Posts

Showing posts from August, 2015

Complete guide to learn Ethical Hacking

Ethical Hacking , also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. An Ethical Hacker , also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certiļ¬ed ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others. Definition: Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills

Starting PostgreSQL

PostgreSQL, often simply Postgres, is an object-relational database (ORDBMS) – i.e. a RDBMS, with additional (optional use) "object" features – with an emphasis on extensibility and standards compliance. As a database server, its primary function is to store data securely, and to allow for retrieval at the request of other software applications. It can handle workloads ranging from small single-machine applications to large Internet-facing applications (or for data warehousing) with many concurrent users; on macOS, PostgreSQL is the default database – for web hosting – and it is also available for Microsoft Windows and Linux (supplied in most distributions). PostgreSQL is ACID-compliant and transactional. PostgreSQL has updatable views and materialized views, triggers, foreign keys; supports functions and stored procedures, and other expandability. PostgreSQL is developed by the PostgreSQL Global Development Group, a diverse group of many companies and individual contri

Setting up Ruby / Rails / Postgresql on Ubuntu

Image
Ruby on Rails , or simply Rails, is a server-side web application framework written in Ruby under the MIT License. Rails is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages. It encourages and facilitates the use of web standards such as JSON or XML for data transfer, and HTML, CSS and JavaScript for display and user interfacing. In addition to MVC, Rails emphasizes the use of other well-known software engineering patterns and paradigms, including convention over configuration (CoC), don't repeat yourself (DRY), and the active record pattern. PostgreSQL, often simply Postgres, is an object-relational database (ORDBMS) – i.e. a RDBMS, with additional (optional use) "object" features – with an emphasis on extensibility and standards compliance. As a database server, its primary function is to store data securely, and to allow for retrieval at the request of other software applications. It can handle workl

Find Vulnerabilities In Facebook & Earn

Russia and Brazil are hacking Facebook, and the social network is paying them to do it. Facebook paid out US$1.5 million to security researchers worldwide last year as part of its Bug Bounty programme, and the two emerging markets were responsible for reporting some of the most critical threats, according to a report Facebook released this week. The company rewards disclosures about vulnerabilities, and then uses the information to fortify the world’s largest social network against hackers. Russians submitted 38 bugs that Facebook paid US$3961 for each on average, totalling US$150,518 . Brazilians found 53 bugs, worth US$3792 on average. Brazil’s total take was US$200,976 . Researchers in India contributed the largest number of bugs, at 136, but earned just US$1353 on average for each of them, amounting to a total of US$184,008 . Those in the US earned an average of US$2272 each for 92 bugs, totalling US$209,024 .