The History of Encryption
Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...
What is Information Security?
Information security sometimes shortened to Infosec. It is not all about securing information from unauthorized access.Basically,Information Security is...
TechHacker Pre-Hacking Giveaway Winners
Congratulations to all the winners. I really appreciate your participation. Keep going and all the best for your future in ethical hacking!
Arindam...
Buffer Overflow Attacks
Another way of attacking a system is called a buffer overflow (or buffer overrun) attack. Some experts would argue that the buffer overflow occurs as often as...
Ethical Hacking – Terminologies
Following is a list of important terms used in the field of hacking.
Adware − Adware is software designed to force pre-chosen ads to display on your system.
Attack...
Burp Suite 2.0 beta now available
Burp Suite 2.0 beta is now available to Professional users.
This is a major upgrade, with a host of new features, including:
A new crawler, able to automatically handle sessions,...
All Core Features of GitHub is Now Free for Everyone
GitHub has been able to cram in a lot of features for free for everyone who was paid before. How did that happen? - Microsoft's acquisition.
Ethical Hacking – Famous Hackers
We will have a brief synopsis of some of the famous Hackers and how they became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as the first juvenile sent...
Session Hijacking
Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...