Cryptocurrency Cryptocurrency :- Cryptocurrency started in the 1980s with David Chaum’s work. He is commonly referred to as the inventor of secure digital cash for his paper on cryptographic primitives of blind signatures. In this paper, Chaum proposed a novel cryptographic scheme to blind the content of a message before …
Read More »Penetration Testing
Penetration testing Penetration testing, often called “pentesting”, “pen testing”, “network penetration testing” or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person …
Read More »Hackers :)
hackers List of popular hackers or hackers collective that have brought on a name for themselves. Some have landed in prison, while others are still hacking away. It is important to know that certain types of hacking are illegal. Best hackers:- List of best hackers Jonathan James, Kevin Mitnick, Kevin …
Read More »Vulnerability :)
vulnerability Vulnerability:- Vulnerability in any system is the result of an intentional or unintentional omission or of an inadvertent design mistake that directly or indirectly leads to a compromise in the system’s availability, integrity, or confidentiality. In information assurance, vulnerabilities may hide in each level of security, be it information …
Read More »How to use TOR BROWSER for Hacking :)
how to use Tor for hacking how to use tor for hacking:- Hacking is done for many different reasons. Hacking is highly illegal and needs to be done under safe circumstances. You can use Tor to hack like you can any other application. But, there are more ways that you …
Read More »