Welcome
Login / Register

website


  • Can You Really See Who Viewed Your Facebook Profile?

    Get Ready For Disappointment: Despite this being one of the oldest and most common Facebook myths, many users still have hope. But the shortest answer to all these questions is a resounding “NO”According to Facebook, you simply can’t have that information

    No, It’s Not Worth A Try: Still, there are many apps out there that claim to provide all sorts of information about your profile. And judging from the amount of Likes many of these apps have, many users are thinking “what’s the worst that can happen?”. Is that the right way to think?

    Now that you know that there’s no way for any of these apps to provide the information they promise, it’s time to understand what they actually can provide. These are divided into two main groups:

    1. Apps that are entirely a hoax, provide nothing at all, and at times even infect you with malware that spreads to your friends.
    2. Apps that provide information only about users who also install the same app and perform some kind of action.
    Read more »
  • COMPUTER SCIENCE and Information technology PROJECT TOPICS

    COMPUTER SCIENCE PROJECT TOPICS 

    1. Design and Implementation of a digital library system

    2. DESIGN AND IMPLEMENTATION OF COMPUTERIZED OF STAFF RECORD DEPARTMENT

    3. DESIGN AND IMPLEMENTATION OF E-LEARNING PLATFORM

    4. DESIGN AND IMPLEMENTATION OF SECURE ONLINE FORUM FOR STAFF AND STUDENT 

    5. DESIGN AND IMPLEMENTATION OF COMPUTERIZED TOURISM INFORMATION SYSTEM

    6. Design and Implementation of computer based lottery processing system

    7. DESIGN AND IMPLEMENTATION OF COMPUTERIZED MEDICAL DUTIES SCHEDULING SYSTEM.

    8. DESIGN AND IMPLEMENTATION OF A SOFTWARE BASED QUALITY CONTROL SYSTEM

    9. DESIGN AND IMPLEMENTATION OF AN ONLINE STUDENT ADMISSION SYSTEM. 

    10.  DESIGN AND IMPLEMENTATION OF A COMPUTERISED STADIUM MANAGEMENT INFORMATION SYSTEM.

    11. DESIGN AND IMPLEMENTATION OF AN ONLINE BOOKSHOP

    12. DESIGN AND IMPLEMENTATION OF A COMPUTER BASED WAREHOUSING INFORMATION SYSTEM

    13. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DOCUMENTATION SYSTEM OF COURT PROCEEDINGS 

    14.  DESIGN AND IMPLEMENTATION OF A COMPUTER BASED HUMAN RESOURCE INFORMATION SYSTEM. 

    15. Design and implementation of HR and payroll system

    • Get your project topics and materials here, we also design software/programs for computer science students

     

    Read more »
  • Secure Social Media Accounts from Hackers

    #1. Update Passwords Regularly.

    Updation of social media passwords helps you to secure your social media accounts from being hacked.

    change your social networking sites accounts regularly i preferred you to change your social media’s accounts passwords in 1 month. and choose your password smartly, make sure you use all alphabets,numbers and special characters in your passwords, by using all these your password is much stronger and not easy to break by hackers.

    #2. Link your account with Verified Mobile No.

    linking your social media accounts with mobile no. helps you alot, if you really wana to protect your account then dont forget to link your account with mobile no. It helps you when someone tried to login in your social media accounts without permission, as someone tried to do jailbreaking your social media service sent you message about your login access.

    #3. Add Trusted Contacts.

    Add trusted contacts helps you to recover your hacked account, as some hack your facebook or gmail accounts then by help of your trusted contacts you are able to recover back, i recommended you to apply trusted contacts on facebook, because as you know everyone finds working facebook hacking tricks like a hunger dog. so be safe

    #4. Use HTTPs Connection.

     HTTPs Connection helps you to build a secure connection over internet, make sure check your URL before you use HTTPs, by using this feature a rare chance, that a hacker hack your social media account.

      #5. Never Save Passwords.

    Yes, this is quite interesting in social media hacking. generally, many of you going to use your social media accounts in cyber cafes or your friends laptop. but you forgot when you enter your email & password while login on your accounts then mostly every browser give a warning or ask you to Do You Want To Save Password or Not.

    by default browser have a option of Not Saved,but unluckily if you ignore that warning and you save your password in cyber cafe or friends laptop then defiantly, if i was in the position of your friend then i am able to hack that social media account, the question arises why i am doing this? because you people are fool.so i again told you Never ever saved your social media or other accounts password in any annoying PC/laptop

     

    Read more »
  • Top 10 Common Hacking Techniques You Should Know About

    Unethical hacking can be called an illegal activity to get unauthorized information by modifying a system’s features and exploiting its loopholes. it is also important to know some of the hacking techniques that are commonly used to get your personal information in an unauthorized way.

    10. Keylogger

    Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.

    9. Denial of Service (DoSDDoS)

    A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down. For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.

    8. Waterhole attacks

    If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

    For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.

    7. Fake WAP:Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case

    6. Eavesdropping (Passive Attacks)

    Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.The motive behind eavesdropping is not to harm the system but to get some information without being identified.

    5. Phishing

    Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.

    4. Virus, Trojan etc.

    Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

    3. ClickJacking Attacks

    ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.

    2. Cookie theft: The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

    1. Bait and switch :Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.

    Read more »
  • Ways to Download Complete Websites For Offline Access

    Sometimes you need to have access to a website’s data while offline. Download Partial or Complete Website for Offline Access

    1.HTTrack: HTTrack is an extremely popular program for downloading websites.The wizard is easy to use and will follow you through settings that define where the website should be saved and some specifics like what files should be avoided in the download.

    Download HTTrack

    2.Getleft: Getleft has a new, modern feel to its interface. Upon launch, press “Ctrl + U” to quickly get started by entering a URL and save directory. Before the download begins, you’ll be asked which files should be downloaded.

    We are using Google as our example, so these pages should look familiar. Every page that’s included in the download will be extracted, which means every file from those particular pages will be downloaded.

    Download Getleft

    Read more »
RSS