Category: Computer

NASA BOOSTER 101

Making presentations and infographics easier and faster

How to make presentations and infographics easier and faster than PowerPoint? This Online design tool from www.visme.co is for creating incredible presentations, animations, banners, reports, infographics and other visual content. The service is free and has no time limit, although there are small templates and storage caps (100 megabytes). However, it is enough for your general purposes. It runs on… Read more →

close up shot of keyboard buttons

Password Salting

What is Password Salting? Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database. Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows… Read more →

Improve graphics in computer games even on a weak PC (NVIDIA GPU Needed)

Wish your computer games to be brighter, more realistic and more colourful? Then just download the Nvidia Freestyle app. (NVIDIA Freestyle: Customize A Game’s Look In Real-Time) 1. Update the GeForce Experience (if you have one), then launch the game. 2. Press Alt+F3 to open the Game Filter sidebar. You can also press Alt+Z to open the GeForce Experience overlay… Read more →

Ways Hackers Access Facebook Accounts

Mostly Hackers use these methods to hack Facebook accounts, so protect yourself from hackers. Must Read!!! and beware of attacks from hackers. Method 1: Hack Facebook Account Password By Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are various methods to carry out phishing attacks. In simple phishing attacks, a hacker creates a… Read more →

Social Engineering

What is Social Engineering?   Let us try to understand the concept of Social Engineering attacks through some examples. Example 1 You must have noticed old company documents being thrown into dustbins as garbage. These documents might contain sensitive information such as Names, Phone Numbers, Account Numbers, Social Security Numbers, Addresses, etc. Many companies still old tech like using carbon… Read more →