Phishing has emerged as an effective method to steal the personal and confidential data of users. It is an Internet scam that tricks users into divulging their personal and confidential information by making…
Read more
Before a command is executed, its input and output may be redirected using a special notation interpreted by the shell. Redirection allows commands’ file handles to be duplicated, opened, closed, made to refer…
Read more
Bash, which is the default shell in Linux contains a whole lot of key bindings which makes it really easy to use. The most commonly used shortcuts are listed below: Also Read: Bash External…
Read more
Bash is the standard shell on most Linux distributions. However, there are other Linux shells available and there’s no requirement that Bash should be present on any particular distribution. The Bash shell is open source…
Read more
A shell is a program that runs operating system commands. Bash has more than 50 predefined variables.These variables, created when Bash is first started, provide information about the Bash session and can be used…
Read more
WHM or Web Host Manager is a powerful program that permits administrative access to cPanel backend and also enables the user with more flexibility and control while managing some very popular resource intensive…
Read more
The following are some of the legal issues involved with creating and using logs that organizations and investigators must keep in mind: Logs must be created reasonably contemporaneously with the event under investigation….
Read more
Each person can have his own reason for programming but it is one of the best ways to gain a deep understanding of computers and computer technology. Learning to program makes you understand…
Read more
A source code repository is a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept, either publicly or privately. They are…
Read more
The Web has been around for more than 20 years now, experiencing euphoric early expansion, an economic-driven bust, an innovation-driven rebirth, and constant evolution along the way. One thing is certain: the Web…
Read more
Oracle pushes a critical patch update for multiple security vulnerabilities which are usually cummulative but also affects so many other components. Oracle is working on Critical Patch Update since year 2014 and till…
Read more
Certificate Transparency is an open framework which helps log, audit and monitor publicly-trusted TLS certificates on the Internet. This new tool which is developed by Facebook lets you search for certificates issued for…
Read more
Wireless Networks have become ubiquitous in today’s world. Millions of people use it worldwide every day at their homes, offices and public hotspots to logon to the Internet and do both personal and…
Read more
The below list includes the ports on all the popular Web and database servers. Port Server 66 Oracle SQL*Net 80 Hyper Text Transfer Protocol (HTTP) 81 HTTP Proxy, Alternative HTTP Port, Cobalt Server…
Read more
Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. Burp is highly functional and provides an intuitive and user-friendly interface. Its proxy function…
Read more
SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It…
Read more
There are some great resources for analyzing your site’s speed such as Google’s PageSpeed Insights, Website Grader, and GTMetrix are the most popular. All services will analyze your site and tell you where…
Read more