On October 5, 1991, Linus Benedict Torvalds, a graduate student from the University of Helsinki in Finland, announced in a Usenet newsgroup that he had created a small UNIX-like operating system called Linux….
Read more
Alright, far too often (especially in the IRC channels) there is a time where even the most beginner of users are faced with the terminal. It has many names: terminal, shell, console, “command…
Read more
In this article, we’ll cover two methods through which you can easily test your website loading speed and some other performance factors like Lookup Time, Connect Time, Pre-Transfer Time and Start-Transfer Time. To…
Read more
Kali Linux is the most recent live disk security distribution released by Offensive Security. The latest version i.e. Kali Linux 2017.3 has over 600 security and penetration testing tools included, categorized into helpful groups most…
Read more
Static program analysis is the analysis of computer software that is performed without actually executing programs. In most cases the analysis is performed on some version of the source code, and in the…
Read more
According to the reports, approx 14% of the BTC and ETHER supply have been compromised by the hackers in less than a decade, said by Lex Sokolin, Director of Autonomous Research LLP. When…
Read more
So OnePlus has finally admits that more than 40,000 user’s credit card details have been breached and used in multiple fraudulent transactions who made purchases on its official website in the period of…
Read more
As we’ve discussed earlier, that how we actually deauthenticate a wireless device with the help of aircrack-ng tool suite package by flooding a network with deauthenticate packets. To deauthenticate any wireless device/router/client, its…
Read more
As you all knows profile creation sites are very very useful to create backlinks which actually increase your domain authority rank and results large number of traffic to your website. Getting backlinks for…
Read more
Today we’re are going to show you how to make a reverse shell of any Linux machine. Here in this scenario, we are using two linux based VMs, One is Kali Linux(2017.2) and…
Read more
For decompiling an android application, the open source tool which we’ll use is “dex2jar“. Download Link – Dex2jar.zip (Extract in any location) Sample Application – yeahhub.apk (Download & Extract/Move into dex2jar folder) About…
Read more
1. Autospy Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate…
Read more
Anyone can, with the right equipment, access wireless networks (wireless local area networks, wlan’s). After all, there is no physical barrier that makes break-in attempts more difficult, as is the case with wired…
Read more
Reverse-engineering is especially important with computer hardware and software. Programs are written in a language, say C, C++ or Java, that’s understandable by other programmers. But to run on a computer, they have…
Read more
For those who are interested in learning how to do Penetration Testing, there are many tools and operating systems are available, but very few targets to practice against safely – not to mention…
Read more
Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers….
Read more
1. Common Vulnerabilities and Exposures (CVE) CVE (Common Vulnerability and Exposures) is a list of entries, each containing an identification number, a description, and at least one public reference – for publicly known…
Read more
1. Nudge4j Nudge4j is a tiny piece of Java code to make your Java application accessible to the browser. It’s meant for use during development to provide an environment for experimenting with code…
Read more
A conference is a meeting of people who “confer” about a topic. Conference types include: Convention (meeting), meeting of a, usually large, group of individuals and/or companies in a certain field; Academic conference,…
Read more
1. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software 1st Edition Amazon Buy Link – https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901 Price – $28.78 (Paperback) & $34.35 (Kindle) Rating – 4.5 out of 5 Nostarch Link – https://nostarch.com/malware…
Read more