The Tech Cache
  • Home
  • Authors
  • Tech Supplements
  • Deep Learning
  • Weekly Caches
  • Gaming
  • Security
  • Tutorials
  • How it Works
Ramkumar B

Ramkumar B

Experimenting with technology.

Bangalore •
15 posts •
Medium: Hole in paywall
Security

Medium: Hole in paywall

I started reading medium after a quite long break and the first thing I noticed is that almost all the stories in my feed are behind the $5/month paywall. It is not

  • Ramkumar B
    Ramkumar B
2 min read
My phone, My rules
Research

My phone, My rules

You own the hardware but do you feel like having control over it. Isn't it like Apps leading the way and you following them. Each app there does 10 things in background to

  • Ramkumar B
    Ramkumar B
3 min read
The Third Pin
How It Works

The Third Pin

Sometimes, I experience a tingling sensation on touching my MacBook while it's charging. Recently, this became frequent and, got my attention. On touching my laptop, mild current finds its way through me to

  • Ramkumar B
    Ramkumar B
3 min read
Things I do for a phone call
Research

Things I do for a phone call

Texting isn't as comfortable as voice calls. At least for me. After switching to Vodafone, (which I regret doing) nowhere near my room, I can talk calls. I rely on Calls, and SMS

  • Ramkumar B
    Ramkumar B
3 min read
Things I do for Internet
Research

Things I do for Internet

Let it be ordering food or the daily ranting on Twitter, hands seek mobile phones over other devices. Living in a place where your phone laughs at you with an E on the

  • Ramkumar B
    Ramkumar B
4 min read
Introduction to SQL Injection
Security

Introduction to SQL Injection

SQL Injection is one of the those common application layer security vulnerabilities. Every course or hacking tutorials out there, starts with SQL injection. Prerequisites SQL PHP (since this post is written based on

  • Ramkumar B
    Ramkumar B
2 min read
How to hack segmentation fault?
Tech Supplements

How to hack segmentation fault?

These days got me into solving competitive coding problems for placement preparations. Starting off this regular practice is such a tiresome process. I end up getting frustated most of the time with silly

  • Ramkumar B
    Ramkumar B
5 min read
Data Privacy in 2018
Tech Supplements

Data Privacy in 2018

Some Apps and social media platforms have updated their Privacy policy recently and you may have come across something like That's because of GDPR, which expands to General Data Protection Regulation. It aims

  • Ramkumar B
    Ramkumar B
4 min read
How to hack windows
Tutorials

How to hack windows

Yeah, you read it right. Following this, you’ll be able to hack into a real Windows machine. Lost your password? or ever wanted to play with your friend. Usual Disclaimer : For Educational

  • Ramkumar B
    Ramkumar B
2 min read
sudo rm -rf / - Killing with Kindness
Research

sudo rm -rf / - Killing with Kindness

By this time, those who have already been introduced to unix/linux command line would have guessed what this post is about. Well, if you aren’t aware of this, Unix allows you

  • Ramkumar B
    Ramkumar B
3 min read
Why Blockchain?
How It Works

Why Blockchain?

In recent times, this Blockchain technology elevated quickly. I hear people talking about Bitcoins and such cryptocurrencies when concerned about blockchain. But are they the same thing? What’s the need for blockchain

  • Ramkumar B
    Ramkumar B
4 min read
How to hack HTTP?
Tutorials

How to hack HTTP?

You may have seen all the HTTP sites migrating to HTTPS. Why and What’s wrong with HTTP? Well, you’ll understand once you know how simple it is to hack the plain

  • Ramkumar B
    Ramkumar B
4 min read
How I spent hours on a Text Message
Research

How I spent hours on a Text Message

It was a creepy movie and I was waiting for the interval. My phone made a noise and when I unlocked it, all I found was this text message. I had no idea

  • Ramkumar B
    Ramkumar B
3 min read
All about WannaCry - The spotlight Ransomware
Tech Supplements

All about WannaCry - The spotlight Ransomware

It was just another day until I saw that meme about WannaCry while scrolling the Feed. The Malware was popular enough for sharing a meme, but I was unaware of it. Immediately searched

  • Ramkumar B
    Ramkumar B
3 min read
How Encryption Works
How It Works

How Encryption Works

WhatsApp introduced End to End Encryption, and online payment has grown to a massive extent. Data are encrypted to protect your credit cards and personal texts. So I thought of writing how my

  • Ramkumar B
    Ramkumar B
3 min read
The Tech Cache © 2022
Latest Posts Facebook Twitter Ghost