Category: Security

Computer Security - Padlock

The Ethical Implications of Data Privacy in the Digital Age

Alright, let’s talk about a hot topic that affects all of us every time we swipe, click, or scroll—data privacy. Sounds techy, right? But here’s the thing: it’s not just about computers; it’s about trust, fairness, and how much of you you’re willing to trade for convenience. XAXAXA The Trade-Off We Don’t Think About Think about this: every time you… Read more →

Computer Security - Padlock

Computer Security in plain English

Computer security refers to the measures that are taken to protect computer systems and networks from unauthorised access, attacks, and other threats. It involves protecting the confidentiality, integrity, and availability of computer systems and the data they store and process. There are many different types of computer security measures, including: By implementing these and other security measures, organisations and individuals… Read more →

unrecognizable male cyber spy hacking computer system in darkness

Protect Website against hacks

How to protect your Website against hacks? An organisation can adopt the following policy to protect itself against web server attacks. 🌀SQL Injection– sanitizing and validating user parameters before submitting them to the database for processing can help reduce the chances of being attacked via SQL Injection. Database engines such as MS SQL Server, MySQL, etc. support parameters and prepared statements.… Read more →

Top 10 Virus Commands in Notepad

Disclaimer: This post is only for educational and security purposes don’t try any illegal activity I’m just sharing these methods so you can protect yourself against these attacks. The notepad method of creating viruses is a technique used by hackers to create viruses and malware. It is one of the oldest methods of virus creation and is it still being… Read more →

access app application apps

Get rid of Facebook tracking

Facebook can track almost all of your online activities. And the Like and Share buttons keep track of which pages you’ve visited (even if you haven’t clicked them). Getting rid of this with the help of Facebook Container — an extension for Firefox. To use it, just follow the link and download it. Upon activation, all Facebook tracking elements will… Read more →

close up shot of keyboard buttons

Password Salting

What is Password Salting? Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database. Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows… Read more →

Rooting my HTC Hero Android Phone

Rooting Related Terms

⚠️ Recovery: Every Android device has a recovery through which the OS can install over-the-air updates. It is also used by the system whenever you factory reset a device. If you want to flash a custom ROM, you must replace the stock recovery with a custom one. ⚠️ Superuser/SuperSU: This application is automatically installed on the device during rooting. It… Read more →

Ways Hackers Access Facebook Accounts

Mostly Hackers use these methods to hack Facebook accounts, so protect yourself from hackers. Must Read!!! and beware of attacks from hackers. Method 1: Hack Facebook Account Password By Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are various methods to carry out phishing attacks. In simple phishing attacks, a hacker creates a… Read more →

Social Engineering

What is Social Engineering?   Let us try to understand the concept of Social Engineering attacks through some examples. Example 1 You must have noticed old company documents being thrown into dustbins as garbage. These documents might contain sensitive information such as Names, Phone Numbers, Account Numbers, Social Security Numbers, Addresses, etc. Many companies still old tech like using carbon… Read more →

MAC address spoofing

The device that you’re looking at right now has a network interface controller (NIC), the thing that’s responsible for allowing you to connect to a network, like an internet. All devices capable of networking (smartphones, laptops, routers) have one of these. Each NIC is assigned unique hard-coded MAC addresses that cannot be changed. However, almost all popular platforms such as… Read more →