Home Random

Random

Blackbuntu CE v0.2 Released

As we have discussed about different penetration testing distribution before here. Now a new distribution is among us and this is BlackBuntu new edition. The...

Penetration Testing vs Vulnerability Assessment

Penetration testing and Vulnerability assessment what actually a difference, it is a complicated topic to be discussed. People are often classified as the same...

Virtual Machine

Introduction  A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is...

Create Your Own Virus: Malware[Episode 3]

Episode 2    Episode 1 Welcome my friends with the new episode of Malware as i told you on previous episode that i will tell you...

Linux VS Windows

Most of us are still using windows operating system like some people uses windows XP,7 or vista. As you are interested in...

How To Trace An Email Address

Now a days Email or Electronic mail are the fastest way to communicate, Email are widely used for personal and for business...

Introduction To Firewalls

You have heard so many times “use firewalls to protect your computer”, in this article we are going to talk about firewalls....

File-Sharing A Security Risk

File sharing is the process of sharing or making data available to others to download from internet or from a local network....

Cool Javascript Effects

There comes a point in time where we want to do some amazing and eye catching stuff, javascript is a cool and...
- Advertisment -

Most Read

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...

Digital Forensics Investigation using Autopsy In Kali Linux

Autopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of...