Wednesday, January 24, 2018
Home Featured

Featured

Featured posts

New Video Compares iPhone 7s Plus Dummy to iPhone 7 and 8

Apple is expected to release three iPhone models this year, though sometimes it can be hard to tell. While we’ve seen plenty of news and rumors concerning the iPhone 8, there has been a...

Crop and Resize Images With This Simple jQuery Plugin

Dynamic image cropping is easier than ever thanks to libraries such as jQuery. The codebase is easy to use and the community has thousands of plugins for handling images. One such plugin is Cropper, a...

Google Tilt Brush: Impossible now a reality?

(CNN)Artists, put down your brushes. It's time to step into the world of virtual reality. Google has unveiled Tilt Brush, its new app set to revolutionize the definition of painting and push the...
sqlmap

How to use sqlmap for automated database takeover

With SQLmap you can take over or dump full databases, can escalate privileges, bypass CSRF tokens, can detect XSS. It is very useful for parameter pollution or parameter fuzzing to bypass...
Zenmap GUI

How to use nmap for network mapping

Nmap (Network Mapper) is a free and open source utility for network discovery and security audit. It is useful for network inventory, managing services, and host. It uses RAW IP packets...
TOP Vulnerable Sites

Top Vulnerable Sites To test Your Hacking Skills

In this post, we are gonna discuss Vulnerable Sites To (Legally) Practice Your Hacking Skills which helps penetration testers, security enthusiasts, developers, and students to discover and to prevent web vulnerabilities ...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
open redirect

open redirect vulnerability exploitation & prevention

An open redirect is when a web application or server uses a user submitted link to redirect the user to a given website or page. Even though it seems like a harmless action, to...
regular expression

Regular expression in MySQL

A regular expression is a powerful way of specifying a pattern for a complex search. Operators: NOT REGEXP Negation of REGEXP REGEXP Pattern matching using regular expressions RLIKE Synonym of REGEXP   Syntax: A regular expression describes a set of strings....

11 WordPress Themes for Startups and Small Businesses

You can’t grow a business by placing an ad in the yellow pages and sitting back to wait for customers or clients to show up. In today’s competitive business environment, it’s...

APLICATIONS

Just Custom Fields for WordPress plugin

Custom Post Types announced in WordPress 3.0 brought back popularity to WordPress sites among clients and developers. WordPress is quite easy for newbies in web and it’s very easy and self-explanatory...

HOT NEWS