Menu Close

Category: Security Gyan (page 2 of 3)

Cyber Security related articles. How to protect yourself, your website and your online presence.

CMD – You companion for network information

Here we are back again with some more new stuff to learn. In our first article we went through an Introduction to CMD, its benefits and limitations. In second article we went through the basic CMD commands like creating, copying, renaming, deleting files using CMD.

In this article we will get into some networking stuff like looking up IPs, checking your internet connection and much more.


It works as it sounds, it gives you all available hardware information about …

Read the full article

WordPress Security for Bloggers

The main security risk of having a website is being hacked. Many believe that since their website is not in limelight, or since it does not hold any sensitive information it is not a target of the fraudsters.

Get your notions corrected. Hackers are after everything that your website has. They might hack a website to host and transfer warez and other forms of illegal files, so that they can use free bandwidth, which you pay for. Or they can …

Read the full article

Basic commands of CMD – Startup

In our last article we went through an Introduction to CMD, its benefits and limitations.
In this article we will go through the basic CMD commands.
So lets get started !

NOTE : Click/Open image to view it properly and understand the working of commands.


First thing first! How to open command prompt (CMD)? Open start menu and search ‘cmd’ and it will show up ‘cmd.exe’ open it, as simple as that.


If a user …

Read the full article

Introduction to CMD – First step to be a hacker!

What comes to your mind when you think about the word “HACKING” ? Is it a black screen with green text on it? Then you are imagining the CMD terminal!!

Command Prompt is popularly known as CMD. It is used to write several system commands in “Command Line Interface (CLI)” to perform various tasks as mentioned in the article below.

What it CMD?

Sounds and looks like some complicated hacking stuff right? But it is way easier to understand and …

Read the full article

All You Need to Know About “Google Hacking”


The concept of “Google Hacking” can be traced back to 2002, when Johnny Long started collecting extraordinary Google search queries that revealed vulnerable systems and/or sensitive information disclosures – branding them as googleDorks.The list of googleDorks grew into a dictionary of queries, which were eventually categorized into the Google Hacking Database (GHDB) in 2004.

In simple terms, it is a method of computer hacking that utilizes Google Search and other Google applications to locate security loopholes in the configurations …

Read the full article

WEP as a Weak Algorithm

Read the full article

Joomla Exploit Review by Czar Securities


This time its Joomla, with the recent release of Metasploit’s new joomla exploit which effects version 2.5.x up to 2.5.1, as well as 3.x up to 3.1.4. The vulnerability exists in the Media Manager Module which comes by default in joomla web applications allowing Remote File Uploads which results in Remote Code Execution on host servers. This Exploit was tested through Kali Linux. In this exploit review you will get to know how hackers execute remote code execution strategies …

Read the full article

© 2019 Czar Securities. All rights reserved.

Theme by Anders Norén.