If you are a movie buff like me you wouldn't want to miss out on this upcoming short film. The use of Nmap and Metasploit framework is sure to drive you nuts!!!
Liked it? Then check out this link for bonus footage at the official website here.
...
Monday, 3 September 2012
Saturday, 1 September 2012
0 How Antivirus Detect Viruses and other Malware
Earlier we have discussed what are Viruses and Worms. Generally most users have one or the other antivirus software installed on their systems to protect them from such malware.
But have you ever wondered how these software differentiate between which is a harmless file and what is actually harmful? In this post we'll be taking a look at how an antivirus decides which file is infected.
There are mainly two approaches used to detect a malware by an antivirus software which are in use today:
Virus Signature Approach:
In this approach the antivirus checks the file and compares it with a dictionary...
Friday, 31 August 2012
0 Virus vs Worms

In my previous post we introduced the concept of UTMs. In this post let us take a look at a common security problem.
In our everyday life we often hear people complain how their computer got infected by a 'virus'. Well in reality it may not always be a virus but some other malicious stuff. The correct term to be used in such case is 'malware'.
There maybe different types of malwares like Viruses, Worms, Trojans, Rootkits, etc. In this post we'll take a look at virus and worms.
Viruses:
A computer virus is mostly an executable that attaches itself to a program or a file. It can spread over other systems when such files are shared.
Almost all...
Sunday, 26 August 2012
0 Vulnerability, Exploits & Payloads
You must have come across a recent news article stating a website being hacked and home page turning into something dangerous like "Beware!! We are the Hackers" along with the picture of a skull (in most cases to create horror!!) or page being replaced with some explicit content. Ever wondered how hackers breach the security and break into websites or other systems? Today I will discuss how a hacker approaches a system or a website to hack it.
To break into any system the person (hacker) searches for its vulnerability and then uses the same vulnerability to break into it. Now a question arises:
What is a Vulnerability?
A vulnerability is...
Labels:
Exploit,
Payload,
security,
Vulnerability
Saturday, 25 August 2012
2 What is a UTM? | Kunal Goel

In the previous post we discussed about a YouTube trick to look inside a Private video. You can read it here. In this post we take a look at a technology which is increasingly being adopted by firms for their security needs.
Unified Threat Management (UTM) is a term used to describe a comprehensive security product which includes protection against multiple threats. It can be thought of as an all in one solution to an organization's security needs. A UTM system integrates a range of security features in a single appliance like
Firewall
Antivirus Software
Anti-Spyware
VPN
Spam Filtering
Content Filtering
Intrusion Detection...
Labels:
firewall,
network security,
security,
Unified Threat Management,
UTM
Saturday, 18 August 2012
0 YouTube Private Videos Trick | Kunal Goel

Well we all have used YouTube at one point or the other in our lives for any reason ranging from checking out a newly released music video or at other times maybe for an educational online video tutorial. Whatever maybe the reason, the fact is that YouTube has become an indespensable part of web.
In the previous post we discussed about some common networking protocols.
In this Post we'll be having some fun with a youtube trick I discovered while surfing the Internet.
You may have come across an error on YouTube like the one displayed below while trying to view a video. This is because the video you tried to access was a "Private...
Friday, 17 August 2012
9 HTTP, SMTP, NNTP and more - Protocols discussed
In the previous post we gave an introduction about this blog and its contents.
In this post we'll be introducing some commonly used protocols.
First let us see "What is a PROTOCOL?"
A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Now let us take a look at some protocols and commonly used port numbers for their services:
HTTP stands for HyperText Transfer Protocol.
It is the data transfer protocol used on the World Wide Web.
It runs on port 80.
SMTP stands for Simple Mail Transfer Protocol
...
Labels:
FTP,
HTTP,
IMAP,
Networking,
networking basics,
networking protocols,
NNTP,
POP,
port number,
ports,
protocols,
SMTP,
usenet
Subscribe to:
Posts (Atom)