What is Email Header ? View email header in Gmail.

Many people open there inbox in-order to check their email or send a email and then sign-out but what we do not know that there are indeed lot of things are carried out when we simply send or receive a email. There is a detail report/history of all those things  that are carried out and are attached with the...
What is Email Header ? View email header in Gmail. What is Email Header ? View email header in Gmail. Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, October 28, 2019 Rating: 5

10 Steps to take after Cyber Security Breach 2019

While a major part of preventing all massive potential data intrusion damage or cyber security breaches lies in the preventative measures of secure code, updated security software, use of frequently updated applications and strong passwords for all access points to your data; sometimes cyber security breaches happen no...
10 Steps to take after Cyber Security Breach 2019 10 Steps to take after Cyber Security Breach 2019 Reviewed by Satyajit (Admins,a.k.a Satosys) on Thursday, October 24, 2019 Rating: 5

Ramnit : Worm that loves Facebook

 "Ramnit"  the worm with multifaceted spreading capabilities,first detected on 2010 for infecting local systems. Now the hackers behind it have redesigned it into a more advanced kind of worm.The worm has already stolen 45000 facebook credentials and still on move. It is also confirmed that this worm...
Ramnit : Worm that loves Facebook Ramnit : Worm that loves Facebook Reviewed by Satyajit (Admins,a.k.a Satosys) on Friday, January 20, 2012 Rating: 5

A Beginner's Guide to Android Rooting | Easy Reference

Android in the one of the widely accepted OS in devices(phones,Tabs etc) these days because of its largely managed apps and control it give to its users.Where is honey so bears are there...... I mean because of its popularity it is one of the hotspot for attacker these days.So,I thought of sharing few security tips...
A Beginner's Guide to Android Rooting | Easy Reference A  Beginner's Guide to Android Rooting | Easy Reference Reviewed by Satyajit (Admins,a.k.a Satosys) on Saturday, October 22, 2011 Rating: 5

Yersinia | Analyze and Test Deployed Networks

"Yersinia" a type of bacteria but here in context to this site it is  a  Network tool designed to analyze,test and monitor  the weakness in different network protocols listed with it. Attack on the following Network Protocol are possible as listed below. Recently Cisco VTP Dos exploit  included...
Yersinia | Analyze and Test Deployed Networks Yersinia | Analyze and Test  Deployed  Networks Reviewed by Satyajit (Admins,a.k.a Satosys) on Sunday, October 16, 2011 Rating: 5

winAUTOPWN V2.7 | Windows Interactive exploit framework Tool

winAUTOPWN is a simple tool which works on windows platform and is quick in systems vulnerability exploitation.This is tool which takes less information from your side and does more effective work. Why you should use this tool? 1. It takes simple inputs like IpAddress,Hostname,CMS Path 2. It also does a smart...
winAUTOPWN V2.7 | Windows Interactive exploit framework Tool winAUTOPWN V2.7  | Windows Interactive exploit  framework Tool Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, September 21, 2011 Rating: 5

Katana | A portable multi-boot security suite

Katana a tool which holds over 100 applications under it which can be run a USB/flash drive.As the new v2 has come up with a major addition called "Forge",which helps in further addition of new applications to the booting list. >>>>>Learn how to use portable applicaions from your PC. Portable Applications: 1.BackTrack 2.Computer...
Katana | A portable multi-boot security suite Katana | A portable multi-boot security suite Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, February 09, 2011 Rating: 5
Page 1 of 1112311Next
Powered by Blogger.