Category: Tech


  • Series.

    Code, Chaos, and a Dash of ADHD: My Journey to Hacking on TV

    Embark on my extraordinary journey through “Code, Chaos, and a Dash of ADHD.” Picture a young tech blogger turned white-hat hacker pushing the boundaries of possibility. Yet, behind the hacker persona lies a software engineer with ADHD – that’s me. Explore the first chapter of my unique story, from a childhood alienated by differences to a fascination with computers and gaming.


  • Exposing the PayPal Coinbase Invoice Scam

    Uncover How Spammers Exploit PayPal’s Invoicing System to prey on unsuspecting victims. Learn how to safeguard yourself from this potential scam.


  • Explicit Content on Instagram: A Persistent Problem

    Explicit Content on Instagram reamins a problem. This article provides an update on my 2015 discovery of over 1 million of explicit videos and photos hidden behind Arabic hashtags.


  • Truecaller may expose your phone’s activity

    TrueCaller, an application used to identify unknown callers, is facing scrutiny regarding privacy concerns. The app reportedly accesses user contacts, making them public, and displays the last seen status of its users, revealing the last time they used their devices. These features could potentially expose sensitive information, raising concerns about privacy invasion. The suggested temporary solution is to prevent the app from running in the background, especially for users keen on preserving their online privacy.


  • WhatsApp End-to-End Encryption is not as secure as you think

    In the context of narcissistic abuse, victims may adopt some of the manipulative, controlling, or harmful tactics they endured, often as a coping mechanism or a defense mechanism. It’s important to note that this behavior is not a reflection of the victim’s inherent character but rather a learned response to the abusive dynamics they experienced.Earlier […]


  • UltraSurf download to unblock any site anywhere!

    For over 16 years, UltraSurf has been a popular free proxy software used by millions globally. The tool allows users to bypass blocks without exposing them to explicit content and requires no installation. Features include anonymous browsing, IP address concealment, cleansing browsing history and cookies, transparent data transfer, and high-level encryption. It’s user-friendly and compatible with several browsers.


  • Over 1 million porn videos hidden on Instagram using arabic hashtags

    In the context of narcissistic abuse, victims may adopt some of the manipulative, controlling, or harmful tactics they endured, often as a coping mechanism or a defense mechanism. It’s important to note that this behavior is not a reflection of the victim’s inherent character but rather a learned response to the abusive dynamics they experienced.There […]


  • How To Fix Safari can’t find the server Error

    In the context of narcissistic abuse, victims may adopt some of the manipulative, controlling, or harmful tactics they endured, often as a coping mechanism or a defense mechanism. It’s important to note that this behavior is not a reflection of the victim’s inherent character but rather a learned response to the abusive dynamics they experienced.Many […]