Inject Payload in any file

Inject Payload in any file In this article, I will show you how to inject a payloads of .exe into other files. Hope it will bring you a useful knowledge. Hello friends…If you want to learn something, you will have to work veryhard for it. Can not learn any work easily. Computer itself is very […]

Definition of ‘Trojan’

Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive […]

Hardware Keylogger – Windows & Mac

Hardware Keylogger Just like software keyloggers hardware keyloggers, capture keyboard keystrokes but requires physical access to victims computer to install it and of course, the computer needs to have a physical external keyboard. A hardware keylogger is a small hardware just like USB pen-drive with internal memory and WiFi access capability. All the captured keystrokes […]

How to Become a Professional Hacker — 10 Credible Tips for Beginners

How to Become a Professional Hacker – 10 Credible Tips for Beginners Anyone can write up an outlandish cyberpunk username and pose as a hacker. However, there is so much that goes into becoming a professional hacker. One must master many skills. It requires extensive knowledge of hacking techniques, creative thinking skills and a reputation […]

Types of Computer Viruses

Types of Computer Viruses What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect […]

hacking dangrous virus

Creating a dangerous virus using notepad

Here I give you instructions of making a highly dangerous virus using notepad!! This virus has very very dangerous properties :- 1.Copy itself into startup 2.Copy itself over one thousand times into random spots in your computer. 3.Hide its self and all other created files 4.Task kill MSN, Norton, Windows Explorer, Limewire. 5.Swap the left […]

What are Trojans backdoors??

What is trojans backdoors?? This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants […]