
In the world today mobile has become a vital possession. It is not just your cellphone. It has become more than that. It compensates for so many things that you cannot just afford to lose it. In the same way... Read more

In this article we’ll discuss about the malware forensics and analysis. We’re sure that most of us have fallen victims to a system hack. And we are not talking about the basic hack like Gmail or Yahoo hack that your... Read more

In this article, We’ll discuss about htaccess tips & tricks related to website security, optimization, SEO and redirects in detail. All the codes in this article has been tested multiple times in various websites & servers but please keep in... Read more

1. AFE – Android Framework for Exploitation, is a framework for exploiting android based devices. They’ve been in the security field from past 5 years and having a strong enthusiastic team behind Appknox(https://www.appknox.com) whose headquartered in India. Currently they have... Read more

Facebook is one of the biggest social networking platform based in Menlo Park, California. People use Facebook to stay connected with their friends and family but there’s a huge risk behind it. The rate of the cyber crime is increasing... Read more

As you might knows, the latest version of Google Chrome and Mozilla Firefox has been released but here is one surprise for all users. The Latest Version of Google Chrome is 56 and for Firefox is Version 51. You can... Read more

This article will get you a good spark about writing the programs in various languages like Ruby, PHP, Python, Perl, Bash, C, C++ and Java. All Credits goes to Mr. Chetan Soni – A Cyber Security Expert from India. 1.... Read more

Q1. What is a web browser? Answer – A web browser is a software program that runs on your computer and enables you to view web pages. Q2. What does HTML stand for? Answer – HTML stands for Hypertext Markup... Read more

361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man syslog -3 C. man -3 syslog D.... Read more
Recent Comments