Blackbuntu CE v0.2 Released
As we have discussed about different penetration testing distribution before here. Now a new distribution is among us and this is BlackBuntu new edition.
The...
Penetration Testing vs Vulnerability Assessment
Penetration testing and Vulnerability assessment what actually a difference, it is a complicated topic to be discussed. People are often classified as the same...
Virtual Machine
Introduction A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is...
Create Your Own Virus: Malware[Episode 3]
Episode 2 Episode 1
Welcome my friends with the new episode of Malware as i told you on previous episode that i will tell you...
Linux VS Windows
Most of us are still using windows operating system like some people uses windows XP,7 or vista. As you are interested in...
How To Trace An Email Address
Now a days Email or Electronic mail are the fastest way to communicate, Email are widely used for personal and for business...
Introduction To Firewalls
You have heard so many times “use firewalls to protect your computer”, in this article we are going to talk about firewalls....
File-Sharing A Security Risk
File sharing is the process of sharing or making data available to others to download from internet or from a local network....
Cool Javascript Effects
There comes a point in time where we want to do some amazing and eye catching stuff, javascript is a cool and...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...