Fire In Termux

Step 1: To Turn your termux into a fireplace πŸ”₯πŸ”₯ you need to install a libcaca package in your termux app. Just use the below command to install it in your termux.πŸ˜‰ pkg install libcaca Step 2: Now You just have to type libcaca in your termux and your termux will show Fire πŸ”₯ ScreenContinue reading “Fire In Termux”

Quantum Cryptography

Quantum cryptography definition Quantum cryptography, also called quantum encryption, applies principles of quantum mechanics to encrypt messages in a way that it is never read by anyone outside of the intended recipient. … A quantum computer could quickly crack current public-key cryptography. Advantages of Quantum cryptography The advantage of quantum cryptography lies in the factContinue reading “Quantum Cryptography”


What Are Bots? ━━━━━━━━━━━━━Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over a computer.━━━━━━━━━━━━━ Good Bots Vs Bad Bots β”β”β”β”β”β”β”β”β”β”β”β”β”βœ…TheContinue reading “Bots???”

How to Clean Up Computer Which is Infected by Bots?

━━━━━━━━━━━━━If your computer is already infected by bots, protecting your data is the most important thing. Disconnect the computer from the network as soon as possible, which will halt the theft of sensitive information. It also prevents your computer from being used to attack other networks. The next step is moving all important/personal data toContinue reading “How to Clean Up Computer Which is Infected by Bots?”

ScareWare By Aviral Srivastava

What Is A Scareware? ━━━━━━━━━━━━━ Scareware is malicious software that tricks computer users into visiting malware-infested websites. Also known as deception software, rogue scanner software or fraudware, scareware may come in the form of pop-ups. ━━━━━━━━━━━━━ How Is A Scareware Used? ━━━━━━━━━━━━━  Typically through pop-up ads from rogue security providers that may sound legitimate butContinue reading “ScareWare By Aviral Srivastava”

Man-in-middel Attack??

What Is A Man-In-The-Browser Attack?  ━━━━━━━━━━━━━ With a man-in-the-browser attack (MITB), an attacker needs a way to inject malicious software, or malware, into the victim’s computer or mobile device. One of the ways this can be achieved is by phishing. Phishing is when a fraudster sends an email or text message to a user thatContinue reading “Man-in-middel Attack??”

Create your website with
Get started