Quantum Cryptography - Security for mobile phones

Android Hacking And Penetration Testing Course Launched With Special Discounts for 101Hacker Readers

We are happy to announce the launch of our  course "Android Hacking and Penetration Testingat JSinfosec.com .

About The Course

    

The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, you will learn various topics such as Android architecture,Android security model, Android Application Pen testing and Exploitation, Reversing Android applications,static and dynamic analysis of android malware etc. After finishing the course you will be able to carry out a Penetration Test on a Android device and its applications. To get more in depth details, Please download our course syllabus from the following link

Android Hacking And Penetration Testing Course Promo

Hi guys, we will be launching  our new course "Android Hacking and Pen-testing" at JSinfosec.com very soon hope you guys will like it


Android Hacking And Pen testing  Course Promo


Analyzing Beacon Frames Using Wire shark - Part 6 of Wireless Hacking Series



7 Computer Security Protocols that should be Mandatory


Computer security entails protecting of the computer and the computer software from data loss, destruction and authorized access. There are several computer protocols put in place to ensure that chances of above mentioned are reduced or totally eliminated, they include practices carried out or installation of certain software or programs on the computer to enable and improve security.

802.11 Wlan Packets - Part 5 of Wireless Hacking Series



Top 5 Must Read Articles Of 101hacker.com


Hi readers, Its been almost three and half years since i started this website , I first began this website as a small personal blog later realized that many where interested in my articles so i launched 101hacker.com . I have seen both the ups and downs in my blogging carrier. When feeling a bit low, the only thing that kept me going was the love and encouragement  of my blog  readers and followers . So at this moment i would like to specially thank all my blog readers and followers for their continuous support. To review what i did at 101hacker.com, i have compiled some of the best articles of 101hacker.com that every one should read

Wireless Sniffing - Part 4 of WiFi Hacking Series

WiFi Standards, Bands and Channels - Part 3.1 Of WiFi Hacking Series

Hi, all this is the part 3.1 of the WiFi Hacking Series .In this video we will have a look the Wireless standards then we will discuss about  Various wireless bands and channels

WiFi Basics - Modes Part 3 of WiFi Hacking Series


Hi, Viewers This is the part 3 of the WiFi hacking series . In this video we will first have a look at some of the commonly used abbreviations and terms, then we will have a look at the different Wireless Modes . Finally we will learn how we can switch between various modes

WiFi Hacking Series Part-2 Getting Started With Wireless Card


Crack Password Protected Zip Files Using Fcrackzip


WiFi Hacking Series Part-1 Introduction and Requirements


Hi readers, We are happy to announce the launch of our new video Tutorial series on Wireless Hacking .We will be posting videos on this topic regularly in our video channel 101hackervideos, So Please subscribe our channel and don't miss the updates

How To Create Dictionaries for password cracking using crunch

Hi, Readers from today onward's we will be posting some hack tips mostly small tutorials on how to use tools, scripts etc while pen-testing and hacking. Today i will be talking about a tool called crunch, which is used for creating dictionaries for password cracking (dictionary attack )

Bruteforcing HTTP Basic Authentication Using Hydra

How to Spot a Scam in Your Inbox or Online

The Internet, for the most part, is a fantastic resource that's full of useful information and entertainment. Never before have we had access to such a wealth of data and media and it's incredible to think that all of that sits in our pocket throughout the day.

The White Hat Alliance (WHA) - Who are They And What They do ?

While for a lot of us online privacy means worrying about our Facebook privacy settings, there are some for whom it means a whole lot more. Nowhere is this more so than in the hacking community, where anonymity can be absolutely paramount. Anonymity can easily mean the difference between success and failure, and, depending on your intentions, sometimes even keeps you out of prison. 

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain  4 easy ways by which you can stay anonymous online

Android App Basics - Part3 Android Hacking And Pentesting Video Series

Lab Setup For Android Pen-testing - Part 2


© 101hacker | Design by Mukund edited by John
Powered by Blogger