11AprHow Quantum Computing Will Turn Digital Security Upside DownAre you prepared? You’ve probably heard some pretty grand claims about the power of quantum computers and how it will change our world. But there are a lot of misconceptions floating around. Before... 10MarThe Top 5 Books for Hackers in 2017Reading is dreaming with open eyes Want to be a real hacker? Here are the 5 best books about hacking that you need to read to call yourself a true hacker in 2017. 5MarTop Abbreviations used by HackersThe musical notes in a hacker's symphony These are the most common and popular abbreviations in the world of hacking. Learn more about acronyms and shorthands in programming, networking etc. 5MarThe Top Hacking Terms You Need to KnowTalk the talk before you walk the walk Learn the hacker lingo, the most common terms and phrases that you're sure to encounter in the world of cyber security. 24FebAll About CookiesThis will melt in your mouth Cookies are messages that a website that you've visited has stored on your computer for future uses. They are used to track and customize your visits to a website. 22FebSetting Up a Virtual Machine to Practice HackingContain the beast within Now that we’ve got the introduction to hacking out of the way, there’s just one last thing left before we can actually start hacking. Due to the *ahem* sensitive nature... 21FebNot Being A NoobWe all gotta start somewhere Now that we have a basic grasp on ethical hacking, we need to address something before we proceed further. The following article assumes that you are a complete beginner and... 16FebWhat are MAC Addresses?It stands for "media access control", not over-priced computers MAC, Media Access Control, address is a unique identifier assigned to network devices. It is often referred to as hardware or physical address. 1FebTypes Of HackersThe good, the bad, the ugly. And the idiot. What is a penetration tester? How are blackhat and whitehats different? And more importantly, which one will you choose to be? Let's find out. 31JanWhat Is Hacking?Wake up, Neo... In this course, we will introduce you to every aspect of hacking, ethical or otherwise. We'll look at everything from DDoS to viruses to hacking WiFi. 20JanThe Ultimate Hacking Cheat SheetWork smarter, not harder Everything you need to know as an amateur hacker or a security professional. The entire field of hacking condensed into one small cheat sheet. 25OctUnderstanding VirusesKeep your friends close, and your enemies closer Contrary to popular belief, hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of... 21OctWhat Is a Hash?This will make you high Hashes are a way of taking any amount of data, jumbling it around, then shrinking the result to a fixed-size output, a fingerprint. A cryptographic hash function or algorithm takes... 17JunProgramming - IIIf you rely on other's code, you'll always be a noob Programming is a vast field. Even after years of experience a programmer is always bumping into new things. That’s part of what makes it so exciting, you can always find... 16JunProgramming - IDon't be a script kiddie When it comes to computers and everything related to them, programming is the mind and body, heart and soul. Without software, any piece of hardware is nothing but a random... 11AprMore On Hacking Who is a Hacker? In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in...+1 143k Pin 86k Tweet 309kShare 252kReddit 117kShares 907k