All for Joomla All for Webmasters
Home Tags TECH

Tag: TECH

tech

Google Bangladesh hacked by Pakistani hackers

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users...

U.S. Govt. Hackers Ready to Hit Back If Russia Tries to...

According to NBCnews, U.S. military hackers have penetrated Russia's electric grid, telecommunications networks and the Kremlin's command systems, making them vulnerable to attack by...

Massive DDOS attack against Dyn DNS knocked out Popular Websites

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host...

Czech police arrest Russian hacker tied to 2012 LinkedIn hack

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company...

What is HTTP request/response header?

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider's...

Russia no longer denies hacking DNC

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks...

Server-Side Includes (SSI) Injection

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later...

Earn $1.5 million for hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a...

What is DNS Spoofing? How to redirect traffic to fake website?

DNS Spoofing is also known as DNS cache poisoning. It is malicious technique used by attackers to divert legitimate traffic to attacker's fake website...

What is Man-in-the-middle attack (MITM)

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker...
increase blog traffic

36 Ways to Increase Blog Traffic Without Investing on Ads

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You...

Google Introduces Voice Guided Turn by Turn Navigation for Pakistan

(function(d, s, id) { var js, fjs = d.getElementsByTagName(s); if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src =...

Apple Tests Ultra-Fast LiFi Technology For iPhone 7

(function(d, s, id) { var js, fjs = d.getElementsByTagName(s); if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src =...

New Computers can use only Windows 10

(function(d, s, id) { var js, fjs = d.getElementsByTagName(s); if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src =...