
Security, privacy and data integrity are important properties of today’s Internet applications and protocols.The security and confidentiality of millions of Internet transactions per day depend upon the Secure Socket Layer (SSL)/Transport Layer Security…
Read more
The network interface controller (NIC) is a hardware card that allows a PC to participate in passing and receiving data on a network. An NIC is commonly referred to as an NIC card,…
Read more
Like many successful dot-com era startups, Amazon found itself with an enviable problem at the turn of the century: the scale of their business had grown beyond the capacities of any available pre-packaged…
Read more
You must be familiar with the term IP address. Just like your home has a mailing address in the same way any computer or device connected to the internet have a mailing address…
Read more
Despite some high profile security issues, SSL (and TLS) remain the standards for ensuring secure communications and commerce on the web, and has seen dramatic growth in recent years. When SSL was conceived…
Read more
The public IP address is what you see online when you access them from your computer. If you want to try to connect to your computer via a remote connection that isn’t on…
Read more
The Apache HTTP Server, colloquially called Apache, is the world’s most used web server software. As of November 2015, Apache was estimated to serve 50% of all active websites and 37% of the…
Read more
While solving CTF or bug bounty challenges, sometimes you need to find out the IP address of the machine because that machine is not logged in at that time. We realize that some people…
Read more
If you’re in the market for a wireless network adapter, then you always got confused that which adapter is the best adapter. This USB adapter must compact enough to fit in your pocket…
Read more
A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploited this vulnerability could take control of an affected system. An…
Read more
This article describe how to quickly enable SSL for local apache web server under Linux. This has been done on a Kali Linux virtual machine of version 2018.1, the one maintained and funded…
Read more
Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. All examples below uses base64 decoded text (eWVhaGh1Yg==) for…
Read more
What is IP Address – A unique number consisting of four parts separated by dots. Every device on the Internet (and on any network) must have a unique IP address to participate and…
Read more
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn defenseless. Its main goals are to be an aid for security professionals to test their skills and tools in a…
Read more
A brute-force attack is when all possible keys are checked against encrypted data until the right key is found. Brute-force attacks are extremely costly from a resource and time perspective because the attacker…
Read more