Tutorials

Complete PHP Tutorial – Chapter 3

In this tutorial, you’ll learn about PHP Variables, Constants and Parameters. Regular Variables Variables are containers which we use for storing information. PHP variables work a bit differently to other languages so I suggest you pay close attention here. A variable starts with a dollar sign ($) which is then followed by the name of […]

Tutorials

Complete PHP Tutorial – Chapter 2

In previous chapter, you’ve learned about basics of PHP, Installation and XAMPP and in this tutorial we’ll cover PHP Tags & Comments. PHP Tags – All scripts start and end with these tags: PHP Code: <?php //Your code goes here. ?> The PHP tags can be placed anywhere in your document. Here is an example […]

Tutorials

Complete PHP Tutorial – Chapter 1

PHP: Hypertext Preprocessor (PHP) is a free, open source, scripting language that is made primarily for the creation of dynamic websites. It is compatible with almost all modern servers and PHP scripts are always executed on the server. We would suggest a simple understanding of HTML which you can get a short taste of in […]

Tech Articles

Mobile Application Penetration testing Checklist 2016

Client Side – Static and Dynamic analysis Test Name Description Tool OWASP Applicable Platform Result Reverse Engineering the Application Code Disassembling and Decompiling the application, Obfuscation checking apktool, dex2jar, Clutch, Classdump M10 All Issue Hard-coded credentials on sourcecode Identify sensitive information on sourecode string, jdgui, IDA, Hopper M2 All Issue Insecure version of Android OS […]

Tech Articles

Anatomy of VPNs – Top 10 Facts about VPN

Hello, we’ve recently been hearing a lot of people wondering which VPN is the best for keeping your information safe. We have personally compiled the complete list of necessities for when you’re picking out which VPN you will trust with all of your sensitive data. So, a big part in choosing the right VPN is […]

Tech Articles

Kali Linux 2016.2 has been launched

As you all knows, Kali Linux is one of the best open source Operating System used by Penetration Testers and Security Experts. It has wide range of hacking and scanning tools like Password Cracking, Nessus, Nmap, Wi-Fi Cracking, Bruteforce, WLAN Exploitation, Information Gathering Etc.. Now the latest version of Kali Linux is 2016.2 so called […]

Tech Articles

A complete guide on Doxing – 2016 Tutorial

Doxing, is the term used for the process of gathering personal information on a slave/target, although this does commonly take place over the internet, this isn’t always the case. There are many methods of doxing, and various tools available over the internet. Here are the some list of websites which may be useful for you […]

Tech Articles

About Banking Malwares and its Prevention – 2016 Guide

Today we’ll discuss about the hijack method used in banking sector i.e. botnets to steal money or some sensitive information from the user. What are these botnets used for? They are used for many different purposes like gathering private details, logins to websites, credit card information, bank logins, PayPal accounts etc. If you can use […]

Tech Offers

Get .com domain for just 1$ or 67 INR – New Method 2016 Latest

Yes, 1$ .com domain offer is now back and the best thing is you can book as many domains you want to book with single account. BookMyIdentity, an ICANN accredited domain registrar that provides you quality laden yet affordable domain registration, web hosting, email hosting, website builder, website security packages & beyond! For Outside INDIA […]

Tech Articles

Checklist for performing security testing on web applications

For every businessman, development of website is much important as it acts as a  most important promotional tool for his products and services. By Developing a website means, your website should be secured enough so that no one can break it down. and for that security testing, we made one checklist in which we listed […]