Saturday, October 20, 2018
Facebook AI

Facebook AI Shut Down

AI (Artificial Intelligence) companies are sprouting throughout the world. Even many government agencies (i.e. Defense) are working on AI. It is not something very new; it has been around from very long...

Top 16 Hackers Friendly Linux OS

16 Hackers Friendly Linux OS Kali Linux OS: One of the most advanced penetration-testing platform developed by offensive security. Its flavors are available in both 32 bit, 64 bit, and ARM, as...
summer- internship-2017

Summer Internship 2017

Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active learning expertise by completing given practical assignments...

Linux kernel vulnerability discovered

Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an attacker can overwrite the content of an...

Mile2’s C)ISSO vs. ISC’s CISSP®

WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote the official ISC2 CISSP also wrote mile2’s...

Presentation on TOR

This presentation is upon TOR Project. If you need any assistance feel free to contact us.  


MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC address is also called Hardware Address. 48 Bit...

What is Bandwidth / Traffic

BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of...