IT BLOG

Making Work easy And Simple

Installing kali linux on a virtual machine from the ISO image

Installing Kali on a virtual machine from the ISO image To install a Kali Linux ISO image on a virtual machine, the following steps canbe used:1. Create a new virtual machine by selecting New from the VirtualBoxtoolbar menu.2. After that, you need to define the virtual machine's name and the...

READ MORE

Troubleshooting HTTP

Troubleshooting HTTP Sometimes when we try to logon to a website, we might encounter some HTTP errors. These errors are caused by the Microsoft Internet Information server. Some of the common errors are HTTP 401 Access Denied Every website manages the process of authenticating the users...

READ MORE

Overview Of Networking

Overview This blog introduces you to the basic fundamentals of networking. Networks could be just two computers connected by a cable in a home or it could be thousand computers connected across the globe via phone lines, or cables or even satellite links. The most common type of network, the...

READ MORE

Kali Linux Tool Categories

Kali Linux contains a number of tools that can be used during the penetration testingprocess. The penetration testing tools included in Kali Linux can be categorized intothe following categories: • Information gathering: This category contains several tools that can beused to gather information...

READ MORE

History Of Kali Linux

Kali Linux is a Linux distribution system that was developed with a focus onthe penetration testing task. Previously, Kali Linux was known as BackTrack, whichitself is a merger between three different live Linux penetration testing distributions:IWHAX, WHOPPIX, and Auditor.BackTrack is one of the...

READ MORE

Modes of Ethical Hacking

For conducting a security evaluation, several modes are there. An ethical hacker may attempt to perform an attack over various channels such as: Remote Network This mode attempts to simulate an intruder launch an attack over the internet. The primary defenses that must be defeated here are...

READ MORE

How to Install Java - Java Programming

How to install Java Once we decide to write a program in java, we need to first set an environment for running the java program. For setting the environment, we need to perform the following steps : Download the latest version of JDK and Install...

READ MORE

Introduction About Java - Java Programming

Introduction Of Java Language Java is a simple programming language. The design aim of java was to create a general-purpose programming language. Since its inception, its popularity is increasing day by day. So, it would not be wrong to say that Java is the most popular programming...

READ MORE

What Motivates a hacker?

An action or event that might prejudice security. Sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product. A threat can be either intentional an individual cracker or a criminal organization or...

READ MORE

what is Ethical Hacking?

In this ethical hacking tutorial , I will cover brief introduction about ethical hacking. Hacker refers to a person who enjoys learning the details of computer systems and stretches their capabilities. Hacking describes the rapid development of new programs or the reverse engineering of...

READ MORE