Burp Suite 2.0 beta now available
Burp Suite 2.0 beta is now available to Professional users.
This is a major upgrade, with a host of new features, including:
A new crawler, able to automatically handle sessions,...
[HINDI] What is DoS attack and DDoS attack?
Guys ye jo dono attack aapne abhi jo topic mai dekha ya pehle bhi shyad kbhi kahi dekha hoga ye cyber attack hai jo hackers rehte...
Introduction To Cyber Security
Introduction
Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks. It can be made up of two words one...
Ethical Hacking – Famous Hackers
We will have a brief synopsis of some of the famous Hackers and how they became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as the first juvenile sent...
Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
How Firewalls work and Types of Firewalls
To control access to a system we need firewalls. A firewall is a device (usually a router or a computer) installed between the internal network of an organization and...
Components, Processes, and Implementation of IDS
Regardless of what IDS you select, they all have certain components in common. It is important to have a general understanding of these components.
Each DNS attack now costs finance companies an average of £1.1m
The average cost of a DNS attack in the financial services industry has risen by 40 per cent over the last year to $1.3m (£1.1m), according to new research.
A...
[HINDI] What is juice jacking? Think twice before using public USB ports
What is juice jacking?
Hello Guys aaj hum aaye hai ek aur interesting topic jo hai juice jacking toh phir abhi iska naam sunke...
Modern Encryption Methods
Modern methods of encryption are more secure than the historical methods discussed in the previous section. All the methods discussed in this section are in use today...