Posts

Complete guide to learn Ethical Hacking

Ethical Hacking , also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. An Ethical Hacker , also known as a whitehat hacker, or simply a whitehat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certiļ¬ed ethical hackers are among the most sought after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others. Definition: Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills

Starting PostgreSQL

PostgreSQL, often simply Postgres, is an object-relational database (ORDBMS) – i.e. a RDBMS, with additional (optional use) "object" features – with an emphasis on extensibility and standards compliance. As a database server, its primary function is to store data securely, and to allow for retrieval at the request of other software applications. It can handle workloads ranging from small single-machine applications to large Internet-facing applications (or for data warehousing) with many concurrent users; on macOS, PostgreSQL is the default database – for web hosting – and it is also available for Microsoft Windows and Linux (supplied in most distributions). PostgreSQL is ACID-compliant and transactional. PostgreSQL has updatable views and materialized views, triggers, foreign keys; supports functions and stored procedures, and other expandability. PostgreSQL is developed by the PostgreSQL Global Development Group, a diverse group of many companies and individual contri

Setting up Ruby / Rails / Postgresql on Ubuntu

Image
Ruby on Rails , or simply Rails, is a server-side web application framework written in Ruby under the MIT License. Rails is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages. It encourages and facilitates the use of web standards such as JSON or XML for data transfer, and HTML, CSS and JavaScript for display and user interfacing. In addition to MVC, Rails emphasizes the use of other well-known software engineering patterns and paradigms, including convention over configuration (CoC), don't repeat yourself (DRY), and the active record pattern. PostgreSQL, often simply Postgres, is an object-relational database (ORDBMS) – i.e. a RDBMS, with additional (optional use) "object" features – with an emphasis on extensibility and standards compliance. As a database server, its primary function is to store data securely, and to allow for retrieval at the request of other software applications. It can handle workl

Find Vulnerabilities In Facebook & Earn

Russia and Brazil are hacking Facebook, and the social network is paying them to do it. Facebook paid out US$1.5 million to security researchers worldwide last year as part of its Bug Bounty programme, and the two emerging markets were responsible for reporting some of the most critical threats, according to a report Facebook released this week. The company rewards disclosures about vulnerabilities, and then uses the information to fortify the world’s largest social network against hackers. Russians submitted 38 bugs that Facebook paid US$3961 for each on average, totalling US$150,518 . Brazilians found 53 bugs, worth US$3792 on average. Brazil’s total take was US$200,976 . Researchers in India contributed the largest number of bugs, at 136, but earned just US$1353 on average for each of them, amounting to a total of US$184,008 . Those in the US earned an average of US$2272 each for 92 bugs, totalling US$209,024 .

Windows 10 Steals Your Internet Bandwidth to Send Updates to Others, Disable It Here

Image
After installing Windows 10, Feeling like your Internet Bandwidth is dropping away? Windows 10 is stealing your network bandwidth. Along with the privacy features related to Wi-Fi Sense, Windows 10 users should check for another hidden by default feature that uses your network bandwidth to share updates with other Windows 10 users across the Internet. Microsoft launched Windows 10 on July 29 and offered a free upgrade to Windows 7,8 and 8.1 users, and for anyone who wants to download it. But, handling millions of simultaneous 3.5GB downloads is quite difficult for the company. So, in order to cope up with the issue, Microsoft has baked a new feature into its latest desktop operating system that uses the torrent-style approach to obtain software updates, allowing Windows 10 users to download updates from other users. Windows 10 is Stealing your Internet Bandwidth The feature, known as Windows Update Delivery Optimization (WUDO), is initially designed to help users get faster softwar

WPSCAN IN KALI LINUX Enumerating usernames tutorial

Image
WPScan Public Source License The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2016 WPScan Team. Example cases which do not require a commercial license, and thus fall under the terms set out below, include (but are not limited to): Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit. Penetration Testing Linux Distributions including but not limited to Kali Linux, SamuraiWTF, BackBox Linux. Using WPScan to test your own systems. Any non-commercial use of WPScan. If you need to purchase a commercial license or are unsure whether you need to purchase a commercial license contact us - team@wpscan.org. When using WPScan you can scan your WordPress website for known vulnerabilities within the core version, plugins, and themes. You can also find out if any weak passwords, users, and security configuration issues are present. The database at wpvu

Learning Python Basics

Image
Python is an open source programming language made to both look good and be easy to read. A programmer named Guido van Rossum made it in 1991. Python is an interpreted language. Interpreted languages do not need to be compiled to run. A program called an interpreter will run python code on any kind of computer it can run on itself. This means if the programmer needs to change the code they can quickly see the results. Python is a good programming language for beginners. It is a high-level language, which means a programmer can focus on what to do instead of how to do it. Writing programs in Python takes less time than in another language. Python drew inspiration from other programming languages like C, C++, Java, Perl, and Lisp. Python is a widely used high-level, general-purpose, interpreted, dynamic programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than possible in languages su