Secure your Cpanel/WHM Server with 9 Easy Ways

WHM or Web Host Manager is a powerful program that permits administrative access to cPanel backend and also enables the user with more flexibility and control while managing some very popular resource intensive websites, or large no: of websites. WHM... Read more

15 Things You Need to Know About Maintaining The Logs

The following are some of the legal issues involved with creating and using logs that organizations and investigators must keep in mind: Logs must be created reasonably contemporaneously with the event under investigation. Log files cannot be tampered with. Someone... Read more

Understanding C++ and OOPs with an Example – Minimal Guide 2018

Each person can have his own reason for programming but it is one of the best ways to gain a deep understanding of computers and computer technology. Learning to program makes you understand why computers and computer programs work the... Read more

How To Get 5TB Free Cloud Storage Lifetime – 100% Working Method

There are a handful of cloud storage services that you can choose from: Google Drive, Dropbox and OneDrive are some of the major players in this market. They offer various competitive features in order to gain their users. However, it... Read more

Fantastic PHP Related Books – 2018 Update

PHP is a recursive acronym that stands for PHP: Hypertext Preprocessor; this is in the naming style of GNU, which stands for GNU’s Not Unix and which began this odd trend. The name isn’t a particularly good description of what... Read more

Computer RAM Questions with Answers – MCQ – 20 Set

1. Which of the following types of memory is used for cache memory? A. SRAM B. DRAM C. EDO RAM D. SDRAM 2. How many bits make up the data path of a 30-pin SIMM? A. 12 B. 8 C.... Read more

Source Code Hosting Resources – 2018 Compilation

A source code repository is a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept, either publicly or privately. They are often used by open-source software projects and... Read more

Most Popular Free Bootstrap Admin Panels [Free Download]

The Web has been around for more than 20 years now, experiencing euphoric early expansion, an economic-driven bust, an innovation-driven rebirth, and constant evolution along the way. One thing is certain: the Web as a communication and commercial medium is... Read more

334 Security fixes – Oracle issued Critical Patch Update

Oracle pushes a critical patch update for multiple security vulnerabilities which are usually cummulative but also affects so many other components. Oracle is working on Critical Patch Update since year 2014 and till date, they’ve released 18 other critical patch... Read more

How to Fully Anonymize Your Linux System with Tor using Nipe

Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by criminals enterprises, Hacktivism groups, and... Read more

Send Fake Mail using SETOOLKIT [Kali Linux]

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security elements such as firewalls, IDS/IPS, proxies, and honey pots deployed inside every organization, we hear news about how hackers compromise secured facilities... Read more

Certificate Transparency Monitoring – Facebook’s New Tool

Certificate Transparency is an open framework which helps log, audit and monitor publicly-trusted TLS certificates on the Internet. This new tool which is developed by Facebook lets you search for certificates issued for a given domain and subscribe to notifications... Read more

Sniff HTTP Post Data with Wireshark

Wireshark is a graphical network protocol analyzer that lets us take a deep dive into the individual packets moving around the network. Wireshark can be used to capture Ethernet, wireless, Bluetooth, and many other kinds of traffic. It can decode... Read more

Hack Wi-Fi Settings of Windows Machine Remotely [After Meterpreter]

The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 1700+ exploit definitions and 215 payloads for injection – a... Read more

Host Header Attack – Practical Exploitation and Prevention

The “HOST” header is part of the http protocol, vulnerable applications are vulnerable because they insert the value of this header into the application code without proper validation, this means not only applications hosted on Apache/Nginx can be vulnerable. For... Read more

Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]

Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they don’t rely on a specific version, and... Read more

Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]

Do you ever think twice before connecting to a free public wireless hotspot at a coffee shop, airport, or hotel? Did you ever stop to wonder if the public Wi-Fi hotspot you just connected to is a legitimate one, or... Read more

Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]

Wireless networking is a complex field.With countless standards, protocols, and implementations, it is not uncommon for administrators to encounter configuration issues that require sophisticated troubleshooting and analysis mechanisms. Traditional network sniffing on an Ethernet network is fairly easy to set up. In... Read more

Live Packet Sniffing with Python [Search][Post Data]

A sniffer is a program that monitors data traveling over a network. Unauthorized sniffers are dangerous to network security because they are difficult to detect and can be inserted almost anywhere, which makes them a favorite weapon of hackers. When... Read more