Security Medium: Hole in paywall I started reading medium after a quite long break and the first thing I noticed is that almost all the stories in my feed are behind the $5/month paywall. It is not
Research My phone, My rules You own the hardware but do you feel like having control over it. Isn't it like Apps leading the way and you following them. Each app there does 10 things in background to
How It Works The Third Pin Sometimes, I experience a tingling sensation on touching my MacBook while it's charging. Recently, this became frequent and, got my attention. On touching my laptop, mild current finds its way through me to
Research Things I do for a phone call Texting isn't as comfortable as voice calls. At least for me. After switching to Vodafone, (which I regret doing) nowhere near my room, I can talk calls. I rely on Calls, and SMS
Research Things I do for Internet Let it be ordering food or the daily ranting on Twitter, hands seek mobile phones over other devices. Living in a place where your phone laughs at you with an E on the
Security Introduction to SQL Injection SQL Injection is one of the those common application layer security vulnerabilities. Every course or hacking tutorials out there, starts with SQL injection. Prerequisites SQL PHP (since this post is written based on
Tech Supplements How to hack segmentation fault? These days got me into solving competitive coding problems for placement preparations. Starting off this regular practice is such a tiresome process. I end up getting frustated most of the time with silly
Tech Supplements Data Privacy in 2018 Some Apps and social media platforms have updated their Privacy policy recently and you may have come across something like That's because of GDPR, which expands to General Data Protection Regulation. It aims
Tutorials How to hack windows Yeah, you read it right. Following this, you’ll be able to hack into a real Windows machine. Lost your password? or ever wanted to play with your friend. Usual Disclaimer : For Educational
Research sudo rm -rf / - Killing with Kindness By this time, those who have already been introduced to unix/linux command line would have guessed what this post is about. Well, if you aren’t aware of this, Unix allows you
How It Works Why Blockchain? In recent times, this Blockchain technology elevated quickly. I hear people talking about Bitcoins and such cryptocurrencies when concerned about blockchain. But are they the same thing? What’s the need for blockchain
Tutorials How to hack HTTP? You may have seen all the HTTP sites migrating to HTTPS. Why and What’s wrong with HTTP? Well, you’ll understand once you know how simple it is to hack the plain
Research How I spent hours on a Text Message It was a creepy movie and I was waiting for the interval. My phone made a noise and when I unlocked it, all I found was this text message. I had no idea
Tech Supplements All about WannaCry - The spotlight Ransomware It was just another day until I saw that meme about WannaCry while scrolling the Feed. The Malware was popular enough for sharing a meme, but I was unaware of it. Immediately searched
How It Works How Encryption Works WhatsApp introduced End to End Encryption, and online payment has grown to a massive extent. Data are encrypted to protect your credit cards and personal texts. So I thought of writing how my