Sunday, April 22, 2018
Home Featured

Featured

Featured posts

sql injection

SQL Injection Walkthrough

The following article will try to help beginners with SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction SQL injection is one of the type of web...
sqlmap

How to use sqlmap for automated database takeover

With SQLmap you can take over or dump full databases, can escalate privileges, bypass CSRF tokens, can detect XSS. It is very useful for parameter pollution or parameter fuzzing to bypass...

New Video Compares iPhone 7s Plus Dummy to iPhone 7 and 8

Apple is expected to release three iPhone models this year, though sometimes it can be hard to tell. While we’ve seen plenty of news and rumors concerning the iPhone 8, there has been a...

Crop and Resize Images With This Simple jQuery Plugin

Dynamic image cropping is easier than ever thanks to libraries such as jQuery. The codebase is easy to use and the community has thousands of plugins for handling images. One such plugin is Cropper, a...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
Zenmap GUI

How to use nmap for network mapping

Nmap (Network Mapper) is a free and open source utility for network discovery and security audit. It is useful for network inventory, managing services, and host. It uses RAW IP packets...
Pentesting

Pentesting Tools You Will Ever Need

One of the best ways for businesses and corporations to defend themselves is through Penetration (Pentesting). This article will provide an overview of what Pen Testing is, its benefits, and the...

Google Tilt Brush: Impossible now a reality?

(CNN)Artists, put down your brushes. It's time to step into the world of virtual reality. Google has unveiled Tilt Brush, its new app set to revolutionize the definition of painting and push the...
TOP Vulnerable Sites

Top Vulnerable Sites To test Your Hacking Skills

In this post, we are gonna discuss Vulnerable Sites To (Legally) Practice Your Hacking Skills which helps penetration testers, security enthusiasts, developers, and students to discover and to prevent web vulnerabilities ...

Facebook Messenger Instant Games to Get Live Streaming, Video Chats, and More

Highlights You can share live gameplay with your Facebook audience Facebook is testing playing games during video chats Games like Angry Birds and Sonic Jump coming to Instant Games next year Launched...

APLICATIONS

How to Display Estimated Post Reading Time in Your WordPress Posts

Do you want to display estimated post reading time in your WordPress blog posts? An estimated reading time encourages users to read a blog...

HOT NEWS