SQL Injection Prevention – A Practical Approach

SQL injection is a technique, used to attack data-driven applications. Using this method, hackers will try to execute their SQL statements within your application and access your database data. Here is an example…

Read more

Types of Malware – Minimal Guide

Malware is unfortunately far too common to ignore or be unaware of in this day and age. So this article should hopefully remedy some of the common questions. We guess the first one…

Read more

Useful Commands while performing Local Enumeration in UNIX

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and…

Read more

PHP – Minimal Guide for Beginners

PHP is a general-purpose scripting language especially suited for Web development. It is open-source and can be deployed on all major operating systems and web servers free of charge. It is imperative, reflective and…

Read more

Important UNIX Files and their Permissions

Early Unix systems were mainly commercial commodities like most software for sale; to run the operating system, you generally had to pay for that right. In 1984 an engineer named Richard Stallman began work on…

Read more

PHP Error Reporting – Minimal Guide

Error reporting is a good thing, right? It gives you valuable insight into why your application failed. It gives you useful information such as what happened and where it happened. This information is…

Read more

The Windows Registry – Minimal Guide

The Windows Registry is a database where all the information about a computer is stored. The Registry is used to store: Operating system configuration Application configuration information Hardware configuration information User security information Current…

Read more

Basic Understanding of UNIX File System

File systems in the UNIX family have never been very well organized. Various incompatible naming conventions are used simultaneously, and different types of files are scattered randomly around the namespace. In many cases,…

Read more

Basics of Web – Minimal Guide

Hosting a web site isn’t substantially different from providing any other network service. A daemon listens for connections on TCP port 80 (the HTTP standard), accepts requests for documents, and transmits them to…

Read more

Importance of keywords in SEO

SEO Keywords are very important for web content which enables people to find your website through search engines. The good website which generates high traffic are well optimized for search engines , the…

Read more

18 Things to do after fresh installation of Windows 10

Microsoft Windows 10 brings a long list of important changes that any IT pro should look forward to, including major improvements in the user experience, significant security enhancements, and a new web browser…

Read more

14 Useful Windows 10 Tips and Tricks

While most common, day-to-day tasks of Windows administration can be performed from the GUI, it’s not always the best way, especially with complex or repetitive tasks. Scripts and command-line tools often provide a…

Read more

List of Metasploit Exploits/Modules for Metasploitable3 Vulnerable Machine

Metasploitable3 is another free VM that allows you to simulate attacks with one of the most popular exploitation framework i.e. Metasploit Framework. Metasploitable3 is a VM that is built from the ground up…

Read more

Windows 10 Shortcuts – 2018 Update

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every…

Read more

History of IIoT Cyber Attacks 2007 – 2016

The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back…

Read more

Top 20 Basic Kali Linux Commands

Kali Linux is an open source operating system developed by Offensive Security . It contains a bunch of security tools divided by categories for Penetration Testing or Ethical Hacking in a practical environment…

Read more

21 Must Have Firefox Plugins for Hackers – 2018 Update

As you know, Firefox is one of the most popular browser not by ranking but it also supports add-on/plugins to enhance the functionality. Mozilla has a website where you can find various plugins…

Read more

The 7 Best Freelance Websites to Find Jobs – 2018 Update

Maybe you have an annoying boss or an exhausting commute to work. But what are intrinsic motives to say goodbye to your job as a clerk and start as a self-employed person? Every…

Read more

Top 9 Web Development Frameworks based on PHP

Anyone who has designed web sites for any length of time knows the limitations of html and other client side languages like CSS and JavaScript. While these languages remain at the core of…

Read more

Top 7 Python Libraries for Networking Programming

Python was invented around 1990 by Guido van Rossum, when he was at CWI in Amsterdam. Despite the reptiles, it is named after the BBC comedy series Monty Python’s Flying Circus, of which…

Read more

Top 11 Graphics Utilities for MacOSX

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has tripled since 2005. In any case, you have 3 challenges. First, you’ll probably want to…

Read more

7 Best Python Libraries for Validating Data

If you are a system administrator, it is likely that you have encountered Perl, Bash or some other scripting language. You may have even used one or more yourself. Scripting languages are often…

Read more