Latest Posts

Hacking Methodologies and Security Auditing

Table of Contents  So, how does a hacker hack, you might think? Right? But wait... Let me make it clear, that the hackers in movies, are… Table of Contents  So, how does a hacker hack, you might think? Right? But wait... Let m…

Introduction to Information Security

Table of Contents What is Hacking? Let's just start with an example. Say, there is a family happily living in a house, they are enjoying … Table of Contents What is Hacking? Let's just start with an example. Say, there is a fam…

Please be informed, for the future of this blog

Hi, there. In this blog post, i am not gonna tell you about any tools, apps, or any thing realted to it, as i post. This is not going to be a n… Hi, there. In this blog post, i am not gonna tell you about any tools, apps, or any …

KolibriOS: The Tiny OS in Just 1.44MB!

Imagine an operating system, light as a feather, zipping around your screen faster than Windows XP ever dreamed of, all while fitting snugly i… Imagine an operating system, light as a feather, zipping around your screen faster t…

How Blogger is Helpful for Teachers and Students

Have you ever dreamed of sharing your love of history with the world? Or working with classmates on a creative writing project onl… Have you ever dreamed of sharing your love of history with the world? Or working wit…

Monthly Plan for Students — That Works! (100%)

Hey fabulous student! 🌟  Ready to turn your month into a well-organized masterpiece? Let's start your planning with some answers to burni… Hey fabulous student! 🌟  Ready to turn your month into a well-organized masterpiece? L…