Menu Close

Page 3 of 4

Czar’s Year Long Journey

cover

Our journey began on August, 2013, with a high-held enthusiasm but little resources.  Czar Securities was set up with an aim to provide consultation and individual guidance to every website be it big or small and also to every individual who is struggling with the fatalities of the cyber world.

Czar Securities has now walked a long way with the man behind it, Shikhil Sharma and the bonding tightens with each passing day. On looking back in retrospect,  we started …

Read the full article

“9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick!

 

Working as a Self-employed Security Researcher is “Amazing, Thrilling, Challenging, Impacting, and Self Disciplinary focus coordinated multi-tasking problem tackling monster”is what Shritam Bhowmick thinks a 9-5 job never will!

Here’s our in-depth interview with Shritam Bhowmick,a renowned Cyber Security Expert at Defencely Inc. He shares his personal pinions on how he got into cyber space, what motivated him to reach at a pinnacle in security research and what keeps him going, and a genuine advice for young cyber security …

Read the full article

What Can You Do in 15 Seconds? #Czar15secTest

What Can You Do in 15 seconds?

Create a fake account to get more likes on your page?

Or get a 15 second scan?

What is #Czar15secondTest?

Czar Securities is about to launch its exciting new feature, #Czar15secTest, a 15 second test to get a complete audit of your personal website or blog. One stop solution for all the startups, organisations, bloggers or any curious netizen!

Learn more at : https://www.czarsecurities.com

Find us on facebook: https://www.facebook.com/CzarSecurities…

Read the full article

All You Need to Know About “Google Hacking”

googleDorkCzarSecurities

The concept of “Google Hacking” can be traced back to 2002, when Johnny Long started collecting extraordinary Google search queries that revealed vulnerable systems and/or sensitive information disclosures – branding them as googleDorks.The list of googleDorks grew into a dictionary of queries, which were eventually categorized into the Google Hacking Database (GHDB) in 2004.

In simple terms, it is a method of computer hacking that utilizes Google Search and other Google applications to locate security loopholes in the configurations …

Read the full article

WEP as a Weak Algorithm

Read the full article

Facebook down for worldwide users

fbdown2

Facebook down for users all around the world. Earlier it looked like an issue faced by audiences in US and UK but now it turns out to be that people from all around the world are facing downtime. Twitter is flooded with tweets of people panicked not able to access facebook. The following message is seen on the error page:

Sorry, something went wrong.

We’re working on getting this fixed as soon as we can. Go Back

There are chances …

Read the full article

An Introduction To Hacker’s OS: Kali Linux

We have had innumerable discussions on computer security till today. This article brings to you one of the biggest and the most important tools that every penetration tester or a hacker uses.

Today we are going to introduce you to Kali Linux, a Linux Distribution, which is more of a branch of Debian, but with several specialties. If you have heard of BackTrack, then Kali should be introduced to you more as an updated version of the former. “From the …

Read the full article

© 2019 Czar Securities. All rights reserved.

Theme by Anders Norén.