If you are having problem in playing your multiplayer games or using messenger programs or you may be trying to connect to other’s syst...
Friday, 26 October 2018
Thursday, 9 August 2018
Explanation: What is Encryption And Its Types?
In a computer, encryption means that data, like a plain text is converted into another type, it means that data from the readable form i...
Thursday, 2 August 2018
How To Record Screen In Windows and Mac
There are hundreds of tools available that are used for recording windows screen, but I will show you the best you can use to record HD vide...
Sunday, 22 July 2018
What Is XSS(Cross Site Scripting) With Example
XSS also known as Cross-Site Scripting. It is a most common vulnerability in web applications. An attacker can inject malicious code in...
Saturday, 7 July 2018
What is TOR: Best Browser For Anonymous Browsing
Does your browser store your browsing history? Is your browser company non-profit? Is your browsing data tracked? Now, you don't ...
Sunday, 1 July 2018
How To: Explaination Of IDOR(Insecure Direct Object Reference) With Example
The fourth vulnerability on the Top 10 OWASP list is IDOR(Insecure Direct Object Reference). This vulnerability allows an attacker to change...
Wednesday, 27 June 2018
Top 5 Hacking Tools Of 2018-2019
Here is the list of top 5 Hacking tools for Windows and Linux OS. Hackers use these tools for different types of purposes. These hacking...