Ads 468x60px

Featured Posts

Download YouTube Video Downloader

Download YouTube Videos in various formats namely WebM, MP4 and 3GP with YTVDownloader for free.

Download Encryptonator

Encrypt your secret messages, personal documents and passwords with Encryptonator.

Download Demeter Password Generator

Generate uncrackable passwords for Google Plus, Facebook and Twitter with Demeter Password Generator.

Wednesday, 10 January 2018

Top Five Penetration Testing Tools That Every Cyber Security Professional Must Have

People often say that it is not the tools that make an ethical hacker, but it is the ethical hacker that makes the tools. This is most definitely true but imagine how simple and quick a security analysis can become if  you have access to the right pieces of equipment.

Here’s a list of the top five computer/server penetration testing tools, that according to me are absolutely essential for anyone who has something to do with cyber security.

#5 - Acunetix

Besides being the most popular web vulnerability scanner, Acunetix is also known for its super user friendly interface. The only downside of this application is that is a bit expensive. A trial version is available over at their website:

#4 - SQLMap

Despite only catering for SQL injection related vulnerabilities, SQLMap almost had to included in this list, mainly because it exploits a very dominant and high risk vulnerability.

#3 - Metasploit

Metasploit for an ethical hacker is like a wrench for a plumber. One cannot possibly imagine carrying out pen tests without this tool. It contains over 3,000 modules which can be subdivided into exploits, shell code, 0days and remote exploits.

#2 - Nmap

Nmap is often referred to as the Swiss Army knife of a cyber security researcher. It has been around for as long as I can remember and it is by far the downright best network mapping tool out there. 

#1 - Kali Linux

What could be better then having an entire operating system dedicated to penetration testing? Kali Linux is a Linux distribution that contains all the necessary things an ethical hacker could ever wish for - The best thing about it is that it doesn’t cost a cent. Head over to to grab a copy for yourself now, if you haven’t already.

Think I missed something out on this list? Feel free to drop your suggestions in the comment section below!

Sunday, 31 December 2017

How to protect yourself when shopping online

Secure online shopping

Online shopping certainly has its perks.You save petrol, time and above all, it's convenient. However, shopping online is not always a bed of roses. There's always a risk that you might fall prey to scammers, hackers and people who might trick you into buying things that you don't even want!

In this article I'm going to go over a couple of basic measures you can take in order to protect yourself from getting scammed, hacked or tricked when you're shopping online.

For starters, always purchase goods from websites that have a physical location that you can realistically reach if necessary. Say if I'm ordering a mobile phone, I'd prefer to buy one from a company that displays the address of its physical outlet on its website. Just to ensure that this location is not phony, Go ahead and do a little Google search to find out if such a place does exist on the map.

The next thing you must do is a short background check on the vendor. Every business has a social media page. Look for pages belonging to that vendor and read comments/ratings posted by their previous customers. Keep in mind that some comments may be incorrect but if there is a trend of unpleasant remarks, you may want to reconsider your decision of making a purchase with the vendor.

Another simple check you can perform is a quick analysis of the website or platform you're using to make a purchase. If you see broken content on the website, dis-oriented images, broken links, then that usually indicates that the website has not been made with a lot of care. Purchases made from such platforms may easily fall prey to interception by hackers. Since you're giving your personal details to that website, this also puts your information at stake.

The last thing you can do to ensure the safety of your online transaction is to call the online shopping company's helpline before placing an order. The quality of the conversation you have with their representative can give you a clear idea whether or not you should trust them with your purchase.

That pretty much sums up all the precautionary measures you should take when shopping online. Share this article with those in your circle to spread awareness!

Tuesday, 26 December 2017

What is the difference between Ethereum and Bitcoin?

Cryptocurrency has to be one of the most over used words of 2017. Whenever somebody says "crypto currency" the first thing that pops into my mind is, undoubtedly, Bitcoin. And why not? After all, it is the pioneer of electronic money. Back in 2009 when good ol' Bitcoin came into being, nobody had a clue of what it had in store. Now, eight years after its discovery, new clones of Bitcoin have emerged. Surprisingly, some have even grown so tremendously that today, I believe that they have far more benefits than the originator, Bitcoin itself.

