Open in app

Sign In

Write

Sign In

crysp
crysp

46 Followers

Home

About

Published in PenTester Nepal

·Pinned

Dealing With A Hacked Brain!

Let’s talk about this shit. The fact that hackers get paid for breaking security is truly amazing. It’s amazing how much they manage to earn just by pressing some keys on their mechanical keyboard. Wearing a black hoodie and a Guy Fawkes mask are iconic hacker styles. Hackers are introverts…

Cybersecurity

6 min read

Dealing With A Hacked Brain!
Dealing With A Hacked Brain!
Cybersecurity

6 min read


Pinned

TOR: Privacy, Anonymity & Security

Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Introduction We live in the era of information where anyone who has access to the Internet has all the information in the world at their fingertips…

Tor

7 min read

TOR: Privacy, Anonymity & Security
TOR: Privacy, Anonymity & Security
Tor

7 min read


Published in The Zerone

·Jan 5

Take Your Development and Operations Team to the Next Level: An Introduction to DevOps

Are you tired of slow, error-prone software releases? Are you ready to take your development and operations team to the next level of efficiency and collaboration? or Do you want to know how big tech companies ship their software to production? If so, it’s time to learn about DevOps. In…

Technical Competition

8 min read

Take Your Development and Operations Team to the Next Level: An Introduction to DevOps
Take Your Development and Operations Team to the Next Level: An Introduction to DevOps
Technical Competition

8 min read


Jul 2, 2021

Don’t click that link!!!!

Recently, A friend of mine had her Facebook account hacked using a technique known as phishing(We will talk more about phishing later). Who sent you that link? I asked her.? She responded, “I clicked it because a random page shared it.” My initial reaction was, “What The Fuck!?”, …

Phishing

5 min read

Don’t click that link!!!!
Don’t click that link!!!!
Phishing

5 min read


Jun 27, 2021

‘Joker’ is back: A malware that Google hates

He’s back, Joker! No, not the one who appears in the Batman series, but the malware which has become a nightmare for Google. Since the beginning of Google’s Play Store, Google has battled Hackers who develop and submit malicious apps to the play store. To ensure its users are protected…

Malware

5 min read

‘Joker’ is back: A malware that Google hates
‘Joker’ is back: A malware that Google hates
Malware

5 min read


Published in PenTester Nepal

·Apr 19, 2021

SSH For Dummies: What, Why, How?

Due to the evolution of cloud computing, it has become a necessity to access remote machines these days. Most of us access our cloud instances every day, whether for business or personal purposes. …

Ssh

4 min read

SSH For Dummies: What, Why, How?
SSH For Dummies: What, Why, How?
Ssh

4 min read


Sep 27, 2020

C — Storage Classes

Image for Attention!!! When we create a variables, two things are always attached with variable their data type and storage class. Storage class decides the lifetime and scope or visibility of the variable in the program. When we define a variable, it gets some physical area in memory where it’s…

C Programming

2 min read

C — Storage Classes
C — Storage Classes
C Programming

2 min read


Sep 2, 2020

What the Heck is Pointer in C?

While learning C/C++, you may have run over the term ‘Pointers’, and frequently heard that it is an idea difficult to comprehend. Pointers are very useful and powerful concept of C/C++ and, it isn’t that hard to comprehend. …

C

6 min read

What the Heck is Pointer in C?
What the Heck is Pointer in C?
C

6 min read


Aug 28, 2020

Dynamic Memory Allocation in C

I assume that you have basic knowledge about pointers and computer memory. According to Wikipedia, Memory management is a form of resources management applied to computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free…

C

4 min read

Dynamic Memory Allocation in C
Dynamic Memory Allocation in C
C

4 min read

crysp

crysp

46 Followers

Hola! They call me Hacker

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech