
In this post we will take an in depth look at the cryptocurrency Gridcoin, we show how we found two critical design vulnerabilities and how we fixed them. In the last past years we saw many scient…
meNGAKui, meNGIKuti, meNGUKir Kebenaran
In this post we will take an in depth look at the cryptocurrency Gridcoin, we show how we found two critical design vulnerabilities and how we fixed them. In the last past years we saw many scient…
You either landed on this blog post because you are a huge fan of Hacktivityyou bought this badge around a year agoyou are just interested in hacker conference badge hacking. or maybe all of the above…
"The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source a…
What is the terminologies in ethical hacking?Here are a few key terms that you will hear in discussion about hackers and what they do:1-Backdoor-A secret pathway a hacker uses to gain entry to a compu…
Most of the people don't go with videos and read books for learning. Book reading is a really effective way to learn and understand how things work. There are plenty of books about computers, security…