Different types of Email Account Hacking

Posted by | 11:32
The Basic level Hacking is Email Account Hacking.  Everyone like to do first email account hacking only.  So here is the tutorial ...

Top 10 Important command prompt's commands

Posted by | 11:30
In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage.   1. ipconfig :       ...

What is Malicious Softwares? What are the type of Malicious Softwares.

Posted by | 11:28
What is Malware? :      Malware is a malicious software.  This software include the program that exploit the vulnerabilities in co...

Introduction to Social Engineering world | Hack the people

Posted by | 11:24
What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential i...

How to Become a Penetration Tester/Ethical Hacker//Security Professional?

Posted by | 11:22
I have been asked for tips to become Ethical Hacker or Penetration tester via email.  So In this article, i am going to guide y...

What is computer hacking? Introduction to Hacking

Posted by | 11:19
What is computer hacking? Hacking is the process of taking advantage of weakness in a computer or computer network to accomplish his goal...

What is Penetration Testing and Pen Testing Distribution?

Posted by | 11:10
Penetration Testing(Pen Testing) is the act of evaluating the Security of system or network by exploiting vulnerabilities. This will dete...

Quick Tip: Validate email address in C#.NET with Regular Expressions

Posted by | 03:57
Ok so this is no biggie, but sure comes useful at some point when dealing with any kind of form input validation. Actually I just found m...
0 comments Labels: ,

Take website offline for upgrade and display maintenance screen in ASP.NET 2.0 (and above)

Posted by | 03:52
Lately I’ve been doing a lot of research about Continuous Integration and Continuous Deployment practices, the latter being most relevant ...