Skip to main content

Posts

Showing posts from 2020

Top 10 In-Demand programming languages to learn in 2021.

The top programming languages for new developers. There are around 600 programming languages out there. The demand and popularity of programming languages fluctuate every year. Also, new programming languages are coming with attractive features. So,  which programming language should you learn?  Learning a new programming language is always an investment of your time and brainpower. If you are a seasoned developer or if you already know several programming languages, then you can learn a niche, modern one.  But if you are starting your programming career in 2020 or if you want to learn your first or second programming language, then  it is wise to learn one of the mainstream and established programming languages . Here I will list programming languages based on the following criteria: Already  mainstream and firmly established  in the Software Development industry. Top-ranked  in the renowned programming languages ranking websites. Popularity is increasing or stable  and not sharply de

Vulnerabilities That Ethical Hacker Can Uncover.

Protocols of ethical hacking:- Staying legal is the foremost key to ethical hacking . The ethical hackers must take management’s approval before performing a security assessment. Approval defines the scope of ethical hacking . The scope of security assessment should be restricted to the pre-defined legal boundaries. By reporting vulnerabilities identified during the assessment , an ethical hacker suggests the remedies to resolve them. Guided by the ethical motive , data security is again one of the crucial tasks of ethical hackers. They should agree to the organization’s non-disclosure policy. Types of problems that ethical hacking can address:- Ethical hacking duplicates the black hat hacking technique to assess security vulnerabilities. Initially, ethical hackers performed reconnaissance to collect as much information as possible. The information is collected by performing automated and manual testing on the permitted area to attack. Once the vulnerabilities are identified, ethical h

What is Metasploit & it's uses in penetration testing.

Penetration testing allows you to answer the question, “How can someone with malicious intent mess with my network?” Using pen-testing tools, white hats and DevSec professionals are able to probe networks and applications for flaws and vulnerabilities at any point along the production and deployment process by hacking the system. One such penetration testing aid is the Metasploit Project. This Ruby-based open-source framework allows testing via command line alterations or GUI. It can also be extended through coding to act as an add-on that supports multiple languages. Metasploit definition:- Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for many attackers and defenders. Point Metasploit at your target, pick an exploit, what payload to drop, and hit Enter. It's not quite as simple as that, of course, so let's begin at the beginning. Back in ye olden days of yore, pentesting involved a lot of repetitive labor that Metasploit n

Gandhi Jayanti: Honours Mahatma Gandhi's role in Indian Independence.

“You must not lose faith in humanity,”  said Mahatma Gandhi. “Humanity is an ocean; if a few drops of the ocean are dirty, the ocean does not become dirty.” “An eye for an eye only ends up making the whole world blind.”   These were the words of Mahatma Gandhi (Mohandas Karamchand Gandhi), one of the greatest leaders in history, recognized the world over for his teachings on peace and nonviolence. On his birth anniversary, popularly known as Mahatma Gandhi Jayanti, we pay a historic tribute to Mahatma Gandhi by way of celebration, prayers and understanding the Gandhian principles of nonviolence and peace. This day is celebrated in the honor of the birthday of the Father of the nation, Mohandas Karamchand Gandhi, popularly known as Mahatma Gandhi or Bapuji. Internationally this day is celebrated as the International Day of Non-Violence as Gandhiji was the preacher of non-violence. He is a symbol of peace and truth. Gandhiji was born on 2nd October 1869, in Porbunder, a small town in Guj

What is Cryptography? The Use Of Cryptography In Hacking.

Introduction to Cryptography:- Cryptography is the science of protecting secrets. As a result, it’s designed to make it impossible for an unauthorized party (like a hacker) to gain access to the protected data. While early encryption algorithms had significant flaws and were easily broken, the state of the art in encryption has gotten a lot better. That being said, cryptography can be broken under the right circumstances.  The first step in breaking cryptography is identifying the cryptographic algorithm in use.  Cryptography is the art of converting text into another form for secret transmission and reception. It works by converting plain text into cipher text using some encryption algorithm at the sender’s side and converting ciphertext into plain text at the receiver’s. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation. With this information in hand, it’s time to start looking for an exploitable vulnerability.  This can be acc