This is Virus Community

Your Ultimate Tech Destination On My Web.

Friday, 13 October 2017

Intel Introduced Its First Quantum Processor

Intel Introduced Its First Quantum Processor The future of computing undoubtedly passes through the quantum computer. So far, research around quantum computers has proved quite promising and Intel has already realized the potential of this area. Last week, the market leader in the manufacture and marketing of chips and processors for computers announced that it is creating a quantum processor. So, now let’s explore all the details about...

Sunday, 9 July 2017

Top Interview Questions for IT Pro

Top Interview Questions for IT Pro 1. What is the difference between a hub and a switch? 2. What is a network? 3. What is Active Directory? 4. What is TCP/IP and what does it stand for? 5. What is a default gateway? 6. What does DHCP stand for? 7. What is an IP Address? 8. What is the significance of the IP address 255.255.255.255? 9. What are the 3 major classes of an IP network? 10. What is a Class D IP address? 11. What is OSPF? 12....

Saturday, 17 June 2017

Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb”

Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb” Israeli government spies have hacked into the operations of ISIS. The group is inventing a laptop computer bomb that could have blasted the commercial aircraft to the US. However, Israeli cyber researchers have hacked into the operations of ISIS months ago and revealed their plans. Recently, Israeli government spies have hacked into the operations of ISIS....

Wednesday, 7 June 2017

Intel Core i9 Extreme – Most extreme Desktop Processor Ever

Intel Core i9 Extreme Most Extreme Desktop Processor Ever The war of processors between AMD and Intel is very well known. This month AMD revealed its first monstrous Ryzen Threadripper processors with up to 16 cores and 32 threads. AMD intended to target the world’s fastest ultra-premium desktop systems. Yesterday, Intel also introduced its new Core X-series, and it’s anchored by the company’s first 18-core CPU, the Core i9 Extreme. The i9 Extreme...

Tuesday, 6 June 2017

Face Swap

Android users there is a good news for you! Microsoft just released an Android app in Google play store. The app had been launched in Play Store and the iOS version is already on its way. The new app launched by Microsoft was called Face Swap. Android users there is a good news for you! Microsoft just released an Android app in Google play store. The app had been launched in Play Store and the iOS version is already on its way.The new...

Saturday, 13 May 2017

Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users)

Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users Update —  If you are thinking that activating the kill-switch has completely stopped the WannaCry Ransom ware, then you are mistaken. WannaCry 2.0 version has just arrived without any 'kill-switch' function. Get prepared for the next massive wave of ransom ware attacks. In the wake of the largest ransom ware attack in...

Tuesday, 28 March 2017

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN.

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN A computer network is an interconnection of various devices like laptops, routers, switches, servers, etc. with the help of wired or wireless means. We can differentiate these networks by their reach, i.e., geographical area. For example, we have local area network, wide area network, personal area network, metropolitan area network, near-me network, etc. Whatever connection you use,...

Monday, 14 November 2016

USB Thief This Self Projecting USB Trojan Can Give You Nightmares

USB Thief This Self Projecting USB Trojan Can Give You Nightmares USB Thief This Self Projecting USB Trojan CanSecurity researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving its trace. The malware uses a unique method of protecting itself with AES128-encryption and renaming the files in each new instance. Imagine a malware that spreads through USB drives, steals...

Monday, 10 October 2016

Some Useful Websites For Hacking.

Some Useful Websites For Hacking. To check if a port is open:   http://www.canyouseeme.org/ To multiple scan a file for viruses:http://vscan.novirusthanks.org/ To check if a site is down:http://www.downforeveryoneorjustme.com/ A place to get newest exploits:http://www.exploit-db.com/ Lets other people view your inserted text:http://pastebin.com/ The free online crypting + decrypting service:http://www.crypo.com/ An online MD5 decrypter:http://www.md5decrypter.com/ The...

Friday, 1 July 2016

Five Common Mistakes That Fresh Hackers Make

Five Common Mistakes That Fresh Hackers Make Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker. 1. If you see a website offering hacking software or offering to hack email...

Sunday, 15 May 2016

Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations

Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such attacks could be targeted against the 2G and 3G enabled smartphones and 4G/LTE enabled smartphones are immune. to such attacks Security researchers have revealed how simply...