In window 7, 8 is by default same for each drive and looks monotonous. Now we are here to share a trick by which
Posts
What is phishing? Phishing is the act of attempting to acquire information such as usernames and passwords. phishing directs users to enter details at a fake
Email Travelling Path :Let’s we have two Email providers, one is hotmail.com and other is gmail.com , XYZ is a registered user in gmail.com
What is Cloud Computing ? In one Cloud computing refers to the provision of computational resources on demand via a computer network. In simple
In below tutorial I'M going to share how to attackers Spreading batch viruses through pen drive. Step 1 : Open notepad and write open=anything.batIcon=anything.ico
Hi Friends, today I'm going to share two Batch Files which create a lot of fun. I also get suffered by these viruses , let's learn
Hello friends ! Now a day android phone most commonly used gadget in all over the world. Also it is most popular mobile OS
Every time the victim would start the computer, the batch file in start up would run and affect the computer immediately. Let's learn it's