In the world today mobile has become a vital possession. It is not just your cellphone. It has become more than that. It compensates for so many things that you cannot just afford…
Read moreIn this article we’ll discuss about the malware forensics and analysis. We’re sure that most of us have fallen victims to a system hack. And we are not talking about the basic hack…
Read moreIn this article, We’ll discuss about htaccess tips & tricks related to website security, optimization, SEO and redirects in detail. All the codes in this article has been tested multiple times in various…
Read more1. AFE – Android Framework for Exploitation, is a framework for exploiting android based devices. They’ve been in the security field from past 5 years and having a strong enthusiastic team behind Appknox(https://www.appknox.com)…
Read moreFacebook is one of the biggest social networking platform based in Menlo Park, California. People use Facebook to stay connected with their friends and family but there’s a huge risk behind it. The…
Read moreAs you might knows, the latest version of Google Chrome and Mozilla Firefox has been released but here is one surprise for all users. The Latest Version of Google Chrome is 56 and…
Read moreThis article will get you a good spark about writing the programs in various languages like Ruby, PHP, Python, Perl, Bash, C, C++ and Java. All Credits goes to Mr. Chetan Soni –…
Read moreQ1. What is a web browser? Answer – A web browser is a software program that runs on your computer and enables you to view web pages. Q2. What does HTML stand for?…
Read more361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man…
Read more