Flaws in Wifi protocol WPA2

Flaws in Wifi protocol WPA2

    WPA2 Protocol is exploitable and exploit Video is available online!!!   Earlier WPA2 protocol was considered secure but now its practical exploit is available publicly. WPA2 has a flaws which allows the installation of previously used keys in the WPA2 handshake Please visit this demo link for more details Also visit this nice …

Challenges in Content Migration

  Posted in CMS (Content Management System) on

  by Suman Tiwari

    What is Content Migration Content Migration is process in which we copy / move content from one System to another (it might be Web Content Management System, Digital Asset Management, Document Management System or HTML  / XML file). Content migration can be done manually as well as through tools and database programming.  Content …

State management using View state

  Posted in Cyber Security on

  by Suman Tiwari

    This article covers one of the most basic concept of web application i.e. state management. State management can be done by many ways . View state is one of the common way.  You will also find some interesting fact about view state. What view state is and how we can use view state …

Download Credit Card Validation Tool

  Posted in Cyber Security on

  by Suman Tiwari

1

    Download Credit Card Validation Tool ( Devloped using Luhn algorithm )     Click here to Download offline credit card validation Tool Credit Card Validation Tool Version 1.0     This is standalone Credit card tool which can be used to verify valid credit card number (Internet is not required). It’s based on …

Save your kids from Blue Whale, encourage them to use kiddle

  Posted in Cyber Security on

  by Suman Tiwari

Save your kids from Blue Whale, encourage them to use kiddle

  Dear Parents, When our children use the Internet to search for images for projects or anything related to school work, please encourage them to use Kiddle instead of Google. Kiddle is a child-specific researcher supported by Google, which prevents the appearance of things that are not suitable for them.       Click here …