search
Follow Topic rss_feed

Learn network penetration testing / ethical hacking in this full tutorial course for beginners. This course teaches everything you need to know to get started with ethical hacking and penetration testing. You will learn the practical skills necessary to work in the field. Throughout the course, we will develop our own Active Directory lab in Windows, make it vulnerable, hack it, and patch it.

Bharat Dwarkani shared on Dec 15, 2019
image
youtube.com
bookmarks
share
visibility2
visibility2 share bookmarks

Isn’t it going to be nice if you can reach your pen-testing lab from all over the world? As we all know, this is a digital age that makes life easier than our expectations, thus anyone can access their information/data from the cloud. Similarly, a Pentester can design its pen-testing environment for the vulnerable machine on the cloud that can be accessed from anywhere.

Bharat Dwarkani shared on Dec 04, 2019
image
hackingarticles.in
bookmarks
share
visibility3
visibility3 share bookmarks

Nowadays, people are worrying to use the internet due to website security. Internet theft is increasing day by day. Users are trying to mislead the internet in recent years. So it is the developer’s responsibility to the internet well and we don’t want to make the way to malicious activities to take place in our own/undertaking applications.

Puthiya shared on Nov 20, 2019
image
rsagames.com
bookmarks
share
visibility14
visibility14 share bookmarks

JWTs (JSON Web Token, pronounced 'jot') are becoming a popular way of handling auth. This post aims to demystify what a JWT is, discuss its pros/cons and cover best practices in implementing JWT on the client-side, keeping security in mind.

Bharat Dwarkani shared on Sep 22, 2019
image
blog.hasura.io
bookmarks
share
visibility19
visibility19 share bookmarks

This article is full of tips to help you use Docker safely. If you’re new to Docker

Bharat Dwarkani shared on Sep 03, 2019
image
towardsdatascience.com
bookmarks
share
visibility0
visibility0 share bookmarks

By now, most of you have heard about the "Let's Encrypt" initiative. Provided by the Internet Security Research Group, the service uses open certificate authority. Also good: it's free and automated.

Bharat Dwarkani shared on Aug 26, 2019
image
datamation.com
bookmarks
share
visibility4
visibility4 share bookmarks

Have you ever heard of Load Balancer? Reverse Proxy? If you’ve ever heard the term ReverseProxy or Load Balancer being thrown around and wondered to yourself what that term meant or how to use NGINX as Reverse Proxy. Setup a production-grade Customized NGINX Docker Image with ModSecurity and Google’s, Brotli Lossless file compression.

Bharat Dwarkani shared on Aug 23, 2019
image
medium.com
bookmarks
share
visibility41
visibility41 share bookmarks

There are many implementations of the SQL database language available on Linux and Unix-like systems. MySQL and MariaDB are two popular options for deploying relational databases in server environments. However, like most software, these tools can be security liabilities if they are configured incorrectly. This tutorial will guide you through some basic steps you can take to secure your MariaDB or MySQL databases, and ensure that they are not an open door into your VPS.

Bharat Dwarkani shared on Aug 18, 2019
image
digitalocean.com
bookmarks
share
visibility6
visibility6 share bookmarks

Test Security headers of your site

Bharat Dwarkani shared on Aug 18, 2019
image
securityheaders.com
bookmarks
share
visibility16
visibility16 share bookmarks
add