Purpose of Linux File System Structure

The arrangement of files in a Linux system may seem at first to be a semi-arbitrary arrangement of files and directories, based on historic practice. To an extent that’s true, but over the…

Read more

List of all MIME’s, their Type, Extension Name and Description

Multipurpose Internet Mail Extension (MIME) is an accepted system of extensions used on computer systems. Such a standardization makes it easy to specify a file type and feel confident other computers will understand it. This…

Read more

Most Common Font Style-sheet Properties in CSS

There are many style sheet properties available for each of the HTML physical and logical styles. CSS also enables you to add emphasis in many ways not possible with HTML. For example, while…

Read more

16 Malicious Terms which you need to know

The need to define a unified nomenclature for malicious programs is almost as old as computer viruses themselves. Obviously, each classification has a common pitfall because classes will always appear to overlap, and…

Read more

Classification of Wireless Network Attacks 2017

In the wireless industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. All types of Wireless networks are vulnerable to the following attacks and their classifications: 1….

Read more

List of all Environment Variables – Batch File Programming

Environment variables are special variables that contain its values set by the operating system itself, other applications or by manual. Environment variables are set to reduce tasks and code complexity by calling them in…

Read more

Overview of 157 Linux Basic Commands

People who don’t know what Linux is sometimes ask us if it’s a program that runs on Microsoft Windows. When we tell them that Linux is, itself, an operating system like Windows and that they…

Read more

Most Commonly Used Ports assigned by IANA

A port is an extension of an address, similar to adding an apartment or room number to a street address. A letter with a street address will arrive at the correct apartment building,…

Read more

Kali Linux 2017.3 – A 3rd release in year 2017

Kali Linux is a Linux-based penetration testing operating system that aids security professionals in performing assessments in a purely native environment dedicated to security and hacking. Kali Linux is a distribution based on…

Read more

Top 5 Vulnerability Research Websites – #CyberSecurity

1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of Homeland Security’s). The…

Read more

Do’s and Don’ts in SEO – Search Engine Optimization

The process of SEO has never been more important. Search engines, such as Google, Yahoo, and Bing, have developed an impressive ability to deliver relevant search results to a user’s queries. How well a site is ranked…

Read more

WordPress pushed an emergency new update 4.8.3 – SQL Injection Bug

WordPress is one of the world’s most popular content management systems! It has been installed more than 76.5 million times. According to a report issued by Sucuri, an Internet security company, WordPress is…

Read more

A Brief Overview of Kali Linux Tools

Kali Linux offers a number of customized tools designed for Penetration Testing. Tools are categorized in the following groups as seen in the drop-down menu shown in the following screenshot: Information Gathering: These…

Read more

Denial of Service – Attack | Types | Countermeasures

Internet-facing systems are constantly in danger from a variety of threats. Of these threats is a DoS attack, which involves a single system, or a DDoS attack that involves many distributed systems, as both…

Read more

Nmap gets a new look and feel with NMapGUI

NMapGUI is an advanced graphical user interface for NMap network analysis tool. It allows to extend and ease the typical usage of NMap by providen a visual and fast interface with the application….

Read more

OWASP Top 10 – RC2 Final Released [A4, A8 and A10] Added

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. All the OWASP tools, documents, videos…

Read more

Top 10 Features – Windows 10 Fall Creators Update (Must See)

Windows 10 is one of the most stable and secured operating system ever released from Microsoft and now this time by 17th October, Microsoft rolled out Windows 10 Fall Creators Update (10 AM…

Read more

Krack Attack – Core Protocol Level Attack in WPA2 Wi-Fi Network

WPA2 Protocol is one of the most using protocol for Wireless networks now a days but due to latest research, WPA2 can easily be cracked and the handshake traffic can be manipulated to…

Read more

Top 18 PHP Code Analysis Resources – 2017 Compilation List

As you all knows PHP is one of the most popular server side language and is widely used open source general purpose scripting language that is specially suited for web development and can…

Read more

Kali Linux 2017.2 Updated and Newly Added Tools List

Kali Linux 2017.2 was released on September 20, 2017. This release is a roll-up of all updates and fixes since our 2017.1 release in April. More than a dozen Open Source tools present on GitHub…

Read more

Kali Linux 2017.2 has been released with new tools

Kali Linux is a Debian-based distribution with a collection of security and forensics tools. The new version of Kali Linux i.e. 2017.2 is already been out with awesome features and is available for…

Read more

Meterpreter Commands in Detail 2017 – Metasploit Framework

After a successful exploit a Meterpreter shell allows you to perform many different functions along with a full remote shell. Meterpreter is great for manipulating a system once you get a remote connection,…

Read more