January, 2018

  • 5 January

    Countermeasures of Social Networking

    Countermeasures of Social Networking

    Countermeasures for Social Networking: Because social networking exploded in popularity so quickly, companies and individuals had little time to deal with the problems the technology brought to bear. Surveys taken a few years ago found that many companies either did not have policy in place regarding social networking or were …

  • 4 January

    USB Password Theft

    USB Password Theft

    USB Password Theft: In contrast to manual methods, there is some automated mechanism for obtaining passwords, such as via USB drivers. This method entails embedding a password-stealing application on a USB and then physically plugging the drive into a target system. Because many users store they passwords for applications an …

  • 3 January

    Performing a Password Crack – Insecure Logon Systems

    Performing a Password Crack

    Insecure Logon Systems: Many web applications require some sort of authentication or login process prior to their use. Because of the importance of the logon process, it is essential that it be handled safely and securely. You must take care that the incorrect or improper entry of information does not …

  • 2 January

    Cracking WPA with Reaver and Wash

    Cracking WPA: To crack WPA you must use a different approach than you would with WEP. Fortunately, one of the best tools available for thwarting WPA is freely available in Kali Linux in the form of Reaver.  Reaver exploits holes in wireless routers in an attempt to retrieve information about …

  • 1 January

    Cracking WEP with Kali Linux

    Cracking WEP with Kali Linux: In this exercise you will use Kali Linux 2.0 to break WEP. To perform this exercise, you will need to have Kali Linux Installed on a Physical system (avoid virtualization). You will also need to have an access point configured to use WEP (which you …

December, 2017

  • 31 December

    Types of Cloud Solutions

    Cloud Solution Security

    Types of Cloud Solutions: Calling the Cloud “the cloud” simply isn’t accurate because it doesn’t fully describe the scope of cloud services. While cloud services all share the ability to provide shared resources, shared software, and shared information to reduce an organization’s information technology (IT) costs, they also provide the …

  • 30 December

    What is the Cloud Technologies and Security

    What is the Cloud Technologies and Security

    What is the cloud: While cloud computing is new term, it is not a new concept and is actually a grown-up and more mature version of what used to be known as grid computing. No matter what you call it, the cloud is a way of moving services, infrastructure, and …

  • 29 December

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Countermeasures: Similarly to securing desktops, servers, networks, and other equipment, you can take some basics steps to make mobile devices more resistant to attack. What’s included here is some basic guidance but not a comprehensive list of all that can be done: Setting passwords on all mobile devices is a …

  • 28 December

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices: So how do we pen test mobile devices? In many ways the process is similar to what we are already using in a traditional setting but with some minor difference along the way.   NOTE: Remember that in regard to security, mobiles are so diverse that …

  • 27 December

    [Sim Database 100% Working] How To Check Mobile Number Detail in Pakistan Name,CNIC,Address,City, ETC

    Now You Can Check Any Num Data like Ownership Details ,Cnic Details , Home Addres and Other Contact info , Database 2017

    All Network Sim Number And Cnic Number Database Only Pakistan 2017 | Sim database | Check any number information | All Network sim database: In this video I show you have you can get information about any mobile number in pakistan. Like CNIC,ADDRESS,NAME Or Active numbers Against CNIC. Hello all now …