or MEID number, it becomes the best tool to track lost phones.

This unique number is assigned to every new phone and it’s actually associated with the […]

By |January 17th, 2016|Papers|

Top Ten Simple and Useful Internet Tricks That You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Internet Hack : Top 10 Simple and useful Internet tricks for you
There are some simple keyboard shortcuts which one can use while using Internet and it would help the user to avoid typing a lot and also at certain places the mouse can be completely avoided […]

By |January 14th, 2016|Papers|

Android.Bankosy Trojan Learns To Steal Your One-Time Passwords Sent Through Calls

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The year 2015 saw an unparalleled increase in the notorious financial trojans. These banking trojans get evolved with time and target the security improvements made by the financial institutions. One-time passwords — one such security measure for banking applications — are being intercepted by an Android […]

By |January 13th, 2016|Papers|

Microsoft Wants To Teach You How To Use Linux With Its New Certification Program

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

When we first said that Microsoft loves Linux, we were not joking. Microsoft has embraced Linux many times over in the recent times and proved us right. It was absolutely unthinkable few years ago, thanks to former CEO Steve Ballmer who went on to call Linux […]

By |January 13th, 2016|Papers|

Find out how Facebook knows everything about you

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Do you know Facebook knows everything about you and your preferences? Find out how
If you are a Facebook user, then you should know that by using Facebook, you have given consent to the company to track your activity for advertisers, who in turn hope to show […]

By |January 13th, 2016|Papers|

Top 5 tips to get some privacy and go invisible on WhatsApp

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here are some tips to go invisible on WhatsApp and get some privacy
It was easy to go invisible whenever one wanted while using Google Talk aka GTalk. To get some privacy, all you had to do was toggle the invisible mode in the Google Talk.

However, it […]

By |January 13th, 2016|Papers|

Einstein’s Mass Energy Equation Is Insufficient, Claims Indian Researcher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In an international paper, Ajay Sharma, an Indian researcher has claimed that Albert Einstein’s mass-energy equation – E=mc2 – hasn’t been completely studied under all circumstances and it is inadequate. In his research paper, Mr. Sharma says that the equation has been studied only under special conditions of […]

By |January 11th, 2016|Papers|

Learn to Code: Best Places to Learn C and C++ Programming Languages

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In his famous lost interview, Steve Jobs said, “I think everybody in this country should learn how to program a computer because it teaches you how to think”. This line makes perfect sense to me.

If you are studying some introductory course of Computer Science or planning to […]

By |January 10th, 2016|Papers|