
Fibonacci Series is a series of numbers in which each number (Fibonacci number) is the sum of the two preceding numbers. The simplest is the series 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144 etc. As... Read more

The PHP Data Objects (PDO) extension defines a lightweight, consistent interface for accessing databases in PHP. Each database driver that implements the PDO interface can expose database-specific features as regular extension functions. Note that you cannot perform any database functions... Read more

SocialFish is an open source tool through which you can easily create a phishing page of most popular websites like Facebook/Twitter/Github etc and can even be integrated with NGROK which is an another open source tunnel service which forward your... Read more

Wireless Networks have become ubiquitous in today’s world. Millions of people use it worldwide every day at their homes, offices and public hotspots to logon to the Internet and do both personal and professional work. Well, of course, you knew... Read more

Wireless technology has become increasingly popular as it allows you to easily access the Internet from all sorts of locations around the world without requiring a network cable. But a wireless network isn’t always secure if you don’t understand its... Read more

The below list includes the ports on all the popular Web and database servers. Port Server 66 Oracle SQL*Net 80 Hyper Text Transfer Protocol (HTTP) 81 HTTP Proxy, Alternative HTTP Port, Cobalt Server Administration Port 443 Secure Socket Layer (SSL)... Read more

Today we’re gonna exploit one of the most popular PHP function i.e. preg_replace() which is used by many developers and can further lead to a Code Execution vulnerability. The preg_replace() function operates just like POSIX function ereg_replace(), except that regular... Read more

Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. Burp is highly functional and provides an intuitive and user-friendly interface. Its proxy function allows configuration of very fine-grained interception rules, and... Read more

1. You have a USB camera in which you are trying to copy some of the pictures to the computer’s hard disk. The computer does not seem to recognize the device. What should you do? A. Check to see that... Read more

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes... Read more

As we come to rely more and more on massively interconnected networks, the stability and security of those networks becomes more vital than ever. The world of business has adopted information technology to help streamline processes, increase productivity, and cut costs.... Read more

MAC Address generally called as Multimedia Access Control, and you should change your MAC Address before to do any hacking activity through Kali Linux so that no one can trace you actually back. Before to change or assign new MAC... Read more

Creating HTML pages dynamically is one half of what a content management system (CMS) does: it takes chunks of code (your content) and pieces them together into a single HTML page. The other function of a CMS is to provide... Read more
Recent Comments