How to charge Android Smartphone faster : Does your phone takes 2 to 3 hours to completely charge? If yes then you must read how to charge android phone faster. After reading this tutorial you will be able to charge your phone in less than half of time than it usually takes. In our previous articles we have shared details about how to increase android battery life. Today i will share some smart android tips and tricks to charge your phone to full in approximately 45 minutes to 1 hour and upto 50 % in 20-30 minutes without having an Qualcom quick charge technology. So lets learn how to quickly charge any android … [Read More...]
Featured Articles
Editorial Picks
Latest Blog Updates
CEH Practice Test – 2 Introduction to Ethical Hacking
Hackingloops presents another CEH Practice test but it also will be helpfull for Security+ and CISSP aspirants. This Certified Ethical Hacker sample Quiz is concentrated on Introduction to Ethical Hacking and basic overview to hacking. Take the CEH practice Quiz to check your progress for Certified Ethical Hacker certification test. Hope this will be helpful. Level of this sample Certification quiz is Very Easy. Best of Luck for your CEH Practice Test - 2 Introduction to Ethical Hacking and Basic Overview of Hacking. CEH Practice Test 2 : … [Read More...]
Ethical Hacking Quiz – 1 CEH Practice Test
HackingLoops proudly presents the First Ever Online Ethical Hacking and Security Quiz for Hackers, Geeks, Penetration testers and Security Researchers for free. Its the first time in internet or web history that any portal is providing such unique Ethical Hacking Quiz to its users. So friends are you ready to show your Hacking skills and knowledge. This quiz will be extremely useful for all students who are preparing for any security related certification like CEH, CSFI(certified security and forensic investigation), SSA(Software Security assurance), SSP, CISSP etc. Ethical Hacking Quiz 1 : … [Read More...]
Popular Phishing Techniques used by Hackers
Phishing is one the hacker's favorite attack method that they use to hack login id passwords. Today we will learn Popular Phishing Techniques that hackers nowadays use to hack social networking sites or email passwords. In simple terms phishing is basically a method in which hacker uses Phish or fake pages or fake applications to capture the sensitive information from victim. Sensitive information can be userid passwords, bank account details, personal details, phone number, even verification codes that authorized services like Google and Facebook send to phones for verifying authenticity. In this tutorial, i … [Read More...]
Penetration testing of VoIP : How Hackers Spoof Caller ID
Today we will learn how to conduct Penetration testing of VoIP (Voice over IP) against a Private Branch Exchange as it's must to perform pen tests for all type of attacks. For VoIP security assessment, most important pen test is Caller ID Spoofing and how hackers spoof caller ID to make fake calls on behalf of someone else without disclosing his/her information. Before starting pen test we have to understand what is Caller ID Spoofing? Caller ID spoofing is a type of attack where a malicious attacker will impersonate a legitimate SIP user to call other legitimate users on the voice network. So let's learn how … [Read More...]