RAM Analysis


Random-access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). “Random” refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether it is related to the previous Read more »



Investigating Corrupted PDF


Hello Friends,

Today, I will show you how can you investigate a corrupted PDF. For this purpose I have created a sample PDF. Before reading this article,I will suggest you to read this another article PDF Overview for better understanding of PDF structure. Read more »



PDF Overview


Portable Document Format(PDF) is a file format for representing documents in a manner independent of the application software, hardware, and operating system used to create them and of the output device on which they are to be displayed or printed.

Read more »



Detecting Gmail Account Hack


Hello Friends,

Today I will share about the technique which you can use to catch the hacker.

If you are suspicious about some one accessing your Gmail account then you can follow these steps to verify it: Read more »



Defenses Against Viruses


Defense against Virus

Today, I will tell you about some simple steps which you can follow to prevent infection of virus on your computer.

1. Never open a removable drive by double clicking on the drive letter in windows Explorer.

Read more »



Law governing IT in India


Cyber Law

Dear Pals,

Now that we have gone through many facets of hacking let us figure something out about the law governing Information Technology (IT) in India.

The cyber world is governed by the Information Technology Act, 2000 in India. Read more »



How to remap exe to another exe file??? (Image Hijack)


Imagae Hijack

Do you ever wonder how can you map one exe file to another exe  file ??  For example, if you try to open calc.exe then it will open cmd.exe automatically.
You can easily do it by executing a simple batch program and  can read the inline comments in the code to understand the code.
Read more »