Category: Computer

Improve graphics in computer games even on a weak PC (NVIDIA GPU Needed)

Wish your computer games to be brighter, more realistic and more colourful? Then just download the Nvidia Freestyle app. (NVIDIA Freestyle: Customize A Game’s Look In Real-Time) 1. Update the GeForce Experience (if you have one), then launch the game. 2. Press Alt+F3 to open the Game Filter sidebar. You can also press Alt+Z to open the GeForce Experience overlay… Read more →

Ways Hackers Access Facebook Accounts

Mostly Hackers use these methods to hack Facebook accounts, so protect yourself from hackers. Must Read!!! and beware of attacks from hackers. Method 1: Hack Facebook Account Password By Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are various methods to carry out phishing attacks. In simple phishing attacks, a hacker creates a… Read more →

Social Engineering

What is Social Engineering?   Let us try to understand the concept of Social Engineering attacks through some examples. Example 1 You must have noticed old company documents being thrown into dustbins as garbage. These documents might contain sensitive information such as Names, Phone Numbers, Account Numbers, Social Security Numbers, Addresses, etc. Many companies still old tech like using carbon… Read more →

Restart Networking Interface in Linux

Try out the following commands: sudo service networking restart sudo /etc/init.d/networking restart or nmcli device set [device] managed true   Check Networking Status /etc/init.d/networking status Stop Networking sudo /etc/init.d/networking stop Start Networking sudo /etc/init.d/networking start Restart Networking /etc/init.d/networking restart   To start Network Manager : service NetworkManager start or systemctl start NetworkManager   To stop Network Manager: service NetworkManager stop… Read more →

Brute Force

What is Brute Force Attack? A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. How long do brute force attacks take? As… Read more →

MAC address spoofing

The device that you’re looking at right now has a network interface controller (NIC), the thing that’s responsible for allowing you to connect to a network, like an internet. All devices capable of networking (smartphones, laptops, routers) have one of these. Each NIC is assigned unique hard-coded MAC addresses that cannot be changed. However, almost all popular platforms such as… Read more →