The art of port forwarding on Linux

In order to be stealth and jump from node to another to cover up your movements sometimes you will need to use port forwarding. Why in Linux because its stable and you have many options that you don’t get on windows.       There are many tools out there but we have picked the ones we have tried as explained below: Rinetd Score:3/10...

Read More
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+

SSL is the technology used to encrypt and decrypt messages sent between the browser and server. By encrypting the data, you protect messages from being read while they are transferred across the Internet. encrypts a message from the web browser, or application then sends it to the server. When the message is received by the server, decrypts it and verifies that...

Read More
Sanitize data and prevent SQL injections in php

The reason for adding this blog is sometimes when I code in php I normally forget that data has to be sanitized before executing to prevent or XSS attacks. The simplest way to make SQL injection hard is to use either Mysqli or PDO prepare statements – Examples – as it keeps the SQL and data inputs completely separated. However if you need to use...

Read More
How to protect your WordPress external links

As you notice all external links on my Blog are in order to protect the content from being copied. I tried to find a plug-in that does that but I couldn’t so I modified one that encodes external URLS to so instead of encoding the I will show you how to encrypt it with your own defined key. I will show you how I did it through simple steps if you wish...

Read More
The little secret on Digital Forensics

On this article I will cover the hot topic of Digital Forensics. The interest is not limited to digital investigators or digital crime, it can be used in the private sector during internal corporate investigations. Digital can be categorized as computer forensics, mobile forensics, network forensics, forensic data analysis and database forensics. Digital...

Read More
  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5

Pin It on Pinterest