What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
codingsec.webp 2016-05-26 19:43:16 How to Change Your DNS to Google DNS for Fast Internet (lien direct) Google DNS is generally way faster than the broadband services. We have to manually change to Google DNS in order to enjoy the new public DNS offered by Google.  In this guide, we will learn how we can do it with windows OS.   Guide to Change DNS to Google DNS: To change your DNS to Google DNS or Open DNS all you need to do is edit your network settings which is very easy in windows. Find your active Internet connection. Either from notification area or from My Computer > My network places > Network connections. Click on Properties > Internet Protocol
codingsec.webp 2016-05-26 17:00:20 Placing characters in the level Unreal Engine (lien direct) In this article we will begin placing Actors (which are things like lights or geometry for example) into our empty level. We will cover the two most common ways of adding Actors to the level, one of which is through Place Mode and the other is through the Content Browser . After completing this step, you will know how to place Actors inside your own levels and can begin manipulating those Actors to create your environment. Steps In the Modes Panel, with Place Mode enabled, click the BSP category and select the Box. Left-click and drag the Box into the Level
codingsec.webp 2016-05-26 13:48:38 How To Run Any Android Apps On Linux OS (lien direct) We all know that Linux is one of the major operating systems for hackers and other professionals, but still many computer users installed Linux on your system as a dual boot. So today’s tutorial is based on your Android smartphone along with Linux Operating System. In this tutorial, you will be learned that how you can run any Android application on your Linux based OS. Before we start the tutorial we must have a bit intro of Linux which is a popular software platform for computers, however, Android is also one of the major software platforms for smartphones. The main ★★
codingsec.webp 2016-05-26 06:18:57 How To Change Or Renew IP Address In Windows 10 (lien direct) IP address is one of the unique numbers that represent Internet Protocol, the connection between your computer Internet and other networking protocols. The IP address is the thing that not every regular Internet users would take this into consideration but if you are hardcore user and know how these internet things work then you will say that these IPs are the very important element for the connection via the internet to another network. Today’s tutorial will be on how can you find your Windows 10 IP address and how can you change its IP address using static IP, the below
codingsec.webp 2016-05-25 21:17:21 9 Tips For a Better Database Design (lien direct) Over the years, style of working with databases has changed a lot. Here I describe some tips in the hope that they might help you in designing an efficient Database. I have listed the tips in the order that they occur during the project lifecycle rather than listing them by importance or by how common they are. 1. Plan Ahead One problem that I have seen is when data modeling occurs at the same time as software development. This is like building the foundation before completing the blueprints. In the past, planning seemed an obvious step before starting development. Development teams would
codingsec.webp 2016-05-25 16:00:03 Unreal Engine vs unity Engine the ultimate showdown (lien direct) Unreal Engine 4 vs. Unity: Which Game Engine Is Best for You? Unreal Engine 4 (UE4) and Unity are arguably two of the most popular game engines available to the public today. While many game development studios use their own proprietary game engine there's still a huge market for indie developers and even larger studios needing a great game engine to help them create their game. Games like Dead Island 2 and Hitman Sniper are being developed on these game engines. So if you want to get into game design you're next step is choosing which game engine to learn,
codingsec.webp 2016-05-25 10:38:36 How To Hide Your Secret Files Inside An Image (lien direct) Today we are going to share some of the amazing trick with you which is related to your Windows computer, the trick is really amazing and a bit prank to your friends if you want to. IN this tutorial we are going to create an image file which will look like simple image but when you right click on that image file and select open as WinRAR Archiver then you will be able to see many files which are hidden within the image and no one can understand that how amazing you are hiding these files in images. So should
codingsec.webp 2016-05-25 04:31:37 How To Make Auto Shutdown Timer For Windows (lien direct) How to make your computer system shutdown automatically at a given specified time? it is sure that there are many such software that can be found on the internet but why should we use any third party software just to make our system auto shutdown. We can create our own file that can make our computer shutdown by providing a particular specified timing, the tutorial is very simple and tiny because of the steps below mention, but user needs to make sure timing in seconds that is; how many seconds are there in 1 minute or how many minutes in
