Blog Page 2

Attacking Web Application Management: Telnet

Telnet is a person command and an underlying TCP/IP protocol for accessing distant computer systems, it's a cleartext protocol and, as such, is susceptible...

What is a Web Service?

Simply said, a internet service is a self-contained software program element that performs particular features and publishes details about its capabilities to different parts...

Udp2raw-tunnel – A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw...

A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls (or Unstable UDP Environment). Its Encrypted, Anti-Replay and...

Only Pre-Approved Communities can upload video to Reddit

“We needed to make sure we tested the video experience, so we created this from the ground up with our in-house team,” says Emon...

The Supplier of US Voting Machines has leaked the Data of 1.8 Million Voters

State officers and the Federal Bureau of Investigation had been warned this week to a bigger information leak revealing the names, addresses, dates of...

faker.js – Generate Massive Amounts of Fake Data

Generate large quantities of pretend information in Node.js and the browser.Demohttps://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.htmlHosted API Microservicehttp://faker.hook.io Supports all Faker API Methods Full-Featured Microservice Hosted by hook.io curl http://faker.hook.io?property=identify.findName&locale=de UsageBrowser<script src = "faker.js"...

10 Chrome Alternative Browser for Better Security & Productivity

We all know browsers particularly Chrome, Firefox, Internet Explorer (Edge in Windows 10) and Safari which is used extensively by virtually 99% of all...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...