Latest Posts

Can the EVM machines used for Indian elections be hacked or tampered?

Yes, EVMs can be tampered. But process is not trivial. Also, you need physical access to control unit, seal breaking of unit, time and lots of technical knowledge. Indian EVM uses micro controllers manufactured by Renesas(Japan) and Microchip(USA). These micro controllers have their firmware i.e. software code, stored within a One Time Programmable Non Volatile Memory OR field...

Top tools all data scientists should know

In case you're a hopeful information researcher, you're curious – continually investigating, learning, and making inquiries. Online instructional exercises and recordings can enable you to set you up for your first job, however the most ideal approach to guarantee that you're prepared to be an information researcher is by ensuring you're familiar with the devices individuals use in...

Linkedin Enumeration Tool for information gathering

InSpy a python based tool is developed to extract LinkedIn users based on the organization, job description or email address. Tool automatically try to identify the domain associated with the organization and its email format. Multiple options: TechSpy: Crawls LinkedIn job listing for technologies used by the provider company.It identify technologies by matching there job titles keywords. EmpSpy: Crawls LinkedIn...

Hacking WordPress – Capturing Usernames & Passwords

Google have now been pushing the HTTPS agenda for the years that are few – they desire all web sites to perform on HTTPS. The dashboard or admin pages, all data is submitted clear text should your WordPress is still running on HTTP, when you login to WordPress and access. This means your WordPress credentials may also be...

Page 1 of 41234Next
Powered by Blogger.