Using the Free Tier on Amazon Web Services (EC2) 9:48 AM Many times during penetration testing, playing CTFs, conducting phishing campaigns, hosting Metasploit sessions, creating VPN sessions, cre...Read More
Cryptography 11:23 AM Introduction Have you ever heard about encryption and decryption? These are the techniques which secure your information and data from a...Read More
Authentication Attacks on Windows OS 12:57 PM Introduction What is the Windows OS? Every one is very well familiar with Windows Operating System. As it is widely used Operating Sy...Read More
Arrays 8:43 AM INTRODUCTION TO ARRAYS So, What is an array? Have you ever studied about data types? First of all, I will tell about data ty...Read More
Domain Name System 7:57 AM DOMAIN NAME SYSTEM Domain Name System is just like a phone-book in world of Internet. In phone-book there is a list of Contact-names...Read More