Saturday , September 23 2017
Home / How-to (page 3)

How-to

Tor Releases Anonymous Instant Messenger. Here’s How to Use It

The Tor Project has officially launched the first beta version of Tor Messenger, an open source and Encrypted instant messaging client that works on top of the Tor network. Tor Messenger is designed by keeping both simplicity and privacy in mind. The team claimed that their app encrypts the content …

Read More »

How To Protect External Hard Disk Drives With Password

Security is always a first priority for ever user and when its about some personal data then it become more important. And talking about external hard drive disk where you stores lots of personal data that you might not store in your computer. And anyone else can have access to …

Read More »

Cracking WiFi Passwords By Hacking into Smart Kettles

Hackers have come after your phone, your computer, and your car. Now hackers are coming after your home refrigerators, Smart TVs, and eventually KETTLES. Yes, your kettle turns out good for more than just heating up water or making coffee for you– they are potentially a good way for hackers …

Read More »

Untethered Jailbreak for iOS 9.0, 9.0.1 and 9.0.2 Released

The Chinese Pangu jailbreak team has once again surprised everyone by releasing the first untethered jailbreak tool for iOS 9 – iOS 9.0, iOS 9.0.1, and iOS 9.0.2. The untethered jailbreak is a jailbreak where your device don’t require any reboot every time it connects to an external device capable …

Read More »

Google OnHub Router actually Runs on Chrome OS; Here’s How to Root it

Are you intrigued with the idea of disassembling things and making them work your ways? Then you’ll find this coverage to be one of its kind! Google OnHub Router runs ChromiumOS (Chrome OS), the same Linux-based operating system that powers Google Chromebook laptops and desktops. Yeah, It’s True. A Group …

Read More »

Kemoge: Latest Android Malware that Can Root Your Smartphone

Now, the latest is the ‘Kemoge Malware’ that has made its debut as an Adware on the Android mobile phones, allowing third-party app stores to fetch your device’s information and take full control of it. Security researchers from FireEye Labs have discovered that Kemoge malicious adware family is spreading in …

Read More »

How to Install Android 6.0 Marshmallow and When will Your Smartphone Get it?

Google is eager to release the latest version of its mobile operating system, Android 6.0 Marshmallow, to some of its Smartphone and Tablet lineup. The latest Android 6.0 Marshmallow update brings a whole host of new features, including Doze mode, App permissions, Google Now on Tap, “Do not disturb” setting, and easier volume controls, …

Read More »

How to Freeze Credit Report To Protect Yourself Against Identity Theft

If your Social Security number gets hacked in any data breaches, including recently hacked T-Mobile, then there’s a way to prevent hackers from misusing your identity (i.e. identity theft). The solution here is that you can institute a security freeze at each of the three credit bureaus, Equifax, Experian, or TransUnion. Once frozen, nobody will be allowed to access …

Read More »

Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit

The widely publicized LockScreen bug allowed anyone with physical access to your iOS device running iOS 9.0 or iOS 9.0.1 to access all the contacts and photos without unlocking the device. Just one week after the last update iOS 9.0.1, Apple rolled out iOS 9.0.2 update that fixes: iMessage activation problems An issue with mobile data …

Read More »

Getting Started With Linux : Part l (Choosing a Distribution)

    There are hundreds of Linux distributions to choose from. Each of them has their merits. Some of them have their separate package managers, desktop managers, repositories; some of them are derived from others, so they share some behaviorism. It is not possible to compare each other as each …

Read More »