List of Security Related RSS Feeds – Bookmark 2018

RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple Syndication) is a type of web feed which allows users to access updates to online content in a standardized, computer-readable format….

Read more

Important Links – Report Phishing Links & Suspicious Emails

Phishing has emerged as an effective method to steal the personal and confidential data of users. It is an Internet scam that tricks users into divulging their personal and confidential information by making…

Read more

List of All Bash Redirections – Linux Cheatsheet 2018

Before a command is executed, its input and output may be redirected using a special notation interpreted by the shell. Redirection allows commands’ file handles to be duplicated, opened, closed, made to refer…

Read more

List of All Bash CTRL and ALT Key Shortcuts – Linux 2018

Bash, which is the default shell in Linux contains a whole lot of key bindings which makes it really easy to use. The most commonly used shortcuts are listed below: Also Read: Bash External…

Read more

List of All Bash Inbuilt Variables – Linux 2018

Bash is the standard shell on most Linux distributions. However, there are other Linux shells available and there’s no requirement that Bash should be present on any particular distribution. The Bash shell is open source…

Read more

List of All Bash External Variables – Linux 2018

In last article, we discussed out Bash Environment Variables which always play an important role in Bash Shell Scripting and here in this article, we listed out all Bash External Variables which you…

Read more

List of All Bash Environment Variables – Linux 2018

A shell is a program that runs operating system commands. Bash has more than 50 predefined variables.These variables, created when Bash is first started, provide information about the Bash session and can be used…

Read more

Secure your Cpanel/WHM Server with 9 Easy Ways

WHM or Web Host Manager is a powerful program that permits administrative access to cPanel backend and also enables the user with more flexibility and control while managing some very popular resource intensive…

Read more

15 Things You Need to Know About Maintaining The Logs

The following are some of the legal issues involved with creating and using logs that organizations and investigators must keep in mind: Logs must be created reasonably contemporaneously with the event under investigation….

Read more

Understanding C++ and OOPs with an Example – Minimal Guide 2018

Each person can have his own reason for programming but it is one of the best ways to gain a deep understanding of computers and computer technology. Learning to program makes you understand…

Read more

Source Code Hosting Resources – 2018 Compilation

A source code repository is a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept, either publicly or privately. They are…

Read more

Most Popular Free Bootstrap Admin Panels [Free Download]

The Web has been around for more than 20 years now, experiencing euphoric early expansion, an economic-driven bust, an innovation-driven rebirth, and constant evolution along the way. One thing is certain: the Web…

Read more

334 Security fixes – Oracle issued Critical Patch Update

Oracle pushes a critical patch update for multiple security vulnerabilities which are usually cummulative but also affects so many other components. Oracle is working on Critical Patch Update since year 2014 and till…

Read more

Certificate Transparency Monitoring – Facebook’s New Tool

Certificate Transparency is an open framework which helps log, audit and monitor publicly-trusted TLS certificates on the Internet. This new tool which is developed by Facebook lets you search for certificates issued for…

Read more

PHP Learning Resources [Compilation List 2018]

PHP, which stands for PHP Hypertext Preprocessor, is a server-side embedded scripting language. In non-technical terms: a PHP processor is run on the server (Windows, or a flavor of UNIX). When a page is requested…

Read more

Wireless WPA3 – Released with biggest security update

Wireless Networks have become ubiquitous in today’s world. Millions of people use it worldwide every day at their homes, offices and public hotspots to logon to the Internet and do both personal and…

Read more

List of HTTP/1.1 Methods [2018 Update]

1. GET Method The GET method is used to retrieve whatever is stored or produced by the resource located at the specified Request-URI. The GET method can be used to request files, to…

Read more

[Ports List] Popular Web and Database Servers

The below list includes the ports on all the popular Web and database servers. Port Server 66 Oracle SQL*Net 80 Hyper Text Transfer Protocol (HTTP) 81 HTTP Proxy, Alternative HTTP Port, Cobalt Server…

Read more

19 Most Useful Plugins for Burp Suite [Penetration Testing]

Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing.  Burp is highly functional and provides an intuitive and user-friendly interface. Its proxy function…

Read more

4 Best ways to Prevent SQL Injection Vulnerability [PHP]

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It…

Read more

Metasploit DB Commands [Cheatsheet 2018]

The post exploitation phase always begins after you have compromised one or more systems but you’re not even close to being done yet. Metasploit generally offers more than one interface to its underlying…

Read more

25 Easy ways to speed up your website – June 2018 Tips and Tricks

There are some great resources for analyzing your site’s speed such as Google’s PageSpeed Insights, Website Grader, and GTMetrix are the most popular. All services will analyze your site and tell you where…

Read more