Presentation on TOR
This presentation is upon TOR Project.
If you need any assistance feel free to contact us.
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
Hash Detector BTr3
Hash Detector BackTrack r3
/* To Detect what type of algorithm is used to make hash encrypted */
root@bt:~# cd /pentest/passwords/hash-identifier
root@bt:/pentest/passwords/hash-identifier# ls
...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...
Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
cPanel Security Team: glibc CVE-2015-7547
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
Make Write Protection USB/SDCARD
Write Protection USB or SDCARD
C:diskpart
DISKPART> list disk
/* Displays the list of disk available */
DISKPART> select disk 1
/* Select your desired Drive */
DISKPART> attributes disk...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...


