MkumarcyberinVIEH GroupXENOBOTS: The New AgeWhat Actually are XENOBOTS Xenobots are the name given to tiny robots. The name Xenorobot is given after the species of Aquatic frog…Jul 11, 2021Jul 11, 2021
MkumarcyberinVIEH GroupWhat is session hijacking?Stolen cookies are key elements of common and dangerous session hijacking attacks that can leave your most sensitive data exposed to…Jun 19, 2021Jun 19, 2021
MkumarcyberinVIEH GroupHow to prevent Facebook cloningImagine having an evil twin somewhere out in the wild causing chaos in your name. On Facebook, that fear can become reality. Facebook…Jun 19, 2021Jun 19, 2021
MkumarcyberinVIEH GroupTop 5 Most Destructive Computer Viruses of All TimeMost of us, at one time or another, have had to deal with a computer virus. Usually it means running your antivirus program and sometimes…Jun 19, 2021Jun 19, 2021
MkumarcyberinVIEH GroupA Heart Device Is Found Vulnerable to Hacker AttacksTo the long list of objects vulnerable to attack by computer hackers, add the human heart.Mar 15, 2021Mar 15, 2021
MkumarcyberinVIEH GroupDO OPPO/REALME PHONE SPY ON YOU ?All phones and electronics spy on you, nobody never really reads the fine print when they setup the phone and sign up with the service…Jun 6, 2020Jun 6, 2020
MkumarcyberinVIEH GroupHacking/OSCP cheatsheetWell, I was researching about OSCP and OSCE i got a lots of command or a kind of cheatsheet which may help few of our community members…Apr 23, 2020Apr 23, 2020
MkumarcyberinVIEH GroupOSI model easily explainedOpen System Interconnection model (mostly known as OSI model) SO it’s a seven-layer model used to visualize computer networks. The OSI…Feb 17, 2020Feb 17, 2020
MkumarcyberinVIEH GroupHow to prepare for OSCP complete guideBelow are 5 skills which you have to improve before registering for OSCP > Learn basic of Computer Network, Web application, and Linux >…Feb 1, 2020Feb 1, 2020