Specifications of Computer can be the most important task for us. When we going to purchase a system ten we always have to check that what ...
Home / Archive for September 2017
Create a Disco Light Virus
Create a disco light virus Disco light virus can not be the virus related to the disco lights or the pubs or even the disco ever. It j...
Best App for learning Programming
App for learning Programming This article should be related to the app in which almost all the famous programming languages are to be li...
Kali Linux 2017.2 Releases With these features
Release of kali Linux 2017.2 On September 20,2017, the Offensive security releases its latest update for the famous Penetration testers ...
Five Interesting Things You Don't Know You Can Do In A C Language Program???
1. You Can Run A C Program Without Header Files You can run a C Program without including header files like #include<stdio.h...
Update & Upgrade Repositories of The Kali Linux 2017.1
Update Repository of Kali This post will show you after installing the Kali linux in the VMware . How to update and upgrade the package...
Install Kali Linux in VMware
Kali Linux installation This article will show you How to install the kali Linux 2017.1 in the VMware in windows. As you know about th...
Install VMware in Windows
Vmware Installation This article related to the installation of the Vmware in the Windows. As there are many OS we want to use nowaday...
Delete Recent History in Windows
This article will show you some of the best ways for deleting or removing the recent history of your Windows system . Many peoples have ...
Top 7 Useful Commands of Linux
Useful commands used in the linux Destro to perform the particular task . In this we will show you some of the best and amazing Linux OS c...
Popular Programming Languages of 2017
This article shows some of the most popular and programming languages of 2017. The programming languages which are very important for soft...
Best Open Source Softwares of 2017
Open Source Softwares are plays a great role nowadays in our daily life.As there should be many open source softwares comes in the market w...
Create Real life Hacking Scenario
Hacking Scenario does't involves the actual hacking conducted. In this article I would show you that how to create the fake or we can ...
Top 7 Linux Dangerous commands
Top 7 Dangerous Commands This article covers the top most destructive linux commands which can not be mistakenly used in the linux. ...
Subscribe to:
Posts
(
Atom
)