New!
Loading...

Secure HackinG

WE CARE FOR YOU!

  • Home
  • Hacking
    • Kali Linux
    • Cyborg Hawk
    • Basic
    • looking For New ?
  • Tricks
  • HowTo
    • coming soon
    • coming soon
    • coming soon
  • Tutorial
    • Qlikview
  • Technology
  • News

Popular Posts

Powered by Blogger.
Home / Archive for 2016

3 Tier Architecture of Qlikview

Unknown 05:45:00 Add Comment Edit
In ideal scenarios, Qlikview follows 3 tier architecture wherein multiple steps are performed in each tier. Let’s see what this 3 tier arc...
Read More
Creating QVDs

Creating QVDs

Unknown 05:42:00 Add Comment Edit
As in the previous post you have seen that how we connected to the database and fetched the table, its now time to store that table in our...
Read More

Delhi Robbers Hijacked 950 iPhones Loaded Truck!

hXE - MEDI 11:03:00 Add Comment Edit
This could be termed one of the most dramatic hijacks in the country. Two men who were hijacking a truck that was carrying 950 iPhon...
Read More

Connecting to database

Unknown 04:24:00 1 Comment Edit
QlikView is capable to connect to multiple databases via ODBC and OLEDB connectors. It also supports Salesforce connector. In order to...
Read More

QlikView Installation

Unknown 09:43:00 Add Comment Edit
In the previous post you have seen the way QlikView works with database to provide analytical insights for the business. Now we will start ...
Read More

Introduction to BI and Qlikview

Unknown 01:29:00 Add Comment Edit
Hi, Lets welcome you all to the world of BI aka Business Intelligence. I know this may sound new to many people who had just steppe...
Read More

Black Marketing Of Reliance Jio Sim Card.

hXE - MEDI 03:26:00 Add Comment Edit
The Reliance Jio 4G service is all set to change the land map of the telecom industry in India but it has been revealed that Reliance Jio ...
Read More

Know About ATM Skimming!

hXE - MEDI 10:54:00 Add Comment Edit
Do you know About ATM Skimming? A type of fraud which occurs when an ATM is compromised by a skimming device, a card reader which can be...
Read More

Apple Planning To Introduce 10.5-inch iPad Pro for 2017 And Oled iPad For 2018

hXE - MEDI 08:40:00 Add Comment Edit
At this point in the 21st century, it's safe to assume that the annual cycle of new Apple products is as regular as the progression of ...
Read More

How Your Computer Monitor Could Be Hacked To Spy, Steal Data From You

hXE - MEDI 01:24:00 Add Comment Edit
Just stop believing everything you see on your screen, as it turns out that even your computer monitor can be hacked. You have s...
Read More

Millions Of Volkswagen Cars: Victim of Wireless Hacking

hXE - MEDI 11:54:00 Add Comment Edit
The Team of researchers revealed, A sizeable proportion of 100 million Volkswagen Group cars sold since 1995 can be unlocked remotely by h...
Read More

Apple Launches Bug Bounty Program.

hXE - MEDI 11:21:00 Add Comment Edit
Finally, Apple Bug Bounty Program launched. Since Bug bounties have long been a cybersecurity staple for big software makers, internet...
Read More

All about Wi-Fi Calling.

hXE - MEDI 04:55:00 Add Comment Edit
What is Wi-Fi calling? Wi-Fi calling is nothing new; apps like Skype, Google Hangouts, Facebook Messenger and WhatsApp make it easier t...
Read More

Niantic CEO, John hanke; Pokemon Go boss: Twitter Account Hacked!

S O D M Z S The Solonist 06:57:00 7 Comments Edit
John Hanke is an American entrepreneur. Hanke is founder and CEO of Niantic, Inc., a company that creates experimental mobile, social, and...
Read More

Apple And Samsung Patent War Returns In 2016

hXE - MEDI 23:13:00 Add Comment Edit
The never-ending court rivalry between Samsung and Apple is one which returned to the courts again today. For those just tuning in, this ...
Read More

20 Free VPN Services

Noman Shaikh 04:43:00 Add Comment Edit
20 Free VPN Services Hello Friends, what is VPN ?? A virtual private network ( VPN ) is a technology that crea...
Read More
Subscribe to: Comments ( Atom )

