• Bitcoin for Dummies

    May 17, 13 • Feature1 Comment
    Bitcoin for Dummies

    The modern world as we know today is run by a healthy economy; this economy is driven by the influx of money, in the form of trade and business. Governments all over the world operate by collecting tax returns from its citizens, and invest it back to the system. Generally any geographical region’s strength is [&hellip...

  • Penetration Testing Execution Standard – PTES

    Penetration Testing Execution Standard – PTES

    Penetration Testing Execution Standards – PTES Before, we talked about the aspects of pen-testing in brief. Now we look at the SOP involved with Pen-Testing; and ‘those’ standards are called as Penetration Testing Execution Standards or PTES. Written by several of the leading security officers in the information-security networks, the purpose is to make pen-testing [&hellip...

  • Penetration Testing and Ethical Hacking

    May 7, 13 • Ethical Hacking, SecurityNo Comments
    Penetration Testing and Ethical Hacking

    Ethical hacking, Security auditing and Penetration testing are different terms that relate to a common procedure. It is the process through which a cyber attack is simulated on a computer system in order to discover and _prevent_ security breaches, and patch exploitable vulnerabilities. The purpose of penetration testing So basically the purpose of penetration testing [&hellip...

  • How to Encrypt Data with Winrar

    May 1, 13 • How to Guide, SecurityNo Comments
    How to Encrypt Data with Winrar

    If you wanted to encrypt your data in the easiest way possible, and with the strongest encryption technique possible, there is no alternative to Winrar. Most of us think of Winrar as a compression software but unlike Windows-ZIP utility, it does both encryption and compression. This guide will teach you how to encrypt your data [&hellip...

  • Safe Browsing: How to remain Protected Against Malware

    May 1, 13 • SecurityNo Comments
    Safe Browsing: How to remain Protected Against Malware

    Malware Security is the first thing that should come in mind before going online.  With the  increase in networking resources the Internet is growing in a rapid pace like never before. Today there is an increasing availability of  networking resources, for an  increasing audience of the Internet. Today every organization is pushing towards Cloud based [&hellip...

  • How to Enable Hyper-V on Windows 8

    May 1, 13 • How to GuideNo Comments
    How to Enable Hyper-V on Windows 8

    Hyper-V For Windows 8: Microsoft Hyper-V is a hypervisor-based virtualization product that enables you to consolidate workloads, helping  IT Professionals and independent organizations improve server utilization and reduce costs. Among IT professionals and Penetration Testing Experts, running multiple instances of different Operating systems is necessary. For this specific purpose Microsoft has included its Solution for [&hellip...

  • Kali Linux Fix on VMware Version 8

    Apr 28, 13 • How to Guide, Linux6 Comments
    Kali Linux Fix on VMware Version 8

    Kali Linux Error on VMware: Kali Linux failing to attach to your VMware Workstation? If the error you receive is the error bellow, then you should follow this short guide to fix the installation. FIX The solution is easy. It is no compatibility issue, just a small precautionary bug. Follow the steps bellow to fix [&hellip...

  • Kali Linux vs BackTrack

    Apr 27, 13 • Linux1 Comment
    Kali Linux vs BackTrack

    What is Kali Linux anyway? Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution, and it is the new BackTrack. Yes! Why the new name? Offensive Security, the company that sponsored BackTrack, speaks to have put in a lot more effort into this new Linux. They say that their plan for BackTrack-6 [&hellip...