
Weak or home-grown algorithms A common mistake developers make is to use weak or flawed encryption/hashing algorithms. For example, many developers use md5 or sha1 as their hashing algorithm of choice. Using a…
Read more
Windows 10 helps you reduce the cost and complexity historically associated with managing and deploying Windows devices. With Windows as a service, you receive a continuous innovation so you are always up to…
Read more
Good password practices are critical for the following reasons: The most common form of attack on a corporate system is password guessing. On most systems, most untrusted services are protected primarily by passwords…
Read more
1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure…
Read more
Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….
Read more
A cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…
Read more
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet…
Read more
With the help of ready made vulnerable applications, you actually get a good enhancement of your skills because it provides you an environment where you can break and hack legally allowing you to…
Read more
A web page is composed of multiple features. There are so many SEO tools are also available through which you can also boost your SEO ranking in short manner. Here are the ones…
Read more
Technology advances have significantly changed our lives during the past decade. We rely on computers of various sorts for even the simplest of daily tasks and become stressed when they are not available…
Read more
As you all knows, recently Petya Ransomware comes into existence and affected more than 65+ countries. Many organizations in Europe and the US have been affected by this ransomware attack. Although its not…
Read more
Whether you want to start a website for fun or to make money, you’ll first have to learn how to make a website. Making a website is not difficult at all. In fact…
Read more
To protect your business, an end-to-end security strategy that encompasses these many considerations is a must. Defining and communication your board’s information Risk Regime is central to your organization’s overall cyber security strategy….
Read more
First thing to keep in mind: If your computer hasn’t crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now: BACK-UP! Buy some decent…
Read more
OWASP means The Open Web Application Security Project is a worldwide free and open community focused on improving the security of application software. Their mission is to make application security “Visible” so that…
Read more
If you thought a car running on air is a far-fetched dream, think again. Yes you are hearing it right, the founders of Pirate Bay which is the most popular torrent website has…
Read more
When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government…
Read more
As you all knows, today we are going to celebrate Safer Internet Day i.e. on 7th of February 2017 with Google. No doubt!, our world is progressing towards a cashless economy, do you…
Read more