A programming language is a formal language combination of a set of instructions that produce various kinds of results. Programming languages are used in computer…
Top 10 Web Application Vulnerability Scanning Tools
What is web Application Vulnerability Scanning? A web application security scanner is a software program which performs automatic black-box testing on a web application and…
Top 5 Network Security Monitoring Tools
What is Network Security? Network security is a wide term that covers a multitude of technologies, devices and processes. It is a set of rules…
What is Shodan? Basic Usage of Shodan.io
What is Shodan? Shodan is a search engine for finding specific devices, and device types, that exist online. Shodan collects data mostly on web servers…
What is Packet Sniffer? List of Password sniffers
A packet sniffer is can be a software or hardware tool to intercept, log, and analyze network traffic and data. These tools support in the…
What are Port Numbers? List of Known Ports?
What is port numbers in Networking? Well-Known” are port numbers that have been reserved for common applications, typically server applications. The port numbers assigned to…
What is Encryption? Top 3 Encryption tools?
What is Encryption? Encryption is a process that converts a message or file so that it can be only be read by authenticate user. Encryption…
What is SIEM? Top SIEM Tools Software Solutions 2020
SIEM or Security information and event management is a set of tools that combines security, event & management and security information management. These both systems…
What is MITM? Types of MITM
A Man-in-the-Middle (MITM) attack takes place when a hacker attacks a user and a website. This type of attack happens in different. For example, a…
How To Setup Linux Firewall With UFW
The Uncomplicated Firewall (ufw) is a frontend for iptables and is particularly well-suited for host-based firewalls. Its main goal is to make managing your firewall…
Do you Forgot Password For RHEL 7 Or CENTOS 7? 7 Steps to recover it
Forgot your RHEL 7 or CentOS 7 Linux root password? Do you want to recover it? Follow 7 easy steps to gain root user access.…
What is Bug Bounty? Top Bug Bounty Programs of 2020
A bug bounty program is offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs present…
Top Secret codes for Android phones
USSD (Unstructured Supplementary Service Data), sometimes known as “quick codes” or “cheat codes”, is a UI protocol, which allows people to access hidden features of…
Top 10 security tips for Online Security
Online safety or cyber safety or E-Safety is trying to be safe on the internet and is the act of maximizing a user’s awareness of…
How To Map Linux Directory In Windows Explorer
While using ssh, we can access linux directories in windows explorer through map network option. For doing this follow these steps Step 1 Installation We…
su & sudo COMMANDS IN LINUX
System administrators, and in some cases users, need to perform certain tasks with administrative access. Accessing the system as the root user is potentially dangerous…