Category Archives: Security Tech

Free Ethical Hacking Workshop – Kathmandu oct 2016 “Hackers For Charity”, Hackers House

काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।

तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।

-Regards : Bijay Acharya (

#nhc #CyberAware #ktmWorkshop #EthicalHacking 

ktm-workshop-by-nhc-bijay-acharya-1 ktm-workshop-by-nhc-bijay-acharya

“Hackers For Charity” – Free Ethical Hacking Workshop Pokhara, Nepal : 2016 – NHC, HCNEPAL


And “Hackers For Charity” is rolling. This is day 1 image. 

“Cyber Security For All. Forever Free” #hackersHouse  Thanks for volunteers.   #CyberAware   #nhc   #hcnepal

Call us for training : 9846618997 

Free Ethical Hacking Workshop – Day 2 : Pokhara, Nepal – 2016 OCT

​Actually “SQL Injection” was being explained to participants. Next to it, some interesting tips was being shown in projector. You can read it right ? 

#nhc    #CyberAware    #hcnepal     #hackingWorkshop    #ethicalhacking   Day 2. 

#CyberAware    #freeEthicalHacking    #hackersforCharity    #nhc   #pokhara

​Finally, #welcome   #stand   for Tomorrow’s Program is ready. 

#CyberAware    #freeEthicalHacking    #hackersforCharity    #nhc

Hack Ncell 3g internet to use for free, free internet ncell, free internet ntc, nepal [How it worked in past]

[ Past 2010, 2011 version]


[In Nepali, Learn Hacking Videos – Youtube] 


  • First of all you should have a 3g phone with multi application running function
  • Now go to internet settings of your phone.
  • Create Three internet profiles One by One as follows
  1. First with apn WEB
  2. Second with apn MERO
  3. Third with apn MMS
  • Now get three internet consuming softwares (Recommended Opera, Ebuddy and Bolt) (Mig doesnot work here because it disconnects itself time to time)
  • Divide each apn for each softwares i.e. web for Opera, mero for Bolt and mms for ebuddy
  • Then open opera and when “CONNECT USING” option arrives select web,  select mero and mms for bolt and ebuddy respectively.
  • Now you can see multi bridge connectivity on the net connected signal(only in nokia)
  • Use as much as you like and disconnect.
  • Thats it, as easy as blinking your eye.


  1. You will be charged for the apn “web” so just open single page from web and leave it on standby.
  2. MMS apn fails to open page but beware if you dont use mms apn you will be charged for all the data.

Hackers can track your keystrokes through your Wi-Fi signal – HC Nepal

Ethical Hacking Tutorials in NEPALI LANGUAGE here > > 

T​here’s almost nothing more private on your computer than the keystrokes you type in.

Think of typing your passwords, all your emails and instant messages, your Social Security number and credit card numbers, and even more private information meant only for the eyes of a select few. Now imagine all of those sensitive details landing in hands of strangers.

American and Chinese academics built a keystroke recognition system called WiKey consisting, at its simplest, of a standard router (sender) and laptop (receiver). WiKey can recognize typed keys in the middle of the system based on how the Wi-Fi signal lands on the receiver. 

More on :

Common passwords banned : Microsoft




 “Hacker”? ….How will you define the term ? ….Bad Guy ?…..Or Good Guy ?.…Well, ‘Hacker’ a single term do not give full details. …. It depends on ‘legal’ & ‘illegal’ actions…..If hacker performs ‘illegal’ actions against account or sites or system then s/he is BAD A**hole. . . . And if hacker finds a bug in system and reports to concerned sector, then hacker is damn coolest guy. . . . I’m not going to write a long dirty & lengthy words describing hackers. Hackers are categorized into BLACK, GREY, & WHITE HAT. –BIJAY ACHARYA



Time to breakUP with google ?

Invented : Untraceable SMS System > > MIT

Invented : Untraceable SMS System > > MIT > > Computer Addicted


Src : Foss Byte