Computer Addicted | Internet Addiction

[Updates on] : Ethical Hacking, Digital Forensics, Cyber Security


Computer Addicted

MilkyDoor malware turns Androids into backdoors to attack enterprise networks

Routines and techniques build on those of the malware’s predecessor, DressCode. A new Android malware family is able to blend in with normal network traffic and avoid detection by encrypting its payloads, in order to access internal networks. The backdoor,... Continue Reading →

Password Cracking. pt 1 – using ‘Hashcat’ (step-by-step guide)

How to crack passwords using Hashcat ? In this part of Password Cracking Series, I'll show you built in tool in kali linux for password cracking, i.e. Hashcat. note : If you face problem during this lab, then at the... Continue Reading →

Password Cracking. pt 1 – Hashcat [Only For Educational Purpose ]

This is new series, and here I'm going to post about Password Cracking. Starting with "hashcat", I will show you different platform, OS and areas on carrying out Password Cracking. As mentioned in topic, this is video series. But, in... Continue Reading →

[ in Nepali ] 45 Ways to Earn Money Online – Way 4 : Create Niche Websites

[ in Nepali ] 45 Ways to Earn Money Online - Way 4 : Create Niche Websites how to earn money online, how to earn money from website in nepal, how to earn money online nepal, how to earn money... Continue Reading →

Ethical Hacking with Kali Linux [3] – Bypassing MAC Address Filter

BY : BIJAY ACHARYA Ethical Hacking with Kali Linux [3] - Bypassing MAC Address Filter > > Welcome all, to this series of Kali Linux for Ethical Hacking. This is 3rd part, & I'll explain process of bypassing MAC... Continue Reading →

Encryption Is Not Enough !, Research & Conclusion (Part 1)

By : BIJAY ACHARYA Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption... Continue Reading →


 COURSE HERE : COURSE BY : BIJAY ACHARYA About the Course: 1 COURSE : 5 LECTURES : 1 PROMISE ' READ IT, YOU WILL MASTER THE SECURITY By : Bijay Acharya Category:Technology and Internet » Internet Tags:internetanti spamanti hacking

Is the Internet Replacing Your Memory?

-- Google, Facebook, Internet Movie Database, and many other sources of information on the Internet are changing the way in which we remember. Whether it's an actor's name that is on the tip of your tongue, or even a loved one's... Continue Reading →

Ayo Gorkhali,Dailouge Version,Have a Look,if liked it, then Share it

Blog at

Up ↑

%d bloggers like this: