Installation of Kali Linux

1. First, plug the USB drive into the respective computer that Kali should be installed upon and proceed to boot to the USB drive. Upon successful booting to the USB drive, the user will be presented with the following screen and should proceed with the ‘Install’ or ‘Graphical Install’ options. This guide will be using Read more…

What is SQL Injection?

SQL INJECTION Website hacking According to Wikipedia SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). A Basic HTML Website does not contain a SQL database which is based on Read more…

hex editor

What Is Hex Editing?

HEX Editor MODDING AND MANIPULATION According to Wikipedia It (or binary file editor or byte editor) is a type of computer program that allows for manipulation of the fundamental binary data that constitutes a computer file. The name ‘hex’ comes from ‘hexadecimal’: a standard numerical format for representing binary data. Read more…

Hacker's

ANONYMITY

Anonymity Anonymity is the state when nobody knows who are you on the internet. This state is used by Hacker Worldwide to perform their activities so that no one can trace them. Internet Protocol (IP) Internet protocol is a unique numeric identification number of every individual internet user which can Read more…

STAY CONNECT WITH US