codingsec.webp 2016-05-24 20:15:37 Even After Millions of Attacks, Most People Still Don’t Know What a Ransomware is : Report (lien direct) A Kaspersky study of over 5,000 users in Canada and the US reveals that even if ransomware is today’s most dangerous and prevalent malware infection, a lot of regular users have no clue what it is and what it does. The study shows that while almost all security experts are sweating only by thinking of getting infected with ransomware even by accident, almost half of the surveyed users have no clue what it is, or that they can lose critical data after such infections. Kaspersky says that users were more scared about other malware categories such as viruses, trojans, and
codingsec.webp 2016-05-24 17:08:41 How To Create Undeletable Folder In Windows (lien direct) Create a folder and use some of the tricks on that folder, at least you will have a folder which is neither deletable nor renamable. Yes, this is true that you can create a folder in your windows computer which cannot be deleted or rename. If you are one of those seeking fun with friends then this trick is the correct choice to have fun with your friends, however this trick is not only for fun but also you are protected from any data loss, there are many such conditions and situation occur at the time of using your own
codingsec.webp 2016-05-24 14:57:42 PHP Tips to Improve Your Programming Skills (lien direct) In this article I we will see the tips and tricks every PHP developer  needs to know. These tricks will help you in many ways, lets get right into it.. Avoid the use of printf function Unlike print and echo, printf() is a function with associated function execution overhead. More over printf() is designed to support various formatting schemes. To handle formatting printf() needs to scan the specified string for special formatting code that are to be replaced with variables. <?php echo 'FinalResult:', $result; // is better than printf("FinalResult.%s", $result ); ?> echo is faster than print PHP is giving some sting ★★★★★
codingsec.webp 2016-05-24 06:33:11 How To Enable Hidden Dark Theme Of Windows 10 (lien direct) In today’s tutorial, we are going to explore Windows 10 secrets because what we found will amaze you, if you are the owner of your Windows 10. This cannot be denied that how Windows 10 default system theme visualises with lots of bright white but did you know that there is hidden dark theme developed by Microsoft itself. To get that dark theme you just need to follow the below steps that how really your system Windows 10 hiding the dark theme from you. At the time of your Win 10 purchase you were not being told all these secrets
codingsec.webp 2016-05-23 16:00:06 PHP cheatsheet to upgrade to PHP7 from 5 (lien direct) In this article I am going share the upgrade path cheatsheet for php7. Cheat sheets are, basically, a cool collection of information, data and figures, that can be used for a quick help. PHP 7 has been released but many developers face several errors while upgrading their PHP version.Here in this article we are going to show you some PHP cheat sheet which helps you to upgrade PHP 5.X to PHP 7.This post will cover the most imperative things to beware of your site before moving up to PHP 7 from PHP 5.5 and PHP 5.6. DEPRECATED FEATURES The principal
codingsec.webp 2016-05-23 08:53:40 How to Become A Hacker in 12 Simple Steps (lien direct) Hacking is one of the hottest jobs in this decade but don’t take it as an easy job. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look. 1. Learn UNIX/LINUX UNIX/LINUX is an open source
codingsec.webp 2016-05-23 04:03:35 How To Verify Your Facebook Page With Grey Tick (lien direct) Every business owner want to expand their business may be through offline or online, but how you can get popular on social networking site such as Facebook, nothing is needed just create a facebook page and get that page verified through the below steps. This tutorial is only for Grey Tick Verified Facebook page, not for Blue Tick, if you want to get Grey Tick verified page then you have to follow some sort of rules. Your business should have a legal papers to show Facebook and sooner it will notify you with their results. just follow below steps to
codingsec.webp 2016-05-22 18:04:49 Here is How you can Download Torrent Files Faster with IDM (lien direct) Torrents are one of the most used ways on internet to download huge files, videos and other stuff. Most of the people use special software ( torrent clients) to download torrent files. But the download speeds in torrents are very slow. In this tutorial we will show you how you can download torrent files with IDM with better speeds and no unnecessary need to download extra software Benefits of Downloading Torrent Files With IDM There are many advantages of downloading torrent files with Internet Download Manager and some of them may be given as follows. Internet Download Manager can boost downloading
codingsec.webp 2016-05-22 16:00:30 Does the world need more programming languages (lien direct) In this article we are going through dilemma the world need programming languages. Indeed, there are computers in nearly everything these days; doesn’t the world have enough computer languages already? The short answer is: No. Here’s a dead-simple, Luddite-friendly explanation of why we’ll keep seeing new languages as long as there are people to learn them. TO TEACH PROGRAMMING If this question can be framed as a chicken-and-egg problem, we’ll start with the egg. The origin of many languages (such as BASIC, my first language) begins with the impetus to make programming concepts easier for beginners and hobbyists and human beings
