Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
OTP-2FA
BlogInformativeCyber Security

Master Cyber Security Key Concepts and Best Practices

Feeling overwhelmed by cyber threats? This guide breaks it down. Learn key terms, protect your data, and navigate the digital world confidently. Click to learn!
KrishMar 5, 2024Nov 30, 2024
phone-over-laptop
WindowsTutorialLinux

Mirror Your Phone On Windows 11 Now using Scrcpy !!

Using scrcpy we can mirror and control our phone from PC without any extra bulky software and utilities in just few steps
KrishMar 2, 2024Nov 30, 20241 Comment on Mirror Your Phone On Windows 11 Now using Scrcpy !!
InformativeBlog

RCS : Next Gen of Messaging Use it Now !!

RCS stands for Rich Communication Services it is a successor of SMS that supports gifs, animated emojis, and...
KrishFeb 23, 2024Nov 30, 2024
Single-Firewall-DMZ
BlogInformative

What is DMZ And Why you should use it Right Now?

The term “DMZ” stands for a demilitarized zone, which acts as a protective buffer between two firewalls. It’s...
KrishFeb 16, 2024Nov 30, 2024
Yellow-house-with-wifi-connectivity
InformativeWindowsTutorial

How To Host A Server Instantly on Windows

It's really frustrating to host a server from your home network. Requiring you to setup hundreds of things. Worry not, In this tutorial I am going show you the easiest way you can host a server directly from a windows machine.
KrishFeb 11, 2024Nov 30, 2024
Lock-with-Keys-flying-around
BlogCyber Security

The 5 Pillars of Cyber Security: What Holds the Cyber Kingdom

Cyber Security is a big field in its own, in this article we will explore the 5 pillars, which holds the whole cyber security kingdom together.
KrishJan 29, 2024Nov 30, 2024
cyber-threats-illustration
BlogCyber Security

Understanding Cyber Threats and Vulnerabilities

Cyber Threats are increasing and criminals to so why not learn about some cool tools and techniques used by hackers?
KrishOct 30, 2023Nov 30, 2024
password-key
Cyber SecurityBlog

Salt, Pepper, and Hashing: Three Ingredients to Secure Passwords

Our password travel on a boat in an open ocean that everyone has access to. We will see how Hashing, peppering and salting actually save us from hackers on the internet..
KrishOct 29, 2023Nov 30, 2024
BlogInformativeCyber Security

Creating and Breaking MD5 Hash

We will see how MD5 is created and why it is not considered secure anymore. How Hackers have managed to Hack the Hashes
KrishOct 1, 2023Nov 30, 2024
Hidden-Microsoft-Partition
BlogInformativeWindows

EFI Partition: What it is and Why it’s Important

EFI or Extensible Firmware Interface is a firmware interface that is used to boot operating systems in computers. Let's see what's inside?
KrishSep 10, 2023Nov 30, 2024
23456

Hacking

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is MBR, it's Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities....

Read More

What is GPT, its Structure and Working !!

GPT or GUID Partition Table is a successor of MBR that comes with a lot of amazing features to protect your data's integrity security and safety...

Read More

Cyber Security

How to Build a Resilient Network Security Architecture ?

Network Security isn’t just a buzzword – it’s the foundation of protecting your network and data....

Read More

Network Security for Connected Devices and IoT

Worried your smart gadgets might go rogue? Learn practical, real-world tricks to boost Network Security and keep your IoT universe hacker-free....

Read More

Enhancing Wireless Network Security: Protecting Your Digital World

Discover practical wireless network security tips to protect your WiFi from hackers and intruders. Learn simple steps anyone can take to enhance network security at home....

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More

The Beginning

This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...

Read More