Newest methods to activate Windows 8/8.1 for FREE without software

Featured

Newest methods to activate Windows 8/8.1 for FREE without software Newest methods to activate Windows 8/8.1 for FREE without software : A lot of people say Windows 8 (8.1) isn’t a patch on Windows 7 but I don’t think so. Perhaps its Metro user interface is more difficult to use than traditional Start menu and … Continue reading Newest methods to activate Windows 8/8.1 for FREE without software

Advertisements

Information Gathering Using Kali Linux the harvester tool.

Featured

Information Gathering Using Kali Linux the harvester tool Today we will learn about Information Gathering using the Harvester in Kali Linux. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client. The Harvester has been developed in Python by Christian Mozzarella. … Continue reading Information Gathering Using Kali Linux the harvester tool.

Kali on the Windows Subsystem for Linux

Featured

We’re always on the prowl for novel environments to run Kali on, and with the introduction of the Windows Subsystem for Linux (WSL) in Windows 10, new and exciting possibilities have surfaced. After all, if the WSL can support Ubuntu, it shouldn’t be too hard to incorporate another Debian-like distribution, right? This is especially true … Continue reading Kali on the Windows Subsystem for Linux

HOW TO PROTECT WEBSITE FROM SQL INJECTION ATTACK

How to Protect website from SQL Injection Attack How to Protect website from SQL Injection Attack: SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database … Continue reading HOW TO PROTECT WEBSITE FROM SQL INJECTION ATTACK