How does Cloudflare work?

Cloudflare protects and accelerates any website online. Once your website is a part of the Cloudflare community, its web traffic is routed through our intelligent global network. We automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. We also Read more…

 1,835 total views,  1 views today

What is a RAT

What is a Remote Administration Tool (RAT)? Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, Read more…

 1,255 total views

How CAPTCHA Works ?

How CAPTCHA Works ? You’ve probably seen little tests scattered around the internet when you’re trying to post a comment, creating an account or buy something. These tests are called CAPTCHA which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response Read more…

 587 total views

All about HTTPS SSL Encryption

All about HTTPS SSL Encryption   Analysis of HTTPS SSL Encryption SSL (Secure Socket Layer): Netscape company is designed for WEB security transmission protocol. From the name you can see it in the https protocol stack is responsible for the above-mentioned encryption layer. Article Content HTTPS SSL certificate HTTPS work process One-way Read more…

 321 total views

The psychology of hackers

  There’s an old quote mis-attributed to the famous bank robber Willie Sutton that claims when asked “Why do you rob banks?” he replied “Because that is where the money is!”  When we ask “Why do hackers hack?” there is a temptation in this age of organised crime-driven malware to Read more…

 200 total views

Tools Category

Aircrack-ng

  What is this ? Aircrack-NG is a WiFi password cracking tool that can crack WEP or WPA passwords. It analyzes wireless encrypted packets and then tries to crack passwords via its cracking algorithm. It uses the FMS attack along with other useful attack techniques for cracking password. It is Read more…

 190 total views

Metasploit

Vulnerability Exploitation Tool What is Metasploit? In 2003, H.D. Moore, (a Cyber Security Researcher and Program Developer from the US) started the Metasploit Project with the intention being to create a public and freely accessible resource to obtain exploitable code for research and development. The Metasploit Project is credited with Read more…

 143 total views