Dhacker

All Posts..

How to Setup Private Search Engine?

In this blog we will setup private search engine. Yes! you heard it right, we will be setting up custom search engine which will be running on the localhost. This search engine will give out all the information on the localhost. Now, to get an idea about how it work,...

CrySIS aka Dharma Ransomware

Hey Techies! Back again with a new blog. In this blog, I will be talking about CrySIS Ransomware which is also known as Dharma Ransomware. This ransomware is again in light these days and affecting businesses running Windows systems Dharma Ransomware is in the market...

Nmap in Windows Command Line Interface

Hey Techies! In this blog, I will be showing you quick steps, following which you can install Nmap in Windows command line interface and you can use it just link Kali Linux, inside windows CLI (Command Line Interface). I'm using updated Windows 10, so you can consider...

Facebook 3D Photo – Turn your portraits to 3D

Facebook is continously developing their platforms into the field of Virtual Reality (VR) and great example of it is Facebook360 and Facebook 3D Photo. Few months ago, Facebook has released a new feature to its users. This feature is know as "3D Photo". Now there are...

Faceapp Pro – Is it really free?

We have been watching social media from few days, Faceapp is trending at peak and everyone is busy posting their smart looking pic in 50's. Faceapp was launched in 2017. It is a Russian Photo editing app, currently ranking at No.1 on iOS App Store in Photo Editing...

VLC Player Download – The Secure Way!

Recently, a news has been booming online that German national Computer Emergency Response Team i.e. CERT-Bund has identified a buffer-overflow issue in the latest version of the VLC player. The buffer-overflow is the issue related to memory and arise when the buffer...

Nmap top 10 commands you should know

Hey there Techies! In this blog we will be looking at Nmap top 10 commands you should know. It will be helpful if you are working or want to work in the field of network security, network architecture development, information security, information technology, ethical...

How to protect crypto wallets in 2019

In this tech world, Security is a very complex issue. As every day we encounter with a report of a major hacking or ransomware violation. Moreover, millennial’s are investing more in Bitcoin, Ethereum, and a host of other cryptocurrencies making crypto security so...

5G and IoT : A New Global Era

When the fifth generation of wireless communications technology i.e. 5G arrives in 2020, engineers are expecting that it will become the backbone of the Internet of Things. As  5G is capable of data transmission ten times faster than today’s 4G networks, meaning data...

All you need to know about Blockchain

We are in the generation of cryptocurrency. You might have heard news about people getting rich by investing in Bitcoins and Etherum but to understand about it you need to understand the technology behind it – Blockchain. The blockchain is a distributed ledger...

How quantum computing impacts cryptography

A classical computer encodes data in binary digits that can only be a “1” or a “0” which we refer as bits whereas a quantum computer uses “qubits”. A single qubit can encode more than two states. And the Quantum computers that exist today can’t perform more complex...

Mega breaches of 2018 exposing 3.6 billion records

In the year 2018 Data Breaches Have Exposed 3.6 Billion Records making its second-worst year on record after 2017 which exposed seven billion records in total. Hacking is the leading cause for data breaches, accounting up to 57.1 percent in total and fraud was another...

The impact of hackers targeting small businesses

A recent SMB Group report says more than 70% of hackers are going to target small businesses. And due to weak cybersecurity protection and a lack of cash to cover the damages as many as 60 percent of hacked small-to-midsize businesses go out of business after six...

Read this before using a public WiFi

In 2018 where ever you go one thing you can find common i.e. Public Wi-Fi whether it may be a local coffee shop, libraries or a hotels or even airports you visit while traveling. Though these WI-Fi hotspots are everywhere, they're often not secure as you thought. They...

What you need to know about TalkTalk hack?

The UK based 20 years experienced TalkTalk Company which had businesses in broadband, telecoms and mobile network solutions got hacked in 2015.yesterday two friends who took part in TalkTalk website have been jailed. So here’s all you should know about the £77m hack....

How to protect your Facebook account from hackers in 2019?

The most popular social networking website Facebook with more than 2.23 billion active users has become a target for hackers this year. Recently Facebook announced a massive security breach affecting at least 50 million active users. As Facebook data is very unique...

All you need to know about “Masked Aadhaar”

The recent Supreme Court verdict of India on UIDAI’s Aadhaar has ensured stronger data protection safeguards which will accelerate India’s digital journey. In the landmark verdict, it restricted the use of Aadhaar authentication by private entities and allowed its...

How to Secure Gmail in 2019

We are in a generation of the Internet which is offering too many features and opportunities to create collaborate and explore. And in that email is the most critical aspect of our digital identities. So it is important to keep our account safe and secure as it...

How to Secure Your Digitized Home?

We are the generation of people living in smart homes in a digitized world. Everything out there is connected to the internet via WiFi. Cool gadgets are making our lives smarter.   Everything is virtually connected but these connections aren’t secure as you...

How secure is using GB Whatsapp in 2018?

WhatsApp is a most powerful messaging app owned by Facebook. It allows users to send text messages, voice calls, video calls, images, documents and user location at free of cost. Although it has lots of features; it has limitations too such as we can only use a single...

How to secure your car from hackers in an autonomous world?

Automakers are progressing in protecting vehicles from cyber attacks, but the car hacking threat is still real and it may get increasingly serious once autonomous vehicles start hitting the roads in significant numbers in the 2020's. In the action movie The Fate of...

Top 12 Security Tips to Secure your iPhone from Hackers

There was a time when we used to think iPhones are most secure but now we know iPhones can be hacked too, even with the ever-increasing layers of security. It’s now possible for cybercriminals to hack an iPhone remotely via iCloud. To avoid hackers having access to...

How to Think Like Hacker for a Secure Business

With every new innovation, hackers are adapting themselves to the new environment. As technology becomes accessible younger generations are enjoying hacking simply for the challenge and thrill of it & of course for an added bonus of money and media attention. For...

How to Secure Android Mobile Phones from Getting Hacked

Despite having enhanced features, Android mobiles still remain susceptible to security threats. A hacker can distribute malicious Trojans capable of compromising device security, stealing personal and financial information most of the times. By following some security...

Tips and tricks to Prevent WordPress from getting Hacked

Over the past few years, hacking incidents have become too common. Your website can be easily hacked if it lacks computer security or if you use poor 3rd party applications or outdated scripts, or by simply responding to phishing emails. In a world of a hacking era,...

How to Boost Your WordPress Website Speed?

Boost your WordPress Website Speed! Hello Everyone! In this blog I will be talking about how to boost your wordpress website loading speed. When we open any website link, there is lots of things happening in back-end to satisfied our request. Now imagine that a...

Top 6 Tools for Information Gathering

Top 6 Tools I use for Information Gathering Hello Everyone!! Today I will be sharing 6 tools which I use for quick information gathering of a target web application. If you are a web application security expert, pentester or ethical hacker, you must be knowing that...

What you know about Cyber Security?

What is Cyber Security? Hello guys! Today I will be talking on cyber security. It is a very common word which almost every one of you have heard. But still there are people who have only heard about it and don’t have any idea what does cyber security represents? I...

You May Also Like…