Home / Tutorials / Security

Security

How to hide your files inside an image!

Intro: This method may be known lot of you but still many people do not know it. You can hide your important files in a picture so that anyone else can’t access your files and think that it is a normal picture. Steps: Step 1: Open cmd (command prompt) and navigate to …

Read More »

Simple Trick in windows to hide secret data inside a text file !!

Usually, computer users may have important files stored on the hard drive, such as files containing sensitive information or personal files, etc. In this case, you will need to hide them so that someone else does not see them. Windows includes many different ways to hide important files without programs.  …

Read More »

Hide your folders and protect your files with a password without any applications.

Every computer user needs to hide some folders in order to protect them from tampering, especially if these files are important in your work ,so you are looking for ways to hide those folders so no one can see them, but have you ever thought that you can  hide your important …

Read More »

What is Juice Jacking? And how can anyone hack my phone through the charger only!

Introduction: Is your phone hacked? How do you know it is not hacked and hackers are not stealing your photos? Do you think if you have not downloaded any applications from outside the Play Store or you have not downloaded any files from the Internet so you are safe !? Well let me …

Read More »

How passwords are cracked by hackers?

In this topic, I will show you several methods used by most hackers to hack passwords. I would like to show you these Methods to benefit and detect these methods and also provide tips to avoid falling into this trap and reveal your password … Let’s start : Brute Force …

Read More »

The most important threats on the Internet, and how to protect yourself from them ?

Introduction: Threats are everywhere on the Internet. If your device is not protected against these threats, then your information and your accounts are at a high risk. In this article, we will explain the most popular threats and how to protect yourself from them.   Malware: Malware stands for “Malicious …

Read More »

What is the difference between Vulnerability and Exploit in Hacking and Security ?

In security, there are many terms used such as  Exploit, Vulnerability, PWN, SSH, XSS, Inject … Today I want to explain the concept of Exploit and Vulnerability. Many people think they are the same, let us explain each of them and how they differ in this article.   What is …

Read More »

What is the ARP spoofing attack ?

Today we will talk about one type of the network-level attacks in the OSI layer 2, the ARP Spoofing attack, one of the most common and dangerous attacks on the network that leads to the Man In The Middle attack. What you have to know before: Before any two connected …

Read More »

Is your router protected against hacking? Let’s find out

If you have a router in your home that distributes the Internet to the whole house, you may have to think that your neighbor also benefits from the Internet for free without paying !, not just that, in this moment he may be downloading large files and if you have …

Read More »