Skip to main content

Posts

Showing posts from March, 2019

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux. Reverse engineering a program or software involves disassembling, i.e. converting binary instructions into assembly code when its source code is unavailable, helping software engineers, especially malware analysts, understand the functionality of the code and actual design and implementation information. Download  GHIDRA 9.0 — software package, slides, and exercises Adapted from  thehackernews.com

5 Benefits only Linux Users can Enjoy

Have you ever used Linux before? If yes, you might find it too hard to use rather than Windows or Mac. If no, you may be thinking about why people use Linux. But the truth is, Linux is not that what you are thinking. Not only for developers, Linux is also a very good operating system for regular computer users. After using any Linux distribution for 5 to 6 months you will find it really useful. As a regular user, you can get a lot of benefits that other major operating systems can’t provide. In this article I will discuss about top 5 benefits that only Linux users can enjoy. Faster performance: Can you imagine a budget Windows PC for everyday use that provides you a smooth and fast computing experience everyday? The answer is obviously a big “NO” for most of you. Linux is a pretty lite OS and it’s compatible with any hardware. If you install any popular Linux distribution like Ubuntu , Debian or Mint , you can do your everyday job like browsing, email, youtubing,

How does Kon Boot Works

Have you ever asked yourself about HOW KON-BOOT WORKS ?? What is KON-BOOT: Kon Boot  is an application which will bypass the authentication process of Windows based operating systems.  Kon Boot  can work on a USB flash drive, CD, or floppy diskette. watch the video down below to see it in action Now how does it works ?? The source code of Kon-boot has not been published by its author so it is not known  what it does exactly to hack the operating system. However some hypothesis can be made based on known technologies to determine how it works. In general, bootkits basically hook the 0x13 interruption routine that is usually provided by the BIOS of the computer. The role of this routine is to read sectors from the hard disk and to load them into a given location in RAM memory. By hooking this routine, bootkits such as Kon-boot or Vbootkit modify directly the code of the operating system when it is copied into main memory, just before its execution.

Add Perfect Meta tag in Blogger

Hey bloggers, you may know that how important is <meta> tag in SEO. Here is the way you can ad the perfect meta tag in you Blogger or Blogspot blogs.  Read here Step by Step to add Different Meta tags description For Each Post in your blogspot blog. Step 1 Install title tags optimized <b:include data='blog' name='all-head-content'/> <b:if cond='data:blog.pageType == &quot;index&quot;'> <title><data:blog.pageName/> | <data:blog.title/></title> <b:else/> <title><data:blog.pageTitle/></title> </b:if> <b:skin> Step 2 Add Meta tag Description and Meta Keywords <b:if cond='data:blog.url == data:blog.homepageUrl'> <meta content=' Your home page description ' name='description'/> <meta content=' your keywords, keywords1, keyword2 ' name='keywords'/> </b:if> <b:if cond='data:blog.pageType ==