codingsec.webp 2016-05-22 13:25:28 19 Best Hidden iPhone Secret Codes In 2016 (lien direct) About 25 percent iPhone users are hardcore, they really dig out more and more information regarding and do experiments with their smartphone, but average iPhone users really don’t care or don’t want to do experiments with their costly iPhones, they just need common functions to make calls and receive. Today I came up with top class secret codes of iPhone that iPhone users may or may not be aware, the secret codes are only to dial from dialer and the magic of each code are different from each other. You can unlock new features on your iPhone using these secret
codingsec.webp 2016-05-22 06:18:58 How to Fix USB Device Not Recognized Error In Windows OS (lien direct) Do you ever noticed this pop up when you plug your Flashdrive/Pendrive and shows that “USB Device Not Recognised“? Why this pop up comes out? I’m going to show you the method and trick that how can it be possible to fix these types of error on your windows. Only because of this error you are unable to use your portable drive on your computer, which means you have a driver malfunctioning on your computer, may be missing of drivers cause these errors, and main problem is there is you actually wouldn’t recognise that which driver is malfunctioned and which
codingsec.webp 2016-05-21 17:15:12 How to turn Website Content into Password Gold Using Python (lien direct) Many times, security comes down to one thing: user passwords. It's sad but true. Making things worse, when it comes to web applications, especially custom ones, it's all too common to find that account lockouts aren't implemented. In other instances, strong passwords are not enforced. In these cases, an online password guessing session like the one in the last chapter might be just the ticket to gain access to the site. The trick to online password guessing is getting the right wordlist. You can't test 10 million passwords if you're in a hurry, so you need to be able to
codingsec.webp 2016-05-21 15:05:34 How to Do Burp Fuzzing Using Python (lien direct) In this article i will show how you can do Burp Fuzzing using Python programming language. At some point in your career, you may find yourself attacking a web application or web service that doesn't allow you to use traditional web application assessment tools. Whether working with a binary protocol wrapped inside HTTP traffic or complex JSON requests, it is critical that you are able to test for traditional web application bugs. The application might be using too many parameters, or it's obfuscated in some way that performing a manual test would take far too much time. I have also
codingsec.webp 2016-05-21 05:39:30 Make Your Android Device Look Like An iPhone Without Rooting (lien direct) If you are an Android user and need the same user interface as iPhone user have then you will be quite impressed with this tutorial that how really you can transform your Android to iOS UI. This tutorial presents you the launchers which act as the total modification of your Android system without rooting your device. We all know how Android users are insane about iPhone and that is only because of its UI, cameras including other impressive features and securities. This cannot be ignored to say that many people around the world can’t effort iPhone smartphones and to get
codingsec.webp 2016-05-20 14:37:10 Snowden says: Google’s New Chat App( Allo) is Dangerous (lien direct) Recently in the Google i/o 2016, the company  launched their new messaging service Allo. This new app is loaded with  bunch of cool stuff  like Google chatbot, but Edward Snowden thinks you shouldn’t use it. Snowden said so in the Twitter yesterday where he suggested that, even though Google did a grea job with the new app including the end to end encryption they leave the feature turned off by default. Actually what Snowden said is true considering all major chat apps like WhatsApp, iMessage have end to end encryption. “Google's decision to disable end-to-end encryption by default in its new ★★★
codingsec.webp 2016-05-20 10:15:49 How To Record iPhone GamePlay At High Quality (lien direct) iPhone users basically seeking applications that Android users have, but today’s tutorial we have a way for iPhone users that can help then to record phone game play at hight resolution. Users must be aware; recording at high resolution means the video file will be huge approximately 40 – 50MB, the process of recording your gameplay is very simple, just follow the below steps to understand that how can it be done. iPhone users already have iPhone app store but now below steps, another app store is required just to download that particular recording application called “Shou”. Steps To Get
codingsec.webp 2016-05-20 05:59:17 Mapping Open Source Web App Installations with Python (lien direct) In today’s article i will show hoe you can so mapping of open source web apps using python. Content management systems and blogging platforms such as Joomla, WordPress, and Drupal make starting a new blog or website simple, and they're relatively common in a shared hosting environment or even an enterprise network. All systems have their own challenges in terms of installation, configuration, and patch management, and these CMS suites are no exception. When an overworked sysadmin or a hapless web developer doesn't follow all security and installation procedures, it can be easy pickings for an attacker to gain access
