We’re back with simple VulnHub CTF Walkthrough i.e. BULLDOG. We had a great time with this VM, and thought it was really fun and different from the others we’ve worked on so far….
Read moreI hope you all knows the latest vulnerability i.e. Meltdown which has been discovered almost in every CPU having Intel Processor. These both vulnerabilities are basically hardware design flaws that attackers can easily…
Read moreShodan is one of the world’s first search engine for Internet-Connected devices. With the help of Shodan, you can easily discover which of your devices are connected to internet, where they are located and…
Read moreAnyone who has designed web sites for any length of time knows the limitations of html and other client side languages like CSS and JavaScript. While these languages remain at the core of…
Read moreSimply allowing logs to take up disk space, reviewing them only after something has happened and deleting logs when you run low on disk space are all the strategies of an admin doomed…
Read moreScalable Vector Graphics (SVG) is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation. The SVG specification is an open standard developed by the World Wide Web Consortium…
Read moreIf you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages with the following books. As…
Read morePython was invented around 1990 by Guido van Rossum, when he was at CWI in Amsterdam. Despite the reptiles, it is named after the BBC comedy series Monty Python’s Flying Circus, of which…
Read moreApple was the only computer company whose sales actually increased during the recession. The Mac’s market share has tripled since 2005. In any case, you have 3 challenges. First, you’ll probably want to…
Read moreTo best optimize your website, it is important to understand how users interact with search engines. “We’re Number One !” That’s the dream of site owners everywhere, as they seek to attain the…
Read moreIf you are a system administrator, it is likely that you have encountered Perl, Bash or some other scripting language. You may have even used one or more yourself. Scripting languages are often…
Read moreSomething strange is happening. Your advertising doesn’t work anymore, at least not like it used to. You used to be able to buy some TV time or put an ad in a newspaper,…
Read moreYou’re asking one question: “What makes Python different?” And the short answer is: “lots of things“. The longer answers starts by stating that there’s lots that’s familiar, too. Python is a lot like…
Read moreWhen you get right down to it, the job description of every operating system is pretty much the same. If you need a break from gaming, why not try launching your own small…
Read moreThe command line interface (CLI) is a powerful tool that allows users to interact with their operating system through text-based commands. While macOS provides a user-friendly graphical interface, the command line can offer…
Read moreA while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or…
Read moreWhen it comes to Web Development, JavaScript frameworks are one of the most favoured platform for developers & businesses in today’s time. Possibly, you have had a chance to experiment with one or…
Read moreThe Hacker’s Handbook is a non-fiction book from the 1980s effectively explaining how computer systems of the period were hacked. They actually explained the actual hacking attempts such as password hacking, brute forcing,…
Read more