Ethereum is a relatively new electronic currency that has become widely popular since its creation back in 2015. What's really great about it is that it serves as a massive computing platform.

So, What's different between Ethereum and Bitcoin? 
Well, the underlying differences are numerous. Some of the major differences are:

  • Ethereum was written in a Turing complete programming language. This means that anything can be done with it provided enough time and computing power is allocated. Bitcoin, on the other hand, was written in a stack based programming language. Stack oriented languages handle data in a very narrow way. Therefore Ethereum has a far broader platform to build on than Bitcoin as it doesn't just have to act as a value transfer account book.
  • Ethereum uses Ethash whereas Bitcoin uses SHA256; The former allows individuals to compete in mining it because it is memory hard (It requires memory to run) and it also works more efficiently on a GPU. On the contrary, Bitcoin mining involves the use of ASIC chips that have led to the concentration of mining power and a so-called "Moore's Law race".
  • Transactions are processed by Ethereum significantly faster than Bitcoin. With Ethereum, on average a transaction is confirmed within 20 seconds whereas with Bitcoin it usually takes about 10 minutes.
  • Ethereum costs transactions based on how complex the computation was, how much bandwidth was used and how much storage was needed. Bitcoin treats every transaction equally as if each of their computational complexities, bandwidth requirements and storage needs were equal.
  • Bitcoin's economic model and Ethereum's economic model vary slightly. Bitcoin's rewards are halved after every 4 years whilst Ethereum provides the same amount of Ether every year.
  • Bitcoin was launched whereas Ethereum was funded by the crowd. For Bitcoin, early miners own most of the Bitcoins that will ever be mined. It is said that with Ethereum half of all the coins will be possessed by miners by 2020.
Have something interesting to add to this? Feel free to drop it in the comment section below!

Monday, 25 December 2017

How to Download Everything From A Website Automatically


Have you ever been across a website that contains a lot of useful files that you want to store on your hard drive but you just can't because there aren't any download buttons?

I'm a student and so when I'm browsing the web for study material I often encounter such sites. Past papers, worksheets and books are usually stored separately on websites and so downloading all of them manually, one by one is really tiring.

Let me introduce you to a very small file that has the solution to this problem. The program is only 160 KB in size but trust me, it's a Swiss-army knife when it comes to downloading from the internet.

Originally built for Linux about 21 years ago (in 1996), WGet is a powerful program that retrieves content from web servers. Its name is composed of "World Wide Web" and "Get". It allows users to recursively download files and can even locate hidden files (files that aren't displayed publicly in a site's navigation).

It's not very difficult to use but just to make things easier for everyone, I've put together a little program in MS-Batch that does all the work for you.

If you encounter any bugs with this script feel free to comment below and I'll try to help out to the best of my ability.
Keep in mind that this program won't allow you to download files from websites that are behind firewalls like Cloudflare, including this website.

Download Now!

Sunday, 24 December 2017

Everything You Need to Know About Keyloggers

What are Keyloggers?

The word "Keylogger" is quite self-explanatory, but in case you haven't figured out, it's a malicious program that records keystrokes. These recorded keystrokes are then transmitted to the attacker (whosoever has planted the keylogger onto the victim's device). The attacker may then extract valuable information such as usernames, passwords, bank account numbers, personal messages etc.

Keyloggers can be either hardware or software, the latter being more popular. Despite being first used in typewriters in the early 1970s, they are still widely used today to steal information. A research carried out by cyber security experts indicated that keylogging was the sixth most common type of malicious attack used in industrial attacks, worldwide, in the year 2015.

How do you detect Keyloggers?

Most Keyloggers can be detected and removed by popular anti-virus programs such as Malwarebytes, Bitdefender Anti Rootkit etc. but unfortunately that is not always the case. In some circumstances, such as when installing third-party software, you might give a malicious program attached to the software administrative privileges by accident and it may then disable your anti-virus protection. This will render your anti virus protection useless and the keylogger will function at its best. 

