Month: September 2019

Android 10 Updates | Securium Solutions Pvt Ltd

Android 10 Q Beta

New Feature Of Android is Q Beta (10 .0).Its a smart version of android which bring a new experience to users. Android 10 gives a best experience to user with dark theme and gesture navigation. Support new protections for user privacy and security. Extend your apps with high-performance codecs, better biometrics, faster app starts, Vulkan 1.1, NNAPI 1.2, foldables, 5G, and more! The beta program was …

Android 10 Q Beta Read More »

Python variables

Python is a programming language used for multiple areas like Web design , Machine learning , Data science , Software development , Web and Desktop application designing .Here we learn about python variables . We using python 3.7.4 and Pycharm . Pycharm is a IDE (Integrated Development Environment) helps to run python program and provide …

Python variables Read More »

Windows 7 hacking | Securium Solutions.

HACKING WINDOWS 7 USING METASPLOIT BACKDOOR AND POST EXPLOITATION

What is a Backdoor? Backdoor are malicious files that contain Trojan or other infectious applications that can give you either Halt the processes of the machine or it may give us the partial remote access to the Machine, We will be getting a reverse TCP connection from the victim machine by using a small backdoor …

HACKING WINDOWS 7 USING METASPLOIT BACKDOOR AND POST EXPLOITATION Read More »

NumPy

NumPy is the very important library of python which help you and support you to dealing with large, multi -dimensional array and matrices, with collection of mathematical function use to operate these numeric array, The ancient name of NumPy is Numeric creted by Jim Hugunin but in 2005, Travis Oliphant created NumPy with feature of …

NumPy Read More »

Steganograpy | Securium Solutions

QUICK TOUR WITH STEGANOGRAPHY TOOLS

Hey Guys, Back again with another blog, we are going to take a quick tour on steg tools and Countermeasures. What is Steganography? It is a technique of hiding a secret message within an ordinary message by encrypting and decrypting at the receiver end to maintain confidentiality of data. Utilizing of Images, Videos, Audio, Document …

QUICK TOUR WITH STEGANOGRAPHY TOOLS Read More »