Top 10 Google Chrome Security Extensions You Must Have
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
Google Chrome Web browser has been on top of the list having around 65% of total usage share among all the web browsers. One reason for its popularity is the number of extensions it supports. Google Chrome enhances your browsing experience by effectively managing your tasks and has been the go-to browser for everyone. Besides productivity and user experience, Google Chrome also knows the importance of your security and privacy, and hence it has a bunch of security extensions in its arsenal. Following are the top 10 security extensions you should definitely try out. 1. HTTPS Everywhere ..read more
Visit website
Reality of Cell Phone Hacking — IMSI Catcher Explained
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
Spying on suspected cybercriminals and terrorists by intercepting their phone calls and tracking their online activities have been the working fields of surveillance agencies such as NSA, FBI, CIA etc. These organizations have the authority to ask the cell phone carrier companies to provide their subscribers’ data and constantly spy on them. However, for an individual hacker(black hat), it is not possible. So he uses an IMSI Catcher to hack the cell phones. What is the IMSI number? IMSI stands for International Mobile Subscriber Identity. This number uniquely identifies any cell phone u ..read more
Visit website
What Is A Password Manager & Why You Should Use It?
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
It becomes a hectic task to create and remember the password for different social and online accounts. You also have to have a unique password for each account(read why). These online services suggest and sometimes make it compulsory to fulfil the password conditions such as password must be greater than 8 characters, must contain at least one letter, one uppercase and lowercase alphabet and one special character. For example — Nfsw@017#. This makes things worse. Remembering these kinds of passwords is difficult.   To cope up with this pr ..read more
Visit website
Kali Linux Overview — A Hacker’s Paradise
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
During the journey of being an ethical hacker or pentester, the first thing comes in mind as a beginner is where can I get all the resources to learn and practise ethical hacking. Most people reply using Kali Linux, whether for a newbie, intermediate or professional. As every operating system is meant best for specific purposes, Kali Linux is meant for any person wanting to gain and practise ethical hacking and penetration testing. In more specific words, Kali Linux is a paradise for hackers. In this blog post, I’ll give a general overvie ..read more
Visit website
How To View Saved WiFi Passwords on Windows 10
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
Windows Operating System has the feature to view saved WiFi passwords. Windows 10 asks you to enter your WiFi password for the first time you connect, but later whenever you hit the connect button, it gets connected automatically. This is because Windows store previously connected WiFi passwords. There are times when you want to know the password of one of the WiFi networks you connected previously. You might have forgotten it. Another scenario can be — you used your friend’s hotspot to connect to your laptop and then you have his WiFi pa ..read more
Visit website
What Is CAPTCHA? Everything You Need To Know
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
How frustrating is it to solve CAPTCHA when you are in a hurry to fill a registration form or book flight tickets? We solve most of the CAPTCHAs without any hiccup but sometimes get stuck in it and wonder why this thing exists? So, this post is about explaining the invention and importance of captcha and its performance over time. Let’s dive in!! What is CAPTCHA? CAPTCHA is an acronym for ‘Completely Automated Public Turing test to tell Computers and Humans Apart’. It is a type of challenge-response test to determine whether the user i ..read more
Visit website
Tor vs. VPN
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
If you fear being monitored and want reliable online protection, you might often consider using either Tor or VPN services. Their functions might overlap a lot, but there are some significant differences. Read below to find out which one is a better option for you. What is Tor? Tor is a network used for anonymous communication. It has lots of servers scattered around the globe that are maintained by individual volunteers. This makes Tor connections difficult to intercept as they do not rely on a single company or organization. How doe ..read more
Visit website
What is VPN? | VPN Explained In Detail
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
Most of you are familiar with the term VPN. You also know that it is used for achieving anonymity or hiding your identity. But do you know that the primary function of a VPN is something different? Apart from anonymity and security, VPN has many more other features. In this post, I’m going to discuss VPN, its working, its features, the protocols it uses in detail. So let’s get started! What is a VPN? A VPN(Virtual Private Network) is a private network of two or more computers configured and used by an organization to connect to remote sites or users with restricted public network acc ..read more
Visit website
How To Know if You’ve Been hacked?
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
After reading news of hacking and data breach, you might be wondering about your own security. That’s a good step! Do you want to know if your personal computer has been infected by a virus or your social networking accounts have been compromised? If yes then you’re at the right place. keep reading this post till the end. One thing to notice is that hackers want your private information for stealing your identity and your personal computer and social media accounts are the best places to find that. But you’ll be wondering why would someone hack my system or accounts? Valid question. There ..read more
Visit website
What is Deep Web & Dark Web?
Hollyhacker | Cyber Security Awareness
by Nihar Khandekar
4y ago
The World Wide Web is much more vast than you can realize. It can be broadly categorized into two parts — the surface web and the deep web. The deep web is also called the hidden web. Within the deep web, there’s another portion called the dark web. If you think the web in only for searching for information, streaming live audio/ video, online shopping, using social media and stuff like that then you should look beyond that. Alongside the visible web, there lies a hidden world of the internet which common people are unaware of. The Surface Web — The web you know. The surface web also kno ..read more
Visit website

Follow Hollyhacker | Cyber Security Awareness on FeedSpot

Continue with Google
Continue with Apple
OR