Posts

10 Ways to Secure Your Business Email: The Ultimate Guide

The rise of cloud services has made it easier than ever for businesses to operate and collaborate remotely. This has also led to a surge in the use o…

Exploiting SQL Injection at Authorization token

Today In this post, I will be sharing a unique writeup on SQL injection with Authorization Headers token. A little bit intro to Authori…

10 essential Linux tools for network and security pros

It isn't easy to include only ten Linux open source security solutions, notably while network experts and security analysts have access to dozens…

Why Do You Need to Protect Your Small Business Website in 2022?

Running a business was never easier than now. Business owners can venture out into the world and meet their target markets thanks to the …

How to transfer files from Android to Kali Nethunter unrooted

Hello guys, In this tutorial, I will be teaching you how you can transfer files from Kali Nethunter to your sdcard It can be quickly done on a Rooted…

PyScript won't be killing JS (here is why)

We have seen Tech Influencers showing Javascript less importance for a couple of days because of the new PyScript. Which is executable via w…

Indian Government Crack Down On VPN Services

VPN users spiked in India after the pandemic hit, these services are heavily used for online fraud and hate speech, and  most of the VPN traffic…