Find Out If Any One Opens Your Computer Without Your Permission

How to Know Who Logged into your computer and when? In Windows, there is one in-built too will records all events in your computer called “Event Viewer”. This application records all your computer activities from login to log off etc. The Event Viewer can be accessed in all Windows Operating system including Windows XP, Vista, […]

UK takes aim at serious hacking offenses with planned life sentences

Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country’s upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

How to Hack an android phone

In this tutorial i will show you a  guide on how to hack someones android phone. First you will need to root your phone ( I’m not going to show you how to root your phone on this tut , but will post one in the future) for this to work on all 3 methods. […]

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

How to Dox/Trace like a pro.

Firstly what is doxing? Doxing is a technique used to track, trace, and collect information on individuals or organizations online anonymously. So your question is how will we dox like a pro? To be honest it’s quite easy. I’ll show you 2 ways on how to dox like a pro. The first method will concentrate […]

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

How To Shutdown A Computer With A Cell Phone.

Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone. To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish […]

5 Geekiest Pick Up Lines That Will Make You Laugh

I was surfing Quora as a part of daily internet habit, when I came across a question ” What is the geekiest pickup line? “. I must have seen it before because I remembered some of the answers, but at that time I didn’t write here at fossBytes. So coming to the point, I could […]

How to stay anonymous and protect yourself against hackers

A computer is never truly secure , but with the help of tools/software we can make it difficult for today’s hacker. The whole idea behind this is to make it extremely hard to track you down and of course the sake of your privacy. This tutorial is about 2 types of protection. Offline protection Online […]

Top Fossbytes of Week – Top Tech News

Take a quick look at Top Fossbytes of Week – Top Tech News Next-Gen Superfast WiFi Technology from Samsung Samsung Electronics has announced that it is developing its 60GHz WiFi technology which will speed up the current data transfer speed up to 5 times. This technology will provide you the data transfer speed up to […]

Top 10 Biggest Billboard Hits of Eminem – Fossbytes

October 17 is Eminem’s birthday. To celebrate his journey and success, we have compiled a list of Top 10 Biggest Billboard Hits of Eminem. This Top 10 Biggest Billboard Hits of Eminem is based on actual performance on the weekly Billboard Hot 100 chart. Take a look at Biggest Hits of Eminem! 10. Crack A […]

A brief history of malware 28 years later

Malware has come a long way since its earliest days, and aided by the rapid development of the internet it’s certainly faster spreading than the weeks it took in the days of floppy disk transfer.