5 Best Python Libraries for working with HTTP

You’re asking one question: “What makes Python different?” And the short answer is: “lots of things“. The longer answers starts by stating that there’s lots that’s familiar, too. Python is a lot like…

Read more

Top 13 Free JavaScript Frameworks for Web Developers – 2018 Update

When it comes to Web Development, JavaScript frameworks are one of the most favoured platform for developers & businesses in today’s time. Possibly, you have had a chance to experiment with one or…

Read more

Common Linux Features

On October 5, 1991, Linus Benedict Torvalds, a graduate student from the University of Helsinki in Finland, announced in a Usenet newsgroup that he had created a small UNIX-like operating system called Linux….

Read more

Top 11 Facts about Linux Shell Terminal

Alright, far too often (especially in the IRC channels) there is a time where even the most beginner of users are faced with the terminal. It has many names: terminal, shell, console, “command…

Read more

Top 6 Static Analyzers for different languages

Static program analysis is the analysis of computer software that is performed without actually executing programs. In most cases the analysis is performed on some version of the source code, and in the…

Read more

Top 10 Penetration Testing Distributions – 2018 Update

For those who are interested in learning how to do Penetration Testing, there are many tools and operating  systems are available, but very few targets to practice against safely – not to mention…

Read more

Top 4 Network Vulnerability Scanners

Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers….

Read more

List of all Vulnerability Databases Resources – 2018 Compilation

1. Common Vulnerabilities and Exposures (CVE)  CVE (Common Vulnerability and Exposures) is a list of entries, each containing an identification number, a description, and at least one public reference – for publicly known…

Read more

List of all 31 Information Security Conferences all around the globe

A conference is a meeting of people who “confer” about a topic. Conference types include: Convention (meeting), meeting of a, usually large, group of individuals and/or companies in a certain field; Academic conference,…

Read more

Penetration Testing Resources – 2018 Compilation

A Penetration test is the process of actively evaluating company’s information security measures. Security measures are actively analyzed for design weakness, technical flaws and vulnerabilities. The results are delivered comprehensively in a report,…

Read more

Simple Tips to Prevent SQL Injection Vulnerability

As seen from the previous articles, SQL injection has the ability to attack a web server database, compromise critical information, and expose the server and the database to a variety of malicious exploits;…

Read more

50 Important terms related to Database – Updated List 2017

1. Character Set: A character set is a specification that determines the set of codes used to represent the characters of a particular language or set of languages. Among the oldest character sets…

Read more

The Top Security Vulnerabilities

Unvalidated data Never trust anything you get from a Web browser. The browser is completely outside of your control, and it’s easy to fake values like the HTTP referrer. It’s also easy to…

Read more

Top Hashing Algorithms and their Output Size

Cryptography is essentially used for converting plain text into cipher text to ensure confidentiality. If a user has the appropriate key, the cipher text can be reversed to get the original plain text….

Read more

Top 10 Bluetooth Threats which you need to know

Although Bluetooth is extremely convenient for short-range wireless data transfers, it also has several security risks if not configured and used securely. Following are some of the common Bluetooth threats: 1. Loss of…

Read more

Mitigations for Common Web Application Flaws

The most prominent components of web applications that intruders will first seek to exploit are vulnerabilities within the web platform. The web platform commonly includes: Web server software (such as IIS or Apache)….

Read more

Web Application Hacking Methodology

Web application hacking is not just about using automated tools to find common vulnerabilities. It is indeed a methodological approach that, if followed, would help reveal many more flaws and potential security vulnerabilities. The…

Read more

Top 5 Components of an Android Application

From an end-user perspective, an Android application may appear as a simple standalone application. However, any Android application consists of many components that work in the background to accomplish the given task. Android…

Read more

5 Steps – Wireless Hacking Methodology

The use of wireless networks has increased exponentially over the last decade or so. Wi-Fi is being extensively used not only by corporate organizations but also by individuals and home users. If you…

Read more

Top 6 techniques to bypass an IDS (Intrusion Detection System)

Most intrusion detection systems work on a signature basis. It’s quite possible for the attacker to create a custom packet payload that won’t match any of the signatures in the predefined database of…

Read more

Top 6 Symptoms of an Intrusion

Whenever there’s an intrusion into a system (human or malware), it makes a lot of changes in various parts of the affected system. The intrusion might create new files or delete existing ones, change…

Read more

Purpose of Linux File System Structure

The arrangement of files in a Linux system may seem at first to be a semi-arbitrary arrangement of files and directories, based on historic practice. To an extent that’s true, but over the…

Read more