In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify an active process….
Read moreIn this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using PHP and Ajax….
Read moreOn March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only or immutable files…
Read moreIn this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….
Read moreIn this article, we will learn to configure VMWare ESXI logs to ELK stack using UDP and Syslog protocol. As we all knows, Logstash is configured through a number of plugins that support…
Read moreWith well over 10 million installations, MySQL is probably the most popular database management system for web servers. Developed in the mid-1990s, it’s now a mature technology that powers many of today’s most-visited…
Read moreYour computer is more vulnerable when its OS is out of date. While system updates don’t protect you in the same way an antivirus does, updates help keep your computer safe from the…
Read moreWireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to many wireless attacks. There is no debate about how much easier WiFi has made our lives. Now…
Read moreDatabases are usually the main targets of any attack, specifically for the information that they store in their database. According to OWASP Standard, the SQL injection vulnerability is one of the ten most…
Read moreWhen you compile any source code, an object file is generated of that program and with the help of linker, that object files gets converted to a binary file which, only the machine…
Read moreMicrosoft Defender Antivirus (a.k.a Windows Defender) is a built-in free anti-malware software included with Windows 10/11 that protects the computer from viruses, malware, spywares and Trojans. In addition to antivirus and anti-malware protection,…
Read moreWindows 11 is the latest major release of Microsoft’s Windows NT operating system, and is the successor to Windows 10. Citing security considerations, the system requirements for Windows 11 were increased over Windows…
Read moreKali Linux operating system can be considered the number one security operating system of today. This is the operating system that the programming world usually likes to use to perform penetration testing or…
Read morePHP has many configuration settings that determine how it behaves. The configuration settings are stored in a text file named as php.ini. PHP looks for the file php.ini when it begins and uses…
Read more