Browsing author

root

How to create a Hotspot with notepad

Always wanted to make a hotspot with your pc or laptop , but didn’t have the software? Well today i’ll show you how to create one using a batch script First open up notepad. Copy and paste the following   Download the code   Now save this file as a .bat file (e.g hotspot.bat) Run […]

Russian Hackers Allegedly Hacked White House Computers

Unclassified White House computers are latest in the list of security breaches this year and the prime suspects for the breach are Russian hackers, who on government’s direction are working to carry out attacks on world’s most sensitive systems belonging to NATO, the Ukrainian government and U.S. defense contractors, according to reports. Although, the attack didn’t led […]

How to bypass Android Lockscreen

Today i’m going to show you guys how to bypass android lockscreen using two methods. Method 1 What you need: Windows or Linux based PC Android screenlockbypass.apk – Download here ADB – Download here This will be much easier if your target device has usb debugging enabled. If usb debugging is enabled on target phone: […]

Stealthy malware uses Gmail drafts to steal data

A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as “the command and control to steal data.”

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends – but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even ‘three-factor security’. Can a watch really keep secrets?

Ubuntu 14.10 Released and Available for Download Here

On 26 October 2014 , Canonical marked the 10th anniversary of an OS that has revolutionized Linux – Ubuntu . And there was a no better way  to celebrate it by  releasing the much awaited Ubuntu 14.10 dubbed as Utopic Unicorn. As usual this version of Ubuntu comes with various bug fixes and security enhancements . But […]

This Camera-Covered Jacket Is Best Surveillance Tool To Record/Report Crime

Street crimes? not a problem now! With the newly designed jackets one can easily track down thieves and alert the respective authorities. During recent times, authorities in New York and London were researching a system through which they can eliminate street crimes and track down the criminals. Reacting to this a South Korean designer “Jehee […]

Remotely shutdown computers

Note* For this to work you must be connected on the same network as the victim’s computer 1) Right-click on your desktop. Navigate to “New” and then to “Text Document” 2) Open the Document and type: shutdown.exe -i Save the .txt file as a .bat file. 3) Open the .bat file. “Remote Shutdown Dialog” should […]

How to find the IP of a Skype user

1.Log onto the computer as the “Administrator.” Go to “Start” > “Search.” 2.Enter “cmd” into the “Search” box. Press “Enter.” 3.Go to “Start” > “Programs” > “Skype.” 4.Click “Contacts” and then click on the name of a contact on the menu. 5.Click “Call” and wait until the other person answers. If he does not answer, […]

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,