Introduction¶ Owasp Php configuring and the web server it is running on to be very secure. Below you will find information on the proper settings for the php.ini file and instructions on configuring Apache, Nginx, and Caddy web servers. For general PHP codebase security please refer to the two following great guides: […]

Denial of Service Attacks

What is a Denial of Service Attacks? A Denial of Service Attacks (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or […]

Juice-jacking-scam

Juice Jacking Attack one of the most recent and most creative ways of penetrating PC frameworks.It includes a generally neglected escape clause allowing an aggressor to directadmittance to your frameworks. In this piece, we’ll investigate thesignificance, history, types, and working rules of juice jacking. Juice jacking is a framework weakness […]

how man in middle works

Man-in-the-middle attacks (MITM) can be executed in a number of different ways that exploit communications between other parties. Whether by passive or active means, an MITM attack finds a way between a user and an entity and attempts to conceal the breach and information theft. Below are common ways Man-in-the-Middle […]

With the increased usage of social media around the globe, stealing of social media credentials by hackers has become a major problem around the globe. The stolen social media credentials are later used to lure and steal money and other valuable from unsuspecting social media users, friends and family. In […]

Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to implement. However, passwords can also introduce security vulnerabilities. Password crackers are designed to take credential data stolen in a data breach […]

In today’s technological era, we are witnessing a massive leap in the usage of the internet and networking devices. Every home has a laptop, smartphone, digital watch, IoT device, home automation component, and other devices that are connected to the home network or the Internet. Devices communicate with each other […]

and view the status of the network interfaces in Linux operating systems. With ifconfig, you can assign IP addresses, enable or disable interfaces, manage ARP cache, routes, and more. In this article, we’ll explore how to use the ifconfig command. How to Install ifconfig The ifconfig command is deprecated and replaced with ip and may not be included […]