Server Security

brute force attack A password and cryptography attack that does not attempt to decrypt any information, but continue to try a list of different passwords, words, or letters. For example, a simple brute-force attack may have a dictionary of all words or commonly used passwords and cycle through those words Read more

Loading

Linux Security

Linux security tips and tricks ! Are you running Linux just because you think it’s safer than Windows? Think again. Sure, security is a built-in (and not a bolt-on) feature and extends right from the Linux kernel to the desktop, but it still leaves enough room to let someone muck Read more

Loading

Pentesting Linux Distributions

1. Kali Linux Pentesting  “Hacking Linux Distribution” Kali Linux is a very popular Debian-derived Linux distribution which is created by Offensive Security. Kali, as it is often abbreviated to, is designed for digital forensics and penetration testing. This hacking distribution was the continuation in a long line of pentesting distros Read more

Loading

Hackers Category

1. White Hat Hacker   Definition – What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers Read more

Loading

Become a Penetration Tester

What Does a Penetration Tester Do? The Short Version A Penetration Tester (a.k.a. Ethical Hacker) probes for and exploits security vulnerabilities in web-based applications, networks and systems. In other words, you get paid to legally hack. In this “cool kid” job, you will use a series of penetration tools – Read more

Loading