codingsec.webp 2016-05-19 17:57:14 Healthcare Records from 33 Turkish Hospitals was Leaked by Anonymous (lien direct) We know that recently Anonymous targeted their attacks on turkey.A s part of this, recently a hacker who claims to be a part of Anonymous released a link carrying 2GB of data with personal records stolen from Turkish hospitals. The data was shared on four different websites including a YouTube video about the incident. At present only one link was working and the YouTube video was taken down following users reports. This huge  data dump contains details from 33 hospitals, but according to Turkish newspaper Hurriyet, the Turkish Ministry of Health admitted to having only some issues with cyber-attacks on hospitals in
codingsec.webp 2016-05-19 14:48:32 How Email Credentials are Stolen Using Python (lien direct)   In this article I am going to show how Emails credentials can be  stolen using Python. Kindly do not use this information to do anything stupid and you are on your own if you do anything malicious. Providing you with these information is our job and using that in correct way is your responsibility. Hope you get it, Now lets go. You have already spent some time getting into the nuts and bolts of sniffing in Python. So let's get to know Scapy's interface for sniffing packets and dissecting their contents. We are going to build a very simple
codingsec.webp 2016-05-19 09:53:35 Secure Your Computer By Blocking Dangerous IP Automatically (lien direct) Basically, spying and other critical bots are always online to find out the vulnerability in your computer, there are million of IP’s on the internet that pretends to be safe but in the actual term, they are very dangerous which may steal your valuable files and credentials from your computer. After buying a computer, securing it from online is the first part, we secure that by using external Anti-Virus or inbuild OS anti-virus but all we know that they really don’t have such techniques to block or detect any dangerous or suspicious IP’s. There are many spy agency across the
codingsec.webp 2016-05-18 16:43:54 How To Recover Deleted Files From Your Computer (lien direct) What happen when we delete our valuable files mistakenly, there are two ways or we can say two types of computer users, one who use only delete button and others who delete files by pressing Shift+Delete, The simple delete button stores your deleted files on Recycle Bin but when we press Shift+Delete then we command our computer to delete or wipe out the file entirely from the computer. So what are the possible ways that we can recover our deleted files? Using the simple delete button helps you to recover your deleted file from Recycle Bin later from where you
codingsec.webp 2016-05-18 13:48:14 Packet Sniffing in Windows and Linux Using Python (lien direct) In this article i am going to show how you can do packet sniffing in Windows and Linux. A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer—or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network. Accessing raw sockets in Windows is slightly different than on its Linux brethren, but we want to have the flexibility to deploy the same sniffer to multiple platforms. We will create
codingsec.webp 2016-05-18 07:51:54 How To Create Amazing Google Chrome Theme (lien direct) In this tutorial, it is not necessary to have programming skills, the user must have a Google Chrome on his/her computer, Chrome needs; one extension which will help to customise your own Google Chrome User Interface. Follow the steps to get it done by yourself. Step1. The first step for you is to download and install My Chrome Theme Extension in your Google Chrome. Step2. After download and installation, you need to upload your favourite image as you like the most to set as background display. Step3. Just after uploading you will be prompt to adjust the width and height
codingsec.webp 2016-05-18 04:14:19 How To Increase RAM In Android Devices Using SD Card (lien direct) We all know that Android is the brand of alteration and modifications if your android device is already rooted then this tutorial is the best to gain more knowledge relating how you can really increase your Android RAM without changing any hardware. Just follow the below process and in the process of increasing your Android RAM, you need to understand what are the requirements to perform this tutorial. Requirements: Rooted Android Device SD Card Must Be 4GB Or Higher(Class 4 or higher) SD Card reader Windows Computer After you have all the requried elements you are proceded to the stesp
codingsec.webp 2016-05-17 19:02:48 This guy Faked that he was a Hacker and Faces up to 30 Years in Prison (lien direct)   A thirty year old guy named Michael Mancil Brown from Franklin, Tennessee faces a thirty years in prison, a fine of $250,000 and orders of restitution to victims. The reason behind his sentence was his crazy daring act he did back in 2012 where he faked that he was a hacker and said that he hacked  the PricewaterhouseCoopers consulting firm, and US presidential candidate Mitt Romney. Here is what happened: One day Brown got a sparkling idea of writing a letter to PricewaterhouseCoopers (PwC) pretending that he hacked their servers and stolen tax documents prior to 2010 for Mitt Romney and his
