Archive for October 2014

What is keylogger? And how to be safe from Keylogger

WHAT IS KEYLOGGER? AND HOW TO BE SAFE FROM KEYLOGGERS I am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device.
Friday, October 24, 2014
Posted by Unknown

How to Recover Deleted Files on Pc

How to Recover Deleted Files on Pc When you delete any file in windows it goes to recycle bin where you can easily restores it as it has restore option. But which method or hacks is used to recover your files when you delete it permanently (In windows.
Thursday, October 16, 2014
Posted by Unknown

About 5 million Gmail IDs and passwords leaked

About 5 million Gmail IDs and passwords leaked Is Google got hacked? No, the leak was not the result of a security breach of Google systems.  The dump is said to have been obtained from other websites. So, if you have used the same.
Saturday, October 11, 2014
Posted by Unknown
Tag :

Security Encryption Systems

Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes. The.
Wednesday, October 1, 2014
Posted by Unknown

Total Pageviews

- Copyright © 2025 REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -