Latest Posts

scalping
19Nov

Nvidia RTX 3000s: Scalping Your Lead Off!

How Nvidia GPUs are purchased using bots to bulk-buy a product, and then put them up for sale on eBay or Amazon for an inflated price which rips off buyer’s eyes out!

FANG obsessive Topics: Strings, StringBuilder, and Arraylist! 1
15Nov

FANG obsessive Topics: Strings, StringBuilder, and Arraylist!

FANG’s obsessive topics or topics from the competitive programming which FANG is so obsessed with! these days. Google, Facebook, Microsoft, Netflix, and Amazon have kept on asking questions over these three topics from the past couple of months in their coding rounds

TryHackMe — Mr. Robot CTF Writeup 2
10Nov

TryHackMe — Mr. Robot CTF Writeup

This post is a walkthrough of the famous Mr.Robot CTF virtual machine. I used the platform TryHackMe though you can also find this VM on Vulnhub. The goal is to find three hidden flags.

Monitor
05Nov

Best Budget monitors for Coders and Hackers

The best budget monitors especially for hackers and programmers with a detailed information for why they are required so much and what to know before buying them!

All Latest Posts

Capture The Flag

TryHackMe — Mr. Robot CTF Writeup 3
10Nov

TryHackMe — Mr. Robot CTF Writeup

This post is a walkthrough of the famous Mr.Robot CTF virtual machine. I used the platform TryHackMe though you can also find this VM on Vulnhub. The goal is to find three hidden flags.

GirlScript CTF Writeup - August 2020 4
03Aug

GirlScript CTF Writeup – August 2020

So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]

CTF-cybersec
10Jun

Introduction To ‘Capture The Flags’ in CyberSecurity

Capture The Flag, which is a type of challenge given to cybersecurity professionals and students within a time period in which they have to apply their skills, knowledge over technologies to hack the victim machine.

All Capture The Flag Posts >

Hacking

Vulnerability Scanning and Enumeration for Pen Testing 5
16Jul

Vulnerability Scanning and Enumeration for Pen Testing

The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network

search_cover
21Jun

Information Gathering: Concept, Techniques, and Tools explained

Information gathering isn’t just a phase of security testing; it’s an art that each penetration tester and hacker should master. Let’s dive deeper into it.

Phases Of Hacking
18Jun

Phases of Hacking: 5 Stages of Ethical Hacking

The 5 Phases of Hacking are: Reconnaissance, Scanning, Gaining Access(Exploitation), Maintaining Access/Persistence and Clearing Tracks.

What is the CIA Triad? -Defined, Explained, and Explored 6
06Jun

What is the CIA Triad? -Defined, Explained, and Explored

In the information security (InfoSec) community, “CIA” has nothing to try to to with a particular well-recognized US intelligence. These three letters stand for Confidentiality, Integrity, and Availability, also known as the CIA Triad. Together these principles are the foundation of any organization’s information security.

All Hacking Posts >

How To

Hack The Box: How to get the invite code? 7
04Nov

Hack The Box: How to get the invite code?

To even join Hack The Box, you have to hack your way in or treat it like a CTF challenge by finding the invite code. This article will take you through how to achieve the challenge mentioned. However, I highly recommend that you first try to hack yourself in(on your own) and only use this article as a guide in case you need help.

thermal_meusec
27Oct

Does your System heat too much? Say no more!

The best solution for overheating and thermal throttling for heavy machine and gaming laptops.

How to Create a Phishing Page for Netflix? 8
27Sep

How to Create a Phishing Page for Netflix?

Ever thought of how hackers steal your critical data or credentials via social engineering or phishing scam? Let’s see in this tutorial how hackers can steal your valuable data via a phishing scam. The first question that pops in mind is, what is phishing?

3 Steps for Beginner Hackers
18May

How to start hacking? 3 Steps Every Beginner Hacker Should Follow

There’s no fixed way to start hacking, and you need not be of a computer science background to learn this. But there are some basic knowledge and things you need to know in order to become one.
Here are 3 main things every Beginner Hacker should know about. These tips will get you started and are very important.

All How To Posts >

Networking

VPN Vs Proxy Cover
29Jun

VPN vs Proxy

VPN Vs Proxy: Which one is better for you? A VPN and a proxy both will connect you to a remote computer, but that’s where similarities end.

IPv4 vs IPv6: Where did IPv5 go? 9
31May

IPv4 vs IPv6: Where did IPv5 go?

Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!

TCP VS UDP
12May

TCP vs UDP: Unfolded

Before jumping to TCP vs UDP we must understand what TCP and UDP are. TCP and UDP are protocols that are a part of the transport layer in the OSI model. Both of these protocols are used for sending packets over the internet. They are built over the Internet Protocol(IP).

osi-model-cover
18Apr

The 7 layers of OSI Model – Definition, Advantages, and Explanation

OSI Model is used to understand how data is transferred from one computer to another in a computer network. To accomplish successful communication between computers or networks of different architecture 7 Layer of OSI Model was defined consisting of Application, Presentation, Session, Transport, Datalink, and Physical layer.

All Networking Posts >

News

badPower Malware for Chargers
26Jul

BadPower can destroy your device by corrupting your fast charger

Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.

Twitter hack
16Jul

Massive Twitter Hack: Top profiles like Elon Musk, Bill Gates, Jeff Bezos got compromised!

Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin

malware
15Jul

Joker malware: a new malware which affected Google play store apps

An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.

Goole Tsunami Vulnerability Scanner
14Jul

Google makes Tsunami Vulnerability Scanner Open Source

Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.

All News Posts >

Programming & Dev

FANG obsessive Topics: Strings, StringBuilder, and Arraylist! 10
15Nov

FANG obsessive Topics: Strings, StringBuilder, and Arraylist!

FANG’s obsessive topics or topics from the competitive programming which FANG is so obsessed with! these days. Google, Facebook, Microsoft, Netflix, and Amazon have kept on asking questions over these three topics from the past couple of months in their coding rounds

Interview Questions
29Aug

Top 10 Java Interview Questions asked everywhere

Java is the most commonly used programming language with most of the devices using it. These are the most commonly asked interview questions on java you should know.

algorithm
27Aug

Top Algorithms asked in every interview( Software engineering)

The most important algorithms which are must to know for every computer programmer or software engineer especially when they are going for an interview

All Programming & Dev Posts >

Tech Market

scalping
19Nov

Nvidia RTX 3000s: Scalping Your Lead Off!

How Nvidia GPUs are purchased using bots to bulk-buy a product, and then put them up for sale on eBay or Amazon for an inflated price which rips off buyer’s eyes out!

Monitor
05Nov

Best Budget monitors for Coders and Hackers

The best budget monitors especially for hackers and programmers with a detailed information for why they are required so much and what to know before buying them!

meusec_amd
03Nov

New AMD Radeon RX 6000 series, A blow to GPU market!

A brief information from the last AMD event about the launch of the new AMD Radeon RX 6800, RX 6800XT and RX 6900XT and their performance comparison with respect to Nvidia’s new Ampere tech 3000 series RTX cards

ring_meusec
29Oct

Amazon Ring: A flying security solution

An amazing security and surveillance solution for your home by amazon!

All Tech Market Posts >

Subscribe to our Newsletter

Advertisement