How To Password Protect a Folder in Windows 10

We all have computer files we'd like to keep secret from the world. Fortunately, in Windows 10, you can tuck those unmentionable plans or files in a secret folder that is password protected, and you can do it without buying any additional software. Here's how to create a folder that you can fill with files you want to keep secret, lock …

Researchers hack a computer using DNA

Researchers inject malware code in a strand of DNA With each passing day, hackers are using innovative ways to breach cyber security systems. One such inventive method of hacking a computer is via DNA. Researchers at the University of Washington claims to have successfully injected a malware program into a DNA sample and use it to hack into a c…

CMD Hacking Tutorial

Introduction Before Window was created, the most common operating system that can ran on IBM PC compatibles was DOS, DOS stand for Disk Operated system and was what you would use if you had started your computer much like you to do today with Window. The difference was that DOS was not a graphical operating system but rather purely textual. Tha…

Cyber Security and Your Mobile Phone

Cyber Security and Your Mobile Phone With increasing numbers of us using our mobile devices in nearly every aspect of our busy lives, one of the most important things to do is stay safe and secure when online. Mobile Malwar like Viking Hoard that created a botnet and affected Android devices, or Pegasus that affected both iOS and Android dev…

Process in Hacking

Process - Like a good project, ethical hacking too has a set of distinct phases,It helps hackers to make a structured ethcal hacking attack. Different security training manuals explain the process of hacking in different ways, but for make a certified Ethical Hacker, the entire process can be cetegorized into following six phases:- R…

Tools In Hacking

  Tools In this chapter, we will discuss in brief some of famous tools that are widely used to prevent hacking and getting unauthorized access to a computer and  network system. NMAP - Nmap stand for network mapper.It is an open source tool that is used widely for network discovery and security editing. Nmap was originally d…

Terminologies in Hacking

Adware - Adware is a software  designed to force pre-chosen ads to display on your system.Adware is the name given to programs that are designed to display advertisements on your computer, redirect your search requests to advertising websites and collect marketing-type data about you Attack - An attack is an action that is done on a syste…

Famous Hackers

Famous Hackers In this post,we will have a brief synopsis of some of famous hackers and how they became famous.Some of them were  victim of circumstances.Some of them did that to cracks the government secret service agencies Jonathan James Jonathan James was an American Hacker, famous as the first juvenile sent to …

Hacker Types

Overview Hackers can be classified into different categories such as white hat hacker,black hat hackers   and grey hat hackers,based on their intent of hacking a system.These different terms old Spaghetti Westerns,where the bad guy wears  a black hat,cowboy hat and the good guy wears  a white hat.   White Hat Ha…

Ethical Hacking Tutorial

Ethical Hacking  Advantages of Hacking Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access access to computer system or a computer network .either to h arm the system or to steel …