• Home
  • WANDERLUST
  • SHUTTERBUG
  • TECHNOPHILE
  • WANDERLUST
  • SHUTTERBUG
  • TECHNOPHILE
  • Home

Categories

  • OTHERS
  • SHUTTERBUG
  • TECHNOPHILE
  • WANDERLUST

Other Links

  • Contact Me
  • Privacy Policy
  • Buy Me A Coffee

Subscribe

Loading

Buy me a coffee

  • TECHNOPHILE

    Penetration Testing of Android apps: Top 10 tools

    / November 30, 2018

    Mobile applications have started gaining more popularity than the native web application because of many reasons. Say for example, ease of usage. Less memory usage, portability, etc. As the Android OS became more…

    read more
  • TECHNOPHILE

    Why Burp Suite is the best proxy tool

    / August 27, 2018

    This post is totally personal and not intended to make a comparison between proxy tools, moreover no intention of promoting a brand or company. I used burp for almost all my projects for…

    read more
  • TECHNOPHILE

    SSL/TLS for dummies part 4 – Understanding the TLS Handshake Protocol

    / July 20, 2018

    In the 3rd part of the blog series Certificate Authorities were discussed in depth. If anyone is here without reading that post I highly recommend to read that. In this post the whole…

    read more
  • OTHERS

    How to turn off Facebook reaction sound effects

    / July 10, 2018

    Facebook have introduced a new feature for mobile devices last month. The Facebook reaction sound. They will play a sound each time you like or react to a post or comment. Even though…

    read more
  • TECHNOPHILE

    SSL/TLS for dummies part 3 – Understanding Certificate Authority

    / June 28, 2018

    In the second part of the series we have discussed about the SSL/TLS Key exchange in terms of Diffie Hellman algorithm. We ended up thinking the need of a third person who could…

    read more
  • TECHNOPHILE

    SSL/TLS for dummies part 2 – Understanding key exchange algorithm

    / June 25, 2018

    In the last part of the blog series we have discussed about the basic concepts of cryptography. It includes Hashing, Symmetric and Asymmetric encryption and so on. I haven’t spoken anything about SSL…

    read more
  • TECHNOPHILE

    SSL/TLS for dummies part 1 : Ciphersuite, Hashing,Encryption

    / June 22, 2018

    As a security enthusiast, I always fond of the working of SSL (TLS these days). It took me days to understand the very basic working of this complex protocol. But once you understand the…

    read more
  • TECHNOPHILE

    All about Robots – All you need to know about robots.txt

    / June 18, 2018

    Today in this blog post we will discuss deeply about the Robot exclusion standard or simply robot.txt. Probably you know the definition, Robots.txt is a text file put on the website to tell…

    read more
  • TECHNOPHILE

    Cookies for dummies Part 2: Third-party tracking cookie

    / June 6, 2018

    In the first part of the series, we have discussed the basics of a cookie. Recollecting the main points from the last blog post, we discussed: Cookies are tiny chunks of data stored…

    read more
  • TECHNOPHILE

    Cookies for dummies: Part 1 basic concepts

    / June 5, 2018

    When I started studying about web applications, one of the topics where I spent a hell lot of time was cookies. Once you clearly understand the concept of cookies, I think  you are…

    read more
12
2022 all rights reserved © WST
Ashe Theme by WP Royal.