November, 2017

  • 6 November

    The Robots.txt File

    The Robots.txt File One way to begin understanding what’s running on a web server is to view the server’s robots.txt file. The robots.txt file is a listing of the directories and files on a web server that the owner wants web crawlers to omit from the indexing process. A web …

  • 5 November

    JTR: KING OF THE PASSWORD CRACKERS

    JTR: KING OF THE PASSWORD CRACKERS: It is hard to imagine discussing a topic like the basics of hacking without discussing passwords and password cracking. No matter what we do or how far we advance, it appears that passwords remain the most popular way to protect data and allow access …

  • 4 November

    Password Cracking Techniques

    Password-Cracking Techniques Popular culture would have us believe that cracking password is a simple as running some software and tapping a few buttons. The reality is that special techniques are needed to recover passwords. For the most part, we can break these techniques into categories; let’s take a high-level look …

  • 3 November

    Cyber Security Enhancement Act of 2002 – CSEA

    Cyber Security Enhancement Act of 2002 – CSEA Several years ago, Congress determined that the legal system still allowed for too much leeway for certain types of computer crimes and that some activities not labeled “illegal” needed to be. In July 2002, the House of Representatives voted to put stricter …

  • 2 November

    Plagiarism Checker X Pro – Life Time Activated Software | Best For Bloggers, Students & Teachers

    Plagiarism Checker X Pro – Life Time Activated In simple words, Plagiarism Checker X Pro is software which you can actually install on your PC/Laptop and use it to find out how many words are plagiarized means how many of the words or sentences have you copied from another person …

  • 2 November

    Hunting Cross-Site Scripting (XSS)

    Hunting Cross-Site Scripting (XSS) If you are not familiar with XSS attacks, make sure you read the OWASP article “Cross Site Scripting (XSS)” at http://tinyurl.com/3hl5rxt. Here are the main points you need to know about XSS: XSS is a client-side attack executed in the browser. JavaScript and VBScript are the …

  • 1 November

    Social Engineering: The Art of Hacking Humans

     What is Social Engineering? Social Engineering is a term that is widely used but poorly understood. It’s generally defined as any type of attack that is nontechnical in nature and that involves some type of human interaction with the goal of trying to trick or coerce a victim into revealing …

October, 2017

  • 31 October

    A Complete Guide To WHOis, How To Find Domain Details

    WHOis.net And Who.is And Whois in Linux Terminal A very simple but effective means for collecting additional information about our target is Whois. The Whois service allows us to access specific information  about our target including the IP addresses or host names of the company’s Domain Name Systems (DNS) servers …

  • 30 October

    HTTRACK: WEBSITE COPIER

    HTTRACK: WEBSITE COPIER Typically, we begin Step 1 by closely reviewing target’s website. In some cases, it may be helpful to use a tool called HTTRACK to make a page-by-page copy of the website. HTTRACK is a free utility that creates an identical, offline copy of the target website. The …

  • 28 October

    Information Technology Colleges in California

    Top 10 Best Information Technology Colleges in California: We have created the best ranking colleges in California 2017 which offers Information Technology degrees to help you find a desired Colleges that fits you. Each of the College ranking is actually based on the students surveys, interviews and editorial review.   …