• Open Nmap and other applications using TOR

    Open Nmap and other applications using TOR

    What is Tor  :-  It is a free software  which allows its users to communicate anonymously by hiding their location and internet surfing habits. Always make sure to install it from its official website .  It has a nice browser along with it, so that you can browse internet anonymously. But if you are penetration tester , ...

  • What is Phishing Attack and How to Protect Yourself

    What is Phishing Attack and How to Protect Yourself

    Phishing  Attack:-  In this type of attack , the attacker tries to obtain sensitive information like usernames , passwords etc.  from the victim by posing as a trustworthy entity. In phishing attacks , the target are user groups rather than specific applications and servers etc.The attack consists of an intruder attempting to pose as companies ...

  • Reading and Writing CSV data in python

    Reading and Writing CSV data in python

    For reading and writing CSV  , python has a built in standard module csv . We shall look at an example of using csv module.  Let’s suppose we have  this stock market data stored in a file ” stock_data.csv”   [crayon-57c1aba964b03590547657/] Now lets import python module csv [crayon-57c1aba964b0b396826163/] To access certain elements inside the row , ...

  • Using Nmap in Python

    Apr 27, 16 • UncategorizedNo Comments
    Using Nmap in Python

    What is nmap :-  (Network Mapper )  It is an open source tool for  security auditing and network scanning . It provides a variety of features to like OS fingerprinting , host discovery, port scanning , version detection ,network mapping  and maintenance . It is compatible with different operating systems including  Linux , Windows , ...

  • Essential Duties of System Adminstrator

    Apr 25, 16 • Feature, Linux, UncategorizedNo Comments
    Essential Duties of System Adminstrator

    Essential Duties of System Adminstrator     There is a clear distinction between software developers and system administrators,  though most of the time system administrators spend in writing scripts . The article below describes the essential duties a system administrator performs. The tasks are not necessarily to be performed by a single person all the ...

  • How to crack password of zip files

    How to crack password of zip files

    How to Crack Password of Zip Files     Today we first shall learn how to protect files with password in python. After that we shall learn how to crack the password of zip-file using python library .   How to open a password protected file:-   Lets just fire up the terminal and learn ...

  • How to Crack Password in Unix

    Mar 12, 16 • Linux, Python for SecurityNo Comments
    How to Crack Password in Unix

    Today we shall learn how to crack passwords in Unix using python2.7. We shall use an algorithm crypt(). This algorithm already exists in standard python version. So you don’t need to separately install it. To check its details , [crayon-57c1aba965667921127220/] To get a Unix password hash,   [crayon-57c1aba96566e038340596/] Lets return to our program:-   The ...

  • rm -rf –no-preserve-root may kill your Linux System

    rm -rf –no-preserve-root may kill your Linux System

      Linux operating system gives you full control to customize the system , as you like . Along with a lot of benefits , there can be few miss-happenings too, if you are not being  careful enough. One of many such examples is the command : rm -rf –no-preserve-root rm   deletes the (files or directories , depends ...

  • Beware Hackers can hack your system through MS Word Documents

    Beware Hackers can hack your system through  MS Word Documents

    Recently  researchers named  Kevin Beaumont and Larry Abrahms  discovered virus named Locky. This virus is spreading itself  via word documents. If you receive a word document through an email or in USB , think carefully before opening that up. When you download the word file (containing vicious macros) , and open it, a pop up opens and ...

  • Most Wanted Cyber Criminal Bogachev $3M

    Feb 26, 15 • SecurityNo Comments
    Most Wanted Cyber Criminal Bogachev $3M

    Evgeniy Mikhailovich Bogachev, the most wanted hacker for having stolen more than a 100 million in USD. The FBI – Federal Bureau of Investigation United States declared on Tuesday a 3 million USD reward for any information leading to the arrest of Bogachev. This is by far the highest bounty the US authorities have offered ...