Wednesday, 11 April 2012

Monday, 9 April 2012

How to secure your Linux system

Are you running Linux just because you think it's safer than Windows? Think again. Sure, security is a built-in (and not a bolt-on) feature and extends right from the Linux kernel to the desktop, but it still leaves enough room to let someone muck about with your /home folder. Linux might...

Sunday, 8 April 2012

How to use Google Search for Hacking

Google search engine can be used to hack into remote servers or gather confidential or sensitive information which are not visible through common searches. Google is the world’s most popular and powerful search engine. It has the ability to accept pre-defined commands as inputs which...