Cyber Hub

...

Hack Android Phone Remotely !!!

No Comments

Welcome back my dear Hackers.Lets learn to hack an android phone by using Kali Linux/Backtrack. Before we start, lets get familiar with ...

Read More
...

Bypassing Network Proxy For Free Internet Access

No Comments

Most of you reading this blog may be students, official employe's, Workers, Teachers.So this article will be very beneficial for you all. ...

Read More
...

3-Way Handshake inTCP/IP

No Comments

The first question arises in our mind is that what is tcp? So, TCP is a sort for TRANSMISSION CONTROL PROTOCOL. It ...

Read More
...

Semicode OS

No Comments

For Programmers and Developers Today, I am going to disclose something which many of our updated programmers may be knowing but I ...

Read More
...

Dynamic Link Library (DLL)

No Comments

We all use windows operating system, but if you notice carefully then either you open my computer, play a song, open control ...

Read More
...

Cracking Windows Password

No Comments

(only for knowledge purpose ) NOTE:This trick works for windows OS 7 and 8 . So, first of all, you need some ...

Read More
...

Malwares and its Type

No Comments

What is a malware? A kind of software , which is specially designed steal, disrupt ,gain unauthorized access or to damage victim ...

Read More
...

Packets & Proxies

No Comments

Packets are generally a unit of data that are routed between a source and a destination.There are millions of users who surf ...

Read More
...

Distro’s in Computer Attacks

No Comments

We all want to learn something advance but what if you don't know even the basic terms.Before proceeding to any topic , ...

Read More
...

MITM(Man In The Middle )Attack

No Comments

Guys , I am back with another threat to the internet where an attacker spoofs the channel used by an innocent user ...

Read More