What is ARP Poisoning

What is ARP Poisoning ARP is the acronym for Address Resolution Protocol. It is used to convert an IP address to physical addresses [MAC address] on a switch. The host sends an ARP broadcast on the network, and the recipient computer responds with its physical address [MAC Address]. The resolved IP/MAC address is then used … Read more

What is IP Address and MAC Address

What is IP Address and MAC Address IP Address IP Address is the acronym for Internet Protocol address. An internet protocol address is used to uniquely identify a computer or device such as printers, storage disks on a computer network. There are currently two versions of IP addresses. IPv4 uses 32-bit numbers. Due to the … Read more

Apache MPM performance Test : event -prefork

Apache MPM performance Test: event -prefork As a basic test, I will create a PHP file that checks the existence of another file named,  test.php in the same directory of two CentOS 7 servers with the same hardware characteristics and load but with different MPM. One of them will use event and the other one will use … Read more

Boost the Performance of Your Apache

Boost the Performance of Your Apache Apache continues to be the most widely used web server among sites and Internet-facing computers. Additionally, Apache keeps experiencing the largest growth among the top web servers, followed by Nginx and IIS. Thus, if you are a system administrator in charge of managing Apache installations, you need to know how to make sure your web … Read more

Ethical Hacking: Worm, Virus & Trojan Horse

Ethical Hacking: Worm, Virus & Trojan Horse Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer-controlled equipment. Some of the ways that … Read more

How to Crack a Password

How to Crack a Password What is Password Cracking? Password cracking is the process of attempting to gain unauthorized access to restricted systems using common passwords or algorithms that guess passwords. In other words, it’s the art of obtaining the correct password that gives access to a system protected by an authentication method. Password cracking … Read more

Cryptography: What is Cryptanalysis, RC4 and CrypTool

Cryptography: What is Cryptanalysis, RC4 and CrypTool Information plays a vital role in the running of businesses, organizations, military operations, etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information. Cryptology involves transforming information into the Nonhuman readable format … Read more

Social Engineering : Attacks, Techniques & Prevention

Social Engineering: Attacks, Techniques & Prevention Social engineering is the art of exploiting the human elements to gain access to un-authorized resources. Social engineers use a number of techniques to fool the users into revealing sensitive information. Organizations must have security policies that have social engineering countermeasures. What is Social Engineering? Social engineering is the … Read more

Programming languages that are useful to hackers

Programming languages that are useful to hackers Why should hackers learn how to program? Hackers are problem solvers and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots … Read more

Potential Security Threats To Your Computer Systems

Potential Security Threats To Your Computer Systems Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental, or caused by natural disasters. In this article, we will introduce you to the common computer system threats and how you can protect systems against them. A … Read more