Short but effective!! Nice work Sir!!
Hey scripting , I 'd like to tell you to that lets start with a open source project and then work with it.. As by that we'll get some people ,...
You mean :- +-----------------+ _______________ +----------------+ | Aneesh | Behind NAT / /...
Thanks!
Thanks!! It's all because of people like you who motivate me to produce more and more article!! :happy::happy::happy::happy:
Happy B'Day to me!
Actually you can use any file type..Its not a mysql only thing you can use .txt files or .xml files to feed your app!!
C programming is one of the best programming languages I learnt!! I just love to program in C. Its quite easy to understand but will take some...
I would prefer PHP with a pinch of java-script(to make it user friendly).. Resources :- PHP Javascript
It means its not a article any more ...Why??? :embarasse:embarasse
System Calls also known as Syscalls are function invocation from User-Space into the kernel in order to request/receive some service from the...
Thanks Sir , And please read my other articles too!!
Hi , Sir.. I really like your posts...Can i know your expertise and in which subjects you'll be willing to help me!!
Hey Viewers :- I wanted to ask you guyz.. If you are liking my crackme's tutorials and want to view more.. If yes please reply!!
That's what i am saying... We can't call the implementation illegal...Its the stuff(by malicious people) that makes it illegal!!
It is legal!! It depends on people whether they share legal stuff or illegal!!
Thanks for accepting and i hope the viewers like it!! :D
Let us see the basic differences between a bind shell and a reverse shell.. What is a Shell A shell is a software that acts as a...
Re: Exploiting buggy/weak firewalls No, its not by me.. Actually i dint knew about this tool..My friend sent me by his email..So i couldn't...
In this tutorial we'll be looking at a new way(at least for me) to bypass weak firewalls... A firewall is a device or set of devices designed to...
Separate names with a comma.