Tech Articles

Metasploit Framework – A Post Exploitation Tool – Hacker’s Favorite Tool

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Metasploit is a tool which is used by penetration testers and security experts for post exploitation. With the help of this tool, you can hack any Windows/Linux Operating System, it has inbuilt […]

Tech Articles

A Complete list of MS-DOS Commands

Below is a listing of the top MS-DOS commands most commonly used and that you will most likely be using during a normal DOS session. Aansi.sys – This command defines the functions that change display graphics, control cursor movement, and reassign keys. append- Causes MS-DOS to look in other directories when editing a file or […]

Tech Articles

A Comprehensive Guide to WordPress Security

In this article we’d like to enumerate a number of suggestions/tips on how to improve security on your own WordPress website. Make sure that your are using latest version of WordPress. Your All Themes and Plugins should be updated. There should be only ONE Administrator Account. Don’t use “admin” as a Username. Your Password must […]