LATEST ARTICLES

linux networking
Linux Networking Cookbook Move beyond the basics of how a Linux machine works and gain a better understanding of Linux networks and their configuration. This...
hack webcam
Hack webcam - hacking someone's webcam to get the live video feed is always been one of the premium hacking techniques, here in...
ransomware
Why do people write ransomware? It’s mostly to rope in cash from helpless victims whom they target. But, there are some unique kind...
bug bounty
What is the Bug Bounty Program?Bug Bounty program provides recognition and compensation to security researchers practising responsible disclosure. Company started Bug Bounty programs...
virus
Virus Writing  - IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it on your own...