Free web hostingWeb hosting

The Holmes of Programming

Everyone should learn to code primarily because it teaches you how to tackle problems. Programming is a "Sherlock Holmes" skills of the digital world. Well, he did have a little more skills than what is required. But the point is that programming requires a sense of The Science of Deduction...

Programmers: Nuts or not?

People have an amazing ability to think. They have this power of imagination to explore limitless possibilities. Unfortunately, not everyone uses them correctly. People think programmers are nerds who stare into their computer screens and use their fingers like ninja blades. Some people even thin...

Man-In-The-Middle-Attack

Man-in-the-Middle Attack (MITM) is one of the most successful vector for gaining control of customer information and resources. In this attack, the attacker situates himself in between the customer and the real web-based application. Through this process, he proxies all the ...

Bypassing Firewalls and Tunnelling Tools and Techniques

Firewalls are regarded as the primary defence mechanism while connecting private networks to the internet. There are various types, but firewalls essentially control access at the application and transport layers, often using application layers information to make access control decisions. A fire...

Top 15 Security Tools and Utilities

1. NmapNmap is a free open source utility for security auditing and network exploration. Nmap("Network Mapper") was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the ne...

So, who am I?

Well, like everything in this crazy little world, I am a number 1.4285714e-10I am 1.4285714e-10% of this world's population.In a world with a population of over 7 billion, it is hard to tell who I really am but HOPEfully, the world will kn...