Abhishek Awasthi
How To Create a Keylogger using Notepad
A Keylogger is a very powerful hacking or spying tools. If you are looking to spy on someone's activity or to check out what...
iPhone Secret Codes to Access Its Hidden Features
Best Hidden iPhone Secret Codes
There are some feature in your iPhone about which very less people know. These can be accessed by just a...
North Korea’s “Paranoid” Red Star OS Vulnerable To Hacking!!!
Kim Jong-un's homebred Linux distro for North Korea, RedStar Linux vulnerable to remote takeover
If you have read our year old article, you will know...
How to Repair or Fix a Corrupted micro SD Card
Here is how to repair and/or fix a corrupt SD Card
How to Preserve your important and precious data from being corrupted and recover from...
Why C is The Default Drive in Windows? Here is Your Answer
A question that has bothered almost everyone of us at some point of time has been answered
Computers, which were thought as a luxury few...
This Familiar HTML Attribute Has Given Birth To A New Way Of Phishing
The "target" attribute of anchor tag in HTML converts a website into a phishing platform if the website allows its users to post links.
We...
FalseCONNECT Vulnerability Affects Most Of The Internet Users
Flaws in the implementation of proxy authentication procedures in various products allow an attacker to gain access to all HTTP and HTTPS traffic from...
How to install Linux on an Android device
Unleash the full potential of your Android device by installing Linux OS on it
Installing Linux on Your device involve four steps which are -installing...
Must-Know Ubuntu Terminal Commands for a Smart User
This Terminal Commands are most frequently used on Ubuntu Linux distro
Gone are the days when people loved the ease provided by GUI. Geeks nowadays...
Why Users Switch Back To Android Smartphones From iPhones
Reasons why Android smartphone users go for iOS and then come back.
iOS vs. Android has always been a burning topic for debates all over...