Sunday, April 22, 2018
Email

Email Security and it’s Simple Explanation

Nearly everyone with a computer uses Email, putting a lot of trust in the technology to keep information as secure as possible. Email security and the privacy of the messages is...
sql injection

SQL Injection Walkthrough

The following article will try to help beginners with SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction SQL injection is one of the type of web...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
clonezilla

Clonezilla to clone your computer hard drive

There are plenty of backup programs out on the internet to keep your files safe, very few are capable of making an exact copy of your hard drive, complete with passwords,...
syskey

Syskey to secure Security Accounts Management (SAM) database

SysKey is an inbuilt Windows utility that can help you secure the Security Accounts Management or SAM database. It can optionally be configured to require the user to enter the key...
Veracrypt

Veracrypt for windows system drive encryption

VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). No data stored on an encrypted volume can be read (decrypted) without using the correct password/key file(s)...
RIPS

RIPS static source code analyser for PHP web applications

RIPS is a static code analysis tool to automatically detect vulnerabilities in a PHP web application. By parsing all source files RIPS is able to transform PHP source code into a...
twitter

Twitter other application clients for android

For a long time, twitter android client just wasn't very good compared to its iOS Client. So it is best to use third party twitter clients for best use. Even though...
xss payload

How to XSS with file upload functionality

Sometimes file upload functionality is vulnerable to XSS attack if there is a lack of sanitization. User restricted area with an uploaded image or profile picture is everywhere, providing more chances...
Zenmap GUI

How to use nmap for network mapping

Nmap (Network Mapper) is a free and open source utility for network discovery and security audit. It is useful for network inventory, managing services, and host. It uses RAW IP packets...

LATEST NEWS

MUST READ