1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? A. COM1 B. LPT1 C. COM2 D. LPT2 2. What is the default…
Read moreEveryone who has been involved with IT for more than a few months has at least heard of MySQL. The acquisition of MySQL AB by Sun Microsystems brought a great deal of additional…
Read moreMeet Ihsan Sencan, a security researcher from Turkey who found more than 15+ SQL Injection Vulnerabilities in various Joomla Components in just one day and all related exploits have been published to various…
Read moreA security expert Belahsan Ouerghi has shed light on a new hacking tool called DVR Exploiter that exploits the CVE-2018-9995 vulnerability against IoT devices. It is able to extract account credentials of DVR…
Read more1. Which of the following components is not usually found on a motherboard? A. Hard drive controller B. DVD drive controller C. Memory D. Video adapter 2. What type of memory is not…
Read morePython is a general purpose programming language that is often applied in scripting roles. It is commonly defined as an object-oriented scripting language – a definition that blends support for OOP with an…
Read moreDesigning the database is a key step, largely because changes to the database at a later date have far larger implications and potential complications than changing any other aspect of the site. Adding functionality through…
Read moreA hash is always a useful when you need to verify the integrity of any file. To check the integrity of your system, you can create a baseline of file hashes, and periodically…
Read morePython is one of those rare languages which can claim to be both simple and powerful. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple…
Read moreNmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scan), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scan, Xmas Tree, SYN Scan and null scan. Nmap also…
Read moreWireless technology has become increasingly popular as it allows you to easily access the Internet from all sorts of locations around the world without requiring a network cable. But a wireless network isn’t…
Read moreThere are plenty of ways to make your password secure, but most people just don’t bother. It is much easier to set a password that is easy to remember, but hackers rely on…
Read moreUNIX treats every object in the operating system as a file. We can find the files associated with every action performed and can make use of them for different system- or process-related manipulations….
Read moreDatabase A repository to store data. For example, a database might store all of the data associated with finance in a large company, information about your CD and DVD collection, or the records…
Read moreIn a previous tutorial, we used PowerShell Empire v2.3.0 for post exploitation of Windows Operating System. The same can also be done with one of the most popular toolkit named as Social Engineering Toolkit (SETOOLKIT) which…
Read moreWe have compiled a full list of Internet Media Types which you can easily use while development. “Internet Media Type” is the same as a MIME type. MIME types were originally created for…
Read moreThe OpenDreambox project aims to bring an open and extensible image to the Dreambox receivers and to provided viable alternatives to other images that are kept closed-source by their authors. In this OpenDreambox…
Read morePassword is a key or a Secret word or a string of characters which is used to protect your assets or information from others in the cyber world. It is used for authentication,…
Read more