Tech Articles

OWASP Top 10 – 2017 is out and yet to release soon for public

OWASP means The Open Web Application Security Project is a worldwide free and open community focused on improving the security of application software. Their mission is to make application security “Visible” so that people and organizations can make informed decisions about their risks. OWASP is a non-profit chartiable organization that ensures the ongoing availability and […]

Tutorials

Storing Files/Data with PHP & MySQL – Detailed Tutorial 2017

At some point, most web programmers are going to need to learn databases. They’re the premier way to store information in an online environment, and they’re often the most efficient solution. But do they have limits as to what they can be used for? That’s what we’re going to talk about in this article. This […]

Tutorials

PHP with MySQL Connectivity – Detailed Tutorial (CRUD)

One of the defining features of PHP(Hypertext Preprocessor) is the versatility it offers for connection to, and manipulation with databases. In this article, we look at some features of the PHP with MySQL combination which includes: Connect to MySQL DB Server (Testing of MySQL Connection) Create new Database (New Database) Select MySQL Database (Selection of […]

Tech Articles

Top 10 PHP Project Ideas for Beginners only – 2017

PHP stands for Hypertext Preprocessor and is widely used open source programming language. It can easily embedded into HTML and mainly used with MYSQL Databases. With PHP you can develop dynamic web pages with database connectivity and can easily control all the functions. If you have been learning PHP recently, it can be a bit […]

Tutorials

Get Free Kali Linux on AWS with Public IP – Real Time Penetration Testing

As you all knows, Kali Linux is one of the most popular penetration testing OS with more than 1000s of hacking tools pre-installed in it like Metasploit Framework, Air-crack Package for Wireless Cracking, various Network Scanning Tools, Web Application Scanning Tools like wpscan, joomscan etc. In this article, you’ll learn a complete installation of Kali […]

Tech Articles

Necessity of Computer Security – 2017 Guide

When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government and industry. But few laymen, even if they were aware of the machines, could see the connection. Experts too, were sceptical. Not […]

Tech Articles

Overview of Web Application Security Testing & Compliance

In the modern age the software applications has become an integral part of an organization. Due to their so much involvement in this area they have become the new arena for security domains. As the need of software applications is rising so as the users using them. These applications must be available 24/7 & keep […]