Computers | Chapter 4: Rediscovering Myself
When it comes to computers, I had access to them from an early age. My uncle, my father’s brother had a computer, and as a kid, I used to play…
When it comes to computers, I had access to them from an early age. My uncle, my father’s brother had a computer, and as a kid, I used to play…
My inner mind was always telling me to become rich, become famous, and become the man I truly want to be. But at that time, I wasn’t realizing it clearly,I…
So, let’s talk about the founding of Strawhat Hackers… but if you want to know that story, then there’s no option left for us we have to go back a…
My name is Pranav S V, a.k.a. Nika, and I am planning to document our journey, the story of the Strawhat Hackers. Before starting the story, you need to know…
Introduction NAT protocol stands for Network Address Translation protocol. It is the protocol that helps us use a single global IP address across our local area network and use it…
What is Information Disclosure? Imagine that while scrolling through a website’s source code, you come across the admin username and password that were hardcoded by the developer and forgotten to…
Introduction If you’re new to OWASP Juice Shop, try to follow the tasks in order. If you’re interested, follow our series for more guidance. OWASP Juice Shop is an intentionally…
Introduction OWASP Juice Shop is an intentionally vulnerable web application project that can be used by beginners or cybersecurity aspirants to improve their skills in web application penetration testing. It…
Introduction This article is mainly written for beginners stepping into the world of cybersecurity. When you start your journey, you’ll come across a flood of hacking tools and it’s totally…
Disclaimer: This article is for educational and legal purposes only. We do not promote or support any illegal activities Yes, You head it right, the title is not a clickbait.…