Cool method to Track your lost android device

Cool method to Track your lost android device We are so well connected to our gadgets like cellphone that for most of us losing a phone is like losing a body part. This article Is a quick guide on how to track your lost android device (Phone or tablet/phablet) with google account. Most of us …

Questions asked in CPISI Exam

  Posted in Cyber Security on

  by Suman Tiwari

  , ,

11
Questions asked in CPISI Exam

  If you are going to take CPISI (Certified Payment Card Industry Security Implementer Version 3.2) exam conducted by SISA and wondering what kind of questions are asked than this article will help you.   Exam Type: Online Multiple Type Question Duration: 1 hour Number of questions: 50 Passing Mark: 60%   Post Workshop all …

Flaws in Wifi protocol WPA2

Flaws in Wifi protocol WPA2

    WPA2 Protocol is exploitable and exploit Video is available online!!!   Earlier WPA2 protocol was considered secure but now its practical exploit is available publicly. WPA2 has a flaws which allows the installation of previously used keys in the WPA2 handshake Please visit this demo link for more details Also visit this nice …

Challenges in Content Migration

  Posted in CMS (Content Management System) on

  by Suman Tiwari

    What is Content Migration Content Migration is process in which we copy / move content from one System to another (it might be Web Content Management System, Digital Asset Management, Document Management System or HTML  / XML file). Content migration can be done manually as well as through tools and database programming.  Content …

State management using View state

  Posted in Cyber Security on

  by Suman Tiwari

    This article covers one of the most basic concept of web application i.e. state management. State management can be done by many ways . View state is one of the common way.  You will also find some interesting fact about view state. What view state is and how we can use view state …