Latest News

0
What is 'WanaCrypt0r 2.0' ransomware and HOW to protect yourself from it!
What is 'WanaCrypt0r 2.0' ransomware and HOW to protect yourself from it!

What is a ransom ware and how to protect from it as of my previous post here What is ransomware? Ransomware is a particularly nasty type of malware that blocks access to a computer or its data and demands money to release it. How does it work? When … Read more »

Read more »
14May2017

0
Protect against WannaCry Ransomware: Microsoft issues Patch for Unsupported Windows (XP, Vista, 8,...)
Protect against WannaCry Ransomware: Microsoft issues Patch for Unsupported Windows (XP, Vista, 8,...)

Protect against WannaCry Ransomware: Microsoft issues Patch for Unsupported Windows (XP, Vista, 8,...) … Read more »

Read more »
14May2017

0
Caller ID Spoofing - How to Call Anyone from Any Number and Unlimited Credits Trick..!
Caller ID Spoofing - How to Call Anyone from Any Number and Unlimited Credits Trick..!

Caller ID Spoofing - How to Call Anyone from Any Number and Unlimited Credits Trick..! (adsbygoogle = window.adsbygoogle || []).push({}); Before going deep into which application to use for call spoofing and more, let us first understand the concept… Read more »

Read more »
14May2017

0
This app can turn multiple smartphones into a single, unified speaker system
This app can turn multiple smartphones into a single, unified speaker system

This app can turn multiple smartphones into a single, unified speaker system There are many number of apps that are flooding the market with the promise to sync all your devices and provide you with a portable surround sound speaker system. However,… Read more »

Read more »
15Apr2017

0
Browsix: Now Run A Unix-like Open Source Operating System In Your Browser
Browsix: Now Run A Unix-like Open Source Operating System In Your Browser

Browsix: Now Run A Unix-like Open Source Operating System In Your Browser … Read more »

Read more »
21Feb2017

0
How To Convert Text Into Audio Using Notepad
How To Convert Text Into Audio Using Notepad

Everyone loves to hear what is written in a paragraph or in a document. This is the reason why the audio books are getting popular now a days. In this article i will show how you can convert text into audio using the Notepad. Why Use Notepad? Becaus… Read more »

Read more »
13Feb2017

0
How to become a ethical hacker?
How to become a ethical hacker?

Step by step guide to becoming an ethical hacker … Read more »

Read more »
07Feb2017

0
3 ways to enable and disable built-in Administrator in Windows 10:
3 ways to enable and disable built-in Administrator in Windows 10:

3 ways to enable and disable built-in Administrator in Windows 10: Way 1: Enable or disable it through Command Prompt with administrator privilege. Step 1: Run Command Prompt as administrator. Sub-step 1: Press Windows+X to open the Quick Access Men… Read more »

Read more »
02Feb2017

0
How to track Location of other person while u chatting with them..using cmd?
How to track Location of other person while u chatting with them..using cmd?

Track Location of other person while u chatting with them..using cmd? … Read more »

Read more »
01Feb2017

0
Dangerous linux terminal commands  1-> rm -rf
Dangerous linux terminal commands 1-> rm -rf

Dangerous linux terminal commands 1-> rm -rfThis command is the fastest way to delete the folder and entire content in it. But when you make a mistake in typing it leads to the lot of loss.-rm-rf- deletes all the files in the home folder.rm -rf* del… Read more »

Read more »
25Jan2017

0
Best vpns and Proxys to use in college and restricted areas..!!
Best vpns and Proxys to use in college and restricted areas..!!

Best vpns and Proxys to use in college and restricted areas..!! Many people use different websites like Facebook,youtube and many other social networking sites but in order to access in any restricted areas like colleges office and workplace we are … Read more »

Read more »
25Jan2017
 
123 ... 5»
 
Top