Home / Tutorials / Security

Security

What to do before selling iPhone, very important !

Introduction : Before you sell your iPhone, which you may have used for many years, there are some important steps you must take before selling in order to protect yourself and your data stored on your phone, as well as protect the buyer who will use the phone after you. …

Read More »

How to hide your files inside an image!

Intro: This method may be known lot of you but still many people do not know it. You can hide your important files in a picture so that anyone else can’t access your files and think that it is a normal picture. Steps: Step 1: Open cmd (command prompt) and navigate to …

Read More »

Simple Trick in windows to hide secret data inside a text file !!

Usually, computer users may have important files stored on the hard drive, such as files containing sensitive information or personal files, etc. In this case, you will need to hide them so that someone else does not see them. Windows includes many different ways to hide important files without programs.  …

Read More »

Hide your folders and protect your files with a password without any applications.

Every computer user needs to hide some folders in order to protect them from tampering, especially if these files are important in your work ,so you are looking for ways to hide those folders so no one can see them, but have you ever thought that you can  hide your important …

Read More »

What is Juice Jacking? And how can anyone hack my phone through the charger only!

Introduction: Is your phone hacked? How do you know it is not hacked and hackers are not stealing your photos? Do you think if you have not downloaded any applications from outside the Play Store or you have not downloaded any files from the Internet so you are safe !? Well let me …

Read More »

How passwords are cracked by hackers?

In this topic, I will show you several methods used by most hackers to hack passwords. I would like to show you these Methods to benefit and detect these methods and also provide tips to avoid falling into this trap and reveal your password … Let’s start : Brute Force …

Read More »

The most important threats on the Internet, and how to protect yourself from them ?

Introduction: Threats are everywhere on the Internet. If your device is not protected against these threats, then your information and your accounts are at a high risk. In this article, we will explain the most popular threats and how to protect yourself from them.   Malware: Malware stands for “Malicious …

Read More »

What is the difference between Vulnerability and Exploit in Hacking and Security ?

In security, there are many terms used such as  Exploit, Vulnerability, PWN, SSH, XSS, Inject … Today I want to explain the concept of Exploit and Vulnerability. Many people think they are the same, let us explain each of them and how they differ in this article.   What is …

Read More »