PinnedPublished inPenTester NepalDealing With A Hacked Brain!Let’s talk about this shit.May 7, 20212May 7, 20212
PinnedTOR: Privacy, Anonymity & SecurityTor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant…Apr 17, 2021Apr 17, 2021
Published inThe ZeroneTake Your Development and Operations Team to the Next Level: An Introduction to DevOpsAre you tired of slow, error-prone software releases? Are you ready to take your development and operations team to the next level of…Jan 5, 20232Jan 5, 20232
Don’t click that link!!!!Recently, A friend of mine had her Facebook account hacked using a technique known as phishing(We will talk more about phishing later). Who…Jul 2, 2021Jul 2, 2021
‘Joker’ is back: A malware that Google hatesHe’s back, Joker! No, not the one who appears in the Batman series, but the malware which has become a nightmare for Google.Jun 27, 20211Jun 27, 20211
Published inPenTester NepalSSH For Dummies: What, Why, How?Due to the evolution of cloud computing, it has become a necessity to access remote machines these days. Most of us access our cloud…Apr 19, 20211Apr 19, 20211
What the Heck is Pointer in C?While learning C/C++, you may have run over the term ‘Pointers’, and frequently heard that it is an idea difficult to comprehend. Pointers…Sep 2, 20201Sep 2, 20201
Dynamic Memory Allocation in CLearn about DMA with malloc, alloc and realloc.Aug 28, 20201Aug 28, 20201