Profile cover photo
Profile photo
Thanglalson Gangte
246 followers
246 followers
About
Posts

How To Become A Hacker
Nowadays, every other college or school
student wants to be a hacker. Due to media hype, the term hacker is considered both
cool and criminal at the same time. Now, since my blog is basically about my
journey into hacking, I receive many emails on how to be...
Add a comment...

Post has attachment
Book Review: Web penetration Testing With Kali Linux
I recently finished the book WebPenetration Testing With Kali Linux by Joseph Muniz and Amir Lakhani and I decided to write a review of it. It is a book about performing
penetration tests (In layman terms: hacking) specifically on web applications.
I found ...
Add a comment...

Post has attachment
5 ways to bypass antivius
Antiviruses are a big  annoyance for hackers. When a hacker
wants to penetrate a system, the success or failure of that hack often depends
on whether the target computer has an antivirus or not. Thus, bypassing
antiviruses are naturally a hot topic among ha...
Add a comment...

Post has attachment
5 Best Tools For Hacking Web Applications
In an earlier post, I listed the top 10 general hacking tools. This time, I have listed 5 of the best tools specifically  to hack websites and web applications. Most of these tools are free and are very easy to use.  If you want to hack a website or web app...
Add a comment...

Post has attachment
How to perform a Denial of Service attack to crash a website?
Denial of service is a very aggressive attack usually
launched against websites as a form of protest or activism. The ultimate aim is
to bring down or crash the web server. There are many readymade tools for this.
Here, I will give instructions on how to us...
Add a comment...

Post has attachment
What are Denial of Service (DOS) attacks?
Denial of Service attacks have become more widely known due
to extensive media coverage. But what exactly is a denial of service attack?
Simply put, a denial of service attack is a type of cyber attack wherein a
website or service is brought down by a hacke...
Add a comment...

Post has attachment
Should you use Netbeans IDE? [OPINION]
 In 2009, CBSE, the Indian board of secondary
education changed the Informatics Practices (Informatics Practices is an
additional subject) text books of Class XI and Class XII. A new syllabus, Java
Swing under Netbeans was introduced. This is a welcome chan...
Add a comment...

Post has attachment
5 simple ways you can protect yourself from hackers
1. Use Two-step verification Most of us use free email providers like Yahoo and Gmail.
These email services have the option to enable 
2-step verification.  All you need
is a mobile phone number. Whenever you login to your Gmail account from  any new or unk...
Add a comment...

Post has attachment
Top 10 best hacking tools
Hacking always involves tools. A good hacker knows how to use tools to his best advantage. An even better hacker writes his own tools. He...
Add a comment...

Post has attachment
Just wrote a blog post on how you can use technology to make your life more convenient. Feel free to comment
Add a comment...
Wait while more posts are being loaded