
We’re back with simple VulnHub CTF Walkthrough i.e. BULLDOG. We had a great time with this VM, and thought it was really fun and different from the others we’ve worked on so far. Download Link – https://www.vulnhub.com/entry/bulldog-1,211/ Releasing Date –... Read more

I hope you all knows the latest vulnerability i.e. Meltdown which has been discovered almost in every CPU having Intel Processor. These both vulnerabilities are basically hardware design flaws that attackers can easily exploit to access part of the memory... Read more

Shodan is one of the world’s first search engine for Internet-Connected devices. With the help of Shodan, you can easily discover which of your devices are connected to internet, where they are located and who is using them. Shodan has several... Read more

Anyone who has designed web sites for any length of time knows the limitations of html and other client side languages like CSS and JavaScript. While these languages remain at the core of web development, their primary function is to... Read more

Simply allowing logs to take up disk space, reviewing them only after something has happened and deleting logs when you run low on disk space are all the strategies of an admin doomed to always being in firefighting mode, reacting... Read more

Scalable Vector Graphics (SVG) is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation. The SVG specification is an open standard developed by the World Wide Web Consortium (W3C) since 1999. SVG images and their... Read more

If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages with the following books. As a web developer, you’ll work with a... Read more

Python was invented around 1990 by Guido van Rossum, when he was at CWI in Amsterdam. Despite the reptiles, it is named after the BBC comedy series Monty Python’s Flying Circus, of which Guido is a fan (see the following... Read more

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has tripled since 2005. In any case, you have 3 challenges. First, you’ll probably want to copy your Windows stuff over to the... Read more

To best optimize your website, it is important to understand how users interact with search engines. “We’re Number One !” That’s the dream of site owners everywhere, as they seek to attain the highest search engine rankings for their sites.... Read more

If you are a system administrator, it is likely that you have encountered Perl, Bash or some other scripting language. You may have even used one or more yourself. Scripting languages are often used to do repetitive, tedious work at... Read more

Something strange is happening. Your advertising doesn’t work anymore, at least not like it used to. You used to be able to buy some TV time or put an ad in a newspaper, but nowadays everyone has TiVo or a... Read more

You’re asking one question: “What makes Python different?” And the short answer is: “lots of things“. The longer answers starts by stating that there’s lots that’s familiar, too. Python is a lot like any other general-purpose programming language, with statements,... Read more

When you get right down to it, the job description of every operating system is pretty much the same. If you need a break from gaming, why not try launching your own small business? Utilize LLCBuddy to make the process... Read more

The command line interface (CLI) is a powerful tool that allows users to interact with their operating system through text-based commands. While macOS provides a user-friendly graphical interface, the command line can offer additional functionalities and efficiencies for advanced users... Read more

A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or keep them local only, change web passwords... Read more

When it comes to Web Development, JavaScript frameworks are one of the most favoured platform for developers & businesses in today’s time. Possibly, you have had a chance to experiment with one or two of the top JavaScript Frameworks too.... Read more

The Hacker’s Handbook is a non-fiction book from the 1980s effectively explaining how computer systems of the period were hacked. They actually explained the actual hacking attempts such as password hacking, brute forcing, ssh hacking etc. The very first edition... Read more
Recent Comments