+91 9116117170

Author: Shaurya Sharma


What is ADB? ADB Latest Commands List

By Shaurya Sharma 0 Comment August 30, 2019

In this article, you will learn what is ADB? ADB Latest Command Lists, ADB (Android Debug Bridge) is, why users need it, and how to manage it using commands in the Android terminal. Well, let’s begin to study adb android commands. ADB (android debug bridge) is a debugging tool, detecting errors in applications, unlocking devices on Android […]


What is Netcat? All NetCat Commands

By Shaurya Sharma 0 Comment April 18, 2019

Netcat utility is often called “Swiss Army Knife”, in the good sense of the word. The netcat functionality is useful to the same extent that the versatility and handiness of the reputable pocket Swiss Army Knife is useful. Some of its features include port scanning, file transfer, port listening, and it can be used as […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Shaurya Sharma 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

RFID attacks

New Generation Hacking: RFID Attacks

By Shaurya Sharma 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

What is DHCP?

By Shaurya Sharma 0 Comment December 18, 2018

DHCP is a dynamic host configuration protocol. As the name implies, DHCP isdesigned to configure a host through a remote server. DCHP is supported bydefault by most modern operating systems, and this protocol acts as anexcellent alternative to the routine manual configuration of network parametersfor a server or a connected device. This protocol works on the […]

error: Content is protected by Cyberops !!