Sign in

Let’s talk about this shit.

The fact that hackers get paid for breaking security is truly amazing. It’s amazing how much they manage to earn just by pressing some keys on their mechanical keyboard. Wearing a black hoodie and a Guy Fawkes mask are iconic hacker styles. Hackers are introverts…

Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server.


We live in the era of information where anyone who has access to the Internet has all the information in the world at their fingertips…

Photo by James Wheeler on Unsplash

Recently, A friend of mine had her Facebook account hacked using a technique known as phishing(We will talk more about phishing later). Who sent you that link? I asked her.? She responded, “I clicked it because a random page shared it.” My initial reaction was, “What The Fuck!?”, …

Photo by Ryan Moulton on Unsplash

He’s back, Joker! No, not the one who appears in the Batman series, but the malware which has become a nightmare for Google.

Since the beginning of Google’s Play Store, Google has battled Hackers who develop and submit malicious apps to the play store. To ensure its users are protected…


Due to the evolution of cloud computing, it has become a necessity to access remote machines these days. Most of us access our cloud instances every day, whether for business or personal purposes. …

Annette Sousa

Image for Attention!!!

When we create a variables, two things are always attached with variable their data type and storage class. Storage class decides the lifetime and scope or visibility of the variable in the program.

When we define a variable, it gets some physical area in memory where it’s…

While learning C/C++, you may have run over the term ‘Pointers’, and frequently heard that it is an idea difficult to comprehend. Pointers are very useful and powerful concept of C/C++ and, it isn’t that hard to comprehend. …

I assume that you have basic knowledge about pointers and computer memory.

Photo by Liam Briese on Unsplash

According to Wikipedia,

Memory management is a form of resources management applied to computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free…


Hola! They call me Hacker

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store