PinnedPublished inPenTester NepalDealing With A Hacked Brain!Let’s talk about this shit.May 7, 2021A response icon2May 7, 2021A response icon2
PinnedTOR: Privacy, Anonymity & SecurityTor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant…Apr 17, 2021Apr 17, 2021
Published inThe ZeroneTake Your Development and Operations Team to the Next Level: An Introduction to DevOpsAre you tired of slow, error-prone software releases? Are you ready to take your development and operations team to the next level of…Jan 5, 2023A response icon2Jan 5, 2023A response icon2
Don’t click that link!!!!Recently, A friend of mine had her Facebook account hacked using a technique known as phishing(We will talk more about phishing later). Who…Jul 2, 2021Jul 2, 2021
‘Joker’ is back: A malware that Google hatesHe’s back, Joker! No, not the one who appears in the Batman series, but the malware which has become a nightmare for Google.Jun 27, 2021A response icon1Jun 27, 2021A response icon1
Published inPenTester NepalSSH For Dummies: What, Why, How?Due to the evolution of cloud computing, it has become a necessity to access remote machines these days. Most of us access our cloud…Apr 19, 2021A response icon1Apr 19, 2021A response icon1
What the Heck is Pointer in C?While learning C/C++, you may have run over the term ‘Pointers’, and frequently heard that it is an idea difficult to comprehend. Pointers…Sep 2, 2020A response icon1Sep 2, 2020A response icon1
Dynamic Memory Allocation in CLearn about DMA with malloc, alloc and realloc.Aug 28, 2020A response icon1Aug 28, 2020A response icon1