Basics of Web – Minimal Guide

Hosting a web site isn’t substantially different from providing any other network service. A daemon listens for connections on TCP port 80 (the HTTP standard), accepts requests for documents, and transmits them to…

Read more

Importance of keywords in SEO

SEO Keywords are very important for web content which enables people to find your website through search engines. The good website which generates high traffic are well optimized for search engines , the…

Read more

Microsoft + 33 Other Companies Join hands to fight Cyber Attacks – Cyber Security Tech Accord

Microsoft join hands with other 34 global leading tech companies like Facebook, Google, Dell etc to fight with Cyber Attacks. We can’t deny that, cyber attacks are increasing day by day. Cyber Criminals…

Read more

[PHP] IF-ELSE Statement – A new way around

Writing PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and blogs like the one…

Read more

18 Things to do after fresh installation of Windows 10

Microsoft Windows 10 brings a long list of important changes that any IT pro should look forward to, including major improvements in the user experience, significant security enhancements, and a new web browser…

Read more

Future of Finance and Tech: From Bhiwani to Blockchain

Just when we thought the heat has finally settled on the Bitcoin debate, it looks like Blockchain has opened new doors for more feverish arguments and ideas on what the future of tech…

Read more

How to download any APK file directly online

As we all knows, in Android, there are so many applications who are country specific or device specific which you can’t directly download from your google play account. Example, to download the latest…

Read more

14 Useful Windows 10 Tips and Tricks

While most common, day-to-day tasks of Windows administration can be performed from the GUI, it’s not always the best way, especially with complex or repetitive tasks. Scripts and command-line tools often provide a…

Read more

Twitter Compromised ! Change Your Password Right Now – May 2018

Data breach hits organizations squarely in the wallet. The average cost per record goes up depending on who or what caused the exposure. Three out of four shoppers have had their personal information…

Read more

List of Metasploit Exploits/Modules for Metasploitable3 Vulnerable Machine

Metasploitable3 is another free VM that allows you to simulate attacks with one of the most popular exploitation framework i.e. Metasploit Framework. Metasploitable3 is a VM that is built from the ground up…

Read more

Privilege Escalation via SQL Injection in Joomla 3.8.3 – Live Exploitation

It is common knowledge that there are bad people attacking systems on the Internet, regardless of the nature of the business. As a defensive countermeasure, organizations put their trust in solutions for defense…

Read more

Magento – Installation Step By Step Tutorial

In this age, when it can sometimes seem like every system is connected to every other system, dealing with data has become a major ingredient in building the Web. Whether you will be delivering…

Read more

Windows 10 Shortcuts – 2018 Update

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every…

Read more

General Computer MCQ with Answers – 45 Questions

1. What is the size of a sector on a hard disk? A. 512K B. 1K C. 512 bytes D. 4K 2. How many devices can exist in an IDE chain? A. 1…

Read more

History of IIoT Cyber Attacks 2007 – 2016

The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back…

Read more

Bruteforce Password Cracking with Medusa – Kali Linux

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes in place of hair. Medusa is a speedy, parallel, and modular, login brute-forcer….

Read more

Top 20 Basic Kali Linux Commands

Kali Linux is an open source operating system developed by Offensive Security . It contains a bunch of security tools divided by categories for Penetration Testing or Ethical Hacking in a practical environment…

Read more

21 Must Have Firefox Plugins for Hackers – 2018 Update

As you know, Firefox is one of the most popular browser not by ranking but it also supports add-on/plugins to enhance the functionality. Mozilla has a website where you can find various plugins…

Read more

How to encode Base64 in most popular programming languages

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. The example below uses ASCII text for simplicity, but…

Read more

CMS & Exploit Kit Detection with WhatCMS

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows,…

Read more

Crimemail CTF Writeup – Solution

This Crimemail CTF is brought you by InSecurity, a student society from INSA Lyon (France). The Flag format should be look like INSA{…} Collins Hackle is a notorious bad guy who is behind…

Read more

[Solution] Disable the detectportal.firefox.com requests in Burp Suite

Approx a year back, Mozilla added a new feature “Captive Portal” support to Firefox browser in an attempt to enhance usability when connecting to free Wi-Fi portals. Captive Portal feature covers the detection…

Read more