Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…
Read moreAs per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…
Read moreMonit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…
Read moreQ176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….
Read moreAs you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…
Read moreSpaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…
Read moreKali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….
Read moreLast month, the HBO hackers claimed that, they’ve stole around 1.5TB of data from HBO which includes the upcoming episodes of “Ballers” and “Room 104” and a script of 4th episode of “Game…
Read moretestssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). testssl.sh is a free command line tool which checks a server’s service on any…
Read moreA cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…
Read moreAfter the release of the 8-bit Nintendo Family Computer (Famicom) console in Japan in the summer of 1983, which was cheaper than the Sega and Atari consoles and allowed to download the game…
Read moreFor the last few weeks Marcus Hutchins has been in Las Vegas attending a security conference, and on holiday. On Wednesday he was arrested on the flight home due to an indictment made…
Read moreMozilla just launched a file sharing site named as “Send.firefox.com” through which you can easily send a file from one person to another. Basically its a file sharing experiment which allows you to…
Read moreAndrowarn is one of the most popular static code analyzer for malicious android applications whose main aim is to detect and warn the user about potential malicious behaviours. Features of Androwarn – Structural…
Read morePenetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet…
Read more