Archive for March 2011

Why Patch Management?

A person who heard the term 'patch management' a few years ago would probably have been forgiven if he/she thought that it was some kind of obscure unit in a needlework course! Today, however, patch management is used to refer to an activity that should be a central element of any network security strategy.

BlueJacking- BlueTooth Hacks

Bluetooth has design and used for short distance communication, it is an open wireless protocol and operate on the frequency of 2.4 GHZ. Now a days mobile phones, laptops and PDA devices has a built in bluetooth option to use. It can use over a range of 10 meter.

How to Crack Password-Protected Zip Files

People using Zip to compress their files beside compression they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important files and now you have forgotten password, now what to do now its time to crack it.
This article will teach you how to crack the password of Zip files.


UCSniff- IP Video & VoIP Sniffer

In a corporate sector network administrator and user's has a mis-conception that the VoIP and IP video is secure and it does not going to hack, IP video conference can be easily hacked by using some free-ware tools, these tools allow to monitor and sniff the video in real time.


4 Most Common Web Attacking Techniques

If you want to secure your web application than first you must know about the common types of web attack and you should first attack on your web application to check that if it is vulnerable or not, for this purpose in this article we will talk about the most common type attacking technique that will cause a web server to compromise.

7 Security Tips For Smartphone

As the mobile is the most common device to access the web world wide, Smart phones has been changed the way of mobility and the user's using their smart phones for the tasks such as online shopping, accessing bank account, connecting their friends and social networking etc.

Inguma - A Free Penetration Testing Toolkit

As we have discussed about different automatic penetration testing and vulnerability scanning tools before for both windows and linux plate form. In this article we will talk about inguma, inguma is a free penetration testing and vulnerability research toolkit.

It is written in python it is available for both command line and GUI (Graphical User Interface) interface.
 

Netsparker- Free Web Application Security Scanner

As i have shared different vulnerabilities and security scanners before, but in this article we will talk about netsparker, I am very happy to write about netsparker because it is one of my favourite web application security scanner on windows plate form.

There are different challenges and security flaw may occur on a web application and a penetration tester must check each and every link.

7 Best Security Tools In Ubuntu

Ubuntu is a computer operating system that is based on Linux/GNU, it is a free and open source operating system a free community developed it. Ubuntu is available and can be use for both desktop and server. It is easy to install and use both via flash drive or via compact disk.


How Does AntiVirus Work

The Antivirus is a Software that detect harmful Software's or programs  like Computer Virus, Computer Worms, Trojan Horses, Spyware, Ad-ware. Antivirus are one of the most important part of a computer and save us from many dangers every day. But the Question arises that how do they work?


Maltego- Information Gathering Tool Tutorial

This article is link with our series article on footprinting (Information gathering) for previous story click here.
Now beside whois,Nslookup and tracert command there are some tools that available on market to perform footprinting professionally, these tools provide a wide range of option and techniques to perform a valuable footprinting.  

Top Free Android Antivirus

There is no doubt that the security and the performance of any application and operating system is the key point to measure is overall performance. No matter about your operating system because viruses develop and make daily basis for every applications and operating systems.
I think you well aware about anti-viruses that are available for windows based and linux based operating system.

Wapiti-Web application vulnerability scanner

As we have shared some web application vulnerability scanner to use and find the vulnerable on your web application,Websecurify can be work on multiple plate form like windows, Linux and Mac. While there are some tools that works only on Linux plate form and that tools are reliable and easy to work.
So you need to scan a web application for various means and for various attack(s).

FootPrinting-Information Gathering Tutorial

As we have discussed about footprinting yes the first step of ethical hacking/penetration testing, if you have not read the previous article than you should read it than you will clearly understand the terminologies and the objective of this article click here.
We are living in the age of information, information is very important and on the first step a researcher try to get the maximum information about the target.

6 Effective Tips To Secure A Apache Web Server

Apache HTTP Server commonly known as Apache web server is running since 1999 but in 2009 it became the first web server software to surpass the 100 million web site milestone.
It is a power and flexible HTTP server and it provides many features like DBMS (Database Management System), Content negotiation and Virtual host etc. It is an open source and developed by an open source community, apache is available for various operating system including Windows, Linux,MAC, Solaris and FreeBSD etc.

Websecurify- Website Security Testing Tool

Security of a website is a very important for any organisation or for personal websites. You have to check the security of your website and you should find the vulnerability into your website before that an attacker will find it and exploit it.
If an attacker find the way that will cause the great harm for your website. They are different vulnerabilities that might be occur on your website, the famous attacks like SQL-I and XSS etc.