Tech News Tech News Trojan Attacks |Japan, France, New Zealand Warn of Sudden Uptick in Emotet Nahid HasanTechnology September 08, 2020 Cybersecurity offices across Asia and Europe have given different security cautions with respect to the resurgence of email-based Emotet ma... Read more »
Tech News Tech News Linux GUI app Support on Windows | Windows 10 Update May 2020 Nahid HasanTechnology May 30, 2020 Available this month Support for Windows Subsystem for Linux 2 (WSL 2) distros is coming this month in the Windows 10 May 2020 Update. 4 y... Read more »
Tech News Tech News TikTok Rating Drops to 1.3 on Google Play Store | Tiktok vs Youtube Nahid HasanTechnology May 20, 2020 TikTok Rating Drops to 1.3 on Google Play Store TikTok is in trouble in India again. The short video-sharing app which has over a 1.5 billio... Read more »
windows Ethical_Hacking Kali Linux windows Host Your Website on Local Network(LAN)|Port Forwarding Nahid HasanTechnology February 16, 2020 Host Your Website on Local Network(LAN)|Port Forwarding [BANGLA] How to host a website all over the Wifi Network using port forwarding ... Read more »
Tech News Tech News HAPPY BIRTHDAY FACEBOOK | Facebook Birthday | NAHID HASAN TECHNOLOGY Nahid HasanTechnology February 04, 2020 NAHID HASAN TECHNOLOGY Facebook is today a billion-dollar organization. The man behind the web monster, 35-year-old Mark Zucker... Read more »
Bug Hunting Bug Hunting DOM Based Cross-Site Scripting Explained & Practical | DOM Based XSS? Nahid HasanTechnology February 01, 2020 Definition DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a ... Read more »
Tools Ethical_Hacking Tools How to Find Domains for Phishing Attacks with Dnstwist | Phishing Attack Nahid HasanTechnology January 25, 2020 dnstwist See what sort of trouble users can get in trying to type your domain name. Find similar-looking domains that adversaries can u... Read more »
Ethical_Hacking Ethical_Hacking Cryptography Explained | Introduction to Cryptography | Cryptography for Beginners Nahid HasanTechnology January 23, 2020 Definition: Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It i... Read more »
Ethical_Hacking Ethical_Hacking Mobile Phone Hacked | Juice Jacking | Beware of juice jacking | NAHID HASAN TECHNOLOGY Nahid HasanTechnology January 20, 2020 Beware of juice jacking – A new way to steal your data! NAHID HASAN TECHNOLOGY These attacks often occur at public charging station... Read more »
Vulnerabilities Vulnerabilities Bruteforce password recovery code| Bug Bounty Poc | Bumble.com rewarded $1,000 bounty. Nahid HasanTechnology January 20, 2020 Bug Hunter Id: https://hackerone.com/uyga Summary It's possible to brute force recovery code from SMS as iOS application doesn&... Read more »