codingsec.webp 2016-05-17 16:00:07 Top 10 databases to learn in 2016 (lien direct) In this article I am going to list out top 10 databases to learn in 2016. Database engines are a bit like the datasets they work with. There's lots of them. The database ranking website DB Engines gives a great overview of the market by charting the popularity of close to 200 different databases. We decided to take a closer look at their top ten DBs. The big three Together the Oracle, MySQL and Microsoft heavyweight DBs take the lion's share of users, each reeling in users with their own distinct advantages. 1. Oracle 12c Initial release: 1980 License: Proprietary SQL: Yes The most popular choice for
codingsec.webp 2016-05-17 15:52:01 Top 10 2016 Best WiFi Hacking And Defending Android Applications (lien direct) WiFi hacking is the one most conversational topic all over the internet, we all are well aware that how tech geeky users searches for the hacking tools that how can it be possible to hack any WiFi. Below we have discussed Top 10 WiFi Hacking And Defending Application for Android which works on rooted and unrooted Android devices, to know all the applications just follow below! 1. WiFi WPS WPA Tester This application is compatible with all your android device above 2.0 version, this application helps you to crack into the WiFi networks around you, but not all the routers,
codingsec.webp 2016-05-16 18:00:10 How to create and host your own private github (lien direct) In this article I am going to show your how to create and host your own github in your own private server. We are going to use gitlab a github clone software in order to achieve that Distributed version control was never easy before git. Git is a free and open source software that is designed to handle everything from small to very large projects with ease and speed. Git was first developed by Linus Torvalds who was also the founder of well-known Linux Kernel. GitLab is an awesome development in the field of git and distributed version control system. It is a web
codingsec.webp 2016-05-16 16:00:13 How to perform SSH tunneling in python (lien direct) In this article I am going to perform ssh tunneling using python. SSH tunneling is amazing but can be confusing to understand and configure, especially when dealing with a reverse SSH tunnel. Recall that our goal in all of this is to run commands that we type in an SSH client on a remote SSH server. When using an SSH tunnel, instead of typed commands being sent to the server, network traffic is sent packaged inside of SSH and then unpackaged and delivered by the SSH server. Imagine that you're in the following situation: You have remote access to an
codingsec.webp 2016-05-16 15:51:20 Here is What Happens When You Delete a File or Folder (lien direct) It happens. You delete a folder or format a memory card without realizing that it contained some crucial file, photo, or document. Fortunately, there are a number of ways you can recover or “undelete” that file. However, it's not magic and you won't be able to recover 100% of your file 100% of the time. To understand what affects your chances for a successful file recovery and what you can do to increase those chances, it's worthwhile to learn what happens when you delete a file. And that's precisely what we'll talk about in this article. Into the Trash Bin
codingsec.webp 2016-05-15 17:19:17 12 Best python Frameworks to look out (lien direct) In this article I am going to list out 12 best python libraries. Python is among one of the most popular and code-efficient languages available amongst developers. Python is a programming language that lets you work more quickly and integrate your systems more effectively. You can learn to use Python and see almost immediate gains in productivity and lower maintenance costs. It has myriad of features that are not available in any single language and it rather motivates programmers to write a readable code. If you are a programmer, you definitely look forward for web frameworks as they allow you
codingsec.webp 2016-05-15 15:07:23 Anonymous Launches OnionIRC to Teach About Hacking & Hacktivism to Everyone (lien direct) The Anonymous hacker group is well known for being the world’s biggest hacker group. Some support them and some think they are a threat to the society, anyhow that’s the topic of discussion for another day. At the end of April, Anonymous launched their OnionIRC, an internet relay chat network where the group says it aims to teach people about hacking and hacktivism. Since the day of launch the group released several tutorials on hacking which you can find on their Twitter account @OnionIRC. The are taking  classes on all sorts of subjects, ranging from how to use tools like nmap and bash
codingsec.webp 2016-05-14 16:00:54 Recover deleted files using python (lien direct) In this article I am going to show you how to recover the deleted files using python script from Dropbox using it’s application programming interface. First Up you need a dropbox developer account you can get it from the Developers Page at Dropbox. https://www.dropbox.com/developers Create an app in the dropbox in order to auth file access to your code. And now the Coming to the Code   import codecs import sys from datetime import date, datetime, timedelta from dateutil import parser from dropbox import client, rest, session # Get your app key and secret from the Dropbox developer website APP_KEY
