There are some important files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
Saturday, 12 March 2016
In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.
Thursday, 10 March 2016
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
There are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black hat" hackers. In this article, we will be talking about six famous black hat hackers and their hacks which made them famous or wanted.
Wednesday, 9 March 2016
Let’ begin with who is a white hacker? First of all, white hacker is good, conscientious and ethical hacker, who tries to save the balance of the universe by doing good works. White hats are very useful and it goes without saying they constantly compete with black hats. White hats hackers can be compared with cats, which catch mice, namely they look for defects of the systems. Besides, white hats are computer security guards, they test systems for the level of protection and moreover they improve their skills. Mainly, white hats don’t look for fame or money, they serve in society.
It is undeniable that sometimes black hat hackers became white hackers and prevent crimes, because they perfectly know what to do. So who are they main and most famous white hats of all times?
Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks.
But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin?
Late 1950s – The MIT Start Off with a Bang
Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking got its name when people started using technology to get into data systems they shouldn’t have access to!
Roof and tunnel hacking was initially intended as practical jokes and saw the hanging of banners from tall places and the popular placing of a model car on the top of a university building. Unsecured entry points would be used to gain access and cause mischief as per the desire of the hacker.
In my previous post i had show you how to Grab someone ip address now i will show you how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.
In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started.
Monday, 7 March 2016
Ever wanted to learn computer programming languages, but didn't know where to start? Well, those days are over. Today learning programming languages is not really a hard job. If you are a beginner and have aptitude to learn computer programming then you can accomplish this goal within a few months. Here are the top 6 websites, which are useful for learning programming.
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look