THE INTERNET IS FOR EVERYONE
There’s always a confusion regarding what the terms Uniform Resource Identifier (URI), Uniform Resource Locator (URL) and Uniform Resource Name (URN) mean… here’s (hopefully) a simple way to remember this, once and for all ☺
· URI: This is the complete address along with the protocol – this is the one Google Indexes or the DNS server maintains - …
Added by Kiran Karnad yTiruceS on March 26, 2013 at 7:09pm — No Comments
Have you used Google Sets? Google Sets was one of the very first Google Labs experiments. However, this got closed a couple of years ago. (Then why the hell are we talking about it?... Patience please!)
How it used to work:
1. You would need to go to …Continue
Added by Kiran Karnad yTiruceS on March 25, 2013 at 10:10pm — No Comments
I am really thrilled to be upgrading my system to Kali Linux! For noobs, this is the latest and the greatest that Backtrack has to offer!
For starters though, I want to install it on a USB drive as a live USB and also want it as a persistent image (so that I can save files etc on this image). How to do this is told amazingly at the Kali…Continue
Added by Kiran Karnad yTiruceS on March 20, 2013 at 9:51pm — No Comments
Added by David Low Swee Nyen on March 19, 2013 at 2:23pm — No Comments
A comprehensive list of free on-line courses and certifications provided by the world’s leading universities: http://www.openculture.com/free_certificate_courses
Some of these courses are conducted only once a year, so please take advantage while they last!
Any course, anywhere, anyone :o)
Hope it helps,
Added by Kiran Karnad yTiruceS on March 19, 2013 at 9:39am — No Comments
I wanted some place where I could remember all the advanced operators, so that it's easy for me to use them from this place on. So, this is the list I will be coming back to, every now and then...
Added by Kiran Karnad yTiruceS on March 18, 2013 at 2:15pm — No Comments
When we do a Google search, we dont bother to use any of the Google Advanced Operators. But using them can help provide very good result sets which sometimes cant be obtained by using just basic search.
So, there are three types of searches that can be done using Google:
1. Basic Search: Examples would be:
a. training and certification courses in electronics KL - this has tons of results, since each of the words might still be considered…Continue
Added by Kiran Karnad yTiruceS on March 11, 2013 at 11:36am — No Comments
As you might have heard, gogoNET LIVE! 3 was a 3 day IPv6 conference held this past November at San Jose State University in California and the theme of the event was “Enterprise Wide Migration – a Holistic Approach.”
If you were unable to attend gogoNET LIVE! you now have a chance to see all the presentations and interviews in full HD including the presenter and their slides. The videos series is now available in the video section of gogoNET and on our YouTube channel at …Continue
It was our wedding anniversary recently and I bought my wife a brand new iPhone 5 as an anniversary present. She on the other hand gave me her old Samsung Note 2 as my gift :o( But honestly, I wanted it so she gave it )
I have been an avid researcher on the iphone and can handle almost any situation, from jail breaking it to installing cydia, getting SBSettings and tweaking the settings etc etc. But I have been a complete idiot when it came to Android. So, when I got this…Continue
Added by Kiran Karnad yTiruceS on March 7, 2013 at 3:32pm — No Comments
Guys 'n gals,
If you want to make 2013 a very memorable year as far as security testing goes, don't forget to enrol yourselves for a 4-day amazing conference cum workshop being held at KL this year...
Really sorry for the short notice, but I was so excited about attending this myself, I forgot to post it up... but none-the-less, better late than never. So what do you say? Rush to…Continue
Added by Kiran Karnad yTiruceS on March 7, 2013 at 9:36am — No Comments
The scenario is to walk up to a stranger and engage them in a conversation that can lead them to provide the information you need. How can we achieve this?
1. Introduce a time constraint: When you meet up with a stranger and want to talk, immediately upon introducing, if you look at your watch and say something like "I just have 5 minutes with me" or any other thing which tells them that you have limited time, they will be more ready to speak to you
Added by Kiran Karnad yTiruceS on March 5, 2013 at 2:20pm — No Comments
I somehow seem to forget my processor capability, 32 or 64 bit, each and every time...
But did you notice, this is something we need whenever we plan on installing an application, whether on Windows or Linux or Mac? There will be multiple sets of downloads and we are left to decide to download and install the correct one... 32 or 64 bit! So, what's the easiest way to achieve this?
Start > Run > Enter "dxdiag" and hit Enter > Click yes or no,…Continue
Added by Kiran Karnad yTiruceS on February 25, 2013 at 4:08pm — No Comments
Hackers are finding new ways to make money all the time. This is the latest method... The information provided here is purely for educational purposes...
1. Go to an underground Russian hacker forum such as http://cs.rin.ru/forum/index.php?c=2 and register
2. Your registration is successful, activated and then you receive an email where you provide a lot of personal information and some background info,…Continue
Added by Kiran Karnad yTiruceS on February 23, 2013 at 10:39am — No Comments
Is this a movie or what?
2013’s most talked about hack in 4 steps:
Added by Kiran Karnad yTiruceS on February 14, 2013 at 4:13pm — No Comments
As you might be aware of the upcoming APRICOT 2013 in conjunction with 35th Asia Pacific Network Information Centre Members Meeting (APNIC 35).
The event is hosted by the Singapore Network Information Centre (SGNIC).
Event schedule is as follows:
Workshops: 19 Feb – 23 Feb 2013…Continue
Added by Julian Vincent on February 13, 2013 at 9:10am — No Comments
Most of my team members have a problem in understanding Nmap and all it's parameters. Since they are all seasoned security experts, it skipped my mind to teach them basic nmap scanning techniques.
But during our one-on-one session, one commong thing I got from most of the team is they wanted to understand nmap a little better. So I did a training session for them which I try to repeat here:
Nmap has 4 basic scan techniques:
Added by Kiran Karnad yTiruceS on January 17, 2013 at 3:28pm — No Comments
I usually tend to forget all the wonderful Meterpreter commands which are needed every now and then while performing any pen testing. So putting them all down here for easy access for me and anyone else who would need it:
Added by Kiran Karnad yTiruceS on January 13, 2013 at 4:53pm — No Comments
There are so many bests that you can Google up for 2012... the ones I did, and found real use of, are mentioned below:
1. The top Firefox add-ons for 2012: https://addons.mozilla.org/en-US/firefox/collections/Holger_D/top10/
2. The top Linux distros for 2012: …Continue
Added by Kiran Karnad yTiruceS on December 21, 2012 at 10:41am — No Comments
Internet Society Malaysia Chapter in collaboration with Localhost Sdn Bhd (www.localhost,my) is extending FREE sub-domain for isoc.my to all members.
Members will receive a sub-domain eg. yourname.isoc.my after…
LOIC, Low Orbit Ion Canon, a DDoS tool which was open source and the best DDoSing tool for windows, is still on Source Forge, but is now being called Java LOIC... so when you are on source forge, please dont forget JAVALOIC not LOIC.
LOIC is a tool which can help you simulate DDoS attacks on websites and also Wireless Access Points (APs).
Earlier on, this very successful sourceforge project was a windows executable and was at the URL …Continue
Added by Kiran Karnad yTiruceS on December 18, 2012 at 4:14pm — No Comments