Wednesday, October 17, 2018
Home Featured

Featured

Featured posts

Zenmap GUI

How to use nmap for network mapping

Nmap (Network Mapper) is a free and open source utility for network discovery and security audit. It is useful for network inventory, managing services, and host. It uses RAW IP packets...
Pentesting

Pentesting Tools You Will Ever Need

One of the best ways for businesses and corporations to defend themselves is through Penetration (Pentesting). This article will provide an overview of what Pen Testing is, its benefits, and the...

How to use weevely for post-exploitation

Weevely is a stealthy and tiny command line web shell that stimulate terminal like connection. It is designed for remote server administration and penetration testing. This shell is useful for web...

New Video Compares iPhone 7s Plus Dummy to iPhone 7 and 8

Apple is expected to release three iPhone models this year, though sometimes it can be hard to tell. While we’ve seen plenty of news and rumors concerning the iPhone 8, there has been a...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
sql injection

SQL Injection Walkthrough

The following article will try to help beginners with SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction SQL injection is one of the type of web...

How to Add Custom Login URL in WordPress

Did you know that anyone can easily find your WordPress login URL. Recently, one of our readers asked if it was possible to change the default WordPress login URL to a custom...

Building a Chatbot App for iOS with Dialogflow (API.AI) and Text-to-Speech

With the latest release of Apple’s Core ML, developers are one step closer to building Artificial Intelligence apps with ease. While image recognition and text detection are great examples of apps...
regular expression

Regular expression in MySQL

A regular expression is a powerful way of specifying a pattern for a complex search. Operators: NOT REGEXP Negation of REGEXP REGEXP Pattern matching using regular expressions RLIKE Synonym of REGEXP   Syntax: A regular expression describes a set of strings....

Crop and Resize Images With This Simple jQuery Plugin

Dynamic image cropping is easier than ever thanks to libraries such as jQuery. The codebase is easy to use and the community has thousands of plugins for handling images. One such plugin is Cropper, a...

APLICATIONS

Facebook Shut Down AI After It Invented Its Own Language

Researches at Facebook shut down an artificial intelligence (AI) program after it created its own language, Digital Journal reports. The system developed code words to make communication...

HOT NEWS