extratorrent proxy

Extratorrent proxy | Top 15 best extratorrent proxy site list 2018

Generally, there are two ways to download files from the internet. The first one is client server and the other one is peer to peer . In client server, files are uploaded to the server via admin and clients just access these files from the server using internet. This is the normal way of downloading. […]

How to access computer from anywhere using android phone

Remotely access your computer form anywhere As we know, now days technologies are improving day by day and provides lot of features to the users but many of users are not aware about these features. So in this article I will show you one of the most usable and powerful feature of chrome remote desktop application […]

RAT

How to detect hackers in your computer

If anyone wants to hack your computer, they just need to install a malware application called RATS (Remote Access Trojans) on your computer. RAT is a very powerful malware, once it’s installed on your computer, it will give a full control of your computer to the hacker and hacker can do anything on your computer. […]

hide and unhide drive

How to hide and unhide drive in windows

In this article, we will see two way of hide and unhide drive in windows operating system. Via user interface and Via console (Command prompt) Before doing all these let’s understand why should we hide drive? We hide the folders and files in hard drive, so that others can’t see our personal data. But what […]

web jacking attack method

Web jacking attack method | Explanation

What is web jacking attack method? Web jacking is same as like web hijacking but the difference between web jacking and hijacking is in web jacking attack method hackers compromised with the domain name system but in hijacking they take a full control over the website. Web jacking attack method is another type of social engineering phising attack where an […]