Skip to main content

Posts

Showing posts from 2018

What is Virtual Private Network (VPN) ?

A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources. To ensure safety, data travels through secure tunnels, and VPN users must use authentication methods -- including passwords, tokens or other unique identification procedures -- to gain access to the VPN server. VPNs are used by remote workers who need access to corporate resources, consumers who may want to download files and business travelers who may want to log into sites that are geographically restricted. VPN services are critical conduits through which data can be transported safely and securely. How A VPN Works? The two most common types of VPNs are remote access VPNs and site-to-site VPNs. A remote access VPN uses a public  telecommunication  infrastructure like the internet...

What is Kali Linux an Introduction.

What is a Kali Linux? Kali Linux  is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Contains Several Hundred Tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is Developed, funded and maintained by Offensive Security , a leading information security trading company. Kali linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of Backtrack Linux, adhering completely to Debian Development Standards. The Features of Kali Linux are as Follows - More Than 600 Penetration testing tools included Free and always will be Open source Git tree Filesystem Hierarchy Standard Compliant Wide-ranging wireless device support Custom kernel, patched for injection Developed in a secure environment GPG signed packages and repositories Multi-language Support Completely customizable...

Wireguard On Kali Linux

What Is Wireguard? Wireguard is a open-source software application and protocol that implements Virtual Private Network (VPN) Techniques to create secure point-to-point connections in routed or bridged configurations. It is run as module inside the linux kernel and aims for better  performance than IPsec and openvpn tunneling protocols. Getting Started With Wireguard On Kali Linux - As Wireguard is  added to kali linux repositories, it can be simply Installed with terminal - apt install wireguard resolvconf As the installation completes, next step is to configure wireguard to use it. So, We Need To generate public/private key pair and set up initial config file - wg genkey | tee privatekey | wg pubkey > publickey umask u=rwx,go= && cat > /etc/wireguard/wg0.conf << EOF [Interface] Address = 10.222.222.1/24 SaveConfig = true ListenPort = 51820 PrivateKey = -SERVER PRIVATE KEY- [Peer] PublicKey = -CLIENT PUBLIC KEY- AllowedIPs = 10.2...

Top 10 Linux Distribution For Ethical Hacking

Top 10 Linux Distribution For Ethical Hacking Ethical Hacking and Cyber Security are one of the most fast developing sector in the IT industries, But the major number of Tasks related to ethical hacking could not be performed on the Windows Platform, There Is a need of  Linux distributions to be used. So, Here is The List of Top 10 Linux Distribution Especially Designed for ethical hacking Tasks. KALI LINUX - It is developed by Offensive Security as the rewrite of BackTrack and tops our list as one of the best operating systems for hacking purposes. This Debian-based OS comes with 500+ preinstalled pen testing tools and applications that make your security toolbox richer to start along. These flexible tools are frequently updated and are offered for different platforms like ARM and VMware. Kali Linux is also feasible for a forensic job as it comes with a live boot capability that provides a perfect environment for vulnerability detection. Download Kali Linux ...

Top 10 Best Gaming Laptops of 2018

Best Gaming Laptops of Year 2018  1. MSI GS65 Stealth - CPU - Intel Core i7 | Graphics -  Nvidia GeForce GTX 1070 (8GB GDDR5X VRAM, Max-Q) RAM - 16GB | Screen - 15.6 inch  FHD (1,920 x 1,080) anti-glare, wide-view 144Hz panel Storage - 512GB M.2SSD Measuring in at just 0 .69 inches thick and featuring beefy Coffee Lake processors, the MSI GS65 Stealth packs a ton of power into a very unassuming package. With an Intel Core i7-8750H CPU and Nvidia GeForce GTX 1070 graphics, there’s nothing you can throw at this thing that’ll slow it down. And, what’s better, thanks to its subdued design, you’ll be able to bring this power out wherever you go, while gaming in, well, stealth.   2. Asus ROG Zephyrus GX501 - CPU:  Intel Core i7 |  Graphics:  Nvidia GeForce GTX 1080 (8GB GDDR5X VRAM) |  RAM:  16GB |  Screen:  15.6-inch FHD (1,920 x 1,080) anti-glare, wide-view 120Hz panel with G-Sync |  Storage:  512GB...

How To Detect Intruders on your WiFi Network

We live an era where people use various techniques to use a WiFi network, May be for free data or to steal personal information. So we want to see the list of peoples using our network, So let's see how to do it. It's a very easy task to do so, You Just Need To have an Android or an iPhone and download a app Named "Fing - Network Tools" from The App Store and You can have a lot of information about the network and connected devices. So Here We are using android play store to explore the app, So you can download the  Fing - Network Tools  From The Google Play Store on Your Android Phone Let's have a brief view of stuff we can do with this app - It Can List The Name Of Devices Which are Connected to your WiFi Network or Which were connected to you WiFi Network in past   Type of Devices i.e.They are mobile or laptop devices, The Above Screenshot shows how the Type indicated with Logo of Mobile or Laptop. The Name Of The Vendor Can Also Be Seen On The Righ...

How To See Deleted Whatsapp Messages

Since, the whatsapp has brought an update with a feature of deleting messages on the other user's phone, there is a hustle and a curiosity to know what was the message that has been deleted, So to solve the issue we have come up with a simple trick that you can use to see what was the deleted message. So, To see the deleted message, you just need to download an app from the Link Below on your android phone Whatsdetect You Will be needing to give some permissions to apps, just follow the steps as directed and that's it. Now Whenever You will Get a new message and it gets deleted, just click on the message and You will see it in the whatsdetect app.

Jio Phone 2 Released and Here are it's Specification

Jio Phone 2 mobile was launched in July 2018. The phone comes with a 2.40-inch display with a resolution of 240 x 320 Pixels. It comes with 512MB of RAM. The phone packs 4GB of internal storage that can be extended up to 128GB via a SD card. As far as the cameras are concerned, the Jio Phone 2 has a 2-megapixel primary camera on the rear and a 0.3-megapixel front shooter for selfies. The Jio Phone 2 runs KAI OS and is powered by a 2000mAh. Connectivity options include Wi-Fi, GPS, Bluetooth, NFC and FM.  Jio Has Decided To Set it up on a Price of Rs 3000 and A Promotional Offer has Been Also Started, according to which you can Exchange your old feature phone and get a new Jio Phone 2 only in Rs 500. Here Are It's Specifications - General - Release Date July 2018 Form Factor QWERTY Battery Capacity 2000 mAh Display - Screen Size 2.40 Touch Screen No Resolution 240x320Pixels ...