Understanding the big picture
(For more resources related to this topic, see here.)
So we've got this thing for authentication and authorization. Let's see who is responsible and what...
Features of CloudFlare
(For more resources related to this topic, see here.)
Top 5 features you need to know about
Here we will go over the various security, performance,...
vCloud Networks
(For more resources related to this topic, see here.)
Basics
Network Virtualization is what makes vCloud Director such an awesome tool. However, before we go full...
Mobile and Social – the Threats You Should Know About
(For more resources related to this topic, see here.)
A prediction of the future (and the lottery numbers for next week) scams
Security threats, such as...
Penetration Testing and Setup
(For more resources related to this topic, see here.)
Penetration Testing goes beyond an assessment by evaluating identified vulnerabilities to verify if the vulnerability is...
Wireless Attacks in Kali Linux
In this article, by Willie L. Pritchett, author of the Kali Linux Cookbook, we will learn about the various wireless attacks. These days, wireless...
Submitting a malware Word document
(For more resources related to this topic, see here.)
We will submit a document dealing with Iran's Oil and Nuclear Situation. Perform the following steps:
Open...
Social-Engineer Toolkit
(For more resources related to this topic, see here.)
Social engineering is an act of manipulating people to perform actions that they don't intend to...
General Considerations
(For more resources related to this topic, see here.)
Building secure Node.js applications will require an understanding of the many different layers that it is...
Web app penetration testing in Kali
(For more resources related to this topic, see here.)
Web apps are now a major part of today's World Wide Web. Keeping them safe and...