Tech Articles

Top 5 Online Ethical Hacking Platforms – 2018 Update

The most visible features of a Web application that intruders will note and immediately seek to exploit are vulnerabilities in the Web server software itself. No matter the simplicity or strength of the design, no application can stand for very long on a┬ámortally vulnerable server platform. This article seeks to catalog some of the most […]

Tech Articles

List of Vulnerable Web/Mobile/OS Projects – 2018 Update

Testers usually maintain a library of the current and historical operating systems. When testing Microsoft operating systems, Windows XP is used as the reference standard to test vulnerabilities. Although Windows XP will be deprecated in 2014 and no longer supported by Microsoft, it will remain on many networks in servers and workstations as well as […]