Have a hacked phone? Follow our guide on how to get the hacker out of your phone and prevent future hacks. The phone is man’s best electronic companion. Calling, sending emails, buying tickets, taking pictures, managing our bank accounts, paying bills and so on. These are just a few of […]
How to create a superuser (root) on linux
The root or super user level is the most important and the one that allows you to manage the system. It gives you access to the protected elements of a UNIX system. Unlike Windows, Linux limits certain commands to the super user only. 1-Access to the root level To start, […]
How do I know if my PC is being spied on and what should I do?
The problem of computer espionage has increased over time, resulting in the exposure of the intimacy and even the private life of Internet users in exchange for large sums of money. So, to help you overcome these difficulties, we have listed below some signs of espionage and how to react […]
How to remove Taboola news from Android phone
Are you tired of seeing Taboola news and ads appearing everywhere in your web browser? Don’t worry, you are not alone! This article will provide you with the necessary steps to get rid of this annoying adware once and for all. Read on to learn how to remove Taboola news […]
Installing and configuring Pfsense (2/2)
In the previous article called Installing and configuring Pfsense (1/2), we presented the basic installation steps. The result of the Pfsense distribution was a console interface with a 16-action menu. The configuration ended with addressing the LAN interface of the firewall to access it via the web. In this article, […]
Installation and configuration of Pfsense (1/2)
A firewall is a security system (hardware or software) that will define and control the flow of data. It will analyse what is allowed to enter and leave your network. Your modem provided by your internet service provider is a hardware firewall for example. It has few functions, but it […]
Kali NetHunter mobile application, how does it work?
The Kali NetHunter mobile platform was designed for Android users and provides free and open-source Android mobile penetration testing. It is based on the Kali distribution of Linux. This distro has tools for testing all kinds of systems and connections. The version for Android of Kali Linux called NetHunter allows […]
20 WAYS IN WHICH PHONES DAMAGES ITS USERS ON A DAILY BASIS
With the emergence of NICTs, the mobile phone has become an indispensable device today. It is no longer only used for making calls and sending messages, but also for several activities such as: online courses, online sales and purchases, photography, texting, recording, playing games, taking and playing video. The mobile […]
How to change your location and public IP address easily using Opera Browser
The Internet is a network in which our information and our daily exchanges with the world circulate, and to ensure the good routing or the good movement of the packets in the network, each user present on the Internet has a public IP (Internet Protocol) address which makes it possible […]
How to know who touched or manipulated your smartphone
If you have the impression that someone around you tends to manipulate your phone without your consent without your knowledge and you want to know who it is that you are in the right place, this trick allows you to unmask easily and without doing of effort that affects your […]
The best software to hack Wi-Fi in 2022
Are you on a trip and in need of internet connection ? No need to panic you can take advantage of the surrounding networks by connecting yourself to the nearby WIi-Fi. Unfortunately, they are all secured. If contrarily you need the best Wi-Fi Hacking software to better protect yourself, then this […]