This article will be showing you why we need to really think of our nation’s cyber army. Where we are, which digital weapons we have? What are the challenges faced by your countries in
Run Command for Windows XP
All of the Run Command below work in the WINDOWS XP operating system, some do Require that you have the application associated with the command installed. To provide the run dialog box where you
Hack Website using SQLMAP
Intro – sqlmapis an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many
Learn How To Hack With HackingSchool Training
Probably most of you have heard about Udemy e-learning platform. Recently I’ve had a pleasure to take a look at Hacking School Training, which is an introductory course for anyone that is interested in
Network Intelligence Gathering
Information Security Aficionado: Network Intelligence Gathering: This article is all about different information-gathering techniques on the network. It is the most essential and important task of atta...
A Complex-Powerful-Hybrid Processor - THE MIND
Information Security Aficionado: A Complex-Powerful-Hybrid Processor - THE MIND: Hello guys, this post are not related to information security. It was an incident which happened yesterday to me. After it got finishe...
Firewall / IPS Detection Technique using hping3
Information Security Aficionado: Detecting Firewall/IPS via hping3 Before Starting ...: Before starting your network/web application security auditing it is always good to detect whether your target server is running any fir...
Serial Key of Useful Softwares
A serial number is a unique code assigned for identification of a single unit. Although usually called a number, it may include letters, though ending with digits. Typically serial numbers of a production run
How to activate windows 7
Windows 7 is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, notebooks, tablet PCs, and media center PCs.It was released to manufacturing on July 22,
How to do watermark on image/picture
Intro - A watermark is a visible embedded overlay on a digital photo consisting of text, a logo, or a copyright notice. The purpose of a watermark is to identify the work and discourage
Reset Your Forgotten Ubuntu Password
Ubuntu is an operating system based on the Linux kernel and the Linux distribution Debian, with Unity as its default desktop environment. It is distributed as free and open source software. It is named