+91 9116117170

Category: Linux

Virtual Private Network (VPN)

By Chandan Singh 2 Comments August 6, 2016

What is VPN A VPN or Virtual Private Network is a technique used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are generally employed by corporations to protect sensitive data. However, by using a personal VPN is more and more becoming very popular as more interactions […]

Proxy Server

By Chandan Singh 0 Comment August 6, 2016

What is Proxy Server A proxy server is another intermediate computer which serves as a hub by which internet demands are processed. By linking through one of those servers, your computer transmits your requests to the proxy server which then processes your request and returns what you were wanting. In this manner it acts as […]

[Tutorial]: Network Attacks Using Zarp

By Chandan Singh 0 Comment August 5, 2016

Hey guys..!!! Network Security is a field where penetration testers are paid to test organization’s  Network Infrastructure’s security against different type of Cyber attacks. Having options of penetration testing tools is always a good thing. We can test any network’s security using different-different tools. From that list of penetration testing tools, we are going to introduce […]

How to install and use of Linux Bash in Windows 10

By Chandan Singh 0 Comment August 5, 2016

How to Install To get start to install Linux Bash in windows, make sure that your system is enable insider Preview builds. Linux Bash in windows 10 works only on 64 Bit Operating System. So you can check these information by: My Computer >> Right Click >> Properties Once you sure that above thing go to […]

How to make secure Website to being Hacked(Blocked Scanner)

By Chandan Singh 0 Comment July 24, 2016

As you may all know there are many Web Vulnerability Scanning devices and software available on internet which can scan any website for vulnerabilities? It is just a fashion nowadays to scan an internet site from a Web Susceptibility Scanner and if received or acquired any vulnerability then record or survey vulnerabilities to the manager, […]

error: Content is protected by Cyberops !!