Sunday, 26 April 2020

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!This Post is for the people that:Have No Experience With Cybersecurity (Ethical Hacking)Have Limited Experience.Those That Just Can't Get A BreakOK, let's dive into the post and suggest some ways that you can get ahead...
Read More :- "How To Start | How To Become An Ethical Hacker"

An Overview Of Java

CHAPTER 2 An Overview of Java As in all other computer languages, the elements of Java do not exist in isolation. Rather, they work together to form the language as a whole. However, this interrelatedness can make it difficult to describe one aspect of Java without involving several others. Often a discussion of one feature implies...
Read More :- "An Overview Of Java"

HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL

Kali Linux has been the most advanced penetration testing machine introduced yet. It has the most valuable tools used for every sort of hacking. To take advantage of Kali Linux hacking tools, you have to switch your OS to Kali Linux. You can either install Kali Linux as your default OS or just install as a virtual machine within the same OS. You can learn more about how to install Kali Linux Virtualbox. Today in this tutorial,...
Read More :- "HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL"

Saturday, 25 April 2020

TYPES OF HACKER

7 Types of hacker 1-Script Kiddies-They are  just download overused software & watch youtube video on how to use it. Script kiddies don't care about hacking.2-White Hat-They are the good guys of the hacker world. They also known as Ethical Hacker.3-Black Hat-They finds bank or other companies with weak security and steal money...
Read More :- "TYPES OF HACKER"

Friday, 24 April 2020

Novell Zenworks MDM: Mobile Device Management For The Masses

I'm pretty sure the reason Novell titled their Mobile Device Management (MDM, yo) under the 'Zenworks' group is because the developers of the product HAD to be in a state of meditation (sleeping) when they were writing the code you will see below.Time to wake up - https://www.youtube.com/watch?v=vQObWW06VAMFor some reason the other night...
Read More :- "Novell Zenworks MDM: Mobile Device Management For The Masses"

C++ Std::Condition_Variable Null Pointer Derreference

This story is about a bug generated by g++ and clang compilers (at least)The condition_variables is a feature on the standard library of c++ (libstdc++), when its compiled statically a weird asm code is generated.Any example on the link below will crash if its compiled statically: https://en.cppreference.com/w/cpp/thread/condition_variableIn...
Read More :- "C++ Std::Condition_Variable Null Pointer Derreference"

Thursday, 23 April 2020

Unpatchable 'Starbleed' Bug In FPGA Chips Exposes Critical Devices To Hackers

A newly discovered unpatchable hardware vulnerability in Xilinx programmable logic products could allow an attacker to break bitstream encryption, and clone intellectual property, change the functionality, and even implant hardware Trojans. The details of the attacks against Xilinx 7-Series and Virtex-6 Field Programmable Gate Arrays (FPGAs)...
Read More :- "Unpatchable 'Starbleed' Bug In FPGA Chips Exposes Critical Devices To Hackers"

OWASP API Security Project Media Coverage

A list of must read articles on OWASP API Security Project: 10/3/19, APISecurity.IO (UMV: 1,510): Issue 51: Gartner Releases Full Report on API Security10/2/19, ADT Magazine (UMV: 117,500): API Security Project Identifies Top 10 Vulnerabilities9/26/19, Dark Reading (UMV: 57,800): Why...
Read More :- "OWASP API Security Project Media Coverage"