Social Engineering Attacks

Hi guys today we are going to talk about Social engineering attacks. The efforts that you put in to securing your computer devices using network firewalls, IPS, and web application...
ethical hacking

Understanding Penetration Testing and Web Application

Different testing methodologies Often people get confused with the following terms and use them interchangeably without understanding that although there are some aspects that overlap within these, there are also...

Linux – The power of terminal and why should we use it

Let's face it, most of the world doesn't even know what Linux is. Isn't that a shame? So, today my friends, I want to talk about Linux and it's power....



Latest article


8 Reasons Why You Should Choose WordPress For Your Website

There are some other platforms to make a website but today, in this article, we will see why WP might be the best option...
java applet

Java Tutorial 1 – Sum of 2 numbers using Applet

Hello guys today I am gonna show how to add 2 numbers using Java Applet. Since we are using Applet, the first thing we should...

AES Encryption with Source Code – JavaFX

Hi guys today I'm gonna teach you about AES-Encryption. This encryption method is very useful for protecting your data against any intrusion.Even if intruders...