LIKE US ON FACEBOOK

Random Posts

  • Popular Post
  • Comments
  • Category

Popular Posts

  • FPING TOOL IN KALI LINUX
    Author : David Schweikert https://fping.org/ Manual Page: http://code.tools/man/8/fping/ Usage: Syntax fping [options] [...
  • DNSRECON – A powerful DNS enumeration tool
    Author :Carlos Perez  https://github.com/darkoperator/dnsrecon Usage: root@kali:~# dnsrecon -h Version: 0.8.7 Usage: dnsrecon.py ...
  • MIRANDA – UPNP administration tool
    Author: Craig Heffner https://code.google.com/archive/p/mirandaupnptool/?pli=1 Usage: root@kali:~# miranda -h Command line usag...
  • URLCRAZY – Domain typo generator
    Author: Andrew Horton https://www.morningstarsecurity.com/research/urlcrazy Usage: root@kali:~# urlcrazy -h URLCrazy version 0.5 ...
  • ZENMAP - Nmap Security Scanner GUI
    ZENMAP is derived from the Umit Nmap frontend, which was started by Adriano Monteiro Marques as an Nmap/Google Summer of Code project....
  • thcping6 – Craft your special icmpv6 echo request packet
    Author : Van Hauser https://github.com/vanhauser-thc Usage: root@kali:~# thcping6 thcping6 v2.3 (c) 2013 by van Hauser / THC ww...
  • dmitry – Deepmagic Information Gathering Tool
    Author: James Greig http://mor-pah.net/software/dmitry-deepmagic-information-gathering-tool/ Usage: root@kali:~# dmitry -h...
  • DNMAP - Distributed Nmap Framework
    Author: www.mateslab.com.ar https://sourceforge.net/projects/dnmap/ Usage: dnmap_client – Distributed nmap framework (client) ...
  • ALIVE6 – Shows alive addresses in the segment
    Author : Van Hauser https://github.com/vanhauser-thc Usage: root@kali:~# alive6 alive6 v2.3 (c) 2013 by van Hauser / THC www....
  • HC Stealer Tutorial (Cookies Hijacking)
    Hey people! i am back with a new tutorial that you will be like much for sure! ;) This is about cookies hijacking, We will steal the co...

Follow Us on Facebook

SodmZs -HackinG Tutorials And ArticleS

Blog Archive

  • ►  2017 (35)
    • ►  December (1)
    • ►  June (30)
    • ►  May (2)
    • ►  March (1)
    • ►  January (1)
  • ▼  2016 (22)
    • ▼  October (2)
      • 3 Tier Architecture of Qlikview
      • Creating QVDs
    • ►  September (5)
      • Delhi Robbers Hijacked 950 iPhones Loaded Truck!
      • Connecting to database
      • QlikView Installation
      • Introduction to BI and Qlikview
      • Black Marketing Of Reliance Jio Sim Card.
    • ►  August (7)
      • Know About ATM Skimming!
      • Apple Planning To Introduce 10.5-inch iPad Pro for...
      • How Your Computer Monitor Could Be Hacked To Spy, ...
      • Millions Of Volkswagen Cars: Victim of Wireless Ha...
      • Apple Launches Bug Bounty Program.
      • All about Wi-Fi Calling.
      • Niantic CEO, John hanke; Pokemon Go boss: Twitter ...
    • ►  June (1)
      • Apple And Samsung Patent War Returns In 2016
    • ►  April (1)
      • 20 Free VPN Services
    • ►  March (6)
  • ►  2015 (21)
    • ►  April (2)
    • ►  March (8)
    • ►  February (9)
    • ►  January (2)

Recent comments

Get Social

Popular Posts

  • New Facebook Tips and Tricks.
  • HC Stealer Tutorial (Cookies Hijacking)
  • Hack facebook Account by Phishing.
  • Niantic CEO, John hanke; Pokemon Go boss: Twitter Account Hacked!
  • Hack Websites From Android
  • Hack Any Facebook Account By Mobile Phishing.

Random Posts

  • DNSRECON – A powerful DNS enumeration tool
  • WannaCry : Everthing you need to know about it before you too become a victim!
  • Nokia 8, a new smartphone by Nokia
  • "Adylkuzz" Malware Another Deadly Cyber Attack Kept Out Of Sight By The Noise Of WannaCry
  • Around 200,000 Systems Are Vulnerable in 2017 to Heartbleed
  • Apple And Samsung Patent War Returns In 2016
  • Dangerous Android Malware Found! That can Physically Damage Your Phone

Contact Form

Name

Email *

Message *

Labels

  • Android
  • Auto-Likes Tricks
  • Hacking Basic
  • How to change the security Key
  • Information Gathering
  • Kali
  • Kali Linux
  • News
  • QlikView
  • Reconnaissance
  • Speed-Up your Internet
  • Speed-Up your PC
  • SQL Injection
  • Tips and Tricks
  • Viruses
  • VPN Services
  • Website Hacking
Copyright © 2014 Secure HackinG ThemeXpose
  • Home
  • About
  • Contact