What we know so far about cryptographic vulnerabilities

Weak or home-grown algorithms A common mistake developers make is to use weak or flawed encryption/hashing algorithms. For example, many developers use md5 or sha1 as their hashing algorithm of choice. Using a…

Read more

Privacy Protection on Windows 10 Operating System

Windows 10 helps you reduce the cost and complexity historically associated with managing and deploying Windows devices. With Windows as a service, you receive a continuous innovation so you are always up to…

Read more

Why Do Password Practices Matter – A Detailed Explanation?

Good password practices are critical for the following reasons: The most common form of attack on a corporate system is password guessing. On most systems, most untrusted services are protected primarily by passwords…

Read more

List of all HTTP Server Response Codes – 2017 Updated List

When you visit a web page, your computer’s web browser communicates with the web server of the website. Your web browser, also known as the client, submits a request to the web server…

Read more

Complete Understanding of Web Application Security – 2017

1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure…

Read more

6 Things to do after installing Kali Linux

Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….

Read more

Top 65 OWASP Cheat Sheet Collections – ALL IN ONE

A cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…

Read more

MSFVENOM – All payload examples – Cheatsheet 2017

Msfvenom is a Metasploit Standalone Payload Generator which is a replacement of msfpayload and msfencode. Through msfvenom, you can generate any kind of shellcode/payload depending upon the platform/OS you want to hack. Often…

Read more

Meterpreter Useful Top 60 Commands List – 2017 Update

Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby…

Read more

Penetration Testing Quick Cheatsheet v1.0 – 2017

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet…

Read more

Top 4 Vulnerable Websites to Practice your Skills

With the help of ready made vulnerable applications, you actually get a good enhancement of your skills because it provides you an environment where you can break and hack legally allowing you to…

Read more

Top 16 SEO Performance Factors for better Optimization

A web page is composed of multiple features. There are so many SEO tools are also available through which you can also boost your SEO ranking in short manner. Here are the ones…

Read more

Malware evasion techniques – 2017 Update

Technology advances have significantly changed our lives during the past decade. We rely on computers of various sorts for even the simplest of daily tasks and become stressed when they are not available…

Read more

How to deal with Petya Ransomware – Prevention Tips 2017

As you all knows, recently Petya Ransomware comes into existence and affected more than 65+ countries. Many organizations in Europe and the US have been affected by this ransomware attack. Although its not…

Read more

How to start a website – Complete Guide 2017

Whether you want to start a website for fun or to make money, you’ll first have to learn how to make a website. Making a website is not difficult at all. In fact…

Read more

9 Steps to Ensure your organization is secure

To protect your business, an end-to-end security strategy that encompasses these many considerations is a must. Defining and communication your board’s information Risk Regime is central to your organization’s overall cyber security strategy….

Read more

Protect your data before your system crashed

First thing to keep in mind: If your computer hasn’t crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now: BACK-UP! Buy some decent…

Read more

OWASP Top 10 – 2017 is out and yet to release soon for public

OWASP means The Open Web Application Security Project is a worldwide free and open community focused on improving the security of application software. Their mission is to make application security “Visible” so that…

Read more

Top 10 PHP Project Ideas for Beginners only – 2017

PHP stands for Hypertext Preprocessor and is widely used open source programming language. It can easily embedded into HTML and mainly used with MYSQL Databases. With PHP you can develop dynamic web pages…

Read more

Necessity of Computer Security – 2017 Guide

When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government…

Read more