How To Password Protect a Folder in Windows 10

We all have computer files we'd like to keep secret from the world. Fortunately, in Windows 10, you can tuck those unmentionable plans or files in a secret folder that is password protected, and you can do it without buying any additional software. Here's how to create a folder that you can fill with files you want to keep secret, lock …

Researchers hack a computer using DNA

Researchers inject malware code in a strand of DNA With each passing day, hackers are using innovative ways to breach cyber security systems. One such inventive method of hacking a computer is via DNA. Researchers at the University of Washington claims to have successfully injected a malware program into a DNA sample and use it to hack into a c…

Process in Hacking

Process - Like a good project, ethical hacking too has a set of distinct phases,It helps hackers to make a structured ethcal hacking attack. Different security training manuals explain the process of hacking in different ways, but for make a certified Ethical Hacker, the entire process can be cetegorized into following six phases:- R…

Tools In Hacking

  Tools In this chapter, we will discuss in brief some of famous tools that are widely used to prevent hacking and getting unauthorized access to a computer and  network system. NMAP - Nmap stand for network mapper.It is an open source tool that is used widely for network discovery and security editing. Nmap was originally d…

Terminologies in Hacking

Adware - Adware is a software  designed to force pre-chosen ads to display on your system.Adware is the name given to programs that are designed to display advertisements on your computer, redirect your search requests to advertising websites and collect marketing-type data about you Attack - An attack is an action that is done on a syste…

Ethical Hacking Tutorial

Ethical Hacking  Advantages of Hacking Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access access to computer system or a computer network .either to h arm the system or to steel …

Seven things you didn’t know about YOUR own password

Here are seven different ways in which hackers can crack even the strongest password you have created for various websites and devices The internet is a fantastic place, we’re sure you agree. Business or pleasure, you can stay in touch people from around the globe, entertain yourself, entertain others, complete your weekly grocery shopping, bo…

How to Hack Wifi Network with CMD

There’s lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password. …

Facebook’s new technology could spy on you through your webcam

Facebook’s patent reveals technology that can spy on you using PC/laptop webcam or smartphone camera Using Facebook could get creepier, as a patent filed by the social media giant indicates that they are planning to analyse the emotions on their user’s face by spying through their smartphone’s camera or webcam . In other words, the technolog…