Tech Blog

Journal

We wanna to update all over world through our awesome blog content. So read and comment our blog and keep to update...

Free Stock Image download

As a Freelance I was wondering to get images and lot of stuff which keep on use in Graphics AWA Web Work. In the beginning this was very difficult for me to find like those websites from where I can get lot of image as free to use my client need. I had to buy but now I can say...

Continue reading

How to create social share buttons with custom icons for your facebook page

Last few years, we can judge social media sites have become inevitable elements in our lives that you just can't escape, even if you wanted to. Before some time back i was very alone due to my work load and my official life rush so i couldn't able to meet my friend circle and oth...

Continue reading

How To Monitor a Remote Computer For Free

After a long time I am going to share very interesting things with you what is always keen in the youngers. I think everyone want to know how they can monitor a remote computer absolutely free. Do you want to monitor a remote computer for free? If your answer is yes,….. T...

Continue reading

3 Best Ways To Unblock Blocked Websites

Hi Friends, After a lot of request how to unblock the blocked websites? I am wanna share about some tips among all of you. First of all I want to know do you want to access the websites blocked by your ISP or parents? If the answer is yes, you are certainly very lucky. Here are ...

Continue reading

This Real-Time Cyber-Attack Map Shows the Truth of Global Cyber War

This real-time global cyber attack map is trending in the social media since couple of days. Colorful lasers depict the attacks that are currently occurring across the world, making the real-time map pretty dazzling. The map shows a huge amount of cyber attacks being carried ...

Continue reading

Bad TOR exit nodes attempts to login with sniffed password with your hacked account

A security researcher spent a month to find bad TOR exit nodes by setting up a honey pot kind of website which has a fake login page - To find the nodes that sniffs the traffic and attempts to steal the password. This is very dangerous for those who completely depend on TOR Brows...

Continue reading

What is E-mail Bouncing

Sometimes, it’s fun when things bounce. Other times, not so much. Bouncing on a trampoline as a kid? Fun. Having your email newsletter or marketing blast bounce? Uh, that’s considerably less fun. In fact, it’s not fun at all. Unfortunately, that latter situation has happene...

Continue reading

World first 200GB microSD available in the online market

@megaleecher.net Now wait has finished, no need to compress our mobile data to store in the mobile or any gadget.. You know why i ma saying to this because 200GB microSD has availabe in the market.. You can buy this product from many shopping website like Amazon etc.. This ha...

Continue reading

How To Learn Programming and Developing

Well as you know lot of students have question how they can make their career in Programming. They just want to know the esiast way to learn the Programming in the minimum day and the time. Now I am going to give you some tips for the programming/Coding. 1. No need to buy...

Continue reading

New Phishing Attack Targets Gmail Users and others email web

A reputated firewall has detected a new type of cyber attack that is better built and harder to catch than in kind of traditional phising scheme. As you know millions of people doesn't know how the chrome and the firefox display the data on their computer screen or any kind of...

Continue reading

Astoria – Advanced Tor Client Designed to Avoid NSA Attack

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder. Tor (The Onion Router) is the most popular ...

Continue reading

How to take screenshot on Android and smart Phones

[caption id="attachment_95" align="alignleft" width="250"] take screenshot on Android and smart Phones[/caption] Android Mobile Phones, in India are becoming more popular as compare to other countries , because of cheap rates of mobiles gadgets than Apple iPhone. Taking Screen...

Continue reading

100+ Mozilla Developers Emails and Password Exposed Accidentally

[caption id="attachment_67" align="alignleft" width="300"] Mozilla Developer email id exposed accidentally[/caption] Mozilla on Friday notified users of its Mozilla Developer Network (MDN) that the company has accidentally exposed the e-mail addresses and cryptographically p...

Continue reading

Social Media Networks are going to medium to spread the worm to the user devices

[caption id="attachment_47" align="alignleft" width="207"] Worm grabbed the facebook[/caption] Very Interesting and useful information for the all Facebook lovers who spend a lot of time on Facebook. Well first of all I want to introduce a service which make your original url to...

Continue reading

Hackers can intercept sms and phone calls.

[caption id="attachment_39" align="alignleft" width="300"] Hacker can access your Phone calls and SMS[/caption] Top I.T. security experts have discovered a fatal security flaw that can allow hackers to monitor private phone calls and also read text messages even if the consume...

Continue reading

Hackers discover Facebook’s vulnerabilities while social networking sites are paying them to do.

[caption id="attachment_32" align="alignleft" width="300"] Facebook Vulnerabilities[/caption] Very Interesting and informative News toward the Social Networking site i.e. Russia and Brazil are hacking Facebook, and the social networking sites are paying them to do it. Faceb...

Continue reading

A Teenager hacked his school’s Computer to change his grade to avoid the parent verate

[caption id="attachment_6" align="alignleft" width="300"] School Network hacked by teenager to alter the grades of his exam[/caption] A normal boy of 16-year-old is being charged as an adult for the hacking of the the school computer to increase the grade. First of a...

Continue reading