Sunday, March 24, 2019
The Web Application Hackers Handbook

Hackers Handbook

The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages and Complete Explanation of hacking and lots...
ubuntu

UbuntuHacks

Book Description:  Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips...
linux

Linux Server Hacks

Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a...
What-Is-MAC-Media-Access-Control-Address

MAC

MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC address is also called Hardware Address. 48 Bit...
kali OS

Hash Detector in Kali Linux

   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      [email protected]:~# cd /usr/bin            [email protected]:/usr/bin/# hash-identifier                /* Copy the hash and paste...
database

What is Bandwidth / Traffic

BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of...
Internet-Protocol-Address

Masking and IP Addressing format

Types of Addressing Classful Addressing Classless Addressing Classful Addressing  IPv4 uses concept of classes. This architecture is called classful addressing  Types of Classes                                 Class A, B, C, D, and E.  In...

LATEST UPDATES

How ‘Jio’ revolutionized India?

Before the launch of giant Jio consumers were very careful about their data usage specially in video content on data network which was restricted...