Data Recovery
By Abir Atarthy There is a lots queries regarding data recovery in my mail box. So here i thought to write something on it. Data recovery is an important subject and it’s definitely a good thing to...
View ArticleHiding Folders without any software
By Aritra Majumdar Friends,here in this article i am going to show you some tricks of locking/hiding your private folder without use of any third party folder locker software.all of you have some...
View ArticleFacebook Attachment Uploader Owned By A Space
Facebook Attachment Uploader Oh look – another vulnerability in Facebook! It wasn’t long ago we reported New Research Shows Facebook’s URL Scanner Is Vulnerable To Cloaking. Well this time the private...
View ArticleHow to Write-Protect USB Flash Drive
How to Write-Protect USB Flash Drive Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are...
View Articlesslyze – Fast and Full-Featured SSL Configuration Scanner
Transport Layer Security (TLS), commonly called SSL, is one of the most widely used protocols to secure network communications. As costs fall and user security and privacy expectations rise companies...
View ArticleHow to have unique passwords for each website
LinkedIn got hacked and we heard it. Techradar got hacked and we heard it once more. We all know it. But we don’t do it. We all know that we should have unique passwords for different websites but how...
View ArticleTop OSINT tools
Open source intelligence (OSINT) refers to intelligence that has been derived from publicly available sources. Basically, OSINT tools are used in the reconnaissance phase to gather as much information...
View ArticleHow To Become A Hacker: A Million Dollar Question
Every day we(me Abir and Sandeep) at Indian School Of Ethical Hacking(www.isoeh.com) gets bored to answer one common question over mails/phones/smses that comes not only from India but from other...
View Article