1
Tips For Girls On Increasing Your Facebook Privacy :-) Must Read :)Tips For Girls On Increasing Your Facebook Privacy :-) Must Read :)

Girls required more privacy and security on a social networking site facebook.So, here are the tips.1.) See what your Facebooktimeline looks like to a specificfriend or the public.Facebook has a feature that lets youview what your profile looks like …

Read More..

0
5 Tips to Protect Our Photos on Facebook5 Tips to Protect Our Photos on Facebook

1. Save the Photos That are Most Personal to YouThis is a very simple but effective suggestion. Do not upload photos to your profilethat you do not want to be seen by your boss, co-workers or friends from the gym.2. Configure the Privacy Setting on Y…

Read More..

0
Download torrent file with IDMDownload torrent file with IDM

As we all know most popular download manager software Internet Download Manager that all user use to download stuff from internet. Internet Download Manager boots your internet speed 5 times and make you to download your stuff faster.On ther hand tor…

Read More..

0
HOW-TO HACK ATMsHOW-TO HACK ATMs

Connect a mobile phone to the machine with a USB cable and install Ploutus Malware.The attacker sends two SMS messages to the mobile phone inside the ATM.SMS 1 contains a valid activation ID to activate the malwareSMS 2 contains a valid dispense comm…

Read More..

0
Different Types of HackersDifferent Types of Hackers

Hackers can be divided into three groups: white hats, black hats, and grey hats. Ethical hackers usually fall into the white-hat category, but sometimes they’re former grey hats who have become security professionals and who use their skills in an et…

Read More..

0
Shutdown Windows 7 RemotelyShutdown Windows 7 Remotely

I believe when read the title Shutdown Windows 7 remotely, many people will remember the infamous Windows 2000 shutdown feature. I remember back on my bachelor when time for computer lab class we will begin the shutdown war inside the lab by typing -…

Read More..

0
What is the difference between 2G, 3G, 4G, mobile networks?What is the difference between 2G, 3G, 4G, mobile networks?

G in 2G, 3G and 4G stands for the “Generation” of the mobile network. Today, mobile operators have started offering 4G services in the country. A higher number before the ‘G’ means more power to send out and receive more information and therefore the…

Read More..

0
Mac Spoofing MethodMac Spoofing Method

Changing MAC address or we also can call it MAC address spoofing will be useful in some cases, but we will talk about it later in conclusion at the end of this article.Requirement:1. Linux terminalStep by step How to Change MAC Address on Kali Linux:…

Read More..
 
123 ... 123»
 
Top