Contents From Command Line to Weapon The Anatomy of a Security Script The Shebang & Execu…
TECHFIRE
Welcome "TechFire", A blogs on cyber security, ethical hacking & penetration testing.There are many people who don't know about cyber attacks and hacking, so hackers stealing their sensitive information and use it.I personally think that it is impossible to defend yourself from hackers without knowing how hacking is done, So TechFire is here to share knowledge and experience with you guys.And also tips and tricks on daily life.Thanks you & Keep Supporting !!!
All articles
This guide provides a complete walkthrough for installing, configuring, securing, and troubleshooting your Apache web server. We'll cover every…
Ordinary Differential Equation Example 1 x0=0 xinc=0.001 xf=1 x=x0:xinc:xf y=sqrt(x^2+2*x+0.001) disp("The Value is", y) plot2d(x,y) titl…
Home Page Conditional Tags <b:if cond='data:view.isHomepage'> Code Here </b:if> Page Post / Article Conditional Tag <b:if cond…
How to Speed Up Blog Loading By Adding Expires Headers Expires Headers: Leverage browser Expires Headers relating to web pages such as images, CSS,…
How To Install Burpsuite Professionals In Kali Linux For Free With Licence Download Burpsuite Pro: Get Burpsuite Pro After Downloading Burpsuite Pro.…
How To Setup DVWA (Damn Vulnerable Web Application) On Kali Linux Hello Friends in this article we are going to install DVWA (Damn Vulnerable Web App…
Install the Windows Subsystem for Linux: First, run PowerShell as the administrator by pressing Windows + X and clicking on " Windows PowerShel…
Requirements For Making Live USB With Persistence: 1.Linux OS (Ubuntu or Fedora itself) 2.16GB & Above Drive 3.Fedora ISO 4.Gparted 5.Livecd ISO …