Buffer Overflow Attacks
Another way of attacking a system is called a buffer overflow (or buffer overrun) attack. Some experts would argue that the buffer overflow occurs as often as...
What is a Firewall ?
A firewall is a fence between your computer or your internal network and the outside world or the Internet. A particular firewall implementation might use one or...
Ethical Hacking – Famous Hackers
We will have a brief synopsis of some of the famous Hackers and how they became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as the first juvenile sent...
OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
[HINDI] What is DoS attack and DDoS attack?
Guys ye jo dono attack aapne abhi jo topic mai dekha ya pehle bhi shyad kbhi kahi dekha hoga ye cyber attack hai jo hackers rehte...
The History of Encryption
Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...
The OSI Model
The Open Systems Interconnect (OSI) model describes how networks communicate. It describes the various protocols and activities and states how the protocols and activities relate to each...
Burp Suite 2.0 beta now available
Burp Suite 2.0 beta is now available to Professional users.
This is a major upgrade, with a host of new features, including:
A new crawler, able to automatically handle sessions,...
TechHacker Pre-Hacking Giveaway Winners
Congratulations to all the winners. I really appreciate your participation. Keep going and all the best for your future in ethical hacking!
Arindam...
[Hindi] How Hackers Hack Social Media Accounts [lets try]
Hi Guys chaliye suru krte hai aaj ke naye topic ke upar ki hacker social media accounts kaise hack krte jaha tk mereko pta hai social...