Skip to main content

Blog

My ‘Community Talk’ at PES Institute

My ‘Community Talk’ at PES Institute

Today was another great day as I spent first half of my day delivering speech to M.Tech students at PES Bangalore, one of the leading Engineering Institute in India.  I always cherished those moments connecting with students, inspiring and motivating them to do better than what I did. . This opportunity stuck when our former […]

Official Launch of Our First Linux Tool ...

Official Launch of Our First Linux Tool – FireMasterLinux

Finally we have decided to officially launch our first Linux tool, FireMasterLinux.  It  is the Linux port of our popular tool FireMaster, a Firefox master password recovery tool. FireMaster is the first ever built tool to recover the lost master password of Firefox. . In order to protect the stored login passwords, Firefox uses master […]

New Password Recovery Tool – TrillianPas

New Password Recovery Tool – TrillianPasswordDecryptor

Recently we have released couple of dedicated password recovery tools for various instant messengers such as DigsbyPasswordDecryptor & PaltalkPasswordDecryptor.  Today we are releasing yet another tool, TrillianPasswordDecryptor for popular instant messenger Trillian. . Trillian is the most popular universal messenger with rich 450+ features. It supports almost all IM clients including Gtalk, Windows Live, AIM, […]

DigsbyPasswordDecryptor : New Password R...

DigsbyPasswordDecryptor : New Password Recovery Tool for Digsby IM

DigsbyPasswordDecryptor is the new password recovery software to instantly recover all stored account passwords by Digsby. Digsby is one of the popular instant messenger of recent times with IM client, Email Notification & Social Networking all in one software. Digsby has a multi protocol IM client that lets you chat with all your friends on […]

Book of the Month – Mobile Malware Attac

Book of the Month – Mobile Malware Attacks and Defense

As mobile devices becoming more and more sophisticated with their computing power and memory, the attackers are slowing shifting their focus from PC to these Mobile devices. Unlike earlier generation of mobile devices, current mobile devices are as powerful as our computer systems with increased memory and performance along with built-in internet connectivity. All of […]