codingsec.webp 2016-05-13 16:38:15 A Robot has been Teaching College Students For Several Months and No one Noticed It (lien direct) Robotics has been the rising field in science with great advancements coming every day. These robots pose a great thereat of replacing human work and generate a huge unemployment problems. Negative perspective aside, his new robot AI-powered TA called Jill Watson has been helping out students at the Georgia Institute of Technology for months in secret. Jill’s real identity has only recently been revealed, which has come as a big surprise to most of the 300+ students in the course. The class is (of course) focussed on artificial intelligence, and Jill’s main tasks were to respond to student queries via email, ★★★★★
codingsec.webp 2016-05-12 22:27:41 ACE VoIP Directory Tool (lien direct) ACE VoIP Directory Tool ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface. In the same way that the “corporate directory” feature of VoIP hard phones enables users to easily dial by name via their VoIP handsets, ACE was developed as a research idea born from “VoIP Hopper” to automate VoIP attacks that can be targeted against names in an enterprise Directory. The concept is that in the
codingsec.webp 2016-05-12 17:11:32 How to program a netcat clone in python (lien direct) In this article I am going to program a netcat replacement in python. Netcat is the utility knife of networking, so it's no surprise that shrewd systems administrators remove it from their systems. On more than one occasion, I've run into servers that do not have netcat installed but do have Python. In these cases, it's useful to create a simple network client and server that you can use to push files, or to have a listener that gives you command-line access. If you've broken in through a web application, it is definitely worth dropping a Python callback to give
codingsec.webp 2016-05-12 13:17:24 Acccheck – kalilinux (lien direct) Acccheck Attempts to connect to the IPC and ADMIN shares depending on which flags have been chosen, and tries a combination of usernames and passwords in the hope to identify the password to a given account via a dictionary password guessing attack. this  tool is designed as a password dictionary attack tool that targets windows authentication via the SMB protocol. It is really a wrapper script around the 'smbclient' binary, and as a result is dependent on it for its execution. only use -v mode on very small dictionaries, otherwise, this has the affect of slowing the scan down to
codingsec.webp 2016-05-11 19:20:31 Windows has a Zero-Day Leveraged in PoS Attacks (lien direct) Microsoft fixed it in no time Microsoft patched a zero-day vulnerability in the Windows operating system that was used in real-world attacks to escalate user privileges and help crooks deliver malware to PoS (Point of Sale) systems. Security firm FireEye says the criminal group behind this campaign targeted more than 100 North American businesses, mainly in the retail, hospitality and restaurant industries. The company also reveals the presence of two never seen before malware families, PUNCHBUGGY and PUNCHTRACK, used only by this threat group. PUNCHBUGGY is a simple DLL file, but modified to allow crooks to request and download files
codingsec.webp 2016-05-11 16:30:31 How to create a TCP client in python (lien direct) In this article I am going to show you how to create a TCP and UDP client in python. The network is and always will be the sexiest arena for a hacker. An attacker can do almost anything with simple network access, such as scan for hosts, inject packets, sniff data, remotely exploit hosts, and much more. But if you are an attacker who has worked your way into the deepest depths of an enterprise target, you may find yourself in a bit of a conundrum: you have no tools to execute network attacks. No netcat. No Wireshark. No compiler
codingsec.webp 2016-05-10 22:14:39 METASPLOIT-FINDING AND EXPLOITING A MYSQL USER ACCOUNT (lien direct) today I will be talking about how you can use MetaSploit to identify a host who has an open instance of MySQL. We will then brute force the host looking for the credentials we can use to login, and lastly we’ll close by examining the database and taking some credit card credentials. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it's a good idea to try to use
codingsec.webp 2016-05-10 18:19:58 Here is How the Computer Antivirus Software Works (lien direct) All of us use Anti-virus softwares in our computers, but did you ever wonder how does a computer Antivirus work? Today in this article we will discuss about the same. To properly fight viruses, you should get an antivirus program. That's because Windows itself doesn't come with antivirus software. If your PC came supplied with antivirus software, it was most likely a trial version. The antivirus program you choose should have two modes of operation: Interactive: In this mode, the program lurks in the background and monitors the computer's activity. Specifically, the interactive mode looks for a virus coming in from
codingsec.webp 2016-05-10 16:00:18 How to sequence array in fixed datatype in python (lien direct) In this article I am going brief over the arrays and the sequence of it’s fixation. The array module defines a sequence data structure that looks very much like a list, except that all of the members have to be of the same primitive type. The types supported are all numeric or other fixed-size primitive types such as bytes. Type Codes for array Members Code Type Minimum size (bytes) b int 1 B int 1 h signed short 2 H unsigned short 2 i signed int 2 I unsigned int 2 l signed long 4 L unsigned long 4 q
Last update at: 2024-05-07 04:07:52
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter