Home Authors Posts by vijay

vijay

vijay
2971 POSTS 0 COMMENTS

12 Pakistani Government Websites Got Hacked by Xploiter’s Crew

Xploiter's Crew is a crew formed by the well known Pakistani Hacker named Xploiter. He is Co-Admin in Pakbugs and he got into several important...

Commercial Bank Of Ethopia Data Leaked By Dr.SniFF

Commercial Bank of Ethiopia's Database (https://www.combanketh.et/) was leaked yesterday by Dr.SniFF From Xploiters Crew. Xploiter's Crew is a Hacking Team formed by the well known...

Pakistani Newspaper “Daily Post International” Website Defaced by Afghan Cyber Army

One of the most popular newspapers in Pakistani Got hacked and defaced recently by Afghan Cyber Army. Afghan Cyber Army has been continiously hacking Pakistani...

Enjoy Facebook,twitter and Social Sites Even On Slow Internet Connection

                                                                                     Hello Everyone!!Today I would like to share my yesterday's experience with slow internet connection but at the same time needless to say being...

How to Permanently Delete a Facebook Account.

You May feel insecure on Facebook and want to delete your account. Some of you might have friends who put up status updates that they are...
HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD.

HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD.

MICRO SD Memory Card Password Recovery / removing 4 methods.  Solution 1: For Symbian Mobiles: 1. Download and Install  FExplorer 2. Insert your card into your phone, without accessing it through...

HOW DO YOU KNOW YOUR COMPUTER IS INFECTED AND ITS PRECAUTION.

How do you know your computer is infected? there is no particular way to identify that your computer has been infected with malicious code....

What database actually FACEBOOK uses?

Hello everyone..... This is my first blog post and I don't know how to write it but still I am trying. So fasten your seat...

History Of DataBase System

Greetings of the day!! Well, I am not a regular blogger …. Truly speaking I have never written a single blog ever  … I am...

Understanding Hidden Threats: Corrupted Software Files

What types of files can attackers corrupt? An attacker may be able to insert malicious code into any file, including common file types that you...