Monday , October 21 2019

January, 2018

  • 2 January

    Cracking WPA with Reaver and Wash

    Cracking WPA: To crack WPA you must use a different approach than you would with WEP. Fortunately, one of the best tools available for thwarting WPA is freely available in Kali Linux in the form of Reaver.  Reaver exploits holes in wireless routers in an attempt to retrieve information about …

  • 1 January

    Cracking WEP with Kali Linux

    Cracking WEP with Kali Linux: In this exercise you will use Kali Linux 2.0 to break WEP. To perform this exercise, you will need to have Kali Linux Installed on a Physical system (avoid virtualization). You will also need to have an access point configured to use WEP (which you …

December, 2017

  • 31 December

    Types of Cloud Solutions

    Cloud Solution Security

    Types of Cloud Solutions: Calling the Cloud “the cloud” simply isn’t accurate because it doesn’t fully describe the scope of cloud services. While cloud services all share the ability to provide shared resources, shared software, and shared information to reduce an organization’s information technology (IT) costs, they also provide the …

  • 30 December

    What is the Cloud Technologies and Security

    What is the Cloud Technologies and Security

    What is the cloud: While cloud computing is new term, it is not a new concept and is actually a grown-up and more mature version of what used to be known as grid computing. No matter what you call it, the cloud is a way of moving services, infrastructure, and …

  • 29 December

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Mobile Device Security – Countermeasures – Summary – Exam Essentials

    Countermeasures: Similarly to securing desktops, servers, networks, and other equipment, you can take some basics steps to make mobile devices more resistant to attack. What’s included here is some basic guidance but not a comprehensive list of all that can be done: Setting passwords on all mobile devices is a …

  • 28 December

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices Using Android

    Penetration Testing Mobile Devices: So how do we pen test mobile devices? In many ways the process is similar to what we are already using in a traditional setting but with some minor difference along the way.   NOTE: Remember that in regard to security, mobiles are so diverse that …

  • 27 December

    [Sim Database 100% Working] How To Check Mobile Number Detail in Pakistan Name,CNIC,Address,City, ETC

    Now You Can Check Any Num Data like Ownership Details ,Cnic Details , Home Addres and Other Contact info , Database 2017

    All Network Sim Number And Cnic Number Database Only Pakistan 2017 | Sim database | Check any number information | All Network sim database: In this video I show you have you can get information about any mobile number in pakistan. Like CNIC,ADDRESS,NAME Or Active numbers Against CNIC. Hello all now …

  • 27 December

    Apple iOS – Security

    Apple iOS – Security

    Apple iOS: The second most popular mobile operating system in the market is Apple’s iOS, which is present on multiple devices including the iPod, iPad, and iPhone. Much as Android is based on the linux Kernel, iOS is a slimmed-down version of OS X for the Mac. However, while it …

  • 26 December

    The Python Programming Language – Download Complete Course Free

    The Python Programming Language - Download Complete Course Free

    The Python Programming Language – Download Complete Course Free Python Overview Scripting Language bject-Oriented Portable Powerful Easy to Learn and Use Mixes good features from Java, Perl and Scheme   Major Uses of Python System Utilities GUIs (Tkinter, gtk, Qt, Windows) Internet Scripting Embedded Scripting Database Programming Artificial Intelligence Image …

  • 26 December

    Design of Android – Security

    Design of Android – Security

    Design of Android: Android, under the hood, is a series of components working together to make the system work. Each component in the system is self-contained and focuses on performing whatever task it was designed to do. Each component focuses on security measures for itself and assumes that every other …