Selena Gomez’s instagram account was suddenly taken down on Monday i.e. on 28th August 2017 by anonymous hacker and posted some nude photos of Justin Bieber (which is the ex-boyfriend of selena) with…
Read moreSQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of…
Read morevBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest…
Read moreSQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give…
Read more1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure…
Read moreBlog monetization has become increasingly popular over the last 10 years. While previously people used to run a blog as a side profession, it has now become a full-fledged source of income for…
Read moreEthereum is the 2nd most popular cryptocurrency after the bitcoin. The current value of Ethereum for today is $321 approximately. According to latest news, an unknown hacker hacked the Enigma Website which is…
Read moreNow this time, the hacker “OurMine” hacked almost all social accounts of HBO and posted a tweet – “Hi, Our?Mi?ne are here, we are just testing your security ,HBO team please contact us…
Read more1. What is progressive download? Answer: Progressive download enables you to view streaming content as it is downloaded to your media player. With progressive downloads, you can watch live events as they take…
Read more1. What is the difference between the ISM and SSM multicast models? Answer: With the ISM model, the routers in the network maintain source information. However, with SSM the receivers are responsible for…
Read more1. In which layers of the OSI model does content networking reside? Answer: Content networking devices technically work at Layers 17, but true content networking services can be considered to reside in Layers…
Read moreBlack Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. The courses at this year’s Black Hat information security conference taught more than…
Read morePart of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…
Read moreAs per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…
Read moreMonit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…
Read moreQ176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….
Read moreAs you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…
Read moreSpaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…
Read moreKali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….
Read more