How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

Apart from Official WordPress repository there are hundreds and thousands of websites which provides free WordPress themes and Plugins but the problem is you can not trust them always. Yes, Most of them add a malicious code to themes and plugins which Continue reading How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think? EDUCATIONAL PROFILE: Almost all hackers finished college or reached that level by self-education. Self-educated hacker is  more respected in hackers community because you really need to have passion to become professional hacker. The Continue reading How do Hackers Look Like and What They Think?

Microsoft will Inform You If Government is Spying on You

Following in the footsteps of Twitter, Facebook and Google, Microsoft promises to notify users of its e-mail (Outlook) and cloud storage (OneDrive) services if government hackers may have targeted their accounts. The company already notifies users if an unauthorized person Continue reading Microsoft will Inform You If Government is Spying on You

Twitch ’s latest insane adventure: Installing Linux

Twitch’s latest insane adventure: Installing Linux Twitch playing Pokémon was easy mode. Tomorrow, Twitch viewers will be invited to do something altogether more challenging: install Arch Linux. Using the same Twitch chat-driven concept as the collaborative Pokémon playthrough, anyone will Continue reading Twitch ’s latest insane adventure: Installing Linux

Password secrets: Your Passwords Aren’t As Secure As You Think

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all Continue reading Password secrets: Your Passwords Aren’t As Secure As You Think

Remotely Exploitable ‘Bash Shell’ Vulnerability Affects Linux, Unix and Apple Mac OS X

A Critical remotely exploitable vulnerability has been discovered in the widely used Linux and Unix command-line shell, known as Bash, aka the GNU Bourne Again Shell, leaving countless websites, servers, PCs, OS X Macs, various home routers, and many more Continue reading Remotely Exploitable ‘Bash Shell’ Vulnerability Affects Linux, Unix and Apple Mac OS X