The simple solution to this problem is to never disable your anti-virus, irrespective of what the circumstance might be. But, there is also an alternate way to find out if a computer is under the vicious spell of a keylogger.

How to Detect Keyloggers without an Anti-Virus

For times when your anti-virus might not be functioning, as discussed above, the following tips may come in handy.
  • Turn off all external connections to your device. This means disable your internet connection, disconnect your LAN cable and switch off your router and/or modem. This will prevent the keylogger from sending your keystrokes to the attacker while you try to get rid of it.
  • Press Windows+R keys, and then type msconfig in the textbox and hit Enter. Choose the Startup tab and disable all the unfamiliar programs. Then reboot your computer.
  • Next, check the list of programs installed on your computer. Get rid of any programs that you don't remember installing. Some of these programs might be pre-installed; If any programs are vital to your system, your computer won't allow you to get rid of them so don't worry.
  • Press Control+Alt+Delete and select the task manager from the menu.Go to the processes tab and look through the list. Terminate all processes that appear fishy. You will have to use your own intuition here. If you find two processes with the name winlogon.exe, then you can be sure that there is something wrong. End only the second winlogon.exe process.

How do you remove Keyloggers?

Here's a list of the top four anti-virus programs that are known to effectively eliminate keyloggers:
  1. Malwarebytes | Anti-Rootkit - [ Download For Free ]
  2. AVG Anti Virus - [ Download For Free ]
  3. McAfee Rootkit Remover - [ Download For Free ]
  4. Bitdefender Rootkit Remover - [ Download For Free ]

Sunday, 10 December 2017

Download High Quality Free Website Templates (.PSD & HTML)

Template A

Template B

Designing a website from scratch can be a quite tedious task. Building a website from a ready made template can greatly speed up the whole process and it also makes things more easier. Getting the entire designing bit out of the way, you can focus better on the more critical aspects of creating a website for your business or yourself.

Here are two fresh designs, made purely in Adobe Photoshop. All icons (except the social buttons) were designed by me. The design on the top (let's call it Template A) is more artsy, it's got a lot of contrast going on and less text. It would be ideal for a content creator or an artist. For instance, if you're a YouTuber you could put a slideshow of all your videos in the middle and a brief description of your channel on the sides. On the contrary, the design below Template A (let's refer to that as Template B) is more professional, or "business-like". You could use it for making a bank's website or a company's profile.

It would be nice if you could link back to our website if you end up using one of these templates on your website. A little note in the footer would be highly appreciated 😀!

Download Now!

Tuesday, 1 August 2017

How to Make a FizzBuzz Program in Visual Basic

Fizz-buzz happens to be one of the most simple programs that man has ever come up with. But, you'll be surprised to know just how significant it is when determining the true capabilities of a programmer. 

The "Fizz-Buzz Test" is a modern-day interview question, originally designed to distinguish 99.5% of programming job candidates who struggle with programming even the most basic pieces of code. Candidates are asked to write a program that prints a list of the numbers, one to a hundred, but with every multiple of 3 replaced with "Fizz" and every multiple of 5 replaced with "Buzz". For numbers that are multiples of both 3 and 5 (e.g the number 15), the program should display "FizzBuzz".

I have to admit, this is a pretty simple task but the tricky thing about this is that there are endless ways to accomplish it. The internet is presently overflowing with alternate solutions to the Fizz-Buzz Test and people are coming up with even more complex versions of it.

I decided to design my own version of the Fizz-Buzz program in Visual Basic to determine which kind of programming mindset I possess.

Here's my code:
Module Module1
    Sub Main()
        Dim rem3 As Integer
        Dim rem5 As Integer
        For count = 1 To 100
            rem3 = count Mod 3
            rem5 = count Mod 5
            If rem3 = 0 And rem5 = 0 Then
            ElseIf rem3 = 0 And rem5 > 0 Then
            ElseIf rem5 = 0 And rem3 > 0 Then
            Else : Console.WriteLine(count)
            End If
    End Sub
End Module
If you've found a simpler way to carry out this task, feel free to paste your code into the comment section below.