Thursday , November 15 2018

November, 2017

  • 17 November

    The Web Developer Bootcamp

    Miscellaneous Hi! Welcome to the Web Developer Bootcamp, the best path you need to study net development. There are lots of alternatives for on line developer training, however this course is honestly the maximum comprehensive and effective in the marketplace. Here’s why:   This is the best online direction taught …

  • 16 November

    Tracing the Evolution Cryptography

    Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is …

  • 14 November

    How to Delete WhatsApp Messages Even After Days Not Only after 7 Minutes – WhatsApp Bug

    Delete WhatsApp messages from Everyone Even After Few Months Or Hrs Or Year:  Recently, WhatsApp introduced the very new Features in WhatsApp which was to delete the message from sender to receiver within just 7 minutes otherwise you might not be able to delete, But due to this small bug …

  • 13 November

    Knowing Operating Systems Microsoft Windows

    Understanding Operating Systems: We all say more about operating systems when we discuss scanning and enumeration, but for now, we are interested in laying out the fundamentals of each of the standard Oss on the market today. Remember Achilles from Greek mythology? The here who got shot in the heel …

  • 11 November

    Proxies and Firewalls

    Proxies and Firewalls: No network device discussion would be complete without delving into the world of proxies and firewalls. These devices are the bread and butter of ethical hackers in that they are the devices deliberately put in place to prevent unauthorized access. To test the strength of an organization’s …

  • 10 November

    Digital Millennium Copyright Act (DMCA)

    Digital Millennium Copyright Act (DMCA): The DMCA is not often considered in a discussion of hacking and the question of information security, but it is relevant. The DMCA was passed in 1998 to implement the World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty). The WIPO Treaty requires treaty parties …

  • 9 November

    Session Hijacking and Web Apps

    Session Hijacking and Web Apps: Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the victim. Essentially, a session ID is an identifier the “conversation” it is having with the client. So, for example, say that you have logged in …

  • 8 November

    Ethics and The Law

    Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, …

  • 7 November

    Understanding Hashing

    Understanding Hashing Simply yet, hashing can be considered a type of one-way encryption. Most accurately, it is a process that creates a scrambled output that cannot be reversed—or at least cannot be reversed easily. The process of hashing takes plain text and transforms it into cipher text but does so …

  • 6 November

    The Robots.txt File

    The Robots.txt File One way to begin understanding what’s running on a web server is to view the server’s robots.txt file. The robots.txt file is a listing of the directories and files on a web server that the owner wants web crawlers to omit from the indexing process. A web …