Amity YOUTH FEST 2017
Amity Youth Festival 2017
Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
EasyApache 21 February 2017 Maintenance Release
cPanel, Inc. has released EasyApache 3.34.12 with Apache version 2.2.32. This release addresses vulnerabilities related to CVE-2016-8743 and CVE-2016-5387. We strongly encourage all Apache...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
SSL Handshake (443)
SSL Handshake (443 port of server at which SSL connection is made)
Client (Browser) ---------------------Client Hello Msg.------------------------------------> Server
· Highest SSL Version
· Compression (SHA1, SHA1-DES)
· ...
Brave Summarizer takes on Bing and ChatGPT at the AI search results game
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....