Different types of Email Account Hacking
Top 10 Important command prompt's commands
Posted by Unknown | 11:30
In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage. 1. ipconfig : ...
What is Malicious Softwares? What are the type of Malicious Softwares.
Posted by Unknown | 11:28
What is Malware? : Malware is a malicious software. This software include the program that exploit the vulnerabilities in co...
Introduction to Social Engineering world | Hack the people
Posted by Unknown | 11:24
What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential i...
How to Become a Penetration Tester/Ethical Hacker//Security Professional?
Posted by Unknown | 11:22
I have been asked for tips to become Ethical Hacker or Penetration tester via email. So In this article, i am going to guide y...
What is computer hacking? Introduction to Hacking
Posted by Unknown | 11:19
What is computer hacking? Hacking is the process of taking advantage of weakness in a computer or computer network to accomplish his goal...
What is Penetration Testing and Pen Testing Distribution?
Posted by Unknown | 11:10
Penetration Testing(Pen Testing) is the act of evaluating the Security of system or network by exploiting vulnerabilities. This will dete...
Quick Tip: Validate email address in C#.NET with Regular Expressions
Posted by Unknown | 03:57
Ok so this is no biggie, but sure comes useful at some point when dealing with any kind of form input validation. Actually I just found m...
0
comments
Labels:
.net,
regex
Take website offline for upgrade and display maintenance screen in ASP.NET 2.0 (and above)
Posted by Unknown | 03:52
Lately I’ve been doing a lot of research about Continuous Integration and Continuous Deployment practices, the latter being most relevant ...
0
comments
Labels:
.net,
asp.net,
deploy