Search

Computer Addicted | Internet Addiction

[Updates on] : Ethical Hacking, Digital Forensics, Cyber Security

Month

May 2015

“FLIRCHI DATING” IS FAKE : AUTOMATED ROBOTIC SITE


Report by : Bijay Acharya Research Method 1 : I signed up with my facebook account for research purpose. Site automatically suggested me many new girls around my capital city, kathmandu. Then site started bombarding me new notifications like :... Continue Reading →

[In Nepali] Cyber Security & Ethical Hacking Mod 1 – SPY Phone as a Best Tracking Device


.This is module 1. In total there are 5 modules on Cyber Security and Ethical Hacking. Objectives of this video : - Introduction to cyber security and ethical hacking - SPY phone in-depth-overview as a best tracking device - Securing... Continue Reading →

Computer & Laptop Repair Services – Taalchowk, Lekhnath


Firewall for dummies – or, what do we mean by a next-generation firewall?


The term next-generation firewall is not well defined, so it's worth clarifying a little before we proceed. Put simply, a next-generation firewall offers more protection than a traditional firewall as it can look inside content, rather than just blocking based... Continue Reading →

Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass


A simple script exploit can take down Google’s latest anti-phishing extension, Password Alert Google had launched its latest anti-phishing extension called Password Alert onWednesday  to protect Chrome users from phishing attacks on Google products.  However within 24 hours of releasing... Continue Reading →

Kali Linux Command Line Tutorials 2 – Working with Directories


Blog at WordPress.com.

Up ↑

%d bloggers like this: