• LOGIN
    • No products in the cart.

Blog

Latest news around the world

13

Mar'17

My catch of 4 months in the Amazon IP address space- article by Remco Verhoef

The cloud is bringing a lot of interesting opportunities, enabling you to scale your server farm up and down depending …

Read More

02

Mar'17

Functional programming languages entering the mainstream- infographic by Appdynamics

Functional programming languages such as Scala, Clojure, and Haskell are quietly growing in popularity. These languages offer expressive and concise …

Read More

24

Feb'17

Article: Physical Hacks Against Windows and Linux Systems

Physical Hacks Against Windows and Linux Systems Physical Hacks What is a physical hack against a system? Physical hacks are nothing …

Read More

13

Feb'17

STARTUP: A Web 2.0 Crawler

Web 2.0 Crawler My name is Sina Yazdanmehr. I am a penetration tester and information security consultant. My expertise is …

Read More

06

Feb'17

Special Offer: Free Advertisement For Subscription

We bring to your attention a special offer  ‘Free Advertisement For Subscription’. It is a great opportunity for companies to …

Read More

06

Feb'17

STARTUP: VulcanoIO.org

VulcanoIO.org My name is Mauro Risonho de Paula Assumpção, my surname “Risonho”, in Portuguese-Brazilian, means “a funny guy”, which is …

Read More

03

Oct'16

Resources and tools that will help you in your day to day activities by Vignesh

This is my first article in an international arena. Basically, from my web application testing background, I will share a …

Read More

21

Sep'16

Brakeman, a static analysis tool- interview with Justin Collins, creator of the tool

Dear Readers, today we present you an interview with Justin Collins who is the creator of Brakeman tool- a static analysis tool. He …

Read More

22

Aug'16

Bug Bounty Programs & mobile pentesting: Apple vs. Android

With so many data breaches and hackers breaking into systems, companies constantly scan and improve their code, to make it …

Read More

19

Aug'16

Exploiting blind SQL injections in ‘UPDATE’ and ‘INSERT’ statements without stacked queries by Sina Yazdanmehr

Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013