You are here
How to  configure tor browser in  linux. IT Tech 

How to configure tor browser in linux.

Tor browser is an important tool if you want to hide you self on  network or traffic monitoring/analysis. Tor is a free  software that helps you in defending  against such cases.Enjoy you freedom and privacy with tor. Here is step by step guide to configure tor with Linux. Step 01: Go to  and copy the 64bit  tor browser link for linux   Figure 1 Step 02: Open linux terminal and run the wget command with link location of tor browser Figure 2 Step 03: Tor browser downloaded completely  …

Read More
Cryptography Current Trends 2016 Computer Science Education IT 

Cryptography Current Trends 2016

Current Trend of Cryptography The Two Fish Algorithm Introduction Tow Fish algorithm was designed by Bruce Schneider, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.  It is similar to the AES standard and Serpent. It uses a block size of 128 bits and has a key size of up to 256 bits.   Working Methodology of Tow Fish Algorithm Steps In step one the plain text is split into four 32-bit words then this word is XOR with key. Here six round of encryption is exist when…

Read More
top 10 certifications of information  security. Education IT 

top 10 certifications of information security.

NO: 1 Certification Body : EC-Council Certification Name :  Certified Ethical Hacker program    Brief Certification Contents : 1. Introduction to Ethical Hacking 2. Footprinting & Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Malware Threats 7. Sniffing 8. Social Engineering 9. Denial-of-Service 10. Session Hijacking 11. Hacking Webservers 12. Hacking Web Applications 13. SQL Injection 14. Hacking Wireless Networks 15. Hacking Mobile Platforms 16. Evading IDS, Firewalls, and Honeypots 17. Cloud Computing 18. Cryptography   Potential Benefits of the Certification   The goal of this course is…

Read More
what is penetration testing ? Education General IT 

what is penetration testing ?

What is Penetration Test? A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data. Many types of penetration testing is exist mobile application penetration testing, operating system penetration testing, and web application penetration testing. In this blog we will discuss about the mobile penetration testing. On next blog we will discuss about further penetration testing techniques. Mobile applications are have so many vulnerability like   1. Activity monitoring and data retrieval Activity…

Read More