Menu Close

Page 2 of 4

CMD – You companion for network information

Here we are back again with some more new stuff to learn. In our first article we went through an Introduction to CMD, its benefits and limitations. In second article we went through the basic CMD commands like creating, copying, renaming, deleting files using CMD.

In this article we will get into some networking stuff like looking up IPs, checking your internet connection and much more.

SYSTEMINFO

It works as it sounds, it gives you all available hardware information about …

Read the full article

WordPress Security for Bloggers

The main security risk of having a website is being hacked. Many believe that since their website is not in limelight, or since it does not hold any sensitive information it is not a target of the fraudsters.

Get your notions corrected. Hackers are after everything that your website has. They might hack a website to host and transfer warez and other forms of illegal files, so that they can use free bandwidth, which you pay for. Or they can …

Read the full article

U.S. Central Command Accounts Hacked

The U.S. Central Command that supervises operations in the Middle East had to compromise their Twitter and YouTube account for 30 long minutes as they were brutally hacked on Monday (12th January 2015) by people demanding to be sympathetic toward the Islamic State militant group being targeted in American bombing raids.

 

The note posted by the hackers on the U.S. Central Command Twitter feed read “American soldiers, we are coming, watch your back, ISIS”.

TheDC

U.S defense officials however mentioned …

Read the full article

Basic commands of CMD – Startup

In our last article we went through an Introduction to CMD, its benefits and limitations.
In this article we will go through the basic CMD commands.
So lets get started !

NOTE : Click/Open image to view it properly and understand the working of commands.

OPENING CMD AND HELP OPTION

First thing first! How to open command prompt (CMD)? Open start menu and search ‘cmd’ and it will show up ‘cmd.exe’ open it, as simple as that.

2.1

If a user …

Read the full article

Introduction to CMD – First step to be a hacker!

What comes to your mind when you think about the word “HACKING” ? Is it a black screen with green text on it? Then you are imagining the CMD terminal!!

CMD look

CMD First Look

Command Prompt is popularly known as CMD. It is used to write several system commands in “Command Line Interface (CLI)” to perform various tasks as mentioned in the article below.

What it CMD?

Sounds and looks like some complicated hacking stuff right? But it is way easier …

Read the full article

Czar’s Year Long Journey

cover

Our journey began on August, 2013, with a high-held enthusiasm but little resources.  Czar Securities was set up with an aim to provide consultation and individual guidance to every website be it big or small and also to every individual who is struggling with the fatalities of the cyber world.

Czar Securities has now walked a long way with the man behind it, Shikhil Sharma and the bonding tightens with each passing day. On looking back in retrospect,  we started …

Read the full article

“9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick!

 

Working as a Self-employed Security Researcher is “Amazing, Thrilling, Challenging, Impacting, and Self Disciplinary focus coordinated multi-tasking problem tackling monster”is what Shritam Bhowmick thinks a 9-5 job never will!

Here’s our in-depth interview with Shritam Bhowmick,a renowned Cyber Security Expert at Defencely Inc. He shares his personal pinions on how he got into cyber space, what motivated him to reach at a pinnacle in security research and what keeps him going, and a genuine advice for young cyber security …

Read the full article

© 2017 Czar Securities. All rights reserved.

Theme by Anders Norén.