fbpx
Home Random

Random

Blackbuntu CE v0.2 Released

As we have discussed about different penetration testing distribution before here. Now a new distribution is among us and this is BlackBuntu new edition. The...

Penetration Testing vs Vulnerability Assessment

Penetration testing and Vulnerability assessment what actually a difference, it is a complicated topic to be discussed. People are often classified as the same...

Virtual Machine

Introduction  A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is...

Create Your Own Virus: Malware[Episode 3]

Episode 2    Episode 1 Welcome my friends with the new episode of Malware as i told you on previous episode that i will tell you...

Linux VS Windows

Most of us are still using windows operating system like some people uses windows XP,7 or vista. As you are interested in...

How To Trace An Email Address

Now a days Email or Electronic mail are the fastest way to communicate, Email are widely used for personal and for business...

Introduction To Firewalls

You have heard so many times “use firewalls to protect your computer”, in this article we are going to talk about firewalls....

File-Sharing A Security Risk

File sharing is the process of sharing or making data available to others to download from internet or from a local network....

Cool Javascript Effects

There comes a point in time where we want to do some amazing and eye catching stuff, javascript is a cool and...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...