• Reading and Writing CSV data in python

    Reading and Writing CSV data in python

    For reading and writing CSV  , python has a built in standard module csv . We shall look at an example of using csv module.  Let’s suppose we have  this stock market data stored in a file ” stock_data.csv”   [crayon-572b8ba1b6aaf088577220/] Now lets import python module csv [crayon-572b8ba1b6aba033254656/] To access certain elements inside the row , ...

  • Using Nmap in Python

    Apr 27, 16 • UncategorizedNo Comments
    Using Nmap in Python

    What is nmap :-  (Network Mapper )  It is an open source tool for  security auditing and network scanning . It provides a variety of features to like OS fingerprinting , host discovery, port scanning , version detection ,network mapping  and maintenance . It is compatible with different operating systems including  Linux , Windows , ...

  • Essential Duties of System Adminstrator

    Apr 25, 16 • Feature, Linux, UncategorizedNo Comments
    Essential Duties of System Adminstrator

    Essential Duties of System Adminstrator     There is a clear distinction between software developers and system administrators,  though most of the time system administrators spend in writing scripts . The article below describes the essential duties a system administrator performs. The tasks are not necessarily to be performed by a single person all the ...

  • How to crack password of zip files

    How to crack password of zip files

    How to Crack Password of Zip Files     Today we first shall learn how to protect files with password in python. After that we shall learn how to crack the password of zip-file using python library .   How to open a password protected file:-   Lets just fire up the terminal and learn ...

  • How to Crack Password in Unix

    Mar 12, 16 • Linux, Python for SecurityNo Comments
    How to Crack Password in Unix

    Today we shall learn how to crack passwords in Unix using python2.7. We shall use an algorithm crypt(). This algorithm already exists in standard python version. So you don’t need to separately install it. To check its details , [crayon-572b8ba1b7a21446200311/] To get a Unix password hash,   [crayon-572b8ba1b7a28514313378/] Lets return to our program:-   The ...

  • rm -rf –no-preserve-root may kill your Linux System

    rm -rf –no-preserve-root may kill your Linux System

      Linux operating system gives you full control to customize the system , as you like . Along with a lot of benefits , there can be few miss-happenings too, if you are not being  careful enough. One of many such examples is the command : rm -rf –no-preserve-root rm   deletes the (files or directories , depends ...

  • Beware Hackers can hack your system through MS Word Documents

    Beware Hackers can hack your system through  MS Word Documents

    Recently  researchers named  Kevin Beaumont and Larry Abrahms  discovered virus named Locky. This virus is spreading itself  via word documents. If you receive a word document through an email or in USB , think carefully before opening that up. When you download the word file (containing vicious macros) , and open it, a pop up opens and ...

  • Most Wanted Cyber Criminal Bogachev $3M

    Feb 26, 15 • SecurityNo Comments
    Most Wanted Cyber Criminal Bogachev $3M

    Evgeniy Mikhailovich Bogachev, the most wanted hacker for having stolen more than a 100 million in USD. The FBI – Federal Bureau of Investigation United States declared on Tuesday a 3 million USD reward for any information leading to the arrest of Bogachev. This is by far the highest bounty the US authorities have offered ...

  • Lenovo.com Website Hacked for SuperFish Fix

    Feb 26, 15 • SecurityNo Comments
    Lenovo.com Website Hacked for SuperFish Fix

    Vengeance in the name of ‘SuperFish’? If you don’t already know, Superfish had a malware that came preinstalled on Lenovo computers, it was something that compromised the encryption certificates to quietly include ads on Google Searches. Less than a week ago, the news came that Lenovo removed Superfish-malware from their machines, and in the same ...

  • Cryptoware targets Police Department for $600 ransom

    Feb 25, 15 • SecurityNo Comments
    Cryptoware targets Police Department for $600 ransom

    Thanks to Bitcoins! Cybercriminals have found an easy way to rip victims off by locking their data and the data is deleted if the victim does not pay the ransom in the remaining amount of time, in bitcoins. Cryptoware is the predecessor of the famous old Ransomwares, CryptoWall CryptoLocker PrisonLocker It hit a computer at ...