Now this time, the hacker “OurMine” hacked almost all social accounts of HBO and posted a tweet – “Hi, Our?Mi?ne are here, we are just testing your security ,HBO team please contact us…
Read more
1. What is progressive download? Answer: Progressive download enables you to view streaming content as it is downloaded to your media player. With progressive downloads, you can watch live events as they take…
Read more
1. What is the difference between the ISM and SSM multicast models? Answer: With the ISM model, the routers in the network maintain source information. However, with SSM the receivers are responsible for…
Read more
1. In which layers of the OSI model does content networking reside? Answer: Content networking devices technically work at Layers 17, but true content networking services can be considered to reside in Layers…
Read more
Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. The courses at this year’s Black Hat information security conference taught more than…
Read more
Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…
Read more
As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…
Read more
Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…
Read more
Q176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….
Read more
As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…
Read more
Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…
Read more
Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….
Read more
Last month, the HBO hackers claimed that, they’ve stole around 1.5TB of data from HBO which includes the upcoming episodes of “Ballers” and “Room 104” and a script of 4th episode of “Game…
Read more
testssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). testssl.sh is a free command line tool which checks a server’s service on any…
Read more
A cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…
Read more
After the release of the 8-bit Nintendo Family Computer (Famicom) console in Japan in the summer of 1983, which was cheaper than the Sega and Atari consoles and allowed to download the game…
Read more
For the last few weeks Marcus Hutchins has been in Las Vegas attending a security conference, and on holiday. On Wednesday he was arrested on the flight home due to an indictment made…
Read more
Mozilla just launched a file sharing site named as “Send.firefox.com” through which you can easily send a file from one person to another. Basically its a file sharing experiment which allows you to…
Read more