Installing I2P Service

The I2P service is pretty simple to install, simply use the apt repository Gather the binaries $ sudo apt-add-repository ppa:i2p-maintainers/i2p $ sudo apt-get update $ sudo apt-get install...

Setup Proxychains in Linux

What is Proxychains? Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...

Critical Vulnerability Found In Cisco

In an ongoing warning, Cisco has unveiled a genuine security weakness influencing its item Jabber for Windows. Babble is a work area correspondence application...

Xiaomi’s Redmi 9i smartphone to be launched in India on September 15

The Redmi 9i will be launched in India on September 15. In the Indian market, Xiaomi will be the fourth handset of the Readme...
samsung M51

Galaxy M51 launched In India with 7,000mAh battery

Galaxy M51 Launched: Samsung has launched its new Galaxy M51 smartphone in India. The company has made big claims about the battery backup of...

Google App Contains Joker Malware : Removed

Security scientists from Pradeo found Joker malware flooding the Play Store mimicking different applications. As uncovered through their post, they discovered six distinctive Android...

Turn off Auto Play Videos that run on your Facebook and Twitter account

Active users on social media may have noticed that some videos start running automatically as they open Facebook or Twitter. Many are very interesting,...

Ransomware Attack at Argentina Borders

Government authorities in Argentina are declining to haggle with a ransomware bunch that constrained them to quickly close all movement checkpoints on Aug. 27. As...

Airtel on Jio’s way, unlimited data in every Xstream Fiber Broadband plan

Bharti Airtel has upgraded its Xstream fibre broadband service with new plans, the price of these plans starts at Rs 499 in which customers...

Cyber Security Loop Holes When 2FA Enabled

Cybersecurity resembles a round of whack-a-mole. When the heroes shut down one kind of assault, another springs up. Usernames and passwords were once adequate to...