Database A repository to store data. For example, a database might store all of the data associated with finance in a large company, information about your CD and DVD collection, or the records…
Read more
In a previous tutorial, we used PowerShell Empire v2.3.0 for post exploitation of Windows Operating System. The same can also be done with one of the most popular toolkit named as Social Engineering Toolkit (SETOOLKIT) which…
Read more
We have compiled a full list of Internet Media Types which you can easily use while development. “Internet Media Type” is the same as a MIME type. MIME types were originally created for…
Read more
The OpenDreambox project aims to bring an open and extensible image to the Dreambox receivers and to provided viable alternatives to other images that are kept closed-source by their authors. In this OpenDreambox…
Read more
Password is a key or a Secret word or a string of characters which is used to protect your assets or information from others in the cyber world. It is used for authentication,…
Read more
rDNS or Reverse DNS is just the opposite of fDNS or Forward DNS. rDNS simply maps the address with hostname. Typically, the DNS is used to determine what IP address is associated with…
Read more
If you are using somehow a managed or unmanaged VPS server then this article will definitely helps you to create a backup of your webserver on schedule basis with the help of cronjob….
Read more
SEO is sometimes also called SEO copyrighting because most of the techniques that are used to promote sites in search engines deal with text and images. Videos, images, and infographics are best ways to…
Read more
The psychology of image search is different from regular searches. Image searchers are usually more patient. At the same time, they are pickier. Therefore, optimizing your images makes sense. The added benefit of…
Read more
A 404 error is an HTTP status code that means that the page you were trying to reach on a website couldn’t be found on their server. At some point, a visitor is…
Read more
The Linux tar command stands for tap archive, is not a compressed file and commonly called as a collection (which contains the contents of many files) of a single file. Tar is the…
Read more
As part of a security audit, evaluation, and “pentesting“, a command execution vulnerability may be discovered (RCE – Remote Command Execution). The listener quickly needs to have a full interactive shell depending on…
Read more
cURL is the magical utility that allows developers to download a URL’s content, explore response headers, get stock quotes, confirm our GZip encoding is working, and much more. One more great usage of…
Read more
Netstat is a built in command line tool that provides you with information about TCP connections, network statistics and IP routing table. As it is built in, there is nothing to download. It…
Read more
To check the host the alive or not, we always use PING Command. The “ping” command is built into both Windows and UNIX machines as a universal way of testing network response time and…
Read more
Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless…
Read more
A 404 Page Error or Not Found error is displayed when you go to a page that doesn’t exist within an active website. One of the most common errors you can come across…
Read more
In the early 90’s GNU/Linux systems consisted of little more than a beta – quality Linux kernel and a small collection of software ported from the GNU project. It was a true hacker’s…
Read more
Windows Defender Security Intelligence (WDSI), formerly known as Microsoft Malware Protection Center (MMPC), is committed to helping Microsoft customers. With Windows Defender Security Intelligence (WDSI) you can explore in-depth threat encyclopedia for information…
Read more
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such…
Read more