All about Dark web

What Is a Graphics Processing Unit? A Graphics Processing Unit (GPU) is a chip or electronic circuit capable of rendering graphics for display on an electronic device. The GPU was introduced to the wider market in 1999. It is best…
Panasonic, The Japanese tech company has confirmed data breach after the hackers accessed the personal information of the job candidates and interns. Company said that it network was illegally accessed by a third party on November 11. NHK (Japanese publication)…
A vulnerability in the open source Log4J logging service used by developers to monitor their Java applications first came to light, leaving enterprises scrambling to patch affected systems. Since then, the vulnerability dubbed CVE-2021-44228 has been highly exploited in the wild with…
In computer networking , a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. What is a Proxy Server and How Does it Work? The actual nuts and bolts of how the internet…
Hashing is simply passing some data through a formula that produces a result , called a hash. What is hashing? Hashing is the process of transforming any given key or string of characters into another value. Most popular use for hashing…
What Is Proof Of Concept? The Blockchain Proof of Concept is a process of determining whether a Blockchain project idea can be feasible in a real-world situation — a common type of consensus algorithm for blockchain. This process is necessary…
A pandemic-focused year made the events of 2020 unprecedented in numerous ways, and the cyber attacks were no different. As the world transitioned to virtual everything — work, school, meetings and family gatherings — attackers took notice. Attackers embraced new…
A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly. What is brute force A brute-force attack is one of the most…
Hashcat is a password recovery tool. It had a proprietary code base until 2015, but was then released as open source software. Versions are available for Linux, OS X, and Windows. What is Hashcat Hashcat is the quickest password recovery…
What is an on-path attacker? On-path attackers place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two. The attackers can then collect information as well as impersonate either of the…
What is a DNS CNAME record? The ‘canonical name’ record is used in lieu of an A record when a domain or subdomain is an alias of another domain. All records must point to a domain, never to an IP address. Imagine a scavenger…
What is a DNS MX record? A DNS ‘mail exchange’ (MX) record directs email to a mail server. The record indicates how email messages should be routed in accordance with the Simple Mail Transfer Protocol (SMTP, the standard protocol for…
The Cross-Site Request Forgery is an attack in which they get access to your system by tricking users into performing actions on another site by inadvertently clicking a link or submitting a form. It is often called CSRF, or XSRF…
How can you know if the link someone sent you was to track your IP? If the link is for a common site (eg ) and there are no extra parameters on it; then it won’t help them link your…