Profile cover photo
Profile photo
Ujjwal Sinha
188 followers
188 followers
About
Posts

Post has attachment
How to prevent yourself from being traced back after committing a cyber crime?
Topic, for today's discussion is somewhat interesting i.e; "How to prevent yourself from being traced back after committing a cyber crime?" Lets understand this with a very simple example. To visit any website, for example, let's say: "www.google.com", we n...

Post has attachment
How to integrate Ember.js and Sails.js?
Today we are going to dive into the process of integrating Ember.js and Sails.js. Before going ahead, let's understand these terms. Ember.js is an open-source JavaScript web application framework, based on the MVC pattern which allows developers to ...  To ...

Post has attachment
How to set up an Ember.js Environment?
Let's start setting up an Ember.js environment for creating ambitious web applications.  Few key points to note before starting the setup.  We would create a directory structure, gather the dependencies and then boot our  Ember application. This post has be...

Post has attachment
What are the steps performed by Hackers?
Let's understand the steps performed by Hackers in a bit detail. It mainly includes Information Gathering i.e; Reconnaissance, Scanning, Gaining Access, Maintaining Access and Clearing Tracks. Let's discuss these in details. This post has been updated at  h...

Post has attachment
What are the techniques to crack password?
Hackers favorite word is "Password", isn't it? So, ultimately what are the ways to crack passwords? There are a number of ways to do this, but few of them include these:-Password Guessing, Shoulder Surfing, Social Engineering, Brute-forcing ... This post ha...

Post has attachment
What is the Antidote to Hacking?
We live in a world today where nothing is personal or safe. Be it your bank account details or other financial transactions, your entire life on Facebook, Twitter is all out there and can be accessed by anyone in any-part of the world. This is what is calle...

Post has attachment
Why do anti-viruses fail in detecting Trojans?
A very simple question to all of you.Ultimately, how does a hacker manage to get his Trojan bypassed via your anti-virus? Any answer? Think a bit, It's easy. Let's understand what does a anti-virus do to detect Trojan or Viruses? All the anti-viruses ... Th...

Post has attachment
How to prevent your system from being hacked?
You must have seen my earlier posts on Viruses and Trojans, if not then please refer them. I really think that people aren't aware of any such attacks that can happen to their system and that's the reason for me to come up with these posts. As of now, we kn...

Post has attachment
How to refine your Google Search?
Lets start with a very simple question. What can Google do for a hacker? It's Simple.. Google can search sensitive information like payroll, EIN and even the personal email box and It can act as a Vulnerability Scanner and even as a Transparent Proxy. Can w...

Post has attachment
How to detect and remove Trojan manually if it's bypassed via anti-virus?
Today I am going to discuss some safeguarding techniques against Trojans. One very important question for each one of you? Is your laptop free of Viruses / Trojans? Think well before you answer! Anyway, let's understand what a Trojan is...     This post has...
Wait while more posts are being loaded