I have written plenty of articles on Technotification to increase the interest of my audience towards ethical hacking and you are probably one of them. First of all, I would like to say, This article is just for an educational purpose. Do not misuse the information otherwise, you may end up […]
The word hacker has many meanings and in the computer world it refers to “Someone who makes a device work in a way it is not expected to work”. In general, the word hacker is one of the most misunderstood words in English. People generally assume some kind of cybercriminal […]
My Name is Manikanta Sripadi I Founder and Ceo Neoistone Technologies Today we discussed Rogue Security. I am a Full Stack developer run own company Neoistone started in 2019. from last Year I Teaching To Ethical Hacking Malware infection rates are only increasing, so it’s essential to protect our devices. […]
My home Wi-Fi password has always been rather simple and memorable. It makes it easy to give out to guests, input on devices without keyboards, and remember when needed. I always knew it was a little insecure, but how insecure? In this post I’ll be showing you how you can […]
Sitadel is a python based web application scanner. It’s flexible and has many different scanning options. It can get a full fingerprint of a server and bruteforce directories, admin pages, files etc. Also, it can search for injection type attacks (slq, html, xss, rfi, ldap and more), other information disclosures […]
What is tor browser ? Tor began its life in the 1990s when researchers at the US Naval Research Laboratory developed “onion routing.” Onion routing makes it possible to pass messages through a network anonymously. It uses multiple layers of encryption that get peeled off one by one (like peeling […]
Hacking Gmail or Google is the second most searched account hacking topic on the internet next to hacking Facebook account. Hacking into a Google account gives access not only to Gmail but also to their prominent counterparts such as Android (since one can control a android device using Google account), YouTube, Drive, […]
Windows 10 and Windows 11 users, along with Linux users, face two huge security vulnerabilities it’s been revealed, which could allow hackers to get their hands on sensitive PC data. The newly-identified local privilege escalation vulnerabilities could allow bad actors to take advantage of a simple loophole in the OS […]
Instagram is a free and popular photo-sharing social media platform that allows you to share photos and videos with your friends and family members. As with any other popular social media platform, there is an increased interest by cybercriminals to hack Instagram accounts. This article will talk about the five […]
Curious about vulnerability disclosure? We explain what it is, why there may be friction between the researcher and the organization, and possible solutions. What Is a Vulnerability Disclosure? During a vulnerability disclosure, individuals report security weaknesses in computer systems to the organization. Disclosures can be contentious; some organizations prefer not […]