Friday, December 15, 2017
open redirect

open redirect vulnerability exploitation & prevention

An open redirect is when a web application or server uses a user submitted link to redirect the user to a given website or page. Even though it seems like a harmless action, to...
Pentesting

Pentesting Tools You Will Ever Need

One of the best ways for businesses and corporations to defend themselves is through Penetration (Pentesting). This article will provide an overview of what Pen Testing is, its benefits, and the...

How to Back Date Your WordPress Posts

Is it possible to back date their WordPress posts? The answer is YES. WordPress allows you to change dates on any posts that you write. You can publish a post with...

The 9 Best Free Social Media Marketing Plugins for WordPress

Our contents should be promoted across leading social sites in order to divert more traffic and income. The main advantage of social media marketing is that it can generate huge massive...
regular expression

Regular expression in MySQL

A regular expression is a powerful way of specifying a pattern for a complex search. Operators: NOT REGEXP Negation of REGEXP REGEXP Pattern matching using regular expressions RLIKE Synonym of REGEXP   Syntax: A regular expression describes a set of strings....

How to Use SSH Tunneling

An ssh client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer. But it is client also allows you...

How to Enable Private Messaging in WordPress

We’re able to send private messages through social networking sites and instant messaging apps like WhatsApp. It’s very useful as we can discuss various things and share files on one to...

10 Things to do After Installing WordPress

The WordPress 5-minute install is great, nothing complicated about getting your blog up and running (most of the time). But once you install WordPress there are a number of other steps that you...

HOW TO STOP WASTING TIME ON SOCIAL MEDIA AND START DOMINATING

For such an omnipresent part of our modern lives, it’s easy to forget how recent the phenomenon of social media actually is. In little more than a decade, it’s gone from being the...
sql injection

SQL Injection Walkthrough

The following article will try to help beginners with SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction SQL injection is one of the type of web...

APLICATIONS

Text editor every penetration tester should rely on

Today I come up with three text editor every developer or penetration tester should use. Vi or Vim First text editor we're gonna discuss here...